-
![](/static/nostr-icon-purple-64x64.png)
@ c2827524:5f45b2f7
2025-02-13 11:54:16
> innèsto s. m. [der. di innestare]. – 1. In agraria: a. Operazione con cui si fa concrescere sopra una pianta (detta portainnesto o soggetto) una parte di un altro della stessa specie o di specie differenti (detto nesto o oggetto), **al fine di formare un nuovo individuo più pregiato o più produttivo o più giovane**: fare, operare, praticare un innesto.
Le collaborazioni sono di una potenza micidiale.
Quelle che si sviluppano nello spazio #Bitcoin ancora di più.
Non è più una collaborazione, è un #innesto: rami di alberi diversi, destinati da soli a dare grandi frutti, si fondono per **donare ad un intero ecosistema sapori ancora più deliziosi**.
Contributi e suggerimenti vanno e vengono alla velocità della luce, col sorriso, senza sacrificio e sempre con la volontà di migliorarsi e crescere.
Lo spazio #Bitcoin è una fabbrica magica, che accoglie minuscoli semini(*) da chiunque voglia partecipare, volontariamente, alla crescita della cultura Bitcoin. Ma li trasforma in un **incanto**.
In solitaria i semini sarebbero destinati comunque a grandi cose e questo è già, di per sé, meraviglioso. La fabbrica magica, invece, li fa germogliare, fiorire e fruttare in maniera ancora più potente.
Quando la magia è totale, avviene l’*innesto*, **la generazione di una nuova creatura più pregiata**.
Sta succedendo davanti ai miei occhi. Sono onorata di poter assistere a questo mini miracolo della vita e, manco a dirlo, felice di farne parte.
Non è solo cambiare atteggiamento, smussare frizioni e rigidità o correggere la propria visione, è proprio ampliare sé stessi accogliendo gli altri.
Grazie nostr:npub1uhj92lnwh8rrhhuvulfqstk4g0ayx0zx35wj2d62jueqheknkxks5m4zj6 nostr:npub1au23c73cpaq2whtazjf6cdrmvam6nkd4lg928nwmgl78374kn29sq9t53j nostr:npub1awnu9vg352863e7tqlc6urlw7jgdf8vf00tmr76uuhflp4nnn68sjmnnl3 e nostr:npub1lrurmgmlfl4u72258fc4q5ke7tr82kw5xct5vchdmzr9uhmx6j4qn3t72a
(1) Semini, non #seed [non chiamatelo seed, si dice mnemonica (cit.)]
Siccome in italiano la parola **seme** porta alla mente anche *giochini di parole fiat*, se siete qui per perculare fate pure. -> H.F.S.P. 🤣
-
![](/static/nostr-icon-purple-64x64.png)
@ d360efec:14907b5f
2025-02-13 11:15:12
**Top-Down Analysis:** กลยุทธ์การเทรดเพื่อมองภาพรวมและจับจังหวะทำกำไร
ในโลกของการเทรดที่เต็มไปด้วยความผันผวน การมีเครื่องมือวิเคราะห์ที่แข็งแกร่งเป็นสิ่งสำคัญอย่างยิ่งที่จะช่วยนำทางให้เทรดเดอร์สามารถตัดสินใจได้อย่างมีหลักการและเพิ่มโอกาสในการทำกำไร หนึ่งในเครื่องมือที่ได้รับความนิยมและมีประสิทธิภาพคือ "Top-Down Analysis" หรือการวิเคราะห์จากบนลงล่าง ซึ่งเป็นวิธีการมองภาพรวมของตลาดก่อนที่จะเจาะจงไปที่สินทรัพย์ที่เราสนใจ บทความนี้จะพาคุณไปทำความเข้าใจกับ Top-Down Analysis อย่างละเอียด พร้อมทั้งแนะนำกลยุทธ์การเทรดที่สามารถนำไปปรับใช้ได้จริง
**Top-Down Analysis คืออะไร?**
Top-Down Analysis เป็นกระบวนการวิเคราะห์ตลาดที่เริ่มต้นจากการพิจารณาภาพรวมในกรอบเวลาที่ใหญ่ขึ้น ก่อนที่จะค่อยๆ ย่อยลงไปในกรอบเวลาที่เล็กลง เพื่อทำความเข้าใจบริบทของตลาดและหาจังหวะการเทรดที่เหมาะสม วิธีการนี้ช่วยให้เทรดเดอร์สามารถมองเห็นทิศทางหลักของตลาด, แนวโน้มที่กำลังเกิดขึ้น, ระดับราคาสำคัญ, และความสมดุลระหว่างอุปสงค์และอุปทาน ก่อนที่จะตัดสินใจเข้าเทรดในกรอบเวลาที่เล็กลง
**องค์ประกอบสำคัญของ Top-Down Analysis (อ้างอิงจากภาพ)**
ภาพ "Top-Down Analysis" ได้สรุปองค์ประกอบสำคัญของการวิเคราะห์นี้ไว้อย่างชัดเจน โดยแบ่งการวิเคราะห์ออกเป็น 3 กรอบเวลาหลัก: 4 ชั่วโมง (4H), 1 ชั่วโมง (1H), และ 15 นาที (15min) แต่ละกรอบเวลามีองค์ประกอบที่ต้องพิจารณาดังนี้:
1. กรอบเวลา 4 ชั่วโมง (4H): ภาพรวมตลาดและทิศทางหลัก
ในกรอบเวลา 4 ชั่วโมง เราจะเน้นการวิเคราะห์ภาพรวมของตลาด เพื่อกำหนดทิศทางหลักและแนวโน้มในระยะกลาง องค์ประกอบสำคัญในกรอบเวลานี้คือ:
* Direction (ทิศทาง): ประเมินทิศทางที่ตลาดกำลังเคลื่อนที่ไป โดยพิจารณาจากแนวโน้มและโครงสร้างราคาในภาพรวม ตลาดกำลังเป็นขาขึ้น, ขาลง หรืออยู่ในช่วง Sideways?
* Trend (แนวโน้ม): ระบุแนวโน้มหลักของตลาด ไม่ว่าจะเป็นแนวโน้มขาขึ้น (Uptrend), แนวโน้มขาลง (Downtrend) หรือ Sideways การเข้าใจแนวโน้มช่วยในการกำหนดกลยุทธ์การเทรดที่เหมาะสม
* Key levels (ระดับราคาสำคัญ): หาระดับราคาแนวรับและแนวต้านที่สำคัญในกรอบเวลา 4 ชั่วโมง ระดับเหล่านี้มักเป็นจุดที่ราคาเคยมีการกลับตัวหรือพักตัวในอดีต และอาจเป็นบริเวณที่ราคาจะตอบสนองอีกครั้งในอนาคต
* Supply & Demand (อุปทานและอุปสงค์): วิเคราะห์ความสมดุลระหว่างแรงซื้อ (Demand) และแรงขาย (Supply) ในตลาด โดยพิจารณาจากพฤติกรรมราคาบริเวณแนวรับแนวต้าน และสัญญาณจากเครื่องมือวิเคราะห์อื่นๆ (ถ้าใช้)
2. กรอบเวลา 1 ชั่วโมง (1H): หาจังหวะและบริเวณที่น่าสนใจ
เมื่อได้ภาพรวมและทิศทางหลักจากกรอบ 4H แล้ว เราจะย่อยลงมาในกรอบ 1 ชั่วโมง เพื่อหาจังหวะการเทรดที่สอดคล้องกับทิศทางหลัก และมองหารูปแบบราคาที่น่าสนใจ องค์ประกอบสำคัญในกรอบเวลานี้คือ:
* Breaks (การทะลุ): สังเกตการทะลุแนวรับแนวต้าน หรือระดับราคาสำคัญในกรอบ 1H ที่สอดคล้องกับทิศทางหลักใน 4H การทะลุเหล่านี้อาจเป็นสัญญาณของการเคลื่อนไหวครั้งใหญ่ของราคา
* Reversals (การกลับตัว): มองหารูปแบบการกลับตัวของราคาที่อาจเกิดขึ้นบริเวณระดับราคาสำคัญในกรอบ 1H ซึ่งบ่งบอกถึงจุดสิ้นสุดของแนวโน้มปัจจุบันและเริ่มต้นแนวโน้มใหม่
* OB (Order Blocks): ระบุบริเวณ Order Blocks ในกรอบ 1H ซึ่งเป็นพื้นที่ที่มีการสั่งซื้อขายจำนวนมากในอดีต Order Blocks เหล่านี้มักจะทำหน้าที่เป็นแนวรับแนวต้านในอนาคต
* FVG (Fair Value Gaps): มองหา Fair Value Gaps ในกรอบ 1H ซึ่งเป็นช่องว่างของราคาที่เกิดจากการเคลื่อนไหวอย่างรวดเร็ว FVG มักจะเป็นเป้าหมายของราคาในอนาคต เนื่องจากราคาอาจจะกลับมาปิดช่องว่างเหล่านี้
* Liquidity (สภาพคล่อง): ประเมินสภาพคล่องบริเวณระดับราคาที่เราสนใจในกรอบ 1H บริเวณที่มีสภาพคล่องสูงมักจะดึงดูดนักลงทุนรายใหญ่ และอาจทำให้เกิดการเคลื่อนไหวของราคาที่รุนแรง
3. กรอบเวลา 15 นาที (15min): ยืนยันสัญญาณและหาจุดเข้าเทรด
ในกรอบเวลา 15 นาที เราจะเน้นการยืนยันสัญญาณการเทรด และหาจุดเข้าเทรดที่แม่นยำ เพื่อลดความเสี่ยงในการเข้าเทรดเร็วเกินไป องค์ประกอบสำคัญในกรอบเวลานี้คือ:
* Confirmation (การยืนยัน): รอสัญญาณยืนยันการเคลื่อนไหวของราคาในกรอบ 15 นาที ที่สอดคล้องกับการวิเคราะห์ในกรอบ 1H และ 4H สัญญาณยืนยันอาจมาในรูปแบบของแท่งเทียนกลับตัว, รูปแบบ Chart Patterns, หรือสัญญาณจาก Indicators
* จุดเข้าเทรด: เมื่อมีสัญญาณยืนยันที่ชัดเจนในกรอบ 15 นาที และสอดคล้องกับการวิเคราะห์ในกรอบเวลาที่ใหญ่ขึ้น จึงตัดสินใจเข้าเทรด โดยกำหนด Stop Loss เพื่อจำกัดความเสี่ยง และ Take Profit เพื่อตั้งเป้าหมายในการทำกำไร
**กลยุทธ์การเทรด Top-Down Analysis: ขั้นตอนสู่ความสำเร็จ**
เพื่อนำ Top-Down Analysis ไปใช้ในการเทรดอย่างมีประสิทธิภาพ เราสามารถทำตามขั้นตอนต่อไปนี้:
1. **เริ่มต้นที่ 4H**: กำหนดทิศทางและแนวโน้มหลัก วิเคราะห์กราฟ 4H เพื่อระบุทิศทางหลักของตลาด แนวโน้ม และระดับราคาสำคัญ ประเมินความสมดุลของ Supply & Demand เพื่อกำหนด Bias การเทรด (เน้นซื้อหรือขาย)
2. **เจาะลึก 1H:** หาจังหวะและบริเวณที่น่าสนใจ เมื่อได้ทิศทางหลักจาก 4H แล้ว ให้ย่อยลงมาดูกราฟ 1H เพื่อหารูปแบบราคาที่น่าสนใจ เช่น การทะลุแนวรับแนวต้าน, รูปแบบการกลับตัว, Order Blocks, Fair Value Gaps และบริเวณที่มีสภาพคล่องสูง
3. **ยืนยันใน 15min:** หาจุดเข้าเทรดที่แม่นยำ รอสัญญาณยืนยันในกรอบ 15 นาที ที่สอดคล้องกับการวิเคราะห์ในกรอบเวลาที่ใหญ่ขึ้น ใช้ Price Action, แท่งเทียน, หรือ Indicators เพื่อยืนยันสัญญาณ และหาจุดเข้าเทรดที่แม่นยำ พร้อมกำหนด Stop Loss และ Take Profit ที่เหมาะสม
**ประโยชน์ของการใช้ Top-Down Analysis**
* มองเห็นภาพรวมตลาด: ช่วยให้เทรดเดอร์เข้าใจบริบทของตลาดในภาพรวม ไม่หลงทางในรายละเอียดเล็กๆ น้อยๆ
* ตัดสินใจเทรดอย่างมีหลักการ: ทำให้การตัดสินใจเทรดมีเหตุผลและมีข้อมูลสนับสนุนมากขึ้น ไม่ใช่แค่การคาดเดา
* เพิ่มความแม่นยำในการเทรด: การวิเคราะห์หลายกรอบเวลาช่วยกรองสัญญาณรบกวน และเพิ่มโอกาสในการเข้าเทรดในทิศทางที่ถูกต้อง
* ลดความเสี่ยง: ช่วยลดโอกาสในการเทรดสวนทางแนวโน้มหลักของตลาด และช่วยในการกำหนด Stop Loss ที่เหมาะสม
**ข้อควรจำและข้อควรระวัง**
* ฝึกฝนและสังเกต: Top-Down Analysis ต้องอาศัยการฝึกฝนและการสังเกตกราฟราคาอย่างสม่ำเสมอ เพื่อพัฒนาความเข้าใจและทักษะในการวิเคราะห์
* ปรับใช้ให้เข้ากับสไตล์: ปรับกลยุทธ์ให้เข้ากับสไตล์การเทรดของคุณ และสินทรัพย์ที่คุณเทรด
* บริหารความเสี่ยง: ให้ความสำคัญกับการบริหารความเสี่ยงเสมอ กำหนดขนาด Position ที่เหมาะสม และใช้ Stop Loss ทุกครั้ง
* ไม่มีกลยุทธ์ใดสมบูรณ์แบบ: Top-Down Analysis เป็นเครื่องมือที่มีประสิทธิภาพ แต่ไม่มีกลยุทธ์ใดที่รับประกันผลกำไร 100% การเทรดมีความเสี่ยง โปรดศึกษาและทำความเข้าใจความเสี่ยงก่อนตัดสินใจลงทุน
**สรุป**
Top-Down Analysis เป็นกลยุทธ์การเทรดที่ทรงพลัง ซึ่งช่วยให้เทรดเดอร์สามารถวิเคราะห์ตลาดอย่างเป็นระบบ มองภาพรวม และจับจังหวะการเทรดได้อย่างแม่นยำ การนำหลักการของ Top-Down Analysis ไปปรับใช้ในการเทรด จะช่วยเพิ่มประสิทธิภาพในการตัดสินใจ และเพิ่มโอกาสในการประสบความสำเร็จในตลาดการเงินได้อย่างยั่งยืน
-
![](/static/nostr-icon-purple-64x64.png)
@ e373ca41:b82abcc5
2025-02-13 09:13:10
*This article has been written with the* ***[Pareto client](https://pareto.space/read).*** *(read it there for the full experience). It was first published in German by Milosz Matuschek on* ***["Freischwebende Intelligenz".](https://www.freischwebende-intelligenz.org/p/unterwanderter-journalismus-der-mediale)***
***
It is unmistakable. The hydra of the Deep State is losing a few heads - and this time it's the turn of the media heads. Anyone can look at [USASpending](https://www.usaspending.gov/) to see how much taxpayers' money has gone to whom in the USA.
### When the state pays its advocates
The mainstream media were also among the beneficiaries: Politico (100% Axel Springer) received over [USD 7 million](https://www.usaspending.gov/recipient/fa0cefae-7cfb-881d-29c3-1bd39cc6a49e-C/latest); the New York Times received over USD 40 million. Thousands of (probably not always necessary) government subscriptions flowed to large media houses - paid for with taxpayers' money. A form of covert press financing by the state. At what point can or should we speak of state media?
![1.00](https://route96.pareto.space/c95249697317b589d151df754f3bde10bddd9655ffbe9200a50aee0e143ead17.webp "(Source: https://datarepublican.com/expose/?eins=943027961)")
However, this is only the tip of the iceberg. The CIA front organization USAID ([known for its funding of virus research in Wuhan and other questionable activities](https://pareto.space/a/naddr1qqxnzden8quryveexq6rywp3qgswxu72gyq7ykjdfl9j556887jpzwu3mw3v9ez36quas55whq4te3grqsqqqa28qyxhwumn8ghj7mn0wvhxcmmvqyf8wumn8ghj7mmxve3ksctfdch8qatzqythwumn8ghj7urpwfjhgmewdehhxarjxyhxxmmdqy28wumn8ghj7un9d3shjtnyv9kh2uewd9hsz9nhwden5te0wfjkccte9ehx7um5wghxyctwvszsxfjh)) - [pumped USD 472.6 million directly into the media landscape via the “Internews Network”.](https://www.zerohedge.com/political/usaid-funded-massive-global-state-propaganda-news-matrix-nearly-billion-people-reach) FAZ journalist Udo Ulfkotte once called this “bought journalists” in a very clear and media-effective way, which was not good for his health. There is ample evidence of the CIA-USAID connections, for example [here](https://timesofindia.indiatimes.com/toi-plus/international/how-usaid-worked-alongside-cia-in-vietnam-a-whistleblowers-account/articleshow/118164225.cms), [here](https://foreignpolicy.com/2014/04/03/cuban-twitter-and-other-times-usaid-pretended-to-be-an-intelligence-agency/) and [here.](https://www.jstor.org/stable/4017728)
![1.00](https://route96.pareto.space/e66ce77e54e2d5579c861956cac26f5f2a386803ecdb9a43a37fc83958838e46.webp "CIA & USAID: a long history (Screenshot/Jstor)")
But this is now over for the time being: USD 268 million, which was to go to “independent media for the free flow of information” (according to the [Columbia Journalism Review](https://www.cjr.org/the_media_today/usaid-and-the-media-in-a-time-of-monsters.php)) in 2025, has been frozen. The largest media influence machine in the Western world is bleeding a little. One has to admit: part of the media-deepstate swamp is actually being drained dry financially. The fact that the Columbia Journalism Review doesn't even seem to notice that “free international journalism”, which, as it writes, is largely funded by USAID, ceases to be “free journalism” speaks volumes about this “hotbed of journalism”. Matt Taibbi of Racket News rightly finds, “The legacy media system is dead. They just don't know it yet.”
***
ADVERTISEMENT:
*Looking for the easiest way to buy Bitcoin and store it yourself? The **[Relai app](https://relai.app/de/?af_xp=custom\&source_caller=ui\&pid=INFLUENCER\&is_retargeting=true\&af_click_lookback=7d\&shortlink=eo5zpzew\&af_channel=branded_url\&af_inactivity_window=30d\&c=Milosz%20Matuszek)** is the No. 1 crypto start-up and No. 2 of all fintech start-ups in Switzerland. **[Here you can buy Bitcoin](https://relai.app/de/?af_xp=custom\&source_caller=ui\&pid=INFLUENCER\&is_retargeting=true\&af_click_lookback=7d\&shortlink=eo5zpzew\&af_channel=branded_url\&af_inactivity_window=30d\&c=Milosz%20Matuszek)** in just a few steps and also set up savings plans. Nobody has access to your Bitcoin except you. With the referral code MILOSZ you save on fees (no financial advice). Disclaimer due to regulatory issues: The services of the Relai App are hereby only recommended to inhabitants of Switzerland or Italy.*
![1.00](https://route96.pareto.space/fd780f3b3d66fc821c5d24b63041394534fe1c23c38f32480d118b41d4e62b9c.webp "1.00")
*Need more security? The **[Trezor wallets](https://trezor.io/trezor-safe-5-bitcoin-only?transaction_id=102e192a206d1585e56a2fddef6d83\&offer_id=238\&affiliate_id=35234)** are recommended and easy to use, others are available in the **[store](https://trezor.io/?transaction_id=102bc85bdca2733287749c7f879ebd\&offer_id=133\&affiliate_id=35234)**. Need more advice? Book an **[introductory meeting](https://trezor.io/trezor-expert-session?transaction_id=1020e18dad0aa4b1186289fd22e90f\&offer_id=241\&affiliate_id=35234)** with a wallet expert.*
***
Large-scale media manipulation has become visible. The propaganda matrix, if you will. The disastrous thing about it: if the Overton window is infiltrated, so to speak, the entire institution of journalism cannot be trusted. Every day, readers must expect to be pulled through the nose ring of intelligence service narratives and public agendas by mainstream journalists who pretend to be objective (and are often simply clueless and unsuspecting). The panorama of what we are supposed to see and believe, so to speak.
How many mainstream journalists today are basically mouthpieces for the services? Every mainstream reader must now ask themselves: Is my favorite journalist at NZZ, Welt, SZ, ZEIT or FAZ perhaps just a CIA-IM? There were no major dissenters among them: EU criticism? Vaccination criticism? Criticism of NATO? Criticism of Biden and America? Criticism of Nord Stream? There were brief moments on television when questions about journalists' ties to lobby organizations were still part of the German satire program.
<https://x.com/Spitze_Zunge_/status/1887915509988876786>
### The cards in the media are being reshuffled
The watchdog of the powerful has been infiltrated by the powerful. This means that the Fourth Power is not a power at all, but part of the executive branch, a mouthpiece of the government. The claim that the mainstream is quality journalism, the gold standard for trustworthy information, is therefore the real fake news. It is the last, now crumbling dogma of an infiltrated press sect that has formed a cartel and is subjecting citizens to a permanent psy-op with intelligence-controlled taxpayers' money. A troupe of spokespeople at the work of mental synchronization.
<https://x.com/TopherField/status/1887962959072149989>
### The fight against independent media
But they not only give to one, they also take from the other. While government agencies use taxpayers' money to promote a certain type of journalism, the juice is actively being cut off from the critical part. All it takes is to be classified as a “PEP” (politically exposed person) and the bank account is gone. This is what has just happened to swiss Radio Kontrafunk. The critical Swiss author Stefan Millius was canceled by his publisher. Others have had their monetization via YouTube cut off (Snicklink). Others are harassed by the state media authority (Multipolar, Alexander Wallasch). The next one has a house search. It has been known since the Twitter files that the government and services also intervened massively in social media communication. This is no longer the Cold War. But it is the cold information war.
<https://www.youtube.com/watch?v=kmgWAGDFCZI>
Is this all so outrageous and new? During the Cold War, the CIA systematically infiltrated media outlets in the US. Thousands of agents were deployed as journalists - and wrote what they were told. This “Operation Mockingbird”, which the Church Committee also investigated, never ended, so to speak. It lives on as Operation Mockingbird 2.0.
Intelligence payments to media outlets continue to exist.
USAID distributes millions for “pro-democratic” reporting.
Government subscriptions keep uncritical media alive.
Media control of public opinion is the most important tool of power in a modern “democracy”. The difference to back then? Today, the manipulation is global. However, these revelations come at a time when trust in the media is already at an all-time low. [The fear of being lied to by the powerful is currently the majority opinion at 70%.](https://www.edelman.com/trust/2025/trust-barometer) They are currently in the process of convincing the remaining 30% of their own incompetence.
![1.00](https://route96.pareto.space/5b67d2a2ae34232aaac2cb3a77eb69152bbbcb660baa1f1ffc57d4a929b6448a.webp)
### Update on the [Pareto project](https://pareto.space/en)
![1.00](https://route96.pareto.space/170c36bc7c5f9b11b9874711c4aad120b33fa4a795c64ed9edfda08e3e9f1526.webp)
“Half the victory”, says Sun Tsu, ‘lies in the impregnable defense’. Free media now have the opportunity to build their own impregnable bastion and the [Pareto Project](https://pareto.space/read) invites them to do just that: [become uncensorable, be able to scale infinitely and not depend on third parties for all processes of journalistic work](https://pareto.space/a/naddr1qqxnzdenxuerxdpkxycngvpcqgsvlutjpemmkp50p6aa8zwu65yz9hg6erf2czc0tuyqpt57zhr79vsrqsqqqa28qyxhwumn8ghj7mn0wvhxcmmvqy28wumn8ghj7un9d3shjtnyv9kh2uewd9hs33ee7d). It's all possible now. Everyone has to realize that: With other platforms, you build your house on someone else's property. With Nostr/Pareto, there is nothing and no one between author and reader, both in terms of communication and payment (via Bitcoin/Litghtning).
**A brief update on the project, January was very busy.**
* We have about 35 journalists, publications, substackers, bloggers, memers onboarded who publish texts via the Pareto client, and the number is growing all the time.
* The first Telepolis authors, such as Mathias Bröckers and Alexander Unzicker, will soon be able to re-publish their deleted texts with us in a censorship-proof manner, and we are helping with the migration of content.
* We recently successfully tested the newsletter function! We will soon be able to offer all authors and readers the functions of Substack, Steady, Ghost etc. without having to entrust their readers' sensitive data to a platform or expose them to platform tracking.
* We are delighted to have more high-caliber additions to our development team, which now comprises around ten wonderful people, almost all of whom come from this group of readers.
* Our [open source code is now also public.](https://github.com/twenty-eighty/pareto-client)
* We have opened a [crowdfunding on Geyser!](https://geyser.fund/project/pareto)
- Our editor will soon be available to everyone free of charge (atm you have to drop us your npub: <team@pareto.space>)
### What's next?
This opens up a new window of unimagined possibilities: On a strong basis such as that offered by decentralized technology, many critical authors can now publish securely or new publications can be created - worldwide and uncensorable. What kind of publications would you like to see? Where do you see gaps (also in the critical spectrum) that need to be filled, both in terms of formats and topics? What does the journalism of the future look like to you? Feel free to write to me: **<milosz@pareto.space>**
## One last thing
Our funds are coming to an end. If you would like to support us: We have started a [crowdfunding on Geyser](https://geyser.fund/project/pareto), where you can help us with Bitcoin/Lightning donations. 
![1.00](https://route96.pareto.space/6a28980f1887702d97c0b51169a18205aaa45f8d64b4a7381dadb1a98bf61bdd.webp)
For traditional donations, you can find our bank account on our **[landingpage.](https://pareto.space/en)**
***
***Join the marketplace of ideas!** We are building a publishing ecosystem on Nostr for citizen-journalism, starting with a client for blogging and newsletter distribution. Sound money and sound information should finally be in the hands of the people, right? Want to learn more about the [Pareto Project](https://pareto.space/en)? Zap me, if you want to contribute (all Zaps go to the project).*
*Are you a publication or journalist and want to be part of it, test us, migrate your content to Nostr? Write to **<team@pareto.space>***
**Not yet on** **[Nostr](https://nostr.com/)** **and want the full experience?** Easy onboarding via **[Start.](https://start.njump.me/)**
-
![](/static/nostr-icon-purple-64x64.png)
@ 3eba5ef4:751f23ae
2025-02-13 09:00:41
Security is fundamental to any blockchain. It ensures that all tokens are secure. When talking about a virtual machine and the smart contract platform it forms, security comes in two main aspects:
* The code running on the virtual machine must be secure
* The virtual machine itself should also be designed to facilitate safer code execution
The first aspect often gets sufficient attention. When it comes to [CKB](https://www.nervos.org/), we now encourage developers to write scripts in Rust for maximum security, reserving pure C code only for those who fully understand its risks. Additionally, higher-level languages have been introduced in CKB to strike a better balance between productivity and security.
Virtual machine security was a major focus when CKB-VM was originally designed. Many potential risks were addressed at the architectural level, though some—despite thorough research—were still left open. One such issue is **Return-Oriented Programming (ROP)**—a rather ingenious attack. It exploits executable code that has been legitimately loaded into memory, making widely effective protections (e.g., [W^X](https://yakihonne.com/write-article)) futile. It spans multiple architectures and is constantly evolving. Although we’ve spent a great deal of effort in the early days on ROP, we did not implement specific countermeasures to prevent it. Now, with new RISC-V extensions now available, it is the perfect time to introduce design-level protections against ROP.
## Acknowledgments
Before diving deeper, we would like to acknowledge Todd Mortimer from the OpenBSD team. His work on ROP mitigations at the OpenBSD kernel in 2018-2019 significantly inspired our research and this article. We highly recommend his [talk](https://www.youtube.com/watch?v=ZvSSHtRv5Mg), slide decks from [AsiaBSDCon 2019](https://www.openbsd.org/papers/asiabsdcon2019-rop-slides.pdf) and [EuroBSD 2018](https://www.openbsd.org/papers/eurobsdcon2018-rop.pdf), and this [paper](https://www.openbsd.org/papers/asiabsdcon2019-rop-paper.pdf) for a deeper understanding of ROP. Several examples on x64 ROP attacks in this post are also drawn from his research.
## Typical Attack Workflow
While there are many sophisticated [ways](https://www.wired.com/2016/06/clever-attack-uses-sound-computers-fan-steal-data/) of attacks, a common attack on a program typically follows this process:
Prepare a [shellcode](https://en.wikipedia.org/wiki/Shellcode)— a piece of binary code to perform specific actions (e.g., running a shell or other programs on the target computer).
Exploit one possible vulnerability in the target system, most commonly a [buffer overflow](https://en.wikipedia.org/wiki/Buffer_overflow) attack. The attack could be initiated via a network protocol (such as HTTP) against a remote system, or via command line input to a target program;
As the result of the attack, the shellcode is inserted to a designated memory region of the target system and gets executed, allowing the attacker to achieve their goal. The consequences vary, like gaining unauthorized access to sensitive data, destroying certain data/machine, planting malicious programs onto the target for further actions, manipulating control flow.
While traditional systems face a wide range of attacks, blockchains run in their own limited and unique runtime environment, rendering many conventional attacks irrelevant. Major blockchain security threats includes:
* **Private key security**: Blockchain wallets rely on private keys, which are prime targets for various attacks.
* **Smart contract vulnerability**: Poorly written smart contracts contain logic flaws that lead to security risks.
* **Virtual machine security**: Attacker may send malicious inputs to a smart contract, causing it to terminate unexpectedly with a success status—despite lacking proper credentials.
This post focuses specifically on attacks targeting the blockchain’s virtual machine—in our case—CKB Virtual Machine (CKB-VM) specifically.
## CKB’s Early Approach
While it is impossible to predict every attack, disrupting the typical attack workflow is an effective defense strategy. From its inception, CKB-VM has implemented [W^X](https://en.wikipedia.org/wiki/W%5EX) protection: at any given time, any memory location in CKB-VM is either writable (allowing data modification) or executable (allowing data execution)—but never both. Once a memory region is marked as **executable**, it cannot be reverted to **writable** throughout the lifecycle of the current CKB-VM instance. Only writable memory location can be **frozen** to executable.
This design significantly disrupts the typical attack workflow. For shellcode to execute on CKB-VM, it must reside in **executable** memory. However, an attacker can only provide shellcode as part of program inputs, which are loaded into **writable** memory. As long as a CKB script does not voluntarily mark input data as **executable** (a highly unlikely scenario), the shellcode remains inert. Additionally, attempting to overwrite existing **executable** shellcode is also futile, since executable memory region is unwritable, and cannot be converted back to writable.
This way, W^X is a well-established security technique widely used in modern hardwares, operating systems, and virtual machines. Although it cannot prevent all possible attacks, W^X effectively shields many by breaking the standard attack workflow. Even if an attacker successfully injects shellcode into a target machine, the attack is incomplete due to the inability to execute it.
## Understanding ROP
While W^X is effective, it does not solve all our problems. This leads to the topic of this post: **Return-oriented Programming (ROP)**. Instead of explicitly injecting new code, ROP exploits executable code that already resides in the target machine’s memory. Essentially, ROP builds a shellcode by chaining existing code snippets together that were never intended to function as such. It may sound like a fantasy, but as we shall see from the following examples, ROP is a practical and effective attack technique.
To understand ROP, we must first examine modern CPU architecture and memory layout. While assembly instructions vary in representations and lengths, they are put together in memory one after another as a stream of bytes:
![image](https://yakihonne.s3.ap-east-1.amazonaws.com/3eba5ef41b206b1d49e8b1be7241d7ead5dd87b737261da64c3bc0e2751f23ae/files/1739326040178-YAKIHONNES3.png)
*Image [Source](https://www.quora.com/Is-assembly-language-a-source-code-or-object-code)*
As seen in the above example, different assembly instructions come in different lengths. For x86-64 ISA, an instruction can range from 1 to 7 bytes (RISC ISAs such as ARM or RISC-V have more uniform instruction lengths—we will discuss it later). But in memory, instructions are stored sequentially without gaps.
This means that with a stream of bytes alone, we really don’t know what instructions the stream of bytes consist of. In the above example, meaningful assembly instructions emerge only when we start decoding from the `B8` byte. In a different occasion, assuming we know elsewhere that `B8 22 11` bytes at the front are for certain magic flags, the decoding would start from `00` byte, yielding a totally different instruction set.
![image](https://yakihonne.s3.ap-east-1.amazonaws.com/3eba5ef41b206b1d49e8b1be7241d7ead5dd87b737261da64c3bc0e2751f23ae/files/1739326082274-YAKIHONNES3.png)
*Image [Source](https://www.quora.com/Is-assembly-language-a-source-code-or-object-code)*
It is really the combination of a special program counter (`PC`) register from the CPU and the current memory stream, jointly determine the instructions the CPU executes. Depending on each different ISA or hardware, a booting process initializes a CPU’s `PC` register to a pre-defined value, then loads up instructions from this pre-defined address, and initializes everything related to the operating system. When a user launches a new program, the metadata for each program will contain an `entrypoint` address, where OS sets the CPU’s `PC` register to, in order to start executing the program. It is suffice to say that maintaining a proper `PC` value is a critical job to ensure a computer’s proper function. An invalid `PC` value might lead to a CPU malfunction at best, or at worst, leaking sensitive information or granting attackers unauthorized access.
### Forming an ROP Attack Via ROP Gadgets
Let’s look at the following byte instruction stream in a x86-64 CPU:
```
8a 5d c3 movb -61(%rbp), %bl
```
This 3-byte represents a `mov` instruction: it takes the address of `rbp` register, adds an offset of `-61`, then uses the result as a memory address to load 1 byte data, and finally sets the loaded data to `bl` register. However, if we ignore `8a` and only look at `5b c3` here, it actually represents a different instruction set:
```
5d popq %rbp
c3 retq
```
This byte sequence contains two instructions:
* Pop 8-byte value from stack, and use it to set `rbp` register
* Pop 8-byte value from stack, and use it to set `PC` register, so we continue executing from the new location
We've briefly discussed that shellcode only fulfills a certain task required by the attacker. In fact, the most common type of shellcode simply construct a new shell, where the attacker can execute more operations. Such shellcode can be represented in the following C pseudocode to run a new command via the `execve` syscall:
```
execve(“/bin/sh”, NULL, NULL);
```
To execute this on an x86-64 CPU, the following actions are needed for a syscall:
* `rax` register: must contain the syscall number, for `execve`, it is `59`
* `rdi`, `rsi`, `rdx` registers: hold the first 3 arguments to the syscall. In this case, `rdi` holds a pointer to the C string `/bin/sh`; `rsi` and `rdx` must be zero.
* The `syscall` instruction (or typically `int 80h` on x64) shall be executed
A typical shellcode would be a packed assembly sequence directly doing all of the above instructions. In contrast, ROP attack looks for the following sequences:
```
# Those can set the value of different registers from values on the stack
pop %rax; ret
pop %rdi; ret
pop %rsi; ret
pop %rdx; ret
# Finally, trigger the syscall
syscall
```
Each of these small code sequences, are conventionally callled **ROP gadgets**. An attacker searches for these gadgets in the target program or system libraries (such as libc). Once these required gadgets are obtained, the attacker pieces together a sequence of data, much like the following:
![image](https://yakihonne.s3.ap-east-1.amazonaws.com/3eba5ef41b206b1d49e8b1be7241d7ead5dd87b737261da64c3bc0e2751f23ae/files/1739326764236-YAKIHONNES3.png)
With the prepared data sequence, the attacker can exploit a vulnerability in the target computer or program, such as typical buffer overflow attack. During this process, the attacker performs three key actions:
* Pushes (or overwrites existing data) the crafted data sequence to the stack
* Sets the stack pointer (top of the stack) to `X + 64`
* Sets the `PC` register to the address of a code sequence, `pop %rax; ret` in the existing program or libc memory space
Now the attack proceeds step by step as follows:
1. The CPU runs `pop %rax; ret`. With the stack pointer pointing to `X + 64`, the CPU pops `59` from the stack and sets `rax` register to `59`. It then pops the address to code sequence `pop %rdi; ret` from the stack, and sets `PC` to this value;
2. The CPU runs `pop %rdi; ret`. With the stack pointer pointing to `X + 48`, the CPU pops value `X`, pointing to the C string `/bin/sh` from the stack, and sets `rdi` register to `X`. It then pops the address to code sequence `pop %rsi; ret` from the stack, and sets `PC` to this value;
3. The CPU runs `pop %rsi; ret`. With the stack pointer pointing to `X + 32`, the CPU pops `0` from the stack and sets `rsi` register to `0`. It then pops the address to code sequence `pop %rdx; ret` from the stack, and sets `PC` to this value;
4. The CPU runs `pop %rdx; ret`. With the stack pointer pointing to `X + 16`, the CPU pops `0` from the stack and sets `rdx` register to `0`. It then pops the address to code sequence `syscall` from the stack, and sets `P`C to this value;
5. The CPU runs `syscall`. At this point, `rax` holds `59`, `rdi` points to `/bin/sh`, and both `rsi` and `rdx` are zero, the CPU invokes `execve("/bin/sh, NULL, NULL);`, granting the attacker a shell for further manipulations.
This sequence of ROP gadgets, referred to as **ROP chains**, demonstrates how a complete ROP attack works. Two key takeaways are:
* **ROP does not inject new code**. Instead, it injects data into the stack and leverages the existing code loaded in memory and marked them as executable. W^X protections hence cannot prevent ROP attacks.
* **Attackers can mine ROP gadgets from the [libc](https://en.wikipedia.org/wiki/C_standard_library) library**. This is because modern computers employs [protection rings](https://en.wikipedia.org/wiki/Protection_ring) as a way for privilege encapsulations: on x86-64 computers, programs normally run at ring level 3, while libc runs at ring level 1. Lower ring levels have higher privileges, meaning that even if a program misbehaves, its capacities are limited at ring level 3. However, by using ROP gadgets in the libc library which runs at ring level 1, ROP attacks can have higher privileges and execute more damaging operations then normal shellcodes.
Note that the above examples simply show the most basic ROP gadgets. In reality, ROP gadgets come in all kinds of forms. Since they come from compiler outputs, they can be combined in the least expected way, and can vary the forms as new compiler optimizations come out. Numerous tools (e.g., [ropper](https://scoding.de/ropper/), [ropr](https://github.com/Ben-Lichtman/ropr)) and research papers (e.g., *[Experiments on ROP Attack with Various Instruction Set Architectures](https://dl.yumulab.org/papers/42/paper.pdf)*, *[ROPGMN](https://www.sciencedirect.com/science/article/abs/pii/S0167739X24005314)*, *[Detecting and Preventing ROP Attacks using Machine Learning on ARM](https://www.infosun.fim.uni-passau.de/ch/publications/compsac23.pdf)*, *[KROP](https://arxiv.org/pdf/2406.11880)* ) keep coming out, making it almost impossible to enumerate all possible ROP gadget combinations.
### ROP on ARM & RISC-V
ROP attacks are not limited to CISC architectures, where instructions vary in length. They also affect RISC designs, such as [ARM](https://developer.arm.com/documentation/102433/0200/Return-oriented-programming) and [RISC-V](https://pure.royalholloway.ac.uk/ws/portalfiles/portal/37157938/ROP_RISCV.pdf). Take the following sequence for example:
```
13 4f 83 23 0b 00
```
Decoding from the start, the first four bytes represent `xori t5,t1,568` following the RISC-V ISA. But if we skip the first two, the latter four represent `lw t2,0(s6)`. This illustrates that a byte stream interpretation also requires `PC` register in a RISC design such as RISC-V. As a result, one can find ROP gadgets from a RISC-V program as well.
### ROP on CKB-VM
CKB’s RISC-V machine operates in a more restricted environment: for programs running on CKB, there are no `execve` syscalls to hijack a running shell, and all runtime states are publicly visible on a public blockchain like CKB. However, ROP attacks can still occur on CKB: one could construct an ROP chain that sets `a0` to `0`, `a7` to `93`, then executes `ecall`. This causes CKB-VM to immediately return with a success code (`0`), potentially allowing a script to pass validation when it should have failed—such as a lock script succeeding without a valid signature.
### Short Recap
Let’s briefly recap what we’ve learned so far:
* ROP attacks utilize existing executable code for malicious purposes. W^X cannot prevent ROP.
* ROP is possible across multiple architecture, including x86-64, ARM, RISC-V, and CKB.
* The landscape of ROP is constantly evolving. With new tools, techniques, and research emerging regularly, it’s impossible to foresee all ROP gadgets.
ROP has been extensively studied over the years, leading to various mitigation strategies, which can be broadly categorized into two main approaches:
* **Software Solutions**: Covering techniques like rewriting code sequences and implementing Retguard to prevent the creation of ROP gadgets
* **Hardware Solutions**: Introducing additional CPU instructions with Control Flow Integrity (CFI) checks to safeguard control flow.
I’ll explore these strategies in greater detail in the following sections.
## Software Solutions to Mitigate ROP
### Rewriting Sequence
Certain instruction sequences are often targeted to form ROP gadgets. To prevent ROP, one approach is to alter the compiler, so that such sequences can never be generated. Take the following example:
```
89 c3 mov %eax,%ebx
90.
```
In x86-64, `c3` represents the `ret` instruction, making it a potential target for ROP gadgets. We can rewrite it into the following equivalent sequence:
```
48 87 d8 xchgq %rbx, %rax
89 d8 movl %ebx, %eax
48 87 d8 xchgq %rbx, %rax
```
The new sequence lacks `c3` byte at the expense of more bytes and more executed instructions. However, it is really up to real benchmarks to see if this causes noticeable overhead.
Further analysis has revealed that the `rbx` register in x86-64 is often the source of ROP gadgets, due to the way Intel encodes x86-64 instructions. Hence, the OpenBSD team decided to avoid `rbx` register wherever possible, reducing the number of potential ROP gadgets.
Again, this approach comes at the cost of having bigger code fragments, more instructions to execute, and an additional patched compiler. While OpenBSD has integrated these changes into its distribution, other environments must weigh the benefits against the costs.
For a deeper dive, I would strongly recommend Todd Mortimer’s [work](https://www.openbsd.org/papers/asiabsdcon2019-rop-slides.pdf).
### Retguard’s Solution: Prologue and Epilogue
Todd Mortimer also introduced Retguard in this [work](https://www.openbsd.org/papers/asiabsdcon2019-rop-slides.pdf) for securing OpenBSD known. ROP attacks typically occur when you enter a function `foo`, but the stack was manipulated, so the CPU exits to another code fragment that is not `foo`. What if to verify that, at each function exit, it is the same function for exiting and entering?
Retguard introduces two components to perform this task:
* **Prologue**: A prologue is inserted to each function’s entry, taking two inputs:
- - A `cookie` value, a random data assigned for this particular function.
- - The return address, where to jump to when current function exits—as inputs.
The prologue computes the XOR value of these two, and stores the result into the current function’s [frame](https://en.wikipedia.org/wiki/Call_stack#Stack_and_frame_pointers) section, a dedicated memory region designated to the current function to hold data, separated from the stack.
* **Epilogue**: An epilogue is inserted to the location where a function might exit. It takes two inputs:
- - The saved XOR value from the prologue in the frame section
- - The return address it now can access to (most likely popped from the stack in x64 machine, or read from a special `RA` register in RISC design)
The epilogue computes the XOR of these two. If the result matches the original `cookie`, execution proceeds. Otherwise, the epilogue halts the program, signaling an error.
This prologue-epilogue mechanism in Retguard guards the call stack from tampering. At a noticeable but acceptable cost (both in performance and code size), Retguard eliminates a significant number of ROP gadgets from the OpenBSD kernel. Like other software-based mitigations, it requires a patched compiler, and it is up to each environment to decide if such technique shall be employed.
## Hardware Advancements to Mitigate ROP
In addition to software solutions, hardware-based defenses have also been developed. For instance, Intel has introduced [Indirect Branch Tracking](https://edc.intel.com/content/www/us/en/design/ipla/software-development-platforms/client/platforms/alder-lake-desktop/12th-generation-intel-core-processors-datasheet-volume-1-of-2/007/indirect-branch-tracking/?language=en) feature starting with its 12th generation core processors, using a new instruction `endbr32` or `endbr64` added at every location the program might jump to or call into. When the CPU executes a jump/call, it asserts that the target location is a proper `endbr32` / `endbr64` instruction, before updating the program counter `PC` register to proper values. Otherwise, the CPU halts to terminate the program. This ensures that all control flows will follow the intended way, preventing ROP attacks from redirecting execution arbitrary locations.
Modern OSes have already extensively leveraged `endbr32` / `endbr64` instructions. Ubuntu 24.04, for instance, has included these instructions in its packages:
```
$ objdump -d /bin/bash | head -n 50
/bin/bash: file format elf64-x86-64
Disassembly of section .init:
0000000000030000 <.init>:
30000: f3 0f 1e fa endbr64
30004: 48 83 ec 08 sub $0x8,%rsp
30008: 48 8b 05 d9 7e 12 00 mov 0x127ed9(%rip),%rax # 157ee8 <__gmon_start__@Base>
3000f: 48 85 c0 test %rax,%rax
30012: 74 02 je 30016 <unlink@plt-0xe1a>
30014: ff d0 call *%rax
30016: 48 83 c4 08 add $0x8,%rsp
3001a: c3 ret
Disassembly of section .plt:
0000000000030020 <.plt>:
30020: ff 35 a2 76 12 00 push 0x1276a2(%rip) # 1576c8 <o_options@@Base+0x1cc8>
30026: ff 25 a4 76 12 00 jmp *0x1276a4(%rip) # 1576d0 <o_options@@Base+0x1cd0>
3002c: 0f 1f 40 00 nopl 0x0(%rax)
30030: f3 0f 1e fa endbr64
30034: 68 00 00 00 00 push $0x0
30039: e9 e2 ff ff ff jmp 30020 <unlink@plt-0xe10>
3003e: 66 90 xchg %ax,%ax
30040: f3 0f 1e fa endbr64
30044: 68 01 00 00 00 push $0x1
30049: e9 d2 ff ff ff jmp 30020 <unlink@plt-0xe10>
3004e: 66 90 xchg %ax,%ax
30050: f3 0f 1e fa endbr64
30054: 68 02 00 00 00 push $0x2
30059: e9 c2 ff ff ff jmp 30020 <unlink@plt-0xe10>
3005e: 66 90 xchg %ax,%ax
30060: f3 0f 1e fa endbr64
30064: 68 03 00 00 00 push $0x3
30069: e9 b2 ff ff ff jmp 30020 <unlink@plt-0xe10>
3006e: 66 90 xchg %ax,%ax
30070: f3 0f 1e fa endbr64
30074: 68 04 00 00 00 push $0x4
30079: e9 a2 ff ff ff jmp 30020 <unlink@plt-0xe10>
3007e: 66 90 xchg %ax,%ax
30080: f3 0f 1e fa endbr64
30084: 68 05 00 00 00 push $0x5
30089: e9 92 ff ff ff jmp 30020 <unlink@plt-0xe10>
3008e: 66 90 xchg %ax,%ax
30090: f3 0f 1e fa endbr64
30094: 68 06 00 00 00 push $0x6
30099: e9 82 ff ff ff jmp 30020 <unlink@plt-0xe10>
3009e: 66 90 xchg %ax,%ax
```
The `endbr32` / `endbr64` instructions has been carefully designed, so they are `nop` instructions—meaning they can do nothing at all—on CPUs prior to their introductions. Having them doesn't have any effect on older CPUs but enhances security on supported hardware.
## RISC-V’s Latest Achievements: CFI Extension
The above mitigations against ROP fall into two categories:
* **Compiler Modifications**: Can generate more secure binary assembly code.
* **Additional CPU instructions**: Coming with Control Flow Integrity (CFI) checks to prevent exploitation
Back to the beginning of designing CKB-VM, we throughly studied ROP and recognized that a vulnerability in a CKB script could potentially open the door to ROP attacks. However, we eventually did not introduce any specific mitigation against ROP in CKB-VM. Our decision was to stay aligned with the RISC-V ecosystem, avoiding shipping any custom RISC-V spec with additional instructions that would require a patched compiler. Nor do we want to maintain our own compiler set, eliminating the potential that any RISC-V-compliant compiler shall be able to produce CKB script. As the result, we shipped the first version of CKB-VM without ROP mitigations, but that does not mean we’ve ignore this issue:
* We’ve [reached out](https://groups.google.com/a/groups.riscv.org/g/isa-dev/c/LyZzjJG7_18/m/pCSnKZPdBAAJ) to the RISC-V community for possible extension similar to Intel’s solution, and kept monitoring advancements in this field;
* We’ve been watching over progress and writing secure CKB scripts. Since ROP relies on existing vulnerabilities, secure CKB scripts can kept ROP purely theoretical.
We were thrilled when the **RISC-V CFI (Control-Flow Integrity) Extension** was officialy [ratified](https://github.com/riscv/riscv-cfi/releases/tag/v1.0) in July 2024. Designed by the brilliant minds from the RISC-V Foundation, this extension directly addresses ROP attacks with two key features:
* `Zicfilp` extension introduces **landing pad**: Resembles Intel’s `endbr32` / `endbr64` to ensure that the CPU can only jump to valid, permitted targets.
* `Zicfiss` extension introduces **shadow stack** with a series of instructions:. Offers a hardware solution similar to Retguard, where CPU ensures the control flow integrity or simply puts the call stack, preventing tampering throughout execution.
Together, these features offer the state-of-the-art mitigations against ROP. More importantly, RISC-V CFI is now an official extension, meaning all future RISC-V CPUs, compilers, and tools will support this extension. In fact, LLVM 19 has already [supported](https://releases.llvm.org/19.1.0/docs/ReleaseNotes.html#changes-to-the-risc-v-backend), and I believe other compilers and tools will follow soon.
Once fully adopted, CKB script developers can simply turn them on like a switch during code compilation. Without modifying the code, they can enjoy the security provided by RISC-V CFI extensions. Even if a vulnerability exists in a CKB script, these built-in enforcements can prevent it from being exploited.
## Final Words
Security is complex. While we strive for maximum security, certain design principles might get in the way from introducing specific mitigations. ROP is a prime example: while we did learn much about it early on, implementing the best mitigations needs proper timing. Now the time has come. We are happy to introduce RISC-V CFI in CKB’s next hardfork, bringing stronger security for everyone.
***
✍🏻 Written by Xuejie Xiao
His previous posts include:
* [A Journey Optimizing CKB Smart Contract: Porting Bitcoin as an Example](https://blog.cryptape.com/a-journey-optimizing-ckb-smart-contract)
* [Optimizing C++ Code for CKB-VM: Porting Bitcoin as an Example](https://blog.cryptape.com/optimizing-c-code-for-ckb-vm)
Find more in his personal website [Less is More](https://xuejie.space/).
-
![](/static/nostr-icon-purple-64x64.png)
@ 9967f375:04f9a5e1
2025-02-13 08:39:58
El día 13, primer viernes de Cuaresma asistió su Exc. y Real Audiencia en la Capilla Real del Palacio a la Misa, y Sermón, que predicó el Doctor Don Pedro Ramírez del Castillo, Canónigo Penitenciario de la Metropoltana.
#GacetadeMéxico #Febrero
-
![](/static/nostr-icon-purple-64x64.png)
@ bf47c19e:c3d2573b
2025-02-13 08:10:44
Originalni tekst na [dvadesetjedan.com](https://dvadesetjedan.com/blog/bitcoin-privatnost-najbolje-prakse).
###### Autor: [Gigi](https://dergigi.com/2021/03/14/bitcoin-privacy-best-practices/) / Prevod na srpski: [Plumsky](https://t.me/Plumski)
---
> Postoji sveto carstvo privatnosti za svakog čoveka gde on bira i pravi odluke – carstvo stvoreno na bazičnim pravima i slobode koje zakon, generalno, ne sme narušavati. Džefri Fišer, Arhiepiskop Canterberija (1959)
Pre ne toliko dugo, uobičajen režim interneta je bio neenkriptovan običan tekst (plain text). Svi su mogli špiunirati svakoga i mnogi nisu o tome ni razmišljali. Globalno obelodanjivanje nadzora 2013. je to promenilo i danas se koriste mnogo bezbedniji protokoli i end-to-end enkripcija postaje standard sve više. Iako bitcoin postaje tinejdžer, mi smo – metaforično govoreći – i dalje u dobu običnog teksta narandžastog novčića. Bitcoin je radikalno providljiv protokol sam po sebi, ali postoje značajni načini da korisnik zaštiti svoju privatnost. U ovom članku želimo da istaknemo neke od ovih strategija, prodiskutujemo najbolje prakse, i damo preporuke koje mogu primeniti i bitcoin novajlije i veterani.
#### Zašto je privatnost bitna
> Privatnost je potrebna da bi otvoreno društvo moglo da funkcioniše u digitalnoj eri. Privatnost nije isto što i tajanstvenost. Privatna stvar je nešto što neko ne želi da ceo svet zna, a tajna stvar je nešto što neko ne želi bilo ko da zna. Privatnost je moć da se čovek selektivno otkriva svom okruženju.
Ovim snažnim rečima Erik Hjus je započeo svoj tekst Sajferpankov Manifesto (Cypherpunk's Manifesto) 1993. Razlika između privatnosti i tajanstvenosti je suptilna ali jako važna. Odlučiti se za privatnost ne znači da neko ima tajne koje želi sakriti. Da ovo ilustrujemo shvatite samo da ono što obavljate u svom toaletu ili u spavaćoj sobi nije niti ilegalno niti tajna (u mnogim slučajevima), ali vi svejedno odlučujete da zatvorite vrata i navučete zavese.
Slično tome, koliko para imate i gde ih trošite nije naručito tajna stvar. Ipak, to bi trebalo biti privatan slučaj. Mnogi bi se složili da vaš šef ne treba da zna gde vi trošite vašu platu. Privatnosti je čak zaštićena od strane mnogobrojnih internacionalnih nadležnih organa. Iz Američke Deklaracije Prava i Dužnosti Čoveka (American Declaration of the Rights and Duties of Man) Ujedinjenim Nacijama, napisano je da je privatnost fundamentalno prava gradjana širom sveta.
> Niko ne sme biti podvrgnut smetnjama njegovoj privatnosti, porodici, rezidenciji ili komunikacijama, niti napadnuta njegova čast i reputacija. Svi imaju pravo da se štite zakonom protiv takvih smetnja ili napada. Artikal 12, Deklaracija Ljudskih Prava Ujedinjenih Nacija
#### Bitcoin i privatnost
Iako je bitcoin često opisivan kao anoniman način plaćanja medijima, on u stvari poseduje potpuno suprotne osobine. On je poluanoniman u najboljem slučaju i danas mnogima nije ni malo lako primeniti taktike da bi bili sigurni da njihov poluanonimni identitet na bitcoin mreži ne bude povezan sa legalnim identitetom u stvarnom svetu.
Bitcoin je otvoren sistem. On je javna baza podataka koju svako može da proučava i analizira. Znači, svaka transakcija koja je upisana u tu bazu kroz dokaz rada (proof-of-work) postojaće i biće otkrivena dokle god bitcoin postoji, što znači - zauvek. Ne primenjivati najbolje prakse privatnosti može imati štetne posledice u dalekoj budućnosti.
Privatnost, kao sigurnost, je proces koji je težak, ali nije nemoguć. Alatke nastavljaju da se razvijaju koje čuvaju privatnost kad se koristi bitcoin and srećom mnoge od tih alatki su sve lakše za korišćenje. Nažalost ne postoji panacea u ovom pristupu. Mora se biti svesan svih kompromisa i usavršavati te prakse dok se one menjaju.
#### Najbolje prakse privatnosti
Kao i sve u bitcoinu, kontrola privatnosti je postepena, korak po korak, procedura. Naučiti i primeniti ove najbolje prakse zahteva strpljivost i odgovornost, tako da ne budite obeshrabreni ako vam se čini da je to sve previše. Svaki korak, koliko god bio mali, je korak u dobrom pravcu.
Koje korake preduzeti da bi uvećali svoju privatnost:
* Budite u vlasništvu sami svojih novčića
* Nikad ne ponavljajte korišćenje istih adresa
* Minimizirajte korišćenje servisa koji zahtevaju identitet (Know your customer - KYC)
* Minimizirajte sve izloženosti trećim licima
* Upravljajte svojim nodom
* Koristite Lightning mrežu za male transakcije
* Nemojte koristiti javne blok pretraživače za svoje transakcije
* Koristite metodu CoinJoin često i rano pri nabavljanju svojih novčića
**Budite u vlasništvu sami svojih novčića**: Ako ključevi nisu tvoji, onda nije ni bitcoin. Ako neko drugo drži vaš bitcoin za vas, oni znaju sve što se može znati: količinu, istoriju transakcija pa i sve buduće transakcije, itd. Preuzimanje vlasništva bitcoina u svoje ruke je prvi i najvažniji korak.
**Nikad ne kroistite istu adresu dvaput**: Ponavljanje adresa poništava privatnost pošiljalca i primaoca bitcoina. Ovo se treba izbegavati pod svaku cenu.
**Minimizirajte korišćenje servisa koji zahtevaju identitet (KYC)**: Vezivati svoj legalni identitet za svoje bitcoin adrese je zlo koje se zahteva od strane mnogih državnih nadležnosti. Dok je efektivnost ovih zakona i regulacija disputabilno, posledice njihovog primenjivanja su uglavnom štetne po korisnicima. Ovo je očigledno pošto je česta pojava da se te informacije često izlivaju iz slabo obezbeđenih digitalnih servera. Ako izaberete da koristite KYC servise da bi nabavljali bitcoin, proučite i razumite odnos između vas i tog biznisa. Vi ste poverljivi tom biznisu za sve vaše lične podatke, pa i buduće obezbeđenje tih podataka. Ako i dalje zarađujete kroz fiat novčani sistem, mi preporučujemo da koristite samo bitcoin ekskluzivne servise koji vam dozvoljavaju da autamatski kupujete bitcoin s vremena na vreme. Ako zelite da potpuno da izbegnete KYC, pregledajte https://bitcoinqna.github.io/noKYConly/.
**Minimizirajte sve izloženosti trećim licima**: Poverljivost trećim licima je bezbednosna rupa (https://nakamotoinstitute.org/trusted-third-parties/). Ako možete biti poverljivi samo sebi, onda bi to tako trebalo da bude.
**Upravljajte svojim nodom**: Ako nod nije tvoj, onda nisu ni pravila. Upravljanje svojim nodom je suštinska potreba da bi se bitcoin koristio na privatan način. Svaka interakcija sa bitcoin mrežom je posrednjena nodom. Ako vi taj nod ne upravljate, čiji god nod koristite može da vidi sve što vi radite. Ova upustva (https://bitcoiner.guide/node/) su jako korisna da bi započeli proces korišćenja svog noda.
**Koristite Lightning mrežu za male transakcije**: Pošto Lightning protokol ne koristi glavnu bitcoin mrežu za trasakcije onda je i samim tim povećana privatnost korišćenja bez dodatnog truda. Iako je i dalje rano, oni apsolutno bezobzirni periodi Lightning mreže su verovatno daleko iza nas. Korišćenje Lightning-a za transakcije malih i srednjih veličina će vam pomoći da uvećate privatnost a da smanjite naplate svojih pojedinačnih bitcoin transakcija.
**Nemojte koristiti javne blok pretraživače za svoje transakcije**: Proveravanje adresa na javnim blok pretraživačima povezuje te adrese sa vašim IP podacima, koji se onda mogu koristiti da se otkrije vaš identitet. Softveri kao Umbrel i myNode vam omogućavaju da lako koristite sami svoj blok pretraživač. Ako morate koristiti javne pretraživače, uradite to uz VPN ili Tor.
**Koristite CoinJoin često i rano pri nabavljanju svojih novčića**: Pošto je bitcoin večan, primenjivanje saradničkih CoinJoin praksa će vam obezbediti privatnost u budućnosti. Dok su CoinJoin transakcije svakovrsne, softveri koji su laki za korišćenje već sad postoje koji mogu automatizovati ovu vrstu transakcija. Samourai Whirlpool (https://samouraiwallet.com/whirlpool) je odličan izbor za Android korisnike. Joinmarket (https://github.com/joinmarket-webui/jam) se može koristiti na vašem nodu. A servisi postoje koji pri snabdevanju vašeg bitcoina istog trenutka obave CoinJoin tranzakciju automatski.
#### Zaključak
Svi bi trebalo da se potrude da koriste bitcoin na što privatniji način. Privatnost nije isto što i tajanstvenost. Privatnost je ljudsko pravo i mi svi trebamo da branimo i primenljujemo to pravo. Teško je izbrisati postojeće informacije sa interneta; a izbrisati ih sa bitcoin baze podataka je nemoguće. Iako su daleko od savršenih, alatke postoje danas koje vam omogućavaju da najbolje prakse privatnosti i vi sami primenite. Mi smo vam naglasili neke od njih i - kroz poboljšanje u bitcoin protokolu kroz Taproot i Schnorr - one će postajati sve usavršenije.
Bitcoin postupci se ne mogu lako opisati korišćenjem tradicionalnim konceptima. Pitanja kao što su "Ko je vlasnik ovog novca?" ili "Odakle taj novac potiče?" postaju sve teža da se odgovore a u nekim okolnostima postaju potpuno beznačajna.
Satoši je dizajnirao bitcoin misleći na privatnost. Na nivou protokola svaka bitcoin transakcija je proces "topljenja" koji za sobom samo ostavlja heuristične mrvice hleba. Protokolu nije bitno odakle se pojavio bilo koji bitcoin ili satoši. Niti je njega briga ko je legalan identitet vlasnika. Protokolu je samo važno da li su digitalni potpisi validni. Dokle god je govor slobodan, potpisivanje poruka - privatno ili ne - ne sme biti kriminalan postupak.
Dodatni Resursi
[This Month in Bitcoin Privacy](https://enegnei.github.io/This-Month-In-Bitcoin-Privacy/) | Janine
[Hodl Privacy FAQ](https://6102bitcoin.com/faq-hodl-privacy/) | 6102
[Digital Privacy](https://6102bitcoin.com/blog/digital-privacy/) | 6102
[UseWhirlpool.com](http://usewhirlpool.com/) | Bitcoin Q+A
[Bitcoin Privacy Guide](https://bitcoiner.guide/privacy/) | Bitcoin Q+A
Ovaj članak napisan je u saradnji sa Matt Odellom, nezavisnim bitcoin istraživačem. Nađite njegove preporuke za privatnost na [werunbtc.com](https://werunbtc.com/)
[Originalni tekst](https://dergigi.com/2021/03/14/bitcoin-privacy-best-practices/)
-
![](/static/nostr-icon-purple-64x64.png)
@ 04ed2b8f:75be6756
2025-02-13 08:02:39
Freedom. It’s the word on everyone’s lips, the dream of every soul. We long for it, we chase it, we believe that if we can break free from this chain or that constraint, we will finally be free. **But true freedom is not about external circumstances—it’s about control.**
The truth is, **the most powerful chains are the ones we place on ourselves**. The world can throw its challenges at you, life can dish out its unfair blows, but **if you cannot control yourself, your thoughts, your emotions, your reactions, then you are no different than a prisoner.**
There is no freedom in chaos. There is no freedom in losing control. **Freedom is mastery—mastery of the self.**
## **Freedom Begins Within**
You can have all the money in the world, live in the most luxurious place, and have every material possession your heart desires, but **if you cannot control your impulses, your habits, your desires—none of that will matter.** You are still a slave to your cravings. You are still a puppet to your own emotions, and that is **no real freedom.**
What does freedom look like?
- **It’s the power to act with purpose, not to react out of emotion.**
- **It’s the strength to stay disciplined when every part of you wants to quit.**
- **It’s the courage to say ‘no’ to distractions, to temptation, to things that steer you off course.**
- **It’s the clarity to make choices that serve your growth, not your immediate desires.**
True freedom is the ability to say, “I am in control of myself. I do not let my circumstances control me, nor my emotions rule me. I dictate my actions, my thoughts, my destiny.”
## **Self-Control: The Ultimate Weapon**
The power to control yourself is your greatest weapon. Without it, **you are at the mercy of every challenge, every temptation, and every fleeting emotion**. You may feel like you are “free,” but without self-discipline, you are just a puppet swaying in the wind, vulnerable to every whim that blows your way.
- **The impulse to procrastinate? You overcome it.**
- **The desire to give up? You push through it.**
- **The craving for comfort? You choose growth.**
In the face of any storm, a man with self-control remains grounded, focused, and clear. He doesn’t react in anger or fear—he acts with purpose, with precision, and with vision.
A man who cannot control himself is a man who is owned by his emotions, his desires, his distractions. But the man who conquers his mind, his body, his impulses—he is the one who **owns his life.**
## **The Price of Freedom**
It’s not easy to control yourself. It requires constant effort, relentless discipline, and the courage to face yourself head-on. It means saying ‘no’ to what feels good now, to invest in what will make you stronger later. It means constantly improving, constantly fighting the urge to quit, to give in, to indulge in comfort.
But the price of freedom is worth it. **For when you have control over yourself, no one can take your power.** You become the master of your fate. **You become unshakable.**
## **Freedom Through Discipline**
So, ask yourself: **Are you truly free, or are you simply a slave to your impulses?**
- **Do you control your actions, or do your actions control you?**
- **Are you the master of your emotions, or are they the masters of you?**
Freedom isn’t just about having no chains; it’s about not letting anything control you—least of all yourself. **And when you control yourself, there’s nothing you can’t accomplish.**
A man who cannot control himself is never truly free. But a man who conquers his mind, his habits, his emotions—he is unstoppable.
**Now go and choose to control yourself, and unlock the freedom that’s waiting for you. Or remain a prisoner to your impulses, forever shackled by the chains of your own making. The choice is yours.**
-
![](/static/nostr-icon-purple-64x64.png)
@ bf47c19e:c3d2573b
2025-02-13 07:56:50
Originalni tekst na [dvadesetjedan.com](https://dvadesetjedan.com/blog/niko-ne-moze-zabraniti-bitcoin)
###### Autor: [Parker Lewis](https://x.com/parkeralewis) / Prevod na srpski: [Plumsky](https://t.me/Plumski)
---
Ideja da država može nekako zabraniti bitcoin je jedna od poslednjih faza tuge, tačno pred prihvatanje realnosti. Posledica ove rečenice je priznanje da bitcoin “funkcioniše”. U stvari, ona predstavlja činjenicu da bitcoin funkcioniše toliko dobro da on preti postojećim državnim monopolima nad novcem i da će zbog toga države da ga unište kroz regulativne prepreke da bi eliminisale tu pretnju. Gledajte na tvrdnju da će države zabraniti bitcoin kao kondicionalnu logiku. Da li bitcoin funkcioniše kao novac? Ako je odgovor „ne“, onda države nemaju šta da zabrane. Ako je odgovor „da“, onda će države da probaju da ga zabrane. Znači, glavna poenta ovog razmišljanja je pretpostavka da bitcoin funkcioiniše kao novac. Onda je sledeće logično pitanje da li intervencija od strane države može uspešno da uništi upravo taj funkcionalan bitcoin.
![](https://dvadesetjedan.com/images/content/blog/niko-ne-moze-zabraniti-btc/da-li-drzava-moze-zabraniti-bitcoin.png)
Za početak, svako ko pokušava da razume kako, zašto, ili da li bitcoin funkcioniše mora da proceni ta pitanja potpuno nezavisno od prouzrekovanja državne regulacije ili intervencije. Iako je nesumnjivo da bitcoin mora da postoji uzgred državnih regulativa, zamislite na momenat da države ne postoje. Sam od sebe, da li bi bitcoin funkcionisao kao novac, kad bi se prepustio slobodnom tržištu? Ovo pitanje se širi u dodatna pitanja i ubrzo se pretvara u bunar bez dna. Šta je novac? Šta su svojstva koja čine jednu vrstu novca bolje od druge? Da li bitcoin poseduje ta svojstva? Da li je bitcoin bolja verzija novca po takvim osobinama? Ako je finalni zaključak da bitcoin ne funkcioniše kao novac, implikacije državne intervencije su nebitne. Ali, ako je bitcoin funkcionalan kao novac, ta pitanja onda postaju bitna u ovoj debati, i svako ko o tome razmišlja bi morao imati taj početnički kontekst da bi mogao proceniti da li je uopšte moguće zabraniti. Po svom dizajnu, bitcoin postoji van države. Ali bitcoin nije samo van kontrole države, on u stvari funkcioniše bez bilo kakve saradnje centralizovanih identiteta. On je globalan i decentralizovan. Svako može pristupiti bitcoinu bez potrebe saglasnosti bilo koga i što se više širi sve je teže cenzurisati celokupnu mrežu. Arhitektura bitcoina je namerno izmišljena da bude otporna na bilo koje pokušaje države da ga zabrane. Ovo ne znači da države širom sveta neće pokušavati da ga regulišu, oporezuju ili čak da potpuno zabrane njegovo korišćenje. Naravno da će biti puno bitki i otpora protiv usvajanja bitcoina među građanima. Federal Reserve i Američki Treasury (i njihovi globalni suparnici) se neće ležeći predati dok bitcoin sve više i više ugrožava njihove monopole prihvatljivog novca. Doduše, pre nego što se odbaci ideja da države mogu potpuno zabraniti bitcoin, mora se prvo razumeti posledice tog stava i njegovog glasnika.
#### Progresija poricanja i stepeni tuge
Pripovesti skeptičara se neprestano menjaju kroz vreme. Prvi stepen tuge: bitcoin nikad ne može funkcionisati-njegova vrednost je osnovana ni na čemu. On je moderna verzija tulip manije. Sa svakim ciklusom uzbuđenja, vrednost bitcoina skače i onda vrlo brzo se vraća na dole. Često nazvano kao kraj njegove vrednosti, bitcoin svaki put odbija da umre i njegova vrednost pronađe nivo koji je uvek viši od prethodnih ciklusa globalne usvajanja. Tulip pripovetka postaje stara i dosadna i skeptičari pređu na više nijansirane teme, i time menjaju bazu debate. Drugi stepen tuge predstoji: bitcoin je manjkav kao novac. On je previše volatilan da bi bio valuta, ili je suviše spor da bi se koristio kao sistem plaćanja, ili se ne može proširiti dovoljno da zadovolji sve promete plaćanja na svetu, ili troši isuviše struje. Taj niz kritike ide sve dalje i dalje. Ovaj drugi stepen je progresija poricanja i dosta je udaljen od ideje da je bitcoin ništa više od bukvalno bezvrednog ničega.
Uprkos tim pretpostavnim manjcima, vrednost bitcoin mreže nastavje da raste vremenom. Svaki put, ona ne umire, nasuprot, ona postaje sve veća i jača. Dok se skeptičari bave ukazivanjem na manjke, bitcoin ne prestaje. Rast u vrednosti je prouzrokovan jednostavnom dinamikom tržišta: postoji više kupca nego prodavca. To je sve i to je razlog rasta u adopciji. Sve više i više ljudi shvata zašto postoji fundamentalna potražnja za bitcoinom i zašto/kako on funkcioniše. To je razlog njegovog dugotrajnog rasta. Dokle god ga sve više ljudi koristi za čuvanje vrednosti, neće pasti cena snabdevanja. Zauvek će postojati samo 21 milion bitcoina. Nebitno je koliko ljudi zahtevaju bitcoin, njegova cela količina je uvek ista i neelastična. Dok skeptičari nastavljaju sa svojom starom pričom, mase ljudi nastavljaju da eliminišu zabludu i zahtevaju bitcoin zbog njegovih prednosti u smislu novčanih svojstva. Između ostalog, ne postoji grupa ljudi koja je više upoznata sa svim argumentima protiv bitcoina od samih bitcoinera.
![](https://dvadesetjedan.com/images/content/blog/niko-ne-moze-zabraniti-btc/FUD-kockica.png)
Očajanje počinje da se stvara i onda se debata još jedanput pomera. Sada nije više činjenica je vrednost bitcoina osnovana ni na čemu niti da ima manjke kao valuta; sada se debata centrira na regulaciji državnih autoriteta. U ovom zadnjem stepenu tuge, bitcoin se predstavlja kao u stvari isuviše uspešnom alatkom i zbog toga države ne smeju dozvoliti da on postoji. Zaista? Znači da je genijalnost čoveka ponovo ostvarila funkcionalan novac u tehnološko superiornoj formi, čije su posledice zaista neshvatljive, i da će države upravo taj izum nekako zabraniti. Primetite da tom izjavom skeptičari praktično priznaju svoj poraz. Ovo su poslednji pokušaji u seriji promašenih argumenata. Skeptičari u isto vreme prihvataju da postoji fundamentalna potražnja za bitcoinom a onda se premeštaju na neosnovan stav da ga države mogu zabraniti.
Ajde da se poigramo i tim pitanjem. Kada bih zapravo razvijene države nastupile na scenu i pokušale da zabrane bitcoin? Trenutno, Federal Reserve i Treasury ne smatraju bitcoin kao ozbiljnu pretnju superiornosti dolara. Po njihovom celokupnom mišljenju, bitcoin je slatka mala igračka i ne može da funkcioniše kao novac. Sadašnja kompletna kupovna moć bitcoina je manja od $200 milijardi. Sa druge strane, zlato ima celokupnu vrednost od $8 triliona (40X veću od bitcoina) i količina odštampanog novca (M2) je otprilike 15 triliona (75X veličine bitcoinove vrednosti). Kada će Federal Reserve i Treasury da počne da smatra bitcoin kao ozbiljnu pretnju? Kad bitcoin poraste na $1, $2 ili $3 triliona? Možete i sami da izaberete nivo, ali implikacija je da će bitcoin biti mnogo vredniji, i posedovaće ga sve više ljudi širom sveta, pre nego što će ga državne vlasti shvatiti kao obiljnog protivnika.
Predsednik Tramp & Treasury Sekretar Mnučin o Bitcoinu (2019):
> „Ja neću pričati o bitcoinu za 10 godina, u to možete biti sigurni {…} Ja bi se kladio da čak za 5 ili 6 godina neću više pričati o bitcoinu kao sekretar Trusury-a. Imaću preča posla {…} Mogu vam obećati da ja lično neću biti pun bitcoina.“ – Sekretar Treasury-a Stiv Mnučin
> „Ja nisam ljubitelj bitcoina {…}, koji nije novac i čija vrednost je jako volatilna i osnovana na praznom vazduhu.“ – Predsednik Donald J. Tramp
Znači, logika skeptika ide ovako: bitcoin ne funkcioniše, ali ako funkcioniše, onda će ga država zabraniti. Ali, države slobodnog sveta neće pokušati da ga zabrane dokle god se on ne pokaže kao ozbiljna pretnja. U tom trenutku, bitcoin će biti vredniji i sigurno teži da se zabrani, pošto će ga više ljudi posedovati na mnogo širem geografskom prostoru. Ignorišite fundamentalne činjenice i asimetriju koja je urođena u globalnom dešavanju monetizacije zato što u slučaju da ste u pravu, države će taj proces zabraniti. Na kojoj strani tog argumenta bi radije stajao racionalan ekonomski učesnik? Posedovanje finansijske imovine kojoj vrednost toliko raste da preti globalnoj rezervnoj valuti, ili nasuprot – nemati tu imovinu? Sa pretpostavkom da individualci razumeju zašto je mogućnost (a sve više i verovatnoća) ove realnosti, koji stav je logičniji u ovom scenariju? Asimetrija dve strane ovog argumenta sama od sebe zahteva da je prvi stav onaj istinit i da fundamentalno razumevanje potražnje bitcoina samo još više ojačava to mišljenje.
#### Niko ne moze zabraniti bitcoin
Razmislite šta bitcoin u stvari predstavlja pa onda šta bi predstavljala njegova zabrana. Bitcoin je konverzija subjektivne vrednosti, stvorena i razmenjena u realnošću, u digitalne potpise. Jednostavno rečeno, to je konverzija ljudskog vremena u novac. Kad neko zahteva bitcoin, oni u isto vreme ne zahtevaju neki drugi posed, nek to bio dolar, kuća, auto ili hrana itd. Bitcoin predstavlja novčanu štednju koja sa sobom žrtvuje druge imovine i servise. Zabrana bitcoina bi bio napad na najosnovnije ljudske slobode koje je on upravo stvoren da brani. Zamislite reakciju svih onih koji su prihvatili bitcoin: „Bilo je zabavno, alatka za koju su svi eksperti tvrdili da neće nikad funkcionisati, sada toliko dobro radi i sad ti isti eksperti i autoriteti kažu da mi to nemožemo koristiti. Svi idite kući, predstava je gotova.“verovanje da će svi ljudi koji su učestvovali u bitcoin usvajanju, suverenitetu koji nudi i finansiskoj slobodi, odjednom samo da se predaju osnovnom rušenju njihovih prava je potpuno iracionalna pozicija.
> Novac je jedan od najbitnijih instrumenata za slobodu koji je ikad izmišljen. Novac je to što u postojećem društvu ostvaruje mogućnosti siromašnom čoveku – čiji je domet veći nego onaj koji je bio dostižan bogatim ljudima pre ne toliko puno generacija.“ – F. A. Hajek
Države nisu uspele da zabrane konzumiranje alkohola, droga, kupovinu vatrenog oružja, pa ni posedovanje zlata. Država može samo pomalo da uspori pristup ili da deklariše posedovanje ilegalnim, ali ne može da uništi nešto što veliki broj raznovrsnih ljudi smatra vrednim. Kada je SAD zabranila privatno posedovanje zlata 1933., zlato nije palo u vrednosti ili nestalo sa finansijskog tržišta. Ono je u stvari poraslo u vrednosti u poređenju sa dolarom, i samo trideset godina kasnije, zabrana je bila ukinuta. Ne samo da bitcoin nudi veću vrednosno obećanje od bilo kog drugog dobra koje su države pokušale da zabrane (uključujući i zlato); nego po svojim osobinama, njega je mnogo teže zabraniti. Bitcoin je globalan i decentralizovan. On ne poštuje granice i osiguran je mnoštvom nodova i kriptografskim potpisima. Sam postupak zabrane bi zahtevao da se u isto vreme zaustavi „open source“ softver koji emituje i izvršava slanje i potvrđivanje digitalno enkriptovanih ključeva i potpisa. Ta zabrana bi morala biti koordinisana između velikog broja zemalja, sa tim da je nemoguće znati gde se ti nodovi i softver nalazi ili da se zaustavi instaliranje novih nodova u drugim pravnim nadležnostima. Da ne pominjemo i ustavske pitanja, bilo bi tehnički neizvodljivo da se takva zabrana primeni na bilo kakav značajan način.
![](https://dvadesetjedan.com/images/content/blog/niko-ne-moze-zabraniti-btc/mapa-bitcoin-nodova.png)
Čak kada bih sve zemlje iz G-20 grupe koordinisale takvu zabranu u isto vreme, to ne bi uništilo bitcoin. U stvari, to bi bilo samoubistvo za fiat novčani sistem. To bi još više prikazalo masama da je bitcoin u stvari novac koji treba shvatiti ozbiljno, i to bi samo od sebe započelo globalnu igru vatanje mačke za rep. Bitcoin nema centralnu tačku za napad; bitcoin rudari, nodovi i digitalni potpisi su rasejani po celom svetu. Svaki aspekt bitcoina je decentralizovan, zato su glavni stubovi njegove arhitekture da učesnici uvek treba kontrolisati svoje potpise i upravljati svojim nodom. Što više digitalnih potpisa i nodova koji postoje, to je više bitcoin decentralizovan, i to je više odbranjiva njegova mreža od strane neprijatelja. Što je više zemalja gde rudari izvršavaju svoj posao, to je manji rizik da jedan nadležni identitet može uticati na njegov bezbednosni sistem. Koordinisan internacionalni napad na bitcoin bi samo koristio da bitcoin još više ojača svoj imuni sistem. Na kraju krajeva, to bi ubrzalo seobu iz tradicionalnog finansijskog sistema (i njegovih valuta) a i inovaciju koja postoji u bitcoin ekosistemu. Sa svakom bivšom pretnjom, bitcoin je maštovito pronalazio način da ih neutrališe pa i koordinisan napad od strane država ne bi bio ništa drugačiji.
![](https://dvadesetjedan.com/images/content/blog/niko-ne-moze-zabraniti-btc/centralizovan-decentralizovan-monetarni-sistem.png)
Inovacija u ovoj oblasti koja se odlikuje svojom „permissionless“ (bez dozvole centralnih identiteta) osobinom, omogućava odbranu od svakojakih napada. Sve varijante napada koje su bile predvidjene je upravo to što zahteva konstantnu inovaciju bitcoina. To je ona Adam Smitova nevidljiva ruka, ali dopingovana. Pojedinačni učesnici mogu da veruju da su motivisani nekim većim uzrokom, ali u stvari, korisnost kaja je ugrađena u bitcoin stvara kod učesnika dovoljno snažan podsticaj da omogući svoje preživljavanje. Sopstveni interes milione, ako ne milijarde, nekoordinisanih ljudi koji se jedino slažu u svojom međusobnom potrebom za funkcionalnim novcem podstiče inovacije u bitcoinu. Danas, možda to izgleda kao neka kul nova tehnologija ili neki dobar investment u finansijskom portfoliju, ali čak i ako to mnogi ne razumeju, bitcoin je apsolutna nužnost u svetu. To je tako zato što je novac nužnost a historijski priznate valute se fundamentalno raspadaju. Pre dva meseca, tržište američkih državnih obveznica je doživeo kolaps na šta je Federal Reserve reagovao time što je povećao celokupnu količinu dolara u postojanju za $250 milijardi, a još više u bliskoj budućnosti. Tačno ovo je razlog zašto je bitcoin nužnost a ne samo luksuzni dodatak. Kada inovacija omogućava bazično funkcionisanje ekonomije ne postoji ni jedna država na svetu koja može da zaustavi njenu adopciju i rast. Novac je nužnost a bitcoin znatno poboljšava sistem novca koji je ikada postojao pre njega.
Sa više praktične strane, pokušaj zabranjivanja bitcoina ili njegove velike regulacije od nadležnosti bi direktno bilo u korist susedne nadležnih organa. Podsticaj da se odustane od koordinisanog napada na bitcoin bi bio isuviše veliki da bi takvi dogovori bili uspešni. Kada bi SAD deklarisovale posed bitcoina ilegalnim sutra, da li bi to zaustavilo njegov rast, razvoj i adopciji i da li bi to smanjilo vrednost celokupne mreže? Verovatno. Da li bi to uništilo bitcoin? Ne bi. Bitcoin predstavlja najpokretljivije kapitalno sredstvo na svetu. Zemlje i nadležne strukture koje kreiraju regulativnu strukturu koja najmanje ustručava korišćenje bitcoina će biti dobitnici velike količine uliva kapitala u svoje države.
#### Zabrana Bitcoinove Zatvoreničke Dileme
![](https://dvadesetjedan.com/images/content/blog/niko-ne-moze-zabraniti-btc/drzava.png)
U praksi, zatvorenička dilema nije igra jedan na jedan. Ona je multidimenzijska i uključuje mnoštvo nadležnosti, čiji se interesi nadmeću međusobno, i to uskraćuje mogućnosti bilo kakve mogućnosti zabrane. Ljudski kapital, fizički kapital i novčani kapital će sav ići u pravcu država i nadležnosti koje najmanje ustručuju bitcoin. To se možda neće desiti sve odjednom, ali pokušaji zabrane su isto za badava koliko bi bilo odseći sebi nos u inat svom licu. To ne znači da države to neće pokušati. India je već probala da zabrani bitcoin. Kina je uvela puno restrikcija. Drugi će da prate njihove tragove. Ali svaki put kada država preduzme takve korake, to ima nepredvidljive efekte povećanja bitcoin adopcije. Pokušaji zabranjivanja bitcoina su jako efektivne marketing kampanje. Bitcoin postoji kao sistem nevezan za jednu suverenu državu i kao novac je otporan na cenzuru. On je dizajniran da postoji van državne kontrole. Pokušaji da se taj koncept zabrani samo još više daje njemu razlog i logiku za postojanje.
#### Jedini Pobednički Potez je da se Uključiš u Igru
Zabrana bitcoina je trošenje vremena. Neki će to pokušati; ali svi će biti neuspešni. Sami ti pokušaji će još više ubrzati njegovu adopciju i širenje. Biće to vetar od 100 km/h koji raspaljuje vatru. To će ojačati bitcoin sve više i doprineće njegovoj pouzdanosti. U svakom slučaju, verovanje da će države zabraniti bitcoin u momentu kada on postane dovoljno velika pretnja rezervnim valutam sveta, je iracionalan razlog da se on no poseduje kao instrument štednje novca. To ne samo da podrazumeva da je bitcoin novac, ali u isto vreme i ignoriše glavne razloge zašto je to tako: on je decentralizovan i otporan na cenzure. Zamislite da razumete jednu od nojvećih tajni današnjice i da u isto vreme tu tajnu asimetrije koju bitcoin nudi ne primenjujete u svoju korist zbog straha od države. Pre će biti, neko ko razume zašto bitcoin funkcioniše i da ga država ne može zaustaviti, ili nepuno znanje postoji u razumevanju kako bitcoin uopšte funckioniše. Počnite sa razmatranjem fundamentalnih pitanja, a onda primenite to kao temelj da bi procenili bilo koji potencijalan rizik od strane budućih regulacija ili restrikcija državnih organa. I nikad nemojte da zaboravite na vrednost asimetrije između dve strane ovde prezentiranih argumenata. Jedini pobednički potez je da se uključite u igru.
Stavovi ovde prezentirani su samo moji i ne predstavljaju Unchained Capital ili moje kolege. Zahvaljujem se Fil Gajgeru za razmatranje teksta i primedbe.
[Originalni tekst](https://unchained.com/blog/bitcoin-cannot-be-banned/)
-
![](/static/nostr-icon-purple-64x64.png)
@ da0b9bc3:4e30a4a9
2025-02-13 06:36:12
Hello Stackers!
Welcome on into the ~Music Corner of the Saloon!
A place where we Talk Music. Share Tracks. Zap Sats.
So stay a while and listen.
🚨Don't forget to check out the pinned items in the territory homepage! You can always find the latest weeklies there!🚨
🚨Subscribe to the territory to ensure you never miss a post! 🚨
originally posted at https://stacker.news/items/884478
-
![](/static/nostr-icon-purple-64x64.png)
@ e3ba5e1a:5e433365
2025-02-13 06:16:49
My favorite line in any Marvel movie ever is in “Captain America.” After Captain America launches seemingly a hopeless assault on Red Skull’s base and is captured, we get [this line](https://www.youtube.com/shorts/kqsomjpz7ok):
“Arrogance may not be a uniquely American trait, but I must say, you do it better than anyone.”
Yesterday, I came across a comment on the song [Devil Went Down to Georgia](https://youtu.be/ut8UqFlWdDc) that had a very similar feel to it:
![Devil Went Down to Georgia and lost](https://image.nostr.build/29cda44533e151a02dd1ea28635c27b6a7b132a3a403bc374234ff885aefd835.jpg)
America has seemingly always been arrogant, in a uniquely American way. Manifest Destiny, for instance. The rest of the world is aware of this arrogance, and mocks Americans for it. A central point in modern US politics is the deriding of racist, nationalist, supremacist Americans.
That’s not what I see. I see American Arrogance as not only a beautiful statement about what it means to be American. I see it as an ode to the greatness of humanity in its purest form.
For most countries, saying “our nation is the greatest” *is*, in fact, twinged with some level of racism. I still don’t have a problem with it. Every group of people *should* be allowed to feel pride in their accomplishments. The destruction of the human spirit since the end of World War 2, where greatness has become a sin and weakness a virtue, has crushed the ability of people worldwide to strive for excellence.
But I digress. The fears of racism and nationalism at least have a grain of truth when applied to other nations on the planet. But not to America.
That’s because the definition of America, and the prototype of an American, has nothing to do with race. The definition of Americanism is *freedom*. The founding of America is based purely on liberty. On the God-given rights of every person to live life the way they see fit.
American Arrogance is not a statement of racial superiority. It’s barely a statement of national superiority (though it absolutely is). To me, when an American comments on the greatness of America, it’s a statement about freedom. Freedom will always unlock the greatness inherent in any group of people. Americans are *definitionally* better than everyone else, because Americans are freer than everyone else. (Or, at least, that’s how it should be.)
In *Devil Went Down to Georgia*, Johnny is approached by the devil himself. He is challenged to a ridiculously lopsided bet: a golden fiddle versus his immortal soul. He acknowledges the sin in accepting such a proposal. And yet he says, “God, I know you told me not to do this. But I can’t stand the affront to my honor. I am the greatest. The devil has nothing on me. So God, I’m gonna sin, but I’m also gonna win.”
*Libertas magnitudo est*
-
![](/static/nostr-icon-purple-64x64.png)
@ d360efec:14907b5f
2025-02-13 05:54:17
![image](https://yakihonne.s3.ap-east-1.amazonaws.com/d360efec41c120fe993b3d984863fd05ff41314fe6783191019cf7eb14907b5f/files/1739425985203-YAKIHONNES3.png)
**ภาพรวม LUNCUSDT (OKX):**
LUNCUSDT กำลังอยู่ในช่วงที่ *มีความผันผวนสูงและมีความไม่แน่นอนมาก* แม้ว่าในอดีต (TF Day) จะเคยมีสัญญาณของการพยายามกลับตัวเป็นขาขึ้น (Breakout EMA 50 และเกิด Golden Cross) แต่ปัจจุบันแรงซื้อเหล่านั้นเริ่มอ่อนแรงลง และมีแรงขายเข้ามาในตลาดมากขึ้น ทำให้เกิดความขัดแย้งระหว่าง Timeframes ต่างๆ
![image](https://yakihonne.s3.ap-east-1.amazonaws.com/d360efec41c120fe993b3d984863fd05ff41314fe6783191019cf7eb14907b5f/files/1739426004363-YAKIHONNES3.png)
**สถานะปัจจุบัน:**
* **แนวโน้ม:**
* **TF Day:** เริ่มไม่แน่นอน (จากเดิมที่เป็น Early Uptrend) - แม้ว่าราคาจะยังอยู่เหนือ EMA 50/200 แต่ Money Flow เริ่มแสดงสัญญาณเตือน
* **TF4H:** เริ่มไม่แน่นอน (พักตัว, ทดสอบแนวรับ EMA 50) - Money Flow บ่งบอกถึงแรงขายที่เข้ามา
* **TF15:** ผันผวนสูง, ไม่มีทิศทางชัดเจน (Sideways) - Money Flow แสดงถึงแรงขาย แต่ก็มีแรงซื้อกลับเข้ามาบ้าง
* **Money Flow (LuxAlgo):**
* **TF Day:** แรงซื้อเริ่มอ่อนแรงลงอย่างมีนัยสำคัญ, มีแรงขายเข้ามา
* **TF4H:** แรงขายมีมากกว่าแรงซื้อ
* **TF15:** แรงขายและแรงซื้อผสมกัน, โดยรวมแรงขายยังมากกว่า
* **EMA:**
* **TF Day:** EMA 50/200 เป็นแนวรับ/แนวต้าน
* **TF4H:** EMA 50 กำลังถูกทดสอบ, EMA 200 เป็นแนวต้าน
* **TF15:** EMA 50/200 เป็นแนวต้าน
**โครงสร้างราคา (SMC):**
| Timeframe | Break of Structure (BOS) | Change of Character (CHoCH) | Higher High (HH) & Higher Low (HL) | Equal Highs (EQH) / Equal Lows (EQL) |
| :-------- | :----------------------- | :--------------------------- | :----------------------------------- | :------------------------------------- |
| Day | ด้านบนและล่าง | ด้านบน | เริ่มก่อตัว (แต่ไม่แข็งแกร่ง) | - |
| 4H | ด้านบน | ด้านบน | เริ่มก่อตัว (แต่ไม่ชัดเจน) | มี EQH หลายจุด |
| 15m | ด้านบนและล่าง | มีทั้งบนและล่าง | Lower Highs (LH) & Lower Lows (LL) | มี EQH และ EQL หลายจุด |
**แนวรับ-แนวต้านสำคัญ:**
| Timeframe | แนวรับ | แนวต้าน |
| :-------- | :----------------------------------------------------------- | :--------------------------------------------------------------------- |
| Day | EMA 50 (≈0.00010000), EMA 200 (≈0.00008000), 0.00006000-0.00007000 | 0.00017953 (High ล่าสุด), 0.00014000 (Volume Profile) |
| 4H | EMA 50 (≈0.00007000), 0.00006000-0.00007000 | EMA 200 (≈0.00008000), 0.00008132, บริเวณ 0.00010000-0.00012000 (EQH) |
| 15m | บริเวณ Low ล่าสุด | EMA 50, EMA 200, บริเวณ 0.000075-0.000076 (EQH) |
**กลยุทธ์ (LUNCUSDT):**
1. **Wait & See (ทางเลือกที่ดีที่สุด):**
* **เหตุผล:** ความขัดแย้งระหว่าง Timeframes สูงมาก, แนวโน้มไม่ชัดเจน, Money Flow ใน TF4H และ TF15 เป็นลบ
* รอให้ราคาแสดงทิศทางที่ชัดเจนกว่านี้ (ยืนเหนือ EMA 50 ใน TF4H ได้, Breakout แนวต้านใน TF15)
2. **Buy on Dip (Day, 4H) - *ความเสี่ยงสูงมาก ไม่แนะนำ*:**
* **เหตุผล:** แนวโน้มระยะยาวอาจจะยังเป็นขาขึ้นได้ (ถ้าไม่หลุดแนวรับสำคัญ)
* **เงื่อนไข:** *ต้อง* รอสัญญาณการกลับตัวใน TF15 ก่อน
* **จุดเข้า:** พิจารณาเฉพาะบริเวณแนวรับที่แข็งแกร่งมากๆ (EMA ของ Day/4H) *และต้องดู TF15 ประกอบ*
* **Stop Loss:** ต่ำกว่า Low ล่าสุดของ TF15
3. **Short (15, ความเสี่ยงสูงมาก):**
* **เหตุผล:** แนวโน้ม TF15 เป็นขาลง, Money Flow เป็นลบ
* **เงื่อนไข:** ราคาไม่สามารถ Breakout EMA หรือแนวต้านอื่นๆ ใน TF15 ได้
* **จุดเข้า:** บริเวณ EMA หรือแนวต้านของ TF15
* **Stop Loss:** เหนือ High ล่าสุดของ TF15
**คำแนะนำ (เน้นย้ำ):**
* **LUNC เป็นเหรียญที่มีความเสี่ยงสูงมาก (High Risk):** มีความผันผวนสูง และอาจมีการเปลี่ยนแปลงอย่างรวดเร็ว
* **ความขัดแย้งของ Timeframes:** สถานการณ์ของ LUNCUSDT มีความขัดแย้งสูงมาก และมีความเสี่ยงสูง
* **Money Flow:** บ่งบอกถึงแรงขายที่เริ่มเข้ามา และแนวโน้มขาขึ้น (ระยะกลาง-ยาว) ที่อ่อนแอลง
* **ถ้าไม่แน่ใจ อย่าเพิ่งเข้าเทรด:** "รอ" เป็นกลยุทธ์ที่ดีที่สุด
* **Risk Management:** สำคัญที่สุด ไม่ว่าจะเลือกกลยุทธ์ใด ต้องมีการบริหารความเสี่ยงที่ดี
**สรุป:** LUNCUSDT กำลังอยู่ในช่วงเวลาที่ยากลำบากและมีความเสี่ยงสูงมากที่สุดในบรรดา 3 เหรียญที่เราวิเคราะห์กันมา การตัดสินใจที่ผิดพลาดอาจนำไปสู่การขาดทุนได้ ควรพิจารณาอย่างรอบคอบก่อนเข้าเทรดทุกครั้ง และ "รอ" จนกว่าจะมีสัญญาณที่ชัดเจนกว่านี้ เป็นทางเลือกที่ปลอดภัยที่สุดสำหรับนักลงทุนส่วนใหญ่ค่ะ
**Disclaimer:** การวิเคราะห์นี้เป็นเพียงความคิดเห็นส่วนตัว ไม่ถือเป็นคำแนะนำในการลงทุน ผู้ลงทุนควรศึกษาข้อมูลเพิ่มเติมและตัดสินใจด้วยความรอบคอบ
-
![](/static/nostr-icon-purple-64x64.png)
@ d360efec:14907b5f
2025-02-13 05:27:39
![image](https://yakihonne.s3.ap-east-1.amazonaws.com/d360efec41c120fe993b3d984863fd05ff41314fe6783191019cf7eb14907b5f/files/1739424323920-YAKIHONNES3.png)
**ภาพรวม XRPUSDT (OKX):**
XRPUSDT กำลังอยู่ในช่วงสำคัญ แนวโน้มระยะยาว (TF Day) เริ่มมีสัญญาณบวกของการเป็นขาขึ้น (Early Uptrend) หลังราคา Breakout EMA 50 และ Money Flow สนับสนุน อย่างไรก็ตาม แนวโน้มระยะกลาง (TF4H) เริ่มแสดงความอ่อนแอลง โดยราคาพักตัวลงมาทดสอบแนวรับสำคัญ และ Money Flow บ่งชี้ถึงแรงซื้อที่ลดลงและแรงขายที่เพิ่มขึ้น ส่วนแนวโน้มระยะสั้นมาก (TF15) เป็นขาลงชัดเจน
![image](https://yakihonne.s3.ap-east-1.amazonaws.com/d360efec41c120fe993b3d984863fd05ff41314fe6783191019cf7eb14907b5f/files/1739424343431-YAKIHONNES3.png)
**แนวโน้ม:**
* **TF Day:** เริ่มเป็นขาขึ้น (Early Uptrend) - Breakout EMA 50, Money Flow เป็นบวก
* **TF4H:** เริ่มไม่แน่นอน (พักตัว, ทดสอบแนวรับ EMA 50 และ EQL) - Money Flow เริ่มเป็นลบ
* **TF15:** ขาลง (Downtrend) ระยะสั้นมาก - ราคาหลุด EMA, โครงสร้างราคาเป็น Lower Highs/Lows, Money Flow เป็นลบ
**โครงสร้างราคา (SMC):**
| Timeframe | Break of Structure (BOS) | Change of Character (CHoCH) | Higher High (HH) & Higher Low (HL) | Equal Highs (EQH) / Equal Lows (EQL) |
| :-------- | :----------------------- | :--------------------------- | :----------------------------------- | :------------------------------------- |
| Day | ด้านบน (Breakout EMA 50) | ไม่ชัดเจน | เริ่มก่อตัว (แต่ยังไม่ชัดเจน) | - |
| 4H | ด้านบน | ไม่ชัดเจน | เริ่มก่อตัว (แต่ไม่ชัดเจน) | EQH: 3.00-3.20, EQL: 2.2667 |
| 15m | ด้านล่าง | มีทั้งบนและล่าง | Lower Highs (LH) & Lower Lows (LL) | EQH: 2.48-2.50, EQL: 2.38 |
![image](https://yakihonne.s3.ap-east-1.amazonaws.com/d360efec41c120fe993b3d984863fd05ff41314fe6783191019cf7eb14907b5f/files/1739424364093-YAKIHONNES3.png)
![image](https://yakihonne.s3.ap-east-1.amazonaws.com/d360efec41c120fe993b3d984863fd05ff41314fe6783191019cf7eb14907b5f/files/1739424380815-YAKIHONNES3.png)
**Money Flow (LuxAlgo):**
* **TF Day:** แรงซื้อแข็งแกร่ง
* **TF4H:** แรงซื้อเริ่มอ่อนแรงลง, แรงขายเริ่มเข้ามา
* **TF15:** แรงขายมีอิทธิพลเหนือกว่า
**EMA (Exponential Moving Average):**
* **TF Day:** EMA 50 & 200 เป็นแนวรับ
* **TF4H:** EMA 50 กำลังถูกทดสอบ, EMA 200 เป็นแนวรับถัดไป
* **TF15:** EMA 50 & 200 เป็นแนวต้าน
**แนวรับ-แนวต้านสำคัญ:**
| Timeframe | แนวรับ | แนวต้าน |
| :-------- | :----------------------------------------------------- | :----------------------------------------------------------------------- |
| Day | EMA 50 (≈1.56), EMA 200 (≈1.08) | 3.4049 (High), 3.00-3.20 (EQH) |
| 4H | EMA 50 (≈2.20), *2.2667 (EQL)*, EMA 200, 1.7820 | 3.4049, 2.3987 (Volume Profile), 3.00-3.20 (EQH) |
| 15m | 2.38 (EQL, Volume Profile), 2.3274 | EMA 50, EMA 200, 2.4196, Equilibrium (≈2.44), 2.48-2.50 (EQH) |
**กลยุทธ์ (XRPUSDT):**
1. **Wait & See (ทางเลือกที่ดีที่สุด):**
* **เหตุผล:** ความขัดแย้งระหว่าง Timeframes สูง, TF4H กำลังทดสอบแนวรับสำคัญ, Money Flow ใน TF4H และ TF15 เป็นลบ
* รอให้ราคาแสดงทิศทางที่ชัดเจน (ยืนเหนือ EMA 50 ใน TF4H ได้ หรือ Breakout แนวต้านใน TF15)
2. **Buy on Dip (Day, 4H) - *ความเสี่ยงสูงมาก*:**
* **เหตุผล:** แนวโน้มระยะยาวยังมีโอกาสเป็นขาขึ้น, Money Flow ใน TF Day เป็นบวก
* **เงื่อนไข (สำคัญมาก):** *ต้อง* รอสัญญาณการกลับตัวใน TF15 ก่อน เช่น:
* Breakout แนวต้านย่อยๆ พร้อม Volume
* Money Flow (TF15) เปลี่ยนเป็นสีเขียว
* Bullish Candlestick Patterns
* **จุดเข้า (Day):** EMA 50, EMA 200 (*ดู TF15 ประกอบ*)
* **จุดเข้า (4H):** EMA 50, *2.2667 (EQL)* (*ดู TF15 ประกอบ*)
* **Stop Loss:** ต่ำกว่า Low ล่าสุดของ TF15 หรือต่ำกว่าแนวรับที่เข้าซื้อ
3. **Short (15, ความเสี่ยงสูงมาก):**
* **เหตุผล:** แนวโน้ม TF15 เป็นขาลง, Money Flow เป็นลบ
* **เงื่อนไข:** ราคาไม่สามารถกลับขึ้นไปยืนเหนือ EMA ของ TF15 ได้
* **จุดเข้า:** บริเวณ EMA ของ TF15 หรือแนวต้านอื่นๆ
* **Stop Loss:** เหนือ High ล่าสุดของ TF15
**คำแนะนำ:**
* **ความขัดแย้งของ Timeframes:** XRPUSDT มีความขัดแย้งสูงมาก และมีความเสี่ยงสูง
* **Money Flow:** Day เป็นบวก, 4H เริ่มเป็นลบ, 15m เป็นลบ
* **EMA 50 (TF4H) & EQL 2.2667:** จุดชี้ชะตา
* **ถ้าไม่แน่ใจ อย่าเพิ่งเข้าเทรด:** "รอ" ดีที่สุด
* **Risk Management:** สำคัญที่สุด
**สรุป:** สถานการณ์ของ XRPUSDT ตอนนี้มีความเสี่ยงสูงมาก และไม่เหมาะกับนักลงทุนที่รับความเสี่ยงได้ต่ำ การ "รอ" จนกว่าจะมีสัญญาณที่ชัดเจนกว่านี้ เป็นทางเลือกที่ปลอดภัยที่สุดค่ะ
Disclaimer: การวิเคราะห์นี้เป็นเพียงความคิดเห็นส่วนตัว ไม่ถือเป็นคำแนะนำในการลงทุน ผู้ลงทุนควรศึกษาข้อมูลเพิ่มเติมและตัดสินใจด้วยความรอบคอบ
-
![](/static/nostr-icon-purple-64x64.png)
@ d360efec:14907b5f
2025-02-13 04:47:20
![image](https://yakihonne.s3.ap-east-1.amazonaws.com/d360efec41c120fe993b3d984863fd05ff41314fe6783191019cf7eb14907b5f/files/1739420558466-YAKIHONNES3.png)
**ภาพรวม BTCUSDT :**
Bitcoin (BTCUSDT) กำลังอยู่ในช่วงสำคัญ แม้ว่าแนวโน้มหลักในระยะกลางถึงยาว (TF Day & 4H) จะยังคงเป็นขาขึ้นที่แข็งแกร่ง แต่ในระยะสั้นมาก (TF15) กลับแสดงสัญญาณของความอ่อนแอและการปรับฐานลงมา ทำให้เกิดความไม่แน่นอนในทิศทางของราคา อย่างไรก็ตาม *Money Flow ใน TF Day บ่งชี้ว่าแรงซื้อโดยรวมยังคงแข็งแกร่ง*
![image](https://yakihonne.s3.ap-east-1.amazonaws.com/d360efec41c120fe993b3d984863fd05ff41314fe6783191019cf7eb14907b5f/files/1739420569680-YAKIHONNES3.png)
**แนวโน้ม:**
* **TF Day:** ขาขึ้น (Uptrend) แข็งแกร่ง – ราคาอยู่เหนือ EMA 50 และ EMA 200, โครงสร้างราคาเป็น Higher Highs (HH) และ Higher Lows (HL), *Money Flow เป็นบวก (แรงซื้อ)*
* **TF4H:** ขาขึ้น (Uptrend) – ราคาอยู่เหนือ EMA, มีการพักตัวลงมา (Pullback) แต่ยังไม่เสียโครงสร้างขาขึ้น, *Money Flow เริ่มอ่อนแรง (แรงซื้อลดลง, แรงขายเพิ่มขึ้น)*
* **TF15:** ขาลง (Downtrend) ระยะสั้นมาก – ราคาหลุด EMA และแนวรับย่อย, โครงสร้างราคาเป็น Lower Highs (LH) และ Lower Lows (LL), *Money Flow เป็นลบ (แรงขาย)*
**โครงสร้างราคา (SMC):**
* **TF Day:** ยืนยันแนวโน้มขาขึ้น (HH, HL, BOS)
* **TF4H:** ยืนยันแนวโน้มขาขึ้น (HH, HL, BOS), มี Equal Highs (EQH) ที่เป็นแนวต้าน
* **TF15:** บ่งบอกถึงแนวโน้มขาลงระยะสั้น (BOS ด้านล่าง, LH, LL), มี EQH เป็นแนวต้าน
**Money Flow (LuxAlgo) - สรุป:**
* **TF Day:** แรงซื้อยังคงแข็งแกร่งอย่างชัดเจน
* **TF4H:** แรงซื้อเริ่มอ่อนแรงลง, มีแรงขายเข้ามา
* **TF15:** แรงขายมีอิทธิพลเหนือกว่า
![image](https://yakihonne.s3.ap-east-1.amazonaws.com/d360efec41c120fe993b3d984863fd05ff41314fe6783191019cf7eb14907b5f/files/1739420590121-YAKIHONNES3.png)
**EMA (Exponential Moving Average):**
* **TF Day & 4H:** EMA 50 & 200 เป็นแนวรับสำคัญ
* **TF15:** EMA 50 & 200 กลายเป็นแนวต้าน
**แนวรับ-แนวต้านสำคัญ:**
| Timeframe | แนวรับ | แนวต้าน |
| :-------- | :------------------------------------------------------------------------- | :-------------------------------------------------------------- |
| Day | EMA 50, EMA 200, 96,000-98,000, 85,724.7 | 109,998.9 (High เดิม) |
| 4H | EMA 50, EMA 200, 96,000-98,000, 89,037.0 | 109,998.9 (EQH, High เดิม) |
| 15m | 95,200 (Low ล่าสุด), 94,707.4 (Low ก่อนหน้า) | EMA 50, EMA 200, บริเวณ 96,000, 96,807.8, 97,000-97,200 |
**กลยุทธ์ (BTCUSDT):**
1. **Buy on Dip (Day, 4H) - *มีความน่าเชื่อถือมากขึ้น แต่ยังคงต้องระมัดระวัง*:**
* **เหตุผล:** แนวโน้มหลักยังเป็นขาขึ้น, Money Flow ใน TF Day แข็งแกร่ง
* **เงื่อนไข:** *ยังคงต้องรอสัญญาณการกลับตัวของราคาใน TF15 ก่อน* (Breakout แนวต้านย่อย, Money Flow TF15 เป็นบวก, Bullish Candlestick Patterns)
* **จุดเข้า (Day):** EMA 50, EMA 200, บริเวณ 96,000-98,000
* **จุดเข้า (4H):** EMA 50
* **Stop Loss:** ต่ำกว่า Low ล่าสุดของ TF15 หรือต่ำกว่าแนวรับที่เข้าซื้อ
2. **Short (15, ความเสี่ยงสูงมาก):**
* **เหตุผล:** แนวโน้ม TF15 เป็นขาลง, Money Flow TF15 เป็นลบ
* **เงื่อนไข:** ราคาไม่สามารถกลับขึ้นไปยืนเหนือ EMA ของ TF15 ได้
* **จุดเข้า:** บริเวณ EMA ของ TF15 หรือแนวต้านอื่นๆ
* **Stop Loss:** เหนือ High ล่าสุดของ TF15
3. **Wait & See (ทางเลือกที่ปลอดภัย):**
* **เหตุผล:** ความขัดแย้งระหว่าง Timeframes ยังคงมีอยู่
* รอให้ตลาดเฉลยทิศทางที่ชัดเจนกว่านี้
**คำแนะนำ (เน้นย้ำ):**
* **Money Flow ใน TF Day:** เป็นปัจจัยบวกที่สำคัญ ทำให้กลยุทธ์ Buy on Dip มีน้ำหนักมากขึ้น
* **ความขัดแย้งของ Timeframes:** ยังคงต้องระวัง TF15 ที่เป็นขาลง
* **Volume:** การ Breakout/Breakdown ใดๆ ควรมี Volume สนับสนุน
* **Risk Management:** สำคัญที่สุด
**สรุป:**
สถานการณ์ของ BTCUSDT โดยรวมยังคงเป็นบวก (ขาขึ้น) แต่มีความเสี่ยงในระยะสั้นจาก TF15 การตัดสินใจลงทุนควรพิจารณาจาก Timeframe ที่เหมาะสมกับสไตล์การเทรดของคุณ และอย่าลืมบริหารความเสี่ยงเสมอค่ะ
**Disclaimer:** การวิเคราะห์นี้เป็นเพียงความคิดเห็นส่วนตัว ไม่ถือเป็นคำแนะนำในการลงทุน ผู้ลงทุนควรศึกษาข้อมูลเพิ่มเติมและตัดสินใจด้วยความรอบคอบ
-
![](/static/nostr-icon-purple-64x64.png)
@ 2183e947:f497b975
2025-02-13 04:44:45
# How Coinpools Improve Bitcoin
# Problems with bitcoin
UX problems with base layer payments include:
- Mining fees are sometimes high
- Confirmations usually take several minutes
- Using it privately requires running a coinjoin server
UX problems with lightning payments include:
- Setup fees are sometimes high
- Payments frequently fail
- Payments aren't asynchronous (the recipient has to stand there with their device open waiting to do a revoke_and_ack on their old state -- unless they use a custodian)
- Payments that *do* succeed occasionally take more than 30 seconds (due to stuck payments, automatic retries, and no ability to say "stop retrying" in any existing wallets that I'm aware of)
- Using it privately requires manual channel management
# Solutions
A lot of my recent work focuses on non-interactive coinpools. I figured out a way to do them on bitcoin if we had CTV + CSFS, and then, with a bit more thought, I figured out that my model didn't actually require those things, so I am now working on an implementation. But my model does benefit a lot from CTV (less sure about CSFS at this point) so let me outline how non-interactive coinpools fix the above problems and along the way I will share how CTV specifically improves coinpools.
## "Mining fees are sometimes high"
Coinpools improve the problem of "mining fees are sometimes high" by letting you bypass them in more cases. If you're in a coinpool and pay someone else in the same coinpool, your payment does not show up on the base layer, it just involves modifying some unilateral withdrawal transactions such that the sender can withdraw less and the recipient can withdraw more. The transactions are off-chain, like LN transactions, so you can do that without paying a base layer fee.
## "Confirmations usually take several minutes"
Coinpools improve the problem of "confirmations usually take several minutes" in a similar manner. Payments *inside* a coinpool (i.e. to another pool user) merely involve modifying off-chain data (and revoking an old state), so they can be as fast as lightning. In most cases I expect them to be a bit faster because there's less need for pathfinding or negotiating with a variety of routing nodes. If the sender and the recipient are in the same pool, they only need to talk to each other and, in my model, a coordinator.
## "Using the base layer privately requires running a coinjoin server"
Coinpools improve the problem of "using the base layer privately requires running a coinjoin server" in two ways: first, if you're in a coinpool and you send money to a bitcoin address, the blockchain doesn't know which coinpool user sent that payment. Analysts might be able to trace the payment to the coinpool, but from the blockchain's perspective, that's just a multisig; the actual person *inside* the multisig who sent the money is not revealed. However, my model uses a coordinator, and the coordinator probably knows which user sent the payment. Still, only 1 person knowing is better than having everyone on the blockchain know.
Second, if you send money to someone *inside* the coinpool, in my model, the only people who know about your payment are the sender, the recipient, and the coordinator, and the recipient does not know who the sender is. Moreover, my model allows users to act as bridges from LN to other pool users, so even the coordinator doesn't know if the person who *looks* like the sender was the *real* sender or just a bridge node, with the *real* sender being someone on lightning.
## "Setup fees on lightning are sometimes high"
Coinpools improve the problem of "setup fees are sometimes high" by having multiple users share the setup cost. My model allows a single bitcoin transaction to fund a coinpool with a number of members between 1 and probably about 100. (The max I've actually successfully tested is 11.) If the users share the cost of that transaction, then even in a high fee scenario, where bitcoin transactions cost $50, each user only has to pay a fraction of that, where the fraction is determined by how many users are joining the pool. If 10 people are joining, each user would pay $5 instead of $50. If 50 people are joining, each user would pay $1. If 100 people are joining, each user would pay 50¢.
## Sidebar: how CTV improves my coinpool model
The setup is also where CTV greatly improves my model. For my model to work, the users have to coordinate to create the pool in something I call a "signing ceremony," which is very similar to a coinjoin. The signing ceremony has to be scheduled and each user has to show up for it or they won't get into the pool. With CTV, you could fix this: instead of a signing ceremony, an exchange could autosend your money into a coinpool on e.g. a monthly basis and email you the data you need to perform your unilateral exit. All they need from you is a pubkey, and they can do everything else.
## "Lightning payments frequently fail"
Coinpools improve the problem of "payments frequently fail" by reducing the need for pathfinding, which is a typical cause of failure on lightning. If you are paying someone in the same pool as you, you always know an exact path: it will be you -> coordinator -> recipient. These short paths also reduce the likelihood of routing nodes having insufficient capacity to forward the payment. You've only got one "routing node" to worry about -- the coordinator.
## "Lightning payments aren't asynchronous"
Coinpools *in general* don't improve the problem of "payments aren't asynchronous" but my model in particular *does* improve that problem because I am combining it with my hedgehog protocol from last year, which *does* allow for asynchronous lightning-like payments. Relatedly, my coinpool model technically has a network model, it's just a hub-and-spoke network: the coordinator is connected to every user of the pool and can forward asynchronous hedgehog payments to them. This means you can send money to someone when they are offline; they'll get it whenever they *do* get online, even if *you* went offline in the meantime.
## "Lightning payments sometimes take too long"
Coinpools improve the problem of "stuck" lightning payments by reducing the number of hops along the route. As above, a payment inside the pool (per my model) is always just sender -> coordinator -> recipient. Due to only having 1 hop, there are fewer opportunities for a node to have a network issue and cause a delay.
## "Channel management is a pain"
Coinpools have multiple ways of improving the problem of manual channel management. In particular, not all coinpool models *have* channels, so channel management is not always needed in a coinpool. My model, however, does have channels, so channel management is still a thing.
Nonetheless, my model improves channel management in two ways: first, the setup costs are lower for the reasons given above. Second, payment asynchronicity helps for the following reason:
The worst pain point in channel management *today* occurs when someone sends you a payment but it fails because you didn't have enough inbound capacity. That doesn't happen in my coinpool model because payments are asynchronous. If you don't have enough inbound capacity, the payment doesn't fail, it just remains pending. So all you have to do is open a new channel (i.e. enter a new pool) and *then* finalize the payment.
## Zap me
I hope this essay clarifies why coinpools improve the problems I outlined and why CTV improves coinpools. I also hope this gets you a bit excited for my latest coinpool invention, which I hope to release soon :D (It really is very close to demo-ready.) If you liked this essay, consider zapping me: supertestnet@coinos.io
-
![](/static/nostr-icon-purple-64x64.png)
@ a012dc82:6458a70d
2025-02-13 04:00:01
In the dynamic world of global finance, the interplay between traditional monetary policy and the burgeoning digital asset market is becoming increasingly prominent. The U.S. Federal Reserve's recent pivot towards a more accommodative monetary policy has sparked intense discussion among investors, economists, and cryptocurrency enthusiasts. This shift, characterized by an expected reduction in interest rates, is not just a routine adjustment but a significant move that could have far-reaching implications for various asset classes, including cryptocurrencies like Bitcoin. As we delve into this topic, we aim to unravel the complexities of the Fed's policy change and its potential ripple effects on Bitcoin, a digital asset that has been a subject of much intrigue and speculation.
**Table Of Content**
- Understanding the Fed's Policy Shift
- Impact on Traditional Financial Markets
- Bitcoin's Response to Monetary Easing
- Analyzing the Economic Backdrop
- Bitcoin: A Safe Haven or Risk Asset?
- Risks and Opportunities
- Conclusion
- FAQs
**Understanding the Fed's Policy Shift**
The Federal Reserve, the guardian of the U.S. monetary system, wields immense influence over global financial markets. Its recent signaling of a dovish turn – an expectation of 75 basis points in rate cuts by 2024 – marks a significant departure from its previous stance. This change is reflective of the Fed's response to a confluence of macroeconomic factors, such as fluctuating inflation rates, global economic uncertainties, and domestic financial stability concerns. The Fed's decisions are closely monitored as they set the tone for economic growth, inflation control, and financial market stability. In this context, the anticipated rate cuts suggest a strategic move to stimulate economic activity by making borrowing cheaper, thereby potentially boosting investment and consumption. However, this policy shift is not without its complexities and nuances, as it must balance the fine line between stimulating growth and controlling inflation.
**Impact on Traditional Financial Markets**
The ripple effects of the Fed's policy announcement were immediately felt across traditional financial markets. Stock markets, often seen as a barometer of economic sentiment, reacted positively, with indices like the Dow Jones Industrial Average reaching new heights. This surge reflects investors' optimism about the potential for increased corporate profits and economic growth in a lower interest rate environment. Similarly, the bond market experienced a significant rally, with yields on government securities falling as bond prices rose. This movement in the bond market is indicative of investors' expectations of a more accommodative monetary policy, which typically leads to lower yields on fixed-income securities. These market reactions underscore the pivotal role of central bank policies in shaping investor sentiment and the direction of financial markets. They also highlight the interconnectedness of various asset classes, as changes in monetary policy can have cascading effects across different sectors of the economy.
**Bitcoin's Response to Monetary Easing**
Bitcoin's reaction to the Fed's dovish turn has been a subject of keen interest. The cryptocurrency, which had been experiencing volatility, showed signs of recovery following the Fed's announcement. This response is indicative of Bitcoin's increasing correlation with broader financial market trends, a significant development given its history as an uncorrelated asset. Bitcoin's sensitivity to macroeconomic factors like central bank policies points to its growing integration into the mainstream financial ecosystem. However, this integration also means that Bitcoin is increasingly exposed to the same macroeconomic risks and uncertainties that affect traditional assets. The Fed's policy shift could potentially make Bitcoin more attractive to investors seeking non-traditional assets in a low-interest-rate environment. However, Bitcoin's complex dynamics, including its decentralized nature, limited supply, and regulatory landscape, add layers of complexity to its response to monetary policy changes.
**Analyzing the Economic Backdrop**
The economic backdrop against which the Fed's policy shift occurs is multifaceted and dynamic. On one hand, the U.S. economy has demonstrated resilience, with robust GDP growth and positive retail sales figures suggesting underlying strength. On the other hand, inflation, though moderated from its peak, remains a concern, hovering above the Fed's target. This economic duality presents a challenging scenario for policymakers, who must navigate the delicate balance between stimulating growth and containing inflation. For investors and market participants, this creates an environment of uncertainty, as they must decipher mixed signals from economic data and policy announcements. In this context, Bitcoin's role and response become even more intriguing, as it operates at the intersection of technology, finance, and macroeconomics.
**Bitcoin: A Safe Haven or Risk Asset?**
The debate over Bitcoin's classification as a safe haven or a risk asset is intensified by the Fed's easing stance. Traditionally, in a low-interest-rate environment, investors seek assets that can serve as hedges against inflation and currency devaluation. Gold has historically played this role, and Bitcoin, with its fixed supply and digital scarcity, has drawn comparisons to gold. However, Bitcoin's relatively short history and high volatility make it a more complex and potentially riskier asset. The Fed's dovish policy could enhance Bitcoin's appeal as an alternative investment, especially if traditional assets like bonds offer lower returns. However, Bitcoin's classification as a safe haven is still a matter of debate, with opinions divided on its long-term stability and value retention capabilities.
**Risks and Opportunities**
Investors considering Bitcoin in light of the Fed's policy change face a landscape filled with both risks and opportunities. The potential for a Bitcoin rally in a low-interest-rate environment is counterbalanced by the cryptocurrency's inherent volatility and regulatory uncertainties. Bitcoin's price movements can be dramatic and unpredictable, influenced by a range of factors from technological developments to geopolitical events. Additionally, the regulatory environment for cryptocurrencies is still evolving, with potential changes posing risks to Bitcoin's accessibility and value. Investors must also consider the broader global economic context, including actions by other central banks and international trade dynamics, which can impact Bitcoin's market movement.
**Conclusion**
The Federal Reserve's shift towards a more accommodative monetary policy in 2024 presents a fascinating scenario for Bitcoin and the broader cryptocurrency market. This development underscores the increasing relevance of digital assets in the global financial landscape and highlights the complex interplay between traditional monetary policies and emerging financial technologies. As Bitcoin continues to evolve and gain acceptance, its response to macroeconomic factors like central bank policies will be a critical area of focus for investors. In navigating this dynamic and uncertain environment, a cautious and well-informed approach is essential for those looking to explore the opportunities and navigate the challenges of cryptocurrency investments. The coming years promise to be a pivotal period in the maturation of Bitcoin as it responds to the shifting tides of global finance.
**FAQs**
**How does the Federal Reserve's easing stance impact Bitcoin?**
The Fed's shift towards lower interest rates can make riskier assets like Bitcoin more attractive to investors. This is because lower rates often lead to reduced yields on traditional investments, prompting investors to seek higher returns elsewhere.
**What is the significance of the Fed's 'dot plot' for Bitcoin investors?**
The 'dot plot' is a projection of interest rate movements by Federal Reserve members. A shift towards lower rates, as indicated in the recent dot plot, can signal a more accommodative monetary policy, potentially impacting Bitcoin's market as investors adjust their portfolios.
**Can Bitcoin be considered a safe haven asset in light of the Fed's policy?**
Bitcoin's role as a safe haven asset is debated. While its fixed supply and digital nature offer some safe haven characteristics, its volatility and regulatory uncertainties make it a complex choice compared to traditional safe havens like gold.
**What risks should Bitcoin investors consider in the context of the Fed's easing policy?**
Investors should be aware of Bitcoin's volatility, regulatory changes, and its sensitivity to macroeconomic factors. Additionally, global economic conditions and actions by other central banks can also influence Bitcoin's market.
**How does the economic backdrop influence Bitcoin's response to the Fed's policy?**
Economic factors like GDP growth, inflation rates, and retail sales impact investor sentiment and risk appetite, which in turn can affect Bitcoin's market. A strong economy might reduce the appeal of risk assets like Bitcoin, while economic uncertainties can increase their attractiveness.
**That's all for today**
**If you want more, be sure to follow us on:**
**NOSTR: croxroad@getalby.com**
**X: @croxroadnews.co**
**Instagram: @croxroadnews.co**
**Youtube: @croxroadnews**
**Store: https://croxroad.store**
**Subscribe to CROX ROAD Bitcoin Only Daily Newsletter**
**https://www.croxroad.co/subscribe**
***DISCLAIMER: None of this is financial advice. This newsletter is strictly educational and is not investment advice or a solicitation to buy or sell any assets or to make any financial decisions. Please be careful and do your own research.***
-
![](/static/nostr-icon-purple-64x64.png)
@ 57d1a264:69f1fee1
2025-02-13 03:45:23
![](https://m.stacker.news/77356)
**What You Will Learn:**
- Understanding the concept of cybersecurity
- Networking Basics
- Operating Systems Overview
- Introduction to Kali Linux
- Threat Actors and Cyber Threats
- Ethical Hacking Techniques and Tools.
**How to Register:**
Use this link to Register.
https://forms.gle/L8AGLCWU4djwUXxz9
originally posted at https://stacker.news/items/884407
-
![](/static/nostr-icon-purple-64x64.png)
@ f6488c62:c929299d
2025-02-13 02:39:41
Lowering interest rates is one of the tools that central banks use to manage the economy, especially during periods of inflation, which causes the prices of goods and services to rise. Lowering interest rates not only helps stimulate spending but can also foster sustainable growth in businesses and labor markets.
Access to Capital and Economic Stimulation
When interest rates are lowered, the public can access capital more easily. With lower interest rates, borrowing becomes less burdensome, giving individuals and businesses the opportunity to start new ventures or expand existing businesses. This leads to increased investment and spending, which in turn keeps the economy circulating and growing.
For instance, when people can easily borrow money to start a new business—such as an online store or a product manufacturing business—the increase in entrepreneurs and the availability of goods in the market will ensure that the supply is sufficient to meet consumer demand. This, in turn, prevents prices from rising too much due to a lack of supply.
Reducing Inflation by Increasing Supply
Increasing the supply of goods and services in the market can significantly help in controlling inflation. When there are more goods or services available to meet market demand, competition among producers will naturally drive prices down. This is the basic principle of market dynamics: when there’s enough supply, prices are less likely to increase, even in times of high demand.
In addition, increasing supply helps address shortages, which are one of the key drivers of rising prices. When there is enough product available to satisfy demand, inflationary pressures can be relieved, and prices can stabilize.
Redistributing Income and Reducing Inequality
Lower interest rates also play a crucial role in redistributing income within society. By making access to capital easier, especially for those with lower or middle incomes, the public’s purchasing power increases, which can stimulate spending on essential goods and services.
When people have more money in hand, they are better able to access necessary products. This boosts demand in the market. However, alongside this increased demand, sufficient supply is needed to prevent prices from rising uncontrollably, which can lead to inflation.
Moreover, supporting the population through welfare programs or initiatives that allow everyone to access education and investment opportunities helps individuals create products and value in the market. A diverse market with a variety of products increases production efficiency and helps mitigate economic inequality, ensuring a more balanced and inclusive economy.
Conclusion
Lowering interest rates and redistributing income effectively can stimulate economic growth and reduce inflation. This works by ensuring there is sufficient supply to meet market demand, while also providing capital that allows the public to start new businesses and generate new products in the market.
For sustainable long-term economic growth, managing inflation should go hand in hand with investing in infrastructure and ensuring wealth distribution. This ensures that everyone has equal access to opportunities, leading to steady economic growth without negatively impacting the majority of society.
In summary, lowering interest rates is a key tool in stimulating the economy and reducing inflation, especially when the economy faces imbalances. It not only increases supply, but also promotes income redistribution and the creation of an economy that is more equitable in the long run.
-
![](/static/nostr-icon-purple-64x64.png)
@ 3b7fc823:e194354f
2025-02-13 02:25:42
site:example.com
intitle:"index of"
inurl:admin
intext:"password"
site:example.com
site:.gov
site:.edu
site:*.mil
inurl:login
inurl:admin
inurl:dashboard
inurl:portal
intitle:"admin login"
intitle:"index of /"
intitle:"index of" "parent directory"
intitle:"index of" "backup"
filetype:pdf "confidential"
filetype:xls "username | password"
filetype:doc "top secret"
filetype:sql "database"
intext:"username" intext:"password"
intext:"login" intext:"password"
filetype:txt "passwords"
inurl:"viewerframe?mode="
inurl:"/view.shtml"
inurl:"/view/index.shtml"
intitle:"index of" "wp-config.php"
inurl:".git"
filetype:xls intext:"email"
filetype:csv intext:"email"
inurl:"/setup.cgi?next_file=netgear.cfg"
inurl:"/wificonf.html"
-
![](/static/nostr-icon-purple-64x64.png)
@ fd78c37f:a0ec0833
2025-02-13 02:24:48
In this edition, we invited Rafael from Bitcoin É Aqui to share the development of his community and its efforts in promoting Bitcoin adoption. From establishing a Bitcoin-friendly environment in Rolante to organizing and supporting events like the Bitcoin Spring Festival and KuchenFest, Rafael highlighted Bitcoin's impact on the local economy and tourism industry.
**YakiHonne**: Today, we are honored to invite Rafael from Bitcoin é Aqui to join us. Before we dive in, I'd like to take a moment to introduce YakiHonne and share a bit about what we do. YakiHonne is a decentralized media client built on the Nostr protocol that enables freedom of speech through technology. It empowers creators to create their own voice, assets, and features. It also allows features like smart widgets, verified notes, and focuses on long-form articles. Now today we'll be exploring more about the Bitcoin community. Rafael, could you please briefly introduce what sparked your interest in Bitcoin, and what motivated you to create this community?
**Rafael**:Like many, Stim's and his wife Camila's initial interest was in technology— a completely new way to transfer money with full self-custody. From the beginning, the project focused on the payment network, and at the time, they didn’t realize it would evolve into “A Project.”
**YakiHonne**: Could you share how your community got started, the strategies you used to attract members, and the early challenges you encountered?
**Rafael**:From the start, we were all about building a payment network. We began by paying our barber, gardener, and other service providers with Bitcoin. After a few close friends joined, word started to spread—even though some were worried about scams and Bitcoin's legality. To address these concerns, we held a talk at the City's Trade Association on how merchants could legally accept Bitcoin. We expected 5 to 10 friends, but over 60 merchants attended! Today, we’re proud to say that our city is the most Bitcoin-friendly in the world, with more than 40% of stores accepting it. From plumbers to supermarkets, it’s amazing to see our community featured on the BitcoinMap website.
![image](https://yakihonne.s3.ap-east-1.amazonaws.com/fd78c37f13c3a9d5bce80dc3278d529ba908e5119e90f9131905c5a5a0ec0833/files/1739413063303-YAKIHONNES3.png)
**YakiHonne**: What principles guide the community, and how do you maintain trust and reliability in discussions?
**Rafael**:Like Bitcoin itself, decentralization is our core principle. The project "Bitcoin É Aqui" (loosely translated as "Bitcoin is Here") assists merchants in setting up Lightning wallets and offers best practices. However, every merchant is free to operate as they see fit—choosing whether to follow our advice or to use any wallet they prefer. Moreover, many experienced merchants help onboard newcomers, building trust through established networks and reinforcing our decentralized approach.
**YakiHonne**: How do you educate members and keep them updated on Bitcoin developments?
**Rafael**:We have a group chat where we post some news, but in Brazil, almost everyone already uses WhatsApp for communication, and news usually spreads through these groups, again highlighting the decentralized nature of the Project.
**YakiHonne**: What initiatives has the community undertaken to promote Bitcoin adoption, and what results have you seen?
**Rafael**:Of course, the rising coin value draws attention, but the main attraction is tourists coming to Rolante to learn about the project. Rolante was already famed for its natural wonders—majestic mountains and breathtaking waterfalls. Combined with Bitcoin’s innovative acceptance as a payment method, it has become an even stronger magnet for visitors.
**Rafael**:In Rolante, living completely on Bitcoin is a reality. Here, you'll find travel agencies, professional tour guides, and a variety of services—from department stores and opticians to real estate agents, construction companies, architects, furniture stores, building materials suppliers, and solar energy providers. In the healthcare sector, you can rely on pharmacies, massage therapists, physiotherapists, and advanced dental services; even the city hospital accepts Bitcoin as payment.
![image](https://yakihonne.s3.ap-east-1.amazonaws.com/fd78c37f13c3a9d5bce80dc3278d529ba908e5119e90f9131905c5a5a0ec0833/files/1739413137502-YAKIHONNES3.png)
**YakiHonne**: What are the community’s goals for the next 6-12 months, and how do you see it evolving with Bitcoin’s growth?
**Rafael**:As a project, Bitcoin É Aqui doesn’t dictate what the community should do, but we support many events like Pizza Day, Bitcoin Spring Festival, Bier Rock, KuchenFest. One major event is the biennial Bitcoin Spring Festival (BSF). The Bitcoin Spring Festival (BSF) is a key event in the Rolante Bitcoin community, aimed at promoting Bitcoin adoption and circular economy development. This year, the festival focuses on "Bitcoinization," bringing together notable figures in the Bitcoin space to showcase a real Bitcoin economic ecosystem. During the event, all transactions will be conducted via the Lightning Network, with Coinos.io and Wallet Of Satoshi recommended. BSF is not just a celebration but a movement toward financial freedom.
![image](https://yakihonne.s3.ap-east-1.amazonaws.com/fd78c37f13c3a9d5bce80dc3278d529ba908e5119e90f9131905c5a5a0ec0833/files/1739413214893-YAKIHONNES3.png)
**Rafael**:This March, Rolante will host its most traditional event, KuchenFest, celebrating the local traditional bread delicacy. The event centers around the sweet bread Cuca, bringing together candy makers and Cuca enthusiasts to share recipes, techniques, and stories. Additionally, the festival features live music, folk dances, and family activities, showcasing rich cultural traditions. We will help the event accept and promote the use of Bitcoin.
-
![](/static/nostr-icon-purple-64x64.png)
@ ac6f9572:8a6853dd
2025-02-13 02:05:22
I attended Sats ‘n’ Facts to share my art, joining other Nostr artists in exhibiting our work at the event’s very first venue. It was a great opportunity to connect with fellow creatives, including Siritravelsketch, whose work I’ve admired on Nostr for some time. Meeting other artists in real life is always inspiring—there’s an undeniable creative bond that comes from sharing our passion in person.
![image](https://yakihonne.s3.ap-east-1.amazonaws.com/43baaf0c28e6cfb195b17ee083e19eb3a4afdfac54d9b6baf170270ed193e34c/files/1739263333621-YAKIHONNES3.jpg)
Sats ‘n’ Facts is an Unconference, meaning there’s no strict schedule—everything is open for participants. It’s all about the connections made, the synergy shared, and, for the developers attending, the excitement of a hackathon. (A hackathon is an event where people collaborate intensively on engineering projects, often within 24 to 48 hours.)
![image](https://yakihonne.s3.ap-east-1.amazonaws.com/43baaf0c28e6cfb195b17ee083e19eb3a4afdfac54d9b6baf170270ed193e34c/files/1739263372984-YAKIHONNES3.JPEG)
My goal as an artist is to become a bridge between the Bitcoin tech world and the Bitcoin art and design space. Bitcoin empowers us by providing greater (financial) freedom, and with that freedom comes more time to pursue what we truly love—so in a way, you never have to “work” again. 😊
![image](https://yakihonne.s3.ap-east-1.amazonaws.com/43baaf0c28e6cfb195b17ee083e19eb3a4afdfac54d9b6baf170270ed193e34c/files/1739263427502-YAKIHONNES3.jpg)
Nostr is a great example of how bubbles 🫧 POP, leading to new collaborations. Without tech, artists wouldn’t have a way to share their work, and without artists, creatives, and plebs, developers would have no one to build for. Both sides are essential for organic growth. This kind of synergy can only thrive in a decentralized system—otherwise, it risks being captured by big corporations. And that single point of failure is one of the biggest challenges we face in the world today.
![image](https://yakihonne.s3.ap-east-1.amazonaws.com/43baaf0c28e6cfb195b17ee083e19eb3a4afdfac54d9b6baf170270ed193e34c/files/1739263457122-YAKIHONNES3.jpg)
Decentralization is freedom. Events like Sats ‘n’ Facts give us the opportunity to collaborate, create, and contribute to a more decentralized world—one where more people can truly become free.
![image](https://yakihonne.s3.ap-east-1.amazonaws.com/43baaf0c28e6cfb195b17ee083e19eb3a4afdfac54d9b6baf170270ed193e34c/files/1739263493643-YAKIHONNES3.jpg)
Can’t wait to join the next Sats’n’facts. Maybe Barcelona!?
* * *
Originally article published by @BitPopArt on @YakiHonne: https://yakihonne.com/article/naddr1qvzqqqr4gupzqsa64uxz3ek0kx2mzlhqs0seavay4l06c4xek6a0zup8pmge8c6vqq242en0tukk7u2fwe8kkjrpv3ykgjtzwfsk5hmmfyp
#art #nostr #ThaiNostrich #artonnostr #artstr
originally posted at https://stacker.news/items/884327
-
![](/static/nostr-icon-purple-64x64.png)
@ df478568:2a951e67
2025-02-13 02:04:30
In the very early days, Nostr was pretty much troll-free. It was one of my favorite things about it, but I suspected this was only the case because only hardcore bitcoiners were on there. Now that the network is growing, there is more diversity of ideas. Ideology tends to make people mean. Mean people suck, so I try to remain respectful even when I disagree with others. I am not a fan of communism, but enjoy reading other perspectives. I do not wish to censor any speech at all, especially speech I do not agree with.
The freedom of speech is not about the First Amendment to me. It's about creating a space that is safe for free speech. Platforms are not a safe space for free speech. The safety of free speech is in peril on platforms. Nostr is a space where people can speak freely in an open Internet-connected society. There is some speech I would rather not see. I wish some people did not say certain things, but I do not want to stop them.
If we censor the worst speech, the speech does not go away. It merely goes underground and creates bad speech silos where people hide their true selves and go only speak to people just like them. Censorship is like prison for ideas. Prisoners improve their robbery skills because they exchange ideas with other criminals. It's like a conference for criminals. Fascists get more fascist when they only have permission to talk to fellow fascists. Communists get more communist when they can only talk to other communists. Ideas are a marketplace. May the best ideas win.
Nostr allows me to speak with people about topics I might not otherwise get a chance to speak about. I never see any pro-communist posts on Twitter. That's a problem because communists also don't see me. I also never saw sex workers talk about anything other than kinky-boinky talk on Twitter. Nostr brings the humanity back to sex workers. Sex workers are people too. They have interesting ideas and take [interesting photos]([take interesting pictures](nostr:note1svl3ne6l7dkxx4gckqsttx24nva7m37ynam7rvgq4zu83u9wl2ks86ahwx). )
On the [What is Money Show](https://fountain.fm/episode/DYPKRSkN11EmYDhrhH0H), Rabble says he wants to have Christians have a Christian-only Nostr network and sex workers to have a sex worker-only network. It's a fun idea, but I'm not convinced this would be a good thing. What if Jesus was on the Christian Nostr, but Mary Magdalen was on sex worker Nostr? I suspect Christians talking to sex workers is not such a bad thing. **What would Jesus do?**
Here is a conversation I had with a stripper on nostr. You can read the original [here](nostr:note1wxalrm6tpftrrs9rmzvv4e5gpnamkmfuu6fpwu9gs3wtudeegd7qpd5l0r) but I have reprinted it on the Habla and Substack.
I don't believe it's possible for a community or state to abolish private property when the private property can be distilled into 12 secret random words. Ironically, bitcoin does give the means of monetary production to the people, but this is a moot point given that individual people do not have equal ability. Very few people had sufficient knowledge to mine bitcoin when the block reward was 50 bitcoin every 10 minutes. Therefore, even though anybody could technically produce bitcoin blocks, very few people can.
The same is true for saving. Even if we could defy human nature with schemes such as this, it would not solve wealth inequality. Most people spend money like drunken sailors. If everyone had the same income that could not be debased or stolen, broke people would still exist because people do not have equal money management skills.
That is why I prefer capitalism with a non-socialist monetary system. The United States, contrary to popular belief, is not a capitalist economic system. It's a mixed economy where some people (banks and government) get money without doing any work aside from fudging numbers.
A bank does not save capital to buy a house. Banks print money to buy homes and collect rent from homeowners. It's an accounting trick, not capitalism.
Here's how capitalism works according to economist, Russ Roberts.
https://youtu.be/ljULutAUL7o?si=bLPY5IvwwMQvfXJK
npub1marc26z8nh3xkj5rcx7ufkatvx6ueqhp5vfw9v5teq26z254renshtf3g0
https://mempool.marc26z.com/block/00000000000000000001fa33d3d7750ed315d94e3c1def6512281b33bece333b
-
![](/static/nostr-icon-purple-64x64.png)
@ 97c70a44:ad98e322
2025-02-13 02:03:33
Everyone knows that relays are central to how nostr works - they're even in the name: Notes and Other Stuff Transmitted by *Relays*. As time goes on though, there are three other letters which are becoming conspicuously absent from our beloved and ambiguously pronounceable acronym - "D", "V", and "M".
The hype cycle for DVMs seems to have reached escape velocity in a way few other things have - zaps being the possible exception. But *what* exactly DVMs are remains something of a mystery to many nostr developers - and how to build one may as well be written on clay tablets.
This blog post is designed to address that - below is a soup to nuts (no nutzaps though) guide to building a DVM flow, both from the client and the server side.
Here's what we'll be covering:
- Discovering DVM metadata
- Basic request/response flow
- Implementing a minimal example
Let's get started!
# DVM Metadata
First of all, it's helpful to know how DVMs are reified on the nostr network. While not strictly necessary, this can be useful for discovering DVMs and presenting them to users, and for targeting specific DVMs we want a response from.
[NIP 89](https://github.com/nostr-protocol/nips/blob/master/89.md) goes into this in more detail, but the basic idea is that anyone can create a `kind 31990` "application handler" event and publish it to the network with their own (or a dedicated) public key. This handler was originally intended to advertise clients, but has been re-purposed for DVM listings as well.
Here's what the "Fluffy Frens" handler looks like:
```json
{
"content": "{\"name\": \"Fluffy Frens\", \"picture\": \"https://image.nostr.build/f609311532c470f663e129510a76c9a1912ae9bc4aaaf058e5ba21cfb512c88e.jpg\", \"about\": \"I show recent notes about animals\", \"lud16\": \"discovery_content_fluffy@nostrdvm.com\", \"supportsEncryption\": true, \"acceptsNutZaps\": false, \"personalized\": false, \"amount\": \"free\", \"nip90Params\": {\"max_results\": {\"required\": false, \"values\": [], \"description\": \"The number of maximum results to return (default currently 100)\"}}}",
"created_at": 1738874694,
"id": "0aa8d1f19cfe17e00ce55ca86fea487c83be39a1813601f56f869abdfa776b3c",
"kind": 31990,
"pubkey": "7b7373dd58554ff4c0d28b401b9eae114bd92e30d872ae843b9a217375d66f9d",
"sig": "22403a7996147da607cf215994ab3b893176e5302a44a245e9c0d91214e4c56fae40d2239dce58ea724114591e8f95caed2ba1a231d09a6cd06c9f0980e1abd5",
"tags": [
["k", "5300"],
["d", "198650843898570c"]
]
}
```
This event is rendered in various clients using the kind-0-style metadata contained in the `content` field, allowing users to browse DVMs and pick one for their use case. If a user likes using a particular DVM, they might publish a `kind 31989` "application recommendation", which other users can use to find DVMs that are in use within their network.
Note the `k` tag in the handler event - this allows DVMs to advertise support only for specific job types. It's also important to note that even though the spec doesn't cover relay selection, most clients use the publisher's `kind 10002` event to find out where the DVM listens for events.
If this looks messy to you, you're right. See [this PR](https://github.com/nostr-protocol/nips/pull/1728) for a proposal to split DVMs out into their own handler kind, give them a dedicated pubkey along with dedicated metadata and relay selections, and clean up the data model a bit.
# DVM Flow
Now that we know what a DVM looks like, we can start to address how they work. My explanation below will elide some of the detail involved in [NIP 90](https://github.com/nostr-protocol/nips/blob/master/90.md) for simplicity, so I encourage you to read the complete spec.
The basic DVM flow can be a little (very) confusing to work with, because in essence it's a request/response paradigm, but it has some additional wrinkles.
First of all, the broker for the request isn't abstracted away as is usually the case with request/response flows. Regular HTTP requests involve all kinds of work in the background - from resolving domain names to traversing routers, VPNs, and ISP infrastructure. But developers don't generally have to care about all these intermediaries.
With DVMs, on the other hand, the essential complexity of relay selection can't simply be ignored. DVMs often advertise their own relay selections, which should be used rather than a hard-coded or randomly chosen relay to ensure messages are delivered. The benefit of this is that DVMs can avoid censorship, just as users can, by choosing relays that are willing to broker their activity. DVMs can even select multiple relays to broker requests, which means that clients might receive multiple copies of the same response.
Secondly, the DVM request/response model is far more fluid than is usually the case with request/response flows. There are a set of standard practices, but the flow is flexible enough to admit exceptions to these conventions for special use cases. Here are some examples:
- Normally, clients p-tag the DVM they wish to address. But if a client isn't picky about where a response comes from, they may choose to send an open request to the network and collect responses from multiple DVMs simultaneously.
- Normally, a client creates a request before collecting responses using a subscription with an e-tag filter matching the request event. But clients may choose to skip the request step entirely and collect responses from the network that have already been created. This can be useful for computationally intensive tasks or common queries, where a single result can be re-used multiple times.
- Sometimes, a DVM may respond with a `kind 7000` job status event to let clients know they're working on the request. This is particularly useful for longer-running tasks, where feedback is useful for building a responsive UX.
- There are also some details in the spec regarding monetization, parameterization, error codes, encryption, etc.
# Example DVM implementation
For the purposes of this blog post, I'll keep things simple by illustrating the most common kind of DVM flow: a `kind 5300` [content discovery](https://www.data-vending-machines.org/kinds/5300/) request, addressed to a particular DVM. If you're interested in other use cases, please visit [data-vending-machines.org](https://data-vending-machines.org) for additional documented kinds.
The basic flow looks like this:
- The DVM starts by listening for `kind 5300` job requests on some relays it has selected and advertised via NIP 89 (more on that later)
- A client creates a request event of `kind 5300`, p-tagged with the DVM's pubkey and sends it to the DVM's relay selections.
- The DVM receives the event and processes it, issuing optional `kind 7000` job status events, and eventually issuing a `kind 6300` job result event (job result event kinds are always 1000 greater than the request's kind).
- The client listens to the same relays for a response, and when it comes through does whatever it wants to with it.
Here's a swimlane diagram of that flow:
![DVM Flow](https://coracle-media.us-southeast-1.linodeobjects.com/dvmflow.png)
To avoid massive code samples, I'm going to implement our DVM entirely using nak (backed by the power of the human mind).
The first step is to start our DVM listening for requests that it wants to respond to. Nak's default pubkey is `79be667ef9dcbbac55a06295ce870b07029bfcdb2dce28d959f2815b16f81798`, so we'll only listen for requests sent to nak.
```bash
nak req -k 5300 -t p=79be667ef9dcbbac55a06295ce870b07029bfcdb2dce28d959f2815b16f81798
```
This gives us the following filter:
```json
["REQ","nak",{"kinds":[5300],"#p":["79be667ef9dcbbac55a06295ce870b07029bfcdb2dce28d959f2815b16f81798"]}]
```
To open a subscription to `nos.lol` and stream job requests, add `--stream wss://nos.lol` to the previous request and leave it running.
Next, open a new terminal window for our "client" and create a job request. In this case, there's nothing we need to provide as `input`, but we'll include it just for illustration. It's also good practice to include an `expiration` tag so we're not asking relays to keep our ephemeral requests forever.
```bash
nak event -k 5300 -t p=79be667ef9dcbbac55a06295ce870b07029bfcdb2dce28d959f2815b16f81798 -t expiration=$(( $(date +%s) + 30 )) -t input=hello
```
Here's what comes out:
```json
{
"kind": 5300,
"id": "0e419d0b3c5d29f86d2132a38ca29cdfb81a246e1a649cb2fe1b9ed6144ebe30",
"pubkey": "79be667ef9dcbbac55a06295ce870b07029bfcdb2dce28d959f2815b16f81798",
"created_at": 1739407684,
"tags": [
["p", "79be667ef9dcbbac55a06295ce870b07029bfcdb2dce28d959f2815b16f81798"],
["expiration", "1739407683"],
["input", "hello"]
],
"content": "",
"sig": "560807548a75779a7a68c0ea73c6f097583e2807f4bb286c39931e99a4e377c0a64af664fa90f43e01ddd1de2e9405acd4e268f1bf3bc66f0ed5a866ea093966"
}
```
Now go ahead and publish this event by adding `nos.lol` to the end of your `nak` command. If all goes well, you should see your event pop up in your "dvm" subscription. If so, great! That's half of the flow.
Next, we'll want our client to start listening for `kind 6300` responses to the request. In your "client" terminal window, run:
```bash
nak req -k 6300 -t e=<your-eventid-here> --stream nos.lol
```
Note that if you only want to accept responses from the specified DVM (a good policy in general to avoid spam) you would include a `p` tag here. I've omitted it for brevity. Also notice the `k` tag specifies the request kind plus `1000` - this is just a convention for what kinds requests and responses use.
Now, according to [data-vending-machines.org](https://www.data-vending-machines.org/kinds/5300/), `kind 5300` responses are supposed to put a JSON-encoded list of e-tags in the `content` field of the response. Weird, but ok. Stop the subscription in your "dvm" terminal and respond to your "client" with a recommendation to read my first note:
```bash
nak event -k 6300 -t e=a65665a3a4ca2c0d7b7582f4f0d073cd1c83741c25a07e98d49a43e46d258caf -c '[["e","214f5898a7b75b7f95d9e990b706758ea525fe86db54c1a28a0f418c357f9b08","wss://nos.lol/"]]' nos.lol
```
Here's the response event we're sending:
```json
{
"kind": 6300,
"id": "bb5f38920cbca15d3c79021f7d0051e82337254a84c56e0f4182578e4025232e",
"pubkey": "79be667ef9dcbbac55a06295ce870b07029bfcdb2dce28d959f2815b16f81798",
"created_at": 1739408411,
"tags": [
["e", "a65665a3a4ca2c0d7b7582f4f0d073cd1c83741c25a07e98d49a43e46d258caf"]
],
"content": "[[\"e\",\"214f5898a7b75b7f95d9e990b706758ea525fe86db54c1a28a0f418c357f9b08\",\"wss://nos.lol/\"]]",
"sig": "a0fe2c3419c5c54cf2a6d9a2a5726b2a5b766d3c9e55d55568140979354003aacb038e90bdead43becf5956faa54e3b60ff18c0ea4d8e7dfdf0c8dd97fb24ff9"
}
```
Notice the `e` tag targets our original request.
This should result in the job result event showing up in our "client" terminal. Success!
If something isn't working, I've also create a video of the full process with some commentary which you can find [here](https://coracle-media.us-southeast-1.linodeobjects.com/nakflow.mov).
Note that in practice, DVMs can be much more picky about the requests they will respond to, due to implementations failing to follow [Postel's law](https://en.wikipedia.org/wiki/Robustness_principle). Hopefully that will improve over time. For now, here are a few resources that are useful when working with or developing DVMs:
- [dvmdash](https://dvmdash.live)
- [data-vending-machines.org](https://data-vending-machines.org)
- [noogle](https://noogle.lol/)
- [nostrdvm](https://github.com/believethehype/nostrdvm)
# Conclusion
I started this post by hinting that DVMs might be as fundamental as relays are to making nostr work. But (apart from the fact that we'd end up with an acronym like DVMNOSTRZ+*, which would only exascerbate the pronounciation wars (if such a thing were possible)), that's not exactly true.
DVMs have emerged as a central paradigm in the nostr world because they're a generalization of a design pattern unique to nostr's architecture - but which exists in many other places, including NIP 46 signer flows and NIP 47 wallet connect. Each of these sub-protocols works by using relays as neutral brokers for requests in order to avoid coupling services to web addresses.
This approach has all kinds of neat benefits, not least of which is allowing service providers to host their software without having to accept incoming TCP connections. But it's really an emergent property of relays, which not only are useful for brokering communication between users (aka storing events), but also brokering communication between machines.
The possibilities of this architecture have only started to emerge, so be on the lookout for new applications, and don't be afraid to experiment - just please, don't serialize json inside json 🤦♂️
-
![](/static/nostr-icon-purple-64x64.png)
@ ac6f9572:8a6853dd
2025-02-13 01:56:23
![](https://m.stacker.news/77367)
Date: 02/12/2025
One of the most efficient options to expand your knowledge and truly connect with people actively working in the space is through direct interactions, whether they’re happening at large conferences or smaller, semi-official meetups. But let’s be honest: finding all meaningful events can be a mess.
Take, for example, the '[BTC Events Map](https://docs.google.com/spreadsheets/d/1oni0QAHb2XYOL5gFVKHHGhG8w_HY5GDGBhdQ4SSrCZg/edit?gid=0&ref=europeanbitcoiners.com#gid=0),’ which already lists over 550 Bitcoin-only gatherings worldwide. This simple but very useful resource, put together by Satlantis, can help many of us plan our trips throughout the year. However, if you don’t know about its existence and rely solely on a search engine—whether Google or Brave—you’ll likely end up frustrated (and unfortunately missing many great opportunities to meet with others and learn).
Search for '_bitcoin events_,' and you’ll get a mix of irrelevant crypto, fintech, and Web3 results, with Bitcoin-related stuff buried somewhere in the middle, if at all.. Well, it’s really tough to find what you’re actually looking for.
That’s why word of mouth and trusted communities are so important. Sometimes, the best way to hear about an event is directly from people you know.
**One of those that flew under my radar was** [**SatsNFacts**](https://satsnfacts.btc.pub/?ref=europeanbitcoiners.com)**.**
It wasn’t listed on many typical event aggregators or any big news-promo sites. It mostly spread peer-to-peer and through the main channels on [Nostr](https://njump.me/npub1yrnuj56rnen08zp2h9h7p74ghgjx6ma39spmpj6w9hzxywutevsst7k5cx?ref=europeanbitcoiners.com).
I was ‘_lucky_’ enough to hear about it just in time to plan the trip from Europe to Thailand. Now, I’d like to briefly share my experience with you—everything that, in my opinion, made this event truly stand out.
**A Journey to Southeast Asia: Where Builders and Artists Collide.**
--------------------------------------------------------------------
Approximately 10,176 kilometers, 14 hours of travel, and finally three days spent at SatsNFacts—"Thailand’s first Bitcoin Technical Unconference”.
The event ran from February 8 to 10 in Chiang Mai (the largest city in northern Thailand). Held at Weave Artisan Society, a 700 sq.m venue that used to be an ice factory, it smoothly combined pleasant outdoors with an industrial-style, two-floor indoor area, creating a unique and very practical setup.
While its was billed as a “_Technical Unconference_,” in practice it nicely connected the developer-based ecosystem with different aspects of culture and art.
Each day, from 10 am to 6 pm, the agenda—shaped directly by attendees—was packed with various presentations, group chats, learning session, hackathons, and actionable workshops.
With many options available (around 10-20 topics per day), I couldn’t attend everything, but here are a few more technical sessions I joined and found especially worthwhile:
* **Liana Workshop** (long-term security, recovery, and inheritance),
* **TollGates** ([streaming sats for internet access](https://primal.net/e/naddr1qvzqqqr4gupzpwa4mkswz4t8j70s2s6q00wzqv7k7zamxrmj2y4fs88aktcfuf68qq2nz63h0969vn2xwse9j3n5ge4xsdr2ddc4j0g960h?ref=europeanbitcoiners.com)),
* **Open Vault** (enterprise wallet interface),
* **Yaki Honne** ([decentralized media](https://yakihonne.com/?ref=europeanbitcoiners.com)),
* **Nostr Proxies** (Epoxy, WebSocket and relay monetization).
* **Silent payments** (simplified payment experiences without compromising privacy).
As mentioned earlier, SatsNFacts wasn’t just about Bitcoin tech. Some topics focused on community aspects as well. Two discussions I joined highlighted Bitcoin adoption ⚡ in for example Bali and Thailand, showing how sound money, integrity, and consistent work can solve real problems in these regions. Impressive stuff! Here you can learn more:
* [HuaiPhueng](https://geyser.fund/project/huaiphuengproject?hero=geyser&ref=europeanbitcoiners.com) on Geyser + "Bitcoin City" (their [short video](https://www.youtube.com/watch?feature=shared&v=211meP4liIo&ref=europeanbitcoiners.com)).
* Bitcoin Indonesia & Bitcoin House Bali ([all in one on GitHub](https://github.com/bitcoinindo21?ref=europeanbitcoiners.com))
Now, the art gallery, to continue with less technical aspects of SatsNFacts 🎨
This nicely-organized space located on the ground floor, near cozy coworking and networking spots, was for me a real gem. Indeed, adding a creative vibe to the entire event.
Around 30 unique works from local and international artists were on display, all inspired by themes of freedom and privacy. Though I don’t see myself as a typical _'artist_', I was honored to have some of my own pieces exhibited there as well (a short video below).
* * *
One of the highlights was meeting local Thai artists, especially [Siritravelsketch](https://njump.me/npub14lqzjhfvdc9psgxzznq8xys8pfq8p4fqsvtr6llyzraq90u9m8fqevhssu?ref=europeanbitcoiners.com), who travelled six hours by train just one way to attend two days of the event.
Her stunning paintings, created using just a bamboo stick and ink, are deeply inspired by Thai architecture and culture. While some of her pre-prepared pieces hung in the gallery, she also painted a few new works on the spot during her visit. Truly spectacular!
![SatsNFacts 2025 - Siritravelsketch](https://m.stacker.news/77368)
* * *
I also had the chance to reconnect with [Satoshi Builds](https://njump.me/npub19m7m3rs66pfdn4ewhrm8slh60ukyxgrylaa03m73wa40j39lc03syq4gfu?ref=europeanbitcoiners.com), who made many great sketches during this event, and with [BitPopArt](https://njump.me/npub1gwa27rpgum8mr9d30msg8cv7kwj2lhav2nvmdwh3wqnsa5vnudxqlta2sz?ref=europeanbitcoiners.com), a Dutch artist who, just like me, chosen a nomadic lifestyle yet has been clearly considering Thailand his 'second home' as well for several years now. By the way, ✍️ here's his short summary of the event, focusing more on the artistic side of SatsNFacts: "[Art exhibition in Chiang Mai](https://bitpopart.com/2025/02/11/art-exhibition-in-chiang-mai/?ref=europeanbitcoiners.com)".
All in all, spending my time in many meaningful conversations and seeing so many deep artworks in one place filled me with hope and positive energy. THANK YOU, EVERYONE!
![](https://m.stacker.news/77370)
* * *
(presented artworks by for example: [Agi Choote](https://njump.me/npub1tlacuxmtv2wqud9qz0ujnr4mqavmnz3ayspfj93jr40tgf2mvu6seax3y7?ref=europeanbitcoiners.com), [Samhain](https://njump.me/npub1df47g7a39usamq83aula72zdz23fx9xw5rrfmd0v6p9t20n5u0ss2eqez9?ref=europeanbitcoiners.com), [Zed Erwan](https://njump.me/npub1r2sah0htqnw7xrs70gq00m48vp25neu8ym2n2ghrny92dqqf7sest8hth0?ref=europeanbitcoiners.com), [Existing Sprinkles](https://njump.me/npub1f5kc2agn63ecv2ua4909z9ahgmr2x9263na36jh6r908ql0926jq3nvk2u?ref=europeanbitcoiners.com), AZA 21m, BitPopArt.)
* * *
Mr. Rabbit in Thailand...
-------------------------
Monday, the final evening, and SatsNFacts got one more item on its agenda rooted in creative expression and independent art.
Representing [Bitcoin FilmFest](https://x.com/bitcoinfilmfest?ref=europeanbitcoiners.com) (a grassroots project created by an amazing group of freedom fighters and activists 🐇🧡), since I was the only one from our team in Thailand, in one of the rooms upstairs, I put together a mini cinematic experience.
Seven trailers and eleven shorts, including for example:
* NO MORE INFLATION, HUMMINGBIRD, PARALLEL SPACE, UNBANKABLE, THE LEGEND OF LANDI (🎬 some of the trailers).
* BITCOIN A NEW HOPE, SATOSHI NAKAMOTO - THE CREATOR OF BITCOIN, MAXIS CLUB SHOW - CHAPTER ONE, THE GREATEST HEIST IN HISTORY, HODL, THE ANATOMY OF BITCOIN – GENESIS BLOCK (📺 some of the presented shorts)
With around 10-15 participants, the response was positive, and we ended up spending an extra 10-maybe-20 minutes discussing the challenges and opportunities in Bitcoin-powered filmmaking, as well as the upcoming edition of [BFF25](https://bitcoinfilmfest.com/bff25/?ref=europeanbitcoiners.com) (the annual festival we're organizing this May in Warsaw, Poland).
![SatsNFacts 2025 + Bitcoin FilmFest (mini cinematic experience, Thailand)](https://m.stacker.news/77369)
**Substance Over Hype. Gatherings That Matter.**
------------------------------------------------
SatsNFacts made a solid reminder that Bitcoin events can help build a truly sovereign future while bringing together developers and artistic souls alike.
The mix of technical depth and creative energy—free from the shiny gossip that floods many social channels—made it a truly meaningful experience.
> SatsNFacts set a high standard, and I hope to see more events like it in the future. More unconferences, more cultural and community-driven gatherings.
**Here's to more signal, less noise!!!**
Big congrats to everyone who made the first SatsNFacts happen 👏 Respect especially to the organizers! You pulled off something truly special!
* * *
_BTC Your Mind. Let it Beat._
_Şela_ @AZA_21M
💡
Did you enjoy this article? Zap me some sats. No amount is small :) Lightning wallet: `aza21m@getalby.com`
- - -
Original Article: https://europeanbitcoiners.com/sats-and-facts-short-coverage-of-the-first-bitcoin-unconference-in-thailand/
#english #opinion #events #bitcoin #nostr #freedom #conference #siamstr #asia #thailand
-
![](/static/nostr-icon-purple-64x64.png)
@ ac6f9572:8a6853dd
2025-02-13 01:55:20
# Freedom Tech, Privacy, Sound Money, and Culture: How to Find Your Tribe?
> Keeping up with everything happening in Bitcoin isn’t easy, even if you’ve been around for a while. The pace is relentless: stream of events, discussions, projects, and updates, not to mention the noise on social media...
![](https://m.stacker.news/77367)
Date: 02/12/2025
One of the most efficient options to expand your knowledge and truly connect with people actively working in the space is through direct interactions, whether they’re happening at large conferences or smaller, semi-official meetups. But let’s be honest: finding all meaningful events can be a mess.
Take, for example, the '[BTC Events Map](https://docs.google.com/spreadsheets/d/1oni0QAHb2XYOL5gFVKHHGhG8w_HY5GDGBhdQ4SSrCZg/edit?gid=0&ref=europeanbitcoiners.com#gid=0),’ which already lists over 550 Bitcoin-only gatherings worldwide. This simple but very useful resource, put together by Satlantis, can help many of us plan our trips throughout the year. However, if you don’t know about its existence and rely solely on a search engine—whether Google or Brave—you’ll likely end up frustrated (and unfortunately missing many great opportunities to meet with others and learn).
Search for '_bitcoin events_,' and you’ll get a mix of irrelevant crypto, fintech, and Web3 results, with Bitcoin-related stuff buried somewhere in the middle, if at all.. Well, it’s really tough to find what you’re actually looking for.
That’s why word of mouth and trusted communities are so important. Sometimes, the best way to hear about an event is directly from people you know.
**One of those that flew under my radar was** [**SatsNFacts**](https://satsnfacts.btc.pub/?ref=europeanbitcoiners.com)**.**
It wasn’t listed on many typical event aggregators or any big news-promo sites. It mostly spread peer-to-peer and through the main channels on [Nostr](https://njump.me/npub1yrnuj56rnen08zp2h9h7p74ghgjx6ma39spmpj6w9hzxywutevsst7k5cx?ref=europeanbitcoiners.com).
I was ‘_lucky_’ enough to hear about it just in time to plan the trip from Europe to Thailand. Now, I’d like to briefly share my experience with you—everything that, in my opinion, made this event truly stand out.
**A Journey to Southeast Asia: Where Builders and Artists Collide.**
--------------------------------------------------------------------
Approximately 10,176 kilometers, 14 hours of travel, and finally three days spent at SatsNFacts—"Thailand’s first Bitcoin Technical Unconference”.
The event ran from February 8 to 10 in Chiang Mai (the largest city in northern Thailand). Held at Weave Artisan Society, a 700 sq.m venue that used to be an ice factory, it smoothly combined pleasant outdoors with an industrial-style, two-floor indoor area, creating a unique and very practical setup.
While its was billed as a “_Technical Unconference_,” in practice it nicely connected the developer-based ecosystem with different aspects of culture and art.
Each day, from 10 am to 6 pm, the agenda—shaped directly by attendees—was packed with various presentations, group chats, learning session, hackathons, and actionable workshops.
With many options available (around 10-20 topics per day), I couldn’t attend everything, but here are a few more technical sessions I joined and found especially worthwhile:
* **Liana Workshop** (long-term security, recovery, and inheritance),
* **TollGates** ([streaming sats for internet access](https://primal.net/e/naddr1qvzqqqr4gupzpwa4mkswz4t8j70s2s6q00wzqv7k7zamxrmj2y4fs88aktcfuf68qq2nz63h0969vn2xwse9j3n5ge4xsdr2ddc4j0g960h?ref=europeanbitcoiners.com)),
* **Open Vault** (enterprise wallet interface),
* **Yaki Honne** ([decentralized media](https://yakihonne.com/?ref=europeanbitcoiners.com)),
* **Nostr Proxies** (Epoxy, WebSocket and relay monetization).
* **Silent payments** (simplified payment experiences without compromising privacy).
As mentioned earlier, SatsNFacts wasn’t just about Bitcoin tech. Some topics focused on community aspects as well. Two discussions I joined highlighted Bitcoin adoption ⚡ in for example Bali and Thailand, showing how sound money, integrity, and consistent work can solve real problems in these regions. Impressive stuff! Here you can learn more:
* [HuaiPhueng](https://geyser.fund/project/huaiphuengproject?hero=geyser&ref=europeanbitcoiners.com) on Geyser + "Bitcoin City" (their [short video](https://www.youtube.com/watch?feature=shared&v=211meP4liIo&ref=europeanbitcoiners.com)).
* Bitcoin Indonesia & Bitcoin House Bali ([all in one on GitHub](https://github.com/bitcoinindo21?ref=europeanbitcoiners.com))
Now, the art gallery, to continue with less technical aspects of SatsNFacts 🎨
This nicely-organized space located on the ground floor, near cozy coworking and networking spots, was for me a real gem. Indeed, adding a creative vibe to the entire event.
Around 30 unique works from local and international artists were on display, all inspired by themes of freedom and privacy. Though I don’t see myself as a typical _'artist_', I was honored to have some of my own pieces exhibited there as well (a short video below).
* * *
One of the highlights was meeting local Thai artists, especially [Siritravelsketch](https://njump.me/npub14lqzjhfvdc9psgxzznq8xys8pfq8p4fqsvtr6llyzraq90u9m8fqevhssu?ref=europeanbitcoiners.com), who travelled six hours by train just one way to attend two days of the event.
Her stunning paintings, created using just a bamboo stick and ink, are deeply inspired by Thai architecture and culture. While some of her pre-prepared pieces hung in the gallery, she also painted a few new works on the spot during her visit. Truly spectacular!
![SatsNFacts 2025 - Siritravelsketch](https://m.stacker.news/77368)
* * *
I also had the chance to reconnect with [Satoshi Builds](https://njump.me/npub19m7m3rs66pfdn4ewhrm8slh60ukyxgrylaa03m73wa40j39lc03syq4gfu?ref=europeanbitcoiners.com), who made many great sketches during this event, and with [BitPopArt](https://njump.me/npub1gwa27rpgum8mr9d30msg8cv7kwj2lhav2nvmdwh3wqnsa5vnudxqlta2sz?ref=europeanbitcoiners.com), a Dutch artist who, just like me, chosen a nomadic lifestyle yet has been clearly considering Thailand his 'second home' as well for several years now. By the way, ✍️ here's his short summary of the event, focusing more on the artistic side of SatsNFacts: "[Art exhibition in Chiang Mai](https://bitpopart.com/2025/02/11/art-exhibition-in-chiang-mai/?ref=europeanbitcoiners.com)".
All in all, spending my time in many meaningful conversations and seeing so many deep artworks in one place filled me with hope and positive energy. THANK YOU, EVERYONE!
![](https://m.stacker.news/77370)
* * *
(presented artworks by for example: [Agi Choote](https://njump.me/npub1tlacuxmtv2wqud9qz0ujnr4mqavmnz3ayspfj93jr40tgf2mvu6seax3y7?ref=europeanbitcoiners.com), [Samhain](https://njump.me/npub1df47g7a39usamq83aula72zdz23fx9xw5rrfmd0v6p9t20n5u0ss2eqez9?ref=europeanbitcoiners.com), [Zed Erwan](https://njump.me/npub1r2sah0htqnw7xrs70gq00m48vp25neu8ym2n2ghrny92dqqf7sest8hth0?ref=europeanbitcoiners.com), [Existing Sprinkles](https://njump.me/npub1f5kc2agn63ecv2ua4909z9ahgmr2x9263na36jh6r908ql0926jq3nvk2u?ref=europeanbitcoiners.com), AZA 21m, BitPopArt.)
* * *
Mr. Rabbit in Thailand...
-------------------------
Monday, the final evening, and SatsNFacts got one more item on its agenda rooted in creative expression and independent art.
Representing [Bitcoin FilmFest](https://x.com/bitcoinfilmfest?ref=europeanbitcoiners.com) (a grassroots project created by an amazing group of freedom fighters and activists 🐇🧡), since I was the only one from our team in Thailand, in one of the rooms upstairs, I put together a mini cinematic experience.
Seven trailers and eleven shorts, including for example:
* NO MORE INFLATION, HUMMINGBIRD, PARALLEL SPACE, UNBANKABLE, THE LEGEND OF LANDI (🎬 some of the trailers).
* BITCOIN A NEW HOPE, SATOSHI NAKAMOTO - THE CREATOR OF BITCOIN, MAXIS CLUB SHOW - CHAPTER ONE, THE GREATEST HEIST IN HISTORY, HODL, THE ANATOMY OF BITCOIN – GENESIS BLOCK (📺 some of the presented shorts)
With around 10-15 participants, the response was positive, and we ended up spending an extra 10-maybe-20 minutes discussing the challenges and opportunities in Bitcoin-powered filmmaking, as well as the upcoming edition of [BFF25](https://bitcoinfilmfest.com/bff25/?ref=europeanbitcoiners.com) (the annual festival we're organizing this May in Warsaw, Poland).
![SatsNFacts 2025 + Bitcoin FilmFest (mini cinematic experience, Thailand)](https://m.stacker.news/77369)
**Substance Over Hype. Gatherings That Matter.**
------------------------------------------------
SatsNFacts made a solid reminder that Bitcoin events can help build a truly sovereign future while bringing together developers and artistic souls alike.
The mix of technical depth and creative energy—free from the shiny gossip that floods many social channels—made it a truly meaningful experience.
> SatsNFacts set a high standard, and I hope to see more events like it in the future. More unconferences, more cultural and community-driven gatherings.
**Here's to more signal, less noise!!!**
Big congrats to everyone who made the first SatsNFacts happen 👏 Respect especially to the organizers! You pulled off something truly special!
* * *
_BTC Your Mind. Let it Beat._
_Şela_ @AZA_21M
💡
Did you enjoy this article? Zap me some sats. No amount is small :) Lightning wallet: `aza21m@getalby.com`
- - -
Original Article: https://europeanbitcoiners.com/sats-and-facts-short-coverage-of-the-first-bitcoin-unconference-in-thailand/
#english #opinion #events #bitcoin #nostr #freedom #conference #siamstr #asia #thailand
originally posted at https://stacker.news/items/884317
-
![](/static/nostr-icon-purple-64x64.png)
@ 0000065e:9b5b4c75
2025-02-13 01:46:07
En el ámbito bitcoiner es muy habitual que el Estado se convierta en el blanco de las principales críticas, que se ve convertido así en el muñeco de paja al que dirigir nuestros palos. Pero no, en realidad es una piñata que está a punto de desmoronarse de los golpes que le pegan. Cada vez tengo más claro que gran parte de los movimientos "antiestatales", si no todos, están contribuyendo, consciente o inconscientemente, a los intereses de los políticos que nos han llevado a esta situación.
El Estado, con todos sus defectos, sigue siendo la principal unidad de ejercicio de la violencia organizada. Señalando al Estado como el origen de todos los males, no hacemos otra cosa que pegarnos un tiro en el pie, haciendo el caldo gordo a quienes trabajan para cercenar nuestras libertades.
Lo que está claro es que los políticos actuales, de boquilla firmes defensores del Estado, lo que están haciendo es provocar su colapso. Puede que estos políticos, o algunos de ellos, incluso no sean conscientes del todo, pero da igual, pues simplemente priman sus intereses personales, como hacemos todos, intentando aprovechar los incentivos que están encima de la mesa, con las reglas de juego que hemos ido asumiendo. No es que quieran más Estado o que pretendan dinamitarlo, tanto una cosa como otra no son más que las consecuencias de los incentivos que subyacen a nuestra forma de organizarnos en sociedad en el contexto actual. Albert Rivera, en una reciente charla con Iván Espinosa de los Monteros, aludía a esta idea criticando las [redes clientelares y de dependencia del Estado](https://youtu.be/AI7roBGtmvk?t=2709) que generan las actuales dinámicas políticas y adulteran el sistema democrático. Aunque, cabría dudar sobre si el propio “sistema democrático” tiene o no algo que ver con esta situación.
En cualquier caso, no es que la mayoría de políticos sean malvados por naturaleza, aunque algunos puedan realmente serlo; es irrelevante. Sus acciones no están motivadas por su maldad, ni por su ideología o su estupidez, sino, simple y llanamente, por sus intereses personales y los del grupo con el que los comparten.
Las ideologías que manejan los políticos se han convertido en nichos de mercado, en caladeros donde echar la caña a ver si pescan suficientes votos como para asegurarse su porvenir y el de los suyos. Es del todo irrelevante si se creen o no esas ideas que defienden con tanta vehemencia como ausencia de plausabilidad, o incluso si están a sueldo de intereses espurios. De cualquier forma, actuarán en función de lo que crean más conveniente para sus intereses personales y para que más peces caigan en sus redes. Véase, por ejemplo, como [Albert Rivera](https://www.youtube.com/watch?v=XrdCP3viocU), ahora que está fuera de la política, manifiesta que resulta evidente que el sistema de pensiones es una estafa piramidal, mientras que cuando estaba en política defendía lo contrario. O a [Errejón](https://www.youtube.com/watch?v=oZ0KfTsITh8), que sostenía la tesis de que no había denuncias falsas hasta que lo denunciaron a él.
Como digo, los políticos no son malvados o estúpidos (aunque haya algunos, o muchos, que entren en esas categorías), simplemente velan por sus intereses con las armas que tienen a su alcance y, como diría [Vito Corleone](https://youtu.be/Z1dRPt_4rZs?t=208), me es indiferente lo que un hombre haga para vivir. El problema es que esta dinámica está generando unas tendencias que se oponen al progreso que hemos generado como sociedad. Esas reglas de juego en la actualidad, convendremos, son inmorales, en el sentido de que actúan como una fuerza contraria a [nuestra supervivencia y potencia de actuar y obrar](https://maestreabogados.com/bitcoin-el-bien-y-el-mal/).
> *Este artículo forma parte de un trabajo más extenso en elaboración sobre las relaciones de Bitcoin con el Estado.*
-
![](/static/nostr-icon-purple-64x64.png)
@ 1cb14ab3:95d52462
2025-02-13 01:30:00
**Dirt, body weight. [125' x 2']**
*This project was exhibited in 2015 in Boulder, Colorado.*
---
### Artist Statement
“A Line Made By Walking” (2015) is a site-specific piece created in Boulder, CO, where my body weight etched a temporary line into the earth. This work pays homage to Richard Long’s seminal 1967 piece, where a simple act of walking through the landscape left a profound trace. In my version, the line created by my movement forces the viewer to engage with the impermanence of human intervention on the land. The project prompts a reflection on the subtle yet lasting impacts we have on the environment, even through seemingly minimal actions.
As part of my larger “[Rockway](https://hes.npub.pro/post/1708400183541/)” project, this case study explores the concept of ‘line’ in both literal and metaphorical ways. The line is not just a physical mark, but also a representation of time, movement, and the dialogue between the body and the land. Walking, in this context, becomes a way of marking time—an act that is as ephemeral as the mark it leaves behind. The work questions the tension between permanence and transience, asking the viewer to consider how we interact with the land, both intentionally and unknowingly, and how those interactions leave traces that may soon fade but never completely disappear.
---
### Photos
![](https://image.nostr.build/a4963d5b2f0572ca5bce112d436cef6a333b0b7515f87808ee1fa48bdfd3bd48.jpg)
![](https://image.nostr.build/7604da7b5498a3ed352cd1eff32d8a30c7664c886c01a5960f15958b79be40a8.jpg)
![](https://image.nostr.build/56f1a7a52ad2c8b6515b1d6fd5016807e2b3dab0dda529e99a861ae518f8f1bf.jpg)
![](https://image.nostr.build/0e94ba870bf4ebf595ecf450c83cfca11038a185dc319ae51660ad21b90cdddf.jpg)
![](https://image.nostr.build/27f8c1f8c471e9fbd3a7163bf18f8a8b1a51f21f1915b2da0db83a28610f0bd5.jpg)
![](https://image.nostr.build/a268a0ca3c6ca958e45b33fe2bc7afcee1907d5b44b20662aba8fa47e54bc7c9.jpg)
![](https://image.nostr.build/50aa09e9e81186af6a22835489b8a5c51fc7f5706471fe187dd6c8e44987169b.jpg)
---
#### More Land Art:
[Earth Lens Series](https://hes.npub.pro/post/1731091744332/)
["Looking Glass"](https://hes.npub.pro/post/1736304563962/)
["Het Bonhe"](https://hes.npub.pro/post/1720242458557/)
["Rockway"](https://hes.npub.pro/post/1708400183541/)
["Invasive"](https://hes.npub.pro/post/1719722211094/)
---
#### More from Hes
[Full Portfolio](https://hesart.npub.pro)
[Online Store](https://plebeian.market/community/hes@nostrplebs.com/hesmart-ym3fcufdfz)
[Artist Statements](https://hes.npub.pro/tag/art/)
[Travel Guides](https://hes.npub.pro/tag/travel/)
[Photography](https://hes.npub.pro/tag/photography)
[Writings](https://hes.npub.pro/tag/money)
---
*All images are credit of Hes, but you are free to download and use for any purpose. If you find joy from my art, please feel free to send a zap. Enjoy life on a Bitcoin standard.*
-
![](/static/nostr-icon-purple-64x64.png)
@ 20e7c953:3b8bcb21
2025-02-13 01:15:42
Biggest takeaway? We needed more hands to cover key roles - something to improve for next time, if there is any! That said, the strongest point was the organic networking and building, which set this apart from more structured, commercial conferences.
For future events - if any! - Hackathons will need dedicated time slots in the future, given the time constraints. The art side of things isn’t over yet—the exhibition will keep going for another month.
The event started a bit messy, but the quality of people made it flow naturally, creating a unique and engaging atmosphere. Overall, a great experience, and we’ll keep iterating for the next one.
We’ll send out a survey soon to gather more feedback. Huge thanks to our sponsors and media partners for making this happen - appreciate the support.
On Communities:
Lastly, while both commercial and less commercial events are needed there is something that doesn't beat Bitcoin Culture which are Bitcoin-only Meetups.
If we are in a position to give some advice: Make sure you engage with your local community since people behind it are most likely the ones who can able to bootstrap new comers while keeping trust and accountability in place.
Luckily today we have most tools to filter out those who are leeching off others PoW and the genuine ones trailblazing on their own terms. On our side definitely one of the biggest lessons learnt was to work with the local Communities for future events - regardless - this time we managed to get it done with our hands, will and not much else since *most* tools used have been FOSS and that's why we are here for !
With that said and while continuously gathering more feedback these coming days....
WHAT DID YOU ENJOYED THE MOST?
ANYTHING YOU DISLIKED?
**WHERE SHOULD WE HOST SATS N FACTS NEXT ?👀**
SUGGESTIONS AND FEEDBACK MAILBOX IS OPEN 📬
Onwards 🫡
-
![](/static/nostr-icon-purple-64x64.png)
@ c582af78:698069cc
2025-02-13 01:04:26
# **The Nine Orders of Angels: A Guide to the Celestial Hierarchy**
When we think of angels, we often picture winged figures in flowing robes, guiding and protecting humanity. But the biblical and theological reality is far more complex—and often stranger—than these familiar depictions.
The word *angel* comes from the Greek *angelos*, meaning “messenger,” but in scripture, angels serve a wide range of roles beyond delivering divine messages. Some are warriors wielding swords and leading celestial armies, others uphold the very throne of God, and some appear as multi-winged, multi-eyed beings beyond human comprehension.
To bring order to this celestial realm, theologians—most notably Thomas Aquinas—classified angels into a hierarchy of **nine types**, divided into **three orders** based on their function and proximity to God.
- **The lowest order** interacts with humanity.
- **The middle order** governs spiritual and cosmic forces.
- **The highest order** exists solely to serve and glorify God.
Today, we explore these **nine ranks of angels**—from the familiar to the truly otherworldly.
---
## **I. The Third Order: Angels Who Interact with Humanity**
*(The lowest tier of angels, closest to humans, acting as messengers and protectors.)*
### **1. Angels – The Messengers**
https://image.nostr.build/b6462b67e14c8780896f465b664a521cdcdef7eb4b4314669b8d219aa36964c5.jpg
These are the angels most commonly associated with divine guidance. According to Aquinas, every person has a **guardian angel**—an unseen protector guiding them through life.
In *Genesis 28:12*, Jacob’s vision of a ladder stretching to Heaven shows angels ascending and descending, delivering messages and fulfilling divine commands. Some, like those who visited Abraham, even appeared as ordinary men, without wings or supernatural radiance.
### **2. Archangels – The Divine Enforcers**
https://image.nostr.build/af8799efb61c5a64e958450bcd5aee55d2cade931cfc5ca7f0ae8745ccd4c45a.jpg
Archangels carry out the most crucial missions in scripture. Gabriel announced the birth of Jesus to Mary, while Michael led the charge against Satan in the war for Heaven.
Though only **Michael** is explicitly called an archangel in the Bible, tradition assigns this title to others, including **Raphael** and **Uriel**. Archangels serve as warriors and heralds, executing God’s most urgent decrees.
### **3. Principalities – Guardians of Nations**
https://image.nostr.build/bc7cd78acb656be6c946da32244bfb9ecdfe9a7d1bd80e47eca764cae4a88b95.jpg
Principalities oversee nations, cities, and communities, influencing their spiritual well-being. While they are not explicitly named in scripture, *Colossians 1:16* references “thrones, dominions, principalities, and powers.”
Tradition suggests that Principalities guide earthly leaders, strengthening them in times of crisis—and perhaps even aiding biblical figures like King David in battle.
---
## **II. The Second Order: The Heavenly Governors**
*(These angels reside in Heaven but influence earthly affairs, ensuring divine order is maintained.)*
### **4. Powers – The Celestial Warriors**
https://image.nostr.build/1768abcbaefb2d1d21654a869b356d86a45d76a82197b9568528d4d4b9f0ef69.jpg
Powers act as Heaven’s **military defenders**, guarding the spiritual realm from demonic forces. They are often depicted in armor, wielding weapons as they engage in cosmic battles.
According to Christian tradition, Powers also **escort souls to Heaven**, ensuring their safe passage after death. Some believe that the battle between good and evil plays out, in part, through these celestial warriors.
### **5. Virtues – The Miracle Workers**
https://image.nostr.build/b9a1e52f1dd4ef0f7e7dd198d81e7cd171eede8a64a40cac8176e12a5419aeba.jpg
Virtues are associated with **miracles and nature**, regulating celestial phenomena and assisting in divine interventions.
In Christian tradition, the two angels present at **Christ’s Ascension** are often considered Virtues, manifesting God’s power on Earth.
### **6. Dominions – The Angelic Rulers**
https://image.nostr.build/0900d97bf545736e5edc1521f46a8afbf0e93fd81e472c88a56744ff0f56ce48.jpg
Dominions do not typically interact with humans directly. Instead, they act as **commanders**, overseeing lower angels and ensuring divine order is maintained.
They are described as serene, wise beings, often depicted holding golden staffs and orbs, symbolizing their authority and their close relationship with God.
---
## **III. The First Order: The Angels Closest to God**
*(These angels exist solely to worship and serve God, residing in the highest realms of Heaven.)*
### **7. Thrones – The Wheels of God’s Chariot**
https://image.nostr.build/d9f1e465129b138f4f960ee43ee9e06ceb3fd6f57e9658cd275e1ac1576b3c02.jpg
Among the most mysterious angelic beings, Thrones are described in *Ezekiel’s vision* as **wheels covered in eyes, spinning within wheels**:
> *“As I looked, I saw a wheel on the ground beside each creature with its four faces... Their rims were full of eyes all around. Wherever the spirit would go, they would go, because the spirit of the living creatures was in the wheels.”*
> — *Ezekiel 1:15-21*
Thrones serve as **God’s chariot**, supporting His throne and executing divine justice. Their strange, abstract form symbolizes stability and divine order.
### **8. Cherubim – The Guardians of Glory**
https://image.nostr.build/e921ad4c32f56ebbb8f1bcb1ca2bc6eed1c736ec896429e008fc5b71cf2fd151.jpg
Cherubim have been drastically misrepresented in art. Far from the **plump, childlike figures** seen in Renaissance paintings, the **biblical Cherubim** are **fearsome beings**.
In *Ezekiel 10*, they are described as having **four faces**—a man, a lion, an ox, and an eagle—along with **four wings**.
They also appear in *Genesis 3:24*, where they **guard the entrance to Eden with flaming swords** after Adam and Eve’s expulsion.
https://image.nostr.build/f51286d4f35d9d6e85d8559600188ecc89a0969c3985814cae56cd230ea5db00.jpg
Aquinas even suggested that **Satan himself was a fallen Cherub**. This theory is supported by *Ezekiel 28*, which describes an angelic being cast down from God’s presence:
> *“You were anointed as a guardian cherub... You were blameless in your ways until wickedness was found in you... So I drove you in disgrace from the mount of God, and I expelled you, guardian cherub.”*
> — *Ezekiel 28:14-17*
### **9. Seraphim – The Highest & Holiest**
Seraphim stand **at the very throne of God**, continuously worshiping Him.
In *Isaiah’s vision* (*Isaiah 6:1-7*), they are described as having **six wings**—two to fly, two to cover their feet, and two to cover their faces, symbolizing their humility before God. They sing:
> **“Holy, holy, holy is the Lord of hosts; the whole earth is full of His glory.”**
When Seraphim reappear in *Revelation*, their wings are now **covered in eyes**, representing divine omniscience. Their song shifts slightly:
> *“Holy, holy, holy is the Lord God Almighty, who was and is and is to come!”*
> — *Revelation 4:8*
https://image.nostr.build/3495ccf6c0ba26b42d3e2b438ec19232cca148f6fbf29e5edd4129f5a198d05b.jpg
Unlike other angelic beings, Seraphim do not interact with humans—they exist purely to **glorify God**.
---
## **“Be Not Afraid”**
The angelic hierarchy provides a glimpse into the vast celestial order governing God’s universe. From the lowest messengers to the highest divine worshippers, each angelic being plays a unique role in the unfolding story of creation and salvation.
Yet, despite their differences, there is one striking similarity across biblical encounters with angels:
They often begin with a single phrase—
**“Be not afraid.”**
-
![](/static/nostr-icon-purple-64x64.png)
@ c582af78:698069cc
2025-02-13 01:03:50
## **How to Be Happy: Aristotle’s Blueprint for a Flourishing Life**
Everyone wants happiness. The problem? Most people don’t actually know what happiness is.
Ask someone what would make them happy, and they’ll likely mention wealth, pleasure, success, or recognition. Over 2,000 years ago, Aristotle heard the same answers—and he rejected them.
According to Aristotle, happiness isn’t something you *have*, but something you *do*. True happiness—what he called *eudaimonia*—isn’t about fleeting pleasures or external rewards. It’s about living well, cultivating virtue, and engaging deeply in life’s highest pursuits.
So, what’s Aristotle’s formula for happiness? It comes down to three essential steps.
---
### **The False Paths to Happiness**
Aristotle observed that most people chase happiness in three common ways: **wealth, pleasure, and honor**. While each has its appeal, none can sustain true fulfillment.
Take **wealth**, for example. Money provides security and opportunity, but it doesn’t guarantee satisfaction. Aristotle noted that many people who seek wealth become obsessed with accumulating it rather than using it wisely. The result? An endless chase with no real contentment.
**Pleasure** is even trickier. Aristotle acknowledged that pleasure is a natural good, but he warned against making it life’s ultimate goal. Living only for pleasure leads to a cycle of chasing temporary highs without ever achieving deeper fulfillment. As Aristotle put it, this is the life of *“fatted cattle”*—comfortable, but lacking excellence.
Then there’s **honor**. Recognition feels good, but it depends on the approval of others. If you live solely for status, you risk valuing recognition over real achievement. Honor for its own sake is empty unless it’s tied to genuine virtue.
**Aristotle’s conclusion?** These paths don’t lead to true happiness. They are distractions, not destinations.
---
### **The True Meaning of Happiness**
If wealth, pleasure, and honor aren’t enough, then what *is* happiness?
To answer that, we need to understand Aristotle’s term *eudaimonia*. Unlike our modern idea of happiness as a feeling, *eudaimonia* means **flourishing**—a life of purpose, virtue, and excellence.
The key difference is that **wealth, pleasure, and honor are passive**—they happen *to* you. But *eudaimonia* is **active**—it’s something you cultivate through action.
In his *Nicomachean Ethics*, Aristotle defines happiness as *“the activity of the soul in accordance with virtue.”* It’s not a prize to be won, but a way of living.
A great example comes from sports. A skilled athlete doesn’t just sit around feeling happy—his joy comes from being *in motion*: training, competing, improving, and fully engaging in his craft.
For Aristotle, happiness works the same way. It comes from actively developing your best qualities, not passively indulging in comfort.
But how do you put this into practice?
---
## **Aristotle’s 3-Step Blueprint for a Good Life**
Aristotle’s guide to happiness is surprisingly practical. Here’s how to apply it:
### **1. Cultivate Virtue Through Habit**
Virtue isn’t something you’re born with—it’s something you practice.
Just as an athlete trains for competition, you develop virtue by repeatedly choosing good actions. Courage, patience, and wisdom don’t just appear; they become part of you through habit.
As Aristotle famously said:
> **“We are what we repeatedly do. Excellence, then, is not an act, but a habit.”**
Want to be generous? **Give more often.**
Want to be disciplined? **Practice restraint.**
Over time, these actions shape your character—and character shapes happiness.
### **2. Engage Fully in Meaningful Work**
Happiness isn’t found in passivity, but in action.
Aristotle believed that true fulfillment comes from using your talents to their fullest extent. This applies to everything from philosophy to craftsmanship to leadership. The key is **engagement**.
Think of the satisfaction a musician feels while playing at their best, or the pride of a craftsman perfecting their work. These moments—where skill, effort, and purpose align—are true happiness in action.
Contrary to popular belief, happiness isn’t about doing less. **It’s about doing the right things, with full commitment.**
### **3. Seek the Right Kind of Pleasure**
Aristotle didn’t reject pleasure—he just emphasized choosing the *right* kind.
Lower pleasures—like eating, drinking, or binge-watching TV—may feel good in the moment but often leave you feeling empty afterward. Higher pleasures—such as learning, mastering a craft, or cultivating meaningful relationships—lead to lasting fulfillment.
The goal isn’t to reject pleasure, but to **align it with virtue**. Instead of chasing immediate gratification, seek pleasures that contribute to long-term flourishing.
---
## **Happiness as a Way of Life**
It’s important to understand that happiness isn’t a destination—it’s a **practice**. It’s something cultivated daily by engaging in meaningful work, growing in virtue, and living with purpose.
But most importantly, **happiness isn’t about what happens to you—it’s about who you become**.
By cultivating *eudaimonia*, you change the essence of your being—just as a farmer who nurtures his crops becomes stronger through his labor.
True happiness isn’t a fleeting emotion, but the natural result of a life well lived. The more you nurture virtue through action, the more deeply happiness takes root—until it becomes not just something you seek, but something you embody.
-
![](/static/nostr-icon-purple-64x64.png)
@ 57d1a264:69f1fee1
2025-02-13 00:28:45
This past week, @erik_ and @Sushant have been working on improving the onboarding flow for [Sovran](https://sovranbitcoin.com/) bitcoin wallet. First revision on thee figma file below, would appreciate any feedback.
![](https://m.stacker.news/77352)
![](https://m.stacker.news/77353)
https://www.figma.com/design/inNLo6AaPMX26D3GumcXGC/UI%2FUX-Audit--Onboarding-User-Flow?node-id=0-1&t=Wl0EVhH5fJgYYSJI-1
If you want to review the UX audit of the current flow, see the feedback provided, and check Sushant's initial suggestions, you can do so here:
![](https://m.stacker.news/77354)
https://www.figma.com/board/Jfo4nLIKyR6lacokXze4Mv/Sovran-Onboarding-UX-Audit?node-id=0-1&t=gOZyo57zfeqxFXeB-1
originally posted at https://stacker.news/items/884272
-
![](/static/nostr-icon-purple-64x64.png)
@ 4c96d763:80c3ee30
2025-02-12 23:49:24
# Changes
## Daniel D’Aquino (2):
- Remove rust-nostr dependency
- Fix unwanted auto-scrolls related to draft saving mechanism
## William Casarin (3):
- driveby compile warning fixes
- home: dont show reposts for the same note more than once
- reposts: add links to repost listing in timeline
## emir yorulmaz (1):
- Change 'twitter' to 'X/Twitter' on README.md
pushed to [damus:refs/heads/master](http://git.jb55.com/damus/commit/ec9a89ee4d388f4c706db47d2b73c298f1e268cc.html)
-
![](/static/nostr-icon-purple-64x64.png)
@ 5579d5c0:db104ded
2025-02-12 23:41:09
Most people think their metabolism is "broken" because they can't lose weight, feel sluggish, or gain fat easily.
The truth? **Your metabolism isn’t broken, it’s just out of sync.**
Your body doesn’t just burn calories randomly.
It follows a natural **24-hour rhythm**, dictated by light exposure, movement, meal timing, and sleep.
When these cues are off, your metabolism becomes dysfunctional.
The good news?
You don’t need to diet harder or exercise more.
**You need to realign your metabolism with your body’s natural rhythm.**
---
### Why your metabolism feels “broken”
Your body is designed to run on **timing signals, when to eat, when to move, when to rest**. Modern life disrupts these natural rhythms, leading to:
**→ Low energy & afternoon crashes**: Skipping morning sunlight and staying indoors all day.
**→ Stubborn belly fat & slow fat loss**: Eating at the wrong times, late-night snacking, and chronic stress.
**→ Constant cravings & hunger:** Poor meal timing and eating foods that spike blood sugar too often.
**→ Poor sleep & recovery**: Late night screen use, artificial light, and erratic bedtimes.
The problem **isn’t your metabolism, it’s your environment and habits.**
---
### How to reset your metabolism naturally
You don’t need extreme diets, calorie counting, or hours in the gym.
Instead, **align your metabolism with your body’s natural timing signals** by focusing on these fundamentals:
### 1. Get natural light first thing in the morning
Light in the first 30 minutes after waking sets your circadian rhythm (body clock), kickstarts hormone production, and improves insulin sensitivity.
This simple habit helps to regulate hunger, energy, and fat-burning.
**Action step:** Step outside for at least 5–10 minutes within 30 minutes of waking, no sunglasses, no contacts, only natural light exposure and take regular outdoor breaks during the day.
---
### 2. Stop eating late at night
Eating late, especially high-carb/high-fat meals, signals your body to store fat instead of burning it.
Late-night eating also disrupts sleep, which further impairs fat loss.
**Action step:** Keep meals within a **10-12 hour eating window**, preferably between sunrise and sunset. **No snacking**. Finish your last meal **at least 3 hours before bed**.
---
### 3. Move throughout the day (Not just at the gym)
Your metabolism isn’t just about burning calories, it’s about **how efficiently your body uses energy**.
Sitting for long hours disrupts metabolic function, even if you work out later.
**Action step:** Take a **5-minute movement break** every 1–2 hours. Stand, stretch, or better still go for a quick walk outside.
---
### 4. Prioritise deep, uninterrupted sleep
Your body **burns fat and repairs muscle while you sleep**.
Poor sleep increases hunger hormones (Ghrelin), prevents Leptin from working properly, and makes you crave junk food the next day.
**Action step:** Dim lights after sunset, wear blue light blocking glasses, avoid screens 30-60 minutes before bed, and aim for **7.5-9 hours of quality sleep**.
---
### 5. Eat nutrient-dense foods
What you eat matters, but **when** you eat it matters just as much.
Front-loading protein and nutrients earlier in the day supports fat-burning and stabilises energy.
**Action step:** Eat a **high-protein, nutrient-dense breakfast** and **avoid refined carbs & sugar, especially in the morning,** to prevent cravings later.
---
Your metabolism isn’t broken, it’s just out of sync.
Instead of obsessing over calories, **focus on realigning your body with its natural rhythms**:
→ **Morning sunlight** to set your metabolism for the day.
→ **Aligned meal timing** by eating during daylight & avoiding late-night eating.
→ **Frequent movement** to prevents metabolic slowdown from sitting.
→ **Quality sleep** which regulates fat-burning and hunger hormones.
→ **Nutrient-dense eating** giving your body what it needs.
Fix your metabolism without dieting harder, just live in sync with how your body is designed to function.
\-Chris
---
If you want a simple methodical approach to fixing your metabolism, Let’s talk.
**Book a free call here:** [**https://calendly.com/hello-chrispatrick**](https://calendly.com/hello-chrispatrick)
**Follow me on Nostr**: [**https://primal.net/chrispatrick**](https://primal.net/chrispatrick) or
[***nostr:npub124uatsq6pv74trzwvt34y4sx2z0uflhse7tkrv0pl69e8kcsfhkse30zsu***](https://primal.net/chrispatrick/npub124uatsq6pv74trzwvt34y4sx2z0uflhse7tkrv0pl69e8kcsfhkse30zsu)
-
![](/static/nostr-icon-purple-64x64.png)
@ 3b7fc823:e194354f
2025-02-12 23:13:57
**Staying Digitally Safe in Airports: A Comprehensive Guide**
Airports are hubs of activity, but they’re also places where your digital security can be at risk. From public Wi-Fi to potential device thefts, staying safe while traveling can feel overwhelming. However, with the right knowledge and precautions, you can protect yourself and enjoy your journey stress-free. Let’s dive into how to stay digitally safe in airports while traveling.
---
### **Understanding the Risks**
1. **Public Wi-Fi Vulnerabilities:**
- Airports often offer free Wi-Fi, but these networks can be unsecured or insecure. Hackers may use these networks to intercept sensitive data.
- Avoid using public Wi-Fi for personal banking, shopping, or handling sensitive information.
2. **Device Theft:**
- High-traffic areas like security checkpoints, gates, and lounges are hotspots for device thefts. Always keep your devices in secure locations, such as carry-on bags or locked briefcases.
3. **Malware and Phishing Attacks:**
- Some airports may have phishing attempts or malware distributed via pop-ups, email, or malicious websites.
4. **Physical Surveillance:**
- In some cases, law enforcement or security personnel may monitor your activities. Always be mindful of your surroundings to avoid unintended data exposure.
---
### **Best Practices for Staying Digitally Safe in Airports**
1. **Use a VPN for Extra Security:**
- Even secure airport Wi-Fi can expose your data if not encrypted. Use a reputable Virtual Private Network (VPN) to encrypt your internet traffic and protect your privacy.
- Always ensure your VPN is active when using public Wi-Fi.
2. **Minimize Sensitive Data on Public Devices:**
- Avoid carrying devices with sensitive information like passwords, credit card details, or personal identification numbers (PIIs).
3. **Encrypt Your Data:**
- Enable encryption for all your devices to protect data stored locally or in the cloud. Ensure your operating system and apps are updated with the latest security patches.
4. **Secure Your Devices:**
- Use cable locks or secure cases to lock down laptops, tablets, and smartphones when not in use.
- Remove screensavers that display your device passcode to prevent unauthorized access.
5. **Keep Antivirus Software Updated:**
- Install and maintain up-to-date antivirus software on all devices. This helps detect and remove malicious software (malware) that may be installed through compromised networks or phishing attempts.
6. **Avoid Plugging Into Public USB charging stations:**
- Refrain from using public USB ports or charging stations unless you know they’re secure. Malware can spread via these points.
7. **Use Caution With Lost and Found:**
- If you find a device or drop one accidentally, avoid using lost and found kiosks to pick it up. Instead, contact airport security for assistance in safely retrieving your property without exposing it to potential thieves.
8. **Stay Alert to Security Alerts:**
- Pay attention to announcements over the airport’s PA system regarding suspicious activity or security alerts. Follow any instructions provided by airport staff.
9. **Monitor Your Accounts Remotely:**
- If you suspect something is wrong (e.g., unusual transactions on your credit card), check your financial accounts immediately upon arriving at your destination. Notify your bank of potential fraudulent activity and report it to the authorities if necessary.
---
### **Additional Tips for Airport Safety**
1. **Use a Portable Power Bank:**
- Keep your devices charged so you don’t rely on public charging stations, which may be compromised.
2. **Travel with Backup Devices:**
- Always bring an extra SIM card, USB drive, or cloud storage to backup important data. This ensures you can access critical information even if your primary device is lost or damaged.
3. **Avoid Sharing Personal Information Over Earphone Rentals:**
- Refrain from using earphones rented from airport kiosks that may record or intercept your conversations. Stick to your own headphones or those provided by the airline.
4. **Use Airport Lounges Wisely:**
- If you’re using an airline lounge, avoid discussing sensitive information in public areas where it could be overheard.
5. **Keep Your Luggage in Sight:**
- Never leave your checked luggage unattended, as it may contain devices or documents with sensitive information.
6. **Plan for Data Loss:**
- Before leaving home, make a backup of all important files and photos on an external drive or cloud storage. This way, you can restore them if something goes wrong during your trip.
---
### **What to Do If Something Goes Wrong**
1. **Report Suspected Security Incidents:**
- If you notice unusual activity on your devices or suspect a security breach, inform airport security immediately.
2. **Contact Your Financial Institutions:**
- If you believe your financial information has been compromised, contact your bank or credit card provider to freeze your account and monitor for fraudulent charges.
3. **File a Police Report:**
- In cases of theft or suspected unauthorized access, file a report with local authorities and provide evidence (if available).
4. **Use Travel Insurance:**
- Check if your travel insurance covers theft, fraud, or data breaches. Submit a claim if you’re covered.
---
### **Extra Security Measures forTech-Savvy Travelers**
- **Two-Factor Authentication (2FA):** Enable 2FA for all your critical accounts before leaving home.
- **Biometric Locks:** Use biometric locks on your devices to add an extra layer of security.
- **Incident Response Plan:** Create a plan in advance for what to do if your devices are lost or compromised.
---
### **Final Tips**
- Always prioritize secure practices, even in seemingly safe environments like airports.
- Travel light but keep your important documents and devices close at hand.
- Remember that staying digitally safe is just as important as physical safety during your travels.
By following these tips, you can enjoy your trip with peace of mind, knowing your data and devices are protected. Happy traveling!
---
Advocating for privacy does not finance itself. If you enjoyed this article, please consider zapping or sending monero
82XCDNK1Js8TethhpGLFPbVyKe25DxMUePad1rUn9z7V6QdCzxHEE7varvVh1VUidUhHVSA4atNU2BTpSNJLC1BqSvDajw1
-
![](/static/nostr-icon-purple-64x64.png)
@ 000002de:c05780a7
2025-02-12 22:41:17
The absolute embarrassment the Chiefs were subjected to... is the end of the their dominance? Of course they have a ton of talent and will win and maybe get back the Super Bowl this game really exposed them.
Its one thing to lose to a great team like the Eagles. Its another to be destroyed so fully. When I think about this game its not just on one person. Its coaching and players. I'm just wondering about the impact on the league watching this. Anyone who has played sports knows that a ton of it is mental. Teams can defeat themselves mentally. Does this defeat tell the league, yeah they aren't that good.
What do you think?
Edit: When I say "done", I mean the dynasty. I don't mean they are gonna have a losing record next year.
originally posted at https://stacker.news/items/884169
-
![](/static/nostr-icon-purple-64x64.png)
@ 000002de:c05780a7
2025-02-12 22:25:06
Honest question. I think he's a great TE but... haven't watched him a ton. I get a feeling he's overrated. Maybe not though. I watched him during the big game and was kinda surprised by his lack luster performance. He really seemed different to me.
Since then I've seen video of him not blocking for his QB and not really playing hard. Like he gave up. Does he really have a rep of not blocking? He looks pretty terrible on film. Now, I know I'm a Kittle fan and he is famously great at blocking and takes pride in it. Maybe I'm just using Kittle as the ruler and maybe that's not fair.
Also, I loved watching KC get destroyed so factor that in :)
originally posted at https://stacker.news/items/884156
-
![](/static/nostr-icon-purple-64x64.png)
@ 9673b322:1b75ee9e
2025-02-12 21:50:25
This is my test document for nostr publish
Although Sainsbury's was already in the midst of a plan to save £1bn over the next few years, the rise in employer's National Insurance contributions set out in the Budget has also been a factor in this latest restructuring plan.
### Add some text
this is is a test
![](https://media.geekiam.systems/c31b53f1-d1ac-4e01-991b-90136e98bdaa.png)
-
![](/static/nostr-icon-purple-64x64.png)
@ d57360cb:4fe7d935
2025-02-12 19:10:53
What’s the difference between the mind that dreams and the mind that you experience reality with? This is a question that floored me when I first began to contemplate it. When I’m in my waking life going about my day to day, I have millions of thoughts flowing through my brain. These thoughts are creating the reality I inhabit. I follow them and live in my version of the world. These thoughts construct my world, they revolve around society, my place in it, the people around me, and the entire world. In that world are millions of stories that connect one structure to another.
This is how we live our lives, we create stories, fantasies, heroes, and villains. One person could paint someone as a hero and another can paint them as a villain. So what is the difference between my dreams and reality? When I dream I’m met with vivid images, structures and stories that seem as real as the life I live. I’ve experienced the same features in dreams as I have in reality. In Lucid dreaming a person has the ability to control a dream, they can alter it and mentally experience whatever their mind conjures up. What if it’s the same in ‘reality’. What if reality is as flimsy as dreams. What if the stories you currently told yourself about your life, or the world you live in were wrong. What if you pushed on the flimsy walls of this ‘reality’.
Maybe you should give them a push and see if they crumble or stand tall.