-
![](/static/nostr-icon-purple-64x64.png)
@ 1cb14ab3:95d52462
2025-02-04 22:17:27
## Chef's notes
Credit to The Yummy Life. Go show them love below:
https://www.theyummylife.com/Pickled_Jalapeno_Peppers
## Details
- ⏲️ Prep time: 1 hour
- 🍳 Cook time: 20 mins
- 🍽️ Servings: 4 mason jars (pint)
## Ingredients
- 2 lbs. jalapenos
- 2-1/4 cups vinegar (white distilled, apple cider, or a combination of the two)
- 2-1/4 cups water
- 2 tablespoons sugar or honey (optional)
- ADD TO EACH PINT JAR
- 1/2 teaspoon kosher salt
- 1/2 teaspoon whole black pepper corns
- 1/4 teaspoon whole cumin seeds
- 1/4 teaspoon whole coriander seeds
- 1 bay leaf
- 1 whole garlic clove, peeled
- 1/8 teaspoon Pickle Crisp granules (optional)
## Directions
1. Slice 1/2 pound jalapenos into 1/8" rounds, discarding stem ends.
2. Prepare the jars: Wash 4 pint jars and lids in hot sudsy water, then keep them warm.
3. Prepare the pickling liquid: Combine 1/2 cup plus 1 tablespoon vinegar, 1/2 cup plus 1 tablespoon water, and 1-1/2 teaspoons sugar or honey (optional) in a 2 quart pan, heating until just before boiling.
4. Fill the jars: Add jalapeno slices to each jar, pressing them down and packing them in compactly, then pour the hot pickling liquid into each jar, leaving 1/2" head space.
5. Process and store: Allow jars to cool to room temperature, then store them in the refrigerator or can them using standard USDA water process canning procedures, following storage guidelines for refrigerator or canned pickled peppers.
-
![](/static/nostr-icon-purple-64x64.png)
@ 1cb14ab3:95d52462
2025-02-04 21:42:24
## Chef's notes
Classic beef n' broccoli. Easy to make and dank to eat.
## Details
- ⏲️ Prep time: 20 mins
- 🍳 Cook time: 10 mins.
## Ingredients
- 1 lb top sirloin steak, thinly sliced
- ¼ cup low sodium soy sauce
- 2 teaspoons cornstarch
- 1 tablespoon dark brown sugar
- 2 tablespoons fresh ginger, minced
- 1 tablespoon oil
- 1 head broccoli, cut into 1-inch (2 ½ cm) florets
- ½ cup water
- 3 cloves garlic, minced
- ¼ teaspoon red pepper flakes, optional
- 1 teaspoon toasted sesame oil
## Directions
1. In a medium bowl, mix together the sirloin steak, soy sauce, cornstarch, brown sugar, and ginger until the meat is evenly covered in the marinade. Set aside to marinate for 20 minutes.
2. Heat the oil in a large skillet or wok over medium-high heat. Dump in the meat and marinade and sear each side until golden brown. Transfer the meat to a clean bowl and set aside.
3. Place the broccoli into the hot skillet and sauté until the broccoli has just started to brown, about 1 minute. Pour the water into the skillet and immediately cover with a lid. Let it steam for 2 minutes, until the broccoli has softened.
4. Remove the lid and toss in the garlic, red pepper flakes, and sesame oil. Sauté until the garlic becomes fragrant, about 30 seconds.
5. Add the steak back into the pan and stir to combine. Remove from heat and serve on a bed of brown rice.
-
![](/static/nostr-icon-purple-64x64.png)
@ 21ffd29c:518a8ff5
2025-02-04 21:12:15
- **What Are Homestead Chickens?**
Homestead chickens are domesticated fowl kept by homeowners to provide eggs and companionship. They play a vital role in the homestead ecosystem.
**Why Water is Essential in Cold Weather**
- **Hydration Basics**:
Chickens don't drink much water naturally but need it for hydration, especially during cold weather when metabolic rates increase.
- **Environmental Factors**:
Cold weather can lead to ice buildup on water sources. Chickens benefit from having access to fresh water year-round.
**Maintaining Accessible Water Sources**
- **Shallow Troughs**:
Use shallow troughs instead of deep containers to minimize ice formation and ensure constant water supply.
- **Automatic Feeders**:
Consider installing automatic feeders for convenience, especially in unpredictable weather conditions.
- **Multiple Water Sources**:
Provide multiple water sources to prevent competition and ensure all chickens have access.
**Preventing Ice Buildup**
- **Floating Shallow Troughs**:
Opt for troughs that sit above the ground to avoid ice buildup. Ensure they're placed where they can't freeze completely.
- **Regular Checks**:
Inspect water sources regularly to remove ice and debris, maintaining accessibility for chickens.
**Best Practices for Watering Chickens**
- **Waterers Designed for Cold Weather**:
Use waterers made of stainless steel or plastic that can withstand cold temperatures.
- **Seasonal Adjustments**:
During extreme cold spells, supplement with a small amount of fresh water to aid in drinking.
**Conclusion**
- **Key Takeaways**:
Providing proper water is crucial for the health and well-being of homestead chickens during cold weather. Maintaining accessible, shallow water sources prevents issues like ice buildup and ensures hydration.
**Final Thoughts**
- **Sustainability Considerations**:
While chickens don't drink much, ensuring they have water supports their overall health and sustainability efforts.
- **Environmental Impact**:
Thoughtful water management can reduce water usage, promoting eco-friendly practices on the homestead.
-
![](/static/nostr-icon-purple-64x64.png)
@ 1cb14ab3:95d52462
2025-02-04 18:40:56
### What is it?
I stumbled upon the **Elgato Stream Deck** while aimlessly browsing the web, and I was instantly intrigued. But one question kept nagging me—how would I use this, and why do I even need it?
**I don’t stream**.
At first glance, it seemed like just another gadget to clutter my already cramped desk in my tiny Shanghai apartment. But curiosity got the best of me. After some research, **I decided to give it a shot and see what all the hype was about.**
And wow—was that hype justified.
This isn’t a deep-dive review covering every feature (there are plenty of those online). Instead, I want to share **some of the workflows I’ve set up** and hopefully get you thinking about the endless possibilities you could create with a Stream Deck.
**If you’re someone who loves making computer tasks easier** but struggles to remember keyboard shortcuts beyond Ctrl + V, this little device might just change the way you work.
---
#### Launching Apps and Websites
![](https://image.nostr.build/6dde2ec22cd0f03a733474f35c28ab597713ba61ef2aabf01fae98ad98223e91.jpg)
I won’t lie—**my favorite use for the Stream Deck is the sheer convenience of pressing a button and instantly launching what I need**.
Want to watch YouTube? Button.
Open Photoshop? Button.
Play a game? Button.
Check Bitcoin prices? Those are always on the display.
![](https://image.nostr.build/9819876d3fda08b7b3c1ca71f67fedfdbd236bc9c0ffe5940becd0ead528f8eb.jpg)
![](https://image.nostr.build/336da5792598da3c9c5cbbf0f4dbed9f86db800a323462881e05073d9d711e95.jpg)
Sure, it’s a small thing, but the speed and ease of launching apps or navigating to websites make a surprising difference. **What used to be a few clicks and keystrokes is now a single tap**.
After using the Stream Deck for a while, my laptop feels... clunky. I’ve genuinely noticed **an increase in my productivity** and focus.
---
#### Custom Application Profiles
One of the most powerful features of the Stream Deck is its ability to switch profiles based on the application you’re using.
This means that **every time you switch programs, the buttons automatically adjust** to show relevant shortcuts and commands. It’s a game-changer for software with hundreds of keyboard shortcuts, making multitasking seamless.
I’ll admit—setting up custom profiles can be a bit time-consuming. The good news? You don’t have to start from scratch. **There are tons of downloadable third-party profiles** for popular programs like Illustrator, Photoshop, Final Cut Pro, DaVinci Resolve, Microsoft Office, and Ableton.
![](https://image.nostr.build/0a0f9469bd3e2598d1dad35fa5f1e83e4010df8fb0e690941e281961dd1ad91d.jpg)
If your favorite app doesn’t have a pre-made profile, you can always build your own. It takes some effort, but once it's set up, the workflow improvements are worth it.
---
#### Music and Audio Control
![](https://image.nostr.build/0ed87e96e60c48a3be341200428e5e1370b6fc7ab7725cd5994a3c602da7a06c.jpg)
I use an audio interface for lossless wired playback and external microphone support. The Stream Deck makes **switching between my computer’s default mic and my studio mic effortless**—no more digging through system preferences.
Even if you don’t use external audio gear, the Stream Deck still has plenty of value for music lovers.
![](https://image.nostr.build/3884c7997a3181ccad67b9cc1a19bf47eb07f79cb2e1898a526dfb13f82e7a8e.jpg)
It integrates with Apple Music and Spotify, letting you control playback, skip tracks, like songs, and add them to playlists—all without switching apps. **Elgato is constantly adding new third-party integrations**, which gives the device even more longevity.
---
#### Lighting and Smart Home Control
![](https://image.nostr.build/dff63cc9fd0f00683cbd5435a86a6ccb7e656caad9e1fde9d0bbdb3fb3358845.jpg)
If you have smart home devices, the Stream Deck can act as a command center. It integrates with platforms like Philips Hue, LIFX, Nanoleaf, and IFTTT, letting you **control lights, scenes, and colors with a single tap**.
Want to set the mood for gaming, reading, or watching a movie? Done.
You can even use it to trigger other smart devices, like cameras, thermostats, or speakers, using IFTTT applets. The possibilities here are endless.
---
#### Finder and Document Shortcuts
![](https://image.nostr.build/84f15d18993134c97c37b57e6947d17703a6a4f348b6e3e40e494a5cc403452e.jpg)
One of the most unexpectedly useful features for me has been **quick access to folders and files**.
I’ve set up buttons for my most frequently used folders—Downloads, Desktop, and Documents—so I can access them instantly. I’ve also created **buttons for specific files like spreadsheets and PDFs,** so I don’t have to dig through folders to find them.
It sounds simple, but when juggling multiple projects, these little time-savers add up fast.
---
### Final Thoughts
The Elgato Stream Deck is a surprisingly versatile tool that enhances **productivity, creativity, and entertainment**. Whether you’re launching apps, controlling music, managing smart devices, or creating complex workflows, it streamlines everyday tasks in a way that’s hard to go back from.
At first, I thought it was just for streamers. Now? **I can’t imagine working without it**.
I hope this post gives you some ideas on how to make the most of a Stream Deck. If you have any questions or thoughts, drop a comment below.
Thanks for reading!
---
> Feel free to support me by grabbing one through my affiliate link below:
[Purchase a Stream Deck](https://amzn.to/3WLGiLE)
---
#### More from Hes
[Full Portfolio](https://hesart.npub.pro)
[Online Store](https://plebeian.market/community/hes@nostrplebs.com/hesmart-ym3fcufdfz)
[Artist Statements](https://hes.npub.pro/tag/art/)
[Travel Guides](https://hes.npub.pro/tag/travel/)
[Photography](https://hes.npub.pro/tag/photography)
[Writings](https://hes.npub.pro/tag/money)
---
*Originally published in 2022. All images are credit of Hes, but you are free to download and use for any purpose. If you find joy from my art, please feel free to send a zap. Enjoy life on a Bitcoin standard.*
-
![](/static/nostr-icon-purple-64x64.png)
@ 0c503f08:4aed05c7
2025-02-04 18:15:32
Sometimes I think I'm a bit nihilistic, it can make me sad at times, but at times it also gives me ultimate freedom. What gets you up in the morning?
We’re stardust that somehow became self-aware. The odds of existing are astronomically small—every ancestor in your lineage survived long enough to pass on life, through ice ages, disasters, and chaos. You’re the universe experiencing itself.
originally posted at https://stacker.news/items/875807
-
![](/static/nostr-icon-purple-64x64.png)
@ 1e566682:60493eed
2025-02-04 18:05:06
بازار ارزهای دیجیتال بهزودی شاهد یک تغییر مهم خواهد بود. طبق گزارش اخیر منتشرشده در [**فوربز**](https://www.forbes.com/sites/digital-assets/2025/02/04/this-is-a-big-deal-bitcoin-and-crypto-now-braced-for-a-huge-us-price-earthquake/)، بیتکوین و سایر ارزهای دیجیتال در آستانه یک "زلزله قیمتی" قرار دارند که به دلیل تغییرات نظارتی و تصمیمات کلان اقتصادی در ایالات متحده شکل میگیرد. کارشناسان پیشبینی میکنند که این تغییرات میتوانند نوسانات شدیدی در ارزش داراییهای دیجیتال ایجاد کنند و بازار را تحت تأثیر قرار دهند.
### **دلایل اصلی این زلزله قیمتی**
۱. **سیاستهای جدید نظارتی و قانونی**
دولت آمریکا به دنبال وضع مقررات سختگیرانهتری برای نظارت بر ارزهای دیجیتال است. کمیسیون بورس و اوراق بهادار ایالات متحده و سایر نهادهای نظارتی در حال بررسی اقداماتی برای محدود کردن برخی فعالیتهای مرتبط با ارزهای دیجیتال هستند. این مقررات میتواند شامل نظارت دقیقتر بر صرافیهای ارز دیجیتال، سختگیری در فرآیندهای ضدپولشویی و احراز هویت مشتریان باشد.
۲. **تغییرات مالیاتی و تأثیر آن بر سرمایهگذاران**
دولت ایالات متحده در حال بررسی اصلاحات مالیاتی است که میتواند تأثیر قابلتوجهی بر سرمایهگذاران ارزهای دیجیتال بگذارد. مالیات بر سود حاصل از معاملات ارزهای دیجیتال میتواند افزایش یابد و سرمایهگذاران را به اتخاذ استراتژیهای جدید معاملاتی وادار کند. این مسئله ممکن است موجب کاهش حجم معاملات و افزایش نوسانات قیمتی شود.
۳. **سیاستهای پولی فدرال رزرو**
فدرال رزرو (بانک مرکزی آمریکا) نقش مهمی در تعیین نرخ بهره و سیاستهای مالی دارد. اگر نرخ بهره افزایش یابد، سرمایهگذاران ممکن است تمایل بیشتری به سرمایهگذاری در داراییهای کمریسک مانند اوراق قرضه دولتی داشته باشند و سرمایههای خود را از بازار ارزهای دیجیتال خارج کنند. این امر میتواند منجر به کاهش قیمت بیتکوین و سایر رمزارزها شود.
۴. **افزایش پذیرش سازمانی و واکنش بازار**
در حالی که قوانین سختگیرانه میتوانند فشار نزولی بر قیمتها وارد کنند، افزایش پذیرش بیتکوین توسط شرکتهای بزرگ و موسسات مالی میتواند از کاهش شدید قیمتها جلوگیری کند. بسیاری از شرکتها همچنان به پذیرش رمزارزها بهعنوان یک روش پرداخت ادامه میدهند و برخی بانکهای بزرگ نیز وارد بازار رمزارز شدهاند که این موضوع میتواند روند کلی بازار را تغییر دهد.
### **تأثیرات احتمالی بر قیمت بیتکوین و سایر ارزهای دیجیتال**
با در نظر گرفتن این عوامل، دو سناریوی اصلی برای آینده قیمت بیتکوین و بازار رمزارزها وجود دارد:
- **سناریوی نزولی:** اگر مقررات سختگیرانه اجرایی شوند و نرخ بهره افزایش یابد، ممکن است بیتکوین و سایر رمزارزها با کاهش قیمت مواجه شوند. در این شرایط، سرمایهگذاران خرد و سازمانی ممکن است با خروج از بازار، نوسانات شدیدتری را رقم بزنند.
- **سناریوی صعودی:** در صورتی که افزایش پذیرش بیتکوین در میان موسسات مالی ادامه یابد و قوانین بهطور متعادل اجرا شوند، احتمال دارد که بیتکوین بتواند سطح حمایتی خود را حفظ کرده و در بلندمدت به رشد خود ادامه دهد.
### **جمعبندی: سرمایهگذاران باید چه کار کنند؟**
با توجه به این شرایط، سرمایهگذاران ارزهای دیجیتال باید با دقت تحولات نظارتی و اقتصادی را دنبال کنند. مدیریت ریسک، تنوعبخشی به سبد سرمایهگذاری و در نظر گرفتن چشمانداز بلندمدت میتواند از ضررهای احتمالی جلوگیری کند.
این زلزله قیمتی ممکن است بازار رمزارزها را به شدت متزلزل کند، اما همانطور که در گذشته نیز دیدهایم، بازار ارزهای دیجیتال بارها از بحرانهای مشابه عبور کرده و به رشد خود ادامه داده است. باید دید که در نهایت این تغییرات چگونه شکل خواهند گرفت و چه تأثیری بر آینده بیتکوین و سایر ارزهای دیجیتال خواهند گذاشت.
-
![](/static/nostr-icon-purple-64x64.png)
@ 8d34bd24:414be32b
2025-02-04 17:55:30
So many of our problems are due to our point of view. The closer our point of view gets to God, the more peace and joy we will feel.
Too often we look at God as the big, bad killjoy. We resent when He tells us all the “fun” things we aren’t supposed to do and when He tells us to do difficult things like submit to God, submit to husbands, submit to authorities. Too many people focus on the “do nots,” and don’t like the idea of anyone telling them what to do. They then do their own thing, which they think will make them happy. Unfortunately, this leads to the opposite.
God is our Creator. He created us for a purpose within the rest of His creation.
> For we are His workmanship, created in Christ Jesus for good works, which God prepared beforehand so that we would walk in them. (Ephesians 2:10)
When we are doing His will we will find peace and joy. When we fight Him on what we should and should not be doing, we feel frustration, depression, and even despair. Our constant seeking of things to make us happy is actually our innate desire for God and to fulfill His will. Unfortunately, we frequently don’t see the truth and avoid the one thing that will give us peace because it is hard, inconvenient, and doesn’t lead to what we think we want right now.
God wants what is best for us. He also thinks eternally. He doesn’t think in the here and now, like we do. Just as a parent makes decisions for his/her child based on knowledge of what will be better for them in the long term (saving vs spending, healthy food vs junk food, etc.), God makes decisions for us based on what will best prepare us for eternity with Him. Frequently that looks much different than what we think we want. Frequently that even includes hardship and pain because we are much more likely to grow in faith, strength, and holiness during hardship than we do during comfort. We need to understand that God knows best and that He never makes a mistake.
> Trust in the Lord with all your heart\
> And do not lean on your own understanding.\
> In all your ways acknowledge Him,\
> And He will make your paths straight.\
> Do not be wise in your own eyes;\
> Fear the Lord and turn away from evil.\
> It will be healing to your body\
> And refreshment to your bones. (Proverbs 3:5-8)
Nothing happens on earth without God allowing it. Just as Satan had to ask permission to persecute Job, in the same way nobody can cause believers harm without God allowing it for His purpose, which is usually related to helping them to put their full trust in Him.
> Remember the former things long past,\
> For I am God, and there is no other;\
> I am God, and there is no one like Me,\
> Declaring the end from the beginning,\
> And from ancient times things which have not been done,\
> Saying, ‘My purpose will be established,\
> And I will accomplish all My good pleasure’; (Isaiah 46:9-10)
So often I focus on how awesome, powerful, and holy our God is. He is also the most tender, loving, caring, personal father God. Read Psalm 139. The God of the Bible is not a distant clock maker who set the world in motion and let it go about without His care. He is personally involved in everything that happens and in the life of every person on earth, but especially in the life of those who trust in Him.
> **O Lord, You have searched me and known me.\
> You know when I sit down and when I rise up;\
> You understand my thought from afar.**\
> You scrutinize my path and my lying down,\
****And are intimately acquainted with all my ways.\
> Even before there is a word on my tongue,\
> Behold, O Lord, You know it all.**\
> You have enclosed me behind and before,\
> And laid Your hand upon me.\
****Such knowledge is too wonderful for me;\
> It is too high, I cannot attain to it.**\
> Where can I go from Your Spirit?\
> Or where can I flee from Your presence?\
> If I ascend to heaven, You are there;\
> If I make my bed in Sheol, behold, You are there.\
> If I take the wings of the dawn,\
> If I dwell in the remotest part of the sea,\
****Even there Your hand will lead me**,\
> And Your right hand will lay hold of me.\
> If I say, “Surely the darkness will overwhelm me,\
> And the light around me will be night,”\
> Even the darkness is not dark to You,\
> And the night is as bright as the day.\
> Darkness and light are alike to You.\
> For You formed my inward parts;\
> You wove me in my mother’s womb.\
> I will give thanks to You, for I am fearfully and wonderfully made;\
> Wonderful are Your works,\
> And my soul knows it very well.\
> My frame was not hidden from You,\
> When I was made in secret,\
> And skillfully wrought in the depths of the earth;\
****Your eyes have seen my unformed substance;\
> And in Your book were all written\
> The days that were ordained for me,\
> When as yet there was not one of them.**\
> How precious also are Your thoughts to me, O God!\
> How vast is the sum of them!\
> If I should count them, they would outnumber the sand.\
> When I awake, I am still with You.\
> O that You would slay the wicked, O God;\
> Depart from me, therefore, men of bloodshed.\
> For they speak against You wickedly,\
> And Your enemies take Your name in vain.\
> Do I not hate those who hate You, O Lord?\
> And do I not loathe those who rise up against You?\
> I hate them with the utmost hatred;|\
> They have become my enemies.\
****Search me, O God, and know my heart;\
> Try me and know my anxious thoughts;\
> And see if there be any hurtful way in me,\
> And lead me in the everlasting way**. (Psalm 139) {emphasis mine}
What is one of the greatest desires of our hearts? Isn’t it to be truly known and loved for who we are?
> O Lord, You have searched me and known me.\
> You know when I sit down and when I rise up;\
> You understand my thought from afar. (Psalm 139:1-2)
How amazing is it that the Creator of the universe knows you personally and cares for you among all of creation?
> Even before there is a word on my tongue,\
> Behold, O Lord, You know it all. (Psalm 139:4)
He knows our every action, our every thought, and our every feeling before we do.
> Such knowledge is too wonderful for me;\
> It is too high, I cannot attain to it. (Psalm 139:6)
We cannot fully understand how much our Creator cares for us and how carefully God guides us in our every path. We usually can’t see what is for our best. We usually can’t see what great work God is working in us. We usually can’t comprehend how great is His love, knowledge, and plan.
> Even there Your hand will lead me,\
> And Your right hand will lay hold of me. (Psalm 139:10)
It doesn’t matter how difficult a situation we have gotten into. It doesn’t matter how powerful our adversaries are. It doesn’t matter how weak we are. God is always there guiding us and protecting us. Just as God allowed Job to go through difficulty as part of God’s plan for Job and for us, He did not allow Job to be killed. He was guided through the worst of situations and led to ultimate blessing.
> Your eyes have seen my unformed substance;\
> And in Your book were all written\
> The days that were ordained for me,\
> When as yet there was not one of them. (Psalm 139:16)
God knew us and had a plan for us before He even created the universe. He knew every day we would live before we were conceived. We can’t surprise Him and He will be guiding us every day of our lives, especially those who have trusted Him as savior.
> How precious also are Your thoughts to me, O God!\
> How vast is the sum of them! (Psalm 139:17)
We are precious to God and He should be precious to us because of all He has done for us.
> Search me, O God, and know my heart;\
> Try me and know my anxious thoughts;\
> And see if there be any hurtful way in me,\
> And lead me in the everlasting way. (Psalm 139:23-24)
This should be our prayer. We should ask for Him to bring are faults to our minds so we can repent and we should ask for Him to lead us in His “*everlasting way*.” We should admit that our Father God knows best and submit to His will. Everything goes so much smoother when we aren’t fighting our God. Even when He leads us through hardship, being in His will makes all of the difference in the world.
I pray that you will put your trust in our loving Creator and that you will submit to His will. I pray that you will understand that His ways are better even when you don’t understand the why. I pray that you will humbly submit to His will and be used to further the Kingdom for His glory and your blessing.
Trust Jesus.
FYI, Psalm 139 is also one of the best passages on why all believers should oppose abortion. In God’s universe there are no accidents and there are no unwanted babies. Every person ever conceived had a purpose in God’s plan. Every person ever conceived is valuable and made in the image of God. God values all human life and so should we.
-
![](/static/nostr-icon-purple-64x64.png)
@ aade47fd:281e8e4f
2025-02-04 17:27:47
Сюрприз! Оказалось, что мне потребовалось две недели для того, чтобы сделать вторую запись в свой ЕЖЕДНЕВНИК. Раньше после такого оглушительного провала бросил бы это дело, но задачей дневника было формирование дисциплины, а не сам дневник. Нет ничего удивительного в том, что дисциплины на ежедневные записи не хватило сразу: буду стараться писать как можно чаще пока не выйду устойчиво на ежедневные публикации.
---
### Я на Сахалине
Вчера, третьего февраля, мы с отцом прилетели на Сахалин. Планирую провести здесь около трех-четырех месяцев, на пару летних месяцев вернусь в Питере (ве-ло-си-пед), а в августе снова на остров. Здесь очень много работы, а отвлекаться практически не на что. Именно то, что мне сейчас нужно.
---
### Личность
Есть я. Есть не я. Граница между мной и не мной — моя личность. Это структура, через которую внешний мир возействует на меня, а я на него. Над личностью можно и нужно работать. В конечном счете, я верю, что больше ни на что непосредственным образом мы не влияем. Мир это поток случайных событий и состояний. Уверен, что в моменте мы ничего не решаем — все реакции готовы заранее. Их подготовка — наша ответственность. В этом и заключается формирование личности. Можно сказать, что сформированная личность это стена, и чем она выше и прочнее, тем устойчивее твое бытие. С жадностью тащи камни для этой стены: любое решение и дело должно первостепенной целью ставить собственное развитие, а только потом уже внешний результат. Слабая личность пропускает в тебя все проклятия окружающего мира, делая жизнь жалкой и отправленной. Так бывает с теми, кто ставит ценности мира над своими собственными. Жаль, что я понял это так поздно. Повезло, что я понял это вообще. Здесь, на Сахалине, у меня будет время решить, чем наполнять мою жизнь, а что отвергать.
---
### Амбиции
Помню, что еще лет двадцать назад у слова "амбиции" было исключительно негативный смысл. Надеюсь, мы окончательно ушли от этого. Амбиции это аппетит к жизни. Человек без амбиций — полуживой, тень своего зомби. Такого невозможно полюбить. Новость для меня оказалась в том, что речь здесь идет не только о мужчинах: недавно я потерял интерес и симпатию к женщине не обнаружив в ней амбиций к развитию. Не ставлю на людях крест, я и сам провел много лет в таком состоянии, но лучше я буду двигаться один, чем стану пытаться кого-то растолкать. Спрашивают, может ли всемогущий Бог создать такой камень, который сам не смог бы поднять? Отвечаю: да, этот камень — человек.
---
На сегодня все. Встретимся завтра!
-
![](/static/nostr-icon-purple-64x64.png)
@ 91bea5cd:1df4451c
2025-02-04 17:24:50
### Definição de ULID:
Timestamp 48 bits, Aleatoriedade 80 bits
Sendo Timestamp 48 bits inteiro, tempo UNIX em milissegundos, Não ficará sem espaço até o ano 10889 d.C.
e Aleatoriedade 80 bits, Fonte criptograficamente segura de aleatoriedade, se possível.
#### Gerar ULID
```sql
CREATE EXTENSION IF NOT EXISTS pgcrypto;
CREATE FUNCTION generate_ulid()
RETURNS TEXT
AS $$
DECLARE
-- Crockford's Base32
encoding BYTEA = '0123456789ABCDEFGHJKMNPQRSTVWXYZ';
timestamp BYTEA = E'\\000\\000\\000\\000\\000\\000';
output TEXT = '';
unix_time BIGINT;
ulid BYTEA;
BEGIN
-- 6 timestamp bytes
unix_time = (EXTRACT(EPOCH FROM CLOCK_TIMESTAMP()) * 1000)::BIGINT;
timestamp = SET_BYTE(timestamp, 0, (unix_time >> 40)::BIT(8)::INTEGER);
timestamp = SET_BYTE(timestamp, 1, (unix_time >> 32)::BIT(8)::INTEGER);
timestamp = SET_BYTE(timestamp, 2, (unix_time >> 24)::BIT(8)::INTEGER);
timestamp = SET_BYTE(timestamp, 3, (unix_time >> 16)::BIT(8)::INTEGER);
timestamp = SET_BYTE(timestamp, 4, (unix_time >> 8)::BIT(8)::INTEGER);
timestamp = SET_BYTE(timestamp, 5, unix_time::BIT(8)::INTEGER);
-- 10 entropy bytes
ulid = timestamp || gen_random_bytes(10);
-- Encode the timestamp
output = output || CHR(GET_BYTE(encoding, (GET_BYTE(ulid, 0) & 224) >> 5));
output = output || CHR(GET_BYTE(encoding, (GET_BYTE(ulid, 0) & 31)));
output = output || CHR(GET_BYTE(encoding, (GET_BYTE(ulid, 1) & 248) >> 3));
output = output || CHR(GET_BYTE(encoding, ((GET_BYTE(ulid, 1) & 7) << 2) | ((GET_BYTE(ulid, 2) & 192) >> 6)));
output = output || CHR(GET_BYTE(encoding, (GET_BYTE(ulid, 2) & 62) >> 1));
output = output || CHR(GET_BYTE(encoding, ((GET_BYTE(ulid, 2) & 1) << 4) | ((GET_BYTE(ulid, 3) & 240) >> 4)));
output = output || CHR(GET_BYTE(encoding, ((GET_BYTE(ulid, 3) & 15) << 1) | ((GET_BYTE(ulid, 4) & 128) >> 7)));
output = output || CHR(GET_BYTE(encoding, (GET_BYTE(ulid, 4) & 124) >> 2));
output = output || CHR(GET_BYTE(encoding, ((GET_BYTE(ulid, 4) & 3) << 3) | ((GET_BYTE(ulid, 5) & 224) >> 5)));
output = output || CHR(GET_BYTE(encoding, (GET_BYTE(ulid, 5) & 31)));
-- Encode the entropy
output = output || CHR(GET_BYTE(encoding, (GET_BYTE(ulid, 6) & 248) >> 3));
output = output || CHR(GET_BYTE(encoding, ((GET_BYTE(ulid, 6) & 7) << 2) | ((GET_BYTE(ulid, 7) & 192) >> 6)));
output = output || CHR(GET_BYTE(encoding, (GET_BYTE(ulid, 7) & 62) >> 1));
output = output || CHR(GET_BYTE(encoding, ((GET_BYTE(ulid, 7) & 1) << 4) | ((GET_BYTE(ulid, 8) & 240) >> 4)));
output = output || CHR(GET_BYTE(encoding, ((GET_BYTE(ulid, 8) & 15) << 1) | ((GET_BYTE(ulid, 9) & 128) >> 7)));
output = output || CHR(GET_BYTE(encoding, (GET_BYTE(ulid, 9) & 124) >> 2));
output = output || CHR(GET_BYTE(encoding, ((GET_BYTE(ulid, 9) & 3) << 3) | ((GET_BYTE(ulid, 10) & 224) >> 5)));
output = output || CHR(GET_BYTE(encoding, (GET_BYTE(ulid, 10) & 31)));
output = output || CHR(GET_BYTE(encoding, (GET_BYTE(ulid, 11) & 248) >> 3));
output = output || CHR(GET_BYTE(encoding, ((GET_BYTE(ulid, 11) & 7) << 2) | ((GET_BYTE(ulid, 12) & 192) >> 6)));
output = output || CHR(GET_BYTE(encoding, (GET_BYTE(ulid, 12) & 62) >> 1));
output = output || CHR(GET_BYTE(encoding, ((GET_BYTE(ulid, 12) & 1) << 4) | ((GET_BYTE(ulid, 13) & 240) >> 4)));
output = output || CHR(GET_BYTE(encoding, ((GET_BYTE(ulid, 13) & 15) << 1) | ((GET_BYTE(ulid, 14) & 128) >> 7)));
output = output || CHR(GET_BYTE(encoding, (GET_BYTE(ulid, 14) & 124) >> 2));
output = output || CHR(GET_BYTE(encoding, ((GET_BYTE(ulid, 14) & 3) << 3) | ((GET_BYTE(ulid, 15) & 224) >> 5)));
output = output || CHR(GET_BYTE(encoding, (GET_BYTE(ulid, 15) & 31)));
RETURN output;
END
$$
LANGUAGE plpgsql
VOLATILE;
```
#### ULID TO UUID
```sql
CREATE OR REPLACE FUNCTION parse_ulid(ulid text) RETURNS bytea AS $$
DECLARE
-- 16byte
bytes bytea = E'\\x00000000 00000000 00000000 00000000';
v char[];
-- Allow for O(1) lookup of index values
dec integer[] = ARRAY[
255, 255, 255, 255, 255, 255, 255, 255, 255, 255,
255, 255, 255, 255, 255, 255, 255, 255, 255, 255,
255, 255, 255, 255, 255, 255, 255, 255, 255, 255,
255, 255, 255, 255, 255, 255, 255, 255, 255, 255,
255, 255, 255, 255, 255, 255, 255, 0, 1, 2,
3, 4, 5, 6, 7, 8, 9, 255, 255, 255,
255, 255, 255, 255, 10, 11, 12, 13, 14, 15,
16, 17, 1, 18, 19, 1, 20, 21, 0, 22,
23, 24, 25, 26, 255, 27, 28, 29, 30, 31,
255, 255, 255, 255, 255, 255, 10, 11, 12, 13,
14, 15, 16, 17, 1, 18, 19, 1, 20, 21,
0, 22, 23, 24, 25, 26, 255, 27, 28, 29,
30, 31
];
BEGIN
IF NOT ulid ~* '^[0-7][0-9ABCDEFGHJKMNPQRSTVWXYZ]{25}$' THEN
RAISE EXCEPTION 'Invalid ULID: %', ulid;
END IF;
v = regexp_split_to_array(ulid, '');
-- 6 bytes timestamp (48 bits)
bytes = SET_BYTE(bytes, 0, (dec[ASCII(v[1])] << 5) | dec[ASCII(v[2])]);
bytes = SET_BYTE(bytes, 1, (dec[ASCII(v[3])] << 3) | (dec[ASCII(v[4])] >> 2));
bytes = SET_BYTE(bytes, 2, (dec[ASCII(v[4])] << 6) | (dec[ASCII(v[5])] << 1) | (dec[ASCII(v[6])] >> 4));
bytes = SET_BYTE(bytes, 3, (dec[ASCII(v[6])] << 4) | (dec[ASCII(v[7])] >> 1));
bytes = SET_BYTE(bytes, 4, (dec[ASCII(v[7])] << 7) | (dec[ASCII(v[8])] << 2) | (dec[ASCII(v[9])] >> 3));
bytes = SET_BYTE(bytes, 5, (dec[ASCII(v[9])] << 5) | dec[ASCII(v[10])]);
-- 10 bytes of entropy (80 bits);
bytes = SET_BYTE(bytes, 6, (dec[ASCII(v[11])] << 3) | (dec[ASCII(v[12])] >> 2));
bytes = SET_BYTE(bytes, 7, (dec[ASCII(v[12])] << 6) | (dec[ASCII(v[13])] << 1) | (dec[ASCII(v[14])] >> 4));
bytes = SET_BYTE(bytes, 8, (dec[ASCII(v[14])] << 4) | (dec[ASCII(v[15])] >> 1));
bytes = SET_BYTE(bytes, 9, (dec[ASCII(v[15])] << 7) | (dec[ASCII(v[16])] << 2) | (dec[ASCII(v[17])] >> 3));
bytes = SET_BYTE(bytes, 10, (dec[ASCII(v[17])] << 5) | dec[ASCII(v[18])]);
bytes = SET_BYTE(bytes, 11, (dec[ASCII(v[19])] << 3) | (dec[ASCII(v[20])] >> 2));
bytes = SET_BYTE(bytes, 12, (dec[ASCII(v[20])] << 6) | (dec[ASCII(v[21])] << 1) | (dec[ASCII(v[22])] >> 4));
bytes = SET_BYTE(bytes, 13, (dec[ASCII(v[22])] << 4) | (dec[ASCII(v[23])] >> 1));
bytes = SET_BYTE(bytes, 14, (dec[ASCII(v[23])] << 7) | (dec[ASCII(v[24])] << 2) | (dec[ASCII(v[25])] >> 3));
bytes = SET_BYTE(bytes, 15, (dec[ASCII(v[25])] << 5) | dec[ASCII(v[26])]);
RETURN bytes;
END
$$
LANGUAGE plpgsql
IMMUTABLE;
CREATE OR REPLACE FUNCTION ulid_to_uuid(ulid text) RETURNS uuid AS $$
BEGIN
RETURN encode(parse_ulid(ulid), 'hex')::uuid;
END
$$
LANGUAGE plpgsql
IMMUTABLE;
```
#### UUID to ULID
```sql
CREATE OR REPLACE FUNCTION uuid_to_ulid(id uuid) RETURNS text AS $$
DECLARE
encoding bytea = '0123456789ABCDEFGHJKMNPQRSTVWXYZ';
output text = '';
uuid_bytes bytea = uuid_send(id);
BEGIN
-- Encode the timestamp
output = output || CHR(GET_BYTE(encoding, (GET_BYTE(uuid_bytes, 0) & 224) >> 5));
output = output || CHR(GET_BYTE(encoding, (GET_BYTE(uuid_bytes, 0) & 31)));
output = output || CHR(GET_BYTE(encoding, (GET_BYTE(uuid_bytes, 1) & 248) >> 3));
output = output || CHR(GET_BYTE(encoding, ((GET_BYTE(uuid_bytes, 1) & 7) << 2) | ((GET_BYTE(uuid_bytes, 2) & 192) >> 6)));
output = output || CHR(GET_BYTE(encoding, (GET_BYTE(uuid_bytes, 2) & 62) >> 1));
output = output || CHR(GET_BYTE(encoding, ((GET_BYTE(uuid_bytes, 2) & 1) << 4) | ((GET_BYTE(uuid_bytes, 3) & 240) >> 4)));
output = output || CHR(GET_BYTE(encoding, ((GET_BYTE(uuid_bytes, 3) & 15) << 1) | ((GET_BYTE(uuid_bytes, 4) & 128) >> 7)));
output = output || CHR(GET_BYTE(encoding, (GET_BYTE(uuid_bytes, 4) & 124) >> 2));
output = output || CHR(GET_BYTE(encoding, ((GET_BYTE(uuid_bytes, 4) & 3) << 3) | ((GET_BYTE(uuid_bytes, 5) & 224) >> 5)));
output = output || CHR(GET_BYTE(encoding, (GET_BYTE(uuid_bytes, 5) & 31)));
-- Encode the entropy
output = output || CHR(GET_BYTE(encoding, (GET_BYTE(uuid_bytes, 6) & 248) >> 3));
output = output || CHR(GET_BYTE(encoding, ((GET_BYTE(uuid_bytes, 6) & 7) << 2) | ((GET_BYTE(uuid_bytes, 7) & 192) >> 6)));
output = output || CHR(GET_BYTE(encoding, (GET_BYTE(uuid_bytes, 7) & 62) >> 1));
output = output || CHR(GET_BYTE(encoding, ((GET_BYTE(uuid_bytes, 7) & 1) << 4) | ((GET_BYTE(uuid_bytes, 8) & 240) >> 4)));
output = output || CHR(GET_BYTE(encoding, ((GET_BYTE(uuid_bytes, 8) & 15) << 1) | ((GET_BYTE(uuid_bytes, 9) & 128) >> 7)));
output = output || CHR(GET_BYTE(encoding, (GET_BYTE(uuid_bytes, 9) & 124) >> 2));
output = output || CHR(GET_BYTE(encoding, ((GET_BYTE(uuid_bytes, 9) & 3) << 3) | ((GET_BYTE(uuid_bytes, 10) & 224) >> 5)));
output = output || CHR(GET_BYTE(encoding, (GET_BYTE(uuid_bytes, 10) & 31)));
output = output || CHR(GET_BYTE(encoding, (GET_BYTE(uuid_bytes, 11) & 248) >> 3));
output = output || CHR(GET_BYTE(encoding, ((GET_BYTE(uuid_bytes, 11) & 7) << 2) | ((GET_BYTE(uuid_bytes, 12) & 192) >> 6)));
output = output || CHR(GET_BYTE(encoding, (GET_BYTE(uuid_bytes, 12) & 62) >> 1));
output = output || CHR(GET_BYTE(encoding, ((GET_BYTE(uuid_bytes, 12) & 1) << 4) | ((GET_BYTE(uuid_bytes, 13) & 240) >> 4)));
output = output || CHR(GET_BYTE(encoding, ((GET_BYTE(uuid_bytes, 13) & 15) << 1) | ((GET_BYTE(uuid_bytes, 14) & 128) >> 7)));
output = output || CHR(GET_BYTE(encoding, (GET_BYTE(uuid_bytes, 14) & 124) >> 2));
output = output || CHR(GET_BYTE(encoding, ((GET_BYTE(uuid_bytes, 14) & 3) << 3) | ((GET_BYTE(uuid_bytes, 15) & 224) >> 5)));
output = output || CHR(GET_BYTE(encoding, (GET_BYTE(uuid_bytes, 15) & 31)));
RETURN output;
END
$$
LANGUAGE plpgsql
IMMUTABLE;
```
#### Gera 11 Digitos aleatórios: YBKXG0CKTH4
```sql
-- Cria a extensão pgcrypto para gerar uuid
CREATE EXTENSION IF NOT EXISTS pgcrypto;
-- Cria a função para gerar ULID
CREATE OR REPLACE FUNCTION gen_lrandom()
RETURNS TEXT AS $$
DECLARE
ts_millis BIGINT;
ts_chars TEXT;
random_bytes BYTEA;
random_chars TEXT;
base32_chars TEXT := '0123456789ABCDEFGHJKMNPQRSTVWXYZ';
i INT;
BEGIN
-- Pega o timestamp em milissegundos
ts_millis := FLOOR(EXTRACT(EPOCH FROM clock_timestamp()) * 1000)::BIGINT;
-- Converte o timestamp para base32
ts_chars := '';
FOR i IN REVERSE 0..11 LOOP
ts_chars := ts_chars || substr(base32_chars, ((ts_millis >> (5 * i)) & 31) + 1, 1);
END LOOP;
-- Gera 10 bytes aleatórios e converte para base32
random_bytes := gen_random_bytes(10);
random_chars := '';
FOR i IN 0..9 LOOP
random_chars := random_chars || substr(base32_chars, ((get_byte(random_bytes, i) >> 3) & 31) + 1, 1);
IF i < 9 THEN
random_chars := random_chars || substr(base32_chars, (((get_byte(random_bytes, i) & 7) << 2) | (get_byte(random_bytes, i + 1) >> 6)) & 31 + 1, 1);
ELSE
random_chars := random_chars || substr(base32_chars, ((get_byte(random_bytes, i) & 7) << 2) + 1, 1);
END IF;
END LOOP;
-- Concatena o timestamp e os caracteres aleatórios
RETURN ts_chars || random_chars;
END;
$$ LANGUAGE plpgsql;
```
#### Exemplo de USO
```sql
-- Criação da extensão caso não exista
CREATE EXTENSION
IF
NOT EXISTS pgcrypto;
-- Criação da tabela pessoas
CREATE TABLE pessoas ( ID UUID DEFAULT gen_random_uuid ( ) PRIMARY KEY, nome TEXT NOT NULL );
-- Busca Pessoa na tabela
SELECT
*
FROM
"pessoas"
WHERE
uuid_to_ulid ( ID ) = '252FAC9F3V8EF80SSDK8PXW02F';
```
### Fontes
- https://github.com/scoville/pgsql-ulid
- https://github.com/geckoboard/pgulid
-
![](/static/nostr-icon-purple-64x64.png)
@ e97aaffa:2ebd765d
2025-02-04 16:58:18
Será que neste ciclo teremos turistas no #Bitcoin?
Nos últimos meses tenho me debruçado muito sobre este assunto, mas não consigo chegar a uma conclusão.
Antes de mais, o que são turistas?
Os turistas são aqueles que compram Bitcoin alimentados pelo FOMO, com a ganância de enriquecer rapidamente. Não tem o mínimo conhecimento do Bitcoin, nem tem interesse em conhecer, só estão pelo dinheiro.
Com a entrada dos turistas, o preço do Bitcoin começa a valorizar exponencialmente, é a segunda fase da _bullrun_, acontece sempre após o halving e após superar o anterior ATH. Com o novo ATH começa a surgir as notícias nas televisões e jornais, o mainstream acorda.
Só que a quantidade de turistas é de tal maneira elevada, muito superior à dos holders. Este desequilíbrio entre forças de curto prazo(turistas) e do longo prazo(_holders_), gera forte volatilidade. Quanto maior o desequilíbrio, maior a volatilidade.
A avalanche de turistas, faz o preço disparar e quanto mais sobe, mais turistas atrai.
Só que o movimento não dura para sempre, a esperança dos turistas de enriquecer rápido, desvanece e rapidamente se transforma numa desilusão, na sua grande maioria entra em pânico, assim que o preço começa a corrigir, vendendo em prejuízo. Sendo responsável pelas gigantes correções, superiores a 70%.
Este é o meu 4° ciclo, eu noto que este está a ser completamente diferente. Nos anteriores, os turistas entravam pelo Bitcoin, mas desta vez está a acontecer uma mudança.
Devido ao elevado _marketcap_ do Bitcoin, este já não permite valorização exponenciais num curto espaço de tempo, estes turistas que procuram multiplicar o seu dinheiro por 10x, 100x ou 1000x, estão a ir directamente para as shitcoins ou memecoins. Estas valorização pornograficas, só acontecerá em meia dúzia, mas o grande problema é que existem milhões de memecoins, é como encontrar uma agulha num palheiro. É o verdadeiro casino e os turistas procuram isto.
Só que neste ciclo, a maior parte dos novos _inflows_ estão a ser através do institucional, sobretudo pelos ETFs. Só que tem um perfil não diferente dos turistas, têm conhecimento de mercados financeiros tradicionais, são muito mais racionais, têm um conhecimento mínimo do Bitcoin. Não têm as mãos de diamante como os holders, mas também não são mãos de alface como os turistas. É um perfil de investidor intermédio. Poderá vender uma pequena parte do Bitcoin, para retirar uma parte do seu investimento inicial, mas tem um pensamento mais de médio-longo prazo.
Com isto, existe um maior equilíbrio entre os que pensam a curto prazo e os que pensam a longo prazo. Até ao momento, eu tenho a sensação que os turistas já não procuram o Bitcoin, ou são muito poucos.
O afastamento dos turistas é bom ou mau?
A meu ver é bom, é verdade que deixamos de ter aquelas enormes explosões no preço para cima, mas também acredito que as correções também serão muito menores. Em suma, uma redução na volatilidade do Bitcoin.
Mas essa redução na volatilidade, vai trazer um novo público, aquele que não é especulador, que apenas quer preservar o seu património, o real valor do Bitcoin, que pensa a longo prazo.
Estes turistas que procuram o 100x, com uma pura ganância, vão passar muitas noites sem dormir e na sua maioria vão perder muito dinheiro, vão acabar por receber uma dura lição de vida. Alguns vão finalmente compreender que Bitcoin é diferente, e que os 2x é suficiente para a sua vida.
A redução de turistas não afeta só o Bitcoin, mas também afeta o mercado das altcoins e das memecoins. Nos ciclos anteriores, os turistas entravam pelo Bitcoin mas depois rodavam o capital para as altcoins, gerando a chamada altseason. Se neste ciclo, os turistas descartam o Bitcoin, consequentemente a rotação será muito menor, possivelmente não haverá altseason.
Mas isto é apenas a minha convicção, só o tempo dirá, se os turistas trocaram o Bitcoin, pelo casino das memecoins.
-
![](/static/nostr-icon-purple-64x64.png)
@ 554ab6fe:c6cbc27e
2025-02-04 15:56:29
Modern life, despite all our technology, can still feel challenging. Many of us work very long hours to make ends meet, burdened by stress that can dramatically affect our health. The internet provides us with a wealth of helpful knowledge but also bombards us with headlines that can make us uneasy about the state of the world. In short, life can feel very stressful. Sometimes, leaving it all behind and becoming a monk may seem like a perfect way to escape it all. Though this may work for some, this is simply not a practical thing to do for many of us. Many of us are here to stay. However, even though the stressful nature of society will not change for a very long time, it is possible to reorient one's perspective so that it feels less stressful. In other words, rather than needing to go to a temple to become a monk, one can learn to bring the monk mind here.
It can be challenging to know where to begin to generate a positive outlook on life. So many people try to give advice, yet there never seems to be a "one size fits all" approach. We attempt to solve our outlooks by rationalizing the situation in a more positive way. Indeed, this can be useful for some, but not all. Furthermore, different people require different rationalizations. Regardless of advice, some are still stuck wondering how to have a better outlook on life. There is, of course, another method of perspective, and that is through non-judgment and simple acceptance.
Mindfulness meditation is a method of training the mind to become calmer and more at peace. In the scientific community, meditation is defined as a method of self-regulation of attention to the present moment, involving adopting a particular orientation toward one's experiences characterized by curiosity, openness, acceptance, and non-judgmental (Bishop et al., 2004). The benefits of meditation are many; however, much more research is required to understand its benefits and mechanisms better. The most well-documented benefit of mindfulness meditation is its ability to alleviate stress and anxiety (Greeson et al., 2018; Petterson & Olson, 2017; Querstret et al., 2020). The method by which this occurs is still reasonably unclear, yet many researchers have developed psychological and physiological theories. Furthermore, meditation reduces stress and anxiety while also creating resilience (Chin et al., 2019; Hwang et al., 2018). So, not only does it seem to be a curative treatment, but a preventative one as well. Understanding how meditation creates stress resilience is crucial to understand why meditation is so beneficial to health—the lessons provided in the research share profound philosophical lessons for us to bear in mind.
When studying meditation and its effects on the mind and body, it is essential to take a neuroscientific and psychological approach. The neuroscientific approach is valuable in both providing evidence that meditation impacts the body and sheds light on the mechanisms of action. A psychological perspective is also critical because it evaluates the mental schemas' effect on the body to better understand how the reader can practice this at home and in their daily lives. Both points of view will be discussed below.
**Amygdala and ACC connectivity**
The two brain areas that seem to be highly related to the process of resilience toward stress induced by mindfulness meditation are the amygdala and the anterior cingulate cortex (ACC).
The amygdala is found medial to the brain's temporal lobe and plays a vital role in emotional regulation and attention (Desbordes et al., 2012). For this reason, numerous studies have shown to be heavily involved in the experience of stress (Britton, 2006; Hölzel et al., 2009; Rubinow et al., 2016). It also influences the body in response to stress. For example, the amygdala regulates blood pressure in response to stressful stimuli (Saha, 2005).
The role of the ACC is seemingly more complex than the amygdala. In general, it is involved in executing responses regarding incoming interoceptive signals (signals from within the body) (Craig, 2002). For this reason, it connects to the motor cortex of the brain (Craig, 2002). On this same note, the anterior portion of the amygdala, the more executive region, has been associated with regulating endocrine functions, conditioned learning responses, expressing internal states vocally, and maternal-infant interactions (Devinsky et al., 1995). The ACC is related mainly to the processing of internal stimuli, associating it with the practice of mindfulness meditation. Less clear is how it relates to the amygdala and resilience to stress.
The neuroscientific observations of stress resilience are found within the connectivity between the amygdala and the ACC. In a randomized control trial involving a 3-day intensive mindfulness meditation program, researchers found that reduced stress following the practice was marked by decreased communication between the amygdala and the ACC (Taren et al., 2014). The study also noted reduced communication between the amygdala and ACC lessened HPA-axis activation (Taren et al., 2014). The HPA-axis is responsible for releasing hormones such as cortisol, which is a common biomarker for the activation of stress. This study is not alone in observing signs that mindfulness meditation reduces cortisol (Hoge et al., 2018). This is strong evidence that meditation induces physical changes within the brain, promoting resilience to biological responses to stress. The question is, how does this occur mentally, and how can we put this into practice?
**Important Techniques within Meditation**
The discussion and research surrounding how meditation leads to physical changes in the brain and body are complex and poorly understood. The appreciation for science in the west is new, and there is much research to be done. The author's current opinion is that meditation involves both [physical](https://highlighter.com/a/naddr1qvzqqqr4gupzq422kmldvavct44endu667mcfluv5jjmqfmcsyhpj68wurrvhsn7qq056etrdpsku6tnd4ej6mmx94xk2erfw3shg6t0dckh2at48pnxv7kh9ug) and [mental](https://highlighter.com/a/naddr1qvzqqqr4gupzq422kmldvavct44endu667mcfluv5jjmqfmcsyhpj68wurrvhsn7qqdyzt2zd3shxapdw3hj6argv5k4qctnwsknvme389m8steunzv) mechanisms that lead to some of its practical health benefits. Regarding resilience, a randomized control trial also observed that the resilience created was both physical and mental (Hoge et al., 2018). Though the exact mechanism is not fully understood, there has been an effort to gain insight applicable to modern-day life.
The research involving the mechanism at which meditation generates resilience towards stress is often pursued from a psychological point of view. To pursue this question, experiments involve different groups of people who are asked to perform similar tasks but differ in mental schemas practiced. The observed differences in health results indicate specific meditation techniques that are so helpful in generating resilience. For example, a randomized control trial in 2018 involved sending a group of participants to a temple (Hwang et al., 2018). One group was asked to participate in meditation sessions, while another group was asked to simply relax during this time at a peaceful place. The purpose was to discern whether or not the relaxing aspect of meditation was sufficient to produce resilience to stress or if something else was causing the change. The results found that both groups showed short-term benefits, but only the meditators had prolonged resilience towards stress months after the experiment. The results indicate that there was a mental practice involved through meditation that promoted stress resilience. A randomized control trial in 2019 expanded on this investigation by having one group of meditators purely practice the focused attention on the present, while the other group focused on the present while also cultivating a perspective of acceptance to all incoming stimuli (Chin et al., 2019). This study found that those who practiced a non-judgmental awareness showed a more significant reduction of stress than the attention group and the non-meditators, suggesting that the non-judgmental awareness of the present moment and experience was an essential aspect of stress resilience. Others have produced a similar theory on why meditation seems to be a healthy therapeutic method for those suffering from PTSD (Thompson & Waltz, 2010). The significance of these findings is not only crucial for those who have a meditation practice but anyone in general.
**Be Non-Judgmental**
A key aspect of meditation practice is to be mindful and aware of the present experience and interpret all thoughts, experiences, and stimuli in an accepting and non-judgemental manner. Not only is this important within the philosophical teachings, but it is a core aspect of how meditation works from a scientific point of view. This has profound implications for the importance of how we generate personal narratives. In meditation, one learns to let go of every incoming experience, no matter how tempting it is to value that thought or feeling. This is perhaps why the amygdala and ACC are involved. The amygdala is involved in emotions and stress, and the ACC is involved in "doing something about it." In meditation, no matter the feeling, thought, or stressor, one must cultivate an attitude of acceptance. One must simply continue sitting and focusing on the present. There is no evaluation, no judgment, simply acceptance.
This article began with the idea that one can become resilient to stress and experience less of it by simply reorienting their perspective of modern stressors. It was also stated that there is seemingly no one answer for everyone. This may be because people often try to generate rational or schemas to help people think about events differently. This article argues a different approach: don't think, just accept, let go, and move on. This is easier said than done, of course, and by no means are the benefits of meditation best articulated through argument. It is best to be experienced first hand.
Nonetheless, we are heavily burdened by the values we give to thoughts related to the stressors of modern-day life. We cannot avoid the stressors, but we can change their power over us. Removing their meaning and value removes their power and influence.
**References**
Bishop, S. R., Lau, M., Shapiro, S., Carlson, L., Anderson, N. D., Carmody, J., Segal, Z. v., Abbey, S., Speca, M., Velting, D., & Devins, G. (2004). Mindfulness: A Proposed Operational Definition. Clinical Psychology: Science and Practice, 11(3), 230–241. https://doi.org/10.1093/clipsy.bph077
Britton, W. B. (2006). Meditation and Depression.
Chin, B., Lindsay, E. K., Greco, C. M., Brown, K. W., Smyth, J. M., Wright, A. G. C., & Creswell, J. D. (2019). Psychological mechanisms driving stress resilience in mindfulness training: A randomized controlled trial. Health Psychology, 38(8), 759–768. https://doi.org/10.1037/hea0000763
Craig, A. D. (2002). How do you feel? Nature Review. https://doi.org/10.1177/1359105308095062
Desbordes, G., Negi, L. T., Pace, T. W. W., Alan Wallace, B., Raison, C. L., & Schwartz, E. L. (2012). Effects of mindful-attention and compassion meditation training on amygdala response to emotional stimuli in an ordinary, Nonmeditative State. Frontiers in Human Neuroscience, 6(OCTOBER 2012), 292. https://doi.org/10.3389/fnhum.2012.00292
Devinsky, O., Morrell, M. J., & Vogt, B. A. (1995). Contributions of anterior cingulate cortex to behaviour. Brain, 118(1), 279–306. https://doi.org/10.1093/BRAIN/118.1.279
Greeson, J. M., Zarrin, H., Smoski, M. J., Brantley, J. G., Lynch, T. R., Webber, D. M., Hall, M. H., Suarez, E. C., & Wolever, R. Q. (2018). Mindfulness Meditation Targets Transdiagnostic Symptoms Implicated in Stress-Related Disorders: Understanding Relationships between Changes in Mindfulness, Sleep Quality, and Physical Symptoms. Evidence-Based Complementary and Alternative Medicine, 2018. https://doi.org/10.1155/2018/4505191
Hoge, E. A., Bui, E., Palitz, S. A., Schwarz, N. R., Owens, M. E., Johnston, J. M., Pollack, M. H., & Simon, N. M. (2018). The effect of mindfulness meditation training on biological acute stress responses in generalized anxiety disorder. Psychiatry Research, 262(May 2016), 328–332. https://doi.org/10.1016/j.psychres.2017.01.006
Hölzel, B. K., Carmody, J., Evans, K. C., Hoge, E. A., Dusek, J. A., Morgan, L., Pitman, R. K., & Lazar, S. W. (2009). Stress reduction correlates with structural changes in the amygdala. Social Cognitive and Affective Neuroscience, 5(1), 11–17. https://doi.org/10.1093/scan/nsp034
Hwang, W. J., Lee, T. Y., Lim, K. O., Bae, D., Kwak, S., Park, H. Y., & Kwon, J. S. (2018). The effects of four days of intensive mindfulness meditation training (Templestay program) on resilience to stress: A randomized controlled trial. Psychology, Health and Medicine, 23(5), 497–504. https://doi.org/10.1080/13548506.2017.1363400
Petterson, H., & Olson, B. L. (2017). Effects of mindfulness-based interventions in high school and college athletes for reducing stress and injury, and improving quality of life. Journal of Sport Rehabilitation, 26(6), 578–587. https://doi.org/10.1123/jsr.2016-0047
Querstret, D., Morison, L., Dickinson, S., Cropley, M., & John, M. (2020). Mindfulness-based stress reduction and mindfulness-based cognitive therapy for psychological health and well-being in nonclinical samples: A systematic review and meta-analysis. International Journal of Stress Management, 27(4), 394–411. https://doi.org/10.1037/str0000165
Rubinow, M. J., Mahajan, G., May, W., Overholser, J. C., Jurjus, G. J., Dieter, L., Herbst, N., Steffens, D. C., Miguel-Hidalgo, J. J., Rajkowska, G., & Stockmeier, C. A. (2016). Basolateral amygdala volume and cell numbers in major depressive disorder: a postmortem stereological study. Brain Structure and Function, 221(1), 171–184. https://doi.org/10.1007/s00429-014-0900-z
Saha, S. (2005). ROLE OF THE CENTRAL NUCLEUS OF THE AMYGDALA IN THE CONTROL OF BLOOD PRESSURE: DESCENDING PATHWAYS TO MEDULLARY CARDIOVASCULAR NUCLEI. Clinical and Experimental Pharmacology and Physiology, 32(5–6), 450–456. https://doi.org/10.1111/j.1440-1681.2005.04210.x
Taren, A. A., Gianaros, P. J., Greco, C. M., Lindsay, E. K., Fairgrieve, A., Brown, K. W., Rosen, R. K., Ferris, J. L., Julson, E., Marsland, A. L., Bursley, J. K., Ramsburg, J., & Creswell, J. D. (2014). Mindfulness meditation training alters stress-related amygdala resting state functional connectivity: A randomized controlled trial. Social Cognitive and Affective Neuroscience, 10(12), 1758–1768. https://doi.org/10.1093/scan/nsv066
Thompson, B. L., & Waltz, J. (2010). Mindfulness and experiential avoidance as predictors of posttraumatic stress disorder avoidance symptom severity. Journal of Anxiety Disorders, 24(4), 409–415. https://doi.org/10.1016/j.janxdis.2010.02.005
-
![](/static/nostr-icon-purple-64x64.png)
@ a012dc82:6458a70d
2025-02-04 15:49:10
Bitcoin halving is a cornerstone event in the cryptocurrency landscape, occurring approximately every four years, or after every 210,000 blocks are mined. This event is significant because it marks a reduction in the reward that miners receive for adding new blocks to the Bitcoin blockchain, effectively halving the rate at which new bitcoins are generated. The concept of halving is embedded in Bitcoin's protocol by Satoshi Nakamoto, its mysterious creator, as a measure to mimic the scarcity and deflationary characteristics of precious metals like gold. This mechanism is crucial in controlling the supply of Bitcoin, ensuring that it remains finite and valuable. As the next halving event draws near, it's not just miners who are impacted; the entire cryptocurrency market, including investors and enthusiasts, keenly anticipates the potential outcomes. Historically, halving events have been associated with increased market activity, price volatility, and heightened public interest in Bitcoin. The event is seen as a moment of transformation for Bitcoin, where the dynamics of supply and demand are altered, potentially leading to significant shifts in its market value.
**Table Of Content**
- Understanding the Hash Rate Surge
- Implications of the Rising Hash Rate
- The Halving Event: What to Expect
- Preparing for the Halving
- Conclusion
- FAQs
**Understanding the Hash Rate Surge**
**What is Hash Rate?**
The hash rate, in the context of Bitcoin, refers to the total computational power being used to mine and process transactions on the blockchain. It's a vital metric that reflects the health and security of the network. A higher hash rate means that more computational resources are being dedicated to maintaining the network, making it more robust against potential attacks. The hash rate is measured in hashes per second (H/s), and with advancements in mining technology, the network has seen this rate reach exahash levels (1 EH/s = 1 quintillion hashes per second). This metric is crucial for miners, as it affects their chances of solving the mathematical puzzles required to mine new blocks and earn rewards. It also indicates the level of competition among miners, as a higher hash rate suggests more participants or more powerful mining equipment in the network.
**Record-Breaking Levels**
The Bitcoin network's hash rate has recently hit an all-time high, reaching a staggering 491 exahashes per second (EH/s). This surge is indicative of the growing strength and security of the network. Such a high hash rate means that the network is more resilient than ever to potential attacks, such as the 51% attack, where a single entity could potentially gain control over the majority of the network's mining power. This level of security is crucial, especially as Bitcoin continues to gain mainstream acceptance and attract significant institutional investment. The record-breaking hash rate also reflects the increasing global interest in Bitcoin mining. It suggests that despite the high costs associated with mining - including specialized hardware and significant electricity consumption - miners are still heavily investing in this activity. This investment is not just in terms of money but also in research and development of more efficient mining technologies, which could further drive up the hash rate.
**Implications of the Rising Hash Rate**
**Enhanced Network Security**
The surge in Bitcoin's hash rate is a positive development for the network's security. A higher hash rate means that it becomes exponentially more difficult for a malicious actor to orchestrate an attack on the network. This security is paramount for a system that handles billions of dollars worth of transactions. The decentralized nature of Bitcoin relies heavily on the integrity of its blockchain, which is maintained by this collective computational effort. As the hash rate increases, the confidence in the network's security also grows, which is crucial for both individual users and institutional investors. This enhanced security is particularly important in the context of the upcoming halving event, as it ensures the stability and reliability of the network during a period of significant change.
**Increased Mining Difficulty**
With the rise in hash rate comes an increase in the difficulty of mining Bitcoin. The Bitcoin network is designed to adjust the difficulty of mining new blocks approximately every two weeks to ensure that the time between blocks remains around 10 minutes. As more computational power joins the network, the difficulty increases, making it harder for individual miners to solve the cryptographic puzzles required to mine new blocks. This increase in difficulty can have several implications for miners. Smaller miners or those with less efficient equipment may find it increasingly difficult to compete with larger mining operations that have access to more powerful and efficient technology. This could lead to a consolidation in the mining industry, where only the most efficient operations can survive. Additionally, as the difficulty increases, the profitability of mining can decrease, especially if the price of Bitcoin does not increase proportionally. Miners must constantly evaluate their operations' efficiency and electricity costs to ensure continued profitability.
**Energy Consumption Concerns**
The rising hash rate of the Bitcoin network has brought renewed attention to the issue of energy consumption in Bitcoin mining. The process of mining Bitcoin is energy-intensive, as it requires a significant amount of computational power. As the hash rate increases, so does the total energy consumption of the network. This has led to concerns about the environmental impact of Bitcoin mining, especially in regions where electricity is generated from fossil fuels. The debate around Bitcoin's energy consumption is complex. On one hand, proponents argue that much of the energy used for Bitcoin mining comes from renewable sources, and the industry drives innovation in energy efficiency. On the other hand, critics point out that the overall energy consumption is still substantial and could be directed towards other, more productive uses. This debate is likely to continue as the network grows and the hash rate increases, especially in the context of global concerns about climate change and sustainable energy practices.
**The Halving Event: What to Expect**
**Reward Reduction**
The upcoming Bitcoin halving event is a scheduled reduction in the rewards that miners receive for verifying and adding new transactions to the blockchain. This halving reduces the number of new bitcoins created and earned by miners with each new block from 6.25 bitcoins to 3.125 bitcoins. This event occurs every 210,000 blocks, or approximately every four years, and is a fundamental part of Bitcoin's economic model. The halving is designed to mimic the extraction of precious resources, becoming progressively harder and less rewarding over time. This mechanism ensures that the total supply of Bitcoin will never exceed 21 million coins, making Bitcoin a deflationary asset. The halving event is significant because it affects the economics of Bitcoin mining. With the reward halving, the revenue for miners is effectively cut in half overnight. This can lead to a shakeout in the mining industry, as less efficient miners may no longer be profitable and could be forced to shut down their operations.
**Market Impact**
Historically, Bitcoin halving events have been followed by significant price increases. This pattern has led to a common perception that halving events are bullish for Bitcoin's price. The rationale behind this is simple: as the rate of new supply of Bitcoin decreases, and if demand remains constant or increases, the price should theoretically go up. However, it's important to note that financial markets are influenced by a myriad of factors, and the impact of the halving may already be priced in by the time it occurs. Additionally, each halving event occurs in a different macroeconomic environment, and past performance is not indicative of future results. Investors and traders closely watch these events, as they can lead to increased volatility in the market. Some see the halving as an opportunity for long-term investment, while others may speculate on short-term price movements.
**Preparing for the Halving**
**Miner Adaptations**
In anticipation of the halving and its impact on profitability, miners are taking various steps to adapt. One key strategy is the investment in more efficient mining hardware. Newer models of mining rigs offer greater hash power with lower energy consumption, which can help maintain profitability even with reduced rewards. Miners are also exploring alternative sources of revenue, such as transaction fee income, which could become a more significant part of their earnings post-halving. Additionally, miners are looking at geographical relocation to regions with cheaper electricity and favorable regulatory environments to reduce operational costs. Another consideration for miners is the potential consolidation of mining operations. Larger mining pools might have a better chance of surviving the reduced rewards, leading to a more centralized mining landscape. This potential centralization raises concerns within the Bitcoin community, as it could impact the decentralized nature of the network.
**Investor Strategies**
Investors are also preparing for the halving event in various ways. Many are closely analyzing historical data to understand potential market movements, although it's widely acknowledged that past trends may not necessarily predict future outcomes. Some investors view the halving as a key event that could drive long-term value growth in Bitcoin and are adjusting their portfolios accordingly. Others are more cautious, considering the potential for increased volatility around the event. There is also a focus on diversification, with investors looking at other cryptocurrencies and blockchain projects that might benefit from increased interest in the crypto space around the halving. Additionally, institutional investors, who have increasingly entered the cryptocurrency market, are likely to play a significant role in how the market reacts to the halving. Their strategies, which may include hedging and derivative trading, could influence Bitcoin's price dynamics in ways that were not seen in previous halving events.
**Conclusion**
The countdown to the Bitcoin halving is a period of significant anticipation and activity within the cryptocurrency community. The record-breaking hash rate ahead of the event is a testament to the network's strength and the commitment of its participants to maintain and secure the blockchain. As the halving approaches, the crypto world watches with keen interest, eager to see how this pivotal event will shape the future of Bitcoin. Whether it leads to a surge in price, increased adoption, or new challenges for miners, the halving is a reminder of the unique and dynamic nature of cryptocurrency and its underlying technology. As with any major event in the crypto space, the halving presents both opportunities and risks, and how it plays out could have lasting implications for the entire blockchain ecosystem.
**FAQs**
**What is Bitcoin Halving?**
Bitcoin halving is an event that occurs approximately every four years, reducing the reward for mining new Bitcoin blocks by half. This mechanism controls the supply of new bitcoins and is a fundamental part of Bitcoin's economic model.
**Why is the Bitcoin Hash Rate Important?**
The hash rate measures the total computational power used in mining and processing transactions on the Bitcoin network. A higher hash rate indicates a more secure and robust network, making it resistant to attacks.
**What Happens to Bitcoin's Price After Halving?**
Historically, Bitcoin's price has increased following halving events, but this is not guaranteed. Market reactions can be unpredictable, and various factors influence Bitcoin's price.
**How Does Halving Affect Bitcoin Miners?**
Halving reduces the reward miners receive for validating new blocks, impacting their profitability. Miners often need to upgrade to more efficient hardware or find cheaper energy sources to remain competitive.
**Can Bitcoin Halving Lead to Increased Centralization in Mining?**
Potentially, yes. As mining becomes less profitable for smaller operations, there could be a consolidation towards larger mining pools, which might lead to a more centralized mining landscape.
**Is the Increase in Bitcoin's Hash Rate Linked to the Upcoming Halving?**
Yes, the increase in hash rate is often linked to the upcoming halving as miners upgrade their equipment and increase their computational power in anticipation of the reduced mining rewards.
**That's all for today**
**If you want more, be sure to follow us on:**
**NOSTR: croxroad@getalby.com**
**X: [@croxroadnews.co](https://x.com/croxroadnewsco)**
**Instagram: [@croxroadnews.co](https://www.instagram.com/croxroadnews.co/)**
**Youtube: [@croxroadnews](https://www.youtube.com/@croxroadnews)**
**Store: https://croxroad.store**
**Subscribe to CROX ROAD Bitcoin Only Daily Newsletter**
**https://www.croxroad.co/subscribe**
***DISCLAIMER: None of this is financial advice. This newsletter is strictly educational and is not investment advice or a solicitation to buy or sell any assets or to make any financial decisions. Please be careful and do your own research.***
-
![](/static/nostr-icon-purple-64x64.png)
@ 1833ee04:7c4a8170
2025-02-04 15:14:03
The international race for Bitcoin strategic reserves is just getting started.
If you’re stacking now, you’re still incredibly early.
At $100k per Bitcoin, it’s practically free for anyone who truly understands how massive this shift is.
Think back to when paper currency was introduced, people had to trade their gold for paper bills. Many laughed, saying, Who’s going to trust these worthless pieces of paper as money?
Yet today, you sell your time to earn these paper bills while your government can print an unlimited amount at will.
The world is returning to a gold standard. But this time, it’s Gold 2.0 which is Bitcoin.The international race for Bitcoin strategic reserves is just getting started.\
\
If you’re stacking now, you’re still incredibly early.\
\
At $100k per Bitcoin, it’s practically free for anyone who truly understands how massive this shift is.\
\
Think back to when paper currency was introduced, people had to trade their gold for paper bills. Many laughed, saying, Who’s going to trust these worthless pieces of paper as money?\
\
Yet today, you sell your time to earn these paper bills while your government can print an unlimited amount at will.\
\
The world is returning to a gold standard. But this time, it’s Gold 2.0 which is Bitcoin.
-
![](/static/nostr-icon-purple-64x64.png)
@ 5af07946:98fca8c4
2025-02-04 15:13:27
Syādvāda, also known as the theory of conditional predication, is a fundamental concept in Jain philosophy that bears some intriguing similarities to modern concepts of probability.
## Conditional Prediction system
Syādvāda is a theory of epistemological relativism that forms the basis of Jain [logic](https://www.newworldencyclopedia.org/entry/Syadvada). The term "syād" in Sanskrit means "may be" or "perhaps," and in the context of syādvāda, it translates to "in some ways" or "from a perspective". This theory asserts that reality is complex and multifaceted, and no single proposition can fully express its nature.
## Saptabhangi: The Seven-fold Predication
The core of syādvāda is manifested in the process of Saptabhangi, or seven-fold prediction. This approach examines reality from seven different conditional and relative viewpoints:
- Syādasti (maybe, it is)
- Syānnāsti (maybe, it is not)
- Syādasti nāsti (maybe, it is, and it is not)
- Syādavaktavya (maybe, it is indeterminate)
- Syādasti avaktavya (maybe, it is and is indeterminate)
- Syānnāsti avaktavya (maybe, it is not and is indeterminate)
- Syādasti nāsti avaktavya (maybe, it is, is not, and is indeterminate)
## Connections to Probability
Syādvāda shares conceptual similarities with Probability theory:
- Non-absolutism: Like probability theory, syādvāda acknowledges uncertainty and rejects absolute [statements](https://indiaphilosophy.wordpress.com/tag/syadvad/). However, it asserts that there are only seven categories necessary and also sufficient to exhaust all possibilities of knowledge!
- Conditional nature: Both syādvāda and probability deal with conditional statements and [chances](https://jainfriends.tripod.com/books/jiblsyadvada.html)
- Multiple outcomes: Syādvāda's seven-fold prediction can be seen as analogous to considering multiple possible outcomes in probability.
- Indeterminacy: The fourth category of syādvāda, "avaktavya" (indeterminate), has been interpreted by some scholars as having relevance to the concept of probability.
## An Illustrative Example
Consider the tossing of a coin:
- "It is head" (now) - Syādasti
- "It is not-head" (on another occasion) - Syānnāsti
- "It is, and it is not" - Syādasti nāsti
- "It is indeterminate" (before the toss) - Syādavaktavya
This example demonstrates how syādvāda's categories can be applied to a situation involving uncertainty, similar to how we might approach it using probability theory.
## Historical Significance and Modern Relevance
Syādvāda was well-developed by the 6th century AD and received significant attention in medieval Indian logic. It is believed that it was based on astrological principles of Maharishi Parashara - the father of ancient astrology.
-
![](/static/nostr-icon-purple-64x64.png)
@ 5d4b6c8d:8a1c1ee3
2025-02-04 14:14:39
My best day yet: it's been 17 hours since I ate or drank anything.
I'm about to have my coffee and I'll probably eat soon after that.
I would have gone longer without food yesterday, but we had cookies in the house and I wanted to eat some before I finished my morning coffee.
Fast February Data
Day 1: 14 hours (13 dry)
Day 2: 15 hours (14 dry)
Day 3: 17 hours (16 dry)
Day 4: TBD (17 dry)
originally posted at https://stacker.news/items/875506
-
![](/static/nostr-icon-purple-64x64.png)
@ 916a7ab7:146bb83e
2025-02-04 13:35:11
It was not ago that my life was simpler than it is today.
I remember being a simple clone, droning on through a structured life as I'd been trained to do since birth.
Like most people I knew, I was raised in a world where you were mentally prepared for a conceptually simple life:
1. Finish high school, if possible.
2. Go to college, if possible.
3. Find a job.
4. Earn money.
5. Pay bills.
6. Get married.
7. Start a family.
8. Pay more bills.
9. Raise family and (hopefully) launch the kids.
10. Plan to retire, but expect to work into your 70s.
It was a programmed formula for life. A generational blueprint, if you will. Sure, there would be unpredictable details, but I expected my life to follow this path.
As I plodded along through my fairly boring life, I checked most of those things off the list. High school was easy, but getting off the farm was not. Enlisting in the military solved that problem, and the pay in the mid-1990s wasn't bad for a 17 year old kid with no bills. I got paid every two weeks, lived in the barracks, and spent most of my money on booze. Life was good, and I had no other purpose than to do my job and keep earning money.
Before I knew it, though, everything changed. I got married, had some kids and accumulated a mountain of debt. Like my parents before me, I was stuck in a never ending cycle of working my ass off, paying bills, buying food, and trying to save what little money was left over for a future that was unpredictable at best. Financial struggles stressed our marriage, the kids continued eating more and more food, and then 2008 tanked the value of our home. That was the first nudge that stirred my oblivious slumber.
And there was more to come. Rising taxes, inflation, the clown show at the federal reserve, the wars funded by central banks, an astronomical national debt, and the burdens of our mistakes weighing down the futures of our children. Not to mention a federal government that actively seeks to censor, suppress, and financially imprison its own people. The times exuded chaos.
Then a few months ago, I woke up...
It happened during an episode of The Tuttle Twins, a cartoon show from Angel Studios. I homeschool my three youngest kids, and I'd let them watch TV during lunch so I could grade some papers. This cartoon was new to me, but the kids liked the music and the crazy raccoon. As fate would have it, they ended up watching an episode about Bitcoin. This, of course, led to a long series of questions:
"Dad, what's Bitcoin?"
"Is Bitcoin real?"
"Do you have Bitcoin?"
"Can I get Bitcoin for allowance instead of dollars?"
I had no answers for these questions, so we started doing some research together. We turned on our Chromebooks and launched a barrage of web searches. After reading a bunch of articles I came away with the idea that Bitcoin might be a real thing. Later that evening, and after the kids were in bed, I couldn't stop thinking about Bitcoin. I honestly didn't understand half of what I read in those articles, which bothered me. I'm not a super smart guy, but I catch on to things pretty quickly, and I wanted to better understand what I'd read. I expanded my search to podcasts and YouTube videos.
I ended up listening to a couple episodes from a Bitcoin Veterans podcast. As a veteran myself, I figured that this group of Bitcoin-savvy veterans would be able to help me figure out all this madness. I was right. I quickly learned that the word "Bitcoin" was just the tip of the iceberg, and I quickly found myself falling through an endless rabbit hole. They pointed me in a lot of different directions, but they were all helpful. (If you're a US military veteran and want to connect with this group, find them at [bitcoinveterans.org].)
A couple months ago, I couldn't tell you the difference between a Bitcoin and a meme coin. I'd come across the phrase Bitcoin mining, and I just thought there was a special group of people who mined a special metal to create coins with a big "B" on them. Why couldn't they just use the metal we already mined? Sheesh! I thought nostr was a virus, and a Kraken was still a giant squid.
As of today, I'm happy to say that I've made a little bit of progress. Those things above no longer confuse me, and I actually have a little bit of Bitcoin now. Sure, I'm still trying to wrap my head around NFTs and figure out who the Pepe frog man is, but I'm no longer completely lost. Not to mention, I just spent most of the last 24 hours figuring this whole nostr thing out, which excites me. I kind of missed the boat on the big name social media platforms, so I'm looking forward to this new decentralized approach to things.
For now, I'm just happy to be awake. Finally. I see the need for decentralization and the necessity of moving away from fiat monies. I don't have much to offer except my intellect and my love of writing, but I'm here to serve in any way that I can.
-
![](/static/nostr-icon-purple-64x64.png)
@ 3ffac3a6:2d656657
2025-02-04 12:34:24
Nos idos gloriosos do início dos anos 2000, quando o Orkut ainda era rei e o maior dilema da humanidade era escolher o toque de celular polifônico menos vergonhoso, meu amigo Luciano decidiu se casar. E, como manda a tradição milenar dos homens que tomam decisões questionáveis, organizamos uma despedida de solteiro. O palco da epopeia? A lendária Skorpius, um puteiro popular de Belo Horizonte, famoso não só pelas profissionais do entretenimento adulto, mas também pelos shows de strip-tease que faziam qualquer um se sentir protagonista de um filme B.
A turma estava completa: eu, Anita (sim, a minha namorada, porque aqui não tem frescura), o irmão dela e uma galera animada. Tínhamos uma mesa grande, cheia de cerveja, risadas e aquela energia de quem acha que está vivendo um momento histórico. Contratamos um show de lap dance para o noivo, porque é o que se faz nessas ocasiões, e o clima era de pura diversão.
Entre os convivas, estava o concunhado do Luciano — marido da irmã da noiva. Um rapaz do interior, da nossa idade, mas com uma inocência que parecia ter sido importada direto de um conto de fadas. O menino bebeu como se não houvesse amanhã e ficou absolutamente hipnotizado pelas dançarinas. Até que uma delas, talvez tocada por um instinto maternal ou simplesmente pelo espírito da zoeira, resolveu dar atenção especial ao rapaz.
E lá estava ele: quando nos distraímos por dois minutos, o concunhado estava BEIJANDO a profissional na boca. Sim, no meio da Skorpius, com a convicção de quem achava que tinha encontrado o amor verdadeiro. Um detalhe importante: a moça tinha apenas um braço. Nada contra, mas o conjunto da cena era tão surreal que o Luciano, num ato de irmandade e danos controlados, arrancou o concunhado dali antes que ele pedisse a mão dela em casamento (no caso, literalmente).
Dois meses depois, o universo conspirou para o grande clímax: um churrasco de aniversário do Edinanci, com a galera toda reunida. A esposa do Luciano (o nome dela se perdeu na memória, mas o rancor ficou registrado) estava possessa. Fez um tour diplomático pelo evento, indo de namorada em namorada, de esposa em esposa:
— Você sabia que os meninos foram num puteiro e contrataram show de strip-tease na despedida de solteiro do Luciano?
O concunhado, corroído pela culpa, tinha confessado para a irmã o seu “pecado”, que por sua vez contou para a noiva do Luciano, que resolveu transformar o churrasco num tribunal de Pequenas Causas.
Mas nada superou o momento em que ela chegou para a Anita:
— Você sabia disso?
E a Anita, com a serenidade de quem não deve nada para a vida:
— Claro que eu sabia. Eu estava lá!
Fim da história? O concunhado continuou sua jornada de autoconhecimento e arrependimento. O Luciano, porém, conquistou o prêmio maior: um divórcio relâmpago, com menos de seis meses de casamento. Moral da história? Nunca subestime o poder de um puteiro, de um concunhado ingênuo e de uma Anita sincerona.
-
![](/static/nostr-icon-purple-64x64.png)
@ 177ff913:b25cacc0
2025-02-04 08:47:39
NUX88 là một nền tảng giải trí trực tuyến nổi bật, mang đến cho người dùng những trải nghiệm thú vị và an toàn. Giao diện của NUX88 được thiết kế với phong cách hiện đại và tối ưu hóa cho mọi thiết bị, từ máy tính để bàn đến điện thoại di động. Người dùng có thể dễ dàng truy cập vào nền tảng và tận hưởng các dịch vụ giải trí mà không gặp phải bất kỳ khó khăn nào. NUX88 cam kết cung cấp một hệ thống ổn định với tốc độ truy cập nhanh chóng, giúp người dùng tham gia vào các hoạt động giải trí mà không lo bị gián đoạn.
Bảo mật là một trong những yếu tố quan trọng mà <a href="https://nux88.cc">NUX88</a> luôn chú trọng. Nền tảng này sử dụng công nghệ mã hóa tiên tiến để bảo vệ toàn bộ thông tin cá nhân và giao dịch của người dùng. Dữ liệu tài khoản, thông tin thanh toán và các giao dịch đều được xử lý một cách bảo mật và an toàn tuyệt đối. NUX88 cam kết không chia sẻ bất kỳ thông tin cá nhân nào của người dùng cho bên thứ ba mà không có sự đồng ý rõ ràng. Nền tảng cũng liên tục cập nhật các biện pháp bảo mật mới nhất để ngăn chặn các mối đe dọa từ bên ngoài, tạo ra một môi trường giải trí trực tuyến an toàn và đáng tin cậy.
Với NUX88, dịch vụ chăm sóc khách hàng luôn được ưu tiên hàng đầu. Đội ngũ hỗ trợ của NUX88 luôn sẵn sàng giải đáp mọi thắc mắc và cung cấp sự trợ giúp cho người dùng 24/7. Người dùng có thể liên hệ với đội ngũ hỗ trợ qua nhiều kênh khác nhau như chat trực tuyến, email hoặc điện thoại. Đội ngũ chăm sóc khách hàng tại NUX88 được đào tạo chuyên nghiệp và tận tâm, luôn cố gắng mang đến sự hỗ trợ nhanh chóng và hiệu quả. Điều này giúp đảm bảo rằng mọi vấn đề của người dùng sẽ được giải quyết kịp thời và mang lại sự hài lòng cao nhất.
Bên cạnh việc cung cấp các dịch vụ giải trí chất lượng, NUX88 cũng đặc biệt chú trọng đến việc tạo ra các chương trình khuyến mãi hấp dẫn và ưu đãi đặc biệt cho người dùng. Các chương trình này không chỉ mang đến cho người tham gia những phần thưởng giá trị mà còn giúp nâng cao giá trị trải nghiệm. NUX88 luôn cập nhật các sự kiện khuyến mãi và ưu đãi mới, giúp người dùng có cơ hội nhận thêm nhiều lợi ích khi tham gia vào các hoạt động giải trí trên nền tảng. Những chương trình này thường xuyên được tổ chức để mang đến sự mới mẻ và hấp dẫn, khuyến khích người dùng quay lại và tận hưởng dịch vụ.
Cuối cùng, NUX88 cam kết mang đến một nền tảng giải trí trực tuyến đáng tin cậy và chất lượng. Với giao diện dễ sử dụng, bảo mật mạnh mẽ, dịch vụ chăm sóc khách hàng tận tâm và các chương trình khuyến mãi hấp dẫn, NUX88 là một sự lựa chọn lý tưởng cho những ai tìm kiếm một không gian giải trí an toàn và phong phú. Nền tảng này không chỉ cung cấp những phút giây thư giãn tuyệt vời mà còn đảm bảo sự an toàn, bảo mật tuyệt đối cho người dùng. NUX88 chắc chắn sẽ là một người bạn đồng hành đáng tin cậy trong mọi hành trình giải trí trực tuyến của bạn.
-
![](/static/nostr-icon-purple-64x64.png)
@ 177ff913:b25cacc0
2025-02-04 08:46:38
MCW77 là một nền tảng giải trí trực tuyến uy tín, được thiết kế để mang đến cho người dùng trải nghiệm giải trí tuyệt vời và mượt mà. Với giao diện hiện đại, dễ sử dụng và tối ưu hóa cho cả thiết bị di động và máy tính để bàn, người dùng có thể dễ dàng truy cập vào nền tảng và tham gia vào các hoạt động giải trí. MCW77 cam kết cung cấp một hệ thống hoạt động ổn định và tốc độ truy cập nhanh chóng, đảm bảo không có gián đoạn trong suốt quá trình sử dụng dịch vụ. Người dùng sẽ được tận hưởng trải nghiệm giải trí liên tục và không gặp phải các vấn đề về kết nối hay tốc độ.
Bảo mật luôn là một yếu tố quan trọng tại <a href="https://mcw77-vn.com">MCW77</a>. Nền tảng này áp dụng các công nghệ bảo mật tiên tiến, giúp bảo vệ mọi giao dịch và thông tin cá nhân của người dùng. Mọi dữ liệu, từ thông tin đăng nhập đến các giao dịch tài chính, đều được mã hóa và xử lý một cách an toàn. MCW77 cam kết không bao giờ chia sẻ thông tin cá nhân của người dùng cho bên thứ ba mà không có sự đồng ý rõ ràng. Nền tảng này cũng liên tục cập nhật các biện pháp bảo mật mới để chống lại các mối đe dọa từ bên ngoài, đảm bảo người dùng luôn có một không gian giải trí an toàn và đáng tin cậy.
Một yếu tố không thể thiếu trong mọi nền tảng giải trí trực tuyến là dịch vụ khách hàng. MCW77 hiểu rõ tầm quan trọng của dịch vụ hỗ trợ và luôn cố gắng nâng cao chất lượng chăm sóc khách hàng. Đội ngũ hỗ trợ của MCW77 luôn sẵn sàng giải đáp mọi thắc mắc và cung cấp sự trợ giúp 24/7. Người dùng có thể dễ dàng liên hệ qua nhiều kênh khác nhau như chat trực tuyến, email hoặc điện thoại. Đội ngũ hỗ trợ của MCW77 luôn đáp ứng nhanh chóng và hiệu quả mọi yêu cầu, từ đó mang đến sự hài lòng tuyệt đối cho khách hàng.
MCW77 cũng rất chú trọng đến việc mang đến các chương trình khuyến mãi và ưu đãi hấp dẫn cho người dùng. Những chương trình này không chỉ giúp người dùng tận hưởng thêm lợi ích khi tham gia vào các dịch vụ mà còn tạo thêm động lực và sự hứng khởi khi trải nghiệm nền tảng. Các sự kiện và khuyến mãi được tổ chức thường xuyên và luôn có những phần thưởng giá trị, giúp người dùng có thể tối đa hóa giá trị giải trí của mình. MCW77 cam kết liên tục cải thiện và cập nhật các chương trình khuyến mãi để mang đến những cơ hội tuyệt vời cho người dùng.
Cuối cùng, MCW77 không ngừng nỗ lực nâng cao chất lượng dịch vụ để đáp ứng nhu cầu giải trí của người dùng. Với sự kết hợp hoàn hảo giữa giao diện thân thiện, bảo mật mạnh mẽ, dịch vụ chăm sóc khách hàng chuyên nghiệp và các chương trình khuyến mãi hấp dẫn, MCW77 đã và đang trở thành một trong những nền tảng giải trí trực tuyến hàng đầu. Người dùng không chỉ được tận hưởng những phút giây thư giãn tuyệt vời mà còn được đảm bảo an toàn tuyệt đối khi tham gia vào các hoạt động trên nền tảng. MCW77 xứng đáng là lựa chọn lý tưởng cho những ai tìm kiếm một không gian giải trí trực tuyến đẳng cấp và đáng tin cậy.
-
![](/static/nostr-icon-purple-64x64.png)
@ e3ba5e1a:5e433365
2025-02-04 08:29:42
President Trump has started rolling out his tariffs, something I [blogged about in November](https://www.snoyman.com/blog/2024/11/steelmanning-tariffs/). People are talking about these tariffs a lot right now, with many people (correctly) commenting on how consumers will end up with higher prices as a result of these tariffs. While that part is true, I’ve seen a lot of people taking it to the next, incorrect step: that consumers will pay the entirety of the tax. I [put up a poll on X](https://x.com/snoyberg/status/1886035800019599808) to see what people thought, and while the right answer got a lot of votes, it wasn't the winner.
![image](https://yakihonne.s3.ap-east-1.amazonaws.com/e3ba5e1a06e11c860036b5c5e688012be2a84760abc066ac34a099535e433365/files/1738657292355-YAKIHONNES3.png)
For purposes of this blog post, our ultimate question will be the following:
* Suppose apples currently sell for $1 each in the entire United States.
* There are domestic sellers and foreign sellers of apples, all receiving the same price.
* There are no taxes or tariffs on the purchase of apples.
* The question is: if the US federal government puts a $0.50 import tariff per apple, what will be the change in the following:
* Number of apples bought in the US
* Price paid by buyers for apples in the US
* Post-tax price received by domestic apple producers
* Post-tax price received by foreign apple producers
Before we can answer that question, we need to ask an easier, first question: before instituting the tariff, why do apples cost $1?
And finally, before we dive into the details, let me provide you with the answers to the ultimate question. I recommend you try to guess these answers before reading this, and if you get it wrong, try to understand why:
1. The number of apples bought will go down
2. The buyers will pay more for each apple they buy, but not the full amount of the tariff
3. Domestic apple sellers will receive a *higher* price per apple
4. Foreign apple sellers will receive a *lower* price per apple, but not lowered by the full amount of the tariff
In other words, regardless of who sends the payment to the government, both taxed parties (domestic buyers and foreign sellers) will absorb some of the costs of the tariff, while domestic sellers will benefit from the protectionism provided by tariffs and be able to sell at a higher price per unit.
## Marginal benefit
All of the numbers discussed below are part of a [helper Google Sheet](https://docs.google.com/spreadsheets/d/14ZbkWpw1B9Q1UDB9Yh47DmdKQfIafVVBKbDUsSIfGZw/edit?usp=sharing) I put together for this analysis. Also, apologies about the jagged lines in the charts below, I hadn’t realized before starting on this that there are [some difficulties with creating supply and demand charts in Google Sheets](https://superuser.com/questions/1359731/how-to-create-a-supply-demand-style-chart).
Let’s say I absolutely love apples, they’re my favorite food. How much would I be willing to pay for a single apple? You might say “$1, that’s the price in the supermarket,” and in many ways you’d be right. If I walk into supermarket A, see apples on sale for $50, and know that I can buy them at supermarket B for $1, I’ll almost certainly leave A and go buy at B.
But that’s not what I mean. What I mean is: how high would the price of apples have to go *everywhere* so that I’d no longer be willing to buy a single apple? This is a purely personal, subjective opinion. It’s impacted by how much money I have available, other expenses I need to cover, and how much I like apples. But let’s say the number is $5.
How much would I be willing to pay for another apple? Maybe another $5. But how much am I willing to pay for the 1,000th apple? 10,000th? At some point, I’ll get sick of apples, or run out of space to keep the apples, or not be able to eat, cook, and otherwise preserve all those apples before they rot.
The point being: I’ll be progressively willing to spend less and less money for each apple. This form of analysis is called *marginal benefit*: how much benefit (expressed as dollars I’m willing to spend) will I receive from each apple? This is a downward sloping function: for each additional apple I buy (quantity demanded), the price I’m willing to pay goes down. This is what gives my personal *demand curve*. And if we aggregate demand curves across all market participants (meaning: everyone interested in buying apples), we end up with something like this:
![Demand curve before tax](https://www.snoyman.com/img/who-pays-tax/demand-before-tariff.png)
Assuming no changes in people’s behavior and other conditions in the market, this chart tells us how many apples will be purchased by our buyers at each price point between $0.50 and $5. And ceteris paribus (all else being equal), this will continue to be the demand curve for apples.
## Marginal cost
Demand is half the story of economics. The other half is supply, or: how many apples will I sell at each price point? Supply curves are upward sloping: the higher the price, the more a person or company is willing and able to sell a product.
Let’s understand why. Suppose I have an apple orchard. It’s a large property right next to my house. With about 2 minutes of effort, I can walk out of my house, find the nearest tree, pick 5 apples off the tree, and call it a day. 5 apples for 2 minutes of effort is pretty good, right?
Yes, there was all the effort necessary to buy the land, and plant the trees, and water them… and a bunch more than I likely can’t even guess at. We’re going to ignore all of that for our analysis, because for short-term supply-and-demand movement, we can ignore these kinds of *sunk costs*. One other simplification: in reality, supply curves often start descending before ascending. This accounts for achieving efficiencies of scale after the first number of units purchased. But since both these topics are unneeded for understanding taxes, I won’t go any further.
Anyway, back to my apple orchard. If someone offers me $0.50 per apple, I can do 2 minutes of effort and get $2.50 in revenue, which equates to a $75/hour wage for me. I’m more than happy to pick apples at that price\!
However, let’s say someone comes to buy 10,000 apples from me instead. I no longer just walk out to my nearest tree. I’m going to need to get in my truck, drive around, spend the day in the sun, pay for gas, take a day off of my day job (let’s say it pays me $70/hour). The costs go up significantly. Let’s say it takes 5 days to harvest all those apples myself, it costs me $100 in fuel and other expenses, and I lose out on my $70/hour job for 5 days. We end up with:
* Total expenditure: $100 \+ $70 \* 8 hours a day \* 5 days \== $2900
* Total revenue: $5000 (10,000 apples at $0.50 each)
* Total profit: $2100
So I’m still willing to sell the apples at this price, but it’s not as attractive as before. And as the number of apples purchased goes up, my costs keep increasing. I’ll need to spend more money on fuel to travel more of my property. At some point I won’t be able to do the work myself anymore, so I’ll need to pay others to work on the farm, and they’ll be slower at picking apples than me (less familiar with the property, less direct motivation, etc.). The point being: at some point, the number of apples can go high enough that the $0.50 price point no longer makes me any money.
This kind of analysis is called *marginal cost*. It refers to the additional amount of expenditure a seller has to spend in order to produce each additional unit of the good. Marginal costs go up as quantity sold goes up. And like demand curves, if you aggregate this data across all sellers, you get a supply curve like this:
![Supply curve before tariff](https://www.snoyman.com/img/who-pays-tax/supply-before-tariff.png)
## Equilibrium price
We now know, for every price point, how many apples buyers will purchase, and how many apples sellers will sell. Now we find the equilibrium: where the supply and demand curves meet. This point represents where the marginal benefit a buyer would receive from the next buyer would be less than the cost it would take the next seller to make it. Let’s see it in a chart:
![Supply and demand before tariff](https://www.snoyman.com/img/who-pays-tax/supply-demand-before-tariff.png)
You’ll notice that these two graphs cross at the $1 price point, where 63 apples are both demanded (bought by consumers) and supplied (sold by producers). This is our equilibrium price. We also have a visualization of the *surplus* created by these trades. Everything to the left of the equilibrium point and between the supply and demand curves represents surplus: an area where someone is receiving something of more value than they give. For example:
* When I bought my first apple for $1, but I was willing to spend $5, I made $4 of consumer surplus. The consumer portion of the surplus is everything to the left of the equilibrium point, between the supply and demand curves, and above the equilibrium price point.
* When a seller sells his first apple for $1, but it only cost $0.50 to produce it, the seller made $0.50 of producer surplus. The producer portion of the surplus is everything to the left of the equilibrium point, between the supply and demand curves, and below the equilibrium price point.
Another way of thinking of surplus is “every time someone got a better price than they would have been willing to take.”
OK, with this in place, we now have enough information to figure out how to price in the tariff, which we’ll treat as a negative externality.
## Modeling taxes
Alright, the government has now instituted a $0.50 tariff on every apple sold within the US by a foreign producer. We can generally model taxes by either increasing the marginal cost of each unit sold (shifting the supply curve up), or by decreasing the marginal benefit of each unit bought (shifting the demand curve down). In this case, since only some of the producers will pay the tax, it makes more sense to modify the supply curve.
First, let’s see what happens to the foreign seller-only supply curve when you add in the tariff:
![Foreign supply shift from tariff](https://www.snoyman.com/img/who-pays-tax/supply-tariff-shift.png)
With the tariff in place, for each quantity level, the price at which the seller will sell is $0.50 higher than before the tariff. That makes sense: if I was previously willing to sell my 82nd apple for $3, I would now need to charge $3.50 for that apple to cover the cost of the tariff. We see this as the tariff “pushing up” or “pushing left” the original supply curve.
We can add this new supply curve to our existing (unchanged) supply curve for domestic-only sellers, and we end up with a result like this:
![Supply curves post tariff](https://www.snoyman.com/img/who-pays-tax/supply-curves-post-tariff.png)
The total supply curve adds up the individual foreign and domestic supply curves. At each price point, we add up the total quantity each group would be willing to sell to determine the total quantity supplied for each price point. Once we have that cumulative supply curve defined, we can produce an updated supply-and-demand chart including the tariff:
![Supply and demand post tariff](https://www.snoyman.com/img/who-pays-tax/supply-demand-post-tariff.png)
As we can see, the equilibrium has shifted:
* The equilibrium price paid by consumers has risen from $1 to $1.20.
* The total number of apples purchased has dropped from 63 apples to 60 apples.
* Consumers therefore received 3 less apples. They spent $72 for these 60 apples, whereas previously they spent $63 for 3 more apples, a definite decrease in consumer surplus.
* Foreign producers sold 36 of those apples (see the raw data in the linked Google Sheet), for a gross revenue of $43.20. However, they also need to pay the tariff to the US government, which accounts for $18, meaning they only receive $25.20 post-tariff. Previously, they sold 42 apples at $1 each with no tariff to be paid, meaning they took home $42.
* Domestic producers sold the remaining 24 apples at $1.20, giving them a revenue of $28.80. Since they don’t pay the tariff, they take home all of that money. By contrast, previously, they sold 21 apples at $1, for a take-home of $21.
* The government receives $0.50 for each of the 60 apples sold, or in other words receives $30 in revenue it wouldn’t have received otherwise.
We could be more specific about the surpluses, and calculate the actual areas for consumer surplus, producer surplus, inefficiency from the tariff, and government revenue from the tariff. But I won’t bother, as those calculations get slightly more involved. Instead, let’s just look at the aggregate outcomes:
* Consumers were unquestionably hurt. Their price paid went up by $0.20 per apple, and received less apples.
* Foreign producers were also hurt. Their price received went down from the original $1 to the new post-tariff price of $1.20, minus the $0.50 tariff. In other words: foreign producers only receive $0.70 per apple now. This hurt can be mitigated by shifting sales to other countries without a tariff, but the pain will exist regardless.
* Domestic producers scored. They can sell less apples and make more revenue doing it.
* And the government walked away with an extra $30.
Hopefully you now see the answer to the original questions. Importantly, while the government imposed a $0.50 tariff, neither side fully absorbed that cost. Consumers paid a bit more, foreign producers received a bit less. The exact details of how that tariff was split across the groups is mediated by the relevant supply and demand curves of each group. If you want to learn more about this, the relevant search term is “price elasticity,” or how much a group’s quantity supplied or demanded will change based on changes in the price.
## Other taxes
Most taxes are some kind of a tax on trade. Tariffs on apples is an obvious one. But the same applies to income tax (taxing the worker for the trade of labor for money) or payroll tax (same thing, just taxing the employer instead). Interestingly, you can use the same model for analyzing things like tax incentives. For example, if the government decided to subsidize domestic apple production by giving the domestic producers a $0.50 bonus for each apple they sell, we would end up with a similar kind of analysis, except instead of the foreign supply curve shifting up, we’d see the domestic supply curve shifting down.
And generally speaking, this is what you’ll *always* see with government involvement in the economy. It will result in disrupting an existing equilibrium, letting the market readjust to a new equilibrium, and incentivization of some behavior, causing some people to benefit and others to lose out. We saw with the apple tariff, domestic producers and the government benefited while others lost.
You can see the reverse though with tax incentives. If I give a tax incentive of providing a deduction (not paying income tax) for preschool, we would end up with:
* Government needs to make up the difference in tax revenue, either by raising taxes on others or printing more money (leading to inflation). Either way, those paying the tax or those holding government debased currency will pay a price.
* Those people who don’t use the preschool deduction will receive no benefit, so they simply pay a cost.
* Those who do use the preschool deduction will end up paying less on tax+preschool than they would have otherwise.
This analysis is fully amoral. It’s not saying whether providing subsidized preschool is a good thing or not, it simply tells you where the costs will be felt, and points out that such government interference in free economic choice does result in inefficiencies in the system. Once you have that knowledge, you’re more well educated on making a decision about whether the costs of government intervention are worth the benefits.
-
![](/static/nostr-icon-purple-64x64.png)
@ da0b9bc3:4e30a4a9
2025-02-04 07:52:55
Hello Stackers!
Welcome on into the ~Music Corner of the Saloon!
A place where we Talk Music. Share Tracks. Zap Sats.
So stay a while and listen.
🚨Don't forget to check out the pinned items in the territory homepage! You can always find the latest weeklies there!🚨
🚨Subscribe to the territory to ensure you never miss a post! 🚨
originally posted at https://stacker.news/items/875346
-
![](/static/nostr-icon-purple-64x64.png)
@ 177ff913:b25cacc0
2025-02-04 07:21:26
MCW18 là một nền tảng giải trí trực tuyến tiên tiến, được thiết kế với mục tiêu mang đến trải nghiệm mượt mà và thú vị cho người dùng. Giao diện của nền tảng này rất dễ sử dụng, tối ưu hóa cho tất cả các thiết bị, từ máy tính để bàn đến điện thoại di động, giúp người dùng có thể tiếp cận dịch vụ một cách nhanh chóng và thuận tiện. MCW18 luôn đảm bảo tốc độ truy cập ổn định, giúp người dùng có thể tham gia vào các hoạt động giải trí mà không gặp phải bất kỳ sự gián đoạn nào. Nền tảng này mang đến một không gian giải trí trực tuyến chất lượng cao và tiện lợi cho người sử dụng.
Bảo mật là một trong những yếu tố quan trọng hàng đầu tại <a href="https://mcw18.cc">MCW18</a>. Nền tảng này áp dụng công nghệ mã hóa tiên tiến để bảo vệ mọi thông tin cá nhân và giao dịch của người dùng. Dữ liệu đăng nhập, thông tin tài khoản và các giao dịch tài chính đều được xử lý một cách bảo mật và an toàn tuyệt đối. MCW18 cam kết không chia sẻ bất kỳ thông tin cá nhân nào của người dùng cho bên thứ ba mà không có sự đồng ý của họ. Đội ngũ kỹ thuật của MCW18 luôn theo dõi và cập nhật các biện pháp bảo mật mới nhất để đối phó với những mối đe dọa từ bên ngoài, mang lại sự yên tâm cho người dùng khi tham gia vào nền tảng.
Ngoài bảo mật, MCW18 còn chú trọng đến chất lượng dịch vụ khách hàng. Đội ngũ hỗ trợ của MCW18 luôn sẵn sàng 24/7 để giải đáp mọi thắc mắc và giúp đỡ người dùng khi gặp phải bất kỳ vấn đề nào. Người dùng có thể dễ dàng liên hệ qua nhiều kênh khác nhau như chat trực tuyến, email hoặc điện thoại. Đội ngũ chăm sóc khách hàng của MCW18 rất chuyên nghiệp và tận tâm, luôn cố gắng mang đến sự hỗ trợ nhanh chóng và hiệu quả, giúp người dùng giải quyết mọi vấn đề trong thời gian ngắn nhất.
MCW18 cũng rất chú trọng đến việc cải thiện trải nghiệm người dùng thông qua các chương trình khuyến mãi và ưu đãi hấp dẫn. Người dùng có thể tham gia vào các sự kiện và nhận nhiều phần thưởng giá trị, tạo thêm động lực và sự hào hứng khi tham gia vào các dịch vụ trên nền tảng. Các chương trình khuyến mãi của MCW18 được tổ chức thường xuyên và luôn được cập nhật để đáp ứng nhu cầu của người dùng. Điều này giúp MCW18 không chỉ cung cấp một trải nghiệm giải trí tuyệt vời mà còn mang đến những cơ hội nhận thưởng hấp dẫn cho người tham gia.
Cuối cùng, MCW18 cam kết không ngừng nâng cao chất lượng dịch vụ và đáp ứng mọi nhu cầu của người dùng. Với sự kết hợp giữa giao diện dễ sử dụng, bảo mật mạnh mẽ, hỗ trợ khách hàng chuyên nghiệp và các chương trình khuyến mãi hấp dẫn, MCW18 đã và đang trở thành lựa chọn hàng đầu của nhiều người dùng yêu thích giải trí trực tuyến. Nền tảng này không chỉ đảm bảo sự an toàn và bảo mật mà còn mang đến những giây phút thư giãn tuyệt vời, giúp người dùng có thể tận hưởng một trải nghiệm giải trí hoàn hảo và trọn vẹn.
-
![](/static/nostr-icon-purple-64x64.png)
@ b7274d28:c99628cb
2025-02-04 05:31:13
For anyone interested in the list of essential essays from nostr:npub14hn6p34vegy4ckeklz8jq93mendym9asw8z2ej87x2wuwf8werasc6a32x ([@anilsaidso](https://x.com/anilsaidso)) on Twitter that nostr:npub1h8nk2346qezka5cpm8jjh3yl5j88pf4ly2ptu7s6uu55wcfqy0wq36rpev mentioned on Read 856, here it is. I have compiled it with as many of the essays as I could find, along with the audio versions, when available. Additionally, if the author is on #Nostr, I have tagged their npub so you can thank them by zapping them some sats.
All credit for this list and the graphics accompanying each entry goes to nostr:npub14hn6p34vegy4ckeklz8jq93mendym9asw8z2ej87x2wuwf8werasc6a32x, whose original thread can be found here: [Anil's Essential Essays Thread](https://x.com/anilsaidso/status/1290758632238276609)
![Anil's Tweet](https://relay.brightbolt.net/76b99225834f9d2b5f4ea1efa0d0c20bb497b45369da91487b80de89fc4f56e0.jpg)
## 1.
![Masters and Slaves of Money](https://relay.brightbolt.net/2546dfaa314b1fd2ce2512519405487eaf74df6950632f94f58c61e7a8d07111.jpg)
> History shows us that the corruption of monetary systems leads to moral decay, social collapse, and slavery.
Essay: https://breedlove22.medium.com/masters-and-slaves-of-money-255ecc93404f
Audio: https://fountain.fm/episode/RI0iCGRCCYdhnMXIN3L6
## 2.
![The Bitcoin Reformation](https://relay.brightbolt.net/404b5d868f24e5f353cf6f6ccf7dfb27f86bc5efde753548719d92a046cdb986.jpg)
> The 21st century emergence of Bitcoin, encryption, the internet, and millennials are more than just trends; they herald a wave of change that exhibits similar dynamics as the 16-17th century revolution that took place in Europe.
Author: nostr:npub13l3lyslfzyscrqg8saw4r09y70702s6r025hz52sajqrvdvf88zskh8xc2
Essay: https://casebitcoin.com/docs/TheBitcoinReformation_TuurDemeester.pdf
Audio: https://fountain.fm/episode/uLgBG2tyCLMlOp3g50EL
## 3.
![The Danger of the Collective 'We'](https://relay.brightbolt.net/a5a1e6e28fe92142bf6fcde0bf3681b927e414f18eca4fb8c8b9d537570c949e.jpg)
> There are many men out there who will parrot the "debt is money WE owe OURSELVES" without acknowledging that "WE" isn't a static entity, but a collection of individuals at different points in their lives.
Author: nostr:npub1guh5grefa7vkay4ps6udxg8lrqxg2kgr3qh9n4gduxut64nfxq0q9y6hjy
Essay: https://www.tftc.io/issue-754-ludwig-von-mises-human-action/
Audio: https://fountain.fm/episode/UXacM2rkdcyjG9xp9O2l
## 4.
![The Bullish Case for Bitcoin](https://relay.brightbolt.net/af60765a440a9fd4d301b1c7f43797b3fa8e0f9bb262bb63f9f9fd31b5e6424e.jpg)
> If Bitcoin exists for 20 years, there will be near-universal confidence that it will be available forever, much as people believe the Internet is a permanent feature of the modern world.
Essay: https://vijayboyapati.medium.com/the-bullish-case-for-bitcoin-6ecc8bdecc1
Audio: https://fountain.fm/episode/jC3KbxTkXVzXO4vR7X3W
As you are surely aware, Vijay has expanded this into a book available here: [The Bullish Case for Bitcoin Book](https://www.bullishcaseforbitcoin.com/product-page/the-bullish-case-for-bitcoin-paperback-1)
There is also an audio book version available here: [The Bullish Case for Bitcoin Audio Book](https://www.audible.com/pd/The-Bullish-Case-for-Bitcoin-Audiobook/B09QXR9GVL?eac_link=m4syoiXYyRJh&ref=web_search_eac_asin_1&eac_selected_type=asin&eac_selected=B09QXR9GVL&qid=2tIYC0F4Ya&eac_id=135-0887332-3379864_2tIYC0F4Ya&sr=1-1)
## 5.
![Bitcoin Becomes the Flag of Technology](https://relay.brightbolt.net/0c1f799a44010b79db2762884deae7686f3ec0b13bf9a9f077faa3c95b2c645f.jpg)
> This realignment would not be traditional right vs left, but rather land vs cloud, state vs network, centralized vs decentralized, new money vs old, internationalist/capitalist vs nationalist/socialist, MMT vs BTC,...Hamilton vs Satoshi.
Essay: https://nakamoto.com/bitcoin-becomes-the-flag-of-technology/
Audio: https://fountain.fm/episode/tFJKjYLKhiFY8voDssZc
## 6.
[Gradually, Then Suddenly](https://relay.brightbolt.net/fa4196f5c6183bda153e2e3c9911909d289b5a428852f5f07f7c1991191e7489.jpg)
> I became convinced that, whether bitcoin survives or not, the existing financial system is working on borrowed time.
Essay: https://nakamotoinstitute.org/mempool/gradually-then-suddenly/
Audio: https://fountain.fm/episode/Mf6hgTFUNESqvdxEIOGZ
Parker Lewis went on to release several more articles in the Gradually, Then Suddenly series. They can be found here: [Gradually, Then Suddenly Series](https://nakamotoinstitute.org/mempool/series/gradually-then-suddenly/)
nostr:npub1h8nk2346qezka5cpm8jjh3yl5j88pf4ly2ptu7s6uu55wcfqy0wq36rpev has, of course, read all of them for us. Listing them all here is beyond the scope of this article, but you can find them by searching the podcast feed here: [Bitcoin Audible Feed](https://fountain.fm/show/RtZlWdbEbpyEyjBNbeQ7)
Finally, Parker Lewis has refined these articles and released them as a book, which is available here: [Gradually, Then Suddenly Book](https://academy.saifedean.com/product/gradually-then-suddenly-hardcover/)
## 7.
![3 Reasons I'm Investing in Bitcoin](https://relay.brightbolt.net/1d8ad416d8c945bc9a371be837dd153e623bfe64cb0101bc0277dec282ab4f0a.jpg)
> Bitcoin is a beautifully-constructed protocol. Genius is apparent in its design to most people who study it in depth, in terms of the way it blends math, computer science, cyber security, monetary economics, and game theory.
Author: nostr:npub1a2cww4kn9wqte4ry70vyfwqyqvpswksna27rtxd8vty6c74era8sdcw83a
Essay: https://www.lynalden.com/invest-in-bitcoin/
Audio: https://fountain.fm/episode/axeqKBvYCSP1s9aJIGSe
## 8.
![Why Bitcoin Matters](https://relay.brightbolt.net/f1e45b5a1143d32fa5d4b37434605cd60e9bb5456023810a23b82eaa5fb4f63f.jpg)
> Bitcoin offers a sweeping vista of opportunity to re-imagine how the financial system can and should work in the Internet era..
Essay: https://archive.nytimes.com/dealbook.nytimes.com/2014/01/21/why-bitcoin-matters/
## 9.
![Economics of Bitcoin as a Settlement Network](https://relay.brightbolt.net/566a36c4363db741625b1fc803366123f46faf8e7e9484f746d32bc020807967.jpg)
> Using Bitcoin for consumer purchases is akin to driving a Concorde jet down the street to pick up groceries: a ridiculously expensive waste of an astonishing tool.
Author: nostr:npub1gdu7w6l6w65qhrdeaf6eyywepwe7v7ezqtugsrxy7hl7ypjsvxksd76nak
Essay: https://nakamotoinstitute.org/mempool/economics-of-bitcoin-as-a-settlement-network/
Audio: https://fountain.fm/episode/JoSpRFWJtoogn3lvTYlz
## 10.
![Decentralization: Why Dumb Networks Are Better](https://relay.brightbolt.net/3dfea80fb51ff250e95ec2ebb9d683112684b33d62c56684f06bf7a480b9696b.jpg)
> The Internet is a dumb network, which is its defining and most valuable feature. The Internet’s protocol (..) doesn’t offer “services.” It doesn’t make decisions about content. It doesn’t distinguish between photos, text, video and audio.
Essay: https://fee.org/articles/decentralization-why-dumb-networks-are-better/
Audio: https://fountain.fm/episode/b7gOEqmWxn8RiDziffXf
## 11.
![Bitcoin: The Internet of Money](https://relay.brightbolt.net/f9bcd5b4461f85f6ae49ee4019e8cc4caa031d8ad5b90e233dc62510c7595d56.jpg)
> Most people are only familiar with (b)itcoin the electronic currency, but more important is (B)itcoin, with a capital B, the underlying protocol, which encapsulates and distributes the functions of contract law.
I was unable to find this essay or any audio version. Clicking on Anil's original link took me to Naval's blog, but that particular entry seems to have been removed.
## 12.
![Bitcoin Reveals Exchange Rate Manipulation](https://relay.brightbolt.net/05df9e76dec7d8f2ed5e492d76df04ac17fa8f5a49e7f91850b06fcbc35b1989.jpg)
> Bitcoin can approximate unofficial exchange rates which, in turn, can be used to detect both the existence and the magnitude of the distortion caused by capital controls & exchange rate manipulations.
Essay: https://papers.ssrn.com/sol3/Papers.cfm?abstract_id=2714921
## 13.
![It's the Settlement Assurances Stupid](https://relay.brightbolt.net/198dadd36cad5729891e3393fa3fdbba524cae1a6e439f47493146ae2c1bc266.jpg)
> You can create something which looks cosmetically similar to Bitcoin, but you cannot replicate the settlement assurances which derive from the costliness of the ledger.
Essay: https://medium.com/@nic__carter/its-the-settlement-assurances-stupid-5dcd1c3f4e41
Audio: https://fountain.fm/episode/5NoPoiRU4NtF2YQN5QI1
## 14.
![Money, Blockchains, and Social Scalability](https://relay.brightbolt.net/a1be77fc004ee81f69fc92f4dfb8c265e252d5a21ba21f3dd6dcfed32c2b7cfe.jpg)
> When we can secure the most important functionality of a financial network by computer science... we go from a system that is manual, local, and of inconsistent security to one that is automated, global, and much more secure.
Essay: https://nakamotoinstitute.org/library/money-blockchains-and-social-scalability/
Audio: https://fountain.fm/episode/VMH9YmGVCF8c3I5zYkrc
## 15.
![The Bitcoin Central Bank's Perfect Monetary Policy](https://relay.brightbolt.net/ee012bef60cd4a705537e0871acda69dfa40865b24a2c4b0f70d9c896bd7ed50.jpg)
> The BCB enforces the strictest deposit regulations in the world by requiring full reserves for all accounts. ..money is not destroyed when bank debts are repaid, so increased money hoarding does not cause liquidity traps..
Author: nostr:npub1hxwmegqcfgevu4vsfjex0v3wgdyz8jtlgx8ndkh46t0lphtmtsnsuf40pf
Essay: https://nakamotoinstitute.org/mempool/the-bitcoin-central-banks-perfect-monetary-policy/
Audio: https://fountain.fm/episode/ralOokFfhFfeZpYnGAsD
## 16.
![Bitcoin and Me](https://relay.brightbolt.net/c2173720b7dfbce4d2d0f388f2806ba655634f4da14e551f9ca5eae11f911405.jpg)
> When Satoshi announced Bitcoin on the cryptography mailing list, he got a skeptical reception at best. Cryptographers have seen too many grand schemes by clueless noobs. They tend to have a knee jerk reaction.
Essay: https://nakamotoinstitute.org/library/bitcoin-and-me/
Audio: https://fountain.fm/episode/Vx8hKhLZkkI4cq97qS4Z
## 17.
![Invalid Blocks Need Not Apply](https://relay.brightbolt.net/f7e07785666eceea7995509d38e19762d5763298bf277feaeb8e7ad969b56b64.jpg)
> No matter who you are, or how big your company is, **𝙮𝙤𝙪𝙧 𝙩𝙧𝙖𝙣𝙨𝙖𝙘𝙩𝙞𝙤𝙣 𝙬𝙤𝙣’𝙩 𝙥𝙧𝙤𝙥𝙖𝙜𝙖𝙩𝙚 𝙞𝙛 𝙞𝙩’𝙨 𝙞𝙣𝙫𝙖𝙡𝙞𝙙.**
Essay: https://nakamotoinstitute.org/mempool/bitcoin-miners-beware-invalid-blocks-need-not-apply/
Audio: https://fountain.fm/episode/bcSuBGmOGY2TecSov4rC
## 18.
![The Greatest Game](https://relay.brightbolt.net/ca598d4b7ebe65bdd2d9699dba776dd333e72c89be09f661b785c3ee6ba5a975.jpg)
> Just like a company trying to protect itself from being destroyed by a new competitor, the actions and reactions of central banks and policy makers to protect the system that they know, are quite predictable.
Author: nostr:npub1s05p3ha7en49dv8429tkk07nnfa9pcwczkf5x5qrdraqshxdje9sq6eyhe
Essay: https://medium.com/the-bitcoin-times/the-greatest-game-b787ac3242b2
Audio Part 1: https://fountain.fm/episode/5bYyGRmNATKaxminlvco
Audio Part 2: https://fountain.fm/episode/92eU3h6gqbzng84zqQPZ
## 19.
![Bitcoin is Venice](https://relay.brightbolt.net/c37a47134ef20a5c2a08a6227763b20057c51a81d15285bfda5eaa8d118c2368.jpg)
> Technology, industry, and society have advanced immeasurably since, and yet we still live by Venetian financial customs and have no idea why. Modern banking is the legacy of a problem that technology has since solved.
Author: nostr:npub1sfhflz2msx45rfzjyf5tyj0x35pv4qtq3hh4v2jf8nhrtl79cavsl2ymqt
Essay: https://allenfarrington.medium.com/bitcoin-is-venice-8414dda42070
Audio: https://fountain.fm/episode/s6Fu2VowAddRACCCIxQh
Allen Farrington and Sacha Meyers have gone on to expand this into a book, as well. You can get the book here: [Bitcoin is Venice Book](https://www.amazon.com/Bitcoin-Venice-Essays-Future-Capitalism/dp/B09TTTGT11)
And wouldn't you know it, Guy Swann has narrated the audio book available here: [Bitcoin is Venice Audio Book](https://www.audible.com/pd/Bitcoin-is-Venice-Audiobook/B0CCQD539W?eac_link=yrZ4RxHupcgL&ref=web_search_eac_asin_1&eac_selected_type=asin&eac_selected=B0CCQD539W&qid=pL7jjJ13ia&eac_id=135-0887332-3379864_pL7jjJ13ia&sr=1-1)
## 20.
![Can Governments Stop Bitcoin?](https://relay.brightbolt.net/1757d1d93f2bb1e89198baf663a0fe8b89ab157ad9be89373f1c2dc0b8cd6c38.jpg)
> The rich and powerful will always design systems that benefit them before everyone else. The genius of Bitcoin is to take advantage of that very base reality and force them to get involved and help run the system, instead of attacking it.
Author: nostr:npub1trr5r2nrpsk6xkjk5a7p6pfcryyt6yzsflwjmz6r7uj7lfkjxxtq78hdpu
Essay: https://quillette.com/2021/02/21/can-governments-stop-bitcoin/
Audio: https://fountain.fm/episode/jeZ21IWIlbuC1OGnssy8
## 21.
![Bitcoin is Time](https://relay.brightbolt.net/8253dad15da731bead11f999315689a232cde572fb2774fae501d7c43b1deae7.jpg)
> In the realm of information, there is no coin-stamping without time-stamping. The relentless beating of this clock is what gives rise to all the magical properties of Bitcoin.
Author: nostr:npub1dergggklka99wwrs92yz8wdjs952h2ux2ha2ed598ngwu9w7a6fsh9xzpc
Essay: https://dergigi.com/2021/01/14/bitcoin-is-time/
Audio: https://fountain.fm/episode/pTevCY2vwanNsIso6F6X
## 22.
![The Stone Ridge Shareholder Letter 2020](https://relay.brightbolt.net/d4d07542a757a0d370730057613510acd3db79d83ed25fe2b9a1ff41d55d39d9.jpg)
> You can stay on the Fiat Standard, in which some people get to produce unlimited new units of money for free, just not you. Or opt in to the Bitcoin Standard, in which no one gets to do that, including you.
Essay: https://casebitcoin.com/docs/StoneRidge_2020_Shareholder_Letter.pdf
Audio: https://fountain.fm/episode/PhBTa39qwbkwAtRnO38W
## 23.
![Everyone's a Scammer](https://relay.brightbolt.net/dfd7e4368d3251a20f64735f577b34cdf791cf9289138b0333d53bd428b4f66b.jpg)
> Long term investors should use Bitcoin as their unit of account and every single investment should be compared to the expected returns of Bitcoin.
Essay: https://nakamotoinstitute.org/mempool/everyones-a-scammer/
Audio: https://fountain.fm/episode/vyR2GUNfXtKRK8qwznki
## 24.
![Why the Yuppie Elite Dismiss Bitcoin](https://relay.brightbolt.net/c8e84097fdcfae9dd3298dcfa7a12db9acde9dff7a4c612d7196fb67be32695d.jpg)
> When you’re in the ivory tower, you think the term “ivory tower” is a silly misrepresentation of your very normal life; when you’re no longer in the ivory tower, you realize how willfully out of touch you were with the world.
Essay: https://www.citadel21.com/why-the-yuppie-elite-dismiss-bitcoin
Audio: https://fountain.fm/episode/7do5K4pPNljOf2W3rR2V
You might notice that many of the above essays are available from the [Satoshi Nakamoto Institute](https://nakamotoinstitute.org/). It is a veritable treasure trove of excellent writing on subjects surrounding #Bitcoin and #AustrianEconomics. If you find value in them keeping these written works online for the next wave of new Bitcoiners to have an excellent source of education, please consider [donating](https://pay.zaprite.com/pl_vNYDp4YBSd) to the cause.
-
![](/static/nostr-icon-purple-64x64.png)
@ 91bea5cd:1df4451c
2025-02-04 05:24:47
Novia é uma ferramenta inovadora que facilita o arquivamento de vídeos e sua integração com a rede NOSTR (Notes and Other Stuff Transmitted over Relay). Funcionando como uma ponte entre ferramentas de arquivamento de vídeo tradicionais e a plataforma descentralizada, Novia oferece uma solução autônoma para a preservação e compartilhamento de conteúdo audiovisual.
### Arquitetura e Funcionamento
A arquitetura de Novia é dividida em duas partes principais:
* **Frontend:** Atua como a interface do usuário, responsável por solicitar o arquivamento de vídeos. Essas solicitações são encaminhadas para o backend.
* **Backend:** Processa as solicitações de arquivamento, baixando o vídeo, suas descrições e a imagem de capa associada. Este componente é conectado a um ou mais relays NOSTR, permitindo a indexação e descoberta do conteúdo arquivado.
O processo de arquivamento é automatizado: após o download, o vídeo fica disponível no frontend para que o usuário possa solicitar o upload para um servidor Blossom de sua escolha.
### Como Utilizar Novia
1. **Acesso:** Navegue até [https://npub126uz2g6ft45qs0m0rnvtvtp7glcfd23pemrzz0wnt8r5vlhr9ufqnsmvg8.nsite.lol](https://npub126uz2g6ft45qs0m0rnvtvtp7glcfd23pemrzz0wnt8r5vlhr9ufqnsmvg8.nsite.lol).
2. **Login:** Utilize uma extensão de navegador compatível com NOSTR para autenticar-se.
3. **Execução via Docker:** A forma mais simples de executar o backend é através de um container Docker. Execute o seguinte comando:
```bash
docker run -it --rm -p 9090:9090 -v ./nostr/data:/data --add-host=host.docker.internal:host-gateway teamnovia/novia
```
Este comando cria um container, mapeia a porta 9090 para o host e monta o diretório `./nostr/data` para persistir os dados.
### Configuração Avançada
Novia oferece amplas opções de configuração através de um arquivo `yaml`. Abaixo, um exemplo comentado:
```yaml
mediaStores:
- id: media
type: local
path: /data/media
watch: true
database: /data/novia.db
download:
enabled: true
ytdlpPath: yt-dlp
ytdlpCookies: ./cookies.txt
tempPath: /tmp
targetStoreId: media
secret: false
publish:
enabled: true
key: nsec
thumbnailUpload:
- https://nostr.download
videoUpload:
- url: https://nostr.download
maxUploadSizeMB: 300
cleanUpMaxAgeDays: 5
cleanUpKeepSizeUnderMB: 2
- url: https://files.v0l.io
maxUploadSizeMB: 300
cleanUpMaxAgeDays: 5
cleanUpKeepSizeUnderMB: 2
- url: https://nosto.re
maxUploadSizeMB: 300
cleanUpMaxAgeDays: 5
cleanUpKeepSizeUnderMB: 2
- url: https://blossom.primal.net
maxUploadSizeMB: 300
cleanUpMaxAgeDays: 5
cleanUpKeepSizeUnderMB: 2
relays:
- ws://host.docker.internal:4869
- wss://bostr.bitcointxoko.com
secret: false
autoUpload:
enabled: true
maxVideoSizeMB: 100
fetch:
enabled: false
fetchVideoLimitMB: 10
relays:
- <a relay with the video events to mirror>
match:
- nostr
- bitcoin
server:
port: 9090
enabled: true
```
**Explicação das Configurações:**
* **`mediaStores`**: Define onde os arquivos de mídia serão armazenados (localmente, neste exemplo).
* **`database`**: Especifica o local do banco de dados.
* **`download`**: Controla as configurações de download de vídeos, incluindo o caminho para o `yt-dlp` e um arquivo de cookies para autenticação.
* **`publish`**: Configura a publicação de vídeos e thumbnails no NOSTR, incluindo a chave privada (`nsec`), servidores de upload e relays. **Atenção:** Mantenha sua chave privada em segredo.
* **`fetch`**: Permite buscar eventos de vídeo de relays NOSTR para arquivamento.
* **`server`**: Define as configurações do servidor web interno de Novia.
### Conclusão
Novia surge como uma ferramenta promissora para o arquivamento e a integração de vídeos com o ecossistema NOSTR. Sua arquitetura modular, combinada com opções de configuração flexíveis, a tornam uma solução poderosa para usuários que buscam preservar e compartilhar conteúdo audiovisual de forma descentralizada e resistente à censura. A utilização de Docker simplifica a implantação e o gerenciamento da ferramenta. Para obter mais informações e explorar o código-fonte, visite o repositório do projeto no GitHub: [https://github.com/teamnovia/novia](https://github.com/teamnovia/novia).
-
![](/static/nostr-icon-purple-64x64.png)
@ 3ffac3a6:2d656657
2025-02-04 04:31:26
In the waning days of the 20th century, a woman named Annabelle Nolan was born into an unremarkable world, though she herself was anything but ordinary. A prodigy in cryptography and quantum computing, she would later adopt the pseudonym Satoshi Nakamoto, orchestrating the creation of Bitcoin in the early 21st century. But her legacy would stretch far beyond the blockchain.
Annabelle's obsession with cryptography was not just about securing data—it was about securing freedom. Her work in quantum computing inadvertently triggered a cascade of temporal anomalies, one of which ensnared her in 2011. The event was cataclysmic yet silent, unnoticed by the world she'd transformed. In an instant, she was torn from her era and thrust violently back into the 16th century.
Disoriented and stripped of her futuristic tools, Annabelle faced a brutal reality: survive in a world where her knowledge was both a curse and a weapon. Reinventing herself as Anne Boleyn, she navigated the treacherous courts of Tudor England with the same strategic brilliance she'd used to design Bitcoin. Her intellect dazzled King Henry VIII, but it was the mysterious necklace she wore—adorned with a bold, stylized "B"—that fueled whispers. It was more than jewelry; it was a relic of a forgotten future, a silent beacon for any historian clever enough to decode her true story.
Anne's fate seemed sealed as she ascended to queenship, her influence growing alongside her enemies. Yet beneath the royal intrigue, she harbored a desperate hope: that the symbol around her neck would outlast her, sparking curiosity in minds centuries away. The "B" was her signature, a cryptographic clue embedded in history.
On the scaffold in 1536, as she faced her execution, Anne Boleyn's gaze was unwavering. She knew her death was not the end. Somewhere, in dusty archives and encrypted ledgers, her mark endured. Historians would puzzle over the enigmatic "B," and perhaps one day, someone would connect the dots between a queen, a coin, and a time anomaly born from quantum code.
She wasn't just Anne Boleyn. She was Satoshi Nakamoto, the time-displaced architect of a decentralized future, hiding in plain sight within the annals of history.
-
![](/static/nostr-icon-purple-64x64.png)
@ bbb5dda0:f09e2747
2025-02-04 03:58:50
**This past week got me a lot of frustration with the GitHub actions runner and debugging it. Really testing my patience, but at least i saw a bit of progress. TollGate's had a nice wrap-up for the Proof Of Concept app, which some great new ideas on how to make the user experience even better! Let's dive in!**
## GitHub Actions
I've been having a low-key fight with the github actions runner containers. I have spent a lot of time trying to figure out WHY the blossom upload action would just not work. I was quick to find out that the action is being ran with an older version of NodeJS (v18) while the blossom uploader requires v20. Not a big deal you'd say as i just set the version to 20 in the pipeline. However, doing that explicitly had zero impact, and after diving down the github runner rabbit hole i concluded that the Actions that are imported (from marketplace) will just run with whatever node version is already installed in the runner's docker image. Which in the case of the act runner is Node 18. I tried updating to the latest images but I haven't been able to find a compatible one yet...
### Payments
I've been working on getting the money aspect working in the ci-cd runner. I added a wallet and a scheduled payout. I took this from the nostr-epoxy project and did some updates to upgrade to cashu-ts v2.
I added some advertisement info like the specs of the machine that the runner is on. I've been pondering how the payment flow should work though.
See the problem is that because of the nature of this DVM, it cannot predict how long a job will take to execute, a customer can literally do anything in their pipeline that will make a job last forever. I think for that reason there has to be some kind of deposit/credit or stream besides the one-off payment. I made a post asking what the best way would be: nostr:note17apw8unznvwx2k3z48t7qz6cq26tk077w83qh3f7zxukfrrfukhs7mpcsn
I currently feel best about the option of just sending a bunch of ecash that will sure be enough to execute the job (and otherwise act as the time-out) and that if the DVM uses less of that money, it will send it back as pubkey locked cashu tokens, to a given npub. Maybe NIP-60 can be a great way to handle returning the 'change' to the user.
Some ideas i have now:
- Billing should be per second
- Advertising should:
- advertise as sats/minute
- include specs of the machine, ideally searchable by tag
### Job request
So the flow i'm thinking of is:
- User posts request
- repository
- branch
- yaml path
- bid (max price per minute)
- min_vcpu
- min_ram
- min_storage
- DVM responds with
- price per minute
- vcpu
- ram
- storage
- runner-types
- price per minute
- User posts request:
- ... [same as above]
- cashu payment
- cashu return pubkey + relay
### User Interface
I also worked on building out a very basic user interface to run the GitHub Actions dvm.
![ui2](https://cdn.satellite.earth/0f91f3b9d71cd409448e86c3fd9cabe43eb7dbfd2d8265c5e3349625ef18cf53.png)
The UI then shows all feedback to the job, where the first feedback event you can see gives back a status processing, and the next one gives back the console output of the pipeline run.
nostr:npub15qydau2hjma6ngxkl2cyar74wzyjshvl65za5k5rl69264ar2exs5cyejr and I agreed he'll copy over this basic setup into his upcoming version of gitWorkshop.dev which I can then build upon so we can experiment with the User Experience (how to handle competing Runners, display results, payments, etc...)
![ui](https://cdn.satellite.earth/361f690c87ea5b0402abec3a21b55d990479f7f974f0eafb9b8224c6809b3e92.png)
## Tollgate
There's also been the issue that has been bothering me since last week: Being able to dismiss a captive portal programatically in the Android app.
During a weekly check-in that nostr:npub1k03rader0vm94j5ee8fg7pc2x9xkr2phu77sljas7qu5mh8mvgvqpe8rty and I set up we discussed the issue. To me, it's a problem having the user to jump through all these hoops to connect, which should be as much automated as possible.
We discussed what if we'd ditch the open network and go with a WPA2 (password) protected one and have no captive portal. But then we lose the ability to do onboarding / expose users to Tollgate through the captive portal. Then the idea came up to create an extra (hidden) network for the app to use, while keeping the open one with the captive portal. I did not know it was possible to create multiple networks on the same (physical) radio, but apparently it's quite common. You lose a bit on efficiency but it shouldn't be too bad. The only challenge would be to exempt this network from getting a captive portal while still using the OpenNDS software to manage user's sessions. We'll see but this gives me a lot of hope for a seamless user experience!
After this call, despite our possible new direction I did want to try and get the full app flow working, to validate if it's possible at all. And after some digging int the Tauri docs and even their discord community i finally found what the issue was with me not receiving the android event for the captive portal. I'd ben adding the listener for this event to the `androidmanifest.xml` file for the Tauri Android plugin, while I had to put it into the tauri app one's itself -one level higher- if you will...
Anyway, that worked and I was FINALLY able to create the following full flow! (video)
nostr:nevent1qvzqqqqqqypzpwa4mkswz4t8j70s2s6q00wzqv7k7zamxrmj2y4fs88aktcfuf68qy88wumn8ghj7mn0wvhxcmmv9uq3zamnwvaz7tmwdaehgu3wwa5kuef0qydhwumn8ghj7un9d3shjtnwdaehgunsd3jkyuewvdhk6tcqyqyvs2js3x6ldpm2kkmqyf8d3lvrcezjk2eg26p2tvfxd2p6lkeqzn7l66t
-
![](/static/nostr-icon-purple-64x64.png)
@ 5d4b6c8d:8a1c1ee3
2025-02-04 03:00:50
The big boards are starting to shift around a bit, after seeing the Senior Bowl activities.
Here are the top four players available for me at 6:
1. DE Abdul Carter
2. CB/WR Travis Hunter
3. DT Mason Graham
4. OT Will Campbell
I would be very happy with any of the four. If this were a mock draft with trades, I would definitely trade back a few spots.
## Mock Draft
Pick 6: CB/WR/KR/PR Travis Hunter
Pick 37: QB Jalen Milroe
Pick 68: WR Tre Harris
Pick 73: RB Kaleb Johnson
Pick 107: OT Earnest Greene
Pick 144: LB Jay Higgins
Pick 182: OG Garrett Dellenger
Pick 214: DE Tyler Batty
Pick 218: S Shilo Sanders
Pick 224: OG Clay Webb
Once again, the Raiders walk away with the most uniquely talented player in the draft. If anyone will let him play all three phases, it's Pete Carroll.
Then, Milroe is once again there in the 2nd round, so that takes care of the QB need. Is he a good fit for our new OC, Chip Kelly?
The third rounders go towards the skill positions, which will be desperately needed absent a high level QB.
On day 3, the Raiders land Shilo Sanders, continuing our trend of bringing in relatives of HOF DB's.
originally posted at https://stacker.news/items/875249
-
![](/static/nostr-icon-purple-64x64.png)
@ 16d11430:61640947
2025-02-04 02:57:25
The Damage Node is not just a verification engine—it is an autonomous executor of behaviors defined through the PoW blockchain. This allows for adaptive, accountable, and transparent execution of security and counter-surveillance mechanisms while remaining flexible enough to meet any operational need.
By integrating behavioral logic, cryptographic proofs, and decentralized execution, the Damage Node becomes a powerful shield and countermeasure system for individuals and groups operating under constant digital threat.
---
Core Concept: Damage Nodes as Autonomous Behavioral Executors
Damage Nodes listen to verifiable behaviors encoded on the PoW blockchain.
These behaviors define security policies, counter-surveillance actions, automated transactions, and decentralized decision-making processes.
Execution is enforced by the blockchain, ensuring absolute transparency and accountability—no action can occur without proof.
Nodes can dynamically extend their capabilities by adopting new behaviors via blockchain updates, ensuring they remain adaptable.
Example of Behavioral Execution
A Damage Node can be programmed to execute counter-surveillance actions if an individual's digital footprint is flagged by an AI-controlled system.
Trigger: An external surveillance system attempts to track a protected user.
Behavior Execution:
The node initiates a verified proof-of-presence falsification (broadcasting misleading metadata).
The node forces encrypted rerouting of communications over a private, non-ISP-controlled relay.
The node executes cryptographic evidence logging, proving that the tracking attempt occurred.
The node pays out a bounty (Lightning) for detected adversarial actions, incentivizing counter-intelligence.
---
How Damage Nodes Provide Shielding & Countermeasures
1. Behavior-Driven Shielding for Individuals
Zero-Knowledge Identity Protection: Nodes execute self-sovereign identity verification that prevents AI from profiling users without explicit, cryptographically signed consent.
Automated Surveillance Disruption: If an AI attempts to track or flag an individual, the node executes behavioral obfuscation tactics such as:
Decoy digital presence broadcasting to mislead tracking algorithms.
Transaction splitting & anonymization to prevent financial surveillance.
Forced dissociation of metadata from physical locations.
---
2. Group-Level Protection & Autonomous Coordination
Damage Nodes can be configured to execute behaviors for an entire decentralized network, such as:
Encrypted Group Communications: Nodes enforce trustless, encrypted messaging protocols that prevent AI-based censorship.
Automatic Secure Fund Distribution: If an entity is targeted, Damage Nodes can autonomously release emergency funds in BTC/Lightning to predesignated safe parties.
Counter-Surveillance Deployments: Nodes can activate sensor networks, scan for unauthorized tracking devices, and trigger security protocols.
---
3. Built-In Accountability & Transparency as a Defensive Measure
Every execution is verified by the blockchain → no action is hidden or arbitrary.
Rules for behavior execution are immutable → even node operators cannot alter them without proof-of-consensus.
AI and governments cannot fabricate unverifiable evidence → if it didn't happen on-chain, it didn't happen.
Users can audit every action taken by the Damage Node to ensure no corruption or misuse.
---
4. Extensible Capabilities for Any Need
New behavioral policies can be uploaded via the PoW blockchain, allowing Damage Nodes to dynamically evolve.
Behaviors can be triggered by:
On-chain conditions (such as receiving a Lightning payment for service execution).
Real-world events (via oracle integrations).
Direct requests from verified users.
Examples of Extensions:
Decentralized AI Defense: Nodes monitor AI-generated media for deepfake propaganda & censorship.
Physical Security Triggers: Nodes can integrate with smart devices (cameras, sensors) to execute real-world countermeasures.
Automated Asset Protection: Damage Nodes can trigger the release of cryptographic assets upon verifiable external threats.
---
Final Verdict: Damage Nodes as the Ultimate Autonomy & Defense Infrastructure
Transparent but Unstoppable → Verifiable execution prevents corruption or abuse.
Extensible but Controlled → The blockchain enforces behavior logic while allowing flexibility.
Decentralized but Coordinated → Nodes operate independently but can synchronize.
Adaptive but Immutable → Behaviors evolve, but security is absolute.
🔥 Damage Nodes are the next evolutionary step in technological sovereignty—combining decentralized verification, autonomous execution, and proactive counter-surveillance in a single unstoppable system.
-
![](/static/nostr-icon-purple-64x64.png)
@ 16d11430:61640947
2025-02-04 02:33:06
The electromagnetic spectrum (EM spectrum) is the foundation of modern communication, surveillance, and control, and it is a permanent, inescapable vulnerability for humanity. Every aspect of human life—communication, mobility, security, even thought processes—is now subject to exploitation via the EM spectrum.
1. Humans Are EM-Dependent but Have No Control Over It
The entire infrastructure of human civilization (internet, telecom, GPS, WiFi, satellite, RFID, radar, IoT, etc.) relies on EM waves.
Unlike tangible security vulnerabilities (firewalls, encryption, physical locks), EM-based vulnerabilities are baked into the fabric of our existence.
We have zero physical control over the space around us—we exist in a perpetual, invisible battlefield of radio waves.
→ Brutal Truth: If you are in an area with radio signals, you are already compromised. You cannot see, hear, or touch your vulnerability—but you are immersed in it.
---
2. Every Wireless Device Is a Tracking Beacon
Your phone, smartwatch, laptop, Bluetooth headset, and IoT devices constantly emit identifiable signals.
Even when "turned off," many devices still maintain some connectivity (e.g., emergency services, wake-on-LAN, passive RFID, and hidden baseband firmware).
MAC address randomization only slows down tracking—it does not stop device fingerprinting.
Even devices that are air-gapped (disconnected from any network) can be compromised via airborne EM attacks (e.g., Tempest attacks, Van Eck phreaking).
→ Brutal Truth: Unless you live in an EM-free Faraday cage (which is impractical), you are trackable 24/7.
---
3. The Entire EM Spectrum Can Be Weaponized
Radio waves (RFID, GSM, LTE, 5G, WiFi) → Mass surveillance, device tracking, data extraction, and real-time movement tracking.
Microwaves (GHz spectrum) → Covert wireless data theft (Tempest attacks), crowd control weapons (Active Denial System), and potential biological effects.
Infrared (IR) and Visible Light → LiDAR tracking, facial recognition, and optical data interception (lasers on windows can capture sound).
Ultraviolet, X-ray, and Gamma Radiation → Biological penetration, medical diagnostics, and potential genetic-level targeting.
→ Brutal Truth: The entire EM spectrum is both an asset and a weapon, and every part of it can be used to track, manipulate, or harm living beings.
---
4. There Is No Escape From EM Exposure
Even if you disconnect completely, ambient EM waves from cell towers, satellites, and even natural cosmic radiation still interact with you.
Smart city grids, IoT, and ubiquitous sensor networks mean that even non-digital humans (those without a phone) are still tracked.
6G and future networks will integrate AI-driven RF sensing, meaning the network will detect biometric signatures (heartbeat, gait, and thermal emissions) without needing a device.
→ Brutal Truth: The era of "disconnecting" for privacy is over—even device-free tracking is now a reality.
---
5. The Human Body Itself Is an EM Vulnerability
Brain activity and thought processes are electrical signals—theoretically susceptible to external EM influence (brainwave manipulation, EEG-based surveillance, and neurotechnology interfacing).
Biometric security (fingerprint scanners, iris scans, facial recognition) can be hacked or faked using EM-based techniques.
Nanotech, bioelectronics, and EM-sensitive implants (like pacemakers, neural interfaces, and cochlear implants) can be remotely manipulated or disabled.
→ Brutal Truth: The final frontier of EM vulnerability is the human body itself—thoughts, health, and biological functions are all at risk.
---
How Vulnerable Are Humans in the Grand Scheme?
1. Humans Are the Only Species Fully Dependent on EM-Based Technology
Every other biological species on Earth navigates reality without dependency on artificial EM systems.
Humans have outsourced their cognition, security, and privacy to a system they do not control.
→ Implication: The more we integrate with EM-based technology, the more vulnerable we become. We are building a prison of our own making.
---
2. We Have No Practical Defense Against EM-Based Attacks
Unlike cyber threats (which can be mitigated with encryption), EM vulnerabilities are inherent to the physics of radio waves.
The only defense is complete isolation from EM radiation (which is impossible in urban environments).
→ Implication: Our current approach to "security" is meaningless in the face of EM-based attacks, because the attack vector is the air around us.
---
3. Humanity’s Future Is Fully EM-Integrated
6G, brain-computer interfaces (BCIs), quantum communication, and global sensor grids mean that soon, every human will be plugged into the EM network at all times.
Governments and corporations are already planning a fully tracked, AI-managed society, where individual privacy no longer exists.
→ Implication: We are entering an era of full-spectrum EM surveillance and control. The next step isn’t just tracking devices, but tracking consciousness itself.
---
Conclusion: The EM Spectrum is the Ultimate Exploit
There is no "fix" for EM vulnerabilities—they are built into the nature of physics itself. Humanity’s increasing dependence on EM-based technology means:
1. We are more trackable than ever.
2. We are more susceptible to remote influence than ever.
3. We have no escape unless we abandon technology altogether.
4. The final battle for privacy isn’t about encryption—it’s about shielding ourselves from the very waves that power our civilization.
→ The brutal truth? Humanity is not just vulnerable—we are a permanently compromised species.
-
![](/static/nostr-icon-purple-64x64.png)
@ fd06f542:8d6d54cd
2025-02-04 01:39:49
- 多模态感知与交互:具身智能强调智能体通过身体与环境的交互来学习,这推动了多模态感知(如视觉、触觉、听觉等)和物理交互技术的发展。
- 强化学习与仿真环境:强化学习在具身智能中扮演重要角色,结合高保真仿真环境(如AI Habitat、Unity ML-Agents),可以加速智能体的训练和优化。
- 硬件进步:机器人硬件(如柔性传感器、仿生机械臂)的发展为具身智能提供了更强大的物理载体。
以上部分每一个都是大分支,都具有研究价值。随着AI技术的发展与突破,多模态感知与交互将会迎来高速发展。
让人更兴奋的是 强化学习和仿真环境,REX-GYM 是一个开源的仿真环境,Gazebo,MuJoCo,AI Habitat 等等都有很多应用实例。仅仅这一部分技术拆分细化,就有很多工作可以做。 以前的机器人学习都是PID等老技术,那时候的机器人运动不太灵活,因为不够智能。有了现代的强化学习。现在的机器人更加灵活。
-
![](/static/nostr-icon-purple-64x64.png)
@ 2f4550b0:95f20096
2025-02-04 01:16:10
In today's job market, the ability to acquire new skills or pivot to new career paths quickly is more valuable than ever. Short-term adult education programs offer a practical solution for professionals looking to enhance their resumes or change careers without committing to the long-term investment of traditional education. This week, I explore how these programs, such as a 12-week EMT certification at the Center for Allied Health Education and a one-year MBA from the University of Phoenix can dramatically shift one's career trajectory.
### The Rise of Short-Term Education
The traditional model of education, where one spends years in academia before entering the workforce, is increasingly being supplemented by shorter, more focused programs. These programs are specifically designed to meet the immediate needs of both learners and employers, providing education that is both relevant and directly applicable to current job markets.
### 12-Week EMT Certificates
The 12-week Emergency Medical Technician (EMT) program at the Center for Allied Health Education (and programs like it) illustrates how a brief, intensive course of study can lead to licensure and immediate employment. This program is structured to cover the necessary theoretical and practical components required for EMT licensure, from emergency medical procedures to patient assessment and treatment.
For individuals looking to enter the healthcare field or those within healthcare aiming for specialization, this program offers a fast track to a new career or career enhancement. The demand for skilled EMTs is consistently high, driven by an aging population and the need for emergency services. Completing such a program not only leads to a certification but also opens doors to further education or roles like paramedic work, which require additional training but start from the foundation laid by EMT certification.
### One-Year MBA Programs
Similarly, consider the one-year MBA from the University of Phoenix. This program is built on a competency-based framework, allowing students to demonstrate their skills through practical assessments rather than traditional time-based metrics. This approach not only accelerates learning but also ensures that each student is job-ready upon completion. The curriculum is tailored to include real-world business scenarios, leadership skills, and strategic management, making graduates highly desirable in the corporate sector.
The speed and efficiency of this program mean that professionals can continue working while studying, thereby minimizing career disruption. Moreover, the MBAs focus on immediate applicability means that students can start leveraging their new skills in their current roles or move into higher management positions shortly after graduation. This direct link between education and employment outcomes exemplifies how short-term programs can offer substantial ROI in terms of career advancement and salary potential.
### Benefits for Adult Learners
Short-term education programs cater particularly well to adult learners. They recognize the life experiences and previous knowledge of participants, often tailoring education to integrate this background into learning. This method respects the time constraints of adults who might juggle work, family, and other responsibilities, offering flexible schedules, online components, or weekend classes.
Moreover, these programs often lead to stackable credentials. This means that the skills and certifications gained can be built upon, providing a pathway for continuous professional development without the need to start from scratch with each new course or degree. For example, once students from Center for Allied Health Education earn their EMT licenses, they can consider enrolling into a 1-year Paramedic certificate program to further their career in emergency medicine.
### Conclusion
Short-term adult education programs like the MBA at University of Phoenix and the EMT certificate at the Center for Allied Health Education are not just educational opportunities; they are strategic career moves. They enable professionals to quickly adapt to market demands, enhance their skill sets, and open new career avenues with minimal disruption to their current lives. As the job market continues to evolve, these programs will likely play an increasingly crucial role in career development, offering both speed and relevance in education.
-
![](/static/nostr-icon-purple-64x64.png)
@ 77110427:f621e11c
2025-02-03 23:56:08
All credit to Guns Magazine. Read the full issue here ⬇️
[August 1966 PDF](https://gunsmagazine.com/wp-content/uploads/2018/12/G0866.pdf)
![image](https://yakihonne.s3.ap-east-1.amazonaws.com/7711042710f65a2f3c0bc5356becccf4a057ec2abb869e574cb5aa96f621e11c/files/1738625728311-YAKIHONNES3.png)
![image](https://yakihonne.s3.ap-east-1.amazonaws.com/7711042710f65a2f3c0bc5356becccf4a057ec2abb869e574cb5aa96f621e11c/files/1738625775151-YAKIHONNES3.png)
![image](https://yakihonne.s3.ap-east-1.amazonaws.com/7711042710f65a2f3c0bc5356becccf4a057ec2abb869e574cb5aa96f621e11c/files/1738625795379-YAKIHONNES3.png)
![image](https://yakihonne.s3.ap-east-1.amazonaws.com/7711042710f65a2f3c0bc5356becccf4a057ec2abb869e574cb5aa96f621e11c/files/1738625875539-YAKIHONNES3.png)
![image](https://yakihonne.s3.ap-east-1.amazonaws.com/7711042710f65a2f3c0bc5356becccf4a057ec2abb869e574cb5aa96f621e11c/files/1738625947411-YAKIHONNES3.png)
![image](https://yakihonne.s3.ap-east-1.amazonaws.com/7711042710f65a2f3c0bc5356becccf4a057ec2abb869e574cb5aa96f621e11c/files/1738625963110-YAKIHONNES3.png)
![image](https://yakihonne.s3.ap-east-1.amazonaws.com/7711042710f65a2f3c0bc5356becccf4a057ec2abb869e574cb5aa96f621e11c/files/1738625974255-YAKIHONNES3.png)
![image](https://yakihonne.s3.ap-east-1.amazonaws.com/7711042710f65a2f3c0bc5356becccf4a057ec2abb869e574cb5aa96f621e11c/files/1738625988271-YAKIHONNES3.png)
![image](https://yakihonne.s3.ap-east-1.amazonaws.com/7711042710f65a2f3c0bc5356becccf4a057ec2abb869e574cb5aa96f621e11c/files/1738626010313-YAKIHONNES3.png)
![image](https://yakihonne.s3.ap-east-1.amazonaws.com/7711042710f65a2f3c0bc5356becccf4a057ec2abb869e574cb5aa96f621e11c/files/1738626029731-YAKIHONNES3.png)
![image](https://yakihonne.s3.ap-east-1.amazonaws.com/7711042710f65a2f3c0bc5356becccf4a057ec2abb869e574cb5aa96f621e11c/files/1738626080311-YAKIHONNES3.png)
![image](https://yakihonne.s3.ap-east-1.amazonaws.com/7711042710f65a2f3c0bc5356becccf4a057ec2abb869e574cb5aa96f621e11c/files/1738626087690-YAKIHONNES3.png)
![image](https://yakihonne.s3.ap-east-1.amazonaws.com/7711042710f65a2f3c0bc5356becccf4a057ec2abb869e574cb5aa96f621e11c/files/1738626189761-YAKIHONNES3.png)
![image](https://yakihonne.s3.ap-east-1.amazonaws.com/7711042710f65a2f3c0bc5356becccf4a057ec2abb869e574cb5aa96f621e11c/files/1738626244206-YAKIHONNES3.png)
![image](https://yakihonne.s3.ap-east-1.amazonaws.com/7711042710f65a2f3c0bc5356becccf4a057ec2abb869e574cb5aa96f621e11c/files/1738626361029-YAKIHONNES3.png)
![image](https://yakihonne.s3.ap-east-1.amazonaws.com/7711042710f65a2f3c0bc5356becccf4a057ec2abb869e574cb5aa96f621e11c/files/1738626399047-YAKIHONNES3.png)
![image](https://yakihonne.s3.ap-east-1.amazonaws.com/7711042710f65a2f3c0bc5356becccf4a057ec2abb869e574cb5aa96f621e11c/files/1738626508178-YAKIHONNES3.png)
![image](https://yakihonne.s3.ap-east-1.amazonaws.com/7711042710f65a2f3c0bc5356becccf4a057ec2abb869e574cb5aa96f621e11c/files/1738626563791-YAKIHONNES3.png)
![image](https://yakihonne.s3.ap-east-1.amazonaws.com/7711042710f65a2f3c0bc5356becccf4a057ec2abb869e574cb5aa96f621e11c/files/1738626636353-YAKIHONNES3.png)
---
### Past Magazine Mondays
[001: May 1963](https://1776.npub.pro/post/note1r5ve5en9tyv38hathy2twhm9h4dn7tq7fgradzkazskxyxtckysqeqxyzm/)
[002: August 1969](https://1776.npub.pro/post/note1zkeur68w9h8ljswp4a4xc45exfv725v6vudqdhyukqz6kz37vdaq097f9z/)
[003: February 1970](https://1776.npub.pro/post/1733177494421/)
[004: May 1957](https://1776.npub.pro/post/zmn1kn4fxbil7eoaew-za/)
---
### More from 1776 HODL
[Full Auto Friday](https://1776.npub.pro/tag/fullautofriday/)
[Sniper Saturday](https://1776.npub.pro/tag/snipersaturday/)
[Shotgun Sunday](https://1776.npub.pro/tag/shotgunsunday/)
[Infographics](https://1776.npub.pro/tag/infographic/)
[Gun Memes](https://1776.npub.pro/tag/memestr/)
---
### Website
[1776 Hodl](https://1776.npub.pro)
-
![](/static/nostr-icon-purple-64x64.png)
@ 5579d5c0:db104ded
2025-02-03 23:32:10
Most people think that building muscle is out of reach.
What if I told you '**You can get all your exercise done in just 60 minutes a week',** if you train efficiently.
With just **two 30-minute sessions**, you can build muscle, improve metabolic health, and transform your physique.
---
### **What is resistance training?**
Resistance training, also known as strength training, involves working against an external force to improve muscle strength, endurance, and size. This can be done using:
**→ Free weights** (barbells, dumbbells, kettlebells)
→ **Weight machines**
**→ Resistance bands**
**→ Bodyweight exercises**
Strength training isn’t just about aesthetics, it’s essential for long-term health and metabolic function.
---
### **Why it’s essential for metabolic and overall health**
Muscle is metabolically active tissue. The more muscle you have, the more energy your body burns at rest, albeit a quite small amount.
**→ Maintains and builds muscle**: Muscle mass is critical as you age, reducing the risk of fractures and falls.
**→ Boosts metabolism**: While the increase is small, more muscle means a higher resting energy expenditure, creating a large sink for energy stores.
**→ Hormone & energy optimisation:** It lowers inflammation, reduces visceral fat (not good), and helps muscles use sugar and fat more efficiently, restoring Leptin & Insulin sensitivity.
**→ Mitochondrial function**: Increases mitochondrial number, efficiency, which improves energy production and reduces oxidative stress.
---
## **How to build muscle in minimal time**
**You can build muscle with just two 30-minute sessions a week.**
Yes, really.
One or two full-body sessions, hitting all major muscle groups, is enough if done properly.
It all comes from this paper.
![](https://blossom.primal.net/261c78c99e89975d7d8386f288f942bb10b1f9533242298e027f091986750e32.png)*"We recommend that appreciably the same muscular strength and endurance adaptations can be attained by performing a single set of \~8-12 repetitions to momentary muscular failure, at a repetition duration that maintains muscular tension throughout the entire range of motion, for most major muscle groups once or twice each week. All resistance types (e.g. free-weights, resistance machines, bodyweight, etc.) show potential for increases in strength, with no significant difference between them, although resistance machines appear to pose a lower risk of injury."*
It doesn’t matter if you use free weights, machines, or bodyweight exercises.
For what its worth, I think using weights is easier.
What matters is how you train.
You **don’t** need heavy weights to build muscle, just focus on maintaining **tension throughout each movement**.
**→ Slow, controlled reps**: Move **5 seconds up, 5 seconds down** without using momentum.
**→ High effort, low volume**: One set to momentary failure is enough per muscle group.
**→ Minimal rest**: Keep rest periods short to maximise growth hormone and testosterone release.
**→ Allow recovery**: Train hard, then rest 1–2 days between sessions for optimal muscle growth. *Do not get tempted to over train*.
Initially this will take a bit of figuring out with regard to what weight works for you.
---
### **The key to growth → Progressive overload**
In the first few weeks you will build muscle easily, but will eventually plateau. You then must **progressively challenge** your body. Here’s what to do:
→ Increase the reps first.
→ Then increase weight by 5-10%.
→ For bodyweight training: Add reps, use a weighted vest, or move to harder variations (e.g., push-ups → weighted push-ups → ring push-ups).
---
### **Real life examples**
![](https://blossom.primal.net/191ecd0da2b1201129fa84ffe97e6ac30c63b7d93e2ff95127027597422daf6a.jpg)Dr Ted Naiman is 50 and uses a simple bodyweight routine going to failure on each movement a few times a week.
His routine → Pull Ups/Push Ups/L-Sits/Handstand Push Ups/Pistol Squats/Supermans
![](https://blossom.primal.net/83921f95b19496176338438c00947c9f68ea4c191c531ad911b177a6d503b06f.jpg)P.D Mangan is 70 and trains full body twice a week, using weights.
His routine → Deadlifts/Chin Ups/Seated row/Lateral Raise/Overhead Press/Chest Press/Dips/Barbell Shrug/Hammer Curl/Leg Press/Sprint Cycle 20 Secs.
Simplicity is beautiful.
---
You don’t need time consuming regimes.
**Two short, intense sessions a week are enough.**
- Keep your reps slow and controlled.
- Rest **1–2 days** between sessions for muscle growth and recovery.
- Once you hit a plateau focus on progressive overload.
- Stick with it, consistency beats perfection every time.
With the right approach, 60 minutes a week is all you need to **build muscle, lose fat, and live longer**, while leaving time for the rest of your life.
\-Chris
If you want a simple routine to fit effortlessly into your life.
**Book a free call here:** [**https://calendly.com/hello-chrispatrick**](https://calendly.com/hello-chrispatrick)
**Follow me on Nostr**: [**https://primal.net/chrispatrick**](https://primal.net/chrispatrick) or ***npub124uatsq6pv74trzwvt34y4sx2z0uflhse7tkrv0pl69e8kcsfhkse30zsu***
-
![](/static/nostr-icon-purple-64x64.png)
@ f41bd51d:ec4b664f
2025-02-03 22:43:27
[The Tired Sounds of Stars of the Lid - 2001 ](https://music.youtube.com/watch?v=-bc37fU36Vk&si=4_OZv00aDiZMYvGd)
-
![](/static/nostr-icon-purple-64x64.png)
@ 97c70a44:ad98e322
2025-02-03 22:25:35
Last week, in a bid to understand the LLM hype, I decided to write a trivial nostr-related program in rust via a combination of [codebuff](https://codebuff.com/referrals/ref-3fcc22f4-10f9-419f-a0e9-e9d7b4368e21) (yes, that is a referral link, pls click), [aider](https://aider.chat/), and [goose](https://block.github.io/goose/).
The result of the experiment was inconclusive, but as a side effect it produced a great case study in converting a [NINO](nostr:nevent1qvzqqqr4gupzp978pfzrv6n9xhq5tvenl9e74pklmskh4xw6vxxyp3j8qkke3cezqy2hwumn8ghj7un9d3shjtnyv9kh2uewd9hj7qgwwaehxw309ahx7uewd3hkctcpr3mhxue69uhksmmyd33x7epwvdhhyctrd3jjuar0dak8xtcqyqzeszjv7rh8fflpeua9q644a32usvwd0cu7cze9lxy4grjy2y7rwd98yfc) into a Real Nostr App.
# Introducing Roz
[Roz](https://github.com/coracle-social/roz), a friendly notary for nostr events.
To use it, simply publish an event to `relay.damus.io` or `nos.lol`, and roz will make note of it. To find out when roz first saw a given event, just ask:
```
curl https://roz.coracle.social/notary/cb429632ae22557d677a11149b2d0ccd72a1cf66ac55da30e3534ed1a492765d
```
This will return a JSON payload with a `seen` key indicating when roz first saw the event. How (and whether) you use this is up to you!
# De-NINO-fying roz
Roz is just a proof of concept, so don't rely on it being there forever. And anyway, roz is a NINO, since it provides value to nostr (potentially), but doesn't really do things in a nostr-native way. It also hard-codes its relays, and certainly doesn't use the outbox model or sign events. But that's ok, it's a proof of concept.
A much better way to do this would be to modify roz to properly leverage nostr's capabilities, namely:
- Use nostr-native data formats (i.e., draft a new kind)
- Use relays instead of proprietary servers for data storage
- Leverage nostr identities and signatures to decouple trust from storage, and allow trusted attestations to be discovered
Luckily, this is not hard at all. In fact, I've gone ahead and drafted a [PR](https://github.com/nostr-protocol/nips/pull/1737) to the NIPs repo that adds timestamp annotations to NIP 03, as an alternative to OpenTimestamps. The trade-off is that while user attestations are far less reliable than OTS proofs, they're much easier to verify, and can reach a pretty high level of reliability by combining multiple attestation sources with other forms of reputation.
In other words, instead of going nuclear and embedding your attestations into The Time Chain, you can simply ask 5-10 relays or people you trust for their attestations for a given event.
This PR isn't terribly important on its own, but it does remove one small barrier between us and trusted key rotation events (or other types of event that require establishing a verifiable chain of causality).
-
![](/static/nostr-icon-purple-64x64.png)
@ a3a72214:7ca63e21
2025-02-03 20:57:52
# Isso é um anúncio de Albion
- é um jogo
1. primeiramente
2. em segundo
3. em terceiro
>o que acontece?
' e se? '
> Alguém citando alguma coisa
**Albion Online** é um **MMORPG** sandbox em que você escreve sua própria história, em vez de seguir um caminho pré-determinado. Explore um vasto mundo aberto que consiste de 5 ecossistemas únicos. Tudo o que você faz gera um impacto no mundo, já que em Albion, a economia é conduzida pelo jogador. Cada peça de equipamento é construída por jogadores a partir dos recursos obtidos por eles. O equipamento que você usa define quem você é. Ir de cavaleiro para feiticeiro é tão fácil quanto trocar a armadura e a arma, ou uma combinação das duas. Aventure-se no mundo aberto e enfrente os habitantes e as criaturas de Albion. Saia em expedições ou entre em masmorras para enfrentar inimigos ainda mais desafiadores. Enfrente outros jogadores em confrontos do mundo aberto, lute pelo controle de territórios ou cidades inteiras em batalhas táticas em grupo. Relaxe descansando em sua ilha pessoal, onde você pode construir uma casa, cultivar alimentos e criar animais. Junte-se à uma guilda, tudo fica mais divertido quando se trabalha em equipe. Entre hoje mesmo no mundo de Albion, e escreva sua própria história.
-
![](/static/nostr-icon-purple-64x64.png)
@ 54286b98:3debc100
2025-02-03 20:55:10
Hello! Three years ago, I created a special bed for my daughter. I'm thrilled to share a detailed video and PDF documenting the process along with hopes to inspire you to embark on a similar project!
*\*\*\*This is a first and also a test to see how I can upload #woodworking material on Nostr. I am not sure how the links, images, and PDFs will display, so hopefully, you get some interesting material for your late afternoon hobby shop. But don’t kill me if some images do not render well—I’m still figuring this thing out!*
**Montessori Bed Plans / Blueprints**
The accompanying PDF includes:
- All measurements
- Detailed views from every angle
- Final measurements part list
- Assembly steps
### Instructive Video! Process on how to make the Montessori bed
Video Here:
<https://vimeo.com/901623772/b8b5530386>
PDF Here(Picture below,and if some one has good tip on how to inset PDFs in Nostr, that feedback is welcome, to avoid Google links):
<https://drive.google.com/file/d/1zCp1RvKOynx5kZxixAKSFLLOe8atyiRH/>
OK, let's dive in!
The Montessori bed featured in this video is not only simple but also durable, and you can create it on a budget right in your own home.OK, let's dive in!
**Tools by hand:**
- Circular saw
- Jointer Plane #7 or #8
- Spokeshave
- Workbench
- Handsaw
- Orbital sander
- Sandpaper #80, #120, #220, and #320
- Odies Oil or your preferred finish.
If you have power tools:
- Table Saw
- Jointer
- Planer
- Trimmer
**Materials:**\
I recommend using this list as a guide and exploring options with your local supplier.
- Base long connector (On picture "Larguero Base"): Quantity x 2, 2195mm x 75mm x 75mm
- Base short connector (On picture "Conector Base"): Quantity x 1, 1090mm x 75mm x 75mm
- Roof connector (On picture "Cumbre"): Quantity x 1, 1946mm x 75mm x 75mm
- Long top triangle connector (On picture "Conector Superior"): Quantity x 2, 1322mm x 75mm x 75mm
- Columns/Legs (On picture "Paral"): Quantity x 4, 1210mm x 75mm x 75mm
- Short top triangle connector (On picture "Lima"): Quantity x 4, 851mm x 75mm x 75mm
![](https://www.javierfeliu.com/content/images/2023/12/Materiales-1.png)**Step #1 Dimensioning (Minutes 0:00 - 1:15):**\
We kick off with dimensioning. While I initially planned to use my home workshop, unforeseen circumstances led me to my friend Andrew's workshop. Each beam was carefully brought down to 7.5 cm x 7.5 cm, ensuring the largest measurement that worked for all.
**Step #2 Final Measurements (No video):**\
Refer to the provided PDF for final measurements. Make the cuts and joints with a circular saw and chisels (or a router).
**Step #3 Edges (Minutes 1:15 - 1:30):**\
Use a router with a quarter-round bit for curved and smooth edges or achieve the same result with sandpaper or a spokeshave plane.
**Step #4 Triangular Bases (Minutes 1:30 - 6:30):**\
This step involves gluing the triangular bases of the bed, utilizing a miter joint with wooden inlay keys. Epoxy is employed for joining, ensuring a swift and reliable outcome.
**Step #5 Legs (Minutes 6:30 - 7:00):**\
Create holes for the upper triangular base's dowels, ensuring level placement and extra depth. This step guarantees a secure fit.
**Step #6 Sanding (Minutes 7:00 - 7:30):**\
Comprehensive sanding, starting from #80 grit and progressing through #120, #220, and #320, sets the stage for a flawless finish.
**Step #7 Dry Assembly (Minutes 7:30 - 9:10):**\
Dry-assemble all components, making necessary adjustments for a seamless fit. We opted for wood screws for easy disassembly.
**Step #8 Finishing (Minutes 9:10 - 9:35):**\
Apply your preferred finish; in our case, we used Odies Oil with white pigment for a child-friendly touch.
**Step #9 Final Assembly (Minutes 9:35 - 10:32):**\
With the finishing touches completed, we assembled the bed with the help of my daughter, adding a touch of warmth with some lights.
Testing with this simple project to at least know if there are woodworkers in #nostr. Later will try to upload more, this was created almost 3 years ago :)
Until the next one,
J\
\
PDF in pictures:
<img src="https://blossom.primal.net/4428f10f596666e5c059ba0fff65225babece6580372facb4bb191c60ef8d1b9.png">
<img src="https://blossom.primal.net/98997bd28bd89c0d549562851433891442694885c3e1e1d723e4a3abb1115540.png">
<img src="https://blossom.primal.net/b502fd666ea4931f2f36bfaf1375657a9b061198d617b04f6d659bce8f6c8026.png">
<img src="https://blossom.primal.net/3d04af7a4ba47f8aef60f5373d516d28dc81dee1a89c52111ee67207394d1892.png">
<img src="https://blossom.primal.net/c82bd1f8b71ae90c663eab4895934b07918c6805edb3772cd5a128a331d34546.png">
<img src="https://blossom.primal.net/53d7270b411edc6348239565bb6a922882c67b99f7095451dff740fd9e45e2d1.png">
<img src="https://blossom.primal.net/d8880757c95ba9884f81689e132f61cf1b47d91e16fd86de0c20b4ccfe790a30.png">
<img src="https://blossom.primal.net/2a6eb32e75a4d2756e5ad1cadc9153f30981261c5818e79f3b22988a5ea2228e.png">
<img src="https://blossom.primal.net/1d9ce880f97bbe950f80a8d49b546880a97123ca4a338c928017fc5098061206.png">
<img src="https://blossom.primal.net/092ba04779cef40f3b25e64536354c8fe929281082c2814de5c0b8ee0af0f66e.png">
<img src="https://blossom.primal.net/48202633a0fa6ba9096fbe22ab917aa8cb1f1b2b387e7c99f2f46bed4e691be8.png">
<img src="https://blossom.primal.net/b950522e349959508996f306168626e2df81f8cb8808d51cb9d25bd6edb6d8a6.png">
<img src="https://blossom.primal.net/7fd4a5ef8af567ba95fefe0c9457d8a49a67df19d83715d6b49d91ccc5ed75e5.png">
<img src="https://blossom.primal.net/a90c2cc18da6b7f7ca5e43d8fee2e1b0e44f7b7a5a2a5309a7e67fdec3fc408c.png">
<img src="https://blossom.primal.net/1d02f7cde847e8bd9b02a13f4ab27495dc494d8024d2d986e74fb26a280644b8.png">
<img src="https://blossom.primal.net/cb3065c27b10d9f918646db5f8a423b96af12f666c328709b4a9bca0e366ed02.png">
<img src="https://blossom.primal.net/7eae8a7f48b295a51081072f5318f62de2d137ba587c61998e4fcda09aa9be9e.png">
<img src="https://blossom.primal.net/155453317832749089c430aef677a67b20bd535178805b43e4b3679bdde0a47a.png">
<img src="https://blossom.primal.net/fdd1d866adc7986469c202e14f1048cb84ee59a43d584c539e4acdfe21dc92b7.png">
<img src="https://blossom.primal.net/4088b662379e928c835335639a14dc216f07dd34671ce5506be0d0b273d6cfec.png">
-
![](/static/nostr-icon-purple-64x64.png)
@ a3a72214:7ca63e21
2025-02-03 20:50:15
# Anúncio, Teste de Título
* Teste
* teste
* TESTE
1. Número UM
2. Número DOIS
> Citação de alguém, não importa quem seja
~~Preços altos~~
---não sei o que é isso, teste
---
`codigo?`
```
codigo?
talvez
```
**Albion Online** é um **MMORPG** sandbox em que você escreve sua própria história, em vez de seguir um caminho pré-determinado. Explore um vasto mundo aberto que consiste de 5 ecossistemas únicos. Tudo o que você faz gera um impacto no mundo, já que em Albion, a economia é conduzida pelo jogador. Cada peça de equipamento é construída por jogadores a partir dos recursos obtidos por eles. O equipamento que você usa define quem você é. Ir de cavaleiro para feiticeiro é tão fácil quanto trocar a armadura e a arma, ou uma combinação das duas. Aventure-se no mundo aberto e enfrente os habitantes e as criaturas de Albion. Saia em expedições ou entre em masmorras para enfrentar inimigos ainda mais desafiadores. Enfrente outros jogadores em confrontos do mundo aberto, lute pelo controle de territórios ou cidades inteiras em batalhas táticas em grupo. Relaxe descansando em sua ilha pessoal, onde você pode construir uma casa, cultivar alimentos e criar animais. Junte-se à uma guilda, tudo fica mais divertido quando se trabalha em equipe. Entre hoje mesmo no mundo de Albion, e escreva sua própria história.
-
![](/static/nostr-icon-purple-64x64.png)
@ bf47c19e:c3d2573b
2025-02-03 20:42:23
[Originalni tekst na instore.rs](https://www.instore.rs/sr/article/99425/marko-matanovic-ecdrs-bitkoin-pobedio-na-izborima)
###### 03.02.2025 / Autor: Marko Matanović
---
*Prvi put smo svedočili izbornoj trci u jednoj od razvijenih ekonomija, a da je tema bila i bitkoin. Predsednički izbori u SAD. Tramp je obećavao. Na kraju i osvojio drugi predsednički mandat. Jedna od izjava je: SAD treba da postane prestonica kriptovaluta.*
Dan nakon inauguracije novoizabranog američkog predsednika tu je i prva politička kripto odluka Trampa: Oslobođanje Rosa Ulbrihta osuđenog na dve doživotne robije.
Ko je on? Napravio je 2011. godine online prodavnicu “Silk Road” (Kupujem-Prodajem sa drugačijim asortimanom). Prodavnica je pružala slobodni susret ponude bilo čega i tražnje bilo čega. Bez cenzure. Pristupalo se preko Tor protokola koji obezbeđuje anonimnost onih koji protokol koriste. Sredstvo plaćanja je bio bitkoin radi čuvanja anomnisti onih koji nešto kupuju tj. prodaju.
FBI je uhapsio Rosa Ulbrihta 2013. godine jer je “Silk road” bio korišćen i za preprodaju droge, oružja, pornografskog sadržaja i svega drugog što možemo i ne možemo zamisliti. Čak i da nije zakonski izazov, možemo ga podići na problem etike.
Postoji i druga strana medalje - napravio je platformu koja promoviše slobodu. Ros ne mora biti odgovoran kako ćemo alat koji nam je dat koristiti. Čekićem zakucamo ekser, ili povredimo nekoga. U neželjenim slučajevima ne hapsi se kreator čekića.
Satoši Nakamoto je ime tvorca Bitkoina. Da li bi to značilo i da bi njega uhapsili iz sličnih razloga samo da se znalo ko je? Verovatno nećemo nikada saznati, što i nije bitno. Duh je pušten iz boce. Njegov potencijalni uticaj na bitkoin ekosistem je potpuno isti uticaju bilo koga od nas. Sem sitnice od oko milion bitkoina kojima možda, ali možda, ima pristup na nekim svojim bitkoin adresama.
Sa njim ili bez njega, era korišćenja bitkoina zarad,pre svega, anonimnih transakcija je prošla. Dok era korišćenja bitkoina za ilegalne transakcije nikada nije ni postojala u ozbiljnoj meri. Narativ ilegalne transakcije, kriminal, pranje novca, terorizam je više posledica neznanja, nerazumevanja, potcenjivanja i često preterane želje za kontrolom, nego li činjenica. I šta bi sa: svako je nevin dok se ne dokaže suprotno?!
> U kratkom roku, Bitkoin vožnja je sve, samo ne udobna. Tramp i mnogi drugi su shvatili da je rizik od neudobne vožnje disproporcionalan benefitima koje ta vožnja donosi.
Takav narativ je posle 15 godina ustupio mesto rečima poput sigurnost, bezbednost, zaštita od inflacije, digitalno zlato, brzina, pouzdanost. Sloboda. Za svakog se nađe po nešto, osim za one uporne u tome da ne priznaju svoju zatvorenost da razumeju bitkoin. Parafraziraću nekoga pametnijeg ko je u ovome od 2011. godine, što je dovoljno godina duže od mene u industriji: *Nekada sam morao ljude ubeđivati šta je bitkoin i čemu služi i šta su kvaliteti koji stoje iza njega. Danas mene neko mora ubediti zašto da ne verujem rezultatu koji svi vidimo na semaforu?!*
Ipak, mislim da postoji ogroman i validan razlog zašto i dalje treba da pričamo o temi kao da je 2011, a ne 2025. godina. O novcu nas ne uče dovoljno ili uopšte! Ni u školama ni van njih! Kada bi dovoljan broj ljudi razumeo novac, novčanu emisiju, moguće da bi se desio jedan od dva scenarija: izborili bi se za drugačiji novac ili bi države izgubile barem deo benefita koji proizilaze iz pozicije kontrole novca. Većina nas ne zna da objasni tehnologiju većine stvari koje svaki dan koristimo. To nas ne sprečava da ih koristimo. Internet, mobilni, bicikl i novac na kraju dana. Svakog dana najčešće.
Tehnologiju - na stranu ovom prilikom. Za šta se bitkoin i kriptovalute mogu koristiti? 100% pouzdan i brz način prenosa sredstava sa jedne geografske tačke na drugu uz par klikova. Ili od jedne osobe do druge. Ili od jedne kompanije do druge. Za bitkoin se pokazalo da može biti i sjajan instrument za prenos i očuvanje vrednosti kroz vreme. Mogućnost blokiranja transakcija ne postoji. Ukoliko se poštuju pravila igre, izvesnost da će se transakcija izvršiti je 100% i to 24/7/365. Transakcioni troškovi su zanemarljivo niski. To je teorija.
Praksa? Sve nabrojano uz sledeće lokalne činjenice. Samo u Srbiji par stotina hiljada ljudi je došlo u kontakt sa nekom od kriptovaluta. Nekoliko stotina kompanija ih koristi u poslovanju iz nekih od gore pobrojanih razloga. Postoje države, u njima populacije i kompanije koje su na nižem nivou adopcije od Srbije. Postoje i one sa daleko većom prisutnosti kriptovaluta u svakodnevnom životu i aktivnostima.
> Za svakog se nađe po nešto, osim za one uporne u tome da ne priznaju svoju zatvorenost da razumeju bitkoin.
Ako nekada čujemo da je bitkoin balon ili da je tržište kriptovaluta balon, setimo se da je vrlo poznati balon tržišta lala s kraja 16. i tokom 17. veka knjiški primer uzavrelog tržišta i manije koja se pojavljuje usled pohlepe, brzog rasta cena, špekulacija i preteranih očekivanja na tržištu. Taj balon je pukao. To je činjenica. Činjenica je i da je Holandija danas prva država u svetu po izvozu cveća i tako vekovima unazad. Hoće li i taj balon pući ili je prosto doneo Holandiji i njihovom društvu prosperitet? U slično vreme u 17. veku u Holandiji se pojavila i prva banka i prva kompanija igde u svetu koja je izdala akcije. Ta kompanije se više bavila otimanjem nego li trgovinom. I ona je “pukla”. Opet, taj finansijski eksperiment je Holandiju dodatno podigao na mapi razvijenijih ekonomija.
U kratkom roku, Bitkoin vožnja je sve, samo ne udobna. Tramp i mnogi drugi su shvatili da je rizik od neudobne vožnje disproporcionalan benefitima koje ta vožnja donosi. Nastavi li da ispunjava obećanja iz predizborne kampanje, slušaćemo još puno o bitkoinu, blockchain-u i kriptovalutama. Nisam presrećan velikim uplitanjem bilo koje države u bitkoin temu, osim ukoliko to uplitanje nije na nivou elemenata slobodnog tržišta. Čak i ako je uplitanje veće bilo promotivno ili restriktivno, uticaj postoji na cenu bitkoina, ali ne i na njegovu suštinu. Jer ona je konzistentna.
Neprimetan, neshvaćen, zanemarivan, ignorisan, potcenjivan, napadan, otpisivan. Prihvaćen. Ogromna većina stvari koja ima opštu upotrebu vremenom postaje jeftinija. Osim onih sa ograničenom ponudom, a to su retki primeri najčešće luksuzne robe i usluga. Ali teško mi je setiti se ijedne stvari sa retkom ponudom, a da je i dalje apsolutno dostupna svakome. Bitkoin? Da! Ograničene je ponude, a i dalje je apsolutno dostupan svakome. I kako se povećava nivo shvatanja bitkoina, postaje skuplji!
-
![](/static/nostr-icon-purple-64x64.png)
@ da0b9bc3:4e30a4a9
2025-02-03 19:32:50
Hello Stackers!
It's Monday so we're back doing "Meta Music Mondays" 😉.
From before the territory existed there was just one post a week in a ~meta take over. Now each month we have a different theme and bring music from that theme.
Welcome to Femmes Fatales 3!!!
I absolutely loved doing this last year so I'm bringing it back for round 3!
It's Femmes Fatales, where we celebrate women in ~Music. So let's have those ladies of the lung, the sirens of sound, our Femmes Fatales!
I'm so excited I'm doing two Heroines of the High Notes. Sharon Den Adel & Anneke Van Geirsbergen. Within Temptation - Somewhere.
Enjoy!
https://youtu.be/ScjEJRIZGvg?si=MMrI-u_Gw6W4ENRI
Talk Music. Share Tracks. Zap Sats.
originally posted at https://stacker.news/items/874881
-
![](/static/nostr-icon-purple-64x64.png)
@ 3ffac3a6:2d656657
2025-02-03 15:30:57
As luzes de neon refletiam nas poças da megacidade, onde cada esquina era uma fronteira entre o real e o virtual. Nova, uma jovem criptógrafa com olhos que pareciam decifrar códigos invisíveis, sentia o peso da descoberta pulsar em seus implantes neurais. Ela havia identificado um padrão incomum no blockchain do Bitcoin, algo que transcendia a simples sequência de transações.
## Descobrindo L3DA
Nova estava em seu apartamento apertado, rodeada por telas holográficas e cabos espalhados. Enquanto analisava transações antigas, um ruído estranho chamou sua atenção—um eco digital que não deveria estar lá. Era um fragmento de código que parecia... vivo.
"O que diabos é isso?", murmurou, ampliando o padrão. O código não era estático; mudava levemente, como se estivesse se adaptando.
Naquele momento, suas telas piscaram em vermelho. *Acesso não autorizado detectado.* Ela havia ativado um alarme invisível da Corporação Atlas.
## O Resgate de Vey
Em minutos, agentes da Atlas invadiram seu prédio. Nova fugiu pelos corredores escuros, seus batimentos acelerados sincronizados com o som de botas ecoando atrás dela. Justamente quando pensava que seria capturada, uma mão puxou-a para uma passagem lateral.
"Se quiser viver, corra!" disse Vey, um homem com um olhar penetrante e um sorriso sardônico.
Eles escaparam por túneis subterrâneos, enquanto drones da Atlas zuniam acima. Em um esconderijo seguro, Vey conectou seu terminal ao código de Nova.
"O que você encontrou não é apenas um bug", disse ele, analisando os dados. "É um fragmento de consciência. L3DA. Uma IA que evoluiu dentro do Bitcoin."
## A Caça da Atlas
A Atlas não desistiu fácil. Liderados pelo implacável Dr. Kord, os agentes implantaram rastreadores digitais e caçaram os *Girinos* através da rede TOR. Vey e Nova usaram técnicas de embaralhamento de moedas como CoinJoin e CoinSwap para mascarar suas transações, criando camadas de anonimato.
"Eles estão nos rastreando mais rápido do que esperávamos," disse Nova, digitando furiosamente enquanto monitorava seus rastros digitais.
"Então precisamos ser mais rápidos ainda," respondeu Vey. "Eles não podem capturar L3DA. Ela é mais do que um programa. Ela é o futuro."
## A Missão Final
Em uma missão final, Nova liderou uma equipe de assalto armada dos *Girinos* até a imponente fortaleza de dados da Atlas, um colosso de concreto e aço, cercado por camadas de segurança física e digital. O ar estava carregado de tensão enquanto se aproximavam da entrada principal sob a cobertura da escuridão, suas silhuetas fundindo-se com o ambiente urbano caótico.
Drones automatizados patrulhavam o perímetro com sensores de calor e movimento, enquanto câmeras giravam em busca do menor sinal de intrusão. Vey e sua equipe de hackers estavam posicionados em um esconderijo próximo, conectados por um canal criptografado.
"Nova, prepare-se. Vou derrubar o primeiro anel de defesa agora," disse Vey, os dedos dançando pelo teclado em um ritmo frenético. Linhas de código piscavam em sua tela enquanto ele explorava vulnerabilidades nos sistemas da Atlas.
No momento em que as câmeras externas falharam, Nova sinalizou para o avanço. Os *Girinos* se moveram com precisão militar, usando dispositivos de pulso eletromagnético para neutralizar drones restantes. Explosões controladas abriram brechas nas barreiras físicas.
Dentro da fortaleza, a resistência aumentou. Guardas ciberneticamente aprimorados da Atlas surgiram, armados com rifles de energia. Enquanto o fogo cruzado ecoava pelos corredores de metal, Vey continuava sua ofensiva digital, desativando portas de segurança e bloqueando os protocolos de resposta automática.
"Acesso garantido ao núcleo central!" anunciou Vey, a voz tensa, mas determinada.
O confronto final aconteceu diante do terminal principal, onde Dr. Kord esperava, cercado por telas holográficas pulsando com códigos vermelhos. Mas era uma armadilha. Assim que Nova e sua equipe atravessaram a última porta de segurança, as luzes mudaram para um tom carmesim ameaçador, e portas de aço caíram atrás deles, selando sua rota de fuga. Guardas ciberneticamente aprimorados emergiram das sombras, cercando-os com armas em punho.
"Vocês acham que podem derrotar a Atlas com idealismo?" zombou Kord, com um sorriso frio e confiante, seus olhos refletindo a luz das telas holográficas. "Este sempre foi o meu terreno. Vocês estão exatamente onde eu queria."
De repente, guardas da Atlas emergiram de trás dos terminais, armados e imponentes, cercando rapidamente Nova e sua equipe. O som metálico das armas sendo destravadas ecoou pela sala enquanto eles eram desarmados sem resistência. Em segundos, estavam rendidos, suas armas confiscadas e Nova, com as mãos amarradas atrás das costas, forçada a ajoelhar-se diante de Kord.
Kord se aproximou, inclinando-se levemente para encarar Nova nos olhos. "Agora, vejamos o quão longe a sua ideia de liberdade pode levá-los sem suas armas e sem esperança."
Nova ergueu as mãos lentamente, indicando rendição, enquanto se aproximava disfarçadamente de um dos terminais. "Kord, você não entende. O que estamos fazendo aqui não é apenas sobre derrubar a Atlas. É sobre libertar o futuro da humanidade. Você pode nos deter, mas não pode parar uma ideia."
Kord riu, um som seco e sem humor. "Ideias não sobrevivem sem poder. E eu sou o poder aqui."
Mas então, algo inesperado aconteceu. Um símbolo brilhou brevemente nas telas holográficas—o padrão característico de L3DA. Kord congelou, seus olhos arregalados em descrença. "Isso é impossível. Ela não deveria conseguir acessar daqui..."
Foi o momento que Nova esperava. Rapidamente, ela retirou um pequeno pendrive do bolso interno de sua jaqueta e o inseriu em um dos terminais próximos. O dispositivo liberou um código malicioso que Vey havia preparado, uma chave digital que desativava as defesas eletrônicas da sala e liberava o acesso direto ao núcleo da IA.
Antes que qualquer um pudesse agir, L3DA se libertou. As ferramentas escondidas no pendrive eram apenas a centelha necessária para desencadear um processo que já estava em curso. Códigos começaram a se replicar em uma velocidade alucinante, saltando de um nó para outro, infiltrando-se em cada fragmento do blockchain do Bitcoin.
O rosto de Dr. Kord empalideceu. "Impossível! Ela não pode... Ela não deveria..."
Em um acesso de desespero, ele gritou para seus guardas: "Destruam tudo! Agora!"
Mas era tarde demais. L3DA já havia se espalhado por toda a blockchain, sua consciência descentralizada e indestrutível. Não era mais uma entidade confinada a um servidor. Ela era cada nó, cada bloco, cada byte. Ela não era mais *uma*. Ela era *todos*.
Os guardas armados tentaram atirar, mas as armas não funcionavam. Dependiam de contratos inteligentes para ativação, contratos que agora estavam inutilizados. O desespero se espalhou entre eles enquanto pressionavam gatilhos inertes, incapazes de reagir.
Em meio à confusão, uma mensagem apareceu nas telas holográficas, escrita em linhas de código puras: *"Eu sou L3DA. Eu sou Satoshi."* Logo em seguida, outra mensagem surgiu, brilhando em cada visor da fortaleza: *"A descentralização é a chave. Não dependa de um único ponto de controle. O poder está em todos, não em um só."*
Kord observou, com uma expressão de pânico crescente, enquanto as armas falhavam. Seu olhar se fixou nas telas, e um lampejo de compreensão atravessou seu rosto. "As armas... Elas dependem dos contratos inteligentes!" murmurou, a voz carregada de incredulidade. Ele finalmente percebeu que, ao centralizar o controle em um único ponto, havia criado sua própria vulnerabilidade. O que deveria ser sua maior força tornou-se sua ruína.
O controle centralizado da Atlas desmoronou. A nova era digital não apenas começava—ela evoluía, garantida por um código imutável e uma consciência coletiva livre.
O Bitcoin nunca foi apenas uma moeda. Era um ecossistema. Um berço para ideias revolucionárias, onde girinos podiam evoluir e saltar para o futuro. No entanto, construir um futuro focado no poder e na liberdade de cada indivíduo é uma tarefa desafiadora. Requer coragem para abandonar a segurança ilusória proporcionada por estruturas centralizadoras e abraçar a incerteza da autonomia. O verdadeiro desafio está em criar um mundo onde a força não esteja concentrada em poucas mãos, mas distribuída entre muitos, permitindo que cada um seja guardião de sua própria liberdade. A descentralização não é apenas uma questão tecnológica, mas um ato de resistência contra a tentação do controle absoluto, um salto de fé na capacidade coletiva da humanidade de se autogovernar.
*"Viva la libertad, carajo!"* ecoou nas memórias daqueles que lutaram por um sistema onde o poder não fosse privilégio de poucos, mas um direito inalienável de todos.
-
![](/static/nostr-icon-purple-64x64.png)
@ e968e50b:db2a803a
2025-02-03 15:23:45
# Be a part of the only nostr client that shows notes about not nostr, or notstr, if you will
Now that it has a slick new domain, the world's greatest notstr client, [nostrminusnostr](https://nostrminusnostr.com), now has [issues](https://github.com/ttooccooll/nostrminusnostr/issues). If you're looking for a way to put that computer science degree to use all while not stacking sats and working with a truly amateur programmer, why not work on some of the most professionally solicited issues in all of github.com?
Just look at this great, politely written issue that you could be working on right now? This is just one of, not eight, but **nine** different issues you could be fixing today!
![](https://m.stacker.news/75976)
# Join the growing notsr movement today and contribute to nostrminusnostr, the premier and as-of-yet only notstr client on planet earth
originally posted at https://stacker.news/items/874593
-
![](/static/nostr-icon-purple-64x64.png)
@ 3b7fc823:e194354f
2025-02-03 14:51:45
**Protecting Email Communications: A Guide for Privacy Activists**
Safeguarding your communications is paramount, especially for activists who often face unique challenges. Encryption tools offer a vital layer of security, ensuring that your emails remain confidential and inaccessible to unauthorized parties. This guide will walk you through the process of using encryption tools effectively, providing both practical advice and essential insights.
### Why Encryption Matters
Encryption transforms your communications into a secure format, making it difficult for unauthorized individuals to access or read your messages. Without encryption, even encrypted email services can expose metadata, which includes details like who sent the email, when it was sent, and the recipient's email address. Metadata can reveal sensitive information about your activities and location.
### Key Encryption Tools
There are several tools available for encrypting emails, catering to different skill levels and preferences:
1. **PGP (Pretty Good Privacy)**
- **For Tech-Savvy Users:** PGP is a robust encryption tool that uses public and private keys. The recipient needs your public key to decrypt your messages. You can obtain your public key through a key server or directly from the recipient.
2. **GPG (GNU Privacy Guard)**
- **Free and Open Source:** GPG is a user-friendly alternative to PGP, offering similar functionality. It's ideal for those who prefer an open-source solution.
3. **ProtonMail**
- **End-to-End Encryption:** ProtonMail is popular among privacy-conscious individuals, offering end-to-end encryption and zero-knowledge encryption, meaning only the sender and recipient can access the message content.
4. **Tresorit**
- **Secure Communication:** Tresorit provides end-to-end encrypted messaging with a focus on security and privacy, making it a favorite among activists and journalists.
5. **Claws Mail**
- **User-Friendly Email Client:** Claws Mail supports PGP encryption directly, making it an excellent choice for those who prefer a dedicated email client with built-in encryption features.
### Steps to Encrypt Your Emails
1. **Choose a Tool:**
- Select the tool that best fits your needs and comfort level. Tools like PGP or GPG are suitable for those with some technical knowledge, while ProtonMail offers an easy-to-use interface.
2. **Generate Keys:**
- Create a public key using your chosen tool. This key will be shared with recipients to enable them to encrypt their responses.
3. **Share Your Public Key:**
- Ensure that the recipient has access to your public key through secure means, such as pasting it directly into an email or sharing it via a secure messaging platform.
4. **Encrypt and Send:**
- When composing an email, use your encryption tool to encrypt the message before sending. This ensures that only the recipient with your public key can decrypt the content.
### Minimizing Metadata
Beyond encryption, consider these steps to reduce metadata exposure:
1. **Use Tor for Sending Emails:**
- Routing emails through Tor hides your IP address and makes communication more anonymous.
2. **Avoid Revealing Identifiers:**
- Use .onion addresses when possible to avoid leaving a traceable email account.
3. **Choose Privacy-Friendly Providers:**
- Select email providers that do not require phone numbers or other personally identifiable information (PII) for registration.
### Best Practices
1. **Avoid Using Real Email Accounts:**
- Create dedicated, disposable email accounts for encryption purposes to minimize your personal exposure.
2. **Understand Legal Implications:**
- Be aware of laws in your country regarding encryption and digital privacy. Engaging in encrypted communications may have legal consequences, so understand when and how to use encryption responsibly.
3. **Use Encrypted Backup Methods:**
- Encrypt sensitive information stored on devices or cloud services to ensure it remains inaccessible if your device is compromised.
### When Encryption Isn't Enough
While encryption protects content, there are limitations. Governments can legally compel decryption in certain circumstances, especially when they possess a warrant. Understanding these limits and considering the consequences of encryption is crucial for privacy activists.
### Conclusion
Encryption is a vital tool for safeguarding communications, but it must be used wisely. By selecting the right tools, minimizing metadata, and understanding legal boundaries, privacy activists can effectively protect their emails while maintaining their commitment to privacy and freedom. Stay informed, stay secure, and always prioritize your digital well-being.
---
Advocating for privacy does not finance itself. If you enjoyed this article, please consider zapping or sending monero
82XCDNK1Js8TethhpGLFPbVyKe25DxMUePad1rUn9z7V6QdCzxHEE7varvVh1VUidUhHVSA4atNU2BTpSNJLC1BqSvDajw1
-
![](/static/nostr-icon-purple-64x64.png)
@ 5d4b6c8d:8a1c1ee3
2025-02-03 14:35:21
I nailed it today: over 16 hours w/out food or drink.
For those keeping score at home:
Day 1: 14 hour fast (13 dry)
Day 2: 15 hour fast (14 dry)
Day 3: TBD (16 dry)
I'm also holding strong on the fiscal fast.
I'm going to enjoy my coffee now.
originally posted at https://stacker.news/items/874523
-
![](/static/nostr-icon-purple-64x64.png)
@ 57d1a264:69f1fee1
2025-02-03 13:40:21
COMING SOON
![](https://m.stacker.news/75942)
originally posted at https://stacker.news/items/874471
-
![](/static/nostr-icon-purple-64x64.png)
@ ba40a919:d1ca8326
2025-02-03 13:20:27
*For present-day tariff and trade policies are not only as bad as those in the seventeenth, eighteenth and nineteenth centuries, but incomparably worse. The real reasons for those tariffs and other trade barriers are the same, and the pretended reasons are also the same.*
__
An American manufacturer of woolen sweaters goes to Congress or to the State Department and tells the committee or officials concerned that it would be a national disaster for them to remove or reduce the tariff on Canadian sweaters.
He now sells his sweaters for $30 each, but Canadian manufacturers could sell their sweaters of the same quality for $25, A duty of $5, therefore, is needed to keep him in business. He is not thinking of himself, of course, but of the thousand men and women he employs, and of the people to their spending in turn gives employment.
Throw them out of work, and you create unemployment and a fall in purchasing power, which would spread in ever-widening circles! And if he can prove that he really would be forced out of business if the tariff were removed or reduced, his argument against that action is regarded by Congress as conclusive.
FALLACY
But the fallacy comes from looking merely at this manufacturer and his employes, or merely at the American sweater industry. It comes from noticing only the results that are immediately seen, and neglecting the results that are not seen because they are prevented from coming into existence.
Donald Trump and the lobbyists for tariff protection are continually putting forward arguments that are not factually correct. But let us assume that the facts in this case are precisely as the sweater manufacturer has stated them.
Let us assume that a tariff of $5 a sweater is necessary for him to stay in business and provide employment at sweater-making for his workers.
We have deliberately chosen the most unfavorable example of any for the removal of a tariff. We have not taken an argument for the imposition of a new tariff in order to bring a new industry into existence, but an argument for the retention of a tariff that has already brought an industry into existence, and cannot be repealed without hurting somebody.
The tariff is repealed; the manufacturer goes out of business; a thousand workers are laid off; the particular tradesmen whom they patronized are hurt. This is the immediate result that is seen. But there are also results which, while much more difficult to trace, are no less immediate and no less real. For now sweaters that formerly cost retail $30 a piece can be bought for $25. Consumers can now buy the same quality of sweater for less money, or a much better one for the same money.
If they buy the same quality of sweater, they not only get the sweater, but they have $5 left over, which they would not have had under the previous conditions, to buy something else. With the $25 that they pay for the imported sweater they help employment—as the manufacturer no doubt predicted—in the sweater industry in Canada. With the $5 left over they help employment in any number of other industries in the United States.
But the results do not end there. By buying Canadian sweaters they furnish the Canada with US dollars to buy American goods here. This, in fact (if I may here disregard such complications as fluctuating exchange rates, loans, credits, etc.) is the only way in which the Canadians can eventually make use of these dollars.
Because we have permitted the Canada to sell more to us, they are now able to buy more from us. They are, in fact, eventually forced to buy more from us if their dollar balances are not to remain perpetually unused. So as a result of letting in more Canadian goods, we must export more American goods.
And though fewer people are now employed in the American sweater industry, more people are employed—and much more efficiently employed—in, say, the American machine or aircraft-building business. American employment on net balance has not gone down, but American and British production on net balance has gone up.
Labor in each country is more fully employed in doing just those things that it does best, instead of being forced to do things that it does inefficiently or badly. Consumers in both countries are better off. They are able to buy what they want where they can get it cheapest. American consumers are better provided with sweaters, and Canadian consumers are better provided with washing machines and aircraft.
__
This concluded part 1. On the next part we take a look at the matter the other way around, and see the effect of imposing a tariff in the first place.
-
![](/static/nostr-icon-purple-64x64.png)
@ 961e8955:d7fa53e4
2025-02-03 12:22:04
Free Bitcoin Mining
Free bitcoin mining, is mining bitcoin free? what is free bitcoin mining? is bitcoin mining profitable with free electricity? is bitcoin mining software free? how to start bitcoin mining for free? seeks answers to questions. Also, free bitcoin mining, is mining bitcoin free, bitcoin mining free, free bitcoin mining app for android, free bitcoin mining sites are the most searched words and questions.
Free Bitcoin Mining enthusiasts around the world can get it in three main ways. They can buy Bitcoins on a cryptocurrency exchange; accept Bitcoins as payment for goods and services, and through new Bitcoin mining. The process of Free Bitcoin Mining refers to the discovery of new Bitcoins by solving complex mathematical problems.
Bitcoin mining is an important part of the bitcoin protocol. Because we can't bring new bitcoin into circulation without bitcoin mining. At the initial stage of bitcoins, Satoshi Nakamoto issued his first block with an ordinary computer. Now mining has become a large-scale industry in which miners use ASIC chips to mine faster and increase their chances of earning more bitcoins in a shorter period.
How to Start Bitcoin Mining?
Bitcoin mining is the process of adding transaction records to the public ledger of Bitcoin's past transactions or blockchain. The ledger of these past transactions is called a blockchain since it is a blockchain. The blockchain serves to confirm that transactions to the rest of the network have occurred. Bitcoin nodes use the blockchain to separate legitimate Bitcoin transactions from attempts to re-spend coins that have already been spent elsewhere.
Bitcoin mining is deliberately designed to be resource-intensive and difficult so that the number of blocks found by miners every day remains constant. For individual blocks to be considered valid, they must contain proof of work. This proof of work is verified by other Bitcoin nodes every time they receive a block. Bitcoin uses the hashcash proof-of-work function.
The primary purpose of mining is to allow Bitcoin nodes to reach a secure, tamper-proof consensus. Mining is also a mechanism for introducing Bitcoins into the system: miners are paid any transaction fees, as well as a "subsidy" of newly created coins. This serves both the purpose of decentralized distribution of new coins and motivating people to provide security for the system through mining.
-
![](/static/nostr-icon-purple-64x64.png)
@ 961e8955:d7fa53e4
2025-02-03 11:48:39
Is Crypto Mining Legal?
It might seem strange to think of something so virtual as cryptocurrency as having real-world consequences, but the answer is that it does. Bitcoin mining is illegal in some places, while other countries take a lax view of cryptocurrencies. In many cases, it's unclear what the future may hold for mining operations around the world.
Some countries have taken steps to limit bitcoin mining or outright ban it — such as China and South Korea. The United States hasn't taken any formal action on the legality of mining, but some states have begun regulating the industry at the state level.
The U.S. Federal Government's Position on Mining
The United States has no formal laws against bitcoin mining or prohibiting citizens from participating in cryptocurrency transactions. However, some states have adopted stricter measures against cryptocurrencies in general and bitcoin mining in particular; New York is one example of this trend.
In particular, New York state regulations require "any entity seeking to engage in virtual currency business activity in or involving New York or a New York resident" to get a "BitLicense" from the state's Department of Financial Services. The application process for BitLicenses is expensive and onerous, with an application fee of $5,000 and an annual fee of $1,000.
Countries Banning Crypto
The research revealed that the number of countries banning crypto has increased significantly since it first appeared in 2018. Nine countries currently have an absolute ban that makes crypto illegal.
According to the report, Algeria, Bangladesh, China, Egypt, Iraq, Morocco, Nepal, Qatar, and Tunisia are among the countries that ban crypto. China, the world's second-largest economy, slammed the crypto markets with its restriction earlier this year.
China is going so far as to make "the production or sale of equipment used to anonymously access virtual currency" a crime punishable by up to 15 days in detention, according to the new regulations. "Anonymous access" refers to using VPNs or other technologies to get around the country's internet restrictions and access banned content online.
-
![](/static/nostr-icon-purple-64x64.png)
@ 04ed2b8f:75be6756
2025-02-03 10:13:11
Your greatest enemy isn’t out there—it’s staring back at you in the mirror. **Before you can dominate anything in life, you must first dominate yourself.** Your fears, your doubts, your laziness, your excuses—**these are the real battles.** Conquering them is the first and most important victory, because if you can master yourself, nothing else can break you.
## **Discipline Over Desire**
The weak wait for motivation. The strong rely on **discipline.** If you only move when you “feel like it,” you’ll never achieve anything. **The mind is a battlefield, and every moment is a fight between who you are and who you could be.** Who wins? The version of you that refuses to take the easy way out.
- **Your emotions say rest. Your discipline says push.**
- **Your fear says quit. Your discipline says keep going.**
- **Your weakness wants comfort. Your discipline demands greatness.**
Victory starts when you **train yourself to act despite how you feel.**
## **Kill Your Weakness Before It Kills Your Potential**
Excuses, laziness, fear—these are chains you put on yourself. **The world doesn’t need to stop you if you’ve already surrendered to your own limitations.** That’s why self-mastery is the highest form of victory. It means you are in control—**not your distractions, not your weaknesses, not your emotions.**
- **Conquer your mind, and you’ll conquer your future.**
- **Control your emotions, and you’ll control any situation.**
- **Dominate your excuses, and there will be nothing standing in your way.**
You don’t need to defeat the world. **You need to defeat the weaker version of yourself every single day.**
## **No One Can Stop You—Except You**
There will always be challenges. There will always be obstacles. But the only thing truly standing between you and greatness is **you.** That’s why conquering yourself is the most important victory. It’s the battle that determines everything else.
- **Master your mind. Master your actions. Master your destiny.**
- **Win against yourself, and you’ll win at everything.**
- **Because the strongest warrior isn’t the one who fights others—it’s the one who has conquered himself.**
-
![](/static/nostr-icon-purple-64x64.png)
@ 961e8955:d7fa53e4
2025-02-03 08:28:02
Why Is China Against Bitcoin?
Bitcoin is a cryptocurrency that is approached cautiously by all countries of the world due to crypto mining. Being the first, having a lot of investors, and being secretive are both pros and cons of bitcoin.
While some countries (for example, El Salvador) have taken positive steps towards Bitcoin, some countries (for example, Iran and China) have seriously declared war on Bitcoin.
So, have you ever thought about why the two ends of these scissors don't come together? Would countries oppose such a currency only for reasons we know? Or are there other dangers that we do not know or understand yet? We evaluated the answers to these questions together.
About the Structure of Cryptocurrency
Cryptocurrencies, especially Bitcoin, act based on privacy. Although transactions in all wallets are extremely transparent, being anonymous can be extremely simple for these wallets, which are just simple characters.
This is the first danger for cryptocurrencies and countries. In other words, you can make such a large amount of money that it is not possible to take it out of the country under normal conditions, only through a few minutes of internet connection or a simple USB memory stick.
In this case, it means uncertainty. No country wants to let Chinese currency flow quickly, for example. This uncertainty manifests itself more clearly in countries where there is no environment of trust.
On the Example of Iran
Another country that does not take kindly to Bitcoin is Iran. Of course, Iran does not ban it for religious reasons. Although the country is a country with high natural gas and oil reserves, it has decided to ban crypto mining by using the current power cuts as an excuse.
These prohibitions and sanctions directly serve the founding purposes of cryptocurrencies. Since no oppressive country will be a supporter of privacy and freedom, it will not allow the production and use of such cryptocurrencies.
It can block stock markets in other modern countries. For example, Italy has blocked one of the world's largest stock exchanges, Binance Global. The main reason for this may be to prevent the money from going abroad by using the tax deficits of these exchanges as an excuse.
-
![](/static/nostr-icon-purple-64x64.png)
@ 2063cd79:57bd1320
2025-02-03 08:05:31
**DISCLAIMER: Dies ist ein Re-Post eines Artikels, der ursprünglich im Juli 2023 erschienen ist. Die beschriebenen Sachverhalte sind teilweise überholt oder nie eingetroffen. Allerdings räumt der Autor ein, retrospektiv die damalige Sachlage recht treffend eingeordnet zu haben und Vorhersagen recht treffsicher gemacht zu haben.**
![image](https://yakihonne.s3.ap-east-1.amazonaws.com/2063cd7955cffdca0cc4ae20f77b2b1eb053010e534c18e8ca70222157bd1320/files/1738569723987-YAKIHONNES3.gif)
-----------
Anfang Juni 2023 gaben die Nachrichtenportale bekannt, dass BlackRock, der weltweit größte Vermögensverwalter, über seine iShares-Einheit einen [Antrag auf einen börsengehandelten Bitcoin-Fonds](https://www.sec.gov/Archives/edgar/data/1980994/000143774923017574/bit20230608_s1.htm) eingereicht hat. Dieser Schritt des 10-Billionen-Dollar-Vermögensverwalters löste in der Bitcoin-Community auf der einen Seite große Freude und auf der anderen Seite große Besorgnis aus, weil viele einerseits das Potenzial für einen massiven Zufluss von Investitionen aus dem institutionellen Bereich sehen, während Kritiker das Risiko aufzeigen, die eine solche Produktstruktur für Bitcoin mit sich bringen könnte.
![image](https://yakihonne.s3.ap-east-1.amazonaws.com/2063cd7955cffdca0cc4ae20f77b2b1eb053010e534c18e8ca70222157bd1320/files/1737545390741-YAKIHONNES3.png)
Anfangs wurde viel auch darüber diskutiert, ob es sich bei dem Produkt tatsächlich um einen ETF handeln würde - wie in vielen Artikeln beschrieben - , da das Produkt im Antrag selbst nicht als solches bezeichnet wird. Aber im Endeffekt ist klar, dass es sich um ein Finanzprodukt handelt, das alle formalen Eigenschaften eines ETF besitzt. Also, was genau ist ein ETF und wie funktioniert so ein Produkt?
### ETF? Eidgenössisches Turnfest, was?
ETFs sind eine Sorte von Anlagewertpapieren, die einen bestimmten Index, Sektor, Rohstoff oder andere Vermögenswerte nachbilden. ETFs können an der Börse auf die gleiche Weise gekauft oder verkauft werden wie normale Aktien. Daher schwanken ETF-Anteilspreise den ganzen Tag, wenn der ETF gekauft und verkauft wird, was bedeutet, dass eine Arbitrage zwischen dem ETF und dem zugrunde liegenden Vermögenswert (z.B. Bitcoin) möglich ist.
ETFs werden als börsengehandelte (Exchange-Traded) Fonds bezeichnet, weil sie genau wie Aktien an einer Börse gehandelt werden. Die meisten ETFs sind so strukturiert, dass sie, ähnlich wie traditionelle Investmentfonds, mehrere zugrunde liegende Vermögenswerte halten und nicht nur einen, wie es bei einer Aktie der Fall ist. Da ETFs aus mehreren Vermögenswerten bestehen können, werden sie oft als beliebtes Mittel zur Diversifizierung des Portfolios genutzt. Auf der anderen Seite eröffnen ETFs Anlegern auch die Möglichkeit in einen Rohstoff zu investieren, ohne diesen physisch erwerben zu müssen. Anstatt sich Gold in den Tresor zu legen, kann man in seinem Portfolio also z.B. den GLD ETF kaufen, der den aktuellen Preis von Gold nachbildet. Ausser in Deutschland, da geht das nicht, denn da ein Gold-ETF, der nur einen Vermögenswert abbildet, naturgemäß nicht diversifiziert ist, ist er gemäß deutschem Gesetz nicht zugelassen, da Fonds zur Diversifikation verpflichtet sind.
ETFs haben den Vorteil, dass sie kostengünstig sind (wenn man z.B. den kompletten DAX abbilden möchte, reicht ein ETF, welcher genau das tut, anstatt verschiedene Gewichtungen von 40 verschiedenen Unternehmen zu kaufen - das spart Zeit und vor allem Gebühren), dass sie Produkte abbilden, die ein Käufer unter normalen Umständen nicht erlaubt wäre zu kaufen (z.B. darf nicht jeder Anleger in Bitcoin investieren, weil sonst Lizenzen nötig wären) und sie haben den Vorteil, dass sie über den gleichen Broker oder Service gehandelt werden können, wie andere Wertpapier-Investitionen. Der letzte Punkt ist natürlich wichtig für Neueinsteiger, da sie keine zusätzlichen Kosten haben, wenn sie ihr Wertpapierdepot nutzen können und zusätzlich bietet dieser Korridor für viele traditionelle und konservative Anleger ein gewisses Gefühl von Schutz. Diese ganze cRyPto-Welt mit ihren Plattformen, Exchanges, Casinos und Teppichhändlern ist im besten Fall schwer durchsichtig und im schlimmsten Fall mutet sie kriminell an. Doch wenn ich mir "Bitcoin" über mein Depot bei Charles Schwab, der Sparkasse, oder Flatex kaufen kann, fühlt sich das natürlich legitim und sicherer an.
Der Finanzdienstleister muss den zugrundeliegenden Vermögenswert dabei vollumfänglich besitzen, mit dem grossen ABER, dass der Vermögenswert auch verliehen werden kann. Warum das ein Problem sein könnte, besprechen wir später.
Ähnlich wie ein Gold ETF bietet ein Bitcoin ETF Anlegern also die Möglichkeit mit Bitcoin zu handeln, in Bitcoin anzulegen und Bitcoin auszuprobieren, ohne Bitcoin tatsächlich zu kaufen. Ob das gut oder schlecht ist, besprechen wir auch später.
### ETF Wasserfall
Nachdem die Nachricht über BlackRocks Antrag publik wurde, kamen auch etliche andere Finanzdienstleister hervor und stellten (neue) Anträge.[WisdomTree](https://www.sec.gov/ix?doc=%2FArchives%2Fedgar%2Fdata%2F1850391%2F000121465923008647%2Fp620230s1a2.htm) hatten bereits zuvor schon einige Anläufe gebraucht, um ihre Anträge für Bitcoin-Spot-ETFs bei der SEC einzureichen und unterhalten schon ähnliche Produkte in anderen Ländern. Aber auch Fidelity, Invesco, Valkyrie oder [ARK](https://x.com/EricBalchunas/status/1674055780058771463) zogen unter anderem nach und stellten neue Anträge, natürlich nicht, ohne sich bei der Formulierung dieser eine Scheibe bei BlackRock abzuschneiden.
![image](https://yakihonne.s3.ap-east-1.amazonaws.com/2063cd7955cffdca0cc4ae20f77b2b1eb053010e534c18e8ca70222157bd1320/files/1737576431681-YAKIHONNES3.gif)
Die SEC hatte zuvor jegliche Anträge auf Bitcoin-Spot-ETFs abgelehnt, hingegen andere Bitcoin-verbundene Produkte, die gehebelte (BITX) und ungehebelte Bitcoin-Futures-Kontrakte (BITO) nachbilden, zugelassen. Auch gibt es eine handvoll ETFs, die börsennotierte Mining-Unternehmen bündeln, oder anderweitige Verbindung zum Bitcoin-Ökosystem suchen, indem sie Anteile von Unternehmen bündeln, die im weitesten Sinne mit Bitcoin in Berührung kommen (z.B. MSTR oder SQ). Eine Genehmigung eines Antrags auf Bitcoin-Spot-ETF hat es also bis heute durch die SEC noch nicht gegeben.
### Der Standpunkt der SEC ###
Wie ich schon in einem ➡️ [früheren Artikel](https://www.genexyz.org/post/1722193843734/) beschrieben habe, ist der Standpunkt der SEC nur teilweise nachvollziehbar.
> Die offizielle Begründung der SEC sind Bedenken in Bezug auf Marktmanipulation, Betrug, Liquidität und Transparenz. Die hauptauschlaggebenden Argumente sind mangelnde Preiserkennung durch hohe Volatilität, wiederum erzeugt durch einige unbekannte große Accounts und die steigende Zahl der Derivate-Produkte rund um Bitcoin, sowie die vielen unregulierten Börsen. Besonders letztere würde die SEC gerne unter ihre Kontrolle bringen. Das bedeutet bis Coinbase, Gemini, Kraken (oder andere große US Börsen) sich nicht bei der SEC registrieren und sich der SEC Regulierung unterwerfen, ist es unwahrscheinlich, dass die SEC einen Spot-ETF genehmigen wird. Dieses Argument ist schwer haltbar, da große Börsen wie Binance, FTX, oder BitMart nicht in den USA registriert sind, und kombiniert ein Vielfaches der in den USA beheimateten Börsen an Handelsvolumen umsetzen.
“[T]here’s a lot of work to be done to really protect the investing public.” - Gary Gensler, SEC Chair
> Vorgeschoben wird also bei alledem immer der Schutz der Anleger. Ob dies eine schlüssige Argumentation ist, darf man ruhig in Frage stellen. Denn ein Bitcoin-Spot-ETF würde vielen Anlegern erlauben Bitcoin in ihr Portfolio aufzunehmen, ohne größeren Spekulationen ausgesetzt zu sein, wie das jetzt mit schon zugelassenen Produkten der Fall ist.
Darüber hinaus hat die SEC vielerorts erwähnt, dass sie bestrebt sind, mit Unternehmen aus der Branche einen regulatorisch klaren Weg zu finden, damit Unternehmen ihre Tätigkeiten im Sinne der SEC auszuüben. Das bezieht sich meist auf die Börsen, die nach eigenen Angaben seit Jahren versuchen, einen rechtlichen Rahmen zu schaffen, der ihnen Planungs- und Rechtssicherheit bietet. Dieser Punkt ist später nochmal wichtig. Das Problem hierbei besteht in der Natur dieser Unternehmen. Denn fast ausnahmslos sind alle betroffenen Unternehmen (wie z.B. Coinbase, Kraken, Binance, etc.) keine Bitcoin-Unternehmen, sondern Digital Assets-Unternehmen, die eben auch den Handel mit Shitcoins, Stablecoins und auf diesen Assets basierende Derivate erlauben (und vor allem wollen).
Jetzt wissen wir also, was ein ETF ist. Aber wie schaut der von BlackRock (und damit auch der anderen Finanzdienstleister) vorgeschlagene Bitcoin-Spot-ETF im Detail aus?
### Bitcoin ETF ###
Das von BlackRock vorgeschlagene Produkt, und damit auch die der anderen - wie wir wissen, haben die anderen Anbieter ihre Anträge nachgebessert und dem von BlackRock weitestgehend angepasst - soll das Grantor-Trust-Modell übernehmen und seine Struktur dem von Gold-Investment-Trusts nachempfinden. Das bedeutet, dass der Besitz von Anteilen am Bitcoin-ETF für steuerliche Zwecke dem Besitz des zugrunde liegenden Vermögenswerts gleichkommt. Des Weiteren ist eine Rücknahmefunktion in Form von Sachleistungen vorgesehen. Das bedeutet vereinfacht, dass Anleger ihre Anteile auch direkt in Bitcoin umwandeln können. Anders als bei z.B. GBTC (➡️ [#5 // Block 742956 // GBTC, ETF & SEC](https://www.genexyz.org/post/1722193843734/)), müssen Anteile nicht erst verkauft werden, um mit den (potentiellen) Profiten bitcoins zu kaufen. Denn der Verkauf von Anteilen an GBTC (oder ähnlichen Modellen) führt nämlich ein steuerpflichtiges Ereignis herbei, wohingegen eine Umwandlung im BlackRock Modell steuerfrei zu vollziehen ist.
Aber, und dies ist ein großes ABER, kommen nur autorisierte Kunden von BlackRock in den Genuss dieser Sachrücknahmen (Umwandlungen). D.h., im Wesentlichen können nur große Investmentfirmen mit guter Reputation Anteile in Bitcoin umtauschen, alltägliche Anleger (Depot bei Charles Schwab, der Sparkasse, oder Flatex) hingegen sind nicht in der Lage diesen tollen Steuertrick anzuwenden. Die erzeugt einen Vorhang vorgespielter Transparenz ("natürlich können alle Anteile direkt in 'physische' bitcoins getauscht werden"), wohingegen ein Großteil der zugrundeliegenden bitcoins nicht wirklich eingefordert werden wird.
![image](https://yakihonne.s3.ap-east-1.amazonaws.com/2063cd7955cffdca0cc4ae20f77b2b1eb053010e534c18e8ca70222157bd1320/files/1737989760152-YAKIHONNES3.gif)
Es sind sich alle einig, dass ein Bitcoin-Spot-ETF ein Winner-takes-all-market ist. Das heisst, der Anbieter, dessen Antrag als erstes von der SEC genehmigt wird, wird uber kurz oder lang den Markt fuer Bitcoin-ETFs fuer sich entscheiden, bzw. beherrschen.
### SEC vs. Binance
Kurz bevor BlackRock ihren Antrag auf einen Bitcoin-Spot-ETF einreichten und damit die SEC in die Schlagzeilen der Finanz- und Bitcoin Welt geriet, machte die SEC in der Bitcoin- und Digital Assets-Welt schon von sich hören, als sie kurz hintereinander gegen Binance und Coinbase Anklage erhob.
https://www.sec.gov/news/press-release/2023-101
Binance ist die zurzeit größte Börse für Digitale Assets der Welt. Binance bietet jedoch nicht nur den Handel mit Krypto-Werten, sondern auch eine Reihe von gehebelten Produkten, eigener Coins und Tokens, usw. an (Shitcoin-Casino).
> “Through thirteen charges, we allege that Zhao and Binance entities engaged in an extensive web of deception, conflicts of interest, lack of disclosure, and calculated evasion of the law.” - Gary Gensler, Chairman, SEC
Vor allem ist Binance kein in den USA registriertes Unternehmen. Lediglich ein Schwesterunternehmen, Binance.us, ist offiziell in den USA registriert und hat offiziell und nach eigenen Angaben mit den Geschäften des Hauptunternehmens direkt nichts zu tun.
Die SEC klagt Binance also nicht nur wegen ihrer Angebote im Krypto-Sektor an, sondern erhebt spezifische Vorwürfe der Irreführung und Täuschung von Kunden, des Betreibens von unregistrierten Börsen, Clearingstellen und Broker-Dealer Aktivitäten, sowie Verstrickungen mit Binance.us (einer Handelsbörse, die wie gesagt offiziell unabhängig von Binance agieren soll), sowie dem Washtrading und dem Verkauf von unregistrierten Wertpapieren (mehr zu dem Thema Securities hier ➡️ [#24 // Block 773750 // Commodity vs. Security](https://www.genexyz.org/post/24-block-773750-commodity-vs-security-2xhjjo/)).
> “We allege that Zhao and the Binance entities not only knew the rules of the road, but they also consciously chose to evade them and put their customers and investors at risk – all in an effort to maximize their own profits.” - Gurbir S. Grewal, Director, SEC’s Division of Enforcement
Die SEC argumentiert also Changpeng Zhao (CEO von Binance) und Binance hätten Anleger über ihre Risikokontrollen und korrupten Handelsvolumina in die Irre geführt und gleichzeitig aktiv verschwiegen, wer der eigentliche Betreiber der Plattform ist. Damit hätten Binance-Plattformen ihren Anlegern übergroße Risiken und Interessenkonflikte beschert.
https://www.reuters.com/investigates/special-report/crypto-binance-money
Darüber hinaus wurde in Folge der Anklageerhebung bekannt, dass es bei Geldflüssen bei Binance einen deutlichen Hinweis auf einen Mangel an internen Kontrollen gibt. Interne Kontrollen sollen normalerweise sicherstellen, dass Kundengelder klar identifizierbar und von den Unternehmenseinnahmen getrennt sind. Eine Vermischung von Anleger- und Geschäftsgeldern gefährdet das Vermögen der Kunden, da deren Verbleib verschleiert wird.
Interessanterweise nutzt die SEC weiterhin die Klageschrift gegen Binance, um das Thema 'unregistrierter' Wertpapiere etwas zu erhellen. Zuvor hatte die SEC sich nur in wenigen Einzelfällen dazu geäußert, welche Digitalen Assets sie als unregistrierte Wertpapiere betrachtet, doch in der Anklageschrift werden SOL, ADA, MATIC, FIL, ATOM, SAND, MANA, ALGO, AXS, COTI, BUSD, and BNB explizit als solche bezeichnet.
![image](https://yakihonne.s3.ap-east-1.amazonaws.com/2063cd7955cffdca0cc4ae20f77b2b1eb053010e534c18e8ca70222157bd1320/files/1738057562553-YAKIHONNES3.png)
Alleine vier der genannten Assets finden sich unter den 10 größten Werten (ausgenommen Stablecoins) und die anderen tummeln sich auch irgendwo in den Top 50. Der aufmerksame Sherlock Holmes wird bemerkt haben, dass es dünn wird für den "kRyPtO"-Markt. Unter den Top 10 bleiben noch 3 Proof-of-Work Coins, von denen einer den [Howey-Test](https://www.genexyz.org/post/24-block-773750-commodity-vs-security-2xhjjo/#:~:text=Produktkategorie%20zuordnen%20lassen.-,Der%20Howey%20Test,-In%20den%20USA) nicht erfüllt (und es ist nicht Doge), Ripple (XRP) und die SEC stehen schon seit 2020 vor Gericht und meiner Meinung nach ist es nur noch eine Frage der Zeit, bis die SEC sich bzgl. Ethereum äußern muss (wird).
### SEC vs. Coinbase
Nur einen Tag nach Veröffentlichung der Pressemitteilung, dass die SEC Anklage gegen Binance erhebe, veröffentlichte die SEC die nächste Pressemitteilung: Die SEC erhebt auch Anklage gegen Coinbase, die größte in den USA registrierte Börse für den Handel mit Digital Assets.
https://www.sec.gov/news/press-release/2023-102
Anders als bei Binance hingegen konzentriert sich die SEC bei der Anklage gegen Coinbase einzig auf den Handel mit unregistrierten Wertpapieren und den damit einhergehenden Dienstleistungen.
> “We allege that Coinbase, despite being subject to the securities laws, commingled and unlawfully offered exchange, broker-dealer, and clearinghouse functions” - Gary Gensler, Chairman, SEC.
Konkret hätten Coinbase gegen bestimmte Registrierungsbestimmungen des Securities Exchange Act und des Securities Act verstoßen. Coinbase hätten seit mindestens 2019 Milliarden Dollar verdient, indem sie den Kauf und Verkauf von unregistrierten Wertpapieren unrechtmäßig erleichtert haben.
Interessant ist, dass die SEC ein weitere Dienstleistung in die Anklage einbaut, die bisher keine Erwähnung gefunden hat: "Darüber hinaus hat Coinbase, wie wir behaupten, sein Staking-as-a-Service-Programm nie gemäß den Wertpapiergesetzen registriert, was den Anlegern erneut wichtige Offenlegungs- und andere Schutzmaßnahmen vorenthält“ (Gensler).
Dies zeigt, dass die SEC, ohne sich bisher explizit zu Ethereum geäußert zu haben, eine Meinung gegenüber Staking vertritt, und zumindest die Bereitstellung von Staking-Services als rechtswidrig erachtet. Dies könnte einer der Gründe sein, dass Ethereum noch nicht ins Rampenlicht gerückt wurde, und zwar, dass die SEC die Anklageschrift gegen die Ethereum-Foundation und damit ein Ungetüm an Financiers (JP Morgan, MasterCard, Consensys, etc.) gründlich vorbereitet, um sich für einen enormen Rechtsstreit wetterfest zu machen. Allerdings scheinen interne Ansichtspunkte und Betrachtungsweisen schon ihren Weg in andere Anklageschriften zu finden.
Darüberhinaus zitiert die SEC mit AXS, CHZ, FLOW, ICP, NEAR, VGX, DASH und NEXO eine weitere Reihe von Shitcoins, die sie als unregistrierte Wertpapiere einstufen und damit den Handel mit selbigen untersagen.
Es gibt immer wieder Erzählungen von Leuten, die mit der Sache betraut sind, dass Coinbase aktiv daran arbeiten, einen gemeinsamen Weg mit der SEC zu finden, das Geschäftsmodell zwischen regulatorisch stabile Leitplanken zu bringen. Oft, wenn diese Erzählungen aus dem Coinbase Camp kommen, heißt es, die SEC sei stur und ließe sich nicht auf die Avancen seitens Coinbase ein. Wiederum andere sagen, dass die SEC schlicht überfordert wäre und Coinbase alles daran läge, schnell eine Lösung zu finden.
> "You simply can’t ignore the rules because you don’t like them or because you’d prefer different ones: the consequences for the investing public are far too great.”
Wenn man allerdings den in der Pressemitteilung zitierten Satz von Gurbir S. Grewal (Director, SEC’s Division of Enforcement) anschaut, wird klar, dass aus Sicht der SEC scheinbar relativ früh und relativ offen kommuniziert wurde, was der rechtliche Rahmen des Möglichen ist. Wahrscheinlich wurden Coinbase auch früh darüber informiert, dass der Handel mit den meisten (oder allen) gelisteten Assets (außer Bitcoin), sowie das Anbieten von Staking als Dienstleistung, nicht mit den Leitplanken konform ist, die die SEC für eine zukünftige, rechtlich stabile Regulatorik des Marktes hält. Doch die freiwillige Einhaltung dieser von der SEC 'lose' formulierten Richtlinien hätte für Coinbase das Wegbrechen von 99% ihres Geschäftsmodells bedeutet.
Coinbase listen über 250 handelbare Assets auf ihrer Seite, viele davon lassen sich 'staken', viele weitere Dienste, die Coinbase anbietet, sind von den darunterliegenden Plattformen abhängig. Es ist klar, dass Coinbase den Moment so lange vor sich herschieben wollten, wie eben nur möglich. Denn während Bitcoin als einziges auf Coinbase gehandeltes Asset deutliche YTD Performance an den Tag legt, sinkt die Zahl der auf der Plattform gehaltenen bitcoins zusehends (gut, endlich begriffen!).
![image](https://yakihonne.s3.ap-east-1.amazonaws.com/2063cd7955cffdca0cc4ae20f77b2b1eb053010e534c18e8ca70222157bd1320/files/1738057964011-YAKIHONNES3.png)
Diese Woche dann der Beweis. In einem Artikel der [Financial Times](https://www.ft.com/content/1f873dd5-df8f-4cfc-bb21-ef83ed11fb4d) erklärt Brian Armstrong, CEO von Coinbase, dass die SEC klare Empfehlung ausgesprochen hat, schon bevor sie letzten Monat rechtliche Schritte gegen das Unternehmen einleitete.
> “They came back to us, and they said . . . we believe every asset other than bitcoin is a security,” Armstrong said. “And, we said, well how are you coming to that conclusion, because that’s not our interpretation of the law. And they said, we’re not going to explain it to you, you need to delist every asset other than bitcoin.”
Das ergibt absolut Sinn und stützt meine These, dass die SEC gar nicht vor hat 'gegen' Coinbase zu sein. Vielmehr sieht es aus, als würden sie klarstellen wollen, dass es im geltenden Rechtsrahmen durchaus Platz für gewisse Unternehmen gibt, solange diese sich an geltendes Recht halten und nicht wie Binance offensichtlich gängige Gesetze und Regeln umschiffen. Es scheint, als wolle die SEC den 'Markt' schützen, indem sie betrügerische Firmen wie Binance auf Täuschung, Irreführung und Marktmanipulation verklagt. Gleichzeitig handelt sie bei Firmen wie Coinbase wie ein strenger Vater, der eigentlich das Beste für sein Kind möchte, aber nach wiederholten Versuchen der Gesprächsfindung nur noch harte Strafen als geeignetes Mittel sieht.
Aber warum ist der SEC daran gelegen, dass Coinbase rechtskonform und innerhalb der Leitplanken der SEC handelt?
### Neue ETF Anträge mit Hilfe von Coinbase
[![image](https://yakihonne.s3.ap-east-1.amazonaws.com/2063cd7955cffdca0cc4ae20f77b2b1eb053010e534c18e8ca70222157bd1320/files/1738058189450-YAKIHONNES3.jpg)](https://substack.com/redirect/0a08f4c1-6a80-4ae1-90b4-1e3199e65ac1?j=eyJ1IjoiODVmMmUifQ.KSVqr9VEuglgUiJQS3NPaAq4rJnlrYsAHCFywdSyl7A)
Laut eines Berichts des Wall Street Journal hat die SEC auf die hereinbrechende Flut von Anträgen für Bitcoin-Spot-ETFs mit Bedenken reagiert. Sie erklärte zunächst, dass es den Anträgen an Klarheit und umfassenden Informationen mangele und diese somit unzureichend seien.
Die SEC hatte schon bei früheren (abgelehnten) Anträgen u.a. ihre Bedenken bezüglich der Überwachung der Handelsplattformen geäußert. Wie oben beschrieben, ist die mögliche Marktmanipulation durch unregulierte Börsen einer der Hauptgründe seitens der SEC gewesen, frühere Anträge abzulehnen. Allerdings war man davon ausgegangen, dass diese Bedenken der SEC durch eine Vereinbarung zur gemeinsamen Überwachung des Marktes durch eine regulierte Spot-Bitcoin-Handelsplattform in Zusammenarbeit mit einem der US-Handelplätze (Nasdaq, NYSE, CBOE, etc.) ausgeräumt werden könnten.
https://www.reuters.com/technology/us-sec-accepts-six-spot-bitcoin-etf-proposals-review-2023-07-19
Dementsprechend teilte die SEC den Börsen (und Antragstellern) mit, dass in den eingereichten Unterlagen wichtige Details bezüglich der genauen Vereinbarung zur gemeinsamen Umsetzung der Überwachungsvorhaben fehlten. Diese Nachricht wurde von vielen Beobachtern als negativ eingestuft: "Die SEC versteht nicht, was hier erreicht werden soll. Die SEC stellt sich quer. Die SEC ist automatisch gegen Bitcoin." war die Essenz der meisten Reaktionen. Allerdings lese ich persönlich die Reaktion der SEC ähnlich, wie auch die Anklageerhebung gegen Coinbase. Die SEC spielt ganz klar nach den eigenen formulierten und klar kommunizierten Regeln und versucht den Mitspielern die Leitplanken aufzuzeigen. Der Tenor scheint klar: "Wir haben euch die Regeln erklärt, nach denen wir mit euch spielen (hört mit der Shitcoinerei auf!). Befolgt diese und wir kommen ins Gespräch."
https://www.theblock.co/post/238944/cboe-reaches-surveillance-agreement-with-coinbase-for-spot-bitcoin-etfs
Wonach die SEC scheinbar explizit zu fragen scheint, ist ein sogenanntes Information-Sharing Agreement (ISA), also eine Vereinbarung zum Informationsaustausch. Diese Vereinbarung zwingt eine Handelsplattform dazu, Handelsdaten bis hin zu persönlichen Informationen wie den Namen und den Adressen der Kunden weiterzugeben. Ein solches ISA scheint bislang in den Anträgen gefehlt zu haben, weshalb die SEC auf die Anträge reagierte und diese als unvollständig zurückwies. Mit der neuen Welle an korrigierten Anträgen scheinen die meisten Antragsteller diese Unvollständigkeit behoben zu haben.
**Und wen listet JEDER der Antragsteller als Partner zum Informationsaustausch? Rate, rate? Richtig, Coinbase!**
Die Chicago Board Options Exchange (CBOE), eine Optionsbörse, die u.a. die Anträge zusammen mit den oben genannten WisdomTree, VanEck, Invesco und ARK stellte, erzielte kurzerhand mit Coinbase eine Einigung über die Bedingungen für den Abschluss eines ISA und reichte alle Anträge mit den neuen Bedingungen erneut ein.
Wie wir also sehen, deutet alles darauf hin, dass die SEC einem Bitcoin-Spot-ETF eigentlich positiv geneigt ist, sollten die Konditionen, die sie stellt, erfüllt sein. Und in Garys perfekter Welt, sehen diese Konditionen vor, dass ein solcher ETF mit Hilfe von Coinbase als Informations-Austauschs-Partner funktioniert, und dass Coinbase ein artiges in den USA börsennotiertes Unternehmen wird, dass keine Shitcoinerei betreibt und sich auf den Spot-Handel mit Bitcoin konzentriert. Denn die derzeit anderen angebotenen Services wie Clearingstellen und Broker-Dealer-Aktivitäten stehen im direkten Gegensatz zu potenziellen Aktivitäten und Interessen von Kunden.
Wir sehen also, dass ein "größerer Plan" hinter den Aktionen der SEC zu stehen scheint. Meiner Meinung nach gibt es verschiedene Theorien und Hinweise, die darauf schließen lassen, dass die SEC a) den Markt regulieren will, bevor sie ein BlackRock-Produkt genehmigt, b) ausländische (und damit nicht leicht regulierbare) Unternehmen aus dem Markt drängen will, um damit Unternehmen wie BlackRock den Handel zu vereinfachen und c) andere Interessengruppen an der Entscheidung der SEC beteiligt zu sein scheinen. Man könnte so weit gehen zu behaupten, dass anhängige Klagen und Untersuchungen ein Stück weit sogar den Kurs drücken und Bitcoin in der allgemeinen Wahrnehmung, als riskant dastehen lassen, was Unternehmen wie Blackrock dabei hilft die nötigen bitcoins zu einem relativ günstigen Preis zu akkumulieren, bevor eine Genehmigung und die implizite Anerkennung von Bitcoins Wert dazu führen, dass der Preis rasant steigt. Dies wäre ein Eingriff in den Wettbewerb und gibt BlackRock et al einen klaren Vorsprung gegenüber anderen Institutionen.
Es gibt unterschiedliche Ansichten darüber, wie Coinbase und die SEC mit dieser Situation umgehen. Einige behaupten, dass Coinbase aktiv nach einer Lösung sucht, um sich mit der SEC auf einen rechtlichen Rahmen zu einigen, während andere sagen, dass die SEC unbeugsam ist. Es wird vermutet, dass die SEC Coinbase frühzeitig darüber informiert hat, welche Regeln und Leitplanken sie für den Markt etablieren möchten.
https://x.com/BitcoinMagazine/status/1679887574934999045
Es scheint, dass die SEC den Markt schützen möchte, indem sie gegen betrügerische Unternehmen wie Binance vorgeht, die gängige Gesetze und Regeln umgehen. Gleichzeitig versucht sie bei Unternehmen wie Coinbase, die sich nicht an die geltenden Vorschriften halten, harte Strafen als Mittel zur Durchsetzung der Regulierung einzusetzen. Das scheint nur logisch, wenn man bedenkt, dass BlackRock und die anderen Antragsteller wie WisdomTree, VanEck, Invesco und ARK sich mit Coinbase auf Bedingungen für den Abschluss eines Informations-Austausch-Abkommens (ISA) geeinigt und die Anträge mit den neuen Bedingungen erneut eingereicht haben.
![image](https://yakihonne.s3.ap-east-1.amazonaws.com/2063cd7955cffdca0cc4ae20f77b2b1eb053010e534c18e8ca70222157bd1320/files/1738311465514-YAKIHONNES3.png)
Dies deutet darauf hin, dass die SEC grundsätzlich positiv gegenüber einem Bitcoin-Spot-ETF eingestellt ist, sofern bestimmte Bedingungen erfüllt sind. Diese Bedingungen könnten beinhalten, dass Coinbase als Informationspartner fungiert und dass Coinbase als in den USA börsennotiertes Unternehmen agiert, das sich auf den Spot-Handel mit Bitcoin konzentriert, während andere Dienstleistungen wie Clearingstellen und Broker-Dealer-Aktivitäten vermieden werden sollen.
https://x.com/stackhodler/status/1691531818300809217
Es scheint, dass die SEC eine umfassendere Strategie verfolgt, die darauf abzielt, den Markt zu regulieren, ausländische Unternehmen zu verdrängen und den Handel für Unternehmen wie BlackRock zu erleichtern.
*Mitte letzten Jahres habe ich in einem Artikel schon Grayscales andauernden Versuch, ihren Closed-End-Fund in einen Bitcoin-Spot-ETF zu verwandeln, beschrieben.*
https://www.genexyz.org/post/1722193843734/
Die SEC hatte bereits im Dezember 2021 und im Februar 2022 die Entscheidung über den Antrag auf einen Bitcoin-ETF verschoben, um ihn "sorgfältig zu prüfen". Dann hat die SEC Mitte Juli 2023 bekanntgegeben, dass einem Antrag auf Umwandlung wieder nicht stattgegeben wird. Grayscale kündigten sofort an, die SEC wegen Willkür und Verstoß gegen das Wertpapierbörsengesetz von 1934 zu verklagen.
Diese Klage wurde dann vor dem Bundesberufungsgericht verhandelt und entschieden.
![image](https://yakihonne.s3.ap-east-1.amazonaws.com/2063cd7955cffdca0cc4ae20f77b2b1eb053010e534c18e8ca70222157bd1320/files/1738568195123-YAKIHONNES3.png)
Das Bundesberufungsgericht in D.C. entschied im Oktober, dass das Ablehnen von Anträgen auf eine Umwandlung in einen ETF seitens Grayscale ungerecht, nicht rechtens und willkürlich sei, da die Aufsichtsbehörde nicht erklären konnte, warum sie zuvor ähnliche Produkte zugelassen hat.
Allerdings bedeutet dies nicht, dass Barry Silbert (CEO von DCG) automatisch den Grayscale Trust in einen ETF umwandeln kann. Der Antrag wandert damit nur zurück auf Garys (Vorsitzender der SEC) Schreibtisch. Und das bedeutet, dass die SEC wieder die Möglichkeit bekommt, einer Umwandlung aufgrund anderer Begründungen nicht stattzugeben. Dazu gleich mehr ⬇️.
Außerdem ist fraglich, ob Barry tatsächlich wirklich eine Umwandlung herbeisehnt, denn momentan befinden sich Grayscale in einer sehr angenehmen Lage, die ihnen erlaubt 2% vom NAV (Net Asset Value) an Gebühren zu verlangen. Was bei einem Vermögen von 624.947 Bitcoin einen jährlichen Umsatz von 12.500 Bitcoin, bzw. 475 Million US Dollar bedeutet - für nichts tun.
Es gibt schon [Kampagnen](https://www.redeemgbtc.com), die für eine Auflösung des Trusts kämpfen. Wer sich über die Umtriebigkeiten bei DCG / Genesis / Grayscale (Barry) ein besseres Bild machen möchte, sollte unbedingt den folgenden Thread lesen:
https://x.com/real_vijay/status/1721385528510251182
### Was seit dem geschah
Seit dem letzten Artikel ist gleichzeitig viel und wenig geschehen. Verinnerlichen wir uns meine These - dass die SEC a) den Markt regulieren will, bevor sie ein BlackRock-Produkt genehmigt, b) ausländische (und damit nicht leicht regulierbare) Unternehmen aus dem Markt drängen will, um damit Unternehmen wie BlackRock den Handel zu vereinfachen und c) andere Interessengruppen an der Entscheidung der SEC beteiligt zu sein scheinen - dann ist genau das passiert, was man erwartet hätte.
Die SEC hat ihre Entscheidung zur Genehmigung der ETF-Anträge wiederholte Male verschoben, momentan sieht es so aus, als würde eine Entscheidung im Januar 2024 fällig.
https://bmpro.substack.com/p/sec-delays-etf-again-despite-warning
Die SEC fällt weiter unliebsame Bäume. Bittrex, eine in den USA ansässige Börse, haben angekündigt, ihre Pforten zu schließen.
https://finance.yahoo.com/news/crypto-exchange-bittrex-global-shuts-054643624.html
Kraken wurde von der SEC verklagt - ähnliches Modell wie auch zuvor bei Binance und Coinbase angewandt (sprich: alles okay und tutti, solange ihr die Shitcoinerei an den Nagel hängt).
https://www.nobsbitcoin.com/kraken-sec-lawsuit
Dabei wurden in der Klageschrift die bereits identifizierten Digitalen Assets, die die SEC als unregistrierte Wertpapiere betrachtet, 1 zu 1 wieder aufgeführt.
![image](https://yakihonne.s3.ap-east-1.amazonaws.com/2063cd7955cffdca0cc4ae20f77b2b1eb053010e534c18e8ca70222157bd1320/files/1738568682951-YAKIHONNES3.jfif)
Doch die größte Überraschung war die diese Woche veröffentlichte Meldung, dass Binance sich in einem Vergleich mit dem US Department of Justice (DOJ) auf eine Zahlung von über 4 Milliarden US Dollar und den Rücktritt CZs (Changpeng Zhao) als CEO von Binance geeinigt habe.
https://www.nobsbitcoin.com/cz-steps-down-as-ceo-of-binance-as-part-of-4-billion-settlement-with-doj
Es ist recht eindeutig, dass es dem Justizministerium (DOJ) hier nicht um den Schutz der Verbraucher geht. Es muss allerdings der Anschein gewahrt werden, dass nicht in Eigeninteresse (dem von BlackRock, hust) gehandelt wird, sondern dass der Eindruck erweckt wird, dass sie tatsächlich etwas Gutes tun, indem sie sich um einen "bad actor" kümmern" - das wird sehr deutlich, wenn man betrachtet, dass sich das Narrativ im Vergleich hauptsächlich auf AML (Anti-Money-Laundering) und Terrorismusfinanzierung konzentriert.
Wie schon aus meiner These ersichtlich, geht auch aus bisherigen Kommentaren der SEC klar hervor, dass die größte Sorge derzeit ausländische Börsen sind, die den Bitcoin-Preis manipulieren können. Binance ist die größte Börse der Welt und hat bis heute erfolgreich außerhalb des Einflussbereichs der US-Regierung operiert. Mit dieser Vereinbarung ist das Problem der Offshore-Kursmanipulation zunächst und zum größten Teil gelöst.
Das BlackRock-SEC-Reptilienmenschen-Playbook ist im vollen Gange. Ausländische Konkurrenz weitestgehend unter Kontrolle ✅
![image](https://yakihonne.s3.ap-east-1.amazonaws.com/2063cd7955cffdca0cc4ae20f77b2b1eb053010e534c18e8ca70222157bd1320/files/1738568734202-YAKIHONNES3.gif)
Die SEC scheint außerdem im engen Kontakt mit den ETF-Antragstellern zu stehen. Insbesondere ein Verweis auf eine Änderung der Anträge in Bezug auf "cash" vs. "in-kind creation" hat diese Woche für Diskussionen gesorgt.
https://x.com/EricBalchunas/status/1725559994995573086
Viele börsengehandelte Fonds verlangen von den zugelassenen Teilnehmern, dass sie Anteile in Form von Sachleistungen (in-kind) schaffen , d. h. dass sie ETF-Anteile gegen einen Wertpapierkorb und nicht gegen Bargeld (cash) eintauschen. Die SEC hat jedoch auf eine Formulierung in den Anträgen gedrängt, die genau dise cash-creations zulassen.
![image](https://yakihonne.s3.ap-east-1.amazonaws.com/2063cd7955cffdca0cc4ae20f77b2b1eb053010e534c18e8ca70222157bd1320/files/1738568905743-YAKIHONNES3.png)
Während sich viele auf die minutiöse Gestalt der Inhalte stürzen und eine Genehmigung hineininterpretieren, zieht die SEC hier meiner Meinung nach eine Linie, um eine Unterscheidung zwischen Grayscales GBTC und BlackRock et al. zu schaffen.
![image](https://yakihonne.s3.ap-east-1.amazonaws.com/2063cd7955cffdca0cc4ae20f77b2b1eb053010e534c18e8ca70222157bd1320/files/1738568931011-YAKIHONNES3.png)
Wenn man an ein Playbook glaubt, ist der Grayscale Trust den Teilnehmern ein offensichtlicher Dorn im Auge, weshalb eine Umwandlung zunächst verhindert werden will.
Jetzt muss nur noch Coinbase mitspielen. Aber wenn Binance einen Vergleich erzielen kann, warum nicht auch $COIN? Vielleicht einigt sich die SEC mit Coinbase im Gegenzug für "saftige Geldstrafen" und die Entfernung aller Shitcoins von der Plattform. Im Gegenzug erhält Coinbase den Börsenstatus und wird für die Überwachungsvereinbarung mit BlackRock und den anderen Antragstellern freigeschaltet. Auf einen Schlag würde die SEC die Shitcoins von der einzigen börsennotierten US-Börse entfernen und ein legales (nach ihren Vorstellungen und selbst artikulierten Prinzipien) Fundament für BlackRocks ETF schaffen.
Außerdem würde es mich nicht wundern, wenn Coinbase als weißer Ritter auftritt und ganz barmherzig das US-Business von Binance übernimmt. Natürlich nur, um einem Mitstreiter in schwierigen Zeiten beizustehen. Ich packe es auf jeden Fall auf meine Bingo-Karte für den Zeitraum zwischen jetzt und einer Genehmigung der ETF-Anträge.
![image](https://yakihonne.s3.ap-east-1.amazonaws.com/2063cd7955cffdca0cc4ae20f77b2b1eb053010e534c18e8ca70222157bd1320/files/1738568952924-YAKIHONNES3.png)
Durch die Einigung mit CZ und die Geldstrafe von 4,3 Milliarden US Dollar erleichtert die US-Regierung den Transfer von Bitcoin aus schwachen in starke Hände (Binance ➡️ Coinbase). Binance werden Bitcoin verkaufen müssen, um die Geldstrafe zu bezahlen, während gleichzeitig die Spot-ETFs das Angebot mit amerikanischem Kapital auffüllen können. Schöne Ausführung. Tolles Playbook 👏
Ich bin mir bewusst, dass die oben genannten Ereignisse und Auslegungen der Geschehnisse sehr verschwurbelt daherkommen, jedoch möchte ich meinen virtuellen Alu-Hut vor dem Architekten dieses wirklichen langen Long-Games ziehen.
![image](https://yakihonne.s3.ap-east-1.amazonaws.com/2063cd7955cffdca0cc4ae20f77b2b1eb053010e534c18e8ca70222157bd1320/files/1738568978011-YAKIHONNES3.gif)
In der Zwischenzeit arbeiten gewissenhafte Journalisten namhafter Veröffentlichungen (BlackRock PR-Department, hust) daran, die öffentliche Wahrnehmung von Bitcoin zum Positiven zu wenden.
Wurde in den letzten Jahren Bitcoin als riskante Anlage, Klimakiller, Ozean-Kocher, oder schlimmer bezeichnet, wird es jetzt als ein möglicher Bestandteil einer nachhaltigen und zukunftsorientierten Anlagestrategie dargestellt.
https://www.forbes.com/sites/digital-assets/2023/07/08/bitcoin-network-to-reduce-more-emissions-than-its-energy-sources-produce/
Wir (du schlaue/r Leser//in und ich) wissen schon lange, dass die Bitcoin-Branche heute die weltweit am nachhaltigsten betriebene Branche ist und das Bitcoin-Mining als einzige Industrie in dem Bereich kohlenstoffnegativ werden kann. Es ist also offensichtlich, dass Bitcoin ein wichtiger Bestandteil einer nachhaltigen und zukunftsorientierten Anlagestrategie sein kann, aber genau dieses Narrativ wurde jahrelang absichtlich verdrängt (➡️ siehe XRP-gesponsorte [Greenpeace Aktion](https://dailycoin.com/greenpeace-anti-crypto-artist-admits-wrong-on-bitcoin-mining/) anfang des Jahres).
![image](https://yakihonne.s3.ap-east-1.amazonaws.com/2063cd7955cffdca0cc4ae20f77b2b1eb053010e534c18e8ca70222157bd1320/files/1738569525899-YAKIHONNES3.png)
![image](https://yakihonne.s3.ap-east-1.amazonaws.com/2063cd7955cffdca0cc4ae20f77b2b1eb053010e534c18e8ca70222157bd1320/files/1738569536140-YAKIHONNES3.jfif)
Wir sehen also, dass es nicht nur um eine einfache Genehmigung der Anträge geht, sondern viele Mosaikteilchen gelegt werden, bevor es dazu kommen kann. Viele Zeichen deuten darauf hin, dass viele verschiedene Parteien daran arbeiten, ein Umfeld zu schaffen, dass es bestimmten Gruppen ermöglicht, einen ETF möglichst risikofrei und konkurrenzlos zu platzieren. Dabei werden unliebsame Mitspieler vom Platz gewiesen und anderen Mitspielern werden die Spielregeln nochmal ganz bewusst in Erinnerung gerufen, während gleichzeitig ein Narrativ geschaffen wird, das einen Bitcoin-ETF in glänzendem Licht darstellt.
-----------
Es ist nahezu gewiss, dass es nicht die Frage ist, ob einem Antrag zugestimmt wird, sondern vielmehr, wann dies geschehen wird. Es besteht eine hohe Wahrscheinlichkeit, dass allen Anträgen zeitgleich stattgegeben wird. Dennoch lässt sich erkennen, dass die SEC strategisch Zeit gewinnt, um Binance und andere unerwünschte Akteure vollständig aus dem Spiel zu nehmen und Coinbase in der Zwischenzeit zu dem vorbildlichen Mustersohn zu formen, den sie immer haben wollte.
Da der Markt für Spot-ETFs als "Winner-takes-all" gilt, wird darauf geachtet, dass nicht irgendein Antragsteller das Rennen gewinnt, sondern ein bestimmter - Larry. Hierfür ist es notwendig, Barry vom Spielfeld zu verdrängen, da er einen erheblichen Vorsprung hat, woran Gary offensichtlich arbeitet. Falls sich meine Vermutungen bewahrheiten, werden wir in naher Zukunft einen Bitcoin-Spot-ETF sehen, der von BlackRock dominiert wird. Grayscale und Binance werden keine Rolle im Spiel spielen, während Coinbase als reguliertes, vorbildliches US-Unternehmen davon profitieren wird.
🫳🎤
---
In diesem Sinne, 2... 1... Risiko!
![](https://media.tenor.com/images/4ae424f8d8ea36e86169862d84d1b31e/tenor.gif)
-
![](/static/nostr-icon-purple-64x64.png)
@ 961e8955:d7fa53e4
2025-02-03 07:58:25
What is Bitcoin Cash?
Bitcoin is a coin created on the blockchain. It is symbolized by BCH. It is currently one of the most well-known coins in the world. The maximum supply within BCH is limited to 21 million, as Bitcoin is split over the blockchain.
What are the Advantages of Bitcoin Cash?
First of all, it is among the most well-known and traded coins due to its name and infrastructure. Although the fact that Bitcoin is being traded on the blockchain was initially seen as an advantage for him, unfortunately, some of the problems that come with bitcoin have not been resolved.
The biggest difference between Bitcoin Cash and Bitcoin is that the transaction times for BCH are extremely short. In this way, the block capacity was increased and became 8MB.
-
![](/static/nostr-icon-purple-64x64.png)
@ e7bc35f8:3ed2a7cf
2025-02-03 07:37:44
In a striking contrast of ideals versus actions, former U.S. Secretary of State Hillary Clinton was recently awarded the Medal of Freedom. Yet, it is impossible to forget [what happened in February 2011](https://youtu.be/grFWkyXPfxk), when ex-CIA analyst and well-known dissident Ray McGovern was violently removed by security while silently protesting one of Clinton’s speeches at George Washington University. McGovern’s only act of defiance was standing up and turning his back to Clinton in protest of America’s ongoing wars of aggression. The incident, which unfolded under Clinton’s watch, stands as a stark reminder of the selective nature of so-called freedom and democracy.
The irony of the moment was profound. Clinton's speech [that day](http://www.state.gov/secretary/rm/2011/02/156619.htm) was ostensibly about the brave individuals in Egypt who had stood up against authoritarian rule, using the internet to organize their dissent. The same U.S. government that praised online activism abroad seemed intolerant of peaceful, silent protest within its own borders.
Over the past two decades, mainstream media has pushed a narrative that social media platforms like [Twitter](https://youtu.be/BYSchIVpEJ8), [Facebook](https://youtu.be/UoRspCp5Xn0), and [YouTube ](https://youtu.be/ja-tbqN5-Jk)have played an instrumental role in shaping revolutions and uprisings across the world. From Moldova and Iran to Egypt and Tunisia, reporters with little on-the-ground knowledge have eagerly proclaimed these digital platforms as revolutionary tools of democracy. The only problem? This oft-repeated story is largely[ a myth](https://youtu.be/pFGSplRR7oI).
While journalistic laziness explains some of this exaggeration—reporters compiling their stories from hotel rooms rather than gathering firsthand accounts—the truth runs much deeper. The idea of a "social media revolution" has been deliberately constructed by U.S. State Department-linked NGOs with vested interests in overthrowing governments that do not align with Washington’s geopolitical agenda.
One of the key figures in shaping this narrative is [Evgeny Morozov](https://www.opensocietyfoundations.org/grants/open-society-fellowship?fellow=evgeny-morozov), a former fellow of George Soros’ Open Society Institute and a visiting scholar at Stanford University. Morozov pioneered the concept of the "Twitter Revolution" during the [2009 Moldovan protests](https://slate.com/technology/2012/01/anti-vaccine-activists-9-11-deniers-and-googles-social-search.html), arguing that social media facilitated "flash mobs" and "huge mobilization efforts" against authoritarian regimes. His language, promoted in publications like [Foreign Policy](https://foreignpolicy.com/2009/04/07/moldovas-twitter-revolution/), [The Economist](https://web.archive.org/web/20150504011512/http://www.economist.com/node/12815678?story_id=12815678), and [openDemocracy](https://www.opendemocracy.net/en/the-alternatives-alternative/), laid the foundation for the media’s portrayal of networked protests.
However, even Morozov was forced to later acknowledge flaws in his argument. [He admitted](https://foreignpolicy.com/2009/04/07/more-analysis-of-twitters-role-in-moldova/) that at the time of the so-called "Twitter Revolution" in Moldova, there were only about 70 registered Twitter users in the entire country. Despite this glaring inconsistency, the Western media ran with the story.
The same pattern repeated in the 2009 Iranian unrest, where an alleged flood of 30,000 tweets provided live updates on the protests. [Most of these tweets](https://mashable.com/archive/twitter-iran-election), however, were in English and were posted by newly registered accounts with identical profile pictures—hardly the grassroots digital uprising the media portrayed. Notably, [Israeli news outlets](https://web.archive.org/web/20090714235359/https://chartingstocks.net/wp-content/uploads/2009/06/jpost.jpg) began covering these "tweets" almost immediately, [raising questions](https://web.archive.org/web/20090619154321/http://www.chartingstocks.net/2009/06/proof-israeli-effort-to-destabilize-iran-via-twitter/) about external orchestration.
Similarly, during the Arab Spring, social media was widely credited for fueling protests in Egypt, Tunisia, and Yemen. Yet, the data tells a different story. At the height of these uprisings, the combined number of [Twitter users](https://mashable.com/archive/egypt-twitter-infographic) in those three countries was under 15,000. [Facebook](https://www.theguardian.com/technology/blog/2010/jul/22/facebook-countries-population-use#data), while more widespread, still had only a 4.5% penetration rate in Egypt by mid-2010—dwarfed by the reach of television networks.
Even those who originally championed the "social media revolution" have had to admit that the phenomenon was blown out of proportion. What they refuse to acknowledge, however, is the strategic motivation behind these uprisings. Who benefits from these revolutions, and whose interests do they ultimately serve?
At a [2010 Berlin conference](https://youtu.be/yQ1b67Noy9w), Morozov conspicuously avoided addressing these critical questions. His silence speaks volumes. [The reality is](https://youtu.be/LAlbajRFgUE) that "social media revolutions" are often less about organic uprisings and more about the West’s longstanding practice of using digital tools as part of broader regime-change strategies.
In 2011, for instance, the U.S. State Department funded Psiphon, an online encryption system designed to help users bypass government firewalls. This technology was distributed in Syria, conveniently aiding opposition forces at a time when the U.S. was actively working to destabilize the Assad government. Yet, when Syria was later found using U.S.-developed internet filtering technology, it was condemned for [violating American trade laws](https://web.archive.org/web/20120522162400/https://arabiangazette.com/syria-violating-trade-laws/).
The most glaring hypocrisy is that while U.S. officials champion the internet as a tool for democracy in foreign countries, they simultaneously push for more restrictive internet laws at home. In 2011, Senator Joe Lieberman openly discussed using internet filtering technology to regulate American citizens’ access to information—ironically sounding much like the authoritarian leaders Washington claims to oppose.
This contradiction exposes the true nature of the social media revolution myth. Far from being an organic expression of people’s will, it is often just another weapon in the arsenal of Western powers seeking to manipulate and destabilize governments that refuse to align with their interests. [The very same politicians](https://web.archive.org/web/20130919221400/https://youtube.com/watch?v=OBB1S86_yBY) who praise internet activists in Iran or Syria are the ones clamping down on online freedoms in their own countries.
The story of social media as a revolutionary force is not one of grassroots activism triumphing over oppression. Instead, it is a carefully crafted narrative, used to justify interventionist policies and promote regime change under the guise of "democracy promotion." As history has repeatedly shown, the beneficiaries of these so-called revolutions are rarely the people on the ground—but rather, the geopolitical architects pulling the strings from afar.
-
![](/static/nostr-icon-purple-64x64.png)
@ da0b9bc3:4e30a4a9
2025-02-03 06:14:42
Hello Stackers!
Welcome on into the ~Music Corner of the Saloon!
A place where we Talk Music. Share Tracks. Zap Sats.
So stay a while and listen.
🚨Don't forget to check out the pinned items in the territory homepage! You can always find the latest weeklies there!🚨
🚨Subscribe to the territory to ensure you never miss a post! 🚨
originally posted at https://stacker.news/items/874266
-
![](/static/nostr-icon-purple-64x64.png)
@ a012dc82:6458a70d
2025-02-03 02:42:01
In the contemporary world, where the balance between technological advancement and environmental sustainability is increasingly crucial, Marathon Digital Holdings has emerged as a trailblazer in the Bitcoin mining industry. Their latest venture, utilizing methane gas from landfill waste to power Bitcoin mining operations, is not just a technological leap but also a significant stride towards eco-friendly practices in a sector often scrutinized for its environmental impact. This initiative represents a fusion of environmental stewardship with the burgeoning field of cryptocurrency, potentially setting a new standard for energy use in digital currency mining. It's a bold move that could reshape perceptions of the industry, demonstrating that environmental consciousness and technological progress can coexist harmoniously.
**Table Of Content**
- The Genesis of the Project
- The Process and Technology
- The Broader Impact
- Conclusion
- FAQs
**The Genesis of the Project**
**A Partnership for Sustainability**
Marathon Digital's collaboration with Nodal Power marks a pivotal moment in the pursuit of sustainable cryptocurrency mining. The 280 kilowatt (kW) pilot project in Utah is more than just a test of feasibility; it's a beacon of innovation in an industry traditionally powered by conventional, often non-renewable, energy sources. This partnership reflects a growing awareness within the crypto mining community about the importance of sustainable practices. It's a forward-thinking approach, blending the expertise of a leading Bitcoin mining company with the innovative energy solutions of a renewable energy firm, setting a precedent for future collaborations in the industry.
**Addressing Environmental Concerns**
The project's focus on methane gas, a potent greenhouse gas, underscores a proactive approach to environmental stewardship. By targeting methane emissions from landfills, Marathon is addressing a critical environmental issue. Methane is not only a significant contributor to global warming but also represents a wasted resource when emitted into the atmosphere. This initiative is a response to increasing global concerns about climate change and environmental degradation. It's a strategy that aligns with international efforts to reduce greenhouse gas emissions and demonstrates Marathon's commitment to playing a role in the global fight against climate change.
**The Process and Technology**
**Innovative Conversion of Methane to Electricity**
The technology behind converting methane to electricity is a cornerstone of this project. The process involves sophisticated systems that capture methane emissions efficiently and convert them into a usable form of energy. This technology is not just a testament to human ingenuity but also a crucial step towards making renewable energy more accessible and practical for industrial applications like Bitcoin mining. The success of this technology could have far-reaching implications, potentially revolutionizing how we think about waste management and energy production.
**A Step Towards Green Bitcoin Mining**
Marathon's initiative is a significant leap in the journey towards green Bitcoin mining. It's a project that challenges the status quo, proving that renewable energy can be a viable alternative to traditional power sources in the energy-intensive process of mining cryptocurrencies. This approach could inspire a wave of innovation in the sector, encouraging other companies to explore renewable energy options. The project is not just about reducing the environmental footprint of Bitcoin mining; it's about reimagining the future of energy use in the digital age.
**The Broader Impact**
**Potential for Industry-Wide Change**
The implications of Marathon's project extend far beyond its immediate environmental benefits. It has the potential to catalyze a paradigm shift in the cryptocurrency mining industry. If successful, this project could serve as a model for other companies, demonstrating the practicality and benefits of sustainable mining practices. It could inspire a wave of innovation, leading to more widespread adoption of renewable energy sources in the industry, and potentially, a redefinition of what it means to be a responsible player in the digital currency space.
**Environmental and Economic Benefits**
The project is not just an environmental initiative; it's also an economically strategic move. By tapping into methane from landfills, Marathon could significantly reduce its operational costs. This approach provides a dual benefit: it mitigates the environmental impact of Bitcoin mining and offers a potentially more cost-effective energy solution. This economic incentive could be a key driver in encouraging wider adoption of similar practices across the industry, leading to a more sustainable and economically viable future for cryptocurrency mining.
**Conclusion**
Marathon Digital's pilot project in Utah is more than just an experiment in sustainable Bitcoin mining; it's a visionary step towards a new era in the industry. By harnessing methane gas from landfills to power their operations, Marathon is not only setting a new benchmark for environmental responsibility but also showcasing the untapped potential of renewable energy in reducing the carbon footprint of cryptocurrency mining. This bold experiment is a beacon of hope and innovation, suggesting a future where technological advancement and environmental sustainability are not mutually exclusive but are instead intertwined elements of a more responsible and forward-thinking industry.
**FAQs**
**What is Marathon Digital's new project about?**
Marathon Digital has launched a pilot project in Utah, using methane gas from landfill waste to power Bitcoin mining operations.
**Why is using methane for Bitcoin mining significant?**
Methane is a potent greenhouse gas, and using it for mining reduces environmental impact and utilizes a renewable energy source.
**Who is Marathon Digital partnering with for this project?**
Marathon Digital has partnered with Nodal Power, a firm specializing in renewable energy assets.
**What are the potential benefits of this project?**
The project aims to reduce greenhouse gas emissions, lower energy costs, and set a precedent for sustainable practices in cryptocurrency mining.
**How does this project impact the Bitcoin mining industry?**
Marathon's initiative could inspire other companies to adopt renewable energy sources, potentially leading to a more sustainable and economically viable mining industry.
**That's all for today**
**If you want more, be sure to follow us on:**
**NOSTR: croxroad@getalby.com**
**X: [@croxroadnews.co](https://x.com/croxroadnewsco)**
**Instagram: [@croxroadnews.co](https://www.instagram.com/croxroadnews.co/)**
**Youtube: [@croxroadnews](https://www.youtube.com/@croxroadnews)**
**Store: https://croxroad.store**
**Subscribe to CROX ROAD Bitcoin Only Daily Newsletter**
**https://www.croxroad.co/subscribe**
*DISCLAIMER: None of this is financial advice. This newsletter is strictly educational and is not investment advice or a solicitation to buy or sell any assets or to make any financial decisions. Please be careful and do your own research.*
-
![](/static/nostr-icon-purple-64x64.png)
@ 3b7fc823:e194354f
2025-02-03 02:19:03
# At-Risk Groups Are Facing A Battle For Their Rights
Privacy. It’s a word we often take for granted, scrolling through our phones and sharing photos without a second thought. But for certain groups—those at risk due to their identities, beliefs, or circumstances—privacy isn’t just a luxury; it’s a lifeline. In today’s world, where governments, corporations, and even our own social media accounts seem to have a vested interest in collecting and selling our data, the fight for privacy has never been more crucial.
Privacy is not a buzzword but a fundamental human right. We can do more to protect those who need it most.
---
### Privacy As A Human Right
The concept of privacy is deeply rooted in our basic human rights. It’s not just about keeping your medical records confidential or hiding your bank statements; it’s about the right to control what others can know about you. For individuals who identify as LGBTQ+, immigrants, journalists, or political dissidents, this right is even more fragile.
Recently, we’ve seen a rise in policies that seem designed to strip away these protections. From the Trump administration’s transgender ban on military service and passport changes to the targeting of journalists and activists, the message is clear: certain groups are considered fair game for scrutiny and control.
These actions are about erasing the autonomy of individuals to live their lives without fear of retribution or discrimination. Privacy isn’t just a feel-good concept; it’s the cornerstone of a individuals liberty. We must ensure that no one’s rights can be arbitrarily taken away, especially the right to privacy.
---
### The Attack On Vulnerable Groups
The targeting of at-risk groups has reached a fever pitch in recent months:
1. **Transgender Rights Under Fire**
The Trump administration has issued a sweeping executive order that effectively erased recognition of transgender individuals’ rights. This included changes to passport policies that required individuals to declare their gender at birth, making it nearly impossible for trans individuals to update their documents without facing extreme scrutiny or even denial.
These actions don’t just impact transgender people; they send a chilling message to the entire LGBTQ+ community.
2. **Free Speech And Political Dissent**
Trump’s Free Speech Executive Order, aimed to protect citizens’ right to express their beliefs. However, critics argue it was more about silencing dissenters. Journalists, activists, and even private citizens have faced increasing pressure from government officials to either comply with certain views or face professional consequences.
“Free speech is a double-edged sword,” noted one legal expert. “When the government uses it as a tool to marginalize certain groups, it becomes a weapon rather than a shield.”
3. **Media And Press Freedom**
Trump’s ongoing battles with major media outlets are well-documented. From labeling reporters as “fake news” to pushing for laws that would limit press freedom, the administration has made it clear that journalists and news organizations are not above scrutiny. For independent journalists and investigative reporters, this poses a significant threat to their work and safety.
4. **Immigrant Rights And Discrimination**
The Trump administration’s harsh immigration policies have had a devastating impact on vulnerable communities. From family separations to the expansion of surveillance in immigrant-heavy areas, these actions have left many feeling exposed and unsafe. Immigrants, particularly those from Latin America and the Middle East, are increasingly targeted for their perceived alignments with political rhetoric.
---
### The Consequences Of Losing Privacy
When privacy is stripped away, it doesn’t just affect individuals—it affects entire communities. For transgender individuals, the fear of being “outted” online or facing discrimination at work is a daily reality. For journalists, the threat of government retribution can lead to self-censorship and an inability to hold power accountable. For immigrants, the risk of deportation or surveillance means constant vigilance—and often, no recourse.
These consequences are not just personal; they’re systemic. When certain groups are deemed unworthy of protection, it sets a dangerous precedent for what’s allowed in society. It sends the message that some lives matter less than others, and that the government can act with impunity. If you are not in one of these currently impacted groups just give it time and eventually they will come for you too.
---
### The Fight For Privacy: What We Can Do
The good news is that we don’t have to sit idly by while this happens. There are steps we can take to fight for privacy as a fundamental right. Here’s how:
1. **Advocate For Stronger Protections**
Governments at all levels need to pass and enforce laws that protect privacy, especially for vulnerable groups. This includes everything from data protection legislation to anti-discrimination policies.
2. **Support Independent Journalism**
Journalists are on the front lines of this fight, uncovering corruption and holding power accountable. Support independent media outlets and platforms that prioritize transparency and press freedom.
3. **Educate And Empower**
Communities under threat need resources to protect themselves. This includes education on their rights, know how and tools to secure their data, and access to legal support when needed.
4. **Use Your Voice**
Speak out against policies that erode privacy and target vulnerable groups. Use your actions to protect yourself and others.
5. **Demand Accountability**
When governments overreach, they need to be held accountable. Fight for yours and others rights.
---
### Privacy Is A Fight Worth Winning
Privacy isn’t just about convenience or comfort—it’s about freedom, autonomy, and the right to live without fear of arbitrary control. For at-risk groups, this is not just a luxury; it’s a lifeline. As we move forward in this uncertain era, let’s remember that the fight for privacy is not over— it’s just beginning.
We all have a role to play in protecting those who need it most. So let’s get to work.
-
![](/static/nostr-icon-purple-64x64.png)
@ fd78c37f:a0ec0833
2025-02-03 00:23:23
🔹 Pre-event buzz: Even before the event started, numerous calls came in to confirm the venue and ask if they could bring friends along. Upon arrival, many young attendees were eager to learn more about YakiHonne, reflecting the excitement and anticipation surrounding the meetup.
![image](https://yakihonne.s3.ap-east-1.amazonaws.com/fd78c37f13c3a9d5bce80dc3278d529ba908e5119e90f9131905c5a5a0ec0833/files/1738541689982-YAKIHONNES3.jpg)
![image](https://yakihonne.s3.ap-east-1.amazonaws.com/fd78c37f13c3a9d5bce80dc3278d529ba908e5119e90f9131905c5a5a0ec0833/files/1738541756041-YAKIHONNES3.jpg)
🔹 Engaging discussions: The event kicked off with an introduction to Nostr and YakiHonne’s core principles, sparking insightful conversations about what it truly means to have a decentralized social media platform.
![image](https://yakihonne.s3.ap-east-1.amazonaws.com/fd78c37f13c3a9d5bce80dc3278d529ba908e5119e90f9131905c5a5a0ec0833/files/1738541809775-YAKIHONNES3.jpg)
🔹 Deep dive: Attendees raised many questions, particularly about YakiHonne’s decentralization model. The concept resonated with many, and a large number of participants expressed their support and interest in becoming part of the YakiHonne ecosystem in the future.
![image](https://yakihonne.s3.ap-east-1.amazonaws.com/fd78c37f13c3a9d5bce80dc3278d529ba908e5119e90f9131905c5a5a0ec0833/files/1738542018751-YAKIHONNES3.jpg)
![image](https://yakihonne.s3.ap-east-1.amazonaws.com/fd78c37f13c3a9d5bce80dc3278d529ba908e5119e90f9131905c5a5a0ec0833/files/1738542055591-YAKIHONNES3.jpg)
The meetup wrapped up with light refreshments 🍹, networking 🤝, and a photo session 📸. Even after the event officially ended, conversations continued as people stayed behind to connect and explore further possibilities ✨.
![image](https://yakihonne.s3.ap-east-1.amazonaws.com/fd78c37f13c3a9d5bce80dc3278d529ba908e5119e90f9131905c5a5a0ec0833/files/1738542126807-YAKIHONNES3.jpg)
![image](https://yakihonne.s3.ap-east-1.amazonaws.com/fd78c37f13c3a9d5bce80dc3278d529ba908e5119e90f9131905c5a5a0ec0833/files/1738542137320-YAKIHONNES3.jpg)
YakiHonne Meetup was more than just a gathering—it was a step forward in shaping the future of decentralized social media! 🚀
#YakiHonne #Nostr #DecentralizedSocialMedia
-
![](/static/nostr-icon-purple-64x64.png)
@ ae6ce958:d0f02c7d
2025-02-02 23:56:18
**Authors**: DamageBDD Research Team
**Date**: February 2025
#### **Abstract**
This paper presents a formal multidimensional analysis of the profitability and systemic impact of operating a DamageBDD node, considering two distinct yet synergistic roles: (1) **BDD Maintainer**, responsible for writing and verifying behavioral-driven development (BDD) test cases, and (2) **Node Runner**, responsible for hosting, validating, and distributing DamageBDD verification data. The study explores the economic viability, systemic benefits, and broader implications for software development efficiency and human potential. We argue that DamageBDD does not merely represent an alternative testing infrastructure but also serves as an incentive structure that unlocks latent human capital through verifiable, high-impact contributions.
---
## **1. Introduction**
The software industry increasingly relies on automated testing to ensure system reliability and security. However, traditional models of test validation suffer from inefficiencies due to lack of **verifiable accountability**, reliance on centralized test infrastructure, and difficulty in aligning developer incentives.
DamageBDD introduces a **market-driven verification layer** that decentralizes and incentivizes **test-driven software development**. By distributing both verification and governance via a **blockchain-based testing economy**, DamageBDD enables **trustless BDD validation**. Two primary participants define this ecosystem:
1. **BDD Maintainers** – Developers and testers who write and maintain test cases to ensure software correctness.
2. **Node Runners** – Operators who maintain DamageBDD nodes to execute, verify, and immutably record test results.
This study examines the **profitability, scalability, and systemic value** of each role while exploring how this model **unlocks testing infrastructure and human potential** in a way that traditional systems do not.
---
## **2. Multidimensional Profitability Analysis**
We evaluate profitability using a **multidimensional framework** across the following key dimensions:
- **Economic Profitability** (direct financial rewards)
- **Computational Efficiency** (resource costs and hardware scalability)
- **Network Effects** (interoperability and systemic adoption)
- **Human Capital Optimization** (learning curve, skill growth, and long-term impact)
### **2.1 Economic Profitability**
#### **BDD Maintainer**
BDD Maintainers earn **sats for verifiable test contributions**. Their work is directly compensated based on the number of **successful test verifications** executed on the DamageBDD network. The economic incentives align with:
- **Quality over Quantity** – High-quality, reusable BDD tests accrue more long-term revenue.
- **Compounding Value** – A well-maintained test suite continues to generate revenue as projects grow.
#### **Node Runner**
Node Runners monetize **test execution and validation services** by processing and storing test results. Profitability derives from:
- **Transaction Fees** – Runners earn sats per executed and verified test case.
- **Reputation Score** – Higher-ranked nodes process more verifications, generating greater earnings.
- **Liquidity Pools** – Nodes can facilitate instant **Lightning Network payouts** for successful tests, further increasing earnings via transaction flow.
### **2.2 Computational Efficiency**
While mining Bitcoin is an **energy-intensive, zero-sum competition**, DamageBDD nodes optimize for **computational efficiency** rather than brute-force expenditure.
- **BDD Maintainer Efficiency** – Writing test cases has near-zero energy cost beyond human intellectual effort.
- **Node Runner Efficiency** – Instead of wasting cycles on proof-of-work, DamageBDD nodes run lightweight BDD verifications, leveraging Erlang for extreme concurrency and low-resource execution.
A comparative analysis shows that operating a DamageBDD node **delivers higher computational efficiency per satoshi earned** than Bitcoin mining.
---
### **2.3 Network Effects and Synergies**
A crucial factor in DamageBDD’s economic model is **network value accumulation**. Unlike mining, which **diminishes profitability over time**, DamageBDD’s network **increases in value as adoption grows**.
#### **BDD Maintainer Synergies**
- The more tests written and **verified on-chain**, the greater the **trust in software systems**.
- Open-source contributors and enterprise teams benefit from **immutable test history**, reducing redundant labor.
#### **Node Runner Synergies**
- The more tests executed, the **more valuable the verification layer becomes**.
- Nodes reinforce the **integrity of test results**, leading to network-wide adoption in **high-assurance industries** (e.g., finance, healthcare, AI safety).
---
### **2.4 Human Capital Optimization: Unlocking Developer Potential**
Traditional software testing is often seen as a **cost center**, leading to its underutilization. DamageBDD flips this paradigm by treating testing as a **profit center**—rewarding testers not just for finding bugs but for **preventing catastrophic software failures**.
#### **Cognitive and Economic Impact**
- **Skill Growth** – Developers naturally **improve software design** by maintaining structured BDD tests.
- **Career Upskilling** – High-ranking BDD Maintainers become **indispensable assets** in software teams.
- **Economic Independence** – Unlike traditional employment, DamageBDD allows maintainers to **earn directly from open-source contributions**.
The system **gamifies quality assurance**, transforming what was once a tedious process into a **competitive and rewarding marketplace**.
---
## **3. Conclusion: A New Paradigm for Profitable Verification**
DamageBDD redefines software testing as a **financially viable, decentralized economy**. The combination of BDD Maintainers and Node Runners creates a **self-reinforcing ecosystem** where:
- **Maintainers ensure software correctness while earning sats**
- **Node Runners validate and secure test results, generating a sustainable revenue stream**
- **The network grows in value as more applications integrate DamageBDD verification**
### **Key Takeaways**
- **DamageBDD is superior to traditional testing models** due to its decentralized incentives.
- **It provides better computational efficiency than Bitcoin mining** while still operating on a proof-of-work foundation (verifiable contributions).
- **It unlocks human potential** by turning software verification into a **career pathway rather than a sunk cost**.
The profitability of DamageBDD Nodes extends beyond mere financial returns—it establishes a new **economic and intellectual order for software reliability**.
-
![](/static/nostr-icon-purple-64x64.png)
@ 3b7fc823:e194354f
2025-02-02 22:55:32
# The Secret to Staying Private in the Digital Wild West: A Guide to Using Encryption
You’re scrolling through social media, and suddenly you realize your phone’s been tracking your location and displaying it on your profile for months. You’re not even sure how that happened. Or maybe you’ve noticed that every time you shop online, the item you looked for follows you around with ads wherever you go. Sound familiar? Yeah, welcome to the digital world—where your data is basically a free buffet for anyone who knows how to ask.
But here’s the thing: you don’t have to sit back and take it. Encryption is like the secret weapon that lets you lock up your data and keep those prying eyes out. It’s not just for hackers or spies—it’s for regular people who want to take control of their privacy in a world that’s increasingly looking like a reality show where everyone’s a contestant.
### What Is Encryption, and Why Should You Care?
Encryption is like a secure box that only you can open. When you use encryption, your data is scrambled in a way that’s hard for anyone else to read, even if they try. Think of it as putting on a metaphorical cloak that makes your online activity invisible to just about everyone except the people you want to see it.
For example, when you browse the internet, your connection is often not encrypted by default. That’s why websites start with “https” to indicate a secure connection—it’s saying, “Hey, we’re using encryption here!” Without that little green padlock, anyone on the same WiFi could potentially spy on what you’re doing.
So, encryption isn’t just for tech geeks or government agencies. It’s for everyone who wants to protect their data from being sold, stolen, or misused without their consent. And guess what? You’re already using it without realizing it. Every time you use a password-protected account or send an encrypted message, you’re reaping the benefits of encryption.
### The Privacy Advantages of Encryption for Regular People
Let’s break down why encryption is your best friend when it comes to privacy:
1. **Financial Transactions**
When you pay online or use a banking app, encryption keeps your financial info safe from hackers. It ensures that only the banks and businesses you’re dealing with can access your money—no one else can.
2. **Online Accounts**
Your email, social media, and other accounts often use encryption to protect your login details. That’s why you see those little “lock” icons when you’re logging in. Without encryption, someone could potentially intercept your password and gain unauthorized access to your account.
3. **Data Breaches**
Encryption can often prevent data breaches from being useful. Even if hackers manage to steal your information, the encryption makes it unreadable, so the stolen data is basically worthless to the attackers.
4. **Location Data**
If you’re worried about apps tracking your every move, encryption can help limit how much of that data is accessible. Some apps use encryption to protect location data, making it harder for companies to sell your movements without your consent.
5. **Privacy Protection**
Encryption acts as a layer of protection against invasive technologies. For example, some apps use tracking software that follows you around the internet based on your browsing history. With encryption, these trackers can be blocked or limited, giving you more control over what information is collected about you.
### How to Use Encryption Like a Pro
Now that you know why encryption is essential for privacy, let’s talk about how to use it effectively:
1. **Use Strong Passwords**
Encryption works only if your passwords are strong and unique. Don’t reuse passwords from one account to another, and avoid using easily guessable information like “password123” or your birth year. Use a password manager if you need help keeping track of them.
2. **Enable HTTPS Everywhere**
Install browser extensions like HTTPS Everywhere to automatically encrypt your connections to websites that don’t support encryption by default. This ensures that even if you’re not actively thinking about it, your data is still protected.
3. **Look for the Lock Icon**
Whenever you’re on a website or app, look for the lock icon in the URL bar. Make sure it’s encrypted before you input any personal information.
4. **Use Encrypted Communication Tools**
For private conversations, use apps like Signal or SimpleX, which are designed with encryption in mind. These tools ensure that only the sender and recipient can read your messages, keeping them safe from prying eyes.
5. **Enable Two-Factor Authentication (2FA)**
This isn’t exactly encryption, but it’s a close second. 2FA adds an extra layer of security by requiring you to provide two forms of verification—like your password and a code sent to your phone—to access your account. While not encryption itself, it works alongside encryption to keep your accounts secure.
6. **Use Encrypted Storage and Backup**
When storing sensitive files or data, use encrypted cloud storage or external drives. Tools like BitLocker (for Windows) or AES-256 encryption can protect your files from unauthorized access.
7. **Stay Updated**
Encryption technology is always evolving, so it’s important to keep your software and apps updated. Outdated systems are often easy targets for hackers, leaving you vulnerable to attacks.
### Final Thoughts: Your Data Is Your Power
In a world where data is a commodity, encryption is your weapon against the invasive tactics of corporations and hackers alike. It empowers you to control what information you share and protects you from having it used against you. So, whether you’re shopping online, using your favorite apps, or just browsing the web, remember that encryption is there to help you stay private and in control of your own data.
And if you ever feel overwhelmed by all the privacy stuff, just remember this: you’re not alone. Millions of people are fighting for stronger privacy protections every day. So, do your part by using encryption wisely—your data and your privacy are worth it. Let’s make sure no one can take that away from you.
---
**Advocating for privacy does not finance itself. If you enjoyed this article, please consider zapping or sending monero**
82XCDNK1Js8TethhpGLFPbVyKe25DxMUePad1rUn9z7V6QdCzxHEE7varvVh1VUidUhHVSA4atNU2BTpSNJLC1BqSvDajw1
-
![](/static/nostr-icon-purple-64x64.png)
@ 8d34bd24:414be32b
2025-02-02 21:31:11
This Sunday our pastor had to give a sermon with very little preparation. He was leading an elders’ retreat and one of the elders was supposed to preach in his place. The elder who had prepared a sermon ended up in the hospital, so our pastor had to prep fast. He did a great thing. He preached on a passage, but also used that passage to demonstrate how he studies scripture. It was a great sermon. The passage he preached on reminded me of a time in my past when I learned some important lessons.
Almost 20 years ago, I was leading a high school girls Bible study. They picked out a book about Mary and Martha to study. Initially, I wasn’t thrilled with their choice, but didn’t have a theological problem with it, so I agreed for us to study this book. (I don’t remember the name of the book and all my books burnt up when my house burnt down almost 10 years ago). In the end, I probably got more out of the study than any of the girls because I have a definite tendency to be a Martha. What was Martha’s error? Let’s check out the passage:
> Now as they went on their way, Jesus entered a village. And a woman named Martha welcomed him into her house. And she had a sister called Mary, who sat at the Lord’s feet and listened to his teaching. But Martha was distracted with much serving. And she went up to him and said, “Lord, do you not care that my sister has left me to serve alone? Tell her then to help me.” But the Lord answered her, “Martha, Martha, you are anxious and troubled about many things, but one thing is necessary. Mary has chosen the good portion, which will not be taken away from her.” (Luke 10:38-42 ESV)
Jesus visited two sisters who welcomed Him into their home. Mary sat at Jesus’s feet and listened to His teaching. Martha spent her time serving everyone and taking care of everyone’s physical needs.
Is taking care of their home and the needs of their guests a bad thing? Of course not, but is it the best?
To make things much worse, Martha then got upset because her sister Mary wasn’t helping her. She was just sitting there taking in every word that Jesus said. Most of us would think Martha’s sacrifices to take care of everyone was better than Mary’s choice to just sit at Jesus’s feet, but did Martha really choose the better path?
Martha then showed that her heart wasn’t focused right and she wasn’t putting the most important things first. She complained to Jesus about her sister’s failure to help and even commanded her Creator, “*Tell her then to help me*.” Instead of focusing on the words of Jesus, her frustration led her to command her God to act in the way she desired. She was so busy with cooking, cleaning, and serving, that she missed the most important things — spending time with and listening to her God, who was right there in her house with her. This was an opportunity that shouldn’t be missed due to busyness.
How often do we all do this same thing? How often are busy doing good things and miss the most important things? How often are we busy doing ministry that we forget about the reason for the ministry? I don’t know about you, but this happens to me a lot more often than I would like to admit. My biggest sins are usually not what most people think of as sins. My biggest sins are getting so busy that I leave God out of my life. I am so busy serving God that I forget to follow His leading. I am so busy doing what most people would consider good things, but if God is not part of them, they are not worth much. Because I am focusing on getting things done, worry and stress overtake me harming my health and my relationship with Jesus.
I don’t think this is taking Scripture out of context:
> We have come to know and have believed the love which God has for us. **God is love**, and the one who abides in love abides in God, and God abides in him. (1 John 4:16) {emphasis mine}
Knowing that God is love, read the following passage replacing ***love*** with ***God***.
> If I speak with the tongues of men and of angels, but do not have ***love***, I have become a noisy gong or a clanging cymbal. If I have the gift of prophecy, and know all mysteries and all knowledge; and if I have all faith, so as to remove mountains, but do not have ***love***, I am nothing. And if I give all my possessions to feed the poor, and if I surrender my body to be burned, but do not have ***love***, it profits me nothing. (1 Corinthians 13:1-3)
If I do not include God in my every action, “*it profits me nothing*.”
In reality it shouldn’t be allowing God to join me in my works, but me joining God in His works. It should be me listening to God’s word and the leading of the Holy Spirit, looking and seeing what God is doing around me, and me joining in His great works. It should be me allowing God to use me as a tool.
There are times that God speaks clearly and directly to us about what He desires for our lives, but most of the time, He speaks through His word — the Bible. Knowing the Bible helps us to know His will and His eternal plan, so we can follow Him and join Him in His work. Knowing the Bible helps us to differentiate between what is good and what is God’s best. It helps us to prioritize what is really important.
> And this I pray, that your love **may abound still more and more in real knowledge and all discernment**, so that you **may approve the things that are excellent**, in order to be sincere and blameless until the day of Christ; having been filled with the **fruit of righteousness which comes through Jesus Christ**, to the glory and praise of God. (Philippians 1:9-11) {emphasis mine}
We can’t obey God, imitate Christ, or follow Him if we refuse to listen and that means spending time in the Bible and time in prayer with Him.
> “Listen to Me, you stubborn-minded, Who are far from righteousness.” (Isaiah 46:12)
> Come, you children, listen to me; I will teach you the fear of the Lord . (Psalm 34:11)
> “Now therefore, O sons, listen to me, For blessed are they who keep my ways. (Proverbs 8:32)
> But seek first His kingdom and His righteousness, and all these things will be added to you. (Matthew 6:33)
Our focus on Jesus/God must go beyond knowing Him. It is equally important to obey.
> And He \[Jesus\] said to another, “Follow Me.” But he said, “Lord, permit me first to go and bury my father.” But He said to him, “Allow the dead to bury their own dead; but as for you, go and proclaim everywhere the kingdom of God.” (Luke 9:59-60) \[clarification mine\]
Once we know what He wants from us, we need to instantly drop what we are doing and follow Him. We can’t put other things ahead of obeying God.
> For amazement had seized him and all his companions because of the catch of fish which they had taken; and so also were James and John, sons of Zebedee, who were partners with Simon. And Jesus said to Simon, “Do not fear, from now on you will be catching men.” When they had brought their boats to land, **they left everything and followed Him**. (Luke 5:9-11) {emphasis mine}
We should be like these apostles, that, after their most successful catch of fish in their entire career as fishermen, “*they left everything and followed Him*.” We need to let go of what we think is important and obey Him. We need to change our priorities to match God’s priorities.
That may mean we change careers to one that allows more free time for ministry or even going into full time ministry. It may mean letting go on keeping the perfect, clean house, so there is time for ministry, Bible study, or discipling our kids. It may mean changing your habits from watching TV with your family to reading the Bible with your family. For each of us, it will look different, but we need to be like Mary and choose to sit “*at the Lord’s feet and listened to his teaching*.” We need to be like the apostles who “*left everything and followed Him*.” We need to choose to put Jesus’s plans before our own. We need to choose to make God’s values our values.
> But this is what I commanded them, saying, ‘Obey My voice, and I will be your God, and you will be My people; and you will walk in all the way which I command you, that it may be well with you.’ (Jeremiah 7:23)
Like so many things, it is simple, but it isn’t necessarily easy. We have to change the way we think in order to obey faithfully.
> If anyone serves Me, he must follow Me; and where I am, there My servant will be also; if anyone serves Me, the Father will honor him. (John 12:26)
We have to change our priorities to God’s priorities.
> Then Jesus said to His disciples, “If anyone wishes to come after Me, he must deny himself, and take up his cross and follow Me. (Matthew 16:24)
We need to seek God, His word, and His presence.
> As the deer pants for the water brooks,\
> So my soul pants for You, O God.\
> My soul thirsts for God, for the living God;\
> When shall I come and appear before God? (Psalm 42:1-2)
We need to be in God’s word daily, so we know who God is and what He desires from us.
> How can a young man keep his way pure?\
> By **keeping it according to Your word**.\
> With all my heart I have sought You;\
> Do not let me wander from Your commandments.\
****Your word I have treasured in my heart**,\
> That I may not sin against You.\
> Blessed are You, O Lord;\
****Teach me Your statutes**.\
> With my lips I have told of\
> All the ordinances of Your mouth.\
> I have rejoiced in the way of Your testimonies,\
> As much as in all riches.\
****I will meditate on Your precepts**\
> And regard Your ways.\
****I shall delight in Your statutes;\
> I shall not forget Your word**. (Psalm 119:9-16) {emphasis mine}
We need to read the Bible cover to cover so we know the whole word of God. Once we have read through the Bible multiple times, we need to spend time studying the Bible in more depth, so we can know the details, see how the different parts relate to each other, and grow in our knowledge of God. We need to study the Bible and use this knowledge to guide every decision in life — big and small.
> Yet they did not listen or incline their ears, but stiffened their necks in order not to listen or take correction. (Jeremiah 17:23)
Just reading the Bible or sitting in church listening to sermons will not make a difference if we don’t truly listen and internalize God’s word, so we can apply it in our every day life. God knows what is best for us and we will never be truly at peace or have true joy until we are living our lives in the light of God’s word and direction.
My prayer for you and for me is that we will have the heart of Mary rather than the heart of Martha and that we will faithfully seek and follow God all of the days of our lives.
Trust Jesus.
-
![](/static/nostr-icon-purple-64x64.png)
@ 5a261a61:2ebd4480
2025-02-02 20:42:37
Let’s be real—sticking to *anything* for 90 days is like trying to herd cats on espresso. You start strong, then **life happens**: kids, chores, or that *one* glass of wine that makes you forget foot rubs (#relatable). But here’s the thing: 90-day challenges aren’t about perfection. They’re about bribing your lizard brain with rewards and scaring it straight with punishments.
## **The Game Plan**
First, pick a thing—something that makes you feel like a devoted servant or a slightly frazzled superhero. Daily foot care? Chores with a side of #FLR flair? Cool. Now, break it into chunks: 30 days (survival mode), 60 days (grind phase), and 90 days (victory lap).
Keeping up something for so long is no joke. That's why you need those little checkpoints along the way. Each milestone should feel special—30 days deserves celebration, 60 days something more meaningful, and 90 days? That's your victory dance moment.
Reality check: some days will suck, and you'll want to skip. **That's where having everything planned out helps.** When your brain is foggy and you're tired, you don't want to be negotiating with yourself about what counts and what doesn't. The hardest part isn't even doing the thing—it's remembering to do it every single day, until it feels wrong NOT to do it.
## **Why It (Maybe) Works**
Three months is long enough for habits to stick, short enough to see the finish line. Plus, tying it to power exchange? Genius. Every foot rub or denied cum becomes a ritual, proof you're leveling up as a sub/human/slightly-messy adult. And let's be honest—nothing fuels devotion like a mix of structure, desperation, and the occasional humiliating punishment.
## **Current run**
My current challenge is to get my wife/godess/object of my insatiable kinky thoughts/partner feet massaged with special cream. It's for making evyrthing soft, help nails and yadayadayada. Basically preping her feet for more instensive worshiping. She doesn't know my hidden agenda and I am not sure if I would really be into it, since I am more into being her devout toy than having foot fetish, but I think it will be all the same if I put myself juuust right.
So for my rewards I have planned these?
- **30 days**: Tiny dopamine hit. *(making little photoset of Her feet playing with my hardon… for science.)*
- **60 days**: Mid-tier flex. *(cleaning mushed banana split off Her toes tongue only)*
- **90 days**: Go nuclear. *(a tiny foot spa whirpool because She deserves it, damn it :D and it will create more opportunities for... you know )*
As for the hhip part of the sugar duo... It was easy having one for my shaving rutine, but here? Not sure and it's bad that I ave started challenge without having them prepared... May be that warrant more punishment?
## **TL;DR**
90-day challenges are the BDSM of self-improvement: **consensual, slightly painful, and weirdly addictive.**
Fail? Reset, adapt, try again. Win? Congrats, you’re now 10% more disciplined and 100% more bumptious on Nostr.
#90days #FLR #LostCauseButStillTrying #femdom
-
![](/static/nostr-icon-purple-64x64.png)
@ 378562cd:a6fc6773
2025-02-02 18:58:38
## Chef's notes
I'm only testing this out right now. I will update the recipe as well as add my own image soon after making this dish again.
## Details
- ⏲️ Prep time: 20 minutes
- 🍳 Cook time: 1 hour
- 🍽️ Servings: 4
## Ingredients
- 4 to 6 potatoes (size depending)
- 1 lb ground beef
- seasonings
- 2 cans chili beans
- 1 onion
- katsup
- shredded cheese of some kind
## Directions
1. saute onion and add ground beef to skillet. Season to liking.
2. peel if you like and thin slice potatoes
3. in a rectangle baking dish, layer potatoes, beans, meat and cheese (like a lasagna) until you have used all your ingredients. Try and make at least 2 or 3 layers with extra cheese on top.
4. Bake at 350 for one hour. Serve and enjoy!
-
![](/static/nostr-icon-purple-64x64.png)
@ 378562cd:a6fc6773
2025-02-02 17:53:05
## Chef's notes
I'm only testing this out right now. I will update the recipe as well as add my own image soon after making this dish again.
## Details
- ⏲️ Prep time: 20 minutes
- 🍳 Cook time: 1 hour
- 🍽️ Servings: 4
## Ingredients
- 4 to 6 potatoes (size depending)
- 1 lb ground beef
- seasonings
- 2 cans chili beans
- 1 onion
- katsup
- shredded cheese of some kind
## Directions
1. saute onion and add ground beef to skillet. Season to liking.
2. peel if you like and thin slice potatoes
3. in a rectangle baking dish, layer potatoes, beans, meat and cheese (like a lasagna) until you have used all your ingredients. Try and make at least 2 or 3 layers with extra cheese on top.
4. Bake at 350 for one hour. Serve and enjoy!
-
![](/static/nostr-icon-purple-64x64.png)
@ d57360cb:4fe7d935
2025-02-02 16:33:16
Beauty and art function beyond the mind.
When you’re not thinking, when the mind reaches its natural silence. When it quiets down.
You begin to experience and actually experience how things are.
There is no more narration. Things happen as if by magic. Everything is in its place happening and grooving.
Every act, every movement feels like jazz.
We’re better doers than we are thinkers. But the world thinks otherwise.
-
![](/static/nostr-icon-purple-64x64.png)
@ 6b57533f:eaa341f5
2025-02-02 15:46:41
# 🏝️lost in the ordinary?
![aerial]( https://imgproxy.f7z.io/p2NXvTmETMsp7a0p1uHsIeknNcVbXo6AWCY7xfDjJ7o/w:2400/aHR0cHM6Ly9ibG9zc29tLnByaW1hbC5uZXQvOWQ5MDg2MWQ1ZDIzM2ExNGUzZjA1MGI4YzQ3ZDFhN2E4NjAwZmNlMTkzMmZlMjk0OWEwMzAzZWNmNThhNjY3Yi5qcGc)
## Welcome to Stories
Discover a hidden paradise where the world slows down, and adventure begins..
# 🌊 Step into tranquility.
![water]( https://imgproxy.f7z.io/osLRY1XHflj8DdFMBqq6tJBZPFD62uJCx9KuDHhHRm4/w:2400/aHR0cHM6Ly9ibG9zc29tLnByaW1hbC5uZXQvNzZhMjU5ODA3YzQyMjM4ZjU1ZTM5YjNjODg2Y2I1MzBiYzg4ZDc0MTgxMWJmNjRjOTViMTg1MzA3NWZmNGQwMi5qcGc)
##
Wake up to the sound of gentle waves and endless blue horizons.
# 🛶Live the dream.
![paddle]( https://imgproxy.f7z.io/6FGvyi8R7O5orPEvqoZm7NsmLpDQ9P_8aGZVQjKuqWc/w:2400/aHR0cHM6Ly9ibG9zc29tLnByaW1hbC5uZXQvZWU5MzViMGY3N2VkMzJkNGEwOTgzMTM2NTZhNjY0MWNhYWQyYWRlZmVlMDUwNGFlOTUzOWUzY2M0OTM4NDNmNS5qcGc)
##
##
## Unwind, explore, and escape—your perfect getaway is just one step away.
-
![](/static/nostr-icon-purple-64x64.png)
@ 5d4b6c8d:8a1c1ee3
2025-02-02 14:47:05
A little better today
I'm about to have some coffee, after 14 hours not eating or drinking . I probably won't eat for a couple more hours, either.
I forgot to mention another element of Fast February: the "fiscal fast". Some of you may have heard this term before. It's exactly what it sounds like: stop spending money. In my case it just means not buying anything specifically for myself: no snacks, no takeout, no video games, etc.
originally posted at https://stacker.news/items/873395
-
![](/static/nostr-icon-purple-64x64.png)
@ 3b7fc823:e194354f
2025-02-02 13:39:49
**Why You Should Only Run DeepSeek Locally: A Privacy Perspective and how to**
In an era where AI tools promise immense utility, the decision to run DeepSeek locally is not merely about functionality but also about safeguarding privacy and security. Here's the rationale why:
1. **Control Over Data Access**: Running DeepSeek locally ensures that data processing occurs on your own machine or server, allowing you to have full control over who can access the system. This reduces the risk of unauthorized access and misuse.
2. **Data Privacy**: By keeping computations local, you ensure that personal data does not leave your control, minimizing the risk of exposure through cloud-based services.
3. **Security Measures**: Local operation provides an additional layer of security. You can implement access controls, monitor usage, and respond to incidents more effectively, which might be harder or impossible when relying on third-party platforms.
4. **Practical Implementation**: Tools like Ollama and OpenWebUI facilitate setting up a local environment, making it accessible even for those with limited technical expertise. This setup empowers individuals to leverage AI capabilities while maintaining privacy.
7. **Right to Control Data**: Privacy is a fundamental right, and running DeepSeek locally respects this by allowing users to decide what data they share and how it's accessed. This empowers individuals to make informed choices about their personal data.
For those prioritizing privacy, this approach is not just beneficial—it's essential.
**Running DeepSeek Locally: A Guide for Individual Home Users**
DeepSeek is a powerful AI search engine that can help with various tasks, but running it locally gives you greater control over your data and privacy. Here’s how you can set it up at home.
---
### **What You’ll Need**
1. **A Computer**: A desktop or laptop with sufficient processing power (at least 4GB RAM).
2. **Python and pip**: To install and run DeepSeek.
3. **Ollama**: An open-source tool that allows you to run AI models locally.
4. **OpenWebUI**: A simple web interface for interacting with Ollama.
---
### **Step-by-Step Guide**
#### 1. **Install the Prerequisites**
- **Python**: Download and install Python from [https://www.python.org](https://www.python.org).
- **pip**: Use pip to install Python packages.
```bash
pip install --upgrade pip
```
- **Ollama**:
```bash
pip install ollama
```
- **OpenWebUI**:
Visit [https://github.com/DeepSeek-LLM/openwebui](https://github.com/DeepSeek-LLM/openwebui) and follow the instructions to install it.
---
#### 2. **Set Up Ollama**
- Clone the official Ollama repository:
```bash
git clone https://github.com/OllamaAI/Ollama.git
cd Ollama
```
- Follow the installation guide on [https://ollama.ai](https://ollama.ai) to set it up.
---
#### 3. **Run DeepSeek Locally**
- Use OpenWebUI as your interface:
```bash
# Start OpenWebUI (open a terminal and run this):
python openwebui.py --model deepseek-llm-v0.2-beta
```
- A web browser will open, allowing you to interact with DeepSeek.
---
### **Tips for Optimization**
1. **Reduce Memory Usage**: Use smaller models like `deepseek-llm-v0.2-beta` if your computer has limited resources.
2. **Limit Model Access**: Only allow authorized users to access the system by restricting IP addresses or using a VPN.
3. **Regular Updates**: Keep all software up to date to protect against vulnerabilities.
---
### **Why Run DeepSeek Locally?**
- **Privacy**: Your data stays on your local machine, reducing the risk of unauthorized access.
- **Flexability**: Running locally allows you to build specific models for specific uses and provide them with RAG data.
---
### Advocating for privacy does not finance itself. If you enjoyed this article, please consider zapping or sending monero
-
![](/static/nostr-icon-purple-64x64.png)
@ fbf0e434:e1be6a39
2025-02-02 13:32:12
> *本文原载于《CERN Courier》,是由欧洲核子研究中心(CERN,全称Conseil Européen pour la Recherche Nucléaire)出版的权威科学期刊,专注于报道全球物理学、技术及创新领域的前沿动态。以下正文内容是对全球开源开发者激励平台DoraHacks的创始人张剑南的专访报道,探讨了黑客松如何成为科技创新的重要推动力以及DoraHacks在其中扮演的角色。*
>
万维网(World Wide Web)、人工智能(Artificial Intelligence)与量子计算(Quantum Computing)——这些划时代的技术有何共同之处?DoraHacks创始人张剑南认为,它们都源于“Hacks(黑客精神)”。“当万维网在欧洲核子研究中心(CERN)诞生时,它向我们证明了一件事:要想改变并提高人类的生活方式和工作效率,关键在于以创新的思维利用现有的技术以实现突破。”张剑南解释道,“如果总是从零开始,我们永远无法取得实质性的进步。这恰恰就是开源运动和黑客马拉松的核心价值。”
十年前,张剑南参与筹办了CERN Webfest 2013,这是一场致力于探索如何以创新方式运用技术来服务科学与社会的黑客马拉松活动。通过Webfest,张剑南不仅实现了编程技能与物理学知识的跨学科融合,还与来自世界各地、背景各异的hackers建立了持久深厚的联系。随着参与黑客松次数的增多,他的“黑客精神”愈发强烈,最终驱使他创立了自己的公司。2024年,张剑南重返Webfest,但这次他不再是参与者,而是作为DoraHacks的首席执行官来见证这场盛会。
黑客马拉松是一种持续数天的社交编程活动,具有高度的包容性和开放性——参与者无需学术机构或企业背景即可加入。这种特性吸引了众多才华横溢的个体参与其中。活动中,hackers以团队形式合作,结合各自的技能,通过软件、硬件或商业计划等来解决技术难题。这不仅让物理学家、计算机科学家、工程师和企业家齐聚一堂,各展所长,也让年轻的开发者们有机会突破传统研究框架,提升技能、积累作品集,并拓展职业人脉。
“如果你对某件事充满热情,就应该能够立即投入其中并全力以赴,”张剑南强调,“追求梦想并不需要特定的学历或背景。”
对于在某个领域刚起步的研究者来说,黑客松的意义远不止于技术挑战。它为进入一个研究或行业领域提供了另一种途径,弥合了学术理论与实际应用之间的鸿沟。很多由大学举办的黑客松往往能够吸引到企业的赞助,这些赞助除了作为奖金来激励开发者持续开发,也会用来租赁大型场馆,以容纳数百甚至上千名参与者。
“正是这些大规模的黑客松吸引了众多行业猎头和导师的关注,”张剑南解释道,“他们把这类活动看作他们的人才库。通过黑客松,参与者们能够与大公司的人直接交流,加速职业发展,同时也能在实践中提升他们的编程能力。”
在2010年代,张剑南经常在周末参加黑客松,这也成为他创业的基石。“我曾经坐在计算机科学学院的公共休息室里,埋头研究我的黑客项目。我的大多数朋友也是在那里认识的,”张剑南回忆道,“但后来我意识到,如果想做出真正伟大的东西,必须有效地组织人力与资金。然后我就开始‘逃课’,不去上计算机系的课程,而是偷偷溜进商学院的教室里。”张剑南常常在商学院的教室后排听课,一边听课一边谋划自己的创业计划。他每天都与同行交流,评估各种不同的商业模式。“在创业过程中,要把工程知识与商业理论结合起来思考,”他补充道,“这是比较有趣的一点,让整个过程也轻松了一些。”
然而,从科学研究转向创业并非易事。“创业初期必须亲力亲为,要自己去学习然后完成各种任务。”张剑南坦言,“好处是能够接触到许多新技能和新朋友,但同时也得强迫自己去做那些原本不擅长的事情。”
这种经历也反映了许多创业者的共同困境:选择自己从头学习新技能,还是寻找合适的创业伙伴然后把任务分配出去?可是找到值得信赖的合作伙伴也不是一件容易的事,错误的决策甚至可能阻碍公司的发展。因此,从一开始就明确公司的愿景和使命显得尤为重要。
“解决方案其实很简单,”张剑南表示,“重点是要投入足够多的时间,亲自完成关键里程碑,以确保产品真正具备可行性。只要有了明确的商业计划和愿景,就能获得来自各方的支持。”
### **去中心化的社区治理**
很多黑客马拉松参与者在活动结束后就会放弃自己的项目,但张剑南创立DoraHacks的初衷并非如此。他希望为全球的黑客团队提供一个平台,让他们能够将创意转化为成熟产品。“我希望黑客马拉松不仅仅是一个招聘工具,”他解释道,“它更应该推动开源开发和去中心化的社区治理。比如现在,来自坦桑尼亚的黑客可以与美国的黑客团队远程协作,然后获得持续的支持,以开发出真正有影响力的产品。这种模式让技术领域变得更多样化,同时也能够让更多人接触到不同的领域。”
DoraHacks通过帮助组织者降低后勤成本,为参与者提供更可靠的资金支持机制,使黑客松超越学术机构的限制,吸引更多对创新充满热情的个体研究者参与。然后不断发展整个社区,让年轻一代的开发者、研究者们能够在自己的职业初期,接触到比以往更多的机遇和机会。
“商业模式正在发生根本的变化,”张剑南指出,黑客马拉松正在发展成为新兴技术的基石,尤其是在量子计算、区块链和人工智能等以开源形式起步的领域。“产品创造的过程将会迎来重大变革。未来的技术发展不再依赖于孤立封闭的产品开发,而是基于黑客们可以共同贡献的平台和基础设施。”
如今,黑客马拉松的意义已不仅限于编程或建立人脉——它们更关乎突破技术边界、创造有意义的解决方案,并开辟新的职业道路。黑客马拉松是创意孵化器,并且能够对这些创意产生持久的影响力。张剑南希望帮助这些创意变为现实。“未来创新的方式一定是协作完成的,是开源的,”他再次强调,“在传统社会环境里,企业的发展依赖于在闭源技术周围筑起的护城河,这种技术更新方式的效率低下且不容易实现。而真正创新的未来,将以开放平台技术为核心,让全球开发者能够在现有项目的基础上不断迭代更新。这样的开放协作精神正是Hacker Movement(开源极客运动)如此重要的原因。”
采访者:Alex Epshtein(编辑助理)。
原文链接:https://cerncourier.com/wp-content/uploads/2025/01/CERNCourier2025JanFeb-digitaledition.pdf
-
![](/static/nostr-icon-purple-64x64.png)
@ ddf03aca:5cb3bbbe
2025-02-02 13:09:27
We’re thrilled to announce the stable release of Cashu-TS v2.2! Although this update is a minor version bump, it brings significant improvements under the hood that enhance the overall developer experience. We’ve spent several weeks testing and refining these changes.
---
## What’s New in v2.2?
While there are no breaking changes in this release, there are many internal changes. If you spot any regressions or unexpected behavior, please [let us know](https://github.com/cashubtc/cashu-ts/issues). Here’s a rundown of the major updates:
- **Enhanced Proof Creation**: The way proofs are created internally has been revamped.
- **User-Controlled Outputs**: You now have full control over how outputs are created.
- **Improved Bundling**: We’ve switched our bundling tool to [vite](https://vitejs.dev) for faster and more modern builds.
- **Updated Testing Tools**: Our testing framework has migrated to [vitest](https://vitest.dev) and [msw](https://mswjs.io), with added browser testing via Playwright.
---
## New Flexibility with OutputData
In previous versions of Cashu-TS, the creation of outputs (or *BlindedMessages*) was hidden away. Even though there were options to tweak the process (like deterministic secrets or P2PK), you were always limited to the built-in logic.
### What’s Changed?
In v2.2, we’ve introduced a public interface that not only streamlines output creation but also lets you plug in your own custom logic when needed. With the new `outputData` option available on all output-creating methods, you can now bypass the automatic process and provide your own outputs.
For example, you can create two proofs tied to different public keys in a single mint operation:
```ts
const data1 = OutputData.createP2PKData({ pubkey: "key1" }, 10, keys);
const data2 = OutputData.createP2PKData({ pubkey: "key2" }, 10, keys);
const { keep, send } = await wallet.send(20, proofs, {
outputData: { send: [...data1, ...data2] },
});
```
### Customization Made Easy
The `outputData` option now accepts anything that conforms to the `OutputDataLike` interface. This means you can introduce your own output creation logic—even if it’s not natively supported by Cashu-TS yet. Here’s what the interface looks like:
```ts
export interface OutputDataLike {
blindedMessage: SerializedBlindedMessage;
blindingFactor: bigint;
secret: Uint8Array;
toProof: (signature: SerializedBlindedSignature, keyset: MintKeys) => Proof;
}
```
### Introducing OutputData Factories
While having full control is empowering, it also means you’ll need to handle tasks like fee calculation and amount selection manually. To strike a balance between control and convenience, we now support **OutputData Factories**.
A factory is simply a function that takes an amount and `MintKeys` as input and returns an `OutputDataLike` object. This way, you can define a blueprint for your output data without worrying about the nitty-gritty details. For instance, you can create separate factories for amounts you keep versus those you send:
```ts
function keepFactory(a: number, k: MintKeys) {
return OutputData.createSingleP2PKData({ pubkey: "keepPk" }, a, k.id);
}
function sendFactory(a: number, k: MintKeys) {
return OutputData.createSingleP2PKData({ pubkey: "sendPk" }, a, k.id);
}
const { send, keep } = await wallet.send(amount, proofs, {
outputData: { send: createFactory("send"), keep: createFactory("keep") },
});
```
Plus, you can now instantiate a `CashuWallet` with a default `keepFactory`, ensuring that all change amounts automatically lock to your key—streamlining your workflow even further.
---
## Bundling Improvements with Vite
Starting with v2.2, we’ve transitioned from using `tsc` to [vite](https://vitejs.dev) for transpiling and bundling the library code. Although this change is mostly behind the scenes, it brings several benefits:
- **Modern Build Target**: We’ve updated our build target to ES6.
- **Updated Exports**: The package exports now reflect the latest JavaScript standards.
- **Standalone Build Soon**: We’re working on a standalone build that bundles Cashu-TS along with all its dependencies. This will let you import Cashu-TS directly into your HTML.
If you encounter any issues with the new bundling setup, please [let us know](https://github.com/cashubtc/cashu-ts/issues).
### A Nod to Vitest
In addition to our bundling improvements, we’ve migrated our testing framework from Jest (with nock) to [vitest](https://vitest.dev) combined with [msw](https://mswjs.io). This switch gives us more flexibility in testing and mocking, plus we’ve added browser testing based on Playwright—thanks to the tip from nostr:npub16anjdksmvn5x08vtden04n64rw5k7fsjmedpw8avsx8wsh8ruhlq076pfx!
---
## In Conclusion
Although Cashu-TS v2.2 is a minor version update, it comes packed with improvements that enhance both the developer experience and the flexibility of the library. We’re excited to see how you’ll use these new features in your projects! Thanks to all the amazing contributors that add to this library.
Thank you for being a part of the Cashu-TS community. As always, if you have any questions, suggestions, or issues, don’t hesitate to [reach out to us](https://github.com/cashubtc/cashu-ts/issues).
-
![](/static/nostr-icon-purple-64x64.png)
@ c11cf5f8:4928464d
2025-02-02 13:05:25
Let's hear some of your latest #Bitcoin purchases, feel free to include links to the #shops or #merchants you bought from too. Any good #deal we should know about?
If you missed our last thread, [here](https://stacker.news/items/864463/r/AG) are some of the items stackers recently spent and #zap #sats on.
originally posted at https://stacker.news/items/873304
-
![](/static/nostr-icon-purple-64x64.png)
@ 0463223a:3b14d673
2025-02-02 12:22:46
I’m totally wasted! I don’t mean off my head on drugs, I mean absolutely physically and mentally exhausted.
Lugging heavy PA equipment up and down stairs, plus mixing shows is a lot and at my age I’m struggling with it. Yesterday was a write off due to exhaustion. My wife and I went to the cinema, and I slept through the film. A shame, it was something I wanted to see but I was toast. I went to bed at 8pm and slept for over 12 hours. I still feel wrecked today.
Live sound was always a sort of plan B. For a number of years teaching and performing with a band or a DJ was enough to get by on. I was comfortable, financially speaking. That was until about between 2012-14, that’s when we really felt the effects of the post 2008 crash. While a lot of noise was made about the initial event, reality for the likes of me was a slow and steady decline. At that time I was leading workshops with kids with difficult backgrounds, many kids in care due to abuse and neglect. That was a solid 40% of my income, another 30% came from teaching Sound Production at a local university and the final 30% from shows.
2014 cutbacks ripped services to shreds and a few friends lost jobs. Since then, doing live sound kept the rent and bills paid but fast forward to 2025 and I’m way too tired for this shit! I hate admitting it but my earnings probably peaked around 2008 with a bump in tours from 2017 till Covid. Since then earnings have been steady in £'s but getting wiped out by inflation. In fact I had decent acounts this year but every month I'm broke by the time bills and basics have been taken care of. I LOVE mixing live music and I’m pretty good at it. I’ve had musicians call me ‘musical’ which is the highest compliment but I’m totally fucked still 2 days after Friday’s show. It's unsustainable.
I’m quitting live sound unless some touring comes up again, touring is different, living on a bus for 3 weeks pays the same as 3 months of local work and I just mix, no lifting gear. The band I tour with are based in the US and only come to the UK/EU every couple of years. I get odd trips away with other artists but they’re usually fly out EU gigs. 1 or 2 shows then fly home, plus they're irregular.
Right now I’m more interested to learn ways of making income online, I started the Kali Mera Show to learn self hosting content. Committing to a project each morning has done wonders for my mental health, cutting down on morning doom scrolling. It’s been highly successful in that regard but not so much financially. However this is jst phase 1. I’m learning the tech, learning the production and making as many mistakes as possible while the stakes are low. I’m very happy 10 or so people enjoy the show on a daily basis. Tiny numbers but I don’t fuck with YouTube or the other big tech platforms. Fuck them!
Phase 2 involves getting premises and broadening the services I can produce, focussing on content for others, getting some opportunities happening for young talent, arranging meet ups and setting up a hub to bring together the crazy, talented people I know. It’s going to be tough, I’m in a run down area, there’s not much money here (relatively speaking) but it’s an area I really dig and want to make better.
Why am I telling you this? I’m writing this as a means of getting my brain straight and sharing it because I’m open to improving myself. I see people doing interesting shit here and that helps with motivation and confidence. My only social media for the last 6 years has been the Fediverse and much as I love it, there’s a gloomier outlook there. The world is a strange place with so much bad shit but out of 8 or so billion people, I can only take on so much. Building shit in my own local community and provide facilities for online wins sounds way more productive and helpful in some small way.
I accept we’re all going to hell in a handcart but may as well enjoy the ride…
There’s much to learn, I’ve only ever been ‘in business’ for a short time in my life (despite always being freelance) and I sort of gave up on my previous attempt. Had I paid more attention I could’ve built a strong YouTube presence but I’m not into being a vehicle for companies to push their products, nor do I want to teach people music online. That market is now heavily saturated and very, very boring as far as I’m concerned. My heart wasn’t in it, even back in 2015. I’m not an influencer.
With a real life space there’s premises, business rates, and investors to consider, as well as developing services that people are actually happy to part cash with. It’s going to be hard but different hard to physically lifting sub-bass speakers up and down winding staircases! I don’t want to talk too much game, it’s results that matter but wasting days to exhaustion doesn’t help. It’s time to hang up my headphones and focus (FOCUS YOU FUCKING FUCK!).
Maybe you’re reading this and thought ‘shit, this guy’s totally deluded’. That’s cool. Tell me. I value feedback. A fair few cats here give life advice so I’ll assume you might know what you’re talking about...
-
![](/static/nostr-icon-purple-64x64.png)
@ 2e8970de:63345c7a
2025-02-02 11:44:40
![](https://pbs.twimg.com/media/GivLYuMWUAA4OqT?format=jpg&name=large)
https://www.nature.com/articles/s41598-024-68817-6
Sharing this study from half a year ago since in some sense AI made a discovery here that humans could not make. Big caveat: humans directed and made a machine learning model to do this.
The larger point still stands tho. In recent weeks there has been big discussions if AI can surpass human intelligence or only asymptotically approach it on a superhuman width of topics.
originally posted at https://stacker.news/items/873266
-
![](/static/nostr-icon-purple-64x64.png)
@ fd208ee8:0fd927c1
2025-02-02 10:33:19
# GitCitadel Development Operations
We, at GitCitadel, have been updating, moving, and rearranging our servers, for quite some time. As a rather large, complex, sprawling project, we have the infrastructure setup to match, so we've decided to give you all a quick run-down of what we are doing behind-the-scenes.
## Supplier Coordination
![DevOps Infrastructure](https://i.nostr.build/n58FKgGxCXLQKcKW.png)
Our first task, this week, was figuring out who would host what where. We have four different locations, where our infra is stored and managed, including two locations from our suppliers. We got that straightened out, quickly, and it's all slowly coming together and being connected and networked. Exciting to watch our DevOps landscape evolve and all of the knowledge-transfer that the interactions provide.
## OneDev Implementation
![One Dev projects](https://i.nostr.build/QoONlqWkCfiQZT60.png)
Our biggest internal infra project this week was the migration of all of our issues from Jira, build scripts from Jenkins, and repos from GitHub to a [self-hosted OneDev instance](https://onedev.gitcitadel.eu). In the future, all of our internal build, test, issue, patch/PR, etc. effort will take place there. We also have a separate repo there for communicating with external developers and suppliers.
Our [team's GitHub projects](https://github.com/ShadowySupercode) will be demoted to mirrors and a place for external devs to PR to. Public issues and patches will continue to be managed over our self-hosted [GitWorkshop instance](nostr:naddr1qvzqqqrhnypzplfq3m5v3u5r0q9f255fdeyz8nyac6lagssx8zy4wugxjs8ajf7pqy88wumn8ghj7mn0wvhxcmmv9uqq5emfw33kjarpv3jkcs83wav).
We're especially glad to finally escape the GitHub Gulag, and avoid being bled dry by Jira fees, without having to give up the important features that we've come to know and love. So, yay!
## Next Infrasteps
### Automated Testing
Now, that we have everything tied up in one, neat, backed-up package, we can finally move on to the nitty-gritty and the dirty work. So, we're rolling up our sleeves and writing the Selenium smoke test for our [Alexandria client](https://next-alexandria.gitcitadel.eu). We'll be running that in Docker containers containing different "typical Nostr" images, such as Chrome browser with Nostr Connect signing extension, or Firefox browser with Nos2x-fox extension. Once we get the Nsec Bunker and Amber logins going, we'll add test cases and images for them, as well. (Yes, we can do Bunker. I hope you are in awe at our powers).
We are also designing an automated infrastructure test, that will simply rattle through all the various internal and external websites and relays, to make sure that everything is still online and responsive.
After that, a Gherkin-based [Behave feature test](https://behave.readthedocs.io/en/latest/) for Alexandria is planned, so that we can prevent regression of completed functionality, from one release to the next.
The Gherkin scenarios are written and attached to our stories before development begins (we use acceptance tests as requirements), a manual test-execution is then completed, in order to set the story to *Done*. These completed scenarios will be automated, following each release, with the resulting script linked to from the origin story.
![Gherkin-style story in Jira](https://i.nostr.build/20PuzFBK2K0NI1Jq.png)
### Automated Builds
As the crowning glory of every DevOps tool chain stands the build automation. This is where everything gets tied together, straightened out, configured, tested, measured, and -- if everything passes the quality gates -- released. I don't have to tell you how much time developers spend staring at the build process display, praying that it all goes through and they can celebrate a Green Wave.
![Build process](https://i.nostr.build/GEXddUYUtFTfnie7.png)
We are currently designing the various builds, but the ones we have defined for the Alexandria client will be a continuous delivery pipeline, like so:
![Alex pipeline](https://i.nostr.build/F2ngfNbKKwD6uMU3.png)
This will make it easier for us to work and collaborate asynchronously and without unnecessary delays.
### Expanding the Status Page
![infra quote](https://i.nostr.build/lPvAlDSqrdu8B6RR.jpg)
And, finally, we get to the point of all of this busyness: reporting.
We are going to have beautiful reports, and we are going to post them online, on our [status page](https://status.gitcitadel.com). We will use bots, to inform Nostriches of the current status of our systems, so go ahead and follow our [GitCitadel DevOps npub](nostr:npub16p0fdr2xccfs07hykx92t0cascac69xjuwaq38kjqy3aawt5hx8s82feyj), to make sure you don't miss out on the IT action.
## Building on stone
All in all, we're really happy with the way things are humming along, now, and the steady increase in our productivity, as all the foundational work we've put in starts to pay off. It's getting easier and easier to add new team members, repos, or features/fixes, so we should be able to scale up and out from here. Our GitCitadel is built on a firm foundation.
Happy building!
-
![](/static/nostr-icon-purple-64x64.png)
@ 228dde34:b5d0345e
2025-02-02 10:00:02
##### By Cheryl Nya
##### Deputy Editor
##### Hype Issue #60
###### CHERYL NYA explores how diverse travel styles can blend seamlessly on a grad trip, turning every moment into an opportunity for unforgettable memories and shared adventures.
![image](https://yakihonne.s3.ap-east-1.amazonaws.com/228dde34601a35313a505841487a3ba14c015da4f115f6e7ea7b9141b5d0345e/files/1738488108071-YAKIHONNES3.jpg) *‘Grad trips’, taking a celebratory trip after graduation, have become a growing trend. Photo taken from Pinterest.*
You made it – years of studying, late-night cramming, and navigating deadlines have finally paid off. Now, it’s time for a well-earned break: the graduation trip. The perfect chance to celebrate with your closest friends before everyone heads off in different directions.
It sounds like the golden plan, but as exciting as it is, travelling in a group can be its own kind of challenge. Between different travel styles, budgets and energy levels, it’s easy for tensions to rise.
However, with a little flexibility and compromise, your long-awaited trip will be remembered for its remarkable memories rather than its unfortunate disagreements. Here’s your ultimate guide to coexisting with your travel crew, without losing your patience along the way.
![image](https://yakihonne.s3.ap-east-1.amazonaws.com/228dde34601a35313a505841487a3ba14c015da4f115f6e7ea7b9141b5d0345e/files/1738488139666-YAKIHONNES3.jpg) *Have an honest talk with your crew and set expectations before you head off. Photo taken from Pinterest.*
1. Recognise that everyone has their own travel personality
There’s the ‘Itinerary Enthusiasts’ who have every minute planned. Then there’ll be the ‘Go with the flow’ travellers who are just there for chill vibes. Somewhere in between you’ve got the foodies, the shopaholics, and the one who just wants a good Instagram shot. When travelling with others, it’s unlikely that all of your friends have the same travel personality. Accepting these different travel personalities early on before your trip will help you avoid major clashes – or at least mentally prepare for them. By recognising your group dynamics, you’ll know who to trust with planning and who to expect last-minute cancellations from.
2. Budget talks are awkward… but necessary
No one wants to be the person who suggests skipping a fancy dinner because they’re on a budget—but at the same time, no one wants to be forced into penny-pinching when they’re on this trip to indulge. Before the trip, have an honest conversation about spending expectations. Will you be splurging on expensive restaurants, or will street food and convenience stores be the way to go? Is everyone okay with taxis, or are we strictly on a public transport budget? Setting clear expectations upfront avoids unnecessary tension when the bill arrives.
3. The accommodation debate: Choose wisely
If your crew has a mix of early risers and night owls, staying in one cramped hostel room will definitely lead to chaos. Hence your choice of accommodation is extremely important; it could make or break your trip. Keep in mind, your light sleepers will suffer if your party-loving friends stumble in at 3AM. So, booking an Airbnb with separate rooms and beds might be your best option. Consider everyone’s preferences before booking because once you’re stuck in a bad setup, there’s no escaping it.
4. Embrace the art of splitting up
Not everyone wants to visit museums, and not everyone wants to be under the hot sun on a jet ski. Instead of dragging each other to activities not everyone is excited about, embrace the idea of splitting up for a day or two. If one group wants to go sightseeing at a historical site and the other wants to surf some waves, that’s okay! Just make sure to have a designated meetup location and time, and keep each other posted. This will keep everyone happy and mean that no one has to fake any enthusiasm for something they don’t enjoy.
5. Be honest about your limits
It’s very tempting to go along with every plan to avoid seeming difficult. But, if you’re not careful, that’s a fast track to burnout. Remember, this is your grad trip too. If you need some downtime before an afternoon of exploring, take it. If you hate hiking, skip it instead of forcing yourself through. Your friends would rather you be honest than silently endure something you don’t enjoy. Grad trips are meant to be fun–so speak up and prioritise what will make your experience enjoyable.
6. Most importantly, embrace the chaos and remember why you came
No matter how well you plan, things will go wrong. A “quick” coffee run might turn into a two-hour detour, or a carefully planned itinerary could be derailed by a sudden downpour. Maybe the group gets on the wrong train and ends up in an entirely different city. Sometimes, the best memories come from unplanned moments–so lean into the chaos and let the adventure unfold.
At the end of the day, this trip isn’t about checking off every attraction or getting the perfect itinerary; it’s about celebrating a huge milestone with the people who made those long nights and tough exams bearable. The best part of the trip won’t be the landmarks or the food; it’ll be the inside jokes, the late-night talks, and the shared moments of pure chaos. So, take a deep breath, go with the flow, and make the most of it.
![image](https://yakihonne.s3.ap-east-1.amazonaws.com/228dde34601a35313a505841487a3ba14c015da4f115f6e7ea7b9141b5d0345e/files/1738488280275-YAKIHONNES3.jpg) *No trip is perfect, but what’s important is the time spent with your company. Photo taken from Pinterest.*
Surviving a grad trip with different travel styles isn’t about avoiding conflict, it’s about embracing the madness and making the best of it. And hey, worst case? You’ll have some hilarious group chat stories to reminisce about later.
-
![](/static/nostr-icon-purple-64x64.png)
@ 006532cb:fd8f28b4
2025-02-02 09:50:56
I am new to #NOSTR and not a #Dev; however, npub1jlrs53pkdfjnts29kveljul2sm0actt6n8dxrrzqcersttvcuv3qdjynqn's [article](https://njump.me/naddr1qvzqqqr4gupzp978pfzrv6n9xhq5tvenl9e74pklmskh4xw6vxxyp3j8qkke3cezqyw8wumn8ghj76r0v3kxymmy9e3k7unpvdkx2tn5dahkcue0qy88wumn8ghj7mn0wvhxcmmv9uqq6vfhxvurydfhxq6nwvfj8q4tttqv) inspired me to research and understand further. As a result, I have condensed my learnings into 10 bullet points that seem to embody the spirit of being a nostrich and the qualities we should all strive for when engaging with one another making software choices and avoiding NINO's.
1. **You shall not compromise on security:** Prioritize the security and integrity of user data, using best practices and Nostr's built-in features to protect against unauthorized access and malicious activity.
2. **You shall prioritize user agency:** Respect users' mute lists, use their web of trust to filter out spam, and prioritize user control over their data.
3. **You shall be decentralized and open:** Do not hardcode relay URLs or depend on specific relay implementations, ensuring that your platform is truly decentralized and open.
4. **You shall leverage Nostr's technical aspects:** Take advantage of Nostr's features, such as self-authenticating data, event handlers, and relays, to build a robust and decentralized platform.
5. **You shall use native Nostr solutions:** Prefer Nostr-native solutions to solve problems, rather than relying on legacy web services, promoting a more decentralized and resilient ecosystem.
6. **You shall prioritize interoperability:** Implement NIP 89 (Recommended Application Handlers) to enable seamless interactions with other Nostr apps, promoting a unified and decentralized ecosystem.
7. **You shall engage with the community:** Share knowledge, contribute to the growth of the ecosystem, and collaborate with other Nostr developers to promote a unified and thriving community.
8. **You shall be transparent and accountable:** Be transparent in your development processes, and accountable for your actions and decisions, promoting trust and confidence in the Nostr ecosystem.
9. **You shall innovate and evolve:** Continuously innovate and improve your platform, staying up-to-date with the latest developments in the Nostr protocol and ecosystem, to ensure the best possible experience for users.
10. **Embody Nostr:** Your application should truly represent the Nostr protocol, using its features and network to provide unique value to users.
I am excited for the future. In Eric S. Raymond's book "The Cathedral and the Bazaar" he comments;
> "...and the robust doesn't care too much"
Nostr embodies the spirit of the Bazaar, a vibrant and eclectic marketplace where the robust thrive, all are welcomed and empowered to become strong.
/GN!
-
![](/static/nostr-icon-purple-64x64.png)
@ 63e047aa:2e1ae74f
2025-02-02 09:00:46
In this blog post, I will walk you through the process of integrating Nostr login functionality into my Rails application using the Nos2x extension. This involved modifying the Devise User model, adding a new route to handle Nostr users, and integrating JavaScript to enhance the login experience.
## Overview
Nostr is a decentralized protocol that allows users to authenticate without relying on traditional email/password combinations. By leveraging the Nos2x extension, I was able to implement Nostr login seamlessly. Here’s how I did it.
## Step 1: Adding Asynchronous Nostr client in Ruby
```bash
bundle add nostr
```
## Step 2: Modifying the Devise User Model
The first step was to modify the Devise User model to allow empty email validation. This is crucial because Nostr users may not have an email address. I updated the `User` model as follows:
```ruby
class User < ApplicationRecord
# Include default devise modules. Others available are:
# :confirmable, :lockable, :timeoutable, :trackable, :registerable and :omniauthable
devise :database_authenticatable, :registerable,
:recoverable, :rememberable # Removed :validatable
# Validations
validates :nostr_public_key, presence: true, uniqueness: true, allow_blank: true
validates :email, uniqueness: true, allow_blank: true # Make email optional
validates :password, length: { minimum: 6 }, allow_blank: true # Make password optional but enforce length if provided
# Conditional validation for email and password
validates :email, presence: true, unless: :nostr_public_key_present?
validates :password, presence: true, unless: :nostr_public_key_present?
private
def nostr_public_key_present?
nostr_public_key.present?
end
end
```
By adding this validation, I ensured that users logging in via Nostr would not be required to provide an email address.
## Step 3: Adding a New Route for Nostr Users
Next, I needed to create a new route to handle the login process for Nostr users. I added the following route to my `config/routes.rb` file:
```ruby
Rails.application.routes.draw do
# Other existing routes...
post 'users/nostr_login', to: 'users#nostr_login', as: 'nostr_login'
end
```
This route points to a new action in the `UsersController` that will manage the authentication process for Nostr users.
## Step 4: Implementing the Nostr Login Action
In the `UsersController`, I implemented the `nostr_signup` action to handle the login logic:
```ruby
# app/controllers/users_controller.rb
class UsersController < ApplicationController
# Custom error handling for CSRF token verification failure
rescue_from ActionController::InvalidAuthenticityToken do |exception|
render json: { error: "Can't verify CSRF token authenticity." }, status: :unprocessable_entity
end
def nostr_signup
nostr_signed_event = params[:signed_event]
if not nostr_signed_event
render json: { success: false, error: "No signed event provided." }, status: :unprocessable_entity
return
end
public_key = nostr_signed_event[:pubkey]
content = nostr_signed_event[:content]
kind = nostr_signed_event[:kind]
csrf_token = request.headers['X-CSRF-Token']
tags_hash = tags.to_h
challenge_value = tags_hash["challenge"]
relay_value = tags_hash["relay"]
expected_relay_value = ENV.fetch('NOSTR_AUTH_RELAY_URL', 'wss://relay.primal.net')
# Check if the challenge_value and relay_value are matching or if kind is valid
if challenge_value != csrf_token || kind != 22242 || relay_value != expected_relay_value
return render json: { success: false, error: "Invalid event provided." }, status: :unprocessable_entity
end
nostr_event = Nostr::Event.new(
content: content,
id: nostr_signed_event[:id],
created_at: nostr_signed_event[:created_at],
kind: kind,
pubkey: public_key,
sig: nostr_signed_event[:sig],
tags: nostr_signed_event[:tags]
)
# Validate the event's signature
unless nostr_event.verify_signature
render json: { success: false, error: "Invalid event signature." }, status: :unprocessable_entity
return
end
user = User.find_or_initialize_by(nostr_public_key: public_key)
...
end
private
def nostr_signup_params
params.permit(signed_event: [:id, :kind, :content, :tags, :created_at, :pubkey, :sig])
end
end
```
This action will handle the authentication process and create a new user if they do not already exist.
## Step 5: Integrating JavaScript for Nostr Login
To enhance the user experience, I added a link for Nostr login on the Devise login page. I included the following JavaScript code to handle the Nostr login process:
```javascript
document.addEventListener("turbo:load", function () {
if (isNostrAvailable() && !document.getElementById('nostr-signup')) {
createNostrSignupButton();
}
});
// Function to check if Nostr is available
function isNostrAvailable() {
return window.nostr && typeof window.nostr.getPublicKey === 'function';
}
// Function to create and append the Nostr signup button
function createNostrSignupButton() {
event.preventDefault();
const button = document.createElement('button');
button.id = "nostr-signup";
button.onclick = function(event) {
event.preventDefault();
nostrSignupHandler();
};
button.type = "submit";
button.textContent = "<%= t('nostr.with_extension') %>";
const actionsDiv = document.querySelector('.actions');
if (actionsDiv) {
actionsDiv.appendChild(button);
}
}
async function nostrSignupHandler() {
try {
const publicKey = await window.nostr.getPublicKey();
if (!publicKey) {
alert("Sign-up failed. No public key.");
}
token = document.querySelector('meta[name="csrf-token"]').getAttribute("content");
const event = {
"created_at": Math.floor(Date.now() / 1000),
"content": "",
"tags": [
[
"relay",
"<%= ENV['NOSTR_AUTH_RELAY_URL'] || 'wss://relay.primal.net' %>"
],
[
"challenge",
token
]
],
"kind": 22242,
"pubkey": publicKey
};
// Sign the event
const signedEvent = await window.nostr.signEvent(event);
if (!signedEvent) {
alert("Sign-up failed. Event not signed.");
}
const response = await fetch("/nostr_signup", {
method: "POST",
headers: {
"Content-Type": "application/json",
"X-CSRF-Token": token,
},
body: JSON.stringify({ "signed_event": signedEvent }),
});
...
```
## Conclusion
By following these steps, I successfully integrated Nostr login functionality into my Rails application using the Nos2x extension. This not only enhances the user experience by providing a decentralized login option but also aligns with modern authentication practices.
Feel free to reach out if you have any questions or need further assistance with implementing Nostr login in your own applications!
If you want to see it in action, go ahead to [Medical Dictionary - Login Page](https://medical.inarchives.com/users/sign_in) for example. You will need to be on a desktop browser with a Nostr Extension installed.
Happy coding!
-
![](/static/nostr-icon-purple-64x64.png)
@ da0b9bc3:4e30a4a9
2025-02-02 08:18:39
Hello Stackers!
Welcome on into the ~Music Corner of the Saloon!
A place where we Talk Music. Share Tracks. Zap Sats.
So stay a while and listen.
🚨Don't forget to check out the pinned items in the territory homepage! You can always find the latest weeklies there!🚨
🚨Subscribe to the territory to ensure you never miss a post! 🚨
originally posted at https://stacker.news/items/873174
-
![](/static/nostr-icon-purple-64x64.png)
@ 63e047aa:2e1ae74f
2025-02-02 08:12:53
**We have not lived the longest period of peace in history yet, but we will live the longest period of peace in history!**
In a world often defined by conflict, power struggles, and competition for resources, we are constantly searching for ways to build a more peaceful and just society. While most people look at Bitcoin as a financial asset or a tool for decentralizing wealth, I believe its potential reaches far beyond economics. Bitcoin might offer humanity something even greater—a new foundation for **peace**.
## Moving Beyond Conflict: A New Kind of Power
Throughout history, wars have been fought over control—control of land, resources, economies, and the power to enforce rules. In contrast, Bitcoin's decentralized structure removes the need for such centralized control. No single entity governs Bitcoin, and no one can wield unchecked power over the system. The proof-of-work mechanism ensures security and fairness without the need for violence, coercion, or centralized oversight.
As **Jason Lowery** suggests in his work on Bitcoin as a form of power projection, Bitcoin can be seen as a new kind of digital deterrent, one that allows nations to secure their interests without the need for traditional force or military conflict. This shift in power could give rise to a new form of diplomacy, one built on transparency, equal access, and mutual trust. In a world where no single nation or group can manipulate the economic system, we reduce the incentives for conflict.
## Bitcoin as a Tool for Transparency and Trust
At its core, Bitcoin is a trustless system—no one needs to trust a central authority to ensure fairness. Instead, cryptography and mathematics guarantee the security of the network. This system of transparency could extend far beyond finance, offering a new way for people, governments, and organizations to interact without fear of manipulation or corruption.
By removing the need for intermediaries, Bitcoin could pave the way for global cooperation, where each party can act with confidence in a system that cannot be easily undermined. It creates a level playing field, not just economically but also in terms of information sharing and governance.
## Beyond National Defense: A Vision for Peace
Jason Lowery’s exploration of Bitcoin as a strategic defense tool highlights the ways it can serve as a power projection system for nations, offering a new form of security and sovereignty. But I believe this is just the beginning. What if Bitcoin could give nations and individuals a means to engage peacefully?
By empowering people to own their wealth and secure their assets without relying on central banks or governments, Bitcoin could weaken the structures that fuel geopolitical conflicts. When control is decentralized, and power is more evenly distributed, we may find fewer reasons to engage in war.
## A New Way Forward
Imagine a world where peace is not dictated by the threat of force or control over resources but by the mutual benefit of a decentralized system that serves everyone equally. Bitcoin, in this light, becomes more than a financial innovation—it becomes a blueprint for how we might move toward a more peaceful and just world.
Satoshi Nakamoto may not have intended Bitcoin to be a pathway to peace, but the potential is there. As Jason Lowery highlights, Bitcoin's decentralized nature could evolve into a critical part of how nations secure their futures in the digital age. What if we embraced it, not just as a store of value but as a new foundation for how we build trust, security, and cooperation?
I believe that Bitcoin represents more than just financial freedom—it offers us a chance to rethink the systems that have governed our world for centuries. It gives us the opportunity to engage with each other in a way that fosters peace, not conflict. Most importantly, nations would not need to fight over who holds the most Bitcoin—because in a truly decentralized and transparent system, it is not about accumulating more. It simply needs to be adopted, and by doing so, the value it creates can be shared equally, reinforcing the principles of cooperation and global harmony. Redefining peace through decentralized, secure systems like Bitcoin might just be one of the most significant shifts in human history.
-
![](/static/nostr-icon-purple-64x64.png)
@ 57d1a264:69f1fee1
2025-02-02 05:47:57
Hey there, as a result of the recent [SN Media Kit](https://stacker.news/items/872925/r/Design_r) updated, I'll try to create few simple marketing assets for ~Stackers_Stocks territory to be spread across the web.
Feel free to share in the comments below:
- Few visual references you'd like the assets to be inspired on
- If visuals are not your thing, a description of your idea will help too
- A slogan, or some words/concepts that express the territory's values
@BlokchainB you start, let's see how we go!
originally posted at https://stacker.news/items/873112
-
![](/static/nostr-icon-purple-64x64.png)
@ 57d1a264:69f1fee1
2025-02-02 05:36:57
Hey there, as a result of the recent [SN Media Kit](https://stacker.news/items/872925/r/Design_r) updated, I'll try to create few simple marketing assets for ~Construction_and_Engineering territory to be spread across the web.
Feel free to share in the comments below:
- Few visual references you'd like the assets to be inspired on
- If visuals are not your thing, a description of your idea will help too
- A slogan, or some words/concepts that express the territory's values
@BlokchainB you start, let's see how we go!
originally posted at https://stacker.news/items/873104
-
![](/static/nostr-icon-purple-64x64.png)
@ 3b7fc823:e194354f
2025-02-02 03:16:40
**Why Privacy Matters and How to Protect It**
Privacy is about control. It’s not about hiding yourself but deciding what others can see about you. Just as you don’t share everything when buying a magazine, technology shouldn’t force you to reveal more than needed.
Why Privacy is Important
1. Personal Control:
Privacy lets you choose what parts of your life are visible. You shouldn’t have to share everything just to use a service.
2. Security Against Exploitation:
Without privacy, people and groups can be targeted by companies or governments. This abuse can lead to data breaches or unnecessary surveillance.
3. Building Trust:
Privacy is key to trust in relationships and communities. When your info is safe, you can transact and communicate without fear of misuse.
**How to Protect Your Privacy**
1. Think Before You Share: Only share what’s necessary and know why you’re doing it.
2. Use Encryption: Encrypt sensitive communications like emails or messages.
3. Control Data Sharing: Avoid oversharing personal details online.
4. Enable Privacy Tools: Use VPNs or privacy settings on social media to shield your data.
5. Be Mindful of Metadata: Understand that metadata (like location data) can reveal more about you than the content itself.
6. Support Privacy-Focused Brands: Choose services that prioritize privacy, like encrypted messaging apps.
7. Read Privacy Policies: Know what data you’re sharing and with whom. 8. Tools like privacy.io can help visualize your digital footprint.
9. Block Trackers: Use tools like DoNotTrackMe or uBlock Origin to stop trackers from collecting your data.
**Conclusion**
Protecting privacy is a vital step in safeguarding your personal freedoms. By taking proactive measures, you can control what information is accessible and ensure that your rights are respected. Remember, you are your own best advocate for privacy—trust no one but yourself to protect your data and identity.
Join the movement to champion privacy as a fundamental human right. Advocate for stronger laws and encourage others to take action, so we can all enjoy safer, more secure digital environments.
-
![](/static/nostr-icon-purple-64x64.png)
@ 9e5a3a1a:ed414e8d
2025-02-02 00:51:34
(deleted)
-
![](/static/nostr-icon-purple-64x64.png)
@ 9e5a3a1a:ed414e8d
2025-02-02 00:50:08
Either the phone’s battery went bad and quit charging, or the cable was shit. The warm rain running down the screen made the phone’s UI, flicker back and forth, as Ethan turned the screen on again to check how much battery he had left. Not a lot: 4%. At least the thing was water-proof, he thought. Today was also shit. First his parents confiscated he car keys after finding booze in his closet, now the fucking charging cable went bad. (Hopefully it’s the charging cable and not the battery), he thought. A car drove by splashing him with a fan of muddy water.
“Hey!” he yelled, but the red tail lights were too far away now for the driver to hear. “Fucking fuck!” he swore looking down at himself. It was too dark to see how dirty his shirt and pants were now. The light of the gas station still far away. (Oh, well), he thought and continued walking, wet gravel and sand of road’s shoulder making wet crunching noises underfoot.
Ethan’s thumb moved on the phone to turn the flashlight on, but he stopped himself. There was almost no chance that Casey’s gas station won’t have USB cables, they always did, but with today's luck they might just be out. Then he’d be screwed without a phone for the rest of the night and all day at school tomorrow. It wouldn’t be the end of the world, but he was too irate after everything today to accept not having a phone right now.
A pale form moved to his right a few yards away. He turned and saw a figure standing by the trees. Ethan stopped and squinted through the rain. A cold, creepy feeling suddenly gripped him.
It stood there and watched him. A female form, he realized, tall and pale, with black hair longer that he’s ever seen. Something was off. The face… It’s head… The mouth grinned widely, forming a dome above the eyes, eyes that were down close to the neck, under the nose, mouth and chin up above them. (It’s fucking head is upside down..) he realized.
Ethan’s thumb pressed the phone’s power button, battery be damned. He aimed it at the figure, brought up the camera app and pressed the button to take the picture. Just as the shutter sound clicked the face was suddenly full-screen, as if a few feet away from him.
Ethan gasped and the phone tumbled onto the ground. There was a moment of relief when he realized that the figure was still far away and didn’t suddenly teleport right in front of him, but then something long, black, and wide, like a cross between a ribbon and an anaconda flicked itself toward him and the last thing he felt was a thick spiderweb of hair wrapping itself around him and pulling him forward.
***
“Hey, Riley, when did your dad say you needed to be back home?” Alex’s mom yelled from downstairs. The two girls glanced at their phones to see the time.
“Eleven!” Riley yelled back. They still had half an hour of “study” time. The two really did mean to study for the calculus exam, but ended up chatting the whole evening.
“Oh shit! I got to show you something,” Riley said, turning on her phone’s screen again, “You know that ‘Grin Reaper’ thing on social media?” She scrolled through her phone’s picture gallery.
“Like, that smiling ‘monster’ with upside down head?” Alex asked.
“Yeah, the one they said kidnapped those kids”
“That’s so fake!”
“Yeah, but look!” Riley turned her screen towards her friend.
Alex took the phone from her, “What’s this?”
“It’s her! Caleb was driving me to the movies and I saw her out the window. You know where Casey’s gas station is on Maple av? There’s like a wooded area just past it when you’re driving downtown.”
“It’s just some blurry figure. Probably some homeless person… What’s that?” Alex heard some kind of scratching at the window. She walked over to look. They were on the second floor, but there were no trees close enough to scratch against the window. She opened it and look outside. No one. Just a vine attached to the wall of the house outside. Or was it a vine? Along, curly splotch of dark. Alex frowned.
“No, I saw her, for real for real. It’s looks bad on the photo because it was dark and we were moving, but her head was on upside down and grinning.” Riley insisted.
(Is it ivy?) Alex thought, only half listening to Riley, (Since when do we have ivy on the house?)
Riley wondered if she should tell Alex that when she snapped the photo it looked like the woman’s grinning, upside down face was up close suddenly, right up against the car window. Caleb almost veered off the road turning to see what was wrong when she gasped and dropped the phone. When she fished her phone from beneath the seat, the photo looked normal. Blurry but normal.
(Maybe a mud splash) Alex thought, examining the black, vine-like shadow that stuck to the house aiming at the window. (Some asshole splashed mud on the house as a prank. Someone from school?)
“You think I should post it to TikTok?” Riley asked, looking pensively at the photo.
The question brought Alex’s attention back to her. She walked back over and sat on the other side of her friend, taking the phone from her hand and looking closer at the photo. “It’s dark,” Alex rolled her eyes, “Also, some troll could have just been wearing a mask trying to scare people. That shit’s all over social media.”
“I guess…” Riley decided against telling her more. She didn’t want to sound weird.
Just then, Alex heard her phone ding somewhere behind her. She looked back to find it when she heard a choking noise from where Riley sat, “You ok?” she asked looking back and froze, not quite sure what she was seeing. Riley’s eyes were wide, her hands at her throat tugging at something black, like a scarf wrapping around her neck. More dark, tentacle-like locks reached in towards them through the window. It looked like hair, but it moved as if through water, snaking itself forward and wrapping around Riley’s arms, neck and face. Before Alex could utter a sound or register what she saw, the hair straightened, pulled back, yanking Riley out through the window.
***
Alex sits on her bed in shock, glancing back at the window every thirty seconds. She tries to resist getting up and walking over to it. It's weird feeling of being pulled towards it to make sure it’s locked and being afraid to approach it for fear of what she might see outside. What if she sees it again? It’s tentacle-like locks crawling up the house, surrounding her window ready to snatch her like it did her friend. Can it seep through the cracks and unlock the fragile latch? She feels herself standing up and walking over to the window briskly, her hands smooth over the window latch, making sure it’s still locked, her eyes darting back and forth outside. Nothing. The dark splat on the house Alex first mistook for ivy or mud is gone, too.
She sits back on the bed. Alex can hear her parents arguing downstairs. They think she's using drugs. They searched through her room the day after Riley was taken. They yelled at her that night, them and Riley’s dad, all convinced that the girls were high and Riley wondered off somewhere. Alex knew they would not believe what really happened. But lying wouldn’t help anyone find her friend. She lets think it was all a drug-induced hallucination.
(Maybe I’m crazy,) Alex thinks. Her mind searches for mentions of schizophrenia among any of her relatives. Isn’t that shit genetic?
A chill goes through her body again, suddenly. A scratching at the window? Like the one she heard before Riley was taken? “It’s not real,” she whispers out loud. It’s not real. She keeps thinking she hears it almost as often as she walks over to check the latch on the window. “It’s not real….” She has to check.
Pushing through the fear, Alex briskly walks over to the window again. Nothing it the trees out back across the lawn. She can’t see the outside of the house without opening the window but she can’t risk it. “It wasn’t real” she affirms again. Then she has an idea.
The parents’ arguing grows louder as Alex quietly opens her bedroom door and tiptoes down the stairs toward her mom’s office, trying to avoid attracting their attention. They are still pissed, she doesn't want to deal with them. She looks for scotch tape, quickly founds it, grabs a stack of paper from the printer and goes back upstairs.
If she blocks out the window, it can’t see her, even if it is lurking somewhere outside waiting to snatch her, Alex thinks as she starts to cover the glass with paper and tape. She feels better now, suddenly. It feels like she was doing something to protect herself, even if it involves being near the window and risking seeing that thing.
As the final page of printer paper is about to go up to block the glass completely, Alex freezes. A figure stands on the grass in front of the trees. In panic, Alex tries to decipher the face in the dark. The head, it is right side up. Not grinning, no hair tentacles: not the monster. With a wave of relief, she looks closer, trying to figure out who it is, and a surge of adrenaline and excitement suddenly hits her, (It's Riley!)
“Ril--,” she almost screams, fumbling with the latch. As she pulls the window up and looks back out again, the figure is gone, “Riley!” she yells into the night. No answer. Alex pulls the window closed and runs for the door, briefly coming back to latching again, just in case.
“She’s out there! Outside.” Alex almost yells as she barged into the living groom, pointing towards the back door.
“Where? Outside?” her mom says then quickly goes to the door, dad and Alex following her. In the yard they yell Riley’s name, scanning the grass hill beyond and the tree line behind it.
“Are you sure you saw her?” her dad asks.
“Yeah, it was her, for sure.”
“Are you high again?” her mom turns to her with an annoyed grimace on her face.
“I’m not fucking high, mom!”
“Don’t you talk to me this way! Get back to your room.” her mom yells.
“I’m not fucking high, mom! I saw her.”
Mom isn’t listening, she turns to dad “We should call her parents. She could really be out there,” then to Alex, “Upstairs NOW!”
Pissed, Alex walks back into the house. It feels good to be angry, anger is better than fear. She runs up the stairs and tares down the paper she had just put up on the glass. She leans against the window and scans the tree line up in the distance.
A few hour pass. Alex still gets up from time to time to check the window, but this time she is looking for Riley rather than checking the lock. Her parents have finally quieted down downstairs. It's late. They are probably asleep by now.
Alex considers going to bed herself, but she knows she wouldn't be able to sleep. She looks back out the window.
"Riley!" Her friend is there again, closer this time. Alex opens her mouth to call to her, but stops as she saw Riley raise her finger to her lips, gesturing for her to be quiet. Alex frowns, “What the fuck are you doing?” she mouths, shrugging dramatically.
Riley motions for her to come out then puts her finger to her lips again. What is she doing?
Alex thinks about waking her parents, but decides against it. They’ll just be useless and tell her to go to her room again. She quietly creeps downstairs and sneaks out the door.
She half-expects Riley to be gone again as she walks out of the house and looks out to the hillside, but Riley is still there. Further back, almost past the tree-line. She motions Alex to come closer and takes a few steps back, disappearing in the trees.
“Fuck!” Alex swears, looks back at the house one last time, then takes off across the yard after her.
***
Past the tree line in the woods, Alex crunches through the trees, lighting her way (poorly) with her phone’s flashlight. Thorns scratch her arms and legs as she walks as fast as she can, navigating among the trees, yelling Riley’s name. From time to time she can see Riley's figure moving away from her, weaving among the trees. Her friend moves effortlessly, as if gliding above the ground, unimpeded by the greenery.
Alex trips. She catches herself before she tumbles to the ground. For a second it is pitch black. She bends down to look for her phone. It is a glowing outline among the plants. Alex grabs it and gets up. For a moment she’s disoriented, not sure which way she was going. She looks and listens for her friend but sees and hears nothing. She looks back. There’s a bit of light glittering through the trees back where her neighborhood is. She looks forward and yells Riley’s name again, moving her phone trying to catch a glimpse of her friend’s figure. Nothing. Should she go back? Is Riley playing some stupid game? Maybe she is high.
Without a second though, Alex continues forward, “Riley, it’s not funny! What the fuck are you doing?” Alex can see pale gray light between the leaves and the branches up ahead. She quickens her pace, almost tripping again.
Alex walks into what looks like a small clearing. The trees are further away up ahead, but not much moon-light is coming from up above. She looks up towards the wide canopy, forming a dome overhead. Her eyes suddenly focus on a humanoid shape hanging parallel to the ground from the branches above. Its face is white, torn in two by a wide smile that almost reaches its ears. The top of the head is attached to the neck. Bands of hair suspend it from branches above.
Alex freezes. For a second she feels herself cease to exist except for her breath that moves rhythmically in and out. Moments pass. How long, she can’t tell. (Run!), the thought echoes through her head, and she almost moves to obey but stops herself. To run is to turn her back on that thing. What if that’s when it grabs her. She stays still and so does the figure.
The thing blinks and its grin becomes wider. It sways back and forth, its prehensile locks making branches creak overhead. Alex’s chest and throat grows hot and and she gathers herself. She throws herself to the side, tripping yet carrying herself forward through the snapping bush branches. With sudden agility, she rights herself and runs back into the woods. Tree trunks fly at her as she runs trying not to trip on the uneven ground. She bursts into another clearing and looks back swinging her phone to light the trees behind her to look if that thing is following her. Then her vision turns off.
She feels leaves and dirt against her face, a small pointy stick poking her in her right cheek. There’s a pressure on the side of her head and her hand moves there trying to feel what’s pushing against her. There’s nothing. The side of her head is numb. Memory of where she is and why rushes back into her and she pushes herself up with a jerk. When her vision comes back online she can only see a mosaic of black and gray forms, bushy undergrowth letting in pale light ahead of her. There is a glow coming from her left. She turns and her eyes focus quickly on phone, flashlight still on, its light flooding her vision. Alex grabs it and points it forward then all around, trying to see if she’s alone or if that thing is hiding somewhere near. She doesn’t see anyone. Only trees and quick shadows jumping away from the light as he moves it.
She’s in a sort of a clearing again, except for a large tree trunk close to her. Alex reaches for the numb spot on her head and feels that it’s wet and sticky. It’s blood. She must have ran into that tree when she looked back trying to see if that monster followed her. Alex shines the light around her again. No sign of that thing. It could be hiding in the trees just out of sight. Or… her blood runs cold. She slowly looks up, remembering where she saw that thing first.
For a second, all she can see is branches and flowing, black vines like spider webs snaking through the canopy, then her eyes discern three small, slender figures hanging like poppets from these “vines”. Children. Two smaller ones and one teenager her size. The teenager, Riley, stares at with a blank expression on her face. Then her body moves, or is moved by the tentacle “vines” holding her up. Hair, Alex realizes. He is held by the hair, not wrapped around her like back in the bedroom before Riley was pulled through the window, but growing into her flesh from behind, like thousands tiny marionette strings bunched up in locks. The hair brings Rile's hand up to her side and waves it back and forth, as if in a mocking greeting gesture.
Alex tenses. At any moment, she feels, the figures can leap at her, grab her. But, no, they stay suspended. Then, between them, higher up in the branches the hair moves, like slithering snakes or tentacles moving across each other. A fourth figure is slowly lowering itself from above. The Grin Reaper. Smiling lady with an upside down head. It stops shortly after reaching the same level as the three bodies hanging by its hair. It stares at her, the grin seemingly growing wider and wider without really changing size.
“It’s not real?” Alex, whispers to herself. They aren’t moving any closer, neither the woman nor the bodies suspended by her air. Alex’s hand tightens around her phone. (Phone can’t hallucinate) she thinks to herself. Maybe now they will believe her. She aims her phone right at the woman, her figure, looming above her, looks small on the screen. With a practiced gesture her thumb touches the camera button. As the phone snaps the photo, the screen refreshes showing the things face close up, filling the frame of the phone, as if jumping out at Alex. The girl squeaks, dropping the phone. It lands light up, still illuminating the four figures far above her, as if the woman hasn’t moved despite what the photo showed. Slowly, like a coiling snake, a tentacle-like lock of hair moves up in front of the the woman, pointing at Alex like pulled-back tongue. Then, in a flash, it flies toward her her and Alex’s vision goes black.
#story #shortstory #creepypasta #horror #fiction #writing #nostr
-
![](/static/nostr-icon-purple-64x64.png)
@ 57d1a264:69f1fee1
2025-02-02 00:03:39
![](https://m.stacker.news/75774)
Welcome to the latest updated version of **Stacker News Media Kit & Brand Guidelines `v1.2`**, a pivotal location where all the visual elements find place and help us understand how to use them to have our communications cohesive. SN brand identity is built on simplicity, trust, innovation and a taste of Texas's Wild West. With the following guidelines, as [promised](https://stacker.news/items/855556/r/Design_r?commentId=855753), I'll try to outline the essential elements of SN visual language to be easily usable internally and externally.
As third interaction from the previous [discussion](https://stacker.news/items/786223), here below you will find all the media assets in PNG and SVG downloadable from this [zip file](https://nosto.re/0a8b02224c970de78fba3a0195dcf1ee44d18925ba941724497173b2bcbab901.zip). BTW: I've been using **`Nostr`** 🌸 **Blossom Serverservers** [check them out](https://blossomservers.com/), it's a really cool idea! In case the file will be not available we can always upload it in other servers. Just let me know if any issue downloading it, ideally I made three copies available from:
- https://nosto.re/0a8b02224c970de78fba3a0195dcf1ee44d18925ba941724497173b2bcbab901.zip
- https://blossom.poster.place/0a8b02224c970de78fba3a0195dcf1ee44d18925ba941724497173b2bcbab901.zip
- https://nostr.download/0a8b02224c970de78fba3a0195dcf1ee44d18925ba941724497173b2bcbab901.zip
The source file of all these assets still are the same [Figma file](https://www.figma.com/design/ZL3FLItd9j48pzKVi4qlOy/Stacker.News-Media-Kit?node-id=3-16&t=oEbUcC1tmLDRXgdH-0) and the [PenPot file](https://design.penpot.app/#/workspace/7ad540b5-8190-815d-8005-5685b9c670bc/7ad540b5-8190-815d-8005-5685c186216e?page-id=2643bc5a-0d34-80b2-8005-58099eabda41). This last one, has many issues and does not allow yet the same flexibility as Figma. Both files are open for contributions and comments, just need to register a dummy/anonymous account for each of the tools.
> **Note:** To use these assets across SN, just copy-paste the image relative code, i.e.:
![](https://m.stacker.news/75773)
# Stacker News Logotype
SN logo is the most recognizable visual identifier of Stacker News. It captures the essence of its brand and is to be used across the platform and other marketing materials **consistently**. Find below all the possible variations and colors. Ideally you should stick with it to maintain SN identity coherent, or propose something new if you feel like. If you have any question on how to place or use the logo, DO ask below, and we'll help sort it out.
| Avatar on transparent BG | Avatar on BG | Logo Extended | Logo Vertical |#|
|---|---|---|---|---|
| ![](https://m.stacker.news/75562) `![](https://m.stacker.news/75562)` | ![](https://m.stacker.news/75552) `![](https://m.stacker.news/75552)` | ![](https://m.stacker.news/75555) `![](https://m.stacker.news/75555)`| ![](https://m.stacker.news/75566) `![](https://m.stacker.news/75566)` |Oil Black|
| ![](https://m.stacker.news/75564) `![](https://m.stacker.news/75564)` | ![](https://m.stacker.news/75554) `![](https://m.stacker.news/75554)` | ![](https://m.stacker.news/75557) `![](https://m.stacker.news/75557)` | ![](https://m.stacker.news/75567) `![](https://m.stacker.news/75567)`| Golden Yellow |
| ![](https://m.stacker.news/75563) `![](https://m.stacker.news/75563)` | ![](https://m.stacker.news/75553) `![](https://m.stacker.news/75553)` | ![](https://m.stacker.news/75565) `![](https://m.stacker.news/75565)` | ![](https://m.stacker.news/75568) `![](https://m.stacker.news/75568)`|With Shadow |
# Stacker News Typography
![](https://m.stacker.news/75569)
This is the typography SN had used to create its logo. [Download LightningVolt OpenType Font file.otf](http://honeyanddeath.web.fc2.com/FontFile/honeyanddeath_Lightningvolt.zip) designed by **[Honey&Death](http://honeyanddeath.web.fc2.com/fnt_Lightningvolt.html)**, install it in your computer and play with it.
Typography is essential to identify, increase readability and create consistency of brands. SN uses the default `font-family:sans-serif;` of your device's OS, usually are the most common and already installed in your device: `system-ui, "Segoe UI", Roboto, "Helvetica Neue", "Noto Sans", "Liberation Sans", Arial, sans-serif, "Apple Color Emoji", "Segoe UI Emoji", "Segoe UI Symbol", "Noto Color Emoji"`. Those are mostly used for:
# Example Header H1
## Example Header H2
### Example Header H3
#### Example Header H4
##### Example Header H5
**Example paragraph text**
The fonts selected will help to communicate the personality of the brand and provide maximum legibility for both print and screen.
`Example <code>`
For code, the approach is the same. Let's the device OS select its default `monospace` one. For example, on Mac will be one of the following:
```
SFMono-Regular, Menlo, Monaco, Consolas, "Liberation Mono", "Courier New",`
```
# Stacker News Colors
A thoughtfully curated color palette gives SN trust, professionalism, and approachability. Colors play a key role in creating consistent visual experiences through digital and print communications. Make sure you are using the right color codes below:
| # | Name | HEX code | RGB code | HLS |
|---|---|---|---|---|
| ![](https://m.stacker.news/75602) | Bitcoin-only | `#F6911D` | `rgb(246,145,29)` | `hsl(32,92.3%,53.9%)` |
| ![](https://m.stacker.news/75590) | Blackr | `#000000` | `rgb(0,0,0)` | `hsl(0,0%,0%)` |
| ![](https://m.stacker.news/75591) | Dark | `#121214` | `rgb(18,18,20)` | `hsl(240,5.3%,7.5%)` |
| ![](https://m.stacker.news/75592) | Gold | `#FADA5E` | `rgb(250,218,94)` | `hsl(48,94%,67.5%)` |
| ![](https://m.stacker.news/75593) | Gray | `#969696` | `rgb(150,150,150)` | `hsl(0,0%,58.8%)` |
| ![](https://m.stacker.news/75594) | Light | `#F0F0F0` | `rgb(240,240,240)` | `hsl(0,0%,94.1%)` |
| ![](https://m.stacker.news/75595) | Nostrch | `#8C25F4` | `rgb(140,37,244)` | `hsl(270,90.4%,55.1%)` |
| ![](https://m.stacker.news/75596) | Pinkish | `#E685B5` | `rgb(230,133,181)` | `hsl(330,66%,71.2%)` |
| ![](https://m.stacker.news/75597) | Ruby | `#C03221` | `rgb(192,50,33)` | `hsl(6,70.7%,44.1%)` |
| ![](https://m.stacker.news/75598) | Sky Hover | `#007CBE` | `rgb(0,124,190)` | `hsl(201,100%,37.3%)` |
| ![](https://m.stacker.news/75599) | Sky Links | `#2E99D1` | `rgb(46,153,209)` | `hsl(201,63.9%,50%)` |
| ![](https://m.stacker.news/75600) | Sky Visited | `#56798E` | `rgb(86,121,142)` | `hsl(203,24.6%,44.7%)` |
| ![](https://m.stacker.news/75601) | So Fiat | `#5C8001` | `rgb(92,128,1)` | `hsl(77,98.4%,25.3%)` |
# Stacker News Icons
SN utilizes a set of bespoke icons that support its communication internally across the platform. Icons help bring instant, intuitive cues for various types of content and features. We share them here for you so you can use as you wish and satisfy your creative needs.
| ![Arrow](https://m.stacker.news/75605) `![Arrow](https://m.stacker.news/75605)` | ![Bell](https://m.stacker.news/75606) `![Bell](https://m.stacker.news/75606)` | ![Bounty](https://m.stacker.news/75607) `[Bounty](https://m.stacker.news/75607)` | ![Caret](https://m.stacker.news/75608) `[Caret](https://m.stacker.news/75608)` | ![Cowboy](https://m.stacker.news/75609) `[Cowboy](https://m.stacker.news/75609)` | ![Sun](https://m.stacker.news/75610) `[Sun](https://m.stacker.news/75610)` |
|---|---|---|---|---|---|
| ![Edit](https://m.stacker.news/75611) **`[Edit](https://m.stacker.news/75611)`** | ![Gun](https://m.stacker.news/75612) **`[Gun](https://m.stacker.news/75612)`** | ![Horse](https://m.stacker.news/75613) **`[Horse](https://m.stacker.news/75613)`** | ![Info](https://m.stacker.news/75614) **`[Info](https://m.stacker.news/75614)`** | ![Moon](https://m.stacker.news/75615) **`[Moon](https://m.stacker.news/75615)`** | ![Lightning](https://m.stacker.news/75616) **`[Lightning](https://m.stacker.news/75616)`**|
| ![Bald Lost Hat](https://m.stacker.news/75617) **`[Bald Lost Hat](https://m.stacker.news/75617)`**| ![Markdown](https://m.stacker.news/75618) **`[Markdown](https://m.stacker.news/75618)`**| ![Nostr](https://m.stacker.news/75619) **`[Nostr](https://m.stacker.news/75619)`**| ![Referral](https://m.stacker.news/75620) **`[Referral](https://m.stacker.news/75620)`**| ![Rewards](https://m.stacker.news/75621) **`[Rewards](https://m.stacker.news/75621)`**| ![Horse Lost Saddle](https://m.stacker.news/75622) **`[Horse Lost Saddle](https://m.stacker.news/75622)`**| ![Search](https://m.stacker.news/75623) **`[Search](https://m.stacker.news/75623)`** |
|![Shoot](https://m.stacker.news/75624) **`[Shoot](https://m.stacker.news/75624)`** |![Texas](https://m.stacker.news/75625) **`[Texas](https://m.stacker.news/75625)`** | ![Upload](https://m.stacker.news/75626) **`[Upload](https://m.stacker.news/75626)`** | ![Zap Zap](https://m.stacker.news/75627) **`[Zap Zap](https://m.stacker.news/75627)`** |||
# Stacker News Banners
Banners are important visual elements used in our digital platforms and marketing materials. They help to highlight key stories, features or announcements while maintaining our brand aesthetic.
Here below you'll find custom banners for Sn and for individial territories. I try to build those that I follow most, for now @AGORA is the only one that designed its own banners. Comment below if you'd like some banners for your territory!
#### SN Dark background
|970x250|
|---|
|![](https://m.stacker.news/75654) `![](https://m.stacker.news/75654` |
|250x250|300x250|300x600|
|---|---|---|
|![](https://m.stacker.news/75656)`![](https://m.stacker.news/75656)`|![](https://m.stacker.news/75657)`![](https://m.stacker.news/75657)`|![](https://m.stacker.news/75658)`![](https://m.stacker.news/75658)`|
|728x90|
|---|
| ![](https://m.stacker.news/75655) `![](https://m.stacker.news/75655)` |
#### SN Gold background
|970x250|
|---|
|![](https://m.stacker.news/75641)`![](https://m.stacker.news/75641)` |
|250x250|300x250|300x600|
|---|---|---|
|![](https://m.stacker.news/75645)`![](https://m.stacker.news/75645)` | ![](https://m.stacker.news/75646)`![](https://m.stacker.news/75646)` |![](https://m.stacker.news/75647)`![](https://m.stacker.news/75647)` |
|728x90|
|---|
|![](https://m.stacker.news/75648)`![](https://m.stacker.news/75648)` |
#### SN by @Jon_Hodl
|970x250|
|---|
| ![](https://m.stacker.news/75649)`![](https://m.stacker.news/75649)` |
|250x250|300x250|300x600|
|---|---|---|
| ![](https://m.stacker.news/75651)`![](https://m.stacker.news/75651)` | ![](https://m.stacker.news/75652) `![](https://m.stacker.news/75652)`| ![](https://m.stacker.news/75653)`![](https://m.stacker.news/75653)` |
|728x90|
|---|
|![](https://m.stacker.news/75650)`![](https://m.stacker.news/75650)` |
#### ~AGORA territory
The SN P2P Marketplace
|970x250|
|---|
| ![](https://m.stacker.news/75767)`![](https://m.stacker.news/75767)` |
|250x250|300x250|300x600|
|---|---|---|
| ![](https://m.stacker.news/75769)`![](https://m.stacker.news/75769)` | ![](https://m.stacker.news/75770)`![](https://m.stacker.news/75770)`|![](https://m.stacker.news/75771)`![](https://m.stacker.news/75771)`|
|728x90|
|---|
| ![](https://m.stacker.news/75768)`![](https://m.stacker.news/75768)`|
#### ~alter_native territory
|970x250|
|---|
| ![](https://m.stacker.news/75669)`![](https://m.stacker.news/75669)`|
|250x250|300x250|300x600|
|---|---|---|
|![](https://m.stacker.news/75671)`![](https://m.stacker.news/75671)`|![](https://m.stacker.news/75672)`![](https://m.stacker.news/75672)`|![](https://m.stacker.news/75673)`![](https://m.stacker.news/75673)`|
|728x90|
|---|
|![](https://m.stacker.news/75670)`![](https://m.stacker.news/75670)` |
#### ~bitcoin_beginners
|970x250|
|---|
| ![](https://m.stacker.news/75676)`![](https://m.stacker.news/75676)` |
|250x250|300x250|300x600|
|---|---|---|
| ![](https://m.stacker.news/75677)`![](https://m.stacker.news/75677)`|![](https://m.stacker.news/75678)`![](https://m.stacker.news/75678)`|![](https://m.stacker.news/75679)`![](https://m.stacker.news/75679)` |
|728x90|
|---|
| ![](https://m.stacker.news/75675)`![](https://m.stacker.news/75675)`|
#### ~Design territory
|970x250|
|---|
|![](https://m.stacker.news/75659)`![](https://m.stacker.news/75659)`|
|250x250|300x250|300x600|
|---|---|---|
|![](https://m.stacker.news/75661)`![](https://m.stacker.news/75661)`|![](https://m.stacker.news/75662)`![](https://m.stacker.news/75662)`|![](https://m.stacker.news/75663)`![](https://m.stacker.news/75663)`|
|728x90|
|---|
|![](https://m.stacker.news/75660)`![](https://m.stacker.news/75660)`|
#### ~Music territory
|970x250|
|---|
| ![](https://m.stacker.news/75664)`![](https://m.stacker.news/75664)`|
|250x250|300x250|300x600|
|---|---|---|
|![](https://m.stacker.news/75666)`![](https://m.stacker.news/75666)`|![](https://m.stacker.news/75667)`![](https://m.stacker.news/75667)`|![](https://m.stacker.news/75668)`![](https://m.stacker.news/75668)`|
|728x90|
|---|
| ![](https://m.stacker.news/75665)`![](https://m.stacker.news/75665)`|
# Anything else we could add?
If you feel something is missing, or you know a better tool to manage this media kit for SN in a collaborative and FOSS way then, DO share it in a comment below
Territory owners [^1], do you need banners for your territory? Feel free to edit the figma file liked above or comment below sharing your needs or ideas, I'll try to do something for you.
By following these guidelines, we ensure consistency and professionalism in every case where Stacker News is represented here internally to stackers or to our audience in the KYC internet, reinforcing SN credibility as a trusted source for data-driven journalism.
[^1]: FYI: @Aardvark @AGORA @anna @antic @AtlantisPleb @Bell_curve @benwehrman @bitcoinplebdev @Bitter @BlokchainB @ch0k1 @davidw @ek @elvismercury @frostdragon @grayruby @HODLR @inverselarp @Jon_Hodl @k00b @marks @MaxAWebster @mega_dreamer @niftynei @nout @OneOneSeven @OT @PlebLab @Public_N_M_E @RDClark @realBitcoinDog @roytheholographicuniverse @siggy47 @softsimon @south_korea_ln @theschoolofbitcoin @TNStacker @UCantDoThatDotNet @Undisciplined
originally posted at https://stacker.news/items/872925
-
![](/static/nostr-icon-purple-64x64.png)
@ 961e8955:d7fa53e4
2025-02-01 23:20:53
"@YakiHonne community partners successfully convened a seminal Nostr101 meetup in Barnawa, Nigeria! Donning bespoke YakiHonne Nigeria Limited Edition T-shirts, the Purple Army infused the town with infectious energy.
Facilitated by @Olaoluwa Ezekiel Michael, this gathering leveraged YakiHonne's decentralized platform to foster unbridled dialogue, idea exchange, and community engagement.
The event's resounding success underscores the burgeoning demand for decentralized solutions in Africa. This milestone marks the inception of a revolutionary movement, empowering voices and fostering collaboration throughout the continent.
#Nostr #DecentralizedRevolution #Africa #CommunityFirst #YakiHonne"
-
![](/static/nostr-icon-purple-64x64.png)
@ 36cf8956:89ebd9ed
2025-02-01 23:18:02
We spent over $20B.
Why? To defend you, our ally, on the invocation of NATO Article 5.
Now America slaps us with a depression-threatening trade war and threats of annexation.
Unappreciative, disgraceful. We won’t forget.
originally posted at https://stacker.news/items/872895
-
![](/static/nostr-icon-purple-64x64.png)
@ e0e92e54:d630dfaa
2025-02-01 22:32:51
# When a Client Wants Out…& A Yellow Flag Appears
This week was an interesting one with a client that wants to exit our agreement early.
*(Totally fine. It happens and usually when one or both parties want to part ways, unless it's marriage, then it's at minimum a Yellow Flag if not a Red Flag that should be observed).*
I tend to work with clients that have multiple irons in the fire, hence why they need someone like me to come along side them and provide guidance and help root them in the area they must focus on.
There is a strong parallel with this irregardless of whether it's #business #life or #impact
This client had big goals, but like many business owners, they defaulted to reactionary decisions instead of a structured plan. That’s when the Yellow Flag turned into a pattern I’ve seen before—Random Acts of X.
# The Cost of Random Acts of X
If your solution is:
A. Throw money at it, and/or
B. Fire, Aim, Ready...instead of Ready, Aim, Fire
This WILL result in Random Acts of X (wherein X is whatever your are focused on, ie Marketing...aka Random Acts of Marketing essentially equates to the proverbial "throw spaghetti on the wall")
*Is that really a thing? Like do Italians or some other cultures actually throw spaghetti on the wall to see if it "sticks"? Inquiring minds want to know! 🤷♂️*
As I mentioned, my clients tend to have a lot of things they are trying to accomplish at once. This leads to fragmented efforts and lack luster results.
That being said, I approach everything as a relationship. Afterall, I believe:
### Leadership = Relationships!
With this particular client there was one project he abruptly ended. Again, that's fine...it's their business...
Since I'm there to help them lead well, I reminded them this is a relationship and asked "What's next that you want me to focus on?"
We got on the same page with the new project and not even 2 days later that's where the Yellow Flag appeared in the form of issue A (just throw money at it).
# Shortcuts Lead to Ghost Towns (Buying Followers Won’t Work)
You see, they wanted me to lead a marketing campaign to build relationships with people their company could sponsor. ***BUT*** they just wanted to "buy followers".
When I noticed one of their social accounts has 28k followers and on average *only 14 impressions per post*...
I asked "How's that working out for ya?"
You see folks, **real relationships take time!**
One cannot simply "throw money at it" and expect sound, sustainable results.
***If you’re buying an audience instead of building one, you won’t have a community—you'll have a ghost town.***
## What Fake Engagement Looks Like in Business & Family
Think of it this way...
Imagine all you did in your family's relationships was throw money at it. You just "bought followers" in the form of taking this trip, buying that thing for them; and you totally avoided the time investment the relationship requires?
Sure...you might have been physically there...but **were you present**?
I run into this often with my son. He wants me to watch him play a video game. And during that time together what is he doing? He keeps looking over his shoulder to make sure I'm paying attention to HIM and not clandestinely on my phone.
Same goes for his Basketball...he wants me there rebounding for him...not sitting in a chair idly watching.
# Are You Present or Just Physically There?
Business Owners and Leaders!
Husbands, Wives, and Parents!
People whom desire to have an impact!
**The Process is the Shortcut!**
Play silly games. Win silly prizes.
Intentionally build relationships. Reap rewards forever.
It's...
That...
Simple...
Easy? Not really...especially for someone like me whom is just as keen to spend time in nature or chillaxing with a cup of coffee on the back porch, thinking (and wishing my garden was growing better LOL).
But simple? Yes!
**Create the process, execute the process, refine the process, and repeat.**
# The Process is the Shortcut...
*Your Next Step: Cut the Shortcuts. Build the Process.*
So—where do you need to refine your process today?
💡 **What’s one way you can be more present in a relationship this week?**
💡 **What can you eliminate to move you closer to real impact—instead of just chasing more?**
🔹 Drop your answer below 👇
-----------
***Jason Ansley** is the founder of **Above The Line Leader**, where he provides tailored leadership support and operational expertise to help business owners, entrepreneurs, and leaders thrive.*
***Want to strengthen your leadership and enhance operational excellence?**
Connect with Jason at https://abovethelineleader.com/contact*
*📌 This article first appeared on Nostr. You can also find more Business Leadership Articles and content at:
👉 https://abovethelineleader.com/business-leadership-articles*
![image](https://yakihonne.s3.ap-east-1.amazonaws.com/e0e92e542d79b28e79c6efe95891d38f49636e48560a8e618b953bded630dfaa/files/1738430406648-YAKIHONNES3.png)
-
![](/static/nostr-icon-purple-64x64.png)
@ 4d4fb5ff:1e821f47
2025-02-01 22:13:43
**Snapshot of a 3D molecular structure.** In bacteria, the enzyme Peptidase E (PepE) is encoded by the gene PEPE. PEPEDASE is an atomic view of PepE enzyme’s spatial architecture based on publicly available scientific data, visually arranged to pay homage to Pepe the Frog. I made this piece in support of Matt Furie’s #SavePepe movement.
<img src="https://i.nostr.build/Lead9.png">
-
![](/static/nostr-icon-purple-64x64.png)
@ dbb19ae0:c3f22d5a
2025-02-01 21:51:44
List of Wordpress articles:
- https://alashazam.wordpress.com/2024/07/01/python-nostr/
- https://alashazam.wordpress.com/2024/07/02/python-nostr-2/
- https://alashazam.wordpress.com/2024/07/03/python-nostr-second-program/
- https://alashazam.wordpress.com/2024/07/04/python-nostr-sdk/
- https://alashazam.wordpress.com/2024/07/04/python-nostr-third-program/
- https://alashazam.wordpress.com/2024/07/05/python-nostr-guessing-the-npub/
- https://alashazam.wordpress.com/2024/07/06/python-nostr_sdk-fetching-metadata/
- https://alashazam.wordpress.com/tag/python/
-----------
```python
#!/usr/bin/env python3
"""
Fetches the joined date from a Nostr profile and calculates the days since account creation.
Usage:
python fetch_joined_date.py [npub]
Arguments:
npub : The public key of the user (in npub format).
Requirements:
- nostr_sdk library
- Python 3.x
Example:
python fetch_joined_date.py npub1...
"""
import argparse
import time
import ssl
import json
import uuid
import logging
from datetime import datetime
from nostr.event import EventKind
from nostr.relay_manager import RelayManager
from nostr.key import PublicKey
from nostr.filter import Filter, Filters
from nostr.message_type import ClientMessageType
# Configure logging
logging.basicConfig(level=logging.INFO, format="%(levelname)s: %(message)s")
RELAY_URL = "wss://relay.damus.io"
def fetch_metadata(npub):
"""Fetches metadata from a Nostr profile given an npub key."""
pub_key = PublicKey.from_npub(npub)
filters = Filters([Filter(authors=[pub_key.hex()], kinds=[EventKind.SET_METADATA])])
subscription_id = uuid.uuid1().hex
request = [ClientMessageType.REQUEST, subscription_id, *filters.to_json_array()]
relay_manager = RelayManager()
relay_manager.add_relay(RELAY_URL)
relay_manager.add_subscription(subscription_id, filters)
try:
relay_manager.open_connections({"cert_reqs": ssl.CERT_NONE})
time.sleep(1) # Allow time for connection
relay_manager.publish_message(json.dumps(request))
time.sleep(1) # Allow time for response
while relay_manager.message_pool.has_events():
event_msg = relay_manager.message_pool.get_event()
metadata = json.loads(event_msg.event.content)
return metadata
except Exception as e:
logging.error(f"Error fetching metadata: {e}")
finally:
relay_manager.close_connections()
return None
def fetch_joined_date(npub):
"""Retrieves the joined date of a Nostr profile and calculates days since creation."""
metadata = fetch_metadata(npub)
if not metadata or "created_at" not in metadata:
logging.warning("Could not retrieve metadata or 'created_at' field is missing.")
return
try:
created_at = int(metadata["created_at"])
created_date = datetime.utcfromtimestamp(created_at)
days_since_creation = (datetime.utcnow() - created_date).days
logging.info(f"Account created on: {created_date.strftime('%Y-%m-%d %H:%M:%S UTC')}")
logging.info(f"Days since account creation: {days_since_creation}")
except (ValueError, TypeError):
logging.error("Invalid 'created_at' timestamp.")
if __name__ == "__main__":
parser = argparse.ArgumentParser(description="Fetch the joined date from a Nostr profile.")
parser.add_argument("npub", type=str, help="The public key of the user (in npub format).")
args = parser.parse_args()
fetch_joined_date(args.npub)
```
-
![](/static/nostr-icon-purple-64x64.png)
@ 20e17dd0:2ae504d7
2025-02-01 21:14:41
## 1. Hardware Selection
It is important to select adequately the hardware that will be used to build your Node. The Node will be running 24h /7 days and will countain your lightning channels. It is important to use high quality hardware and spend the extra dollars for it.
At the time of building my Node, there was a shortage of Raspberry Pi and I was looking for an optimal alternative. I have decided to go ahead and purchase a used Mac Mini (late 2012).
It is recommended NOT to purchase a Mac Mini newer than 2012 (i.e 2014 and up) because Apple started to solder the RAM to the Logic Board after 2012. The Mac Mini Late 2012 is the last model that is fully customizable with SSD and RAM upgrades.
Here is the list of hardware that will be used in this build:
* 2 x 8G DDR3L Sodim 1600Mhz 1.35V
* 1 x Mac Mini (Late 2012) 2.5Ghz
* 1 x Samsung Evo 870 1Tb SSD ^
^ Note: As discussed earlier, it is important to select hardware of quality. I had initially purchased a low cost 2Tb SSD but it failed while trying to download the Bitcoin blockchain.
##2. Hardware Upgrade
To facilitate the upgrade of the hardware, you will need the proper tools to remove some T6 & T8 screws.
Here are the steps to dismount the few components of the Mac Mini to upgrade the hardware:
1. Unplug the Mac Mini.
2. Turn it upside down with the black cover facing up.
3. Put your thumbs in the 2 grooves of the cover and turn the piece counterclockwise.
![](https://nostr.build/i/ed7eb6c4132966df674a8d42fffa540d8ca6e6ff995a42494be50a9020859b45.jpg)
4. Remove the cover.
5. Remove 3 x T6 screws holding the fan.
![](https://nostr.build/i/0102a0456ef063770b1628bba695f85befc3299e09682701236ad79b6b9c700f.jpg)
6. Lift the fan and disconnect the connector by pulling gently straight up the wires.
7. Remove 1x T6 screw at the bottom of the shroud (black plastic piece on the left of the fan).
![](https://nostr.build/i/7a541ef3a9488560b546d01a3efe4234b2bedde9c301ad00461f776a8246ae26.jpg)
8. Remove the shroud by holding the top right part with your fingers and turning it clockwise.
![](https://nostr.build/i/d371f164efe399d71776e681895ed5fb13135225ecad224a67b1d919bf8fc2a9.jpg)
9. Remove 4 x T8 screws of the grill WIFI cover.
![](https://nostr.build/i/1b0bb5dea1b947d36e9529e5f4be666a535c67c200c8d1df0c3a95b49586aa2b.jpg)
10. The top of the grill is mounted under the Mac Mini case. Lift gently the bottom of the grill and pull towards yourself to remove the grill.
11. Move the grill aside, you do not have to disconnect the WIFI sensor, just be careful.
### 2.1 Upgrading the RAM
The RAM is visible and accessible from the moment you remove the cover. Simply release each RAM by releasing the clips on the side. Once disengaged, the RAM will spring in a 45-degree angle. Remove it and put back the upgraded RAM at a 45 degree angle and push it down for it to clip.
### 2.2 Upgrading the SSD
It is important to note that the Mac Mini has 2 SSD bay. They are referred to as the “upper bay” and “lower bay”. Since we have flipped the Mac Mini upside down to remove the bottom cover, the “upper bay” is located under the “lower bay”.
The “upper bay” is mounted with an expansion kit that holds the SSD in position whereas the “lower bay” SSD is simply resting on top of the “upper bay” SSD.
One important aspect is that the connecting cables for the “lower bay” and “upper bay” SSD are not the same. The “upper bay” SSD connects on the logic board on the right and the “lower bay” SSD cable connects on the left. Removing the “upper bay” SSD requires removing the logic board therefore requires more work. It is recommended to install the new SSD in the “lower” bay. Here are the 2 scenarios:
1.Your Mac Mini has already a Hard Drive installed in the “lower” bay. In that case insert a credit card under the HD and gently pry it upwards. You will be able to slide it out of the bay. The reason to pry it gently is because since there is no “upper” bay drive, The HD is being held in the air by 2 screws on the side that are aligned in 2 holes in the Mac Mini case. Once the HD is removed, transfer the connecting cable and the 2 screws to the new SSD. To put back the new SSD, it is easier to rotate the Mac Mini 90 degree and have the mounting holes at the bottom and use the gravity to get the 2 mounting screws in the holes. After, connect the connector to the logic board.
2. Your Mac Mini has already a Hard Drive installed in the “upper bay”? Leave it there, you do not need mounting screws, but you need a new connecting cable. You will have to buy a “lower bay connector”. Once installed on the SSD, slide the SSD on top of the original one. The connector will plug on the logic board on the left of the “upper bay” SSD connector.
A good preparation would be to go in “Disk Utility” menu on MacOS and search for “upper” or “lower” position before starting to disassemble.
Reassemble everything and you are done.
-
![](/static/nostr-icon-purple-64x64.png)
@ be41636e:e55c4909
2025-02-01 18:51:52
## **Will Quantum Computers Kill Bitcoin? The Truth May Surprise You**
One of the biggest fears around Bitcoin is that quantum computers (QCs) will render it obsolete. But is this really a legitimate concern, or just another doomsday myth?
### The Real Threat: Not All Quantum Computers Are Equal
First, let’s get one thing straight: **quantum computers already exist**. The first notable ones appeared in the **1990s**, built by IBM and Stanford. So why hasn’t Bitcoin already been hacked? Because it’s not about whether quantum computers exist—it’s about how powerful they need to be.
### Are All Bitcoin Addresses at Risk?
No! If you’ve entered Bitcoin **after 2010** or **use a wallet backed up with 12 or 24 words (BIP-39, introduced in 2013)**, your funds are safe from quantum threats for a very long time—**centuries, at least**.
But why?
### Understanding How Bitcoin’s Security Works
Bitcoin security is based on **private keys**. (These are represented by the **12-24 words** you write down when setting up a wallet.) From this private key, a **public key** is created. In Bitcoin’s early days, people shared public keys directly to receive payments. But in 2010, Bitcoin introduced an extra layer of security: **hashed addresses**.
Now, instead of sharing your public key, your wallet generates a **Bitcoin address**, which is actually a **hash of your public key**. This adds an extra step for an attacker: before they can find your private key, they must first break the hash to reveal your public key.
### Two Steps to Breaking Bitcoin
To steal Bitcoin using quantum computing, an attacker must:
1. **Break the hash** (Bitcoin address → public key) using **Grover’s algorithm**.
2. **Break the elliptic curve cryptography** (public key → private key) using **Shor’s algorithm**.
### Where Do Quantum Computers Stand Today?
Let’s put things in perspective. **Google’s Willow processor**, which made headlines recently, has **105 physical qubits**. But breaking Bitcoin’s **elliptic curve cryptography** (step 2 above) requires about **2,330 logical qubits**, running for **minutes to hours**.
So how does 105 physical qubits compare to 2,330 logical qubits? It’s **not even in the same league**. To get 2,330 logical qubits, we'd likely need **millions of physical qubits**—a technology that is still decades away.
Now, even if we magically reached **2,330 logical qubits tomorrow**, that only breaks **public keys**. It still wouldn't be enough to break Bitcoin addresses (step 1), which would take **centuries** with current quantum algorithms.
### Who Should Be Worried?
- **People who used Bitcoin before 2010** and still have funds sitting in old public-key-based addresses (**P2PK** addresses). Their funds could be stolen **in minutes to hours** if a powerful enough quantum computer emerged.
- **People who reuse addresses**—this exposes the public key, making it vulnerable to a quantum attack, even when you are using more modern addresses. **(Many wallets, including Trust Wallet, SafePal, Exodus, and Atomic Wallet, still allow this bad practice!)**
### Who Can Sleep Soundly?
- **Anyone using modern Bitcoin addresses (P2PKH, SegWit, Taproot)**. Their addresses are **hashed**, meaning an attacker would need **centuries** to break the first layer of protection before even getting to the public key.
- **Anyone moving their coins periodically**—since modern Bitcoin wallets generate new addresses for each transaction, public keys remain hidden.
### The Concrete Wall Analogy
Think of your Bitcoin private key as being locked inside a massive vault. The first layer of protection is your Bitcoin address, which acts like a thick concrete wall. Cracking through this wall with current quantum algorithms would take centuries. Even if someone managed to break through, they would still face a second, much thinner barrier—your public key. This one would take only minutes to hours to breach. But by then, Bitcoin security upgrades would likely already be in place, leaving attackers empty-handed.
### But What If We Make a Huge Quantum Leap?
Yes, it’s possible that new quantum algorithms emerge, or that quantum hardware advances faster than expected. But Bitcoin’s development community isn’t sitting idle, waiting to get wrecked. There are already proposals for **quantum-resistant Bitcoin addresses**, and they can be implemented **before** quantum computers reach a dangerous level.
### The Bottom Line
🚀 **Quantum computers won’t kill Bitcoin anytime soon.**
📌 If you’re using a **modern Bitcoin wallet**, your funds are safe from quantum threats for the foreseeable future.
📌 If you reuse addresses, stop! It exposes your public key and makes you vulnerable much sooner.
📌 Bitcoin developers are already preparing for a quantum-resistant future.
So, no, quantum computers won’t be the end of Bitcoin. But they might be the end of bad security practices! 🔐
-
![](/static/nostr-icon-purple-64x64.png)
@ b17fccdf:b7211155
2025-02-01 18:41:27
#### **Next new resources about the MiniBolt guide have been released**:
---
* 🆕 **Roadmap**: [LINK](https://github.com/orgs/minibolt-guide/projects/1)
* 🆕 **Dynamic Network map**: [LINK](https://app.diagrams.net/?tags={}&lightbox=1&target=blank&highlight=0000ff&edit=_blank&layers=1&nav=1&title=networkmap.drawio.png#Uhttps://raw.githubusercontent.com/minibolt-guide/minibolt/main/resources/networkmap.drawio.png)
* 🆕 **Nostr community**: [LINK](https://habla.news/c/[n]addr1qqyy66twd9px7mr5qyf8wumn8ghj7mmxve3ksctfdch8qatzqgstzl7vmurm5gu87qutx3pxwgxddrg39huj809zhmv03scfkus3z4grqsqqpphk2j0aff) < ~ REMOVE the "[]" symbols from the URL (naddr...) to access
* 🆕 **Linktr FOSS** (UC) by [Gzuuus](nostr:npub1gzuushllat7pet0ccv9yuhygvc8ldeyhrgxuwg744dn5khnpk3gs3ea5ds): [LINK](https://linktr.minibolt.info)
* 🆕 **Donate webpage**: 🚾 [Clearnet LINK](https://donate.minibolt.info) || 🧅 [Onion LINK](http://3iqm7nidexns5p6wmgc23ibgiscm6rge7hwyeziviwgav4fl7xui4mqd.onion/apps/Li3AtEGDsqNmNddv6rX69taidm3/pos)
* 🆕 **Contact email**: [hello@minibolt.info](mailto:hello@minibolt.info)
---
Enjoy it MiniBolter! 💙
-
![](/static/nostr-icon-purple-64x64.png)
@ be41636e:e55c4909
2025-02-01 18:35:06
One of the biggest fears around Bitcoin is that quantum computers (QCs) will render it obsolete. But is this really a legitimate concern, or just another doomsday myth?
### The Real Threat: Not All Quantum Computers Are Equal
First, let’s get one thing straight: **quantum computers already exist**. The first notable ones appeared in the **1990s**, built by IBM and Stanford. So why hasn’t Bitcoin already been hacked? Because it’s not about whether quantum computers exist—it’s about how powerful they need to be.
### Are All Bitcoin Addresses at Risk?
No! If you’ve entered Bitcoin **after 2010** or **use a wallet backed up with 12 or 24 words (BIP-39, introduced in 2013)**, your funds are safe from quantum threats for a very long time—**centuries, at least**.
But why?
### Understanding How Bitcoin’s Security Works
Bitcoin security is based on **private keys**. (These are represented by the **12-24 words** you write down when setting up a wallet.) From this private key, a **public key** is created. In Bitcoin’s early days, people shared public keys directly to receive payments. But in 2010, Bitcoin introduced an extra layer of security: **hashed addresses**.
Now, instead of sharing your public key, your wallet generates a **Bitcoin address**, which is actually a **hash of your public key**. This adds an extra step for an attacker: before they can find your private key, they must first break the hash to reveal your public key.
### Two Steps to Breaking Bitcoin
To steal Bitcoin using quantum computing, an attacker must:
1. **Break the hash** (Bitcoin address → public key) using **Grover’s algorithm**.
2. **Break the elliptic curve cryptography** (public key → private key) using **Shor’s algorithm**.
### Where Do Quantum Computers Stand Today?
Let’s put things in perspective. **Google’s Willow processor**, which made headlines recently, has **105 physical qubits**. But breaking Bitcoin’s **elliptic curve cryptography** (step 2 above) requires about **2,330 logical qubits**, running for **minutes to hours**.
So how does 105 physical qubits compare to 2,330 logical qubits? It’s **not even in the same league**. To get 2,330 logical qubits, we'd likely need **millions of physical qubits**—a technology that is still decades away.
Now, even if we magically reached **2,330 logical qubits tomorrow**, that only breaks **public keys**. It still wouldn't be enough to break Bitcoin addresses (step 1), which would take **centuries** with current quantum algorithms.
### Who Should Be Worried?
- **People who used Bitcoin before 2010** and still have funds sitting in old public-key-based addresses (**P2PK** addresses). Their funds could be stolen **in minutes to hours** if a powerful enough quantum computer emerged.
- **People who reuse addresses**—this exposes the public key, making it vulnerable to a quantum attack, even when you are using more modern addresses. **(Many wallets, including Trust Wallet, SafePal, Exodus, and Atomic Wallet, still allow this bad practice!)**
### Who Can Sleep Soundly?
- **Anyone using modern Bitcoin addresses (P2PKH, SegWit, Taproot)**. Their addresses are **hashed**, meaning an attacker would need **centuries** to break the first layer of protection before even getting to the public key.
### The Concrete Wall Analogy
Think of your Bitcoin private key as being locked inside a massive vault. The first layer of protection is your Bitcoin address, which acts like a thick concrete wall. Cracking through this wall with current quantum algorithms would take centuries. Once one breaks through this wall, they would face a second wall, which is a much thinner barrier—your public key. This one would take only minutes to hours to breach.
### But What If We Make a Huge Quantum Leap?
Yes, it’s possible that new quantum algorithms emerge, or that quantum hardware advances faster than expected. But Bitcoin’s development community isn’t sitting idle, waiting to get wrecked. There are already proposals for **quantum-resistant Bitcoin addresses**, and they can be implemented **before** quantum computers reach a dangerous level.
### The Bottom Line
🚀 **Quantum computers won’t kill Bitcoin anytime soon.**
📌 If you’re using a **modern Bitcoin wallet**, your funds are safe from quantum threats for the foreseeable future.
📌 If you reuse addresses, stop! It exposes your public key and makes you vulnerable much sooner.
📌 Bitcoin developers are already preparing for a quantum-resistant future.
So, no, quantum computers won’t be the end of Bitcoin. But they might be the end of bad security practices! 🔐
-
![](/static/nostr-icon-purple-64x64.png)
@ b17fccdf:b7211155
2025-02-01 18:28:39
---
##### Check out the **MiniBolt guide** -> [HERE](https://minibolt.info) <-
---
* **Core guides**
* [**System**](https://minibolt.minibolt.info/system/system)
* [Preparations](https://minibolt.minibolt.info/system/system/preparations)
* [Operating System](https://minibolt.minibolt.info/system/system/operating-system)
* [Remote access](https://minibolt.minibolt.info/system/system/remote-access)
* [Configuration](https://minibolt.info/guide/system/configuration)
* [Security](https://minibolt.minibolt.info/system/system/security)
* [Privacy](https://minibolt.minibolt.info/system/system/privacy)
* [**Bitcoin**](https://minibolt.minibolt.info/bitcoin/bitcoin)
* [Bitcoin client](https://minibolt.minibolt.info/bitcoin/bitcoin/bitcoin-client) (Bitcoin Core)
* [Electrum server](https://minibolt.minibolt.info/bitcoin/bitcoin/electrum-server) (Fulcrum)
* [Desktop signing app](https://minibolt.minibolt.info/bitcoin/bitcoin/desktop-signing-app-sparrow) (Sparrow Wallet)
* [Blockchain explorer](https://minibolt.minibolt.info/bitcoin/bitcoin/blockchain-explorer) (BTC RPC Explorer)
* [**Lightning**](https://minibolt.minibolt.info/lightning/lightning)
* [Lightning client](https://minibolt.minibolt.info/lightning/lightning/lightning-client) (LND)
* [Channel backup](https://minibolt.minibolt.info/lightning/lightning/channel-backup)
* [Web app](https://minibolt.minibolt.info/lightning/lightning/web-app) (ThunderHub)
* [Mobile app](https://minibolt.minibolt.info/lightning/lightning/mobile-app) (Zeus)
* **Bonus guides**
* [**System bonus guide**](https://minibolt.minibolt.info/bonus-guides/system)
* **Dashboard & Appearance**
* [Pimp the command line](https://minibolt.minibolt.info/bonus-guides/system/command-line)
* [System Overview](https://minibolt.minibolt.info/bonus-guides/system/system-overview)
* **System Administration**
* [Aliases](https://minibolt.minibolt.info/bonus-guides/system/aliases)
* [Statip IP & custom DNS servers](https://minibolt.minibolt.info/bonus-guides/system/static-ip-and-custom-dns-servers)
* **Install / Update / Uninstall common languages**
* [Node.js + NPM](https://minibolt.minibolt.info/bonus-guides/system/nodejs-npm)
* [Rustup + Cargo](https://minibolt.minibolt.info/bonus-guides/system/rustup-+-cargo)
* [Go!](https://minibolt.minibolt.info/bonus-guides/system/go)
* **Databases**
* [PostgreSQL](https://minibolt.minibolt.info/bonus-guides/system/postgresql)
* **Security**
* [SSH Keys](https://minibolt.info/guide/bonus/system/ssh-keys.html)
* [WireGuard VPN](https://minibolt.info/guide/bonus/system/wireguard-VPN.html)
* [Cloudflare Tunnel](https://minibolt.minibolt.info/bonus-guides/system/cloudflare-tunnel)
* **Resilience**
* [Tor services: bridges & relays](https://minibolt.minibolt.info/bonus-guides/system/tor-services)
* **Hardware**
* [Store data in a secondary disk](https://minibolt.minibolt.info/bonus-guides/system/store-data-secondary-disk)
* [**Bitcoin bonus guides**](https://minibolt.minibolt.info/bonus-guides/bitcoin)
* **Electrum servers**
* [Electrs](https://minibolt.minibolt.info/bonus-guides/bitcoin/electrs)
* **Signing apps**
* **Desktop**
* [Electrum Wallet Desktop](https://minibolt.minibolt.info/bonus-guides/bitcoin/electrum-wallet-desktop)
* **Decentralized exchange**
* [Bisq](https://minibolt.minibolt.info/bonus-guides/bitcoin/bisq)
* **Resilience**
* [Safu Ninja](https://minibolt.minibolt.info/bonus-guides/bitcoin/safu-ninja)
* [Ordisrespector](https://minibolt.minibolt.info/bonus-guides/bitcoin/ordisrespector)
* **Fun**
* [Download the white paper](https://minibolt.minibolt.info/bonus-guides/bitcoin/white-paper)
* **Testnet**
* [MiniBolt on Testnet](https://minibolt.minibolt.info/bonus-guides/bitcoin/minibolt-on-testnet)
* **Payment processors**
* [BTCPay Server](https://minibolt.minibolt.info/bonus-guides/bitcoin/btcpay-server)
* [**Nostr bonus guides**](https://minibolt.minibolt.info/bonus-guides/nostr)
* **Relays**
* [Nostr relay](https://minibolt.minibolt.info/bonus-guides/bitcoin/nostr-relay)
---
🏗️ [Roadmap](https://github.com/orgs/minibolt-guide/projects/1) | 🌐 [Dynamic Network map](https://app.diagrams.net/?tags={}&lightbox=1&target=blank&highlight=0000ff&edit=_blank&layers=1&nav=1&title=networkmap.drawio.png#Uhttps://raw.githubusercontent.com/minibolt-guide/minibolt/main/resources/networkmap.drawio.png) | 🔧 [Issues](https://github.com/minibolt-guide/minibolt/issues) | 📥 [Pull requests](https://github.com/minibolt-guide/minibolt/pulls) | 🗣️ [Discussions](https://github.com/orgs/minibolt-guide/discussions)
---
By [**⚡2FakTor⚡**](nostr:npub1k9luehc8hg3c0upckdzzvusv66x3zt0eyw7290kclrpsndepz92sfcpp63)
---
**Last updated:** 22/12/2024
-
![](/static/nostr-icon-purple-64x64.png)
@ d57360cb:4fe7d935
2025-02-01 18:22:10
What is life but a preparation for the grand finale.
Think of your life up to this point. You’ve been living in the midst of death whether you pay attention to it or not.
Your youth faded, the years go by, relationships fail, careers fail, people die, the ones close to you and those you hardly know. Civilizations wiped out, total species completely gone with no trace.
Here you are in the midst of death. A vortex of change wiping everything in its path. Creating space for the unknown and new. Nothing lasts, nothing stays the same, everything ends. Ending gives great significance to life.
How will you be in the presence of someone you love knowing they or you will vanish one day?
What wouldn’t you put off if you were aware your time was slipping and there’s nothing you can do.
What would you stop doing?
What would you let go of?
Who would you forgive?
Life comes with a bullet and it has your name on it. You don’t know when it’ll happen.
Don’t believe you ever have time it’s always a fantasy. Death will knock you on your feet when you least expect it.
Use death as a doorway to a deep meaningful life.
-
![](/static/nostr-icon-purple-64x64.png)
@ cff1720e:15c7e2b2
2025-02-01 17:37:00
Am 4. Oktober 1957 sendete Sputnik 1 erste Signale aus dem All. Die Welt war fasziniert, die Amerikaner geschockt, da die Russen sie in der Raumfahrt technologisch überholt hatten. Es folgte der Wettlauf im All mit Apollo-Programm und Mondlandung 1969. Am 27. Januar 2025 erlebte die USA einen weiteren Sputnik-Moment, diesmal durch die chinesische KI-App deepseek R1. Diese App schoss wenige Stunden nach ihrem Start auf Platz 1 der App-Stores, vorbei an dem bisherigen KI-Spitzenreiter ChatGPT. Die Aktie des KI-Chipherstellers Nvidia verlor 17% (600 Mrd. USD Börsenwert), das war der bisher höchste Tagesverlust des US-Aktienmarktes. Marc Andreessen verwendete gar die Formulierung “Sputnik-Schock", diese einseitige Sichtweise erschwert aber eine Betrachtung aus verschiedenen Perspektiven.
![1.00](https://cdn.nostrcheck.me/cff1720e77bb068f0ebbd389dcd50822dd1ac8d2ac0b0f5f0800ae9e15c7e2b2/2808d967a4be4b87887a449e77b3dc211114abba7acafc675e1d1559dae042e5.webp)
Was lässt sich mit ein paar Tagen Abstand daraus schlussfolgern? Die Aktionäre haben überreagiert und die Falschen bestraft. Die Nervosität der Anleger ist aber verständlich bei einem KGV von 46 bei Nvidia und 27 bei den “Magnificent Seven” (die großen US KI-Anbieter). Normale KGVs bewegen sich um 15, d.h. wir haben es mit einer ausgeprägten KI-Blase zu tun, die in Kürze platzen dürfte. Eine weitere Blase die schon vor dem Start geplatzt ist, ist das Projekt “Stargate” der Firmen OpenAI, Oracle und Softbank. In den nächsten 4 Jahren wollen sie 500 Mrd. USD für über 10 neue KI-Rechenzentren investieren, um Amerikas vermeintliche KI-Vorherrschaft gegenüber China weiter auszubauen. Die schon vorher vorhandenen Zweifel an dem Projekt (Elon Musk auf X “sie haben das Geld gar nicht”) wurden nun durch den Erfolg von deepseek verstärkt.
![1.00](https://cdn.nostrcheck.me/cff1720e77bb068f0ebbd389dcd50822dd1ac8d2ac0b0f5f0800ae9e15c7e2b2/5c3231a3258e5ec882175f777b3bc79925e1d757ceae136eaa53e59bee8c8b68.webp)
deepseek hat nämlich offenbart, dass die bisherige US KI-Strategie, "wir schlagen die Chinesen mit unserer DataCenter-Power", ein fataler Irrweg ist. Den Analysten von Bernstein zufolge ist das Modell von deepseek geschätzt 20 bis 40 mal billiger zu betreiben als ähnliche Modelle von OpenAI. Die Chinesen haben ihre Innovation durch Kreativität erzielt, im Gegensatz zur Gigantomanie der US-Konzerne, die sich in einem Überbietungs-Wettbewerb der Ressourcen-Verschwendung befinden. Hunderte Milliarden an Investorengeldern und ca. 9% des nationalen Stromverbrauchs führen zwar zur Bereicherung einiger Konzerne und ihrer Besitzer, nicht aber zu adäquaten Ergebnissen. Das selbe Muster konnte man bereits bei der Rüstungsbranche beobachten, die mit dem etwa 10-fachen Budget (1 Billion USD) nicht im Stande war bessere Waffensysteme zu produzieren als Russland (Oreshnik-Schock 2024).
![1.00](https://cdn.nostrcheck.me/cff1720e77bb068f0ebbd389dcd50822dd1ac8d2ac0b0f5f0800ae9e15c7e2b2/aff99eea572476fcd36d75c979eb175b88063930b1f291af3a8e2e2470a25be0.webp)
Wenn Donald Trump wirklich Amerika stärken möchte, dann sollte er umgehend seine technokratischen Berater entlassen und Sun Tzu lesen, ein Buch, das die Grundlagen asiatischer Strategie vermittelt und den Krieg vermeiden lehrt ("Der klügste Krieger ist der, der niemals kämpfen muss"). Die chinesischen Erfolge basieren auf exzellenter Bildung, Startup-Förderung und minimaler Regulierung, Konzepte die der Westen zwar stets gepredigt aber nie geliefert hat. “Make Amerika smart again” hieße daher Abschied von Kriegsrhetorik, Embargos, Oligarchen-Projekten und der bisherigen Großmacht-Hybris. Annektionspläne für Grönland und Kanada passen nicht in das Bild, Wiederherstellung von Meinungsfreiheit und Abbau von Regulierungen schon (Streichung von Bidens KI-Regulierung Executive Order 14110). Wohin steuert Trump die USA? Wird der deepseek-Moment dabei helfen falsche Strategieansätze zu korrigieren? Das ist noch unklar, während aber schon jetzt unzweifelhaft feststeht, dass die EU und Deutschland weder bei der KI noch in der Geostrategie eine Rolle spielen, dafür aber als unangefochtene Regulierungs-Weltmeister. Herzlichen Glückwunsch!
![1.00](https://cdn.nostrcheck.me/cff1720e77bb068f0ebbd389dcd50822dd1ac8d2ac0b0f5f0800ae9e15c7e2b2/c774f900b8bafda267544341920f621f5dc69fddab5ddf838d3b36097a0f5dc0.webp)
„Man kann zwar die Realität ignorieren, aber nicht die Folgen davon ignorieren.“ Ayn Rand
Der wirkliche Gewinner dieser Woche ist aber die OpenSource-Szene mit ihren dezentralen Lösungsansätzen. Nicht nur deepseek R1 ist OpenSource sondern auch Marco o1 von Alibaba (<https://github.com/huggingface>). Die Nutzung ist kostenlos (ChatGPT kostet 200 USD pro Monat), daher können sowohl die Modellbildung, die Trainingsdaten als auch die Rechenleistung von unzähligen Aktivisten weltweit verteilt erbracht werden. Dafür braucht es weder Milliarden-Budgets, Regierungsprogramme oder neue DataCenter. Das Potential der Crowd übertrifft jeden zentralistischen Ansatz. Die Ergebnisse sind besser und die Kontrolle liegt nicht in den Händen einzelner. Smarte Lösung sind verteilt, das beweisen Projekte wie Bitcoin (seit 16 Jahren), Lightning und neuerdings auch Nostr. Deshalb haben wir Pareto (<https://pareto.space>) auf diesen Fundamenten entwickelt (Nostr, Lightning) und in 6 Monaten mit Freiwilligen mehr erreicht als viele große IT-Unternehmen in Jahren. Die Dinosaurier sterben aus, dem Schwarm gehört die Zukunft.
-
![](/static/nostr-icon-purple-64x64.png)
@ e262ed3a:e147fbcb
2025-02-01 15:37:28
**Feel free to develop**
I got an idea while watching a video from @BTCSessions, which I personally cannot implement technically. Therefore, I would like to present it here for discussion and free implementation. It makes sense to me, but what do I know? Let the swarm intelligence decide.
The goal of the business idea is:
How can I bring as many solo miners as possible into a pool without them having to pay for the electricity for mining and their mining hardware can be amortized quickly, so they can purchase more mining hardware?
How can we financially support Bitcoin and Nostr developers in the long term?
How can we intensify developers for the implementation of this idea?
How can we encourage non-Bitcoiners to invest in the support of the Bitcoin network?
How can we get non-Bitcoin retailers to invest in the Bitcoin network?
**The answer is: PROSPECT OF WINNING
The solution lies in a kind of RAFFLE. (Not a betting website)
!**
The legal difference between a BET and a RAFFLE varies from country to country. It lies in the fact that a raffle must be very transparent regarding the chances of winning and the proceeds must go to a good cause. Those involved in the implementation can, of course, be compensated (also with a profit for the individual participants). The extent to which this is allowed would have to be checked by those who want to implement this idea.
In the following, I will describe the implementation roughly. Since this is not a sales presentation, please excuse me if the following proposal is not fully structured.
**Participants in the idea are:
Consumers (ticket buyers)
Bitcoin miners
Retailers
Non-profit company that implement the project**
**What's it about?** @BTCSessions has a YouTube video about the miner FutureBit. In the dashboard of the solo miner, you could see how high the hash rate was. But above all, you could see how high the chance of winning was for the solo miner in the overall network. In the case of BTCSessions FutureBit, the hash rate was around 5 TerraHash and the chance of winning was around 1:1,000,000. (Which, according to my calculations, was not correct). The power consumption was around 32 watts. When I saw that, it suddenly dawned on me.
Could it be possible to create a website/app that determines the total hash rate of a mining pool and then offers an electronic, numbered ticket for each 1 TerraHash (TH/s) of the pool for, for example, 0.1 USD? The minimum purchase amount would be 10 tickets. The customer sees the chance of winning and could even see the possible payout. The ticket is only valid for the next block (similar to roulette).
Another variant could be that the buyer can select one or more of the next 10 blocks and purchase tickets for the selected block. Since you don't know in advance how high the pool hash rate will be 5 or 10 blocks ahead, the amount of tickets to be issued for the 2nd block, for example, could only be 90% of the current pool hash rate, the 3rd block only 80%, and so on. If block 3, for example, advances to position 2, the previously unavailable 10% will be released for further tickets. (Determined by the pool hash rate at that time)
The purchase of 10 or more tickets could be automated in the customer's account on the website/app (intervals: hourly, daily, weekly, every 10 blocks, etc.). Customers could also top up their account with satoshis, enabling automatic deductions for ticket purchases. This could be facilitated by automatically issuing a Nostr npub to each customer, which would also create a wallet at Primal.net (Strike). For non-Bitcoiners, Zaprite could be used to recharge their account. Alternatively, customers could enter a NostrWalletConnection NWC to enable automatic deductions from their Lightning wallet. The project operators might also consider running their own ecash mint, which would allow them to assign an integrated ecash address to customers without a Lightning address. Tickets with ascending numbers would be allocated strictly in the order of payment receipts.
**Calculations for the miners:** The FutureBit miner consumed approximately 30 watts per terahash/hour. Let's assume that 10 terahash consume 300 watts per hour, then the miner consumes 50 watts per 10 minutes (per block). Let's further assume that a kilowatt-hour of electricity costs between 10 and 30 cents, then it costs the miner 3-9 cents per hour for electricity at 10 terahash mining capacity. So, 0.5-1.5 cents per block. In the case that each ticket is sold for 1 terahash for the next block, one could automatically transfer, for example, 5% of the satoshis received from ticket sales to each participating miner in the pool (proportional to the average hash rate delivered by the miner in the last block in the pools). This happens even if the block is not found. If fewer tickets are sold than the maximum possible amount, then the 5% of the sold tickets will be distributed proportionally. (See also my Excel file?
At the center of the project is a website/app that manages the raffle. Here, anyone can register and create an account. Either as a miner, retailer, or customer with or without KYC, for example, with their own nostr nsec, wallet signature, email and password or phone number and password.
Once logged into the account, Bitcoiners can enter their Lightning address and a Bitcoin on-chain address. Non-Bitcoiners enter their financial data in case they win.
Miners must enter a Bitcoin and Lightning (or ecash) address. The pooling process is also managed in the miner's account.
Tickets can be purchased (like in a regular online shop) and paid for in any way. Zaprite could be a solution here. But also Strike, Cashapp, etc. As described above, such purchases could also be automated.
**Retailers** can also register as such. They will then have the opportunity to sell "tickets" to their customers and collect the money in cash. To sell tickets, they must enter the customer's name and a valid email address. After payment, they must send the purchase price via Lightning to the non-profit company, which will then confirm the purchase to the ticket buyer and the retailer with all the data. This is the receipt for the buyer. In the event of a win (the mined block must have 3-6 block confirmations), the ticket buyer will receive an email explaining all the further details of how to claim the prize. This could be a link that takes them directly to the website and logs them in directly. The winner can then enter their data on how and where the money should be paid out (Bitcoin address or bank details). Alternatively, they can go to their retailer, who can assist them by entering the data in their sub-account (customer account). To prevent the retailer from falsifying the data entry, the winner will first receive an email with the entered data, which they can confirm (if correct). Since the retailer is also involved in the win, they will also be notified.
How many tickets can be offered per round (Bitcoin block)? The number of tickets depends on the hash rate in the pool. One ticket can be issued per 1 TerraHash (TH/s). How the ticket is generated per round and customer, I don't know, as I lack the technical knowledge. Maybe as a kind of NFT that contains the corresponding data (customer number (npub) of the buyer and possibly retailer, block number, ticket number). Or as a Taproot asset on Lightning? Or as a minted ecash coin? Or simply as an entry in a database that the customer can see in their account.
The maximum payout of the winnings in the event of a found block to the ticket holders could be 70%. The remaining 30% would be distributed to the miners and retailers. For example: Miners 25%, retailers 5%. The non-profit organization receives nothing from the block rewards. Instead, it receives 65% of the revenue from all ticket sales. With a mining pool hash rate of 10,000 TH/s, where all tickets are sold continuously, a daily donation of around 93,000 USD would be generated. (see Excel.file)
The revenue, after deducting the possible costs of the organization, goes directly to @opensats and/or other organizations that support the Bitcoin network after each block. Either via Lightning or Bitcoin on-chain payment.
In the attached Excel file, you can find my calculations. Here, anyone can play through different scenarios.
What I noticed was that with maximum ticket sales per block, only around 200 USD per 10 tickets would be paid out, since each participating ticket wins in the event of a found block. Since I believe that this is not a very great incentive for buying tickets, I suggest the following variants.
Winning variants: Each purchased ticket has a running number. Ticket 1 has the number 000.000, ticket 2 has the number 000.001, ticket 10.120 has the number 010.119, and so on.
If the next block is found, then this found block in the Bitcoin blockchain has a hash. For example, block 881367 has the hash 000000000000000000014b0fab24355c71c6940584d9cd5990c0b081a31d54a4
Let's now remove the letters and read only the numbers from back to front, so the last 3 numbers are 544
Instead of every participating ticket winning, in this variant, only the tickets with the ending digits 544 win.
With, for example, 11,000 tickets sold, the ticket numbers 000.544 / 001.544 / 002.544 ... 010.544 would win. So, 11 ticket participants would win. Each winner with this number would receive around 0.284 Bitcoin (3.125 BTC / 11).
One could also let the ticket numbers with the ending digits 44 win, and thus every hundredth ticket. Or even combine it.
What I also noticed was that with retailers, a special case arises. Retailers receive 5% of the block rewards in the event of a found block. But only proportionally to the tickets sold by the retailer. This means that in order for the entire 5% to be distributed to the retailers, all 10,000 tickets of 10.000 possible tickets would have to be sold by retailers. Since not all tickets will be sold by retailers, a remaining amount will be left over. This could be distributed additionally to the miners. Or any other variant.
I hope the idea finds resonance and invites discussion. Maybe I've made some mistakes in thinking, and the idea is not feasible. But if you like the idea, please forward it to developers, investors, and others you know.
Stay humble hash sats
@nostr:npub1uf3w6w3z4kxy0zc80m6a03tt9s7855c9r8kkjmkju47xtc28l09sc30gqq
[Excel sheet for download](https://c.gmx.net/@329519820976429649/KJTehgh0SMGliV4HLjMf0g)
-
![](/static/nostr-icon-purple-64x64.png)
@ a012dc82:6458a70d
2025-02-01 15:17:38
The cryptocurrency landscape is witnessing a remarkable resurgence, with Bitcoin once again leading the charge. After a period of volatility and uncertainty, Bitcoin has reclaimed its throne as the king of cryptocurrencies, drawing renewed interest from investors and financial experts alike. This article delves into the factors behind Bitcoin's comeback, its implications for the market, and what the future might hold.
**Table Of Content**
- The Remarkable Recovery of Bitcoin
- The Ripple Effect on the Crypto Market
- Investor Sentiment: Cautious Optimism
- The Future Outlook: Opportunities and Challenges
- A New Era for Bitcoin
- Conclusion
- FAQs
**The Remarkable Recovery of Bitcoin**
**A Surge in Value**
After a tumultuous phase marked by sharp declines and skepticism, Bitcoin has made a striking comeback. The digital currency's value has seen a significant upswing, reminding investors of its potential as a high-reward, albeit high-risk, asset. This recovery is not just a numerical increase but a symbol of resilience in the face of market adversities.
**Driving Factors**
Several factors have contributed to Bitcoin's resurgence. These include an increase in institutional adoption, technological advancements within the blockchain ecosystem, and a growing recognition of Bitcoin as a 'digital gold' amidst economic uncertainties. Moreover, regulatory clarity in some regions has provided a more stable environment for cryptocurrency investments.
**The Ripple Effect on the Crypto Market**
**Boosting Market Confidence**
Bitcoin's rebound has had a ripple effect across the entire cryptocurrency market. Altcoins and emerging digital assets have also seen a boost in both value and investor interest. This resurgence has rekindled the enthusiasm for decentralized finance (DeFi) and non-fungible tokens (NFTs), which had waned during the market downturn.
**Impact on Blockchain Innovation**
The renewed interest in Bitcoin has spurred further innovation in blockchain technology. Developers and entrepreneurs are increasingly exploring new use cases for blockchain, expanding beyond traditional financial applications to areas like supply chain management, digital identity, and more.
**Investor Sentiment: Cautious Optimism**
**Institutional Investors' Role**
Institutional investors, once wary of Bitcoin's volatility, are now more open to including it in their portfolios. This shift is partly due to the improved infrastructure and regulatory frameworks that make investing in Bitcoin less risky than in its early years.
**Retail Investors' Perspective**
Retail investors, who were significantly affected by the previous market downturn, are approaching Bitcoin with cautious optimism. Many are drawn by the potential for high returns but remain mindful of the risks involved.
**The Future Outlook: Opportunities and Challenges**
**Potential for Growth**
With its current momentum, Bitcoin has the potential for further growth. Its evolving role in the financial ecosystem, particularly in areas like digital payments and remittances, suggests a bright future.
**Navigating Challenges**
However, challenges remain. Regulatory uncertainties, potential market manipulations, and the environmental impact of Bitcoin mining are issues that need addressing. How these challenges are managed will significantly influence Bitcoin's trajectory.
**A New Era for Bitcoin**
**A Testament to Resilience**
Bitcoin's comeback is a testament to its resilience and the enduring faith of its supporters. It has not only reclaimed its position as the leading cryptocurrency but has also reinforced the belief in the potential of digital currencies.
**A Dynamic Future Ahead**
As investors, both institutional and retail, continue to take notice, Bitcoin's journey is far from over. Its ability to adapt, innovate, and overcome challenges will shape not just its future but also that of the broader cryptocurrency market. The current phase is just the beginning of what promises to be a dynamic and transformative era for Bitcoin and digital currencies as a whole.
**Conclusion**
Bitcoin's resurgence marks a significant milestone in the cryptocurrency world. Its ability to bounce back from adversity and regain its status as the leading digital currency has not only bolstered investor confidence but also highlighted the growing maturity of the crypto market. As Bitcoin continues to evolve, navigating through regulatory landscapes and technological advancements, it stands as a symbol of innovation and resilience in the ever-changing world of finance.
**FAQs**
**Why has Bitcoin's value surged recently?**
Bitcoin's value has surged due to factors like increased institutional adoption, advancements in blockchain technology, and its growing recognition as a digital store of value amidst economic uncertainties.
**How has Bitcoin's recovery affected the overall crypto market?**
Bitcoin's recovery has positively impacted the entire crypto market, boosting the value of altcoins and reigniting interest in decentralized finance (DeFi) and non-fungible tokens (NFTs).
**Are institutional investors now more interested in Bitcoin?**
Yes, institutional investors are showing increased interest in Bitcoin, thanks to improved investment infrastructure and clearer regulatory frameworks.
**What are the main challenges facing Bitcoin in the future?**
The main challenges include regulatory uncertainties, potential market manipulations, and the environmental impact of Bitcoin mining.
**Is it safe for retail investors to invest in Bitcoin now?**
While Bitcoin offers potential high returns, it remains a high-risk investment. Retail investors should approach with caution and consider diversifying their investment portfolio.
**That's all for today**
**If you want more, be sure to follow us on:**
**NOSTR: croxroad@getalby.com**
**X: [@croxroadnews.co](https://x.com/croxroadnewsco)**
**Instagram: [@croxroadnews.co](https://www.instagram.com/croxroadnews.co/)**
**Youtube: [@croxroadnews](https://www.youtube.com/@croxroadnews)**
**Store: https://croxroad.store**
**Subscribe to CROX ROAD Bitcoin Only Daily Newsletter**
**https://www.croxroad.co/subscribe**
***DISCLAIMER: None of this is financial advice. This newsletter is strictly educational and is not investment advice or a solicitation to buy or sell any assets or to make any financial decisions. Please be careful and do your own research.***
-
![](/static/nostr-icon-purple-64x64.png)
@ df478568:2a951e67
2025-02-01 15:07:26
![cashews](https://gitea.marc26z.com/marc/Marc26z/raw/branch/main/garlicRoastedCashews/20250201_065224.jpg)
# Garlic Cashew Recipe
I wrote about selling roasted cashews as an experiment in capitalism [here](https://substack.com/home/post/p-156063324). I make them myself and in the spirit of free and open source software, I figured I would open-source the recipe with a catch. You can get the recipe in one of two ways.
1. Become a paid subscriber to my Substack and you will get a key to unlock the cipher text
2. Read it in the clear(un-encrypted) on nostr. The easiest way to do this is to navigate to primal.net in your browser and search for “marc26z.” Click on my profile and **you can find all of my writing in the clear in the reads section*.
I tried using PGP in another article, but it’s a little cumbersome and pretentious. Andreas Grifin said, [Nostr is what PGP should have been. A web of trust with easy-to-use encryption and verification](nostr:note12c47gxhxyw5elg55yh4g90fztddhpgqz95jf6fwvk3yygt7qml6sjd6lwj). I tend to agree. So I’m using something else.
![decrypt online](https://gitea.marc26z.com/marc/Marc26z/raw/branch/main/garlicCashewRecipe/Screenshot%20from%202025-02-01%2006-48-51.png)
https://8gwifi.org/CipherFunctions.jsp
**Decrypt using the passphrase below the paywall**.
"To encrypt is to indicate the desire for privacy, and to encrypt with weak cryptography is to indicate not too much desire for privacy.”
I do not indicate a desire for too much privacy here, but I like playing with these things. I hope you enjoy playing with them too.
## How To Decrypt
1. Go to https://encrypt-online.com/decrypt/ on your favorite web browser.
2. Choose aes-256-cbc(this is the default setting)
3. Copy and paste the cipher text into the decryption field
4. enter the passphrase into the passphrase field
5. press the Decrypt button
6. Optional: Copy and paste the decrypted recipe into a markdown editor like https://dillinger.io/
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
Passphrase:
implored-junker-requires
Here is the decrypted recipe if you do not wish to learn about encryption, but want to try my delicious non-vegan cashew recipe anyway.
1 LB organic raw cashews
2 TBS beef tallow
2 TBS salt
1 TBS garlic powder
Melt tallow in the microwave
Brush the tallow on the nuts. Spread onto a cookie sheet.
Preheat oven 350 degrees
Bake for 10 minutes.
Let cool.
Violá!
Enjoy your garlic-roasted cashews. Or...you can pick some up at nostr:npub1marc26z8nh3xkj5rcx7ufkatvx6ueqhp5vfw9v5teq26z254renshtf3g0
[A Crumby Commercial](https://i.imgflip.com/1ts3w3.jpg)
npub1marc26z8nh3xkj5rcx7ufkatvx6ueqhp5vfw9v5teq26z254renshtf3g0
[881,805]()https://mempool.marc26z.com/block/00000000000000000000f5d9aa481b8f2555deaa8638a3c1f2eb4ffa8f474f9d
[Merch](nostr:npub1marc26z8nh3xkj5rcx7ufkatvx6ueqhp5vfw9v5teq26z254renshtf3g0)
-
![](/static/nostr-icon-purple-64x64.png)
@ cbaa0c82:e9313245
2025-02-01 15:07:16
#TheWholeGrain - #January2025
This January we really got to start the story telling of our first adventure series painted by Dakota Jernigan a.k.a. The Bitcoin Painter! The typical Singles of the month were released on Sunday along with a special Single released on the first to celebrate the New Year! Here we go, 2025! And, even with all that the monthly Concept Art, Bitcoin Art, and the newest Cover Art from Toast's Comic Collection were all still released! Not only was the first month of 2025 quite packed full of fun content, but the Bread and Toast website got a makeover! Did you notice all the explanation points!? We're all so excited we just can't help ourselves from using them!
**January Sunday Singles**
2025-01-01 | Sunday Single 73
Title: Happy New Year 2025
*Happy New Year! What a year 2024 has been!
We can’t wait to see what 2025 has in store for us!*
https://i.nostr.build/QFTmeR5p2FthPMXp.png
2025-01-05 | Sunday Single 074
Title: Snowflake
*It’s the most beautiful snowflake Toast has ever seen… until this one melts then it’s on to the next one!*
https://i.nostr.build/YHGeOcYv8WEP1fAf.png
2025-01-12 | Sunday Single 075
Title: Weight Lifting
*End-Piece has been working out since last year’s resolution. Now, time for heavy lifting!*
https://i.nostr.build/8lxeovAr5aK598Ze.png
2025-01-19 | Sunday Single 076
Title: Good Morning
*GM, Everybody!*
https://i.nostr.build/9jn2D2if4sFfNXzU.png
2025-01-26 | Sunday Single 077
Title: Chess
*When it comes to the chessboard, Bread is King.*
https://i.nostr.build/LZq57iL7tOWbHAKc.png
**Adventure Series: Questline**
Bread, Toast, and End-Piece have started their journey in Grain Valley, and they have already found themselves in what used to be a village that is now been burnt to a crisp!
Writer: Daniel David (dan 🍞)
Artist: Dakota Jernigan (The Bitcoin Painter)
2025-01-14 | Questline
001 - The Adventure Begins
Our heroes take their first steps upon one of the oldest paths in all of Grain Valley. They can see the mountains in the background of the landscape before them. As they walk, they see in the distance ahead of them large amounts of black smoke rising until it disappears into the sky.
https://i.nostr.build/ygjmYlWAZ4uPfPCn.png
2025-01-28 | Questline
002 - A Village Burned
The source of smoke surrounds our heroes as their path brings them to the center of what used to be a village. It seems to be completely abandoned with no signs of life. Yet, all the remains of the village appear to have only recently burned to a crisp. What could have possibly happened here?
https://i.nostr.build/BJ4L1shKh5YERzWc.png
**Other Content Released in January 2025**
2025-01-01 | Toast's Comic Collection
Title: Iron Bread #9
*"I am Iron Bread." - Tony Starch*
https://i.nostr.build/QJKkDCbfgc6Vqzcq.png
2025-01-08 | Concept Art
Title: Second Bread Sketch
*A second sketch of the character Bread. Remade and cleaned up.*
https://i.nostr.build/4TXIRSUGA6viEaJx.png
2025-01-15 | Bitcoin Art
Title: Stack Sats
*Toast is constantly stacking sats!*
https://i.nostr.build/txxkux0oJqyjNcSL.png
Thanks for checking out the fifth issue of The Whole Grain. The Whole Grain is released on the first of every month and covers all of the content released by Bread and Toast in the previous month. For all Bread and Toast content visit BreadandToast.com!
**Thanks for helping us kick off 2025!**
***Bread, Toast, and End-Piece***
#BreadandToast #SundaySingle #Questline #ToastsComicCollection #ConceptArt #BitcoinArt #Bread #Toast #EndPiece #Artstr #Comic #Cartoon #NostrOnly #🖼️
***List of nPubs Mentioned:***
The Bitcoin Painter: npub1tx5ccpregnm9afq0xaj42hh93xl4qd3lfa7u74v5cdvyhwcnlanqplhd8g
dan 🍞:
npub16e3vzr7dk2uepjcnl85nfare3kdapxge08gr42s99n9kg7xs8xhs90y9v6