-

@ d57360cb:4fe7d935
2025-02-24 23:30:38
The moments and events that leave you lost. Shook. In Disbelief.
Those are the moments you need most. They unlock something dormant in you. Feelings you didn't think imaginable. Journeys you thought unlikely to happen.
Paths and roads filled with ups and downs. Uncertainties, roadblocks, long distances of absolutely nothing in sight. Periods of turmoil and absolute stillness.
Don't mistake where you are for the finale.
Embrace life, it gives you character.
-

@ 378562cd:a6fc6773
2025-02-24 22:13:45
As someone deeply interested in decentralized technology, I’ve been closely following the rapid rise of the Nostr (Notes and Other Stuff Transmitted by Relays) protocol. Although I've only just begun investigating it, I have already almost all but canceled my X, Facebook, and Truth Social accounts!
Nostr is an exciting alternative to traditional social media and communication platforms. It is built on censorship resistance, user control, and interoperability principles. Given the growing concerns over centralized control, privacy breaches, and biased content moderation, I believe Nostr presents a compelling solution. In this ~~article~~ long note, I want to share my thoughts on how Nostr has evolved, its recent advancements, and its potential impact on the digital landscape.
**Understanding Nostr**
Nostr is a lightweight, open-source protocol that allows users like me and you to share notes, messages, and other digital interactions via relays rather than centralized servers. It’s designed to be simple, robust, and censorship-resistant. Instead of relying on a single platform or authority, Nostr operates on a peer-to-peer model. Users interact through cryptographic key pairs and publish content to relays that distribute the data across the network.
Unlike traditional social networks like Twitter or Facebook, where all data is stored on centralized servers controlled by corporations, Nostr empowers me to truly own and control my digital identity. My data isn’t locked away by a single company or subject to the whims of ever-changing policies, government overreach, or arbitrary bans. Instead, I can run my own relay or connect to multiple independent relays, ensuring that my presence online remains resilient and censorship-resistant. Even if one or more relays shut down, my data is not lost—it remains accessible through the broader network. This decentralized structure not only protects free expression but also guarantees that no single entity has the power to dictate who stays online and who gets silenced. With Nostr, I am in control, and my data belongs to me—just as it should.
Since its inception, Nostr has seen impressive development, both technically and in terms of adoption. Some of the advancements that excite me the most include:
**Growing Ecosystem of Clients and Relays**
Developers have built a diverse ecosystem of client applications, ranging from sleek web-based interfaces to powerful mobile apps, making accessing and interacting with the Nostr network easier than ever. Whether on a desktop, smartphone or even experimental hardware, users have a growing array of options to stay connected seamlessly.
At the same time, the relay infrastructure has evolved rapidly, with new nodes optimized for speed, security, and regional accessibility. These relays ensure that messages are delivered efficiently while maintaining the network's decentralized and censorship-resistant nature. With relays distributed worldwide, Nostr continues to grow stronger, providing a resilient and open platform where users are free to communicate without relying on any single point of failure.
**Enhanced User Experience**
Early implementations of Nostr were simple and barebones, catering mostly to tech-savvy early adopters. However, the user experience has since evolved dramatically. Modern Nostr clients now feature sleek, intuitive UI designs, making navigation smooth and enjoyable. Enhanced media support allows for seamless sharing of images, videos, and other content, while improved interaction mechanisms—such as threaded conversations, reactions, and richer notifications—make engagement more dynamic and user-friendly.
To further streamline the experience, user-friendly wallets and browser extensions have been introduced, simplifying secure key management and making onboarding far more accessible. Newcomers no longer need to wrestle with complex cryptographic keys; instead, they can leverage intuitive tools that ensure both security and ease of use. As Nostr continues to grow, the focus on refining UX is making it an increasingly viable and compelling alternative to traditional social networks.
**Integration with Lightning Network**
Integrating Bitcoin’s Lightning Network into Nostr is a game-changer, revolutionizing how value is exchanged within the network. With seamless microtransactions and tipping systems, I can directly support content creators, developers, and other users without relying on traditional ad-driven revenue models or third-party payment processors. This fosters a more organic, community-driven economy where creators are rewarded instantly and fairly for their contributions.
By using Bitcoin for payments and interactions, Nostr enhances financial sovereignty, allowing users like me to transact in a truly decentralized manner—free from corporate gatekeepers, banking restrictions, or censorship. However, it’s important to remember that Nostr is still in its early days. While the potential is enormous, adoption and refinement take time. Content creators and users alike may need to be patient as the ecosystem matures, but those who embrace it early are helping to shape the future of open, censorship-resistant communication and finance.
**Privacy and Security Enhancements**
One of the most significant advancements in Nostr has been the introduction of end-to-end encrypted messaging, ensuring truly private and secure communication. Unlike traditional platforms that may scan, store, or even monetize user conversations, Nostr guarantees that only the intended recipient can decrypt and read messages. This level of privacy is a game-changer for those who value secure, censorship-resistant interactions.
Beyond private messaging, new identity verification methods leveraging cryptographic signatures have also emerged, allowing users to confirm authenticity without sacrificing pseudonymity. This means that while I can prove I am who I say I am, I don’t have to tie my identity to a real-world name, giving me the best of both security and privacy in an increasingly surveilled digital landscape.
Mainstream Adoption and High-Profile Endorsements
As Nostr continues to gain traction, high-profile figures like Jack Dorsey have publicly supported and contributed to its development, lending credibility and visibility to the project. His endorsement, along with growing enthusiasm from privacy advocates, developers, and free speech supporters, has accelerated Nostr’s momentum.
More developers and tech enthusiasts are now embracing Nostr as a viable alternative to corporate-controlled social networks, building innovative applications and expanding its ecosystem. While still in its early days, the rapid pace of development suggests that Nostr is on a trajectory toward becoming a mainstream, decentralized communication platform that challenges the dominance of traditional social media.
**Challenges and the Road Ahead**
Despite its rapid progress, Nostr still faces some hurdles that need to be overcome for it to achieve mainstream adoption:
Scalability Issues: Maintaining a reliable and efficient relay system remains challenging as the number of users grows, which is understandable.
User Adoption and Education: While I find the protocol exciting, helping non-technical users (like me in a lot of ways) understand its benefits and navigate its interface is an ongoing challenge.
Without centralized control, Nostr relies on decentralized, user-driven solutions for spam and moderation. Relays set their own rules, allowing users to choose environments that match their preferences—some with strict moderation, others more open.
Client-side filtering also plays a key role, with modern Nostr clients enabling users to block, mute, or filter unwanted content. Reputation-based systems and algorithmic filtering are emerging to help surface valuable discussions while minimizing spam. As Nostr evolves, these community-driven approaches will continue to refine the balance between free expression and a quality user experience.
**Conclusion**
The advancement of the Nostr protocol marks a major shift toward decentralized, censorship-resistant communication networks. By giving users like US full control over their data and interactions, Nostr presents a strong alternative to traditional social media platforms. As the protocol continues to evolve, its integration with other decentralized technologies, such as Bitcoin and cryptographic identity solutions, will further solidify its role in shaping the future of the Internet.
While challenges remain, I firmly believe Nostr is redefining how we interact online by prioritizing freedom, privacy, and resilience in the digital age. I may be old, but I love Nostr and am glad I can participate at such an early stage. Let's learn together!
-

@ d34e832d:383f78d0
2025-02-24 21:09:52
https://blossom.primal.net/af0bc86b52c7f91c26633ed0cba4f151bb74e5a5702b892f7f1efaa9e4640018.mp4
[npub16d8gxt2z4k9e8sdpc0yyqzf5gp0np09ls4lnn630qzxzvwpl0rgq5h4rzv]
### **What is Reticulum?**
Reticulum is a cryptographic networking stack designed for resilient, decentralized, and censorship-resistant communication. Unlike the traditional internet, Reticulum enables fully independent digital communications over various physical mediums, such as radio, LoRa, serial links, and even TCP/IP.
The key advantages of Reticulum include:
- **Decentralization** – No reliance on centralized infrastructure.
- **Encryption & Privacy** – End-to-end encryption built-in.
- **Resilience** – Operates over unreliable and low-bandwidth links.
- **Interoperability** – Works over WiFi, LoRa, Bluetooth, and more.
- **Ease of Use** – Can run on minimal hardware, including Raspberry Pi and embedded devices.
Reticulum is ideal for off-grid, censorship-resistant communications, emergency preparedness, and secure messaging.
---
## **1. Getting Started with Reticulum**
To quickly get started with Reticulum, follow the official guide:
[Reticulum: Getting Started Fast](https://markqvist.github.io/Reticulum/manual/gettingstartedfast.html)
### **Step 1: Install Reticulum**
#### **On Linux (Debian/Ubuntu-based systems)**
```sh
sudo apt update && sudo apt upgrade -y
sudo apt install -y python3-pip
pip3 install rns
```
#### **On Raspberry Pi or ARM-based Systems**
```sh
pip3 install rns
```
#### **On Windows**
Using Windows Subsystem for Linux (WSL) or Python:
```sh
pip install rns
```
#### **On macOS**
```sh
pip3 install rns
```
---
## **2. Configuring Reticulum**
Once installed, Reticulum needs a configuration file. The default location is:
```sh
~/.config/reticulum/config.toml
```
To generate the default configuration:
```sh
rnsd
```
This creates a configuration file with default settings.
---
## **3. Using Reticulum**
### **Starting the Reticulum Daemon**
To run the Reticulum daemon (`rnsd`), use:
```sh
rnsd
```
This starts the network stack, allowing applications to communicate over Reticulum.
### **Testing Your Reticulum Node**
Run the diagnostic tool to ensure your node is functioning:
```sh
rnstatus
```
This shows the status of all connected interfaces and peers.
---
## **4. Adding Interfaces**
### **LoRa Interface (for Off-Grid Communications)**
Reticulum supports long-range LoRa radios like the **RAK Wireless** and **Meshtastic devices**. To add a LoRa interface, edit `config.toml` and add:
```toml
[[interfaces]]
type = "LoRa"
name = "My_LoRa_Interface"
frequency = 868.0
bandwidth = 125
spreading_factor = 9
```
Restart Reticulum to apply the changes.
### **Serial (For Direct Device-to-Device Links)**
For communication over serial links (e.g., between two Raspberry Pis):
```toml
[[interfaces]]
type = "Serial"
port = "/dev/ttyUSB0"
baudrate = 115200
```
### **TCP/IP (For Internet-Based Nodes)**
If you want to bridge your Reticulum node over an existing IP network:
```toml
[[interfaces]]
type = "TCP"
listen = true
bind = "0.0.0.0"
port = 4242
```
---
## **5. Applications Using Reticulum**
### **LXMF (LoRa Mesh Messaging Framework)**
LXMF is a delay-tolerant, fully decentralized messaging system that operates over Reticulum. It allows encrypted, store-and-forward messaging without requiring an always-online server.
To install:
```sh
pip3 install lxmf
```
To start the LXMF node:
```sh
lxmfd
```
### **Nomad Network (Decentralized Chat & File Sharing)**
Nomad is a Reticulum-based chat and file-sharing platform, ideal for **off-grid** communication.
To install:
```sh
pip3 install nomad-network
```
To run:
```sh
nomad
```
### **Mesh Networking with Meshtastic & Reticulum**
Reticulum can work alongside **Meshtastic** for true decentralized long-range communication.
To set up a Meshtastic bridge:
```toml
[[interfaces]]
type = "LoRa"
port = "/dev/ttyUSB0"
baudrate = 115200
```
---
## **6. Security & Privacy Features**
- **Automatic End-to-End Encryption** – Every message is encrypted by default.
- **No Centralized Logging** – Communication leaves no metadata traces.
- **Self-Healing Routing** – Designed to work in unstable or hostile environments.
---
## **7. Practical Use Cases**
- **Off-Grid Communication** – Works in remote areas without cellular service.
- **Censorship Resistance** – Cannot be blocked by ISPs or governments.
- **Emergency Networks** – Enables resilient communication during disasters.
- **Private P2P Networks** – Create a secure, encrypted communication layer.
---
## **8. Further Exploration & Documentation**
- **Reticulum Official Manual**: [https://markqvist.github.io/Reticulum/manual/](https://markqvist.github.io/Reticulum/manual/)
- **Reticulum GitHub Repository**: [https://github.com/markqvist/Reticulum](https://github.com/markqvist/Reticulum)
- **Nomad Network**: [https://github.com/markqvist/NomadNet](https://github.com/markqvist/NomadNet)
- **Meshtastic + Reticulum**: [https://meshtastic.org](https://meshtastic.org)
---
## **Connections (Links to Other Notes)**
- **Mesh Networking for Decentralized Communication**
- **LoRa and Off-Grid Bitcoin Transactions**
- **Censorship-Resistant Communication Using Nostr & Reticulum**
## **Tags**
#Reticulum #DecentralizedComms #MeshNetworking #CensorshipResistance #LoRa
## **Donations via**
- **Bitcoin Lightning**: lightninglayerhash@getalby.com
-

@ 2181959b:80f0d27d
2025-02-24 20:49:39
تخطط شركة قوقل لاتخاذ خطوة جديدة في تعزيز أمان حسابات Gmail، حيث ستتخلى عن رموز المصادقة عبر الرسائل النصية (SMS) لصالح التحقق باستخدام رموز QR، بهدف تقليل مخاطر الأمان والحد من الاعتماد على شركات الاتصالات.
**لماذا تستبدل قوقل رموز SMS في Gmail؟**
رغم أن المصادقة الثنائية (2FA) عبر الرسائل النصية تُعد طريقة عملية، إلا أنها تحمل مخاطر كبيرة، إذ يمكن اعتراض الرموز من قبل المخترقين، أو استخدامها في هجمات التصيد الاحتيالي، أو حتى تعرض الحساب للاختراق في حال تم استنساخ رقم الهاتف.
كما أن أمان هذه الطريقة يعتمد بشكل أساسي على سياسات الحماية التي تتبعها شركات الاتصالات.
https://image.nostr.build/9c8eda01e430425f1e379ffd975aea200d72746e8d8a31000c8bd0e013b8e449.jpg
**كيف سيعمل التحقق عبر رموز QR؟**
عند محاولة تسجيل الدخول إلى Gmail، سيظهر للمستخدم رمز QR على الشاشة بدلًا من استلام رمز عبر SMS. كل ما عليه فعله هو مسح الرمز باستخدام كاميرا الهاتف، ليتم التحقق من هويته تلقائيًا، دون الحاجة إلى إدخال رمز يدويًا، مما يقلل من مخاطر مشاركة الرموز مع جهات غير موثوقة.
**متى سيتم تطبيق هذا التغيير؟**
لم تحدد قوقل موعدًا رسميًا لاعتماد النظام الجديد، لكنها أكدت أنها تعمل على إعادة تصميم عملية التحقق من الهوية خلال الأشهر المقبلة.
-

@ 8bad797a:8461b4bc
2025-02-24 20:33:57
This time from a laptop computer via Highlighter, from which the Merry Frankster can post long form content. Be afraid. Be very afraid.
-

@ a1c19849:daacbb52
2025-02-24 19:30:09
## Details
- ⏲️ Prep time: 20 min
- 🍳 Cook time: 4 hours
## Ingredients
- 1kg of chicken thighs
- 3 large onions
- 1 tablespoon garlic powder
- 2 tablespoons brown sugar
- 1.5 dl Ketjap Medja
- 0.5 liter chicken broth
- Pepper
- Salt
- Nutmeg
## Directions
1. Cut the onions and sauté them
2. Add the chicken thighs in pieces and bake for a few minutes
3. Add the garlic powder and the brown sugar and bake for a short time
4. Add the ketjap media and the chicken broth
5. Add some salt and pepper and nutmeg and let it simmer for 3 to 4 hours
6. Make sure all the moist evaporates but make sure it doesn’t get too dry. Otherwise add some extra chicken broth
7. Bon appetit!
-

@ 6e0ea5d6:0327f353
2025-02-24 19:29:02
Of all the people you should fear, fear most the peaceful man in situations where anyone else would be aggressive. The strongest man is the one who masters his emotions in moments of rage and fury—who, even in anger, does not destroy everything around him, including himself.
Remember: no man truly knows how evil he can be until he strives to be good in a corrupt world and, for that, is crushed by it.
Anxiety makes a man suffer even before there is a concrete reason. The mere act of anticipating pain makes him feel it in its full intensity, even if it never materializes. On the other hand, anxiety leads to rash actions, driven by impulse or anger. And these decisions, in the end, can destroy him.
The most harmful choices are usually made under stress, rage, or passion. Anxiety, in turn, is a formidable adversary, difficult to tame. Controlling it requires constant and gradual training. The key is to balance expectations—facing the future with serenity rather than allowing worries to corrode the present. Sometimes, it is necessary to abandon the life we planned to face the life that awaits us. Instead of acting impulsively in moments of deep stress, learn to reflect rationally on all possibilities before taking action.
I recognize that, in theory, this advice is easy to give. Sono d’accordo, I know how difficult it is in daily life. But listen well: do not let your actions be driven by impulsiveness. Remember, stubbornness combined with anxiety is a direct path to a pit of regrets.
Stubbornness, unlike persistence, makes a man insist on mistakes or ignore wise counsel. It forces him to act against logic, preventing him from learning from failures and reevaluating decisions. It is a silent source of suffering, robbing him of opportunities for change and growth.
Just as a river reaches its destination by adapting to the course it encounters, a wise man must seek new approaches rather than persist in the same mistakes. Adapting, learning, and changing course are the keys to reaching one’s true destiny.
Thank you for reading, my friend!
If this message resonated with you, consider leaving your "🥃" as a token of appreciation.
A toast to our family!
-

@ a1c19849:daacbb52
2025-02-24 19:19:16
## Details
- ⏲️ Prep time: 20 min
- 🍳 Cook time: 4 hours
## Ingredients
- 1kg of chicken thighs
- 3 large onions
- 1 tablespoon garlic powder
- 2 tablespoons brown sugar
- 1.5 dl Ketjap Medja
- 0.5 liter chicken broth
- Pepper
- Salt
- Nutmeg
## Directions
1. Cut the onions and sauté them
2. Add the chicken thighs in pieces and bake for a few minutes
3. Add the garlic powder and the brown sugar and bake for a short time
4. Add the ketjap media and the chicken broth
5. Add some salt and pepper and nutmeg and let it simmer for 3 to 4 hours
6. Make sure all the moist evaporates but make sure it doesn’t get too dry. Otherwise add some extra chicken broth
7. Bon appetit!
-

@ 037ebe13:93af01dc
2025-02-24 18:59:42
Se você acompanhou o noticiário, deve ter visto que o ministro Alexandre de Moraes, do Supremo Tribunal Federal (STF), voltou a investir contra as redes sociais. Na sexta-feira (21), Moraes determinou a suspensão da rede social americana Rumble no Brasil.
De acordo com o ministro, a rede social cometeu "reiterados, conscientes e voluntários descumprimentos das ordens judiciais, além da tentativa de não se submeter ao ordenamento jurídico e Poder Judiciário brasileiros" e que instituiu um "ambiente de total impunidade e 'terra sem lei' nas redes sociais brasileiras".
No entanto, o CEO da Rumble, Chris Pavlovski, afirmou que Moraes exigiu que a Rumble cumprisse decisões que são ilegais segundo a legistação americana e passou um “aviso” ao ministro: “nos vemos no tribunal”.
Não é de hoje que o STF e Moraes são acusados de promover um ambiente de “censura” através de uma suposta perseguição enviesada a perfis que criticam as atuações da corte e do ministro, inclusive exigindo a remoção de perfis por parte dessas redes – algo que contraria a legislação brasileira.
Em 2024, o X chegou a ficar suspenso no Brasil por quase 40 dias, sendo que Moraes chegou a impor multas para quem tentasse acessar a rede via VPN, uma decisão contestada e vista por muitas pessoas como ilegal.
Isso mostra que o poder do estado vai continuar agindo contra as redes sociais com o intuito de estabelecer algum tipo de restrição a essas plataformas. E tal poder tende a funcionar, pois estas plataformas são consideradas empresas e muitas têm representantes legais no Brasil, que são um vetor de ataque para eventuais suspensões.
Felizmente, a criação do Bitcoin (BTC) levou a um avanço na forma como podemos manter nossa privacidade protegida da sanha autoritária dos estados. E isso chegou nas redes sociais com a criação do Nostr. Por isso, o protocolo descentralizado com foco em redes sociais é o tema da nossa newsletter de hoje.
O que é o Nostr?##
A palavra Nostr, que dá nome ao protocolo, é a sigla para Notes and Other Stuff Transmitted by Relays (Notas e Outras Coisas Transmitidas por Relés, em tradução livre). Esse protocolo surgiu em 2020 para criar uma “camada social” na rede do Bitcoin. Ou seja, permitir o desenvolvimento de aplicativos similares a redes sociais.
No entanto, foi a partir de 2023 que o protocolo ganhou fama, a ponto de ficar conhecido como o “Twitter descentralizado”. Esse nome se deveu ao fato de que um dos aplicativos mais populares do Nostr era o Damus, que funciona como uma espécie de X.
A principal diferença do Nostr para outros serviços é que os aplicativos criados pelos protocolos não podem ser censurados. Eles operam baseados em clientes e relés (relays) muito similares aos nós que rodam a rede do Bitcoin. Por isso, não adianta um governo tentar derrubar um nó: se os demais estiverem ativos, a rede seguirá funcionando livre de censura.
Sistema de chaves##
Da mesma forma que no Bitcoin, no Nostr cada usuário é identificado por uma chave pública. E também há uma chave privada, que ele usa para assinar as transações. Mas ao contrário do BTC, as chaves privadas não são formadas por sequência de palavras, mas sim por uma sequência de letras:
chave pública: cada chave pública do Nostr começa com as iniciais “npub”. Ex: npub43tahY4T…
chave privada: já as chaves privadas começam com os caracteres “nsec”. Ex: nsec4T6uyA4F…
Para acessar os aplicativos do Nostr (como o Damus), você só precisa fazer o download e inserir a sua chave privada no app. Ele vai ler a chave e identificar que você de fato controla aquela conta, mas o aplicativo não armazena as chaves. Por isso elas não ficam sujeitas a roubos, mantendo o seu perfil seguro.
Uma vez logado no aplicativo, cada vez que você publica algo (por exemplo, uma mensagem que publica, uma atualização da sua lista de seguidores, etc.), você assina uma transação. Os clientes validam estas assinaturas para garantir que estão corretas.
Hoje, existem mais de 70 aplicativos criados para o Nostr, desde outros “Twitter descentralizados” até serviços de mensagem. E todos eles funcionam de forma integrada, o que significa que a sua chave privada funciona como uma identidade única. Isso permite que você acesse a todos os aplicativos com uma única senha, sem precisar fazer cadastros e deixar seus dados expostos em várias redes sociais.
Esse protocolo foi criado por um brasileiro conhecido como fiatjaf, que preferiu se manter anônimo. O projeto fez tanto sucesso que recebeu um apoio massivo de Jack Dorsey, criador do Twitter, que chegou a doar 14,6 BTC para ajudar no desenvolvimento do Nostr. Hoje, esse valor corresponde a mais de R$ 8 milhões.
Como fazer uma conta no Nostr##
Antes de acessar os aplicativos, você deve criar suas chaves pública e privada no site oficial do Nostr. Basta acessar o [Endereço ]( https://nostr.com) e clicar na opção “create your Nostr account”. E pronto, o site gera as duas chaves automaticamente. A chave pública (npub) fica visível, enquanto a chave privada (nsec) aparece coberta.
Basta clicar nos quadrados do lado esquerdo da chave privada que ele vai copiar automaticamente. Você também pode clicar em “show private key” para ver a chave privada, ou clicar em “download keys” para baixar ambas as chaves.
Cabe frisar que essas chaves, sobretudo a privada, são essenciais para acessar qualquer aplicativo criado no Nostr. Por isso, assim que você salvá-las, guarde essas chaves em um lugar seguro e longe da internet, para evitar roubos. Por isso:
jamais anote sua chave privada num bloco de notas;
escreva a chave privada à mão num papel e guarde com bastante cuidado;
nunca, sob qualquer hipótese, compartilhe sua chave privada em arquivos na nuvem ou por e-mail.
Se você quiser ter ainda mais segurança, pode adquirir o NOSTR Signing Device, dispositivo que serve para assinar publicações com o Nostr e mantém sua chave privada segura. Ele é importado, mas custa apenas 20 euros (cerca de R$ 120) no site da [LNBits.]( https://shop.lnbits.com/product/nostr-signing-device)
Redes sociais à prova de censura##
Bem, agora vamos conferir as duas redes sociais que selecionamos entre os mais de 70 aplicativos do Nostr. Nelas você pode publicar qualquer coisa sem medo de sofrer com censura, bloqueios ou processos indevidos por causa de alguma acusação vaga como “promover discurso de ódio”.
O primeiro dessas aplicativos é o [Primal]( https://nostrapps.com/primal), que é praticamente uma cópia do já citado Damus. Ele também se parece muito com o X e lá você pode publicar, mandar mensagens inbox para outro usuário, curtir, salvar, compartilhar e comentar.
Ao contrário do X, o Primal não impõe limite de caracteres nas publicações e você não tem selos. O aplicativo também possui uma carteira Lightning onde você pode enviar e receber satoshis. E o melhor de tudo, o Primal possui a função “zap”, que permite que você possa enviar e receber satoshis por causa de suas publicações.
Ou seja, se você escrever alguma coisa no Primal e as pessoas gostarem, elas podem te enviar “gorjetas” em satoshis. Isso significa que você consegue monetizar o seu conteúdo sem precisar assinar nenhum plano ou pagar para conseguir um selo. Você também pode enviar satoshis para seus criadores de conteúdo favoritos.
Mas se você gosta de publicar artigos mais longos (como esta newsletter), o Nostr conta com o [YakiHonne]( https://nostrapps.com/yakihonne). Este “Substack descentralizado” permite que você publique notas como o Primal, mas também oferece a possibilidade de criar artigos em formato de newsletter.
Você pode favoritar ou salvar os seus autores preferidos, facilitando a leitura de artigos. E o aplicativo também possui seções de curadoria específica. Com ela, você consegue acessar artigos por tópicos e ver o que está se destacando no YakiHonne naquele momento.
Quer escrever sobre um tema polêmico? Faça seu artigo no YakiHonne sem ter medo de censura ou de ver seu texto desmonetizado. E caso ele faça sucesso, você pode receber satoshis como pagamento e monetizar seu trabalho recebendo em moeda forte.
Infelizmente, os tribunais de censura seguem em crescimento no mundo e a liberdade de expressão em plataformas centralizadas seguirá ameaçada. Afinal, estas empresas visam o lucro e estão sujeitas às leis. E elas dificilmente farão frente ao poder do estado apenas para beneficiar seus usuários.
Por isso, da mesma forma que você pode tirar o estado do seu dinheiro com o Bitcoin, você pode tirar a censura das suas palavras usando o Nostr. Afinal, como diz o personagem Ensei Tankado de “Fortaleza Digital”:
“Todos temos o direito de guardar segredos. Um dia eu farei com que isso volte a ser possível.”
Vale uma olhada##
Matéria completa sobre o lançamento do Nostr no [CriptoFacil;]( https://www.criptofacil.com/nostr-conheca-protocolo-criado-por-brasileiro-que-utiliza-o-bitcoin-para-descentralizar-redes-sociais/)
O canal dos tem um vídeo excelente falando sobre como criar e armazenar suas chaves privadas do Nostr usando o Signing Device. Vale a pena conferir.
-

@ 6e0ea5d6:0327f353
2025-02-24 18:54:30
**Ascolta bene, amico mio.** The type of woman you choose reflects the type of man you truly are—or the one you hide from being.
Don't deceive yourself: your choices are a mirror of your essence. If you constantly get involved with women who drag you into chaos, who manipulate or belittle you, that says more about your weaknesses than about theirs. *Chi sceglie male, paga il prezzo.*
You cannot blame fate or the woman for your decisions. The responsibility is yours. If you are foolish enough to be swayed by superficial beauty or the need for approval, you are digging your own ruin.
A real man, before loving, learns to understand women—not just one, but many. He observes, understands their motivations, and learns to distinguish between those who add value and those who destroy.
If you choose wrong, don't blame the world. *Cazzo!* The mistake was yours, and so will be the consequence. Needy men, who let themselves be trapped by the first woman who offers crumbs of attention, end up being shaped by their circumstances. *"La donna non ti fa cane; sei tu che ti fai cane."* By choosing a woman without character, you reveal your own lack of discernment and courage. And, my friend, if you fear being alone, remember: loneliness next to the wrong woman is far more bitter.
If you seek respect, start by choosing wisely. Those who cling blindly, out of fear or necessity, are doomed to suffer. Own your choices, learn from your mistakes, and be selective. The world does not forgive the weak, and excuses will not redeem your weakness.
Thank you for reading, my friend!
If this message resonated with you, consider leaving your "🥃" as a token of appreciation.
A toast to our family!