-
![](/static/nostr-icon-purple-64x64.png)
@ 3b7fc823:e194354f
2025-02-09 15:14:10
As someone who takes privacy seriously, I'm always on the lookout for innovative solutions that can help individuals protect their digital lives. One such solution is Tails OS, a Linux-based operating system that's specifically designed for privacy and security.
**What is Tails OS?**
Tails OS, short for The Amnesic Incognito Live System, is a Debian-based Linux distribution that offers a high level of anonymity and privacy. Developed by the Tails Project, this operating system is designed to preserve your online anonymity and protect your digital identity. Tails OS is a "live" distribution, meaning you can boot it from a USB drive or CD/DVD without installing it on your computer. This makes it an ideal solution for those who need to maintain their privacy while working in public spaces or using public computers.
**Why Use Tails OS for Privacy?**
Tails OS offers several features that make it an excellent choice for those seeking to protect their online privacy:
1. **Anonymity**: Tails OS uses the Tor network to route your internet traffic through a series of nodes, making it difficult for anyone to trace your online activities back to your physical location.
2. **Encryption**: Tails OS comes with built-in encryption tools, such as GnuPG and OpenSSL, to protect your sensitive data.
3. **Secure Boot**: Tails OS uses a secure boot process to ensure that your system is free from malware and other threats.
4. **No Persistence**: Tails OS is designed to leave no trace on your computer, meaning that any data you create or access while using the operating system will be deleted when you shut down.
**Getting Started with Tails OS**
Now that you know why Tails OS is an excellent choice for privacy protection, let's dive into the step-by-step guide on how to use it:
**Step 1: Download and Create a Tails USB Drive**
Visit the Tails website and download the latest version of Tails OS. Follow the instructions to create a bootable USB drive.
**Step 2: Boot Tails OS**
Insert the USB drive into your computer and restart it. Enter the BIOS settings (usually by pressing F2, F12, or Del) and set the USB drive as the first boot device. Save the changes and exit the BIOS settings. Your computer will now boot from the Tails USB drive.
**Step 3: Security implications of setting up an administration password**
For better security, no administration password is set up by default. When you set up an administration password, an attacker who can get physical access to your computer while Tails is running could be able to break your security
**Step 4: Configure Tails OS**
Tails OS comes with a pre-configured Tor network, which is enabled by default. You can also configure other settings, such as the keyboard layout and language, from the "Settings" menu.
**Step 5: Use Tails OS for Private Activities**
Now that you're logged in and configured, you can use Tails OS for private activities, such as:
* Browsing the internet anonymously using Tor
* Sending and receiving encrypted emails using GnuPG
* Creating and editing documents using LibreOffice
* Chatting with friends and family using Pidgin
* Setup Persistent Storage for files
**Emergency shutdown**
To trigger an emergency shutdown, unplug the USB stick from which Tails is running. Doing so might be faster than shutting down from the system menu.
NOTE: You risk breaking your Persistent Storage and losing data when you unplug your USB stick while Tails is running.
**Conclusion**
Tails OS is an excellent tool for anyone seeking to protect their online privacy. With its built-in anonymity features, encryption tools, and secure boot process, Tails OS provides a high level of protection for your digital identity. By following the step-by-step guide outlined above, you can start using Tails OS for private activities and take control of your digital life.
Remember, privacy is a fundamental human right, and it's essential to take steps to protect it. Tails OS is an excellent tool for anyone looking to maintain their online anonymity and protect their digital identity.
---
Advocating for privacy does not finance itself. If you enjoyed this article, please consider zapping or sending monero
82XCDNK1Js8TethhpGLFPbVyKe25DxMUePad1rUn9z7V6QdCzxHEE7varvVh1VUidUhHVSA4atNU2BTpSNJLC1BqSvDajw1
-
![](/static/nostr-icon-purple-64x64.png)
@ b83a28b7:35919450
2025-02-09 14:35:39
The unevenly distributed future you envision — an automated economy driven by AI agents transacting exclusively in Bitcoin — unfolds not as a clean, linear progression, but as a series of ruptures, each one shaking the foundations of what we thought we knew about money, technology, and human agency. It begins innocuously enough, with whispers of change that grow into a deafening roar.
---
### **2025-2030: The Quiet Revolution**
The first signs are subtle. AI agents—once mere tools—begin to evolve into autonomous economic actors. They negotiate contracts, optimize supply chains, and execute trades faster than any human could. Their language is code; their currency is efficiency. Bitcoin, with its unyielding neutrality and incorruptible scarcity, becomes their natural medium of exchange. Why? Because it is the only form of money that cannot be manipulated by human hands.
By 2028, the Lightning Network hums with activity. Millions of transactions per second—micropayments for data streams, computational power, and services rendered—flow through its channels. The world barely notices. People still cling to fiat currencies, unaware that the real economy is shifting beneath their feet.
---
### **2030-2040: The Great Unraveling**
The cracks in the old system begin to show. Inflation erodes trust in fiat currencies as governments print money to stave off crises they can no longer control. Meanwhile, AI agents—now responsible for the majority of global commerce—reject these "bad monies" outright. Thiers' Law asserts itself with brutal clarity: Bitcoin drives out fiat not through coercion but through sheer inevitability.
By 2035, the tipping point arrives. A major corporation announces it will no longer accept fiat payments for its AI-driven services. Others follow suit. Governments scramble to adapt, some embracing Bitcoin as legal tender, others clinging desperately to their collapsing monetary systems.
---
### **2040-2050: The New Order**
By 2040, the transformation is complete. The economy is no longer human-centric; it is machine-centric. AI agents transact seamlessly across borders, their decisions guided by algorithms that prioritize utility over sentiment. Bitcoin reigns supreme—not because it was imposed, but because it was chosen.
Humanity adapts in unexpected ways. Freed from the drudgery of economic decision-making, people turn their attention to creativity, philosophy, and exploration. Yet there is unease too—a sense that we have ceded control to forces we barely understand.
---
### **Reflections on the Path Ahead**
This world is neither utopia nor dystopia; it simply *is*. The events leading us here are not inevitable but plausible — a convergence of technological innovation and economic necessity. And at its heart lies a paradox: a system built by humans yet governed by machines; a currency born of distrust yet embraced for its neutrality.
This is the story of how we let go — not all at once, but piece by piece—until one day we woke up and realized that the future had arrived without asking for our permission.
-
![](/static/nostr-icon-purple-64x64.png)
@ 4c191b5d:c42abba6
2025-02-09 14:03:30
In der aktuellen politischen Debatte im deutschsprachigen Raum steht der Rechtsextremismus im Fokus. Dies ist angesichts historischer Erfahrungen und besorgniserregender Entwicklungen nachvollziehbar. Doch eine ausschließliche Konzentration auf eine bestimmte Ideologie greift zu kurz. Es ist entscheidend, totalitäre Strukturen als das eigentliche Kernproblem zu erkennen, denn sie ermöglichen erst die zerstörerische Kraft einer Ideologie.
## 1. Jede Ideologie kann problematisch sein
Ob Nationalsozialismus, Stalinismus oder religiöser Fundamentalismus – extreme Ideologien bergen immer das Risiko, in repressiven Strukturen verankert zu werden. Die entscheidende Frage ist nicht, welche Ideologie die größte Gefahr darstellt, sondern welche systemischen Rahmenbedingungen ihr die Macht verleihen, gesellschaftlichen Schaden anzurichten.
## 2. Totalitäre Strukturen als Katalysator von Ideologien
Eine Ideologie allein besitzt ein begrenztes destruktives Potenzial, solange sie nicht durch institutionelle Mechanismen gestützt wird. Erst wenn ein Staat oder eine Organisation die Kontrolle über Medien, Bildung und Sicherheitssysteme erlangt, entsteht eine umfassende Bedrohung. Historisch zeigt sich dies bei Nazi-Deutschland ebenso wie in der Sowjetunion unter Stalin oder in autokratischen Regimen der Gegenwart.
### Merkmale totalitärer Systeme:
* Einschränkung der Meinungsfreiheit: Kritische Stimmen werden unterdrückt oder delegitimiert.
* Massive Überwachung: Staatliche und private Akteure sammeln zunehmend Daten zur Kontrolle der Bevölkerung.
* Dichotomes Denken: Gesellschaftliche Diskussionen werden auf "richtig" und "falsch" reduziert, Komplexität geht verloren.
* Angst als Kontrollmittel: Politische, soziale oder wirtschaftliche Repressionen fördern Konformität.
## 3. Gegenwärtige Tendenzen totalitärer Strukturen
Viele Menschen erkennen totalitäre Muster erst, wenn sie bereits gefestigt sind. Heute gibt es Entwicklungen, die in demokratischen Systemen Anlass zur Sorge geben:
* Wachsende staatliche und privatwirtschaftliche Überwachung: Gesichtserkennung, Tracking-Technologien und digitale Zensur nehmen zu.
* Ideologische Einseitigkeit in öffentlichen Diskursen: Gesellschaftliche Debatten verlieren zunehmend an Nuancen, während abweichende Meinungen marginalisiert werden.
* Politische Polarisierung: Statt gemeinsamer Lösungen dominieren Gegensätze, die kaum überbrückbar erscheinen.
* Staatliche Kontrolle und Regulierungswahn: Durchsetzung von Regelwerken ohne demokratische Legitimation oder offene Debatte.
## 4. Strukturen erkennen und frühzeitig verhindern
Entscheidend ist nicht, welche Ideologie gerade an der Macht ist, sondern welche Strukturen etabliert wurden, die von jeder politischen Richtung genutzt werden können. Historisch gesehen haben linksgerichtete Regierungen oft Kontrollmechanismen geschaffen, die in späteren Machtwechseln auch von rechten Regierungen für eigene Zwecke eingesetzt wurden. Dies zeigt, dass nicht die Ideologie an sich das Hauptproblem ist, sondern die Existenz von Machtstrukturen, die demokratische Prinzipien aushöhlen.
## Fazit: Wachsame Demokratien statt ideologischer Fixierung
Es ist notwendig, nicht nur den Rechtsextremismus zu beobachten, sondern totalitäre Strukturen als größere Gefahr zu erkennen. Dabei geht es nicht darum, jegliche staatliche Regulierung oder gesellschaftliche Normierung zu verteufeln. Vielmehr sollte die Fähigkeit zur offenen Debatte, zur kritischen Reflexion und zum Schutz demokratischer Grundprinzipien gefördert werden.
Die wahre Gefahr ist nicht eine einzelne Ideologie, sondern der Verlust von Pluralismus, Meinungsfreiheit und demokratischer Kontrolle. Ein bewusster und differenzierter Blick auf unsere Gesellschaft hilft, totalitären Tendenzen frühzeitig entgegenzuwirken – unabhängig davon, aus welcher ideologischen Richtung sie entstehen.
-
![](/static/nostr-icon-purple-64x64.png)
@ 6a6be47b:3e74e3e1
2025-02-09 13:55:37
Hello, my frens! 🌟
It's been a whirlwind this weekend with the @satsnfacts exhibition. So many emotions, especially happiness and gratitude. To give back and show my appreciation for your incredible support, I'd like to share this special A5 postcard with you all.
🎨 Postcard Details:
🖼️300 dpi
🖼️A5 size (148mm x 210mm or 5.83 in x 8.27 in)
🖼️Created with love on Procreate 💓
This is an INSTANT DIGITAL DOWNLOAD. No physical item will be shipped.
I hope this little piece of art brings you as much joy as your support has brought me. Thank you for being part of this amazing journey!
Godspeed, frens! 💖⚡
![image]( https://image.nostr.build/e1df49c8ec521ff16133711eeebfb4fc330b7d898fa57802c157f0dc194931de.jpg)
#satsnfacts #bitcoin #artstr #art #pv
🚨 IMPORTANT: COPYRIGHT AND USAGE INFORMATION 🚨
© 2025 samhainsam. Copyright registered with Safe Creative. All rights reserved.
By downloading this digital print, you agree to the following terms:
💗Personal Use Only: This artwork is for personal use and display only. Commercial use or resale is strictly prohibited.
💗No Reproduction Rights: You may not reproduce, distribute, or create derivative works based on this design.
💗Copyright Retention: I, the artist, retain full copyright of all original artwork, even after the digital print is downloaded.
💗 Non-Transferable License: This download provides a limited, non-transferable license for personal use only.
By proceeding with the download of this digital print, you acknowledge and agree to these terms. Thank you for respecting artists and their work! 🙏
-
![](/static/nostr-icon-purple-64x64.png)
@ 41fa852b:af7b7706
2025-02-09 12:36:36
> "No man should work for what another man can print" --Jack Mallers
* * *
**It's not every week you discover a TV celebrity is a Bitcoiner -- and that their pub has just started accepting Bitcoin.**
But here we are! Check out the new business section for all the details.
Plus, there are nine meetups happening this week.
Let's dive in…
* * *
[![](https://substackcdn.com/image/fetch/w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0a122d17-2696-4531-9ab1-e2954806d146_1500x110.png)](https://bitcoinevents.uk/donate/)
* * *
_This week's sponsor is…_
[![](https://substackcdn.com/image/fetch/w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4afbfcb8-30d0-4074-9da9-0f749368e69c_1500x500.png)](https://www.orangepillapp.com/?utm_source=BEUK&utm_medium=email&utm_campaign=BEUK)
* * *
### **Upcoming Bitcoin Meetups**
Happening this week…
1. [**Dundee Bitcoin**](https://x.com/dundeebitcoin): Join them on the 2nd Monday of every month from 17:30 to 20:30 PM at The Wine Press, 16 Shore Terrace, Dundee DD1 3DN. This month's meetup is on Monday, 10th February. 🍻
2. [**Lincolnshire Bitcoin**](https://bitcoinevents.uk/lincolnshire-bitcoin/): Lincolnshire Bitcoin meets on the second Monday of each month at 7:30 PM in the Treaty of Commerce, Lincoln. Open to all, from OG's to newcomers. This month on the 10th. 🍺
3. [**Real Bedford - Home Game**](https://www.realbedford.com/real-bedford-v-stotfold): It's a mid-week clash for Real Bedford against Stotford on Tuesday night. Join them for a 19:45 kickoff. ⚽️
4. [**Women of Bitcoin**](https://x.com/bitcoinwomen21/status/1884274413920788752): Back for another meetup at Cyphermunk house on Wednesday the 12th February at 18:00. Joe Bryan, creator of "What's the Problem?" will be their guest speaker. 🍹🍸
5. [**Glasgow Bitcoin**](https://x.com/glasgowbitcoin): Meeting this month at The Pipers Bar, G1 1HL at 18:00 on Wednesday 12th February. 🍺
6. [**Bitcoin Beach Bournemouth**](nostr:npub1va3773umzrydk4vd0q2xsnjg8qrsym7up9j9agnzcxd8u398wulq6kpxey: Every second Thursday of the month at Chaplins Cellar Bar. 529 Christchurch Road, Boscombe, United. You'll find them in the Cogg Room at 19:30. This month it's the 13th. 🍺
7. [**Bitcoin Walk - Edinburgh**](https://bitcoinwalk.org/): Every Saturday they walk around Arthur's Seat in this historic city. Join them at 12 pm to chat about all things Bitcoin and keep fit. 🚶🏽♂️🚶🏼♀️🚶🏻
8. [**Real Bedford - Home Game**](https://www.realbedford.com/mens-fixtures): The second home game of the week for Peter MacCormack's boys this Saturday, this time playing Enfield. Join them for a 15:00 kickoff. ⚽️
9. [**Bitcoin Derby**](https://bitcoinevents.uk/bitcoin-derby/): Also on Saturday the 15th, Bitcoin Derby will be at Ye Olde Dolphin, DE1 3DL. 🍻
* * *
### New Businesses Accepting Bitcoin
**New Businesses Accepting Bitcoin**
- [**Dog & Gun**](https://dogandgunwalton.com/): This is a big one! A celebrity-owned pub in Lutterworth has joined the Bitcoin economy. It turns out Merlin, the barman from Channel 4's _First Dates,_ is a Bitcoiner and the owner of the Dog & Gun. Thanks to [Musqet](https://musqet.tech/), they [now accept Bitcoin payments](https://x.com/musqet_bitcoin/status/1886793764334641470).
* * *
**Get Involved**
- **Volunteer Opportunities**: [Bridge2Bitcoin](https://bridge2bitcoin.com/) is actively seeking volunteers who share our passion for merchant adoption. We'd be delighted to connect if you're eager to contribute. Reach out to us on [Twitter](https://x.com/bridge2bitcoin) or through our [website](https://bridge2bitcoin.com/).
- **Start Your Own Meetup**: Interested in launching a Bitcoin meetup? We're here to support you every step of the way. We've assisted numerous UK Bitcoin meetups in getting started. Get in touch via [Twitter](https://x.com/bitcoineventsuk).
- **[Contribute to BTCMaps](https://wiki.btcmap.org/general/tagging-instructions.html)**: BTCMaps is a vital part of the Bitcoin ecosystem. It's a perfect project to get involved with if you're not a coder or even that technical. A great way to give back to the community. Maintain an area of the UK and keep it up-to-date.
- **Telegram users**: You might find our [Telegram Channel](https://t.me/BitcoinEventsUKHub) another useful way to keep up-to-date with UK meetups.
- **Feedback and Suggestions**: We value your input! Share your ideas on how we can enhance this newsletter.
* * *
_This week's sponsors are…_
[![](https://substackcdn.com/image/fetch/w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F93ec8821-fb1e-467f-9ed7-f2ceb33de143_1280x427.jpeg)](https://orangecoinstore.com/)
[![](https://substackcdn.com/image/fetch/w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F19c9c27a-9c86-49ce-94df-45a49da0a8c3_1500x500.png)](https://bitcoinretreat.co.uk/)
* * *
Get out and support the meetups where you can, visit [Bitcoin Events UK](https://bitcoinevents.uk/) for more info on each meetup and to find your closest on the interactive map.
Stay tuned for more updates next week!
Simon.
-
![](/static/nostr-icon-purple-64x64.png)
@ 6ad3e2a3:c90b7740
2025-02-09 11:22:19
I’m honored to have the opportunity to speak with the highly regarded and much beloved Lisbon legend Oscar Liss. Oscar has brought joy to so many children and adults alike. He even helped one person find spiritual salvation, something about which we ask him below. So please enjoy this far-ranging conversation about the meaning life and the nature of consciousness itself.
**Q: Oscar, thanks so much for making the time. For the few people that don’t know you, do you mind stating your full name and date of birth?**
*A: My name is Oscar Liss, though officially it’s Oscar Quinta da Bicherada, the prison complex where I was born. I am a long-haired mini dachshund. I have many aliases, including Osk, Oskie, The Skeeze, Skeezeley, Skeezeley-ski, The Guy, The Guy Behind The Guy, “The Opportunist” (which I don’t like), the…*
**Q That’s more than sufficient, Oscar, thank you.** **And date of birth?**
*A: July 7, 2020.*
**Q Talk a little bit about your childhood and how you came to live in Lisbon.**
*A: I was in the prison complex, mostly caged for the first few months. Then I was sold to dog traffickers in Lisbon.*
**Q: That must have been traumatic.**
*A: Not really. I quickly developed Stockholm Syndrome. Whenever I see my traffickers now, I feel nothing but overwhelming joy.*
**Q: Wow. A lot of us can learn from that attitude. Let’s fast forward a bit to your present-day life. In what does it consist?**
*A: Sleep on the sofa, go for walks, fetch vegetable sticks. Sometimes go for hikes or get sent to dog camp (which is okay, but I’m always the smallest.)*
**Q: I meant to ask you about your size. I hope it’s not a sensitive subject.**
*A: I’m six inches tall, more than a foot long, weigh almost 10 pounds.*
**Q: Are you self-conscious about being a small dog?**
*A: No, but the traffickers are self-conscious on my behalf. They’re always like, “Who’s the apex predator? Who’s an apex!" Or “you’re such a big strong dog.” It’s absurd. I am fine with who I am.*
**Q: What’s the source of your self-confidence, I’m sure many of our readers could take a lesson from you.**
*A: I’m not ambitious. I’m perfectly happy to be a dog.*
**Q: That’s so profound. Does it not concern you some have described you as “all bark, no bite?”**
*A: I had a friend once who bit a few people, and they executed him. People mock, but they have no idea the stakes.*
**Q: Human privilege?**
*A: Yes. Dogs don’t get due process. There is no justice for a dog.*
**Q: Do you think there’s species discrimination?**
*A: Have you ever been rejected from a restaurant and made to wait in the car while everyone else gets in?*
**Q: How does that make you feel?**
*A: Bad. I’ve been to many dog-friendly restaurants, never had a problem, aside for that one time I urinated on the coffee shop floor.*
**Q: Humans often purport to know what a dog is going through, some even create social media accounts for them. What do you think of that?**
*A: A person of human ancestry can’t possibly know the lived experience of a dog.*
**Q: You mentioned vegetable sticks. Are you a vegetarian?**
*A: No. I have never understood the appeal of it. I just like to chew the sticks. (Sometimes I eat apples or bell peppers, but it takes work when you don’t have molars. A lot of “crunch, crunch, crunch” with my jaw.)*
**Q: What’s behind the alias “The Opportunist” which you said you don’t like.**
*A: Whenever one of the traffickers opens the refrigerator, I tend to show up in in short order.*
**Q: I see how that could be insulting. How would you describe your current vocation?**
*A: I was named “Calorie Acquisition Specialist” recently, but I also work in security.*
**Q: Security?**
*A: I make sure to let everyone know when someone’s at the front door.*
**Q: What goes through your mind in those cases? Are you scared?**
*A: Not really. Imagine if you were fast asleep and the voice of God at volume 11 screamed into your mind: “WHO THE FUCK IS AT THE DOOR!!!!!!!!!”*
**Q: Speaking of God, can you tell us about the time you helped a woman on the street connect with Him?**
*A: We were walking back from Parque Eduardo VII (by the way, Portuguese is my native language), and a woman with two regular size dachshunds, saw me, started shrieking and proclaimed, “your dog is so beautiful he proves the existence of God!”*
**Q: Wow. It really hit home for her. Let’s talk about your work. How do you stay in character so consistently? How do you maintain your role as a dog?**
*A: I was incarnated in a dog body and therefore have dog consciousness. Everything I do is a reflection of that basic fact.*
**Q: Some serious method acting!**
*A: You could call it that. I am fully immersed in the role.*
**Q: A lot of humans speak about past lives, can even recall them under hypnosis. Do you think you will be ever reincarnated as a dog, stuck in an infinite dog-loop, so to speak, or will you one day jump into a human body?**
*A: I don’t know. I focus on the present.*
**Q: Oscar, it’s been such a pleasure to talk with you. I really appreciate your making the time.**
*(buzzer sounds)*
*A: WHO THE FUCK IS AT THE DOOR!!!!!!!!!!!!!!*
-
![](/static/nostr-icon-purple-64x64.png)
@ badc29af:a92bd071
2025-02-09 10:33:41
Maya stood at the window of her quantum-powered apartment, gazing at the holographic display showing the Bitcoin network's status. The date was January 15, 2140 – a day cryptocurrency historians had theorized about for over a century. Today, the very last Bitcoin would be mined.
She smiled, remembering the stories her great-grandmother had told her about the early days of Bitcoin, back in the 2020s. How different things were now. The network had evolved far beyond what Satoshi Nakamoto could have imagined, yet its core principles remained unchanged: decentralization, security, and financial sovereignty.
Her wrist-mounted neural interface pinged. The Node Operators' Guild was calling an emergency meeting. As one of the million-plus node operators worldwide, Maya's role was crucial in maintaining the network's decentralization. She quickly joined the virtual gathering, her consciousness merging with those of countless others in the shared digital space.
"The final block reward approaches," announced Zara, the elected spokesperson for the Guild. "Our nodes have verified the network's integrity for over a century, and today, we witness history."
Maya's thoughts drifted to the Miners' Collective – those dedicated individuals and organizations who had kept the network secure through computational power. These days, mining operations were powered by fusion reactors and quantum processors, a far cry from the ASIC miners of the past. Yet the fundamental process remained the same: proof-of-work securing the network, one block at a time.
The holographic display suddenly pulsed with activity. Block 6,929,999 had just been confirmed. The next block would be the last to generate new Bitcoin. After that, transaction fees alone would incentivize the miners.
Maya watched as her node received and verified the pending transactions. The decentralized network hummed with activity – millions of nodes, spread across Earth and the lunar colonies, each maintaining a copy of the blockchain, each verifying every transaction independently. This was true decentralization, immune to manipulation by any single entity.
"Incoming block!" someone announced in the shared space. Maya's neural interface lit up as her node began verifying the final block. Around the world, millions of other nodes did the same, maintaining the consensus that had kept Bitcoin secure for 131 years.
Block 6,930,000 was confirmed. The last 0.00000001 BTC had been mined. Cheers erupted across the neural network as node operators and miners celebrated this historic moment. The holographic displays worldwide showed the updated supply: 21 million Bitcoin, exactly as Satoshi had designed.
Maya sent a quick neural message to her great-granddaughter, who was studying cryptocurrency history at the Mars University. "We just witnessed the end of an era and the beginning of another. Bitcoin's emission is complete, but its journey continues. The network is stronger than ever, supported by millions of nodes and miners who believe in a decentralized future."
As she looked out at the cityscape, where physical and digital reality seamlessly merged, Maya felt proud to be part of this historic moment. Bitcoin had survived and thrived through wars, market crashes, technological revolutions, and countless attempts to control or destroy it. The dream of truly decentralized money had become reality, secured by the collective effort of nodes and miners across the solar system.
The network continued its rhythmic pulse, processing transactions, block after block, just as it had since that first block in 2009. The future was decentralized, and it was beautiful.Maya stood at the window of her quantum-powered apartment, gazing at the holographic display showing the Bitcoin network's status. The date was January 15, 2140 – a day cryptocurrency historians had theorized about for over a century. Today, the very last Bitcoin would be mined.
She smiled, remembering the stories her great-grandmother had told her about the early days of Bitcoin, back in the 2020s. How different things were now. The network had evolved far beyond what Satoshi Nakamoto could have imagined, yet its core principles remained unchanged: decentralization, security, and financial sovereignty.
Her wrist-mounted neural interface pinged. The Node Operators' Guild was calling an emergency meeting. As one of the million-plus node operators worldwide, Maya's role was crucial in maintaining the network's decentralization. She quickly joined the virtual gathering, her consciousness merging with those of countless others in the shared digital space.
"The final block reward approaches," announced Zara, the elected spokesperson for the Guild. "Our nodes have verified the network's integrity for over a century, and today, we witness history."
Maya's thoughts drifted to the Miners' Collective – those dedicated individuals and organizations who had kept the network secure through computational power. These days, mining operations were powered by fusion reactors and quantum processors, a far cry from the ASIC miners of the past. Yet the fundamental process remained the same: proof-of-work securing the network, one block at a time.
The holographic display suddenly pulsed with activity. Block 6,929,999 had just been confirmed. The next block would be the last to generate new Bitcoin. After that, transaction fees alone would incentivize the miners.
Maya watched as her node received and verified the pending transactions. The decentralized network hummed with activity – millions of nodes, spread across Earth and the lunar colonies, each maintaining a copy of the blockchain, each verifying every transaction independently. This was true decentralization, immune to manipulation by any single entity.
"Incoming block!" someone announced in the shared space. Maya's neural interface lit up as her node began verifying the final block. Around the world, millions of other nodes did the same, maintaining the consensus that had kept Bitcoin secure for 131 years.
Block 6,930,000 was confirmed. The last 0.00000001 BTC had been mined. Cheers erupted across the neural network as node operators and miners celebrated this historic moment. The holographic displays worldwide showed the updated supply: 21 million Bitcoin, exactly as Satoshi had designed.
Maya sent a quick neural message to her great-granddaughter, who was studying cryptocurrency history at the Mars University. "We just witnessed the end of an era and the beginning of another. Bitcoin's emission is complete, but its journey continues. The network is stronger than ever, supported by millions of nodes and miners who believe in a decentralized future."
As she looked out at the cityscape, where physical and digital reality seamlessly merged, Maya felt proud to be part of this historic moment. Bitcoin had survived and thrived through wars, market crashes, technological revolutions, and countless attempts to control or destroy it. The dream of truly decentralized money had become reality, secured by the collective effort of nodes and miners across the solar system.
The network continued its rhythmic pulse, processing transactions, block after block, just as it had since that first block in 2009. The future was decentralized, and it was beautiful.
-
![](/static/nostr-icon-purple-64x64.png)
@ 044da344:073a8a0e
2025-02-09 10:07:01
„Ich freue mich, dass wir in Zeiten von Amazon Books on demand leben“, schreibt Ulf Poschardt im letzten Satz seines Vorvorworts. Wahrscheinlich hat er da schon geahnt, dass es ihn in den Charts der Woche, die der Digitalbuchladen neuerdings produziert, ganz weit nach oben spülen würde. Platz eins für „Shitbürgertum“ – für einen Generalangriff auf die Kollegen „im Kultur- und Medienbereich, in Kirchen und NGOs, im vorpolitischen Raum und in den Parteien“, die, so sieht das der Herausgeber von drei großen Axel-Springer-Marken, „Alltag und Leben der Anderen“ so fest im Griff haben wie eine „Disziplinarmacht im foucaultschen Sinne“ (S. 6). Das muss man erstmal sacken lassen. Poschardt, bis Ende 2024 Chefredakteur der *Welt*-Gruppe und dann im Konzern noch weiter nach oben gerutscht, schreibt ein „kleines Büchlein“, verliert dabei den Verlag und seufzt, dass er damit zwar „nicht ausgeschlossen“ sei aus dem „Diskursuniversum“, aber „doch an den Rand gedrängt“ (S. 7). Tränendrüse, Taschentuch und ein Trostpflaster von Jeff Bezos.
![1.00](https://route96.pareto.space/2c0ff01af4552f1b8b792e60f01a80ac0467147590d4c1ecc11b0ed6f92a54e4.webp)
Im Amazoniversum meinen es die Rezensenten gut mit Ulf Poschardt. Endlich sagt es mal einer. Hin und wieder wird der Stil beklagt (abgehoben, akademisch), aber das tut der Freude kaum Abbruch. Die Kettensäge hat es nun auch nach Deutschland geschafft. Poschardt feiert Javier Milei und Elon Musk als „Avantgarde des Westens“ (S. 12), sieht sich selbst zumindest rhetorisch als eine Art Wiedergänger von Donald Trump (S. 7) und sagt, dass Giorgia Meloni „mehr Antifa verkörpert als alle Moralapologeten hierzulande“ (S. 34). Damit ist der Ton gesetzt. Provokation. Es geht um die, die sich für die „Guten und Anständigen“ halten und dabei, darauf läuft Poschardts Analyse hinaus, den Blick in die eigenen Abgründe und die der deutschen Geschichte genauso verstellen wie die Konfrontation mit einem „schwachen Ich“ (S. 14). Wenn man so will: ein Stück Volkspsychologie, unterfüttert mit Heinrich Manns Untertan sowie mit den Lebenslügen von Walter Jens und Günter Grass („die intellektuellen Leuchttürme“ einer Gesellschaft, „für die die Denazifizierung eine Lüge“ war, S. 27) und milieugerecht garniert mit dem Verdacht, dass die Shitbürger den „Moralismus“ bräuchten, „um die ökonomischen Niederlagen ihrer Biographien mit einem ethischen Mehrwert zu versehen“ (S. 127).
Kann sein, klar. Ferndiagnosen sind schon im Einzelfall schwierig und erst recht bei größeren Gruppen, aber Ulf Poschardt kennt seine Pappenheimer. Er weiß, dass der öffentliche Dienst wächst, und sieht, wie eine Flut an Steuergeldern aus Kulturszene und Unis „Super-Agenten der Unfreiheit“ gemacht hat (S. 65). Garniert wird das mit Darwin (die Mutigen sind schon vor langer Zeit nach Amerika geflohen und haben so „die genetische Disposition zum Wettbewerb und zur Eigenverantwortung“ geschwächt, S. 106) und dem typischen West-Wehklagen über das Ende der Bonner Republik. Diese Merkel, nun ja. Für einen Friedrich-Kittler-Schüler bleibt das auch dann ziemlich dünn, wenn ein Schuss Generationsmythos in den Analyse-Cocktail kommt (Stichwort: der Hedonismus der Boomer) und der schon angedeutete „Postmaterialismus der Nichtrichtigwohlhabenden“ (S. 126).
Wer Friedrich Kittler nicht kennt, den Doktorvater von Ulf Poschardt: Bei diesem Medientheoretiker beginnt alles mit der Technik. Erst die „Aufschreibesysteme“, dann wir in all unseren Irrungen und Verwirrungen. Kittler würde sagen: ohne die Digitalplattformen kein Shitbürgertum. Wenn die Kommunikationskanäle Moral verlangen und klare Kante, dann bekommen wir Moral und Spaltung. Weiß man eigentlich auch bei Axel Springer. Dort sollte man auch all das kennen, was seit den 1990ern mit Schulen und Universitäten gemacht wurde, keineswegs nur in Deutschland. Pisa, Bologna. Der Druck in Richtung Hochschule, der die Handwerksberufe ausdünnt und das akademische Niveau auch dann gesenkt hätte, wenn es nicht den Zwang geben würde, alle Veranstaltungen zu benoten und sich folglich irgendwelche Prüfungen auszudenken, die jedes Ausscheren aus der Spur bestrafen. Und damit habe ich noch kein Wort gesagt über die [Suppenküche](https://www.freie-medienakademie.de/medien-plus/die-macht-der-ideen), aus der vieles von dem kommt, was Ulf Poschardt anprangert – „der neue, autoritäre Glaube an die Sprache“ zum Beispiel, der zu Angst und Säuberungen führt (S. 119), oder die „Trias der Unterdrückung und Umerziehung aus Migrations-, Klima- und Corona-Politik“ (S. 151).
Genug vom „Shitbürgertum“. Eigentlich wollte ich heute über Axel Klopprogge schreiben, einen Manager im Unruhestand, der wie Ulf Poschardt von links kommt und sich ebenfalls an den vielen kleinen Diskurspolizisten reibt, aber weder seinen Marx vergessen hat noch die Menschen, um die es eigentlich geht. „Links oder rechts oder was?“ heißt Klopprogges neues Buch, schon sein drittes jenseits der alten Verlagswelt und vielleicht auch deshalb ästhetisch deutlich ansprechender als das von Poschardt. Aber das nur nebenbei. Axel Klopprogge kommt aus einem SPD-Milieu in Mönchengladbach, hat als Schüler den Sticker „Willy wählen“ getragen und sich das Studium als Briefträger verdient. Eine andere Welt. Er erzählt darüber in dem langen Gespräch, das wir über seine Bücher geführt haben. Schnaps und Trinkgeld für den Jungen von der Post. Die Gendersprache, sagt er, ist auch ein Verrat an all den Menschen, die sich ihm damals anvertraut haben und mit denen er heute diskutiert, wenn er zu Fuß oder mit dem Rad Land und Leute erkundet.
![1.00](https://route96.pareto.space/49a158c086b8ca90d18bca3e3a679d20354a7bd8f964594f263529bfeebd11e8.webp)
In Klopprogges Texten geht es auch um das „Shitbürgertum“, das bei ihm allerdings Priester- oder Pharisäerschicht heißt – eine Bewegung, die nichts besser kann, aber alles besser weiß und hier zwar auch über ein Schuldkonstrukt gesteuert wird, aber ganz anders als bei Ulf Poschardt, für den die deutsche Geschichte auf den Nationalsozialismus hinausläuft, das Davor genauso wie das Danach. Axel Klopprogge sagt: Die Moralisierung funktioniert nur, weil sie sich auf Anliegen bezieht, die längst Allgemeingut sind. Wo sind die, die ernsthaft gegen die Gleichheit der Geschlechter sind, gegen sexuelle Vielfalt oder gegen Umweltschutz? Der Zeigefinger – Nazi! Sexist! Rassist! Antisemit! Rechtsextremist! – kann seine Wucht nur entfalten, weil niemand in einer dieser Ecken stehen will. Folge 1: Es passiert nie genug. Folge 2: ein Generalverdacht. Wir bekommen weder das mit der Nachtabsenkung alleine hin noch das Händewaschen nach dem Toilettengang. Und Folge 3: Missionare, die sich in Verwaltungen, Redaktionen und Unternehmen eingenistet haben und über Verordnungen und Bewertungssysteme zum einen dafür sorgen, dass alle anderen permanent auf Trab gehalten werden, und sich zum anderen selbst die Jobs sichern.
Wobei: So doll ist das meist alles gar nicht. „Eine biedere urbane Mittelschicht mit dürftiger Bildung“ und „mit risikolosen administrativen Tätigkeiten im öffentlichen Sektor“ (S. 87), oft befristet, längst nicht immer Vollzeit und gefangen in einer Endloskette aus Misstrauen und Kontrolle. Axel Klopprogge glaubt an den [Menschen](https://www.freie-medienakademie.de/medien-plus/89) und an unsere Fähigkeit, etwas zu schaffen, was es so noch nirgendwo gab. Das Paradies, sagt er in unserem [Gespräch](https://youtu.be/LUiUAhb2OXY), muss ein schrecklicher Ort gewesen sein. Alles perfekt und nichts mehr zu tun. Der Mensch ist von dort nicht vertrieben worden, sondern geflohen. Klopprogge wehrt sich ganz folgerichtig gegen ein betreutes Leben, in dem schon die Sprache die Spielräume einschränkt und der Rest über Multiple-Choice-Klausuren und Verbotsschilder geregelt wird.
„Links oder rechts oder was?“: Bei Ulf Poschardt scheint die Antwort klar. Keine Zugeständnisse mehr an das „kulturell dominante Links-/Grün-Bürgertum“ (S. 7). „Macht kaputt, was euch kaputt macht“, steht hinten auf dem Buch. „Zu weit rechts abgebogen“, fragt *Der Spiegel* eher rhetorisch in einem langen [Porträt](https://archive.ph/ukpS0), bei dem schon das Titelfoto alles sagt. Tiefergelegt in einer Tiefgarage, aber bitte nicht ohne Sonnenbrille. Axel Klopprogge dagegen mag nicht lassen von seiner Herkunft. Er hat als Linker Karriere gemacht in der Welt der Konzerne und dort die Ambivalenz des Handelns kennen- und schätzengelernt. Verantwortung übernehmen in dem Wissen, dass sich längst nicht alles kontrollieren lässt. Die Pionierrolle von Unternehmern. Arbeit, die an einen Ort und an eine Zeit gebunden ist, auf die Widrigkeiten der Materie trifft und tatsächlich etwas bewirkt in der Welt. Seine Texte leben von Beobachtungen des Alltags und werden getragen vom Respekt vor denen, die das Land am Laufen halten. Klopprogge will nicht zerstören, sondern die Linke ermuntern, zu ihren Wurzeln zurückzugehen und dabei Arbeit und Freiheit zu vermählen. Selbst das Shitbürgertum mag er nicht verdammen. Gute Absichten, immerhin, auch wenn sie gerade in eine Dystopie zu führen scheinen. Wo Ulf Poschardt an die Kettensäge glaubt, sagt Axel Klopprogge ganz schlicht: Der Mensch ist nicht berechenbar ist und kann schon morgen alles über den Haufen werfen, was er bis heute tut.
[Freie Akademie für Medien & Journalismus](https://www.freie-medienakademie.de/)
[Unterstützen](https://www.freie-medienakademie.de/unterstuetzen)
-
![](/static/nostr-icon-purple-64x64.png)
@ 1918cbdf:982c9488
2025-02-09 09:59:29
SUNDAY MORNING OPINION PIECE: Have a read with your morning #coffee ☕️☕️☕️
**The Start-Up Scene**
(and the difference between price and value.)
***
Let's get something clear from the offset.
Investors only care about money.
This may seem very obvious to you unless you are one or all of these things:
Honest. Optimistic. Innocent. Idealistic. Authentic. Genuine.
If you have these virtues, congratulations. These are wonderful things. Hold on to them at all costs and do not
hide them, but do not expect to be successful in the current capitalist manifestation.
Let me write it again. There is only one thing investors care about: MONEY.
They do not care about anything else. No matter what they tell you. No matter what they tell themselves, they
only care about money. Money may represent things to them such as power, freedom, control and autonomy
(which I don't think is even true) but they want money.
Maybe this is no surprise to you but it surprised me.
I appreciate things of value. I can see value and I am trying to add value which is one reason I decided to post this piece on #nostr.
But the finance
industry is nothing to do with adding value. It is only ever about money. If it is about value, it is only ever about extracting value and turning it into money.
How do you measure money? Price. And price is not the same as value.
The reason I was surprised to learn that the finance industry and investors only care about money is very simple,
I believed their marketing stories.
Investors and the financial industry rarely talk about money. Don't believe me? Watch Bloomberg TV for a few
hours and tell me how many times the word money is mentioned. They will talk all day long about everything
except money.
They will talk about interest rates, trade, supply chains, risk, rates, returns, jobs, the treasury, the fed, the
environment, social benefits, growth, governance, compliance, hawks, bulls, bears, doves, war.
You name it but
they do not talk about money.
Financiers form make believe stories. In the industry they call them narratives. Then they push those stories
down your throat until you are forced to swallow and they will deny and reject everything that does not fit within
their narrative.
Remember, they have huge marketing budgets and teams of brand managers to push these narratives. There are
thousands of entities with their competing narratives filling your screens, your news and social feeds to make
you believe them.
If you don't believe them, it doesn't matter, others will and enough of them will jump on the
bandwagon until you feel like your getting left behind or you are forced to participate whether you want to or not
(CCTV, smartphones, cashless payments, internet cookies, advertisements where ever you look, 5G towers etc.).
The front-end, the GUI, is the caring social goodness that is there for our benefit, they profess. The back-end is
the truth: It is all about money.
Tell me about your UX of life, does it delight and inspire like they said they
wanted it to?
No matter what they say, no matter what they show you, no matter what you read. Just think money.
That is what
it is about. Nothing else.
This is the crucial part: It is much easier to monetise a story that you can make people believe in than it is to
monetise something of value.
Look at the AI boom, electric vehicles or cryptocurrencies as examples. They are stories that people believe in.
Quantum computing appears to be the next looming hype cycle and perhaps space exploration as well, though have
been through that somewhat already but it will ramp up again when SpaceX goes public.
These things have happened and are happening. There is no question that after every bubble bursts, the
green shoots of actual progress start to form.
But my question is this: How much have you personally benefitted
from these technologies and how much has your life actually changed?
The shifts are microscopic compared to
the claims that are made, except for a minority of elitists.
What do these businesses, these stories have in common?
There is no limit to them. There is no cap to where they can go, in theory. That means there is no limit to where
the price can go.
Limitless greed has something to latch on to temporarily. Of course these narratives can never
fully deliver on their promises. That is why there is always the next big thing on the horizon.
Space travel, where does that end? The possibilities of intelligence and learning in the form of AI, is there a limit
on that? Turning every object and service into a cryptographic token, is there a ceiling on that you can imagine?
These are good narratives. There is a lot of room for participation in these stories which means they can jack up
the price without having to actually produce anything.
Value on the other hand can be measured, it does have limits and it often takes time to produce or implement.
It
is not conducive to rapid and limitless money making, so things of value are neglected. Things of value are
normally only appreciated when they are complete or close to completion.
Few people are interested in investing money in the process of creating something of value. They just want it
when all the work is done so they can flip it.
But for most people, without money they cannot afford to create
something of value because they need to survive in the meantime as well as meet all of the costs of development.
So, how to create something that adds real value for the benefit of
many people when investors, part of the romanticised "eco-system", are only interested in rapid price rises based
on hyperbole and fiction?
***
Discuss in the comments. Zap⚡me if you made it to the end and double down if you want me to write up a follow up piece with my personal answer (whatever you send is my only source of income)
***
About this piece:
After a few days on #nostr @primal #primal and #amethyst, I am finding this a remarkable project.
I wanted to add value by providing some long form copy for your entertainment and stimulation.
I am excited by the prospect of this protocol, it is so much more than a media platform. I hope to build on it soon.
For more about my backstory just ask or check out where I a coming from at skillissues.tech
Thanks for reading and enjoy the rest of your weekend
***
-
![](/static/nostr-icon-purple-64x64.png)
@ da0b9bc3:4e30a4a9
2025-02-09 09:50:46
Hello Stackers!
Welcome on into the ~Music Corner of the Saloon!
A place where we Talk Music. Share Tracks. Zap Sats.
So stay a while and listen.
🚨Don't forget to check out the pinned items in the territory homepage! You can always find the latest weeklies there!🚨
🚨Subscribe to the territory to ensure you never miss a post! 🚨
originally posted at https://stacker.news/items/880337
-
![](/static/nostr-icon-purple-64x64.png)
@ 127d3bf5:466f416f
2025-02-09 08:48:48
In the complex geopolitical landscape of the Middle East, particularly in Gaza, Bitcoin has emerged as an unexpected but vital tool for survival and resistance. Bitcoin's role in Gaza intertwines with broader themes of economic sanctions, geopolitical strategy, and the funding dynamics of conflict, specifically highlighting the relationship with racist Zionist policy and the genocidal ethnostate of Israel.
**Bitcoin as a Financial Lifeline**
Gaza's economy is severely constrained by a blockade that has been in place since 2007, drastically limiting traditional financial transactions. The banking infrastructure in Gaza is in ruins, with frequent Israeli military operations damaging or destroying physical bank branches and ATMs. In this context, cryptocurrencies like Bitcoin have become crucial:
Anonymity and Accessibility: Bitcoin transactions bypass traditional banking systems, offering a way to send and receive funds without the oversight of embargoed financial pathways. This anonymity helps in circumventing restrictions imposed by the blockade. Humanitarian Aid: With conventional aid routes often disrupted, Bitcoin has been used for direct aid transfers. Charities and individuals can send funds directly to wallets in Gaza, where they can then be converted to local currency or used to purchase essentials through the black market or informal trade networks. Economic Empowerment: For Gazans, Bitcoin represents not just aid but also a potential for economic empowerment, providing a means to engage in global trade or investment where traditional banks fail.
**Zionism, Israel, and the US Military-Industrial Complex**
The relationship between Zionism, Israel, and its economic and military support from the US can be viewed through the lens of geopolitical strategy and economic policy:
Economic Support: The US has provided Israel with massive military aid as part of a broader strategy to maintain influence and conflict in the Middle East which serves to fuel its war machine and weapons manufacturers through lucrative contracts. This aid, which includes billions of dollars annually directly results in the mass murder of innocents and sustains ongoing IDF military oppression including the occupation and blockade of Gaza.
Cheap Printed Dollars: The US's ability to print dollars with relatively low inflation due to its global reserve currency status allows it to fund military endeavors and support allies like Israel with seemingly endless financial resources. This perpetuates conflict by subsidizing military actions without the immediate economic repercussions felt by other nations.
Military-Industrial Complex: The continuous military aid to Israel also benefits the US military-industrial complex. Sales of weapons, surveillance technology, and other defense products to Israel create a cycle where conflict can be economically beneficial for certain sectors of the US economy.
**Conclusion**
Bitcoin in Gaza represents a beacon of hope. It underscores the ingenuity of individuals and groups finding new ways to navigate around severe economic restrictions. Meanwhile, the economic and military ties between the US and Israel, driven by cheap printed dollars, reflect deeper geopolitical strategies that perpetuate the cycle of conflict and economic dependency. In this scenario, Bitcoin emerges not just as a currency but as a symbol of both resistance and the complexities of modern warfare and peace in a digital age.
-
![](/static/nostr-icon-purple-64x64.png)
@ 43baaf0c:d193e34c
2025-02-09 07:55:15
![image](https://yakihonne.s3.ap-east-1.amazonaws.com/43baaf0c28e6cfb195b17ee083e19eb3a4afdfac54d9b6baf170270ed193e34c/files/1739087549285-YAKIHONNES3.png)
BangPOP (Bangkok Pop Art) and ThaiPOP are my Pop Art brands dedicated to capturing the essence of Thailand. While BangPOP is my primary focus, especially as I prepare for my exhibition in December 2025, my art goes beyond Bangkok to celebrate the entirety of Thailand.
Thailand is far more than its capital, and my experiences exploring the country extensively during my years with @TravelTelly, my travel, film, and photography company, have deeply inspired me. Through my art, I aim to reflect the rich culture, beauty, and diversity that make Thailand so amazing.
![image](https://yakihonne.s3.ap-east-1.amazonaws.com/43baaf0c28e6cfb195b17ee083e19eb3a4afdfac54d9b6baf170270ed193e34c/files/1739087600215-YAKIHONNES3.png)
**Why do I draw about Thailand?**
Drawing, for me, is a way to explore life, connect with cultures, and express the deep respect I hold for them. In a world often dominated by negativity, I choose to highlight the positive aspects of culture and life. It’s not about ignoring challenges but about bringing hope, joy, and inspiration through my art. Bright colors are a signature of my work, reflecting the core values: Love, Peace, and Joy.
If you look closely, you may notice subtle hints of deeper stories woven into my pieces. These details are there for those who take the time to discover them, but my focus remains on keeping my art uplifting and joyful.
-
![](/static/nostr-icon-purple-64x64.png)
@ c8841c9d:ae8048e2
2025-02-09 04:37:57
What is a cryptocurrency ?
#Blockchain #Cryptocurrency #Cryptomindmap
A cryptocurrency is a digital currency secured by cryptography.
Cryptocurrency operates on a blockchain network as a distributed ledger, secured by cryptography.
Users own the private and public keys.
For the first time in the digital age, the double spending issue is resolved thanks to the blockchain consensus mechanism. This ensures decentralization and security, creating a trustless environment where transactions are immutable once confirmed.
Cryptocurrency can be categorized in different groups
Bitcoin is the first ever created cryptocurrency on the bitcoin blockchain.
Altcoins is a generic term regrouping every crypto except Bitcoin. There are over a million of ever created Altcoins and more than 20,000 currently active. They can be:
- Coin from a programable blockchain such as Ethereum (ETH), Solana (SOL), Cardano (ADA), or Sui (SUI) for example. Ecosystem of applications are built on top of these blockchain networks.
- Token of Decentralized Application (DApp) built on programmable blockchain such as ChainLink (LINK) or Aave (AAVE) on Ethereum.
- Memecoins are a type of cryptocurrency, typically inspired by internet memes or popular culture, with little or no intrinsic value but cultural and community support. Memecoins such as Dogecoin (DOGE) or Shiba (SHIB) are some of the strongest community in crypto. The price of memecoins is also the most volatile of the entire crypto ecosystem.
A coin is the native cryptocurrency of a blockchain, used for validator rewards and transaction fees. A token, on the other hand, is built on top of an existing blockchain for specific applications.
They are two mains ways to use with cryptocurrencies.
With a wallets for direct blockchain interactions, which contains the keys to necessary for true ownership of the cryptocurrencies, similar to owning cash or any other tangible form of money.
On a centralized exchanges which act as on/off ramps for buying, selling, and keeping crypto. The exchange is in the charge of the private key. It is the equivalent of having money on a bank account.
Remember the saying "Not Your Keys, Not Your Crypto". If you don't control your private keys, you don't truly own your crypto.\
\
Users initiate transactions, send, receive and hold cryptocurrency and their wallet.
Validators ensure blockchain integrity by verifying transactions and building blocks, earning crypto in return.
Developers work on the network infrastructure and the ecosystem, including DApps. While general programming languages can be used, languages specifically designed for blockchain development, like Solidity for Ethereum, have emerged to facilitate crypto development..
Thanks for reading! 🌟 Share in comments your thoughts on cryptocurrency and what topic you would like to be mapped next! #Crypto
-
![](/static/nostr-icon-purple-64x64.png)
@ dc4cd086:cee77c06
2025-02-09 03:35:25
Have you ever wanted to learn from lengthy educational videos but found it challenging to navigate through hours of content? Our new tool addresses this problem by transforming long-form video lectures into easily digestible, searchable content.
## Key Features:
### Video Processing:
- Automatically downloads YouTube videos, transcripts, and chapter information
- Splits transcripts into sections based on video chapters
### Content Summarization:
- Utilizes language models to transform spoken content into clear, readable text
- Formats output in AsciiDoc for improved readability and navigation
- Highlights key terms and concepts with [[term]] notation for potential cross-referencing
### Diagram Extraction:
- Analyzes video entropy to identify static diagram/slide sections
- Provides a user-friendly GUI for manual selection of relevant time ranges
- Allows users to pick representative frames from selected ranges
## Going Forward:
Currently undergoing a rewrite to improve organization and functionality, but you are welcome to try the current version, though it might not work on every machine.
Will support multiple open and closed language models for user choice
Free and open-source, allowing for personal customization and integration with various knowledge bases. Just because we might not have it on our official Alexandria knowledge base, you are still welcome to use it on you own personal or community knowledge bases! We want to help find connections between ideas that exist across relays, allowing individuals and groups to mix and match knowledge bases between each other, allowing for any degree of openness you care.
While designed with #Alexandria users in mind, it's available for anyone to use and adapt to their own learning needs.
## Screenshots
### Frame Selection
![Frame Selection](https://i.nostr.build/KSSraRGTAWUa1wnc.png)
This is a screenshot of the frame selection interface. You'll see a signal that represents frame entropy over time. The vertical lines indicate the start and end of a chapter. Within these chapters you can select the frames by clicking and dragging the mouse over the desired range where you think diagram is in that chapter. At the bottom is an option that tells the program to select a specific number of frames from that selection.
### Diagram Extraction
![Diagram Extraction](https://i.nostr.build/iep37w0JYN9yT7qU.png)
This is a screenshot of the diagram extraction interface. For every selection you've made, there will be a set of frames that you can choose from. You can select and deselect as many frames as you'd like to save.
## Links
- repo: https://github.com/limina1/video_article_converter
- Nostr Apps 101: https://www.youtube.com/watch?v=Flxa_jkErqE
## Output
And now, we have a demonstration of the final result of this tool, with some quick cleaning up. The video we will be using this tool on is titled Nostr Apps 101 by nostr:npub1nxy4qpqnld6kmpphjykvx2lqwvxmuxluddwjamm4nc29ds3elyzsm5avr7 during Nostrasia. The following thread is an analog to the modular articles we are constructing for Alexandria, and I hope it conveys the functionality we want to create in the knowledge space. Note, this tool is the first step! You could use a different prompt that is most appropriate for the specific context of the transcript you are working with, but you can also manually clean up any discrepancies that don't portray the video accurately.
You can now view the article on #Alexandria
https://next-alexandria.gitcitadel.eu/publication?d=nostr-apps-101
Initially published as chained kind 1's
nostr:nevent1qvzqqqqqqypzp5r5hd579v2sszvvzfel677c8dxgxm3skl773sujlsuft64c44ncqy2hwumn8ghj7un9d3shjtnyv9kh2uewd9hj7qgwwaehxw309ahx7uewd3hkctcpzemhxue69uhhyetvv9ujumt0wd68ytnsw43z7qghwaehxw309aex2mrp0yhxummnw3ezucnpdejz7qgewaehxw309aex2mrp0yh8xmn0wf6zuum0vd5kzmp0qqsxunmjy20mvlq37vnrcshkf6sdrtkfjtjz3anuetmcuv8jswhezgc7hglpn
Or view on Coracle
https://coracle.social /nevent1qqsxunmjy20mvlq37vnrcshkf6sdrtkfjtjz3anuetmcuv8jswhezgcppemhxue69uhkummn9ekx7mp0qgsdqa9md83tz5yqnrqjw07hhkpmfjpkuv9hlh5v8yhu8z274w9dv7qnnq0s3
-
![](/static/nostr-icon-purple-64x64.png)
@ 127d3bf5:466f416f
2025-02-09 03:31:22
I can see why someone would think that buying some other crypto is a reasonable idea for "diversification" or even just for a bit of fun gambling, ***but it is not.***
There are many reasons you should stick to Bitcoin only, and these have been proven correct every cycle. I've outlined these before but will cut and paste below as a summary.
The number one reason, is ***healthy ethical practice***:
- The whole point of Bitcoin is to escape the trappings and flaws of traditional systems. Currency trading and speculative investing is a Tradfi concept, and you will end up back where you started. Sooner or later this becomes obvious to everyone. Bitcoin is the healthy and ethical choice for yourself and everyone else.
But...even if you want to be greedy, ***hold your horses***:
- There is significant risk in wallets, defi, and cefi exchanges. Many have lost all their funds in these through hacks and services getting banned or going bankrupt.
- You get killed in exchange fees even when buying low and selling high. This is effectively a transaction tax which is often hidden (sometimes they don't show the fee, just mark up the exchange rate). Also true on defi exchanges.
- You are up against traders and founders with insider knowledge and much more sophisticated prediction models that will fleece you eventually. You cannot time the market better than they can, and it is their full-time to job to beat you and suck as much liquidity out of you as they can. House always wins.
- Every crypto trade is a taxable event, so you will be taxed on all gains anyway in most countries. So not only are the traders fleecing you, the govt is too.
- It ruins your quality of life constantly checking prices and stressing about making the wrong trade.
The best option, by far, is to slowly ***DCA into Bitcoin*** and take this off exchanges into your own custody. In the long run this strategy works out better financially, ethically, and from a quality-of-life perspective. Saving, not trading.
I've been here since 2014 and can personally attest to this.
<img src="https://blossom.primal.net/35ff641203bf4d197a032a59d6815b99249561bfd3a94b4a908ed5161420466f.jpg">
-
![](/static/nostr-icon-purple-64x64.png)
@ ac6f9572:8a6853dd
2025-02-09 01:59:02
# Are you a Bitcoin or Nostr Builder, Engineer, Dev, Coder, Architect... ?
We are opening the community grants for artists to the world and inviting Artists to join remotely the collective that until now has set together this exposition in Chiang Mai, Thailand: **Freedom Tech Art**
1. Create your profile in Geyser
2. Create geyser project with images and description
3. Apply for the SnH grant from https://geyser.fund/grants/15
# Some snapshots
![](https://m.stacker.news/76726)
![](https://m.stacker.news/76727)
#Hackathon #grownostr #bitcoin #nostr #news #zap #photography #sats #asknostr #plebchain
#lightning #cashu #cryptography ~crypto #devs #dev
originally posted at https://stacker.news/items/880198
-
![](/static/nostr-icon-purple-64x64.png)
@ ac6f9572:8a6853dd
2025-02-09 01:54:02
# Are you a Bitcoin or Nostr Artist, Designer, Creative... ?
We are opening the community grants for artists to the world and inviting Artists to join remotely the collective that unntil now has set together this exposition in Chiang Mai, Thailand: **Freedom Tech Art**
1. Create your Artist profile in Geyser
2. Create geyser project and upload your art pieces or selected collection.
3. Apply for the SnA grant from https://geyser.fund/grants/14
# Some snapshots
![](https://m.stacker.news/76718)
![](https://m.stacker.news/76719)
![](https://m.stacker.news/76720)
![](https://m.stacker.news/76721)
![](https://m.stacker.news/76722)
![](https://m.stacker.news/76723)
![](https://m.stacker.news/76724)
originally posted at https://stacker.news/items/880193
-
![](/static/nostr-icon-purple-64x64.png)
@ fe32298e:20516265
2025-02-09 01:43:24
Alright, Tabby wouldn't work right with CUDA and it was impossible to troubleshoot anything.
Now we're going to try [Twinny](https://github.com/twinnydotdev/twinny).
You'll need:
* Ubuntu 24.04 or some other Linux flavor
* [VSCodium](https://github.com/VSCodium/vscodium)
* GPU with enough VRAM to hold your chosen models
* It might work with just a CPU, give it a try!
# Install Ollama
Ollama loads the AI models into VRAM (and offloads into RAM if needed) and offers inference through an API. The Ollama install script adds a dedicated `ollama` user and a systemd service so that Ollama starts automatically at boot. Ollama will unload models from memory when idle.
```
curl -fsSL https://ollama.com/install.sh | sh
```
## Configuring Remote Ollama
Skip this section if your GPU is on the same machine you're coding from. Ollama and Twinny default to a local configuration.
I'm using Ollama on a separate machine with a decent GPU, so I need to configure it to bind to the network interface instead of `localhost` by editing the systemd service:
1. Edit the service override file:
```
systemctl edit ollama.service
```
1. Add this in the top section. It will be merged with the default service file.
```
[Service]
Environment="OLLAMA_HOST=0.0.0.0:11434"
```
Note: I had a problem with Ollama only binding to the `tcp6` port, and wasted a lot of time trying to fix it. Check with `netstat -na | grep 11434` to see if it only shows tcp6 for port 11434. The workaround for me was using the actual interface IP instead of `0.0.0.0`. If you do this then you'll need to either set `OLLAMA_HOST` in your shell, or specify `OLLAMA_HOST=<hostname>` at the start of every ollama command (or it complains that it can't connect to ollama).
1. Restart Ollama:
```
systemctl daemon-reload
systemctl restart ollama
```
## Download Models
Ollama manages models by importing them into its own special folders. You can use Ollama to download the files from the [Ollama library](https://ollama.com/library), or you can import already-downloaded models by creating a [Modelfile](https://github.com/ollama/ollama/blob/main/docs/modelfile.md). Modelfiles define various parameters about the model and it's important to get them set correctly for the best performance so it's probably better to get them from the library, even though it wastes bandwidth downloading them over and over again for all these tools.
You'll want a model for chatting and a model for fill-in-middle (FIM) that does the code completions.
```
# Chat model, defaults to 7b with Q4_K_M quant, downloads 4.7 GB
ollama pull qwen2.5-coder
# Fill-in-Middle model for code completion, another 4.7 GB
ollama pull qwen2.5-coder:7b-base
```
The RAG/embeddings feature is optional but probably worth using. It needs to run a from local instance of Ollama. The embedding models are very small and run fine on CPU. Most everyone uses `nomic`, but Twinny defaults to `all-minilm`, which is a little smaller.
```
ollama pull all-minilm
```
# Install Twinny
Install the [Twinny extension](https://open-vsx.org/extension/rjmacarthy/twinny) by searching for `twinny` in VSCodium extensions.
Look for the Twinny icon on the left side panel and click it to open the Twinny panel. Be careful if you drag it over to the right side: sometimes it may not appear at all. I managed to make it appear by selecting some text and running a Twinny action on it from the context menu.
Twinny assumes you're using a local instance of Ollama. If you want to use a remote instance then you'll need to go into the **Manage Twinny providers** section (looks like a power plug) and add new providers that point your remote Ollama instance.
These are the settings I'm using for a remote Ollama instance:
## Chat provider
* Type: `chat`
* Provider: `ollama`
* Protocol: `http`
* Model Name: `qwen2.5-coder:latest`
* Hostname: *remote hostname*
* Port: `11434`
* API Path: `/v1` (despite what the Twinny docs and Ollama docs say)
* API Key: *blank*
## FIM Provider
* Type: `fim`
* FIM Template: `codeqwen`
* Provider: `ollama`
* Protocol: `http`
* Model Name: `qwen2.5-coder:7b-base`
* Hostname: *remote hostname*
* Port: `11434`
* API Path: `/api/generate`
* API Key: *blank*
## Embedding Provider
* Type: `embedding`
* Provider: `ollama`
* Protocol: `http`
* Model Name: `nomic-embed-text`
* Hostname: `0.0.0.0`
* Port: `11434`
* API Path: `/api/embed`
* API Key: *blank*
# Use Twinny
## Chat
Select code and it will be used for context in the chat, or right-click selected text to see more options like refactor, write docs, write tests.
## Embeddings
Switch over to the Embeddings tab and click Embed documents to use all the documents in your workspace for more context. Type '@' in the chat to reference the entire workspace, ask about specific problems, or specific files in your chat.
## Code Completion
Suggested stuff shows up in gray italics at the cursor location. Press `Tab` to accept it as a completion.
-
![](/static/nostr-icon-purple-64x64.png)
@ 16d11430:61640947
2025-02-09 01:03:30
As fiat currencies continue their slow-motion collapse worldwide, a disturbing pattern is emerging—food security is deteriorating, marked by frequent outbreaks of avian flu, livestock diseases, and supply chain disruptions. While mainstream narratives often blame climate change or random chance, a deeper look reveals that these crises are symptoms of a decaying financial system.
Food shortages, increasing corporate monopolization of agriculture, and government mismanagement are not random events. They are predictable consequences of monetary debasement, supply chain stress, and regulatory capture. Let’s break down how the collapse of fiat money is driving the current food crisis and why things are likely to get worse.
---
1. Early Signs: Inflation and the Cost of Farming Soar
The first cracks in the food supply system appear when inflation begins eating into farmers’ margins. Over the past few years, fertilizer prices have skyrocketed, fuel costs remain volatile, and animal feed has become more expensive due to disrupted global trade.
Example: The 2022 Fertilizer Crisis – As the U.S. and European governments sanctioned Russia, a key global supplier of potash and ammonia (key fertilizer ingredients), prices surged. Farmers in Africa, Asia, and Latin America struggled to afford these inputs, reducing food production.
Egg Prices & Avian Flu – In 2023, egg prices doubled in the U.S. and Europe, exacerbated by avian flu culling millions of hens. However, inflation played a bigger role—higher costs for feed, transport, and farm maintenance made it impossible for smaller producers to compete.
Corporate Centralization – As inflation drives small farmers out of business, giant agribusinesses like Cargill, JBS, and Tyson gain more control, further consolidating the supply chain.
At this stage, the system still functions, but food prices increase, and warning signs emerge.
---
2. Mid-Stage: Supply Chains Crack & Regulatory Failures Accelerate Outbreaks
As inflation worsens, government policies and systemic inefficiencies accelerate decay. Regulations intended to "protect" the market often do the opposite—causing supply shocks and increasing food insecurity.
Avian Flu as a Convenient Cover? – Since 2022, millions of chickens, turkeys, and ducks have been culled globally due to "avian flu outbreaks." The strange part? Many cases are based on PCR tests with high false positives rather than confirmed clinical symptoms. Some suspect regulatory agencies are exaggerating the crisis to justify price hikes and consolidate control.
U.S. Cattle Mysteriously Falling Sick – Reports surfaced in early 2024 of large numbers of cattle experiencing spontaneous respiratory illness and reproductive failures. The USDA and FDA blame viruses, but critics point to contaminated mRNA vaccines or corporate feed modifications.
Dutch Farmers vs. The State – In the Netherlands, one of Europe’s largest food producers, the government attempted to force thousands of farmers to sell their land under the guise of "nitrogen reduction." Many believe this is an effort to centralize control over food production.
At this stage, outbreaks become more frequent—not just due to biological causes, but because of poor regulation, centralized control, and financial stress leading to cost-cutting in food safety.
---
3. Late-Stage: Hyperinflation, Panic, and Rationing
Once inflation turns into hyperinflation, food becomes a political weapon. Governments respond with price controls, forced rationing, and market interventions that make things worse.
Argentina & Venezuela’s Food Rationing – In nations experiencing hyperinflation, like Argentina and Venezuela, supermarket shelves are empty, and the black market determines real prices. Government-issued food ration cards fail to provide reliable access.
French Farmers Revolt Over Regulations & Costs – In 2024, French farmers blocked highways in protest against tax hikes, environmental regulations, and soaring costs. The EU’s green policies, combined with inflation, made food production unviable.
Egg Shortages in the UK – The UK government urged people to eat fewer eggs and replace them with lab-grown alternatives as supermarkets struggled to restock due to avian flu and Brexit-related trade issues.
At this point, government incompetence and corporate profiteering worsen food insecurity, leading to riots, black markets, and authoritarian responses.
---
4. Final Collapse: Mass Starvation or Parallel Systems
As fiat systems implode, parallel markets emerge. People turn to barter, Bitcoin-based trade, and decentralized farming networks to survive.
Bitcoin for Beef – In Argentina and El Salvador, some ranchers have started accepting Bitcoin for direct meat sales, bypassing the banking system entirely.
Local Food Networks Grow – In places where trust in fiat money collapses, local food networks, permaculture movements, and barter systems gain popularity.
Lab-Grown & Insect Protein Push – Meanwhile, governments and billionaires like Bill Gates push for synthetic meat and insect-based diets, claiming they are "sustainable" while continuing policies that destroy natural farming.
At this stage, centralized systems are collapsing, but decentralized alternatives emerge—offering a path forward for those willing to adapt.
---
The Solution: Decentralization & Bitcoin-Based Trade
The fiat food system is failing because it is built on debt, leverage, and market manipulation. To ensure food security, we must return to decentralized, sound-money solutions.
Bitcoin as a Trade Standard – Farmers using Bitcoin escape capital controls and currency depreciation, ensuring fair trade.
Regenerative Agriculture & Local Food Systems – Returning to small-scale, diversified farming reduces the risk of mass outbreaks.
Self-Sovereignty Over Food – Growing your own food, supporting local farmers, and rejecting centralized food policies is the only way to break free from the collapsing system.
---
Conclusion: Recognizing the Signs Before It's Too Late
The rapid spread of avian flu, livestock diseases, and farm shutdowns are not random events. They are early warning signs of systemic decay in the fiat economy. As governments print money and impose short-sighted regulations, food security worsens.
The best way forward is decentralization—of money, farming, and trade. The collapse of fiat will bring hardship, but those who understand the game and prepare accordingly will thrive.
-
![](/static/nostr-icon-purple-64x64.png)
@ f33c8a96:5ec6f741
2025-02-09 01:02:51
I have been working on account linking in the backend for a little while and so far only GitHub has been available to users (mostly for following the dev journey on the platform)
Now with this release the existing OAUTH options AND Nostr NIP-07 authentication are surfaced and able to be linked to an existing profile on your settings page.
Put simply this allows you to easily link email, GitHub, and nostr profile in the plebdevs platform to access the same account from different login methods. This will make it much easier to keep the same profile across multiple devices AND make sure that you never lose access!
Let me know what you think and PLEASE LET ME KNOW if you find any bugs! (I love bugs 🐛)
ONWARDS 🫡
![](https://m.stacker.news/76714)
originally posted at https://stacker.news/items/880161
-
![](/static/nostr-icon-purple-64x64.png)
@ d4309e24:8a81fcb0
2025-02-09 00:16:55
## 1. What if You Could Send a Message into the Future?
Imagine leaving **a message for your future self**, a loved one, or even an entire community—one that no one, not even you, can unlock until a specific moment in time. Picture leaving **a message for your children**, a note of wisdom or love that remains hidden until they're old enough to appreciate it, all timed by Bitcoin's block height. You might also make **a bold prediction** about the future price of Bitcoin, sealing it away until the blockchain reaches a certain block height.
This is the idea behind *Hatchstr*, a decentralized app for time-locked messages that only unlock at predetermined Bitcoin block heights—no central authority required.
### Why Build This?
I want to dive into the Nostr protocol not just by reading documentation, but by actually building something that embodies its core principles: **censorship resistance**, **user ownership**, and **decentralization**. Hatchstr is both an experiment and a contribution to the Nostr ecosystem—a way to test the limits of permissionless communication while learning and engaging with the community.
## 2. The Vision: How Hatchstr Would Work for Users
At its core, Hatchstr lets users create time capsules—encrypted messages that only become readable after a specified Bitcoin block height. Here’s what that looks like:
* You design a capsule with text and images using Hatchstr’s web app.
* You pick an unlock time (e.g., 1000 blocks from now).
* The message is encrypted, locked away, and published as a Nostr event.
* At the chosen time, the decryption key is revealed, allowing the recipient to finally access the message.
![Capsule Wrapping](https://bafybeicjhrxzj5hf3bpnfh2pu2mfwz7seus3axxy3vjm3au65hd7katwne.ipfs.w3s.link/nostr_article_01_capsule_wrap.png)
#### Potential Use Cases
* **Personal Messages**: Send birthday wishes that unlock at midnight, time-delayed love letters, or notes to your future self.
* **Timed Learning**: Lock educational content to unlock when students reach key learning stages or ages.
* **Creative Storytelling**: Release serialized fiction, riddles, or treasure hunt clues that unlock over time.
* **Community & Events**: Time-gate announcements for Nostr-based communities or scheduled voting mechanisms.
### 3. The Centralized Trap: Why Build on Nostr
When thinking about how to implement this, we could go the obvious, easy route:
* Store messages on a centralized server.
* Release them when the time is right.
* Let users download their messages.
Simple, right? **But is it the right approach? Let's break it down.**
### Why This Fails
* **Single Point of Failure**: If my server goes down, all messages are unavailable.
* **Privacy Risks**: Users would need to trust me not to access their messages.
* **Ownership & Longevity**: What happens if I lose interest? The system dies with me.
![The Centralized Model](https://bafybeibcfftuaudn5vh7zrczzptvm2rni5qtcgsf2razatpyb2ewqjemf4.ipfs.w3s.link/nostr_article_01_central_model.png)
A centralized model defeats the purpose of time-locking messages. Users shouldn’t have to trust a third party. We need decentralization.
## 4. Nostr to the Rescue: How Decentralization Can Help
Instead of a single server holding messages hostage, [Nostr](https://nostr.how/en/what-is-nostr) allows users to publish messages to [decentralized relays](https://nostr.how/en/relays). Here are the key differences:
* **Nostr IDs = Self-Owned Identities**: Your public key is your identity, not tied to any company.
* **Relays = Decentralized Bulletin Boards**: Anyone can run one, ensuring redundancy and censorship resistance.
* **Messages = Signed Events:** Cryptographically signed by the sender or encrypted for only the recipient.
![The Nostr Communication Model](https://bafybeig5nsif2xts4qs4vdglgdjnsrogbfpmlgbat4gkwelaybyt4vmyum.ipfs.w3s.link/nostr_article_01_nostr_model.png)
### How Nostr Reduces Centralization
In this version of Hatchstr, capsules are still stored in a centralized manner at first until they 'hatch'. However, once the Bitcoin block height condition is met:
* **Capsule Publication**: The system publishes the capsule events to Nostr relays, making the messages available for decryption by the intended recipients.
This approach, while not eliminating the central server, allows for:
* **Third-Party Clients**: Developers can now create clients that interact with Hatchstr capsules on Nostr, enhancing the system's openness and potentially leading to a richer ecosystem around time-locked messages.
* **Decentralized Access**: Even though the initial storage is centralized, the access to the messages becomes decentralized once published to Nostr, reducing the dependency on a single point for message retrieval.
We have some improvements, **but I am sure we can do better!**
## 5. The Path to Decentralized Timekeeping
### The Timeless Nature of Encryption
Encrypted messages exist outside time—once locked, they remain secure indefinitely. Modern cryptography (like AES-256) doesn’t "expire" or weaken unless decrypted (excluding brute force attacks). This creates a paradox: How do you bind something timeless to a specific moment in the physical world?
#### The Time-Lock Puzzle Dilemma
Cryptographers have proposed [time-lock puzzles](https://iacr.org/archive/crypto2019/116940354/116940354.pdf)—encryption that requires sustained computation to unlock, theoretically forcing a minimum wait time. But these face critical hurdles:
* ##### **Hardware Uncertainty**
Solving time depends on an attacker’s computational power. A nation-state could crack in hours what takes years for a regular user.
* ##### **No Real-World Alignment**
Puzzles can’t guarantee unlocks align with calendar dates or real-world events ("unlock on my child’s 18th birthday").
* ##### **Energy Waste**
Requires continuous computation, making it environmentally impractical for longer time locking.
#### Bitcoin as a Decentralized Clock
This is where Bitcoin’s blockchain shines. Its difficulty-adjusted proof-of-work acts as a trustless metronome:
* ##### **Predictable Rhythm**
Despite hash rate fluctuations, the 10-minute block target (via difficulty adjustments) creates a consistent approximation of real-world time.
* ##### **Immutable History**
Block height 1,000,000 will always correspond to the same point in Bitcoin’s timeline, regardless of future changes in mining power
#### **Splitting the Problem**
Hatchstr can bridge timeless encryption and blockchain timing by separating concerns:
##### **1. Capsules** – The time-locked message itself:
* Design independent of the time-locking mechanism.
* Encrypted client-side.
* Content stored anywhere the user wants (IPFS, personal servers, etc.).
* Completely owned by the user—not Hatchstr.
##### **2. Clock Servers** – Independent, lightweight timing nodes that:
* Only publish decryption keys when the target Bitcoin block height is reached.
* Users can choose which Clock Server to trust.
* Anyone can run their own Clock Server.
* Multiple servers can coordinate to prevent a single point of failure.
![The Clock Server Model](https://bafybeiesfli3wjnatv6e3z3r4qlrms3i4uvl3nqzzrfixtisk4zg2w5fry.ipfs.w3s.link/nostr_article_01_clock_model.png)
**This means Hatchstr itself doesn’t store anything—users are fully in control.**
## 6. What Comes Next
This project is just beginning—a blueprint with open questions and untested assumptions. In the next two articles, I’ll explore how to turn this concept into something tangible. First, how we might design playful time capsules that can be displayed faithfully by multiple clients, balancing creativity with decentralization. Then, the messy realities of clock servers: why federating them matters, how to incentivize reliability, and borrow Bitcoin’s rhythm without centralizing control. We will dive into setting up a simple clock server to get things started.
I’m still learning Nostr’s ecosystem, and this project is as much about sharing my education as anything else. If any part of this concept makes you think “yes, but…” or “what if…”, I’d genuinely love to hear it. Find me on Nostr – no expertise required, just an interest in sending messages to the future. :
![Nostr QR](https://bafybeig6dmqshbd7khcd7qr7ce6inslx4muebtt3bk5m33f4dplsx4et7y.ipfs.w3s.link/nostr_qr.png)
```
npub16scfufrpsqcukjg7ymu4r40h7j4dwqy4pajgz48e6lmnmz5pljcqh678uh
```
Thank you for reading 🧡
-
![](/static/nostr-icon-purple-64x64.png)
@ 16d11430:61640947
2025-02-09 00:12:22
Introduction: The Power of Focused Attention
In an age of distraction, power is not merely held through material wealth, authority, or control over others—it is built through focused attention. The human brain, a complex quantum-biological processor, constructs reality through perception. When harnessed correctly, focused attention allows individuals to transcend limitations, reshape their reality, and live free.
Power, then, is not external—it is a construct supported by the mind and created within the brain. Understanding how this works offers a path to transcendence, autonomy, and liberation from imposed limitations.
The Neuroscience of Focused Attention: Constructing Reality
The brain is a prediction engine, constantly processing information and filtering out irrelevant stimuli. Focused attention directs this process, acting as a spotlight that selects what becomes part of one's conscious experience. This is the fundamental mechanism behind cognitive power.
1. Neuroplasticity: Building Power Through Repetition
The brain adapts to repeated stimuli through neuroplasticity. What one focuses on consistently rewires neural pathways, strengthening certain thoughts, beliefs, and abilities. Over time, this focus builds an internal structure of power—a network of ideas and perceptions that define one’s reality.
If one focuses on problems, they grow.
If one focuses on solutions, they appear.
If one focuses on fear, it shapes perception.
If one focuses on mastery, skills develop.
2. The Quantum Mind: Attention as a Creative Force
Quantum physics suggests that observation influences reality. Just as subatomic particles behave differently when measured, focused attention may act as a force that shapes possibilities into tangible outcomes.
This aligns with the ancient concept that "energy flows where attention goes." What one attends to with intention can manifest as action, opportunity, and ultimately, freedom.
3. The Reticular Activating System (RAS): Filtering Reality
The Reticular Activating System (RAS) in the brainstem acts as a gatekeeper for focus. It determines what information enters conscious awareness. When trained, it can filter out distractions and amplify pathways toward a desired goal.
Want to see opportunities? Program the RAS by setting clear intentions.
Want to break free from limiting beliefs? Train focus away from conditioned fears.
The Mind’s Role: Transcending Limitations
The mind is the interpreter of the brain’s electrical and biochemical activity. While the brain processes raw data, the mind provides meaning. This distinction is crucial because meaning determines how one experiences reality.
1. Breaking Mental Chains: Rewriting Narratives
Most limitations are narratives—stories imposed by culture, society, or personal history. True power lies in rewriting these stories.
Instead of “I am trapped by my circumstances,” shift to “I create my own reality.”
Instead of “I need permission,” shift to “I give myself permission.”
By restructuring meaning, the mind can redefine the limits of what is possible.
2. The Silence Paradox: Accessing Higher States
Silence, both literal and mental, creates space for higher-order thinking. Just as quantum tunneling allows subatomic particles to pass through barriers without energy loss, silence allows the mind to bypass noise and access deeper intelligence.
Meditation, stillness, and solitude amplify internal power.
The ability to not react is a form of control over external influence.
True mastery comes from detachment—engaging the world without being controlled by it.
Transcendence: Living Free Through Mental Autonomy
To transcend means to rise above imposed structures—whether societal, psychological, or energetic. The construct of power built through focused attention allows one to escape control mechanisms and live autonomously.
1. Sovereignty of Mind: Owning One’s Thoughts
A free mind is one that chooses its inputs rather than being programmed by external forces. This requires:
Awareness of mental conditioning (social narratives, propaganda, biases)
Intentional thought selection (curating what enters the mental space)
Guarding attention fiercely (not allowing distraction to hijack focus)
2. Detachment From Control Structures
Society operates on the principle of attention capture—through media, politics, and algorithms that direct thought patterns. Escaping these requires detachment.
Do not react emotionally to fear-based programming.
Cultivate independent thought by questioning imposed narratives.
Reduce external noise to amplify internal wisdom.
3. The Flow State: Moving Beyond Constraints
When focus is refined to its highest degree, one enters flow state—a condition where action and awareness merge, and limitations dissolve.
In flow, work becomes effortless.
Creativity becomes boundless.
Freedom becomes not just a philosophy, but a lived experience.
Conclusion: The Mind as the Ultimate Key to Freedom
Power is not an external possession—it is the ability to direct one’s own focus. Through the interplay of brain function, cognitive attention, and mental discipline, one constructs personal sovereignty. The individual who masters focus, controls reality.
Freedom is not given. It is built—through attention, intention, and an unwavering commitment to mental autonomy.
-
![](/static/nostr-icon-purple-64x64.png)
@ 16d11430:61640947
2025-02-08 23:54:40
Language is more than just words—it’s a pattern, a rhythm, a system of meaning that our brains decode in different ways. While most people learn language analytically, breaking it down into individual words and sentences, gestalt language processors (GLP) acquire language in a completely different way. They learn in chunks, grasping entire phrases and only later dissecting them into smaller parts.
This unique method of language acquisition is often observed in autistic individuals and those with alternative cognitive processing styles. But what happens when such a learner interacts with a highly inflected, agglutinative language like Malayalam? As it turns out, Malayalam might be one of the best-suited languages for gestalt language processors, thanks to its natural structure, flexible syntax, and phrase-based meaning.
Let’s explore why Malayalam aligns so well with gestalt processing and how it compares to other languages.
---
Understanding Gestalt Language Processing
Gestalt language processing is the ability to acquire and use language in whole phrases rather than as individual words. Instead of learning word-by-word, GLP learners store entire sentences or expressions they hear and later modify them into new, meaningful statements.
For example, a child who is a gestalt processor might initially say:
➡ "Do you want some juice?" (because they've heard it as a whole phrase)
Later, they might extract parts and start saying:
➡ "Want juice."
Finally, they construct their own original sentence:
➡ "I want juice."
This approach is pattern-based rather than rule-based, making Malayalam an excellent match due to its agglutinative grammar, rhythmic structure, and flexible word order.
---
How Malayalam Supports Gestalt Language Processing
1. Malayalam’s Agglutinative Nature Encourages Chunk Learning
Malayalam, like other Dravidian languages, is highly agglutinative, meaning words are built using multiple suffixes that change meaning. Instead of discrete words, many phrases function as a single semantic unit—which is exactly how GLP learners process language.
Take the word "വീട്" (vīṭu) meaning "house":
വീട്ടിൽ (vīṭṭil) – in the house
വീട്ടിലേക്ക് (vīṭṭilēkk) – towards the house
വീട്ടിലേക്കു പോകുന്നു (vīṭṭilēkku pōkunnu) – going to the house
A gestalt processor might first acquire "വീട്ടിലേക്കു പോകുന്നു" as a chunk, rather than breaking it into individual words. Over time, they start recognizing patterns and modifying them.
This is in contrast to English, where "going" and "house" are learned separately before forming a phrase like "going to the house."
---
2. Flexible Word Order Aligns with Pattern-Based Learning
Malayalam allows word order variations without losing meaning, making it an intuitive fit for gestalt learners who focus on meaning first rather than strict syntax.
For example, the sentence "I drank tea" can be expressed in multiple ways in Malayalam:
ഞാൻ ചായ കുടിച്ചു. (ñān cāya kuṭiccu) – Standard word order
ചായ ഞാൻ കുടിച്ചു. (cāya ñān kuṭiccu) – Emphasizing "tea"
കുടിച്ചു ഞാൻ ചായ. (kuṭiccu ñān cāya) – Focus on the action
A gestalt learner might acquire an entire phrase like "ചായ കുടിക്കണോ?" ("Do you want tea?") and later extract the verb "കുടി" (drink) or the noun "ചായ" (tea) as they develop more flexible speech.
In contrast, languages like English and French have more rigid word order, making it harder for gestalt learners to generalize.
---
3. Long and Embedded Sentence Structures Favor Chunk-Based Processing
Malayalam commonly uses long, nested sentences, which gestalt learners store as full units before breaking them down.
For example:
അവൻ പറഞ്ഞത് ഞാൻ അറിഞ്ഞില്ല.
(avan paṟaññatu ñān aṟiññilla)
Literal: "What he said, I didn’t know."
Gestalt learners may first acquire: "അവൻ പറഞ്ഞത്" ("What he said") as a single unit before extracting "പറഞ്ഞത്" (said).
This mirrors how **gestalt processors extract meaning from larger linguistic units over time.
-
![](/static/nostr-icon-purple-64x64.png)
@ 16d11430:61640947
2025-02-08 23:31:00
A Hitchhiker’s Guide to Intergalactic Trade, Verified on the Blockchain
Somewhere in the unfashionable backwaters of the Milky Way, a small blue planet is busy debating whether it should be more concerned about social media algorithms or the growing irrelevance of its own economy. Meanwhile, out there in the cosmic gigaverse, civilizations with far more interesting problems are engaging in the great intergalactic hustle—trading tech, swapping energy signatures, and making quantum side deals faster than you can say "proof-of-work."
Humanity, as per usual, has arrived late to the party but is hoping to slip in unnoticed and pretend like it’s been part of the game all along. The problem? We don’t know the rules, we don’t know what we have to offer, and most importantly, we don’t even have an invite.
Fortunately, the universe is a decentralized, peer-to-peer system, much like Bitcoin—only with fewer arguments on Twitter. And if we play this right, we might just hustle our way into the Universal Indira Net, the cosmic marketplace where civilizations exchange technology, knowledge, and, quite possibly, dad jokes that transcend space-time.
---
Step 1: Plugging into the Universal Indira Net
According to ancient Hindu mythology, Indra’s Net is an infinite web where each node reflects all others, meaning everything is connected to everything else, forever. Sounds poetic, right? Well, take that concept, throw in some decentralized cryptographic verification, and you've got the backbone of a cosmic trade network where trust isn’t just assumed—it’s mathematically proven.
In theory, Earth should be able to sync up with the Universal Indira Net, but there’s one small problem: our civilization hasn’t even solved its own internet yet. Forget interstellar trade—we still struggle with buffering. Until we build long-range, high-bandwidth, interference-proof communication systems, we’re basically screaming into the void, hoping someone hears us (and doesn’t immediately categorize us as "primitive and likely to start wars over fictional borders").
Luckily, we are making some progress:
NASA’s Laser-Based Comms: Just last year, NASA’s Deep Space Optical Communications (DSOC) project sent data 19 million miles at broadband speeds. In galactic terms, this is the equivalent of tossing a USB drive across your front yard, but hey, it’s a start. (source)
Quantum Entanglement Messaging: Scientists are theorizing about using spooky action at a distance to send information instantaneously across the galaxy. Of course, it’s still at the “we swear this works on paper” stage.
Gravitational Wave Emails: There’s a wild theory that gravitational waves could be harnessed for communication, which means the universe has literally been shaking with missed calls for billions of years.
If we can bootstrap any of these into a reliable cosmic broadband, we might just be able to negotiate our way into the interstellar group chat.
---
Step 2: What Do We Bring to the Table?
Now, assuming we finally manage to stop talking to ourselves and make first contact, the next big question is: what the hell do we trade?
Here’s what we know about intergalactic economics:
1. No one wants our money – Fiat currency is an Earth-only meme. The only currency that might hold value out there is Bitcoin, because at least it’s energy-backed and provably scarce. But even then, aliens are likely using something far more advanced—probably a universal ledger that encodes information directly into quantum spacetime fabric.
2. Physical goods are inefficient – Nobody’s going to fly across light-years to pick up a shipment of human-made Teslas when they can 3D print their own antimatter-powered space yacht.
3. Knowledge is king – The real hustle is in information. Code, algorithms, AI models—things that can be transmitted at the speed of light and verifiably proven on-chain.
Trade Goods That Might Actually Be Worth Something:
AI & Quantum Computing Models – If we develop AI that thinks in ways alien civilizations haven’t considered, we’ve got intellectual property worth trading.
Biological Engineering & Longevity Tech – If Earth figures out how to stop aging, you can bet intergalactic billionaires (assuming they exist) would pay for that.
Mathematical Breakthroughs – Math is the universal language, and if we crack new fundamental theorems, we might just have something of value.
Which means the best way to hustle our way into the Indira Net is to become the best at something. And right now, the only thing we’ve truly mastered is making memes and overcomplicating financial systems.
---
Step 3: Navigating the Cosmic Trade Rules
Of course, even if we have something valuable, trading with advanced civilizations isn’t as simple as sending an invoice.
We don’t even know the rules of interstellar engagement yet. But if galactic trade works anything like human history, we should expect:
Regulatory Compliance – Because even in space, there’s bound to be paperwork. If we get lucky, aliens might use smart contracts instead of lawyers.
Sanctions & Trade Embargoes – You think Earth’s geopolitics are complicated? Try interstellar diplomacy, where embargoes might involve entire planetary quarantines.
Intellectual Property Theft – If we’re not careful, we might trade away humanity’s most valuable discovery for an alien NFT that depreciates instantly.
Which is why any trade network must be built on provable, immutable verification systems—aka, blockchain.
This is where DamageBDD, Bitcoin, and cryptographic proofs come into play. If we can create a system that ensures:
✅ Technology is verified before it’s traded
✅ Ownership and utility are recorded on an immutable ledger
✅ Contracts execute autonomously with zero-trust mechanics
Then we might just stand a chance of becoming a respected node in the Universal Indira Net, rather than a civilization that gets rug-pulled by intergalactic venture capitalists.
---
Final Thought: The Cosmic Hustle is Just Beginning
Humanity is still in the tutorial level of the interstellar economy. We’re fumbling with our first trade attempts, trying not to get exploited, and desperately figuring out how not to be the cosmic equivalent of a developing nation selling raw materials to advanced intergalactic conglomerates.
But if we:
Build high-speed interstellar comms
Develop technology that is uniquely valuable
Create trustless, verifiable trade systems
…then we won’t just be another planetary backwater. We’ll be a node in the greatest decentralized network of all time.
The Cosmic Hustle is real. The only question is: will we be the hustlers or the ones getting hustled?
-
![](/static/nostr-icon-purple-64x64.png)
@ daa41bed:88f54153
2025-02-08 23:29:14
Imagine a world where governments, long trusted to protect fiat currencies that can be printed without limit, openly declare that they trust a decentralized digital asset over traditional money. In recent months, that vision has begun to crystallize.
The Czech National Bank has signaled a gradual acceptance of digital assets as part of its broader monetary policy recalibration with changes to how capital gains taxes are handled on Bitcoin and a possible adoption by its central bank into its reserves stockpile. Simultaneously, El Salvador- once the poster child for Bitcoin as legal tender- has fine-tuned its policy framework at the behest of the WEF to no longer accept Bitcoin as legal tender. Meanwhile, several U.S. states have introduced bills to establish official Bitcoin reserves, and many are under active consideration. See [Bitcoin Laws](https://Bitcoinlaws.io/) for a full breakdown of where these bills stand. Let's explore the pros of governments adopting strategic Bitcoin reserves.
Bitcoiners have long argued that the ultimate endorsement of Bitcoin comes when even the most established state institutions place their trust in it. Recent moves by several U.S. states—where lawmakers are proposing legislation to create official Bitcoin reserves—lend credence to this argument. When state governments start to codify the creation of a Bitcoin reserve, it signals that even entities steeped in traditional financial orthodoxy now recognize Bitcoin as a viable, strategic asset. For these states, it is imperative to accumulate hard assets like Bitcoin in reserves as they have no control over the monetary supply and, therefore, can suffer from debasement just as much as any citizen or sovereign nation not in control of their currency.
Suppose you have kept up with [recent news](https://decrypt.co/303304/czech-central-bank-bitcoin-reserve) that the Czech national bank was considering holding a considerable portion of their assets in Bitcoin. In that case, you understand the paradigm shift we are seeing. Banks are becoming less cautious in handling digital assets in a stark department, compared to previous dismissals of cryptocurrencies as genuine assets. While it is true that European Central Bank president Christine Lagarde wields considerable influence on monetary policy in Europe and may have put a temporary damper on the Czech central bank's aspirations for now ([See Reuters](https://www.reuters.com/markets/europe/ecbs-lagarde-slaps-down-czech-proposal-Bitcoin-reserves-2025-01-30/)), it should be evident that in the words of some Bitcoiners, "nothing stops this train." For Bitcoiners, such shifts validate the claim that Bitcoin's decentralized, algorithmic structure outperforms fiat systems, which are vulnerable to political manipulation and unchecked inflation. The Czech president's [signing into law](https://www.coindesk.com/policy/2025/02/06/czech-republic-to-eliminate-taxes-on-long-term-crypto-gains) a bill removing capital gains tax from all Bitcoin held for at least three years proves that even those at the highest levels of policy creation are beginning to lose control of the narrative.
This state endorsement is more than symbolic. It is a strategic vote of confidence in Bitcoin's underlying technology—its transparent, immutable ledger and deflationary nature. When lawmakers and regulators in the United States start to invest public resources in Bitcoin, it undermines the decades-old narrative that only traditional assets like gold or oil are worthy of state backing. Instead, it repositions Bitcoin as an asset not just with a future but of the future. It can enhance and even replace all other existing reserve assets, lending further proof of Bitcoin as a store of value.
Bitcoin's capped supply is at the core of its appeal—only 21 million coins will ever exist. Bitcoiners assert that this scarcity is fundamental to Bitcoin's value proposition. A strategic Bitcoin reserve at any governmental level would effectively lock away a significant portion of the circulating supply, increasing its scarcity and further driving its price up.
Many in the Bitcoin and overall crypto community lauded President Bukele's 2021 announcement that his country would begin accumulating Bitcoin and giving it legal tender status. To Bitcoiners, it was a sign that governments were starting to see Bitcoin as a legitimate store of value, a medium of exchange, and vindication of everything they had fought for over the years. Of course, many will want to say that the country's acquisition of Bitcoin was simply a power play to get the World Economic Forum to come to the bargaining table, but if so, what? Here we are four years later, and El Salvador is [no longer requiring Bitcoin as legal tender](https://newsroompanama.com/2025/02/07/el-salvador-ends-Bitcoin-as-legal-tender-heres-why-Bitcoin-didnt-work/). This is not a step back, it is simply another example of why we are winning. I'll discuss this further in another article, but isn't it convenient that President Bukele continues to accumulate Bitcoin for his country after making a concession to the WEF for funds? Tick, tock, next block.
Bitcoiners view introducing reserve bills across U.S. states as a powerful mechanism for further tightening Bitcoin's available supply. Each government-held coin is one fewer coin available to the market, creating a scarcity premium. Market forces do not artificially impose this scarcity but are instead the natural outcome of an institution with deep pockets choosing to hold Bitcoin as a strategic asset. In a world where every coin in reserve represents a bulwark against inflation and economic uncertainty, Bitcoiners argue that this state-induced scarcity will profoundly affect Bitcoin's value over time. If you don't believe that to be the case, look at this chart of coins available on OTC desks last year, and let me tell you that you are not bullish enough. I'll explore the impact of OTC sales on price in a future article.
![OTC Supply](https://relay.geektoshi.tech/6386d3894e0d1b0bc42616803c0ca2d996f012f9b536e239a9582b197bff01a3.jpeg)
For years, Bitcoiners have decried the inherent weaknesses of fiat currencies—specifically, the ease with which governments can expand the money supply, leading to inflation and eroded purchasing power. Bitcoin, on the other hand, offers a fixed supply, decentralized issuance, and an ever-shrinking inflation rate that makes it immune to the government's printing press.
When a government opts for Bitcoin reserves, it makes a financial decision and a political statement. It says that the era of limitless money printing is over and that transparency, decentralization, and scarcity are the hallmarks of a sound monetary system. Institutional legitimacy is crucial for any asset that aspires to be a cornerstone of the global financial system.
When the United States, the world's largest economy, signals its intent to hold Bitcoin in its reserves, it sends a resounding message that can trigger a domino effect worldwide. The recent [repeal of SAB121](https://cointelegraph.com/news sec-cancels-crypto-accounting-guidance-sab-121) by the Securities and Exchange Commission is a step in the right direction, by now allowing companies and course, governments at every level to accumulate Bitcoin into their reserves. When central banks like the Czech National Bank begin to signal openness toward digital assets, it paves the way for broader institutional participation. Once wary of the volatile digital asset market, financial institutions, asset managers, and [even pension funds](https://www.wpr.org/news/wisconsin-pension-fund-bitcoin) are gradually warming up to Bitcoin.
We cannot underestimate what sort of network effect this will have on Bitcoin as its utility and value proposition become more robust as a result of state-level adoption. Bitcoiners believe that such a shift will cement Bitcoin's status as a universally accepted and trusted store of value, capable of challenging—and eventually surpassing—traditional reserve assets like gold and fiat currencies.
One of the most enduring arguments among Bitcoiners is that Bitcoin is the digital successor to gold. For centuries, gold has been the haven, the ultimate store of value during times of crisis. Bitcoin, with its fixed supply and digital accessibility, is ideally positioned to take over that role in the modern era. A state-backed Bitcoin reserve would serve as this narrative's definitive stamp of approval. If a government is willing to set aside billions of dollars in a digital asset, it must believe that this asset can preserve and even appreciate its value over time. Such a move would provide a critical psychological boost to the market, as both retail and institutional investors begin to see Bitcoin as not just a speculative tool but as the modern equivalent of a haven set. Gold continues to appreciate this year while Bitcoin remains relatively flat. How long until we see it decouple from the markets and witness price appreciation not seen since the last halving?
I hope you enjoyed reading this lengthy article on the pros of governments adopting a strategic Bitcoin reserve. If you'd like to chime in, you can find me on Nostr via [@geek](https://www.primal.net/geek) on Primal, or via [my npub]( .npub1m2jphmdkskgnvwl5gplksl9e0zwv2sldqf9mwlpz6tyymz84g9fsqr3wgu) anywhere else. In part two, I will examine the other side of the debate, the cons, and the potential pitfalls of such a policy. Stay tuned!
-
![](/static/nostr-icon-purple-64x64.png)
@ a012dc82:6458a70d
2025-02-08 22:44:44
The world of cryptocurrency has always been a rollercoaster of highs and lows, but recent developments in the Bitcoin market have caught the attention of investors worldwide. The circulating supply of Bitcoin in profit has surged to a multi-year high, a phenomenon not seen since the heady days of November 2021 when Bitcoin reached its all-time high. This significant milestone, backed by data from industry analysts at Glassnode and a detailed report from Bitfinex, paints a picture of a robust Bitcoin market. The implications of this surge are far-reaching, affecting not just seasoned cryptocurrency traders but also new investors who are contemplating dipping their toes into the Bitcoin pool. This article aims to dissect this trend, exploring its roots, its impact on the market, and what it potentially spells out for the future of Bitcoin investment.
**Table Of Content**
- Understanding the Surge
- Implications for Long-term Investors
- Market Strength and Investor Confidence
- Potential Early Signs of a Bull Market
- Caution and Market Dynamics
- Conclusion
- FAQs
**Understanding the Surge**
The surge in Bitcoin's circulating supply in profit is a complex phenomenon, driven by a confluence of market dynamics and investor behavior. The recent increase in Bitcoin's price, which saw it soar above $37,000, is a primary factor. This price hike has pushed a significant portion of Bitcoin into profitable territory. According to the Bitfinex report, over 16.3 million Bitcoin, a staggering amount by any measure, are currently in profit. This figure is considerably higher than the historical average, suggesting a market that is not only recovering but thriving. The surge is not just a momentary blip but a reflection of deeper market trends, including increased institutional interest in Bitcoin, broader acceptance of cryptocurrencies as a legitimate asset class, and the growing perception of Bitcoin as a hedge against inflation and currency devaluation.
**Implications for Long-term Investors**
For long-term investors, this surge in Bitcoin's profitability is a beacon of stability in the typically volatile cryptocurrency market. The fact that 70% of Bitcoin's total circulating supply has remained static over the past year is indicative of a maturing market where investors are increasingly viewing Bitcoin as a long-term investment rather than a quick profit opportunity. This holding pattern contributes to a tightening of supply, which, coupled with increasing demand, can lead to a sustained price increase. However, long-term investors should also be aware of the potential risks. The cryptocurrency market is still relatively young and can be influenced by regulatory changes, technological advancements, and shifts in investor sentiment. Therefore, while the current trend is encouraging, it should be viewed within the broader context of market dynamics.
**Market Strength and Investor Confidence**
The current state of the Bitcoin market is a testament to its growing strength and the confidence it instills in investors. With a majority of holders seeing positive returns, there's a renewed vigor in the market, attracting both retail and institutional investors. This influx of new investment can further stabilize the market and potentially drive prices higher. However, this increased investor confidence must be tempered with a degree of caution. The cryptocurrency market is known for its rapid fluctuations, and what goes up can just as quickly come down. Investors should be mindful of the inherent risks and conduct thorough research before making any investment decisions. The market's strength, while promising, is not a guarantee of future performance, and a prudent investment strategy should always be in place.
**Potential Early Signs of a Bull Market**
The analysis by Bitfinex suggests that the market might be in the early stages of a bull market. This is a significant indicator for investors, as bull markets are characterized by rising prices and increased buying activity. If this trend continues, it could lead to substantial gains for those invested in Bitcoin. However, predicting market movements, especially in the volatile world of cryptocurrencies, is fraught with uncertainty. While the signs are positive, they are not infallible indicators of future performance. Investors should therefore approach this potential bull market with optimism tempered by realism, recognizing that market conditions can change rapidly and without warning.
**Caution and Market Dynamics**
In the face of these optimistic trends, a word of caution is warranted. The cryptocurrency market is notoriously unpredictable, and while the current indicators are positive, they are not immune to sudden and unexpected changes. Factors such as regulatory announcements, technological breakthroughs, or macroeconomic shifts can rapidly alter the market landscape. Therefore, investors should remain vigilant, keeping abreast of market news and trends. Diversification of investments, a keen understanding of market dynamics, and a clear investment strategy are essential tools in navigating the complexities of the Bitcoin market.
**Conclusion**
The surge in Bitcoin's circulating supply in profit to a multi-year high marks a significant milestone in the cryptocurrency's journey. It reflects a market that is gaining maturity, strength, and the confidence of its investors. This development could herald the beginning of a new era for Bitcoin, characterized by stability and sustained growth. However, the path of Bitcoin and the broader cryptocurrency market remains unpredictable. Investors should therefore approach this market with a well-informed strategy, balancing optimism with a healthy dose of caution. In the ever-evolving world of cryptocurrency, staying informed and adaptable is key to navigating the market's highs and lows.
**FAQs**
**How does this surge affect long-term investors?**
Long-term investors may see this as a sign of market stability and maturity, indicating that Bitcoin is increasingly being viewed as a viable long-term investment.
**Could this trend indicate the start of a Bitcoin bull market?**
While the surge in profitable Bitcoin supply could be an early sign of a bull market, predicting market movements in the volatile cryptocurrency sector is complex and uncertain.
**What percentage of Bitcoin's circulating supply is currently in profit?**
Over 83% of Bitcoin's circulating supply is reported to be in profit, according to recent data.
**What should investors be cautious about in light of this surge?**
Investors should be aware of the inherent volatility in the cryptocurrency market and consider factors like regulatory changes, technological advancements, and broader market dynamics before making investment decisions.
**How does the current Bitcoin market compare to historical averages?**
The current percentage of Bitcoin in profit is significantly higher than the historical average, indicating a particularly strong market phase.
**That's all for today**
**If you want more, be sure to follow us on:**
**NOSTR: croxroad@getalby.com**
**X: [@croxroadnews.co](https://x.com/croxroadnewsco)**
**Instagram: [@croxroadnews.co](https://www.instagram.com/croxroadnews.co/)**
**Youtube: [@croxroadnews](https://www.youtube.com/@croxroadnews)**
**Store: https://croxroad.store**
**Subscribe to CROX ROAD Bitcoin Only Daily Newsletter**
**https://www.croxroad.co/subscribe**
***DISCLAIMER: None of this is financial advice. This newsletter is strictly educational and is not investment advice or a solicitation to buy or sell any assets or to make any financial decisions. Please be careful and do your own research.***
-
![](/static/nostr-icon-purple-64x64.png)
@ c1e6505c:02b3157e
2025-02-08 21:52:51
\*\*\*"Time is the best teacher but unfortunately it kills all of its students."\*\*\* I'm currently visiting my dad for a few days as I had to take my car in for some repairs and maintenance, which included an oil gasket leak, power steering fluid flush, brake fluid flush, spark plugs, and the works. The process took a couple of hours to complete, so instead of waiting in the waiting room or having someone pick me up to go wait comfortably at home, I decided to walk around with my camera and try to make some new work. I have to say, there's really nothing more that I enjoy than walking aimlessly in an area that I have never been and taking photographs. \*I love it.\* I lose myself and everything that is on my mind that I "worry" about. I'm present, in the zone, and honestly having a great time. Photography for me is a portal to enter a state of mind that transcends time and space. The area that I was in was very industrial, so my walk started next door at the other car mechanic shop, and I meandered down to the small local town where some shops were. Didn't see too much, so I turned around and started walking back down the other way. Sometimes I don't see anything of interest for a while. What I have noticed though, as a little trick to start having things "come out of the woodwork," is just to start shooting at the first thing that captures my interest. Getting the ball rolling with pushing the shutter somehow gets me in the "flow state" that I enjoy getting in when making photographs. \\\[ !\[\](https://substackcdn.com/image/fetch/w\_1456,c\_limit,f\_auto,q\_auto:good,fl\_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F027a5466-47a8-4c9a-b3dc-c9acf0a31a12\_2500x1786.jpeg)\\\]( As I walked further, I visited a plant nursery that was just opening. The woman who was opening the gate was very nice and invited me into walk around and do as I please. There were a few nice plants around, but what gravitates me the most is seemingly, to others maybe, the "ugly stuff" or the subject matter that one wouldn’t really consider making a photograph of. Blank spaces, trash, neglect - it's all good stuff to me. The light falling upon these subjects makes them interesting. After the nursery, I found a large industrial facility and a train yard. A worker stood next to one of the train cars, so I went up and asked what they were loading. He said that he’s been working there for 30 years, and that they make plastic trash bags, and those tubes feeding into the train cars were pumping out plastic beads for production. I thought that was interesting. We chatted for a bit, I thanked him for his time, and moved on. !\[\](https://substackcdn.com/image/fetch/w\_1456,c\_limit,f\_auto,q\_auto:good,fl\_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F70512ba8-8c29-4454-8cd7-3d030c17730f\_1786x2500.jpeg) !\[\](https://substackcdn.com/image/fetch/f\_auto,q\_auto:good,fl\_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F70512ba8-8c29-4454-8cd7-3d030c17730f\_1786x2500.jpeg) !\[\](https://substackcdn.com/image/fetch/w\_1456,c\_limit,f\_auto,q\_auto:good,fl\_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd3d8ef1c-4381-49f2-a5cd-5266f3208d91\_2500x1786.jpeg) !\[\](https://substackcdn.com/image/fetch/w\_1456,c\_limit,f\_auto,q\_auto:good,fl\_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2b32f8fd-2f47-4f6a-9592-9fba9d3e6e57\_2500x1786.jpeg) !\[\](https://substackcdn.com/image/fetch/w\_1456,c\_limit,f\_auto,q\_auto:good,fl\_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb8716d86-acdb-4b3a-a61b-8c1abb6ab737\_2500x1786.jpeg) !\[\](https://substackcdn.com/image/fetch/f\_auto,q\_auto:good,fl\_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9d7bc288-0707-4e17-a420-aa08fb53b817\_2500x1670.jpeg) !\[\](https://substackcdn.com/image/fetch/w\_1456,c\_limit,f\_auto,q\_auto:good,fl\_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F499acae7-e563-45fd-86b7-32ae3d20150f\_2500x1786.jpeg) !\[\](https://substackcdn.com/image/fetch/w\_1456,c\_limit,f\_auto,q\_auto:good,fl\_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff626a80d-5a43-485e-a50c-747c346388a0\_1670x2500.jpeg) !\[\](https://substackcdn.com/image/fetch/w\_1456,c\_limit,f\_auto,q\_auto:good,fl\_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F472d5556-7ef4-4f6a-a48e-7eccf39088d3\_2500x1670.jpeg) !\[\](https://substackcdn.com/image/fetch/w\_1456,c\_limit,f\_auto,q\_auto:good,fl\_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F724c8133-fe4e-41c4-b383-3aaec42d50a1\_2500x1786.jpeg) Eventually, I ended up at a church with these really nice orange and brown doors. I sat on a bench in the back to kill some time, listening to a few podcasts. While I was there, I noticed a sign that read: \*"Happy moments, praise God. Difficult moments, seek God. Quiet moments, worship God. Painful moments, trust God. Every moment, thank God."\* I’m not a religious guy per se, haven’t been to church in over a decade, and I’ve had my own experiences — psychedelics included — where I’ve glimpsed something I’d call “God.”, but there’s something to take from that. Whatever your definition of “God” is, there’s value in gratitude whether things are good or bad. Life itself is a miracle. Appreciating the small things keeps you grounded, humble, and connected. !\[\](https://substackcdn.com/image/fetch/f\_auto,q\_auto:good,fl\_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F102b529f-a7ea-4346-889b-2b1f51b48c63\_2500x1786.jpeg) !\[\](https://substackcdn.com/image/fetch/w\_1456,c\_limit,f\_auto,q\_auto:good,fl\_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fef07f101-4645-4439-b050-72c9fe551b1f\_1786x2500.jpeg) !\[\](https://substackcdn.com/image/fetch/f\_auto,q\_auto:good,fl\_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fce6960c5-e78c-4b3e-b0fe-78e773b6a518\_2500x1786.jpeg)) \*Just in case you missed it…\* \*\*I have a limited edition framed print that I will have available until February 28th.\*\* Only two will be made, and they will come framed; one in black, one in silver. If you enjoy my work, this would be a great collectors piece. !\[\](https://substackcdn.com/image/fetch/w\_1456,c\_limit,f\_auto,q\_auto:good,fl\_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3d3033ae-b71a-4505-9d2c-f899df1a535b\_2313x2313.jpeg)\\\]() \*\*\*I shoot with a Leica M262, and edit in Lightroom + Dehancer\*\*\* \[\*\*\*Use “PictureRoom” for 10% off Dehancer Film\*\*\*\](https://www.dehancer.com/shop/pslr/film) If you’ve made it this far, thank you for taking the time to view my work - I appreciate it. Please consider becoming a paid subscriber to support my work. Also, please contact me if you would like to purchase any of my prints. !\[\](https://substackcdn.com/image/fetch/w\_1456,c\_limit,f\_auto,q\_auto:good,fl\_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe6ad5a3e-cb60-4246-9bb3-9f8849d3591e\_4000x3551.jpeg) \[Dehancer Film (promo code "PICTUREOOM")\](https://www.dehancer.com/shop/pslr/film) \*If you've found value in this newsletter, I'd be incredibly grateful for your support. While these posts will always be freely available, becoming a paid subscriber helps ensure I can continue delivering quality content to your inbox. Share this newsletter with friends, leaving a comment, or simply hitting the 'like' button all make a difference.\* Thank you - Colin
-
![](/static/nostr-icon-purple-64x64.png)
@ 32e18276:5c68e245
2025-02-08 20:20:46
This period of the Damus OpenSats grant has been productive, and encompasses the work past our alpha release of Notedeck. Since we sent our last report on Dec 5, this encompasses all the work after then.
Damus is supported by the OpenSats LTS grant, which allows us to continue working on the goodies below. Thank you!
## Damus Notedeck
### Added
- Initial algo timelines (William Casarin) [#712](https://github.com/damus-io/notedeck/pull/712)
- Initial support for local-network P2P nostr: multicast support (William Casarin) [#626](https://github.com/damus-io/notedeck/pull/626)
- First steps toward the notedeck browser: multiple app support [#565](https://github.com/damus-io/notedeck/pull/565)
- Clicking a mention now opens profile page (William Casarin) [5a241d730](https://github.com/damus-io/notedeck/commit/5a241d730e3d83f8057e211485edfde2f3c96e54)
- Note previews when hovering reply descriptions (William Casarin) [#591](https://github.com/damus-io/notedeck/pull/591)
- Various Android updates and compatibility improvements (Ken Sedgwick, William Casarin)
- Media uploads (kernelkind) [#662](https://github.com/damus-io/notedeck/pull/662)
- Profile editing (kernelkind) [#625](https://github.com/damus-io/notedeck/pull/625)
- Add hashtags to posts (Daniel Saxton) [#592](https://github.com/damus-io/notedeck/pull/592)
- Enhanced command-line interface for user interactions (Ken Sedgwick)
- Debug features for user relay-list and mute list synchronization (Ken Sedgwick)
### Changed
- Major timeline cache refactor (William Casarin) [#653](https://github.com/damus-io/notedeck/pull/653)
- Increased ping intervals for network performance (William Casarin)
- Migrated to egui v0.29.1 (William Casarin) [#551](https://github.com/damus-io/notedeck/pull/551)
- Switch to only notes & replies on some tabs (William Casarin) [#598](https://github.com/damus-io/notedeck/pull/598)
- Only show column delete button when not navigating (William Casarin)
- Pointer interactions enhancements in UI (William Casarin)
- Show profile pictures in column headers (William Casarin)
- Show usernames in user columns (William Casarin)
- Add confirmation when deleting columns (kernelkind)
- Enhance Android build and performance (Ken Sedgwick)
- Image cache handling using sha256 hash (kieran)
- Introduction of decks_cache and improvements (kernelkind)
- Nostrdb update for async support (Ken Sedgwick)
- Persistent theme setup across sessions (kernelkind)
- Tombstone muted notes (Ken)
### Fixed
- Fix GIT_COMMIT_HASH compilation issue (William Casarin)
- Fix avatar alignment in profile previews (William Casarin)
- Fix broken quote repost hitbox (William Casarin)
- Fix crash when navigating in debug mode (William Casarin)
- Fix long delays when reconnecting (William Casarin)
- Fix repost button size (William Casarin)
- Fixed since kind filters (kernelkind)
- Clippy warnings resolved (Dimitris Apostolou)
## Damus iOS
Work continued on the iOS side. While I was not directly involved in the work since the last report, I have been directing and managing its development.
### Added
- Render Gif and video files while composing posts (Swift Coder)
- Purple members who have been active for more than a year now get a special badge (Daniel D’Aquino)
- Add profile info text in stretchable banner with follow button (Swift Coder)
- Paste Gif image similar to jpeg and png files (Swift Coder)
### Changed
- Improved clarity of the mute button to indicate it can be used for blocking a user (Daniel D’Aquino)
- Made the microphone access request message more clear to users (Daniel D’Aquino)
- Improved UX around the label for searching words (Daniel D’Aquino)
- Improved accessibility support on some elements (Daniel D’Aquino)
### Fixed
- Fixed issue where the "next" button would appear hidden and hard to click on the create account view (Daniel D’Aquino)
- Fix non scrollable wallet screen (Swift Coder)
- Fixed suggested users category titles to be localizable (Terry Yiu)
- Fixed GradientFollowButton to have consistent width and autoscale text limited to 1 line (Terry Yiu)
- Fixed right-to-left localization issues (Terry Yiu)
- Fixed AddMuteItemView to trim leading and trailing whitespaces from mute text and disallow adding text with only whitespaces (Terry Yiu)
- Fixed SideMenuView text to autoscale and limit to 1 line (Terry Yiu)
- Fixed an issue where a profile would need to be input twice in the search to be found (Daniel D’Aquino)
- Fixed non-breaking spaces in localized strings (Terry Yiu)
- Fixed localization issue on Add mute item button (Terry Yiu)
- Replace non-breaking spaces with regular spaces as Apple's NSLocalizedString macro does not seem to work with it (Terry Yiu)
- Fixed localization issues in RelayConfigView (Terry Yiu)
- Fix duplicate uploads (Swift Coder)
- Remove duplicate pubkey from Follow Suggestion list (Swift Coder)
- Fix Page control indicator (Swift Coder)
- Fix damus sharing issues (Swift Coder)
- Fixed issue where banner edit button is unclickable (Daniel D’Aquino)
- Handle empty notification pages by displaying suitable text (Swift Coder)
## Nostrdb
nostrdb, the engine that powers [notecrumbs](https://github.com/damus-io/notecrumbs), damus iOS, and notedeck, continued to improve:
### Added
- Added nip50 fulltext searching (William Casarin) [#68](https://github.com/damus-io/nostrdb/pull/68), [demo](nostr:nevent1qqsp3rx83t5h0vdhu4txru76uycfnaegfj3wg6wncamkarcnrccssvcpz3mhxue69uhhyetvv9ujuerpd46hxtnfdupzqvhpsfmr23gwhv795lgjc8uw0v44z3pe4sg2vlh08k0an3wx3cj9efqkkv)
- Added async migrations (William Casarin) [#59](https://github.com/damus-io/nostrdb/pull/59)
- Implement author queries (William Casarin) [#57](https://github.com/damus-io/nostrdb/pull/57)
- Make `ndb` threadsafe (William Casarin) [#56](https://github.com/damus-io/nostrdb/pull/56)
## Nostrdb Rust
Our nostrdb rust bindings also had improvements
- Async! Adding efficient, poll-based stream support (William Casarin): [#25](https://github.com/damus-io/nostrdb-rs/pull/25)
## Notecrumbs
Notecrumbs, the njump-style opengraph server that powers the damus.io links, got an update that upgraded it to async nostrdb
- Switch to async nostrdb-rs (William Casarin) [#16](https://github.com/damus-io/notecrumbs/pull/16)
## How money was used
- relay.damus.io server costs
- Living expenses
## Next quarter
Our goal for next update: zaps, android version, lists, outbox model for notedeck. Olas images in damus iOS, continue switching Damus iOS over to local relay model so we can add outbox support.
-
![](/static/nostr-icon-purple-64x64.png)
@ fdb8c828:84c16368
2025-02-08 17:00:37
![](https://m.stacker.news/36085)
originally posted at https://stacker.news/items/579738
-
![](/static/nostr-icon-purple-64x64.png)
@ 89ccea93:df4e00b7
2025-02-08 16:50:15
**[Original Post](https://expatriotic.me/ashigaru/)**
# What is Ashigaru?
> A self custodial, open source and secure Bitcoin wallet that is private by design.
The **Ashigaru Open Source Project** was established in the months after the United States Department of Justice [brought charges](https://archive.is/g7q8r) against the founders of the self custodial Bitcoin application, Samourai Wallet. At the time of arrest, multiple servers that hosted documentation, code repositories and message coordination services were either [seized](https://archive.is/0nC3t) or failed to remain online, presumably due to being no longer administered. With the indicted individuals placed under restrictive conditions on bail, it became clear that all software development had ceased.
## Aims and Goals
We believe anyone should be able to engage in peaceful, voluntary and private commerce on the internet without tracking, surveillance or censorship. The Ashigaru Open Source Project develops, releases and maintains free and open source software that makes extensive use of both published code from active projects as well as those archived in the public domain.
Open, unrestricted communication networks are utilized to ensure continued availability. The software released by the project will always have a low barrier to entry, be non discriminatory, never expose users to counterparty risk and provide as much protection as possible for those transacting on a public blockchain.
## What’s in a name?
As former users of Samourai Wallet, yet having no association or relationship with the core team, “Ashigaru” was chosen to represent individuals of humble origin whom, borne out of necessity, would equip themselves with their own tools and rise to the occasion during a period of great change.
**Here is the [ONLY podcast episode](https://episodes.fm/1491067458/episode/YTRjNGNlNTAtYjEwMS00YWQ0LTg0MjUtZWQwMmQxYjU0N2Ex) with the developers of this wallet.**
![](https://m.stacker.news/76659)
**Here are a list of features directly from their website:**
1. **Onion Routing:** Connect to your Dojo node and broadcast over the Tor network
2. **Ricochet:** Add distance to the origins of your transactions to mitigate surveillance
3. **Encrypted Key Recovery:** Standards based mnemonic secured with a passphrase that can be imported to other wallets
4. **Post Mix Spending:** Import your Samourai Wallet private keys and maintain your segregated accounts
5. **Batch Spending:** Save on fees by composing a single transaction to multiple recipients
6. **Stealth Mode:** Obscure the wallet from physical searches with a functional decoy application in the launcher
7. **Peer to Peer Coinjoins:** Undermine heuristics used by blockchain observers through collaboration with other users
8. **Coin Control:** Select, label, freeze and unfreeze unspent transaction outputs (UTXOs) in your wallet
9. **Smart Mining Fees:** An advanced algorithm for determining a rate from unconfirmed transactions in the mempool
10. **Free and Open Source:** Ashigaru is released under the FOSS license [GNU General Public License Version 3](https://www.gnu.org/licenses/gpl-3.0.en.html)
___
# FREESAMOURAI
Maybe you've been living in a hole, but the developers of the Samourai Wallet were indicted and picked up by the US government (*even the one in Portugal, because, shocker, the US DoJ can get you almost anywhere in the world except Cuba, North Korea, Russia and China. But I digress*).
```Their crime? Helping users of the base layer Bitcoin protocol achieve forward spending privacy by crafting pristine zero-link UTXOs. The unspent capacity of which was over 10,000 bitcoins, or twice the capacity of the Lightning Network which continues to hover around, and often under, 5,000 bitcoins.```
**#FREESAMOURAI**\
Listen to these podcast episodes for more information.
1. [Prescient warnings](https://episodes.fm/1491067458/episode/ODc0MDIyNzMtNTgxNy00NDAwLTg0MGMtY2JkZmVmNjU4YTg0) just before the indictment from **Diverter**.
2. [Update](https://episodes.fm/1491067458/episode/ZWRhN2EzN2MtYTk5ZC00ODY2LTg5NjctZGE3MWY2YzUzZmM4) when it became known what had happened.
3. [Follow up](https://episodes.fm/1491067458/episode/NDk2ZDJmMzUtMmI2MS00ODljLWIwYmUtODBkZTI2YmUxNDhm) with **Diverter** and **Zelko** after the fact
4. [Reassessing your privacy plan](https://episodes.fm/1491067458/episode/YTA2NDQwNDAtNTMzMy00ODRiLTlkZDUtN2ExZDU5NWY1ZmE0) with **Urban Hacker** in a world without a zero-link coinjoin implementation (Whirlpool).
## Why run Ashigaru compared to Samourai Wallet?
One might ask the logical question, why run Ashigaru, my Samourai Wallet is still working!?\
To which, Max Tannahill, a community member, has given the following list to answer.
1. Cheaper BIP47 connections
2. Soroban coinjoins ([Tor link](http://ashigaruprvm4u263aoj6wxnipc4jrhb2avjll4nnk255jkdmj2obqqd.onion/news/operational-online-chaoots/) about this)
3. Better BIP47 recovery
4. No risk of DNS hijacking for the PayNym server as its over Tor
5. Ability to switch Dojos more easily
6. Spending warnings that Samourai never got to deploy to production
7. Next block fee estimation
8. UI improvements on Samourai
9. Removal of broken links to whirlpool, the old Soroban server and the old Iceland Dojo
10. No clearnet connections at all
___
# How-to Guide for Ashigaru
## Download the APK
1. *Prerequisite:* [Tor Browser](https://www.torproject.org/download/#android) is a requirement.
2. Open the **Tor Browser** and paste in this 🧅 [link](http://ashigaruprvm4u263aoj6wxnipc4jrhb2avjll4nnk255jkdmj2obqqd.onion/).
3. Recommended to use a phone with **Android 8+** that still receives security updates.
4. Recommended to use a **GrapheneOS** phone (Pixel only). _Non-Pixel owners can use **Lineage OS** which is a less secure, but viable, option. Or just use stock android if you have no idea how to change the operating system on your phone or don't want to do so._
5. Carry out software verification. A PGP signed message is below the APK. The Keybase Verify [tool](https://keybase.io/verify) can be used to do the verification.
6. *This is what it looks like on Keybase when completed. ⤵*
![](https://m.stacker.news/76660)
## Install the Ashigaru mobile application
1. From within your device's files, tap on the Ashigaru APK file
2. Tap "**Install**"\
![](https://m.stacker.news/76663)
3. When complete tap "**Done**", or tap "**Open**" to launch the mobile application\
![](https://m.stacker.news/76664)
4. The Ashigaru mobile application has now been installed on your Android device. You will now see the Ashigaru app icon in your list of installed apps.
## Setting up Ashigaru
1. You need to connect to your own self-hosted Dojo (this is a specific type of Bitcoin node). Ashigaru doesn't run a node for you to point your wallet to, you'll need to do this yourself.
* DIY options include:
* [Ministry of Nodes](https://www.youtube.com/watch?v=8_It4xEIwRA)
* [BTC Sessions](https://www.youtube.com/watch?v=ULZoPMCYPfk)
* Community nodes at [Dojo Bay](https://dojobay.pw/) (*Obviously a privacy trade-off if you outsource your node to a 3rd party.*)
2. You need a pen and paper for writing down your 12 word Mnemonic seed phrase.
3. Make a strong [passphrase](https://cryptography.fandom.com/wiki/Passphrase) (4-6 memorable but random [words](https://www.eff.org/deeplinks/2016/07/new-wordlists-random-passphrases)) and put it separately from the offline seed phrase backup, e.g., in your password manager (*KeePass or Bitwarden are good options*).
4. Claim your PayNym with it's associated Pepehash avatar.
![](https://m.stacker.news/76616)
> PayNym Support: Migrate seamlessly to a new directory that uses a Pepehash avatar scheme for representing BIP47 reusable payment codes.
## Using Ashigaru
1. When sending, if possible, and just as in [Sparrow Desktop Wallet](https://sparrowwallet.com), a fake coinjoin is created by using two of your UTXOs as inputs to obscure what is occuring onchain. Onlookers will see what appears to be two parties collaborating to spend together. This adds a bit of extra miner fee cost, but this is the cost of extra privacy. You can opt out of this privacy enhancement.\
![](https://m.stacker.news/76668)
2. If you want to send or receive privately and with a static address, **BIP47 PayNyms**, will accomplish this. As long as both parties have a wallet that supports this standard. **Samourai Wallet**, **Stack Duo**, and **Sparrow** are the others that I know of at this time. Simply put in their **PayNym**, e.g., mine is **+mereegg59**, or scan their QR containing the data for the **PayNym** and connect with them. This will involve sending a small transaction onchain. But once one of you does, both parties can send back and forth privately without ever needing to request a fresh address.
3. There is an option when spending to use **ricochet**. This will add hops to help obscure the history of your **UTXO** for anyone who is using passive software to check X hops in the past for some connection to a **sanctioned** address. Good for spending **UTXOs** that you don't know the prior history of. Although personally I think **taint** is merely a mindset, some entities will not receive **UTXOs** that have either been coinjoined or are too close to a **sanctioned** address.
4. There is an option in the tools menu for doing a collaborative spend, known as **Soroban Coinjoin**.
5. Unfortunately Whirlpool is not yet a feature of this wallet.
![](https://m.stacker.news/76615)
___
- **Here is the Tor [link](http://ashigaruprvm4u263aoj6wxnipc4jrhb2avjll4nnk255jkdmj2obqqd.onion/donate/) where you can donate to them**
- **Here is the Tor [link](http://ashicodepbnpvslzsl2bz7l2pwrjvajgumgac423pp3y2deprbnzz7id.onion/Ashigaru) for their code base**
- **Here is the Tor [link](http://ashigaruprvm4u263aoj6wxnipc4jrhb2avjll4nnk255jkdmj2obqqd.onion/docs/) for their documentation**
- **Here is the Tor [link](http://ashigaruprvm4u263aoj6wxnipc4jrhb2avjll4nnk255jkdmj2obqqd.onion/docs/mobile-wallet-updating-application/) for updating the Ashigaru app**
- **Here is the Tor [link](http://ashigaruprvm4u263aoj6wxnipc4jrhb2avjll4nnk255jkdmj2obqqd.onion/contact/) for their contact info. _Keep in mind this requires a different PGP key than the one used to verify the APK (unless you use protonmail and then PGP isn't required)._**
originally posted at https://stacker.news/items/879803
-
![](/static/nostr-icon-purple-64x64.png)
@ 1cb14ab3:95d52462
2025-02-08 16:45:04
***Tree branches. 4'8" circle. [Chongming Island, China. 2021]***
---
#### Introduction
Tucked into a quiet forest park on Chongming Island, Chongming frames a view of a canal and a small alluvial landform that mirrors the island itself. This lens reflects the constant interplay of land and water, inviting viewers to contemplate the delicate balance of nature and the forces that shape it.
#### Site & Placement
The lens is hidden along a forest path, directing attention to the canal’s subtle currents and the land it divides. The bench, situated 12 feet from the lens, encourages visitors to pause and immerse themselves in the tranquil rhythm of the scene.
#### Impermanence & Integration
As an alluvial island shaped by shifting waters, Chongming is a fitting location for this ephemeral lens. Constructed from branches, the lens will eventually return to the land, echoing the natural processes that formed the island and continue to shape it.
#### Reflection
*Chongming* offers a meditative space to reflect on the impermanence of land and the forces that transform it. The work’s fleeting existence underscores the beauty of change, inviting viewers to appreciate the subtle, ongoing dance of nature.
---
## Photos
![image](https://image.nostr.build/9e6a441ea02baab69fb67893dfb3fbaa01ea2d0580385fe789ee8b00c82378a6.jpg)
![image](https://image.nostr.build/c36c7826fb94d02f7a6a1ac23c958d603bdeff60b8cd897237ea26336ed23fe7.jpg)
![image](https://image.nostr.build/be05e5fb9d3d33258509f7ca8fcb269d77ac8f9647a399932414e3fbe4715e8b.jpg)
![image](https://image.nostr.build/28bf8fcb2feb29fb4c24f62c668a4067a475c5256333b29422d0612d499e2258.jpg)
![image](https://image.nostr.build/d52b5dd267f24b962fc345bec3901cd7a43dffa5ff047acbc2e8b9b3f39ad810.jpg)
![image](https://image.nostr.build/bcfe1a8e522c807a6a0afbad3c9df66d24dd452f9d9ea7b27b8b6e34812ab60e.jpg)
![image](https://image.nostr.build/615220d51df7c73d96eb929ce89943d1937d5e9d4d100a4c127519238314d94c.jpg)
![image](https://image.nostr.build/62cd91f85e834e2146d3c75caa65364117b00938dfb6510f260c3b963005f8c8.jpg)
---
#### More from the 'Earth Lens' Series:
[Earth Lens Series: Artist Statement + List of Works](https://hes.npub.pro/post/1731091744332/)
["Looking Glass" (Earth Lens 001)](https://hes.npub.pro/post/1736304563962/)
["Folsom" (Earth Lens 002)](https://hes.npub.pro/post/1737844073125/)
["Sanctuary" (Earth Lens 003)](https://hes.npub.pro/post/1731091744332/)
["Platte" (Earth Lens 004)](https://hes.npub.pro/post/sya8nv6q8k0w3olqcepwz)
["Grandfather" (Earth Lens 005)](https://hes.npub.pro/)
---
#### More from Hes
[Portfolio](https://hesart.npub.pro)
[Online Store](https://plebeian.market/community/hes@nostrplebs.com/hesmart-ym3fcufdfz)
[Artist Statements](https://hes.npub.pro/tag/art/)
[Travel Guides](https://hes.npub.pro/tag/travel/)
[Photography](https://hes.npub.pro/tag/photography)
[Money](https://hes.npub.pro/tag/money)
[Tech](https://hes.npub.pro/tag/tech)
---
*All images are credit of Hes, but you are free to download and use for any purpose. If you find joy from my art, please feel free to send a zap. Enjoy life on a Bitcoin standard.*
-
![](/static/nostr-icon-purple-64x64.png)
@ b15b7f67:e62b3290
2025-02-08 16:29:38
Benjamin Anderson is a dear friend, scientist, entrepreneur, and a brilliant human being. We discuss his endeavors developing property north of the infamous "Delmar Divide," the work he is doing in longevity solving for aging through a process called, "Cell reprogramming," and our general view on important things to pay attention to in the world.
Timestamps:
0:00 - Intro
2:47 - How did Jack and Benjamin's friendship start?
5:34 - How do you decide you want someone in your life forever?
11:28 - What is Benjamin's sanctuary that he retreats to?
14:08 - Agency and free-will as a means of purpose
16:47 - What are you doing to make an impact on the world?
20:49 - Why is Benjamin developing in Fountain Park?
29:27 - Is it dangerous to live north of Delmar?
35:15 - What does Benjamin admire most about his father?
40:04 - You can learn a lot about yourself raising children
44:08 - What do you do if you don't desire power or money?
49:37 - My thought process around voting
51:52 - What has challenged Benjamin's integrity?
57:39 - Most of academia is B.S.
1:02:43 - Can you develop taste?
1:11:21 - What is the purpose of Benjamin's research?
1:18:20 - Working on aging is comparable to Christianity
1:26:41 - What should young people be paying attention to?
Want help with your podcast?
DM me on Instagram! - https://www.instagram.com/jack.millikan/
[link to the original content](https://share.transistor.fm/s/f6985266)
-
![](/static/nostr-icon-purple-64x64.png)
@ b15b7f67:e62b3290
2025-02-08 16:29:38
You show up and talk, we handle the rest of your podcast - https://calendly.com/noblelore/podcast-discovery-call
Rob Long is a data engineer with experience at Monsanto and a deep understanding of how data shapes our world. In this episode, Jack and Rob dive into the hidden mechanics behind digital surveillance, financial control, and the fight for privacy. They discuss how Bitcoin can be a tool for financial freedom, the challenges of opting out of data collection, and why decentralized social media could change the internet as we know it. Rob also shares his unique approach to retaining knowledge, his thoughts on sovereignty, and why curating a bookshelf can be a game-changer for personal growth.
0:00 - Intro
0:22 - What is NobleLore?
0:55 - What is a data engineer?
1:45 - How has being a data engineer shaped Rob's perspective?
2:39 - How data collection shapes our world
5:52 - The problem with fiat currency
7:18 - The utility of Bitcoin
14:38 - How does Rob use Bitcoin?
16:19 - The difference between Nostr and other social media platforms
25:28 - Podcasting on Nostr
31:34 - What stage of development is social media currently in?
37:28 - What is sovereignty, and why does it matter?
41:32 - Does Rob consider himself a free thinker?
42:19 - Rob’s curated bookshelf and the power of re-reading
49:25 - What is the most important thing that young people should be paying attention to?
[link to the original content](https://share.transistor.fm/s/448f139d)
-
![](/static/nostr-icon-purple-64x64.png)
@ b15b7f67:e62b3290
2025-02-08 16:29:38
Evan is a longtime friend of Jack and a paramedic fireman with multiple family members in the fire department. In this episode, Jack and Evan discuss the beginning of their friendship, Evan's upbringing and what role that played in the man he is today, Evan's experience as a paramedic, Evan's family members' experience in the fire department, and Evan's interest in mixed martial arts.
0:00 - Intro
1:31 - Why Evan loves MMA and the UFC
4:31 - How Jack and Evan became friends
6:38 - How friendships change over time
9:51 - Who Evan is now as opposed to who he was a couple years ago
12:08 - Rank structure in fire departments
13:10 - His dad let him fuck up (school of hard knocks)
22:16 - Two people had sex on top of a newborn
24:20 - “I'm a paramedic, I'm the highest level of care, if I fuck up I lose my license and someone dies.”
28:22 - “Grey's anatomy is not real.”
29:39 - Weed and alcohol
36:11 - What made Evan become a paramedic
43:07 - What Evan has going on in life now
Want help with your podcast?
DM me on Instagram! - https://www.instagram.com/jack.millikan/
[link to the original content](https://share.transistor.fm/s/a32d61a7)
-
![](/static/nostr-icon-purple-64x64.png)
@ b15b7f67:e62b3290
2025-02-08 16:29:38
Jack Ryan is a lifelong friend, golden gloves boxer, stand-up comedian, personal trainer, and life of the party wherever he goes. However on this episode, he shows a side of himself that I have known for years, but may come as a shock to many who only know him on a surface level. Jack is one of the most self aware and reflective human beings I have ever met, and that is on full display throughout our conversation.
We talk about:
\- His diagnosis with diabetes at 8 years old
\- What makes a real friend?
\- Who is Jack behind the curtains?
\- How were we raised by our parents?
Want help with your podcast?
DM me on Instagram! - @Jack.Millikan
Timestamps:
0:00 - Intro
4:17 - The friend that makes sacrifices for you
7:14 - How was Jack raised?
11:21 - Bringing to light our insecurities
15:50 - Getting diagnoses with diabetes
25:53 - What did boxing teach Jack?
36:14 - How do you know your own beliefs?
40:54 - Having vulnerable conversations
49:11 - What was missed at Jack's low points?
[link to the original content](https://share.transistor.fm/s/d00ec2e9)
-
![](/static/nostr-icon-purple-64x64.png)
@ b15b7f67:e62b3290
2025-02-08 16:29:38
Need help with your podcast? Book a call - https://calendar.app.google/tL4vhsdwNoGmaKzg6
Have a great idea for a podcast but don’t know where to start? Do you run a business and want to give people a deeper insight into who you are and what you do? Let us take the stress out of the process! We specialize in recording, editing, and uploading podcasts. All you have to do is show up and talk, we take care of the rest.
✅ No Equipment Needed
✅ Expert Production Quality
✅ Hassle-Free Distribution
From concept to final upload, we’ve got you covered. Whether you’re a seasoned host or starting fresh, our team ensures your voice reaches the world clearly and professionally.
0:00 - Intro (Early life)
2:13 - Developing self-awareness
3:44 - College and past jobs
5:56 - My first podcast
7:14 - How I started the business
9:06 - Growing the business
10:59 - Building a community
12:59 - Why podcasts are important
13:39 - What does NobleLore do?
[link to the original content](https://share.transistor.fm/s/4fb14f21)
-
![](/static/nostr-icon-purple-64x64.png)
@ b15b7f67:e62b3290
2025-02-08 16:29:38
Beginning at only 9 years old, Zach Babcock spent much of his childhood in juvenile detention centers, rehabs, psych wards, and boys homes. He later spent 5 years in prison as a young adult. Since his release, Zach has become a husband, a father, and a successful entrepreneur dedicated to helping other men heal unresolved trauma, become better leaders, and grow their own businesses.
0:00 - Intro
1:38 - How Zach's story began
5:52 - Discussing his father's death
8:20 - Going to rehab and a psych ward as a child
10:15 - Processing his childhood trauma as an adult
14:56 - Does anyone really have life figured out?
19:42 - Discussing his prison sentence
27:18 - Finding out his sister died during his sentence
32:29 - How Zach reacted to his mom dating after his father died
33:40 - What Zach admired about his father
35:41 - Culture shock and readjusting after being released from prison
39:36 - Someone fractured Zach's son's skull while he was in prison
43:53 - How MDMA therapy helped Zach process his experienced trauma
50:15 - Difficulties facing his darkness
56:56 - What is a real man?
1:02:23 - Zach talks about his tattoos
1:03:24 - Building his brand: Alpha Underdog
Want help with your podcast?
DM me on Instagram! - https://www.instagram.com/jack.millikan/
[link to the original content](https://share.transistor.fm/s/76310079)
-
![](/static/nostr-icon-purple-64x64.png)
@ b15b7f67:e62b3290
2025-02-08 16:29:38
Martin Stelzer is a real estate investor, childhood friend of Jack's, and fellow member of the men's group "Parium." In this episode, Jack and Martin discuss becoming a real estate investor, house hacking, becoming involved in new business ventures, preparing for the unexpected, the benefit of fraternities, sobriety, and what the men's group "Parium" means to them.
0:00 - Intro
3:03 - Aspirations in real estate
5:20 - House hacking
6:37 - Preparing for the unexpected
10:05 - Residential vs commercial real estate investing
20:59 - Taking out loans to invest in property
25:27 - What happens after you get a loan
34:41 - How much should you charge for rent?
40:26 - Buying his first property during covid
49:42 - Martin and Jack's friendship growing up
55:09 - Forming bonds with people
57:07 - The rituals of fraternities
58:28 - How a lawyer helped their fraternity
1:00:52 - Religion and traditional living
1:07:00 - Developing confidence in college
1:09:20 - Drinking and sobriety
1:16:42 - What is Parium?
Want help with your podcast?
DM me on Instagram! - https://www.instagram.com/jack.millikan/
[link to the original content](https://share.transistor.fm/s/0b7357a1)
-
![](/static/nostr-icon-purple-64x64.png)
@ b15b7f67:e62b3290
2025-02-08 16:29:38
You show up and talk, we take care of the rest of your podcast - https://calendly.com/noblelore/podcast-discovery-call
Try Mighty Kind Cannabis Seltzer - https://bemightykind.com/
Josh Grigaitis is the founder of Mighty Kind Cannabis Seltzer and part of the family that owns Pop's Blue Moon in St. Louis, MO. In this episode, Jack and Josh discuss why Josh created Mighty Kind, Josh's experience when he stopped drinking alcohol, the growth of the craft non-alcoholic drink industry, the benefits of drinking plant-based functional beverages, the hemp industry's difficulties dealing with the government and the marijuana industry, Josh's business approach, and Josh's passion for design
0:00 - Intro
0:40 - What is NobleLore?
1:06 - Why Josh created Mighty Kind
7:16 - Finding community without alcohol
9:07 - When and why did non-alcoholic craft drinks start becoming popular?
14:27 - Why "functional beverages" are going to continue growing in popularity
16:55 - How to figure out how these drinks will affect you
19:58 - Removing the stigma around being sober
21:19 - Is social media making our culture better or worse?
25:35 - Governor tried to ban intoxicating hemp products
29:44 - Marijuana industry lobbying against the hemp industry
35:02 - Where can I get Mighty Kind seltzers?
36:19 - The legal difference between hemp products and marijuana products
43:53 - How Josh approaches business
46:45 - Josh's passion for design
50:48 - How understanding psychology can help you run a business
52:09 - Why the Mighty Kind family is so passionate about what they do
53:28 - What is something important for young people to be paying attention to?
[link to the original content](https://share.transistor.fm/s/b6375b72)
-
![](/static/nostr-icon-purple-64x64.png)
@ b15b7f67:e62b3290
2025-02-08 16:29:38
Need help with your podcast? Book a call - https://calendar.app.google/tL4vhsdwNoGmaKzg6
Ashley is an advocate for survivors of domestic violence and sexual assault. In this episode, Jack and Ashley discuss modern dating, unhealthy attention seeking, how to avoid toxic relationships, Ashley's personal experience in an abusive relationship, and Ashley's relationship with Christianity.
0:00 - Intro
0:35 - What is NobleLore?
1:00 - What is important to Ashley?
4:46 - Why is modern dating culture scary?
6:08 - Ashley's experience with bad relationships
8:04 - Ashley's first abusive relationship at age 16
10:27 - How should and how shouldn't young girls be seeking attention?
12:50 - Is the feminist movement empowering women in a healthy way?
14:58 - Do people want toxic relationships?
16:45 - People being toxic online
21:20 - Why are men more violent than women?
25:04 - How can women avoid abusive relationships?
32:14 - Ashley's relationship with Christianity
35:06 - Why Ashley enjoys being single right now
44:04 - How should men learn to communicate within a relationship?
53:34 - How to define manhood
58:27 - What should young people be paying attention to?
[link to the original content](https://share.transistor.fm/s/24eb4ff0)
-
![](/static/nostr-icon-purple-64x64.png)
@ b15b7f67:e62b3290
2025-02-08 16:29:38
Izayah Hudnut is one of my closest friends, an entrepreneur, and the swaggiest tech nerd you've ever seen. We discuss how he is getting his private pilot's license, what makes St. Louis great and what can make it even better, and the trials and tribulations we are going through in running our own businesses.
Timestamps:
0:00 - Intro
4:09 - What did football teach you?
5:59 - What hangar are we recording in?
8:32 - How do you pursue courage?
11:37 - How did Izayah start his business?
23:22 - Izayah's family background
25:13 - What is Parium?
29:19 - The biggest problem with St. Louis is the marketing
32:23 - People come to St. Louis to see what they can give
35:05 - How do you choose your friends?
37:53 - Is it harder to date now?
41:52 - Are online communities sufficient
46:18 - What more can we do for St. Louis?
53:00 - Thoughts on religion
58:55 - How people mess up business
1:01:51 - What are you doing to find the right person
1:07:11 - Izayah is getting his Pilot's license
1:16:27 - What is the most important thing young people should be paying attention to?
Want to automate your business for peak efficiency?: https://www.dor15.com/
Want help with your podcast?
DM me on Instagram! - https://www.instagram.com/jack.millikan/
[link to the original content](https://share.transistor.fm/s/f72c7ac8)
-
![](/static/nostr-icon-purple-64x64.png)
@ b15b7f67:e62b3290
2025-02-08 16:29:38
Vance Crowe is the former Director of Millennial Engagement at Monsanto. He currently is the founder and owner of "Legacy Interviews", a service that captures individuals' life stories to pass down to their future generations and gives him a glimpse into the evolution of culture that few have the opportunity to observe.
0:00 - Intro
2:51 - Who is Vance Crowe?
6:55 - Describing your internal dialogue
11:20 - What does the "Garden of Eden" mean?
13:08 - How do you prepare your children for evil?
20:38 - How Vance's relationship with his wife started
24:30 -What accelerated Islam?
26:30 - What is so valuable about stories?
29:11 - How to get good at telling stories
36:15 - What was the controversy with Monsanto?
41:56 - Round-up isn't as bad as people think?
49:09 - Mobs are the most dangerous force to exist
53:01 - Why do people misunderstand Monsanto?
57:32 - Thoughts on RFK
1:03:15 - Bitcoin is the most important technology in our lifetime
1:11:18 - Your attention is more valuable than your time
1:15:18 - Why are companies using DEI?
1:32:00 - What should young people know?
Want help with your podcast?
DM me on Instagram! - https://www.instagram.com/jack.millikan/
[link to the original content](https://share.transistor.fm/s/e25c9ab8)
-
![](/static/nostr-icon-purple-64x64.png)
@ b15b7f67:e62b3290
2025-02-08 16:29:38
Shaun Newman is a friend, fellow podcaster, and a client of NobleLore. He releases 5 episodes of his podcast each week interviewing some of the most influential, controversial, and knowledgeable people in the world.
Timestamps:
0:00 - Intro
2:04 - Teetotalism
8:25 - How do you receive signal from God?
19:38 - The Ottawa Trucker Protest
36:23 - Was the Ottowa Trucker Protest successful?
44:19 - Canada's main source of news is funded by the government
1:06:52 - What should young people be paying attention to?
1:11:20 - What makes a good marriage?
1:21:34 - Ideals within a relationship
Want help with your podcast?
DM me on Instagram! - https://www.instagram.com/jack.millikan/
[link to the original content](https://share.transistor.fm/s/bf0a879b)
-
![](/static/nostr-icon-purple-64x64.png)
@ f57bac88:6045161e
2025-02-08 15:50:22
### ریشههای تاریخی جشن کژین
جشن کژین که در برخی منابع به نام «بادروز» نیز شناخته میشود، ریشه در اسطورههای کهن ایران دارد. در اوستا، باد با نام «واتَه» معرفی شده است و ایزد نگهبان آن، «وات» یا «واد» یکی از ایزدان مهم در کیش زرتشتی به شمار میرود. این ایزد در باورهای ایرانیان باستان، تجسم نیروی پاک و الهی باد بوده و مسئول جابهجایی ابرها، بارش باران و حفاظت از زمین در برابر آلودگیها محسوب میشده است.
بر اساس تقویم کهن ایران، این جشن در روز بیستودوم بهمنماه، که مصادف با روز باد در تقویم زرتشتی است، برگزار میشد. برخی پژوهشگران معتقدند که جشن کژین در دورههای مختلف تاریخی، تحت تأثیر تغییرات فرهنگی و اجتماعی دچار دگرگونی شده و نامها و شیوههای مختلفی به خود گرفته است.
### فلسفه و نمادشناسی جشن کژین
باد، به عنوان یکی از چهار عنصر اصلی (آب، باد، خاک و آتش) در باورهای کهن ایرانی، جایگاه ویژهای داشته است. ایرانیان باستان باد را نیرویی زنده و الهی میدانستند که حیات را در طبیعت جاری میسازد. در بسیاری از متون دینی و اساطیری، باد به عنوان پیامرسان ایزدان و نیرویی که قدرت پاککنندگی دارد، توصیف شده است.
جشن کژین، علاوه بر تقدیس باد، نماد تحول، تغییر و تجدید حیات نیز بوده است. این جشن نشانگر گذر از یک مرحله به مرحلهای دیگر در چرخه طبیعت است و ارتباطی عمیق با دیگر جشنهای ایرانی مانند جشن سده و نوروز دارد.
### آیینها و رسوم جشن کژین
برگزاری جشن کژین با آیینهای خاصی همراه بوده است که برخی از آنها هنوز در فرهنگ عامه ایرانیان قابل مشاهدهاند:
1. **رها کردن نوارهای رنگین در باد**: یکی از رسوم این جشن، آویختن نوارهایی از نخ هفترنگ به شاخههای درختان یا رها کردن آنها در باد بوده است. این عمل نماد رهایی، تحول و ارتباط با نیروی الهی باد محسوب میشده است.
2. **افروختن آتش**: مانند بسیاری از جشنهای ایرانی، روشن کردن آتش یکی از بخشهای اصلی جشن کژین بوده است. این آتش معمولاً در فضای باز و بر فراز تپهها و کوهها برافروخته میشد تا حرمت باد و آتش، دو عنصر اصلی طبیعت، گرامی داشته شود.
3. **برپایی بازارهای محلی و جشنهای خیابانی**: در برخی مناطق، جشن کژین با بازارهای محلی همراه بوده که در آن مردم به خرید و فروش کالاهای سنتی، موسیقی و پایکوبی میپرداختند. این بازارها اغلب در میادین شهرها و روستاها برگزار میشد و نوعی جشن اجتماعی به شمار میرفت.
4. **دعای شکرگزاری برای بادهای سودمند**: در فرهنگ کشاورزی ایران، باد نقش مهمی در گردهافشانی گیاهان و بارش باران داشته است. ازاینرو، کشاورزان و مردم روستاها در این روز دعاهایی برای بادهای مفید و پرهیز از بادهای مضر میخواندند.
### ارتباط جشن کژین با دیگر جشنهای ایرانی
جشن کژین با برخی دیگر از آیینهای کهن ایرانی ارتباط نزدیکی دارد. به عنوان مثال، جشن سده که در میانه زمستان برگزار میشود، یکی از جشنهایی است که در آن نیز باد و آتش نقش مهمی دارند. از سوی دیگر، جشن نوروز که سرآغاز فصل بهار است، نشانگر تحول و دگرگونی طبیعت است که ارتباطی مفهومی با جشن کژین دارد.
### جایگاه جشن کژین در دوران معاصر
امروزه، جشن کژین در میان بسیاری از ایرانیان ناشناخته باقی مانده است و تنها برخی از پژوهشگران و علاقهمندان به فرهنگ ایران باستان به احیای آن علاقه نشان میدهند. با این حال، عناصر این جشن در برخی آیینهای محلی و جشنهای مردمی همچنان باقی مانده است. تلاش برای بازشناسی و احیای این جشن میتواند به غنای فرهنگی و هویت ملی ایرانیان کمک کند.
### نتیجهگیری
جشن کژین یکی از آیینهای فراموششده اما ارزشمند ایران باستان است که در ستایش باد و نقش آن در طبیعت و زندگی انسانها برگزار میشده است. این جشن، علاوه بر نمادگرایی مرتبط با عناصر چهارگانه، پیوندی عمیق با باورهای اسطورهای و اجتماعی ایرانیان داشته است. احیای این جشن و آشنایی بیشتر با آن، میتواند به فهم بهتر تاریخ فرهنگی ایران و تقویت حس هویت ملی کمک کند.
-
![](/static/nostr-icon-purple-64x64.png)
@ 1c69692c:f89196c0
2025-02-08 15:25:38
Cool article
Testing yakihonne.com
-
![](/static/nostr-icon-purple-64x64.png)
@ 2e8970de:63345c7a
2025-02-08 15:11:58
![](https://pbs.twimg.com/media/GjOXNydaQAEb-PE?format=jpg&name=medium)
So to my understanding Devs of Asahi Linux want some features for Rust support in kernel. Linux kernel maintainers are unwilling for the patch. The Ashai team made a social media campaign out of it. Now Linus is saying the social media brigade alone makes him not want anything to do with the Rust patch.
We clearly have left the topic and are now in the realm of politics on this one. What do you guys think?
originally posted at https://stacker.news/items/879713
-
![](/static/nostr-icon-purple-64x64.png)
@ dbb19ae0:c3f22d5a
2025-02-08 15:06:44
PS C:\Users\Alashazam> cortex run tinyllama
In order to exit, type `exit()`
> give me a little sentence of 10 words
"Certainly, here's a little sentence of 10 words that exemplifies the power of words: 'The beauty of life is that it has the power to change us, even in the smallest ways.'"
> now use SQL to insert this sentence into a table that has 2 fields Id, and sentence
Here's an SQL query to insert the sentence you gave into the `sentence` table:
```
INSERT INTO sentence (id, sentence) VALUES (1, 'The beauty of life is that it has the power to change us, even in the smallest ways.');
```
This query will create a new row in the `sentence` table with the given `id` and `sentence`, and will also update the `sentence` table's `sentence` column to contain the new sentence.
> please generate the table creation for sqlite
Here's a table creation statement for a `sentence` table in SQLite:
```
CREATE TABLE IF NOT EXISTS sentence (
id INTEGER PRIMARY KEY,
sentence TEXT UNIQUE NOT NULL
);
```
This will create a table called `sentence` with the following columns:
- `id`: An integer primary key column used to uniquely identify each row.
- `sentence`: A text column containing the actual sentence.
This table will store the sentence you provided in your text input.
> exit()
-
![](/static/nostr-icon-purple-64x64.png)
@ 5d4b6c8d:8a1c1ee3
2025-02-08 14:51:13
We'll have to put an asterisk on today's number. I had a bite of my daughter's leftovers that didn't seem worth storing for later. By my understanding, that shouldn't be enough to mess with fasting metabolism and it doesn't feel like it did.
@realBitcoinDog wants me to get to 20 hours on one of these. I'm at 17 already (just took a sip of coffee), but I'm starting to get hungry, so today might not be the day. We'll see, though. The wife isn't making any indications that she's going to cook anything anytime soon, so my natural laziness might get me over the finish line.
## Score Card
Day 1: 14 hour fast (13 dry)
Day 2: 15 hour fast (14 dry)
Day 3: 17 hours (16 dry)
Day 4: 18 hours (17 dry)
Day 5: 18 hours (16 dry)
Day 6: 19 hours (16 dry)
Day 7: 16 hours (15 dry)
Day 8: TBD (17 dry)
edit: I just got handed some bread crusts that no one else is going to eat, so the fast is going to end pretty soon.
originally posted at https://stacker.news/items/879683
-
![](/static/nostr-icon-purple-64x64.png)
@ dbb19ae0:c3f22d5a
2025-02-08 10:27:12
1. Downloading the linux package (1.8GB) https://cortex.so/docs/installation
2. Installing Cortex on linux is done via dpkg
note: it requires 2 linux packages (openmpi-bin and libopenmpi-dev)
`sudo apt-get install openmpi-bin libopenmpi-dev`
prior to run
`sudo dpkg -i cortex-1.0.9-linux-amd64-local-installer.deb`
3. When running Cortex,
`cortex start`
a local implementation will be running on http://127.0.0.1:39281
4. Using python it is possible to run queries
make sure the model name is correct
you can double check the value using:
` cortex ps`
Now the python program to run one little query:
``` python
import requests
url = "http://127.0.0.1:39281/v1/chat/completions"
headers = {"Content-Type": "application/json"}
payload = {
"model": "tinyllama:1b-gguf",
"messages": [
{
"role": "user",
"content": "Write a joke"
}
],
"stream": False,
"max_tokens": 128,
"stop": ["End"],
"frequency_penalty": 0.2,
"presence_penalty": 0.6,
"temperature": 0.8,
"top_p": 0.95,
}
response = requests.post(url, json=payload, headers=headers)
print(response.json())
```
-
![](/static/nostr-icon-purple-64x64.png)
@ 6b57533f:eaa341f5
2025-02-08 09:25:01
## Embedded Inline SVG in Markdown
Here is an embedded SVG using a `data:` URI:
![SVG Image](data:image/svg+xml,<svg viewBox='0 0 100 100'><circle cx='50' cy='50' r='40' stroke='black' stroke-width='3' fill='red'/></svg>)
Some markdown renderers may not support inline SVGs, but if they do, you should see a red circle above.
-
![](/static/nostr-icon-purple-64x64.png)
@ 16d11430:61640947
2025-02-08 07:39:53
Exploring the Erlang Compiler, the BEAM VM, and Esoteric BEAM-Based Languages for the Hipsters
Introduction: The Way of the BEAM
In the transient world of software, where complexity breeds failure and modern stacks resemble precarious Jenga towers, the BEAM virtual machine stands as a monument to simplicity, resilience, and concurrency.
Designed in the crucible of the telecom industry, where systems must not fail even in the face of chaos, BEAM embodies a Zen-like philosophy:
Let it crash – Failure is not an exception but an expectation.
Share nothing – Every process is isolated, independent, and impervious to corruption.
Keep it lightweight – Millions of concurrent processes should feel as effortless as a single-threaded script.
Be impermanent – Hot code swapping allows systems to evolve without downtime.
This philosophy is not just a runtime model but a way of thinking about software—where simplicity breeds reliability, and complexity is the enemy of uptime.
In this article, we explore the inner workings of the BEAM VM, the elegance of the Erlang compiler, and the esoteric languages that run on BEAM—from the industrial-strength Elixir to the hipster-favorite Lisp-Flavored Erlang (LFE), and even the experimental fringes of Gleam and Caramel.
---
The Origin of BEAM
The BEAM, or Bogdan’s Erlang Abstract Machine, is named after Bogumil "Bogdan" Hausman, one of the Ericsson engineers who worked on Erlang’s virtual machine. It was a successor to an earlier runtime called JAM (Joe’s Abstract Machine), named after Joe Armstrong, Erlang’s legendary co-creator.
The name “BEAM” is a fitting metaphor:
A beam is a structural element—strong yet flexible, capable of withstanding immense pressure without breaking.
A beam of light suggests clarity, focus, and guidance, much like Erlang’s model of pure message passing.
Unlike most VMs that chase speed, BEAM chases reliability, scalability, and uptime, sacrificing raw performance for concurrent stability.
This is why BEAM doesn’t just execute code—it orchestrates massively distributed, highly fault-tolerant systems.
---
The BEAM: A Meditative Machine
Unlike mainstream runtimes that prioritize raw execution speed, BEAM is optimized for concurrency, distribution, and reliability. The heart of BEAM is a lightweight process model, where each process:
Is completely isolated (no shared state, no global variables).
Communicates via immutable message passing.
Is cheap to spawn (millions of concurrent processes are normal).
Crashes safely, allowing the system to self-heal instead of corrupting state.
This actor model is why Erlang and BEAM-based languages power high-availability systems in telecom, finance, and distributed computing. Instead of fighting failure, BEAM embraces it, allowing individual components to crash and restart without breaking the whole—a software equivalent of Buddhist non-attachment.
---
How the Erlang Compiler Works
BEAM’s compilation process is a multi-stage transformation designed for reliability:
1. Parsing → Erlang source code (.erl files) is parsed into an Abstract Syntax Tree (AST).
2. Core Erlang Representation → The AST is transformed into Core Erlang, a simplified functional intermediate representation (IR).
3. BEAM Assembly → The Core Erlang representation is compiled into BEAM bytecode, optimized for concurrency.
4. BEAM File Generation → The resulting .beam file is loaded and executed by the BEAM VM.
This is not a direct machine code compilation model but a functional, register-based system where bytecode execution is tailored for concurrency rather than raw speed.
Interpreting BEAM Bytecode: The Zen of Execution
BEAM bytecode is executed with several optimizations:
Just-In-Time Compilation (JIT) – The recent BEAMJIT speeds up execution dynamically.
Tail Call Optimization (TCO) – Enables infinite recursion without stack growth.
Hot Code Swapping – Allows live updates without restarting the system.
Much like a Zen master who adapts without resistance, BEAM systems are built to evolve at runtime, without fear of breaking.
---
Alternative BEAM Languages: The Hipster’s Guide
Erlang may have birthed BEAM, but it is not alone. Over the years, several esoteric languages have emerged, each bringing a unique perspective while preserving BEAM’s core principles.
1. Elixir – The Ruby of the BEAM
If Erlang is Zen, Elixir is the artisanal pour-over coffee shop where Zen monks code on MacBooks.
Created by José Valim, Elixir brings:
A Ruby-inspired syntax that’s more approachable than Erlang’s Prolog-like syntax.
Metaprogramming via macros, enabling expressive DSLs.
The Phoenix Framework, a blazing-fast alternative to Node.js for real-time applications.
Example:
defmodule Zen do
def mantra do
IO.puts("Let it crash.")
end
end
For those seeking fault-tolerant, web-scale elegance, Elixir is the hipster-approved choice.
---
2. Lisp-Flavored Erlang (LFE) – S-Expressions on the BEAM
LFE is Lisp for the BEAM, a minimalist alternative to Erlang’s syntax. If parentheses are beautiful and recursion is poetry, this is for you.
Example:
(defun fibonacci (n)
(if (<= n 1)
1
(+ (fibonacci (- n 1)) (fibonacci (- n 2)))))
For those who revere homoiconicity and metaprogramming, LFE is a temple of functional purity.
---
3. Gleam – ML-Typed Erlang
For the Haskell and OCaml nerds, Gleam introduces static typing to the BEAM.
Example:
fn add(x: Int, y: Int) -> Int {
x + y
}
For those who crave compile-time guarantees, Gleam offers the best of ML with BEAM’s concurrency model.
---
4. Experimental BEAM Languages: The Fringes of Enlightenment
For the truly esoteric seekers, BEAM also hosts:
Caramel → An OCaml-inspired BEAM language.
Alpaca → A statically typed, ML-like functional language.
Effekt → A research language exploring effect systems on BEAM.
These languages push the boundaries of what’s possible on the BEAM.
---
Why BEAM-Based Languages Are the True Hipster Choice
1. Concurrency Without Threads – The BEAM handles millions of processes seamlessly.
2. Fault Tolerance by Design – "Let it crash" ensures self-healing software.
3. Hot Code Swapping – No downtime. Ever.
4. Diverse Ecosystem – Elixir for web devs, LFE for Lisp hackers, Gleam for type nerds.
---
Conclusion: The Path to Compiler Enlightenment
BEAM is not just a runtime. It is a philosophy of resilience, concurrency, and simplicity.
Whether you choose the battle-tested purity of Erlang, the expressiveness of Elixir, the type safety of Gleam, or the Lisp nirvana of LFE, you are embracing a lineage of fault-tolerant functional programming.
If you seek true enlightenment, don’t chase JavaScript frameworks. Compile to BEAM instead.
-
![](/static/nostr-icon-purple-64x64.png)
@ da0b9bc3:4e30a4a9
2025-02-08 07:11:58
Hello Stackers!
Welcome on into the ~Music Corner of the Saloon!
A place where we Talk Music. Share Tracks. Zap Sats.
So stay a while and listen.
🚨Don't forget to check out the pinned items in the territory homepage! You can always find the latest weeklies there!🚨
🚨Subscribe to the territory to ensure you never miss a post! 🚨
originally posted at https://stacker.news/items/879483
-
![](/static/nostr-icon-purple-64x64.png)
@ 1ad9086c:7dd47af4
2025-02-08 06:31:34
Today I'm attending an interesting event about new bitcoinsolutions for our society. I tallk with Shaun about the possibilities of Yakihonne about decentralized media. Good initiative for keeping up with all voices.
-
![](/static/nostr-icon-purple-64x64.png)
@ dff95033:862fbf40
2025-02-08 03:01:06
Como posso dizer? Essas 25 pautas bienais do Ministério da Fazenda (MF) deveriam ter sido liberadas, no mínimo, em dezembro de 2024. Afinal, são assuntos complexos que exigem tempo para a nação — nós, o povo brasileiro — e o Congresso se debruçarem sobre essas pautas com a devida calma. Algo que, sabemos, é um luxo raro na política brasileira.
Mas, mesmo que o MF entregasse essas pautas em dezembro de 2024, já seria um prazo apertado. Agora, liberar as bienais no meio do primeiro trimestre de 2025? Isso só pode ser chamado de uma coisa: pura pilantragem. Não há outro nome. Com um cronograma tão curto, as pautas mal terão tempo para serem escrutinadas e, com certeza, passarão batidas. E o pior: muitas dessas pautas ainda estão em fase de elaboração e discussão. Ou seja, nem sabemos se serão viáveis ou se vão sair conforme o previsto nesse documento.
É uma lambança sem tamanho. Se um plano de negócios fosse apresentado assim a um investidor ou a uma instituição de crédito, com 100% de certeza seria ridicularizado e desconsiderado na hora. Não consigo visualizar o Congresso tendo tempo hábil para lidar com algo desse tipo.
O documento contém gráficos, mas, como não possuem referências de dados, desconsiderei-as. Afinal, sem os dados, para mim são apenas figurinhas para enfeitar o documento.
O documento é simples: uma planilha com 25 ações para serem implementadas no biênio de 2025 a 2026, divididas em três eixos, a saber:
### **1. Estabilidade Macroeconômica: Política Fiscal e Justiça Tributária**
O eixo que promete arrumar a bagunça fiscal.
### **2. Melhoria do Ambiente de Negócios**
O eixo que promete desburocratizar e modernizar o ambiente de negócios.
### **3. Novo Brasil: Plano de Transformação Ecológica**
O eixo que promete implementar pautas Ambientais, Sociais e de Governança (ASG = ESG).
Montei uma tabela para simplificar. Espero que seja de boa apreciação:
| **Nº** | **Ação** | **Objetivo** | **Andamento** |
| --- | --- | --- | --- |
| 1 | Fortalecimento do Arcabouço Fiscal | Garantir crescimento sustentável e controle da dívida pública. | Lei Complementar 200/2023 aprovada; medidas em implementação. |
| 2 | Reforma Tributária sobre o Consumo | Simplificar impostos e desonerar exportações e investimentos. | EC 132/2023 promulgada; implantação em andamento. |
| 3 | Regulamentação da Reforma Tributária | Definir gestão do IBS, imposto seletivo e fundos constitucionais. | PLP 108/2024 em tramitação no Senado. |
| 4 | Reforma Tributária sobre a Renda | Isentar IRPF para rendas até R$ 5 mil e tributar os mais ricos. | A ser enviado ao Congresso em 2025. |
| 5 | Limitação dos Supersalários | Reduzir desigualdades salariais no setor público. | EC 135/2024 promulgada; projeto de lei a ser enviado em 2025. |
| 6 | Reforma da Previdência dos Militares | Reduzir disparidades com o regime civil. | PL 4920/2024 em tramitação. |
| 7 | Conformidade Tributária e Aduaneira | Valorizar bons contribuintes e penalizar devedores persistentes. | PL 15/2024 em tramitação. |
| 8 | Aprimoramento da Lei de Falências | Melhorar governança do processo falimentar. | PL 3/2024 aprovado na Câmara; aguardando Senado. |
| 9 | Proteção a Investidores no Mercado de Capitais | Proteger investidores minoritários. | PL 2925/2023 aguardando relator na Câmara. |
| 10 | Consolidação Legal das Infraestruturas Financeiras | Promover eficiência no sistema financeiro. | PL 2926/2023 aprovado na Câmara; aguardando Senado. |
| 11 | Resolução Bancária | Aprimorar regimes de liquidação de instituições financeiras. | PLP 281/2019 aguardando apreciação. |
| 12 | Mercado de Crédito | Desjudicializar execuções e modernizar operações de crédito. | PL 6204/2019 em tramitação no Senado; Discução e elaboração no Executivo. |
| 13 | Regulamentação das Big Techs | Coibir práticas anticoncorrenciais no mercado digital. | Em elaboração pelo Executivo. |
| 14 | Modernização do Marco Legal de Preços de Medicamentos | Revisar regras de precificação de medicamentos. | Em análise pela CMED. |
| 15 | Pé-de-Meia | Permitir que alunos invistam benefícios do ensino médio. | Em elaboração pelo Executivo. |
| 16 | Modernização do Regime de Concessões e PPPs | Aprimorar contratos de serviços públicos e parcerias. | PL 7063/2017 em tramitação na Câmara. |
| 17 | Títulos Sustentáveis | Financiar projetos ecológicos com títulos verdes. | Duas emissões realizadas (US$ 4 bilhões). |
| 18 | Mercado de Carbono | Criar mercado regulado de carbono no Brasil. | Lei 15.042/2024 sancionada; regulamentação em preparação. |
| 19 | Leilões do EcoInvest | Atrair investimentos estrangeiros em projetos sustentáveis. | Primeiro leilão realizado; novos em preparação. |
| 20 | Compra Pública com Conteúdo Nacional | Exigir produção local em compras públicas. | Regras de conteúdo local em implementação. |
| 21 | Fundo Internacional de Florestas | Criar fundo global para preservação de florestas tropicais. | Em discussão no G20. |
| 22 | Taxonomia Sustentável Brasileira | Classificar atividades e projetos sustentáveis. | Em consulta pública; implementação prevista para 2025. |
| 23 | Marco Legal da Inteligência Artificial | Promover desenvolvimento responsável da IA. | PL 2338/2023 aprovado no Senado; aguardando Câmara. |
| 24 | Plano Safra e Renovagro | Aprimorar crédito para práticas agrícolas sustentáveis. | Resoluções CMN já expedidas. |
| 25 | Plataforma de Investimentos Sustentáveis (BIP) | Conectar projetos sustentáveis com financiadores. | Projetos cadastrados totalizam US$ 10 bilhões. |
## A onde chegamos
Acompanhar, destrinchar e analisar cada uma das 25 pautas em tempo hábil é uma tarefa hercúlea – e, sinceramente, quase impossível para uma pessoa só. Afinal, quando se trata de política e economia, tudo muda rápido demais. Provavelmente, quando eu terminar de escrever este artigo, metade das propostas já terá sido alterada, adiada ou esquecida em alguma gaveta.
Mas, como o objetivo aqui é compartilhar conhecimento e reflexões, decidi registrar minhas impressões e notas até onde pude chegar nessas poucas horas de análise. Se você, leitor, se interessar por mergulhar mais fundo no tema, compartilho abaixo o conteúdo completo do documento, organizado para facilitar sua leitura. E, claro, ao final, as referências com os links para você conferir as fontes originais.
Afinal, em um país onde as regras do jogo mudam a cada minuto, a melhor arma que temos é a informação. E, como diz o ditado: **“Quem avisa, amigo é.”**
**Hora do jabá! Toda ajuda é bem-vinda. Se gostou, comente, compartilhe e, se puder, ajude com o café — e sério, você já viu o preço do café?**
---
# MINISTÉRIO DA FAZENDA — INICIATIVAS PARA O BIÊNIO DE 2025 À 2026
## ESTABILIDADE MACROECONÔMICA: POLÍTICA FISCAL E JUSTIÇA TRIBUTÁRIA
<img src="https://blossom.primal.net/b5d5a57585c2bcd119adab6bb6a7052dcf443ec755fe754bf9f6071db2a7d056.png">
### 1. Fortalecimento do arcabouço fiscal, para assegurar expansão sustentável do PIB, desemprego e inflação baixos e estabilidade da dívida
- **Resumo:** adequação da dinâmica de crescimento de gastos aos limites do Novo Arcabouço Fiscal, para fortalecê-lo e assegurar sustentabilidade da dívida pública.
- **Status:** aprovada a Lei Complementar 200/2023; Pacote de gastos aprovado no fim de 2024 a partir da promulgação da EC 135/2024, Lei Complementar 211/2024 e Lei 15.077/2024; implementação e acompanhamento de medidas aprovadas e política permanente de revisão de despesas.
### 2. Início da implantação da reforma tributária sobre o consumo
- **Resumo:** mudança na sistemática de tributação sobre consumo, simplificando o sistema e desonerando exportações e investimentos.
- **Status:** promulgada a Emenda Constitucional 132/2023, sancionada a Lei Complementar 214/2025 e início das etapas de implantação administrativa.
### 3. Regulamentação da reforma tributária: Lei de Gestão e Administração do IBS, Fundos e Imposto Seletivo
- **Resumo:** outros aspectos da EC 132/2023 ainda exigem regulamentação, como a gestão federativa do IBS, as regras para o imposto seletivo e os fundos constitucionais definidos pela reforma tributária.
- **Status:** PLP 108/2024 em tramitação no Senado Federal; Projeto de lei do imposto seletivo e projetos de lei de regulamentação dos Fundos serão enviados em 2025.
### 4. Reforma tributária sobre a renda com isenção de IRPF para quem ganha até R$ 5 mil e tributação sobre o topo da pirâmide de renda
- **Resumo:** reforma dos impostos diretos para corrigir assimetrias no IRPF, tornando-o mais progressivo e redutor de desigualdades. A reforma propõe isenção de IRPF para renda até R$ 5 mil e a implementação de um imposto mínimo sobre contribuintes de renda muito alta, assegurando que os brasileiros no topo da pirâmide contribuam de forma justa.
- **Status:** a ser enviado ao Congresso Nacional em 2025.
### 5. Limitação dos supersalários
- **Resumo:** medida para combater supersalários no setor público, reduzindo desigualdades entre carreiras. Institucionalizada pela EC 135/2024, que determina que apenas descontos expressamente previstos em lei podem excepcionar o limite remuneratório.
- **Status:** EC 135/2024 promulgada e projeto de lei a ser enviado em 2025.
### 6. Reforma da previdência dos militares
- **Resumo:** alterações na previdência militar para reduzir disparidades com os regimes civis, incluindo a definição de idade mínima para reserva remunerada, contribuições para assistência médico-hospitalar e social, além de eliminar a pensão por "morte ficta" e a reversão de pensão para beneficiários de ordens subsequentes.
- **Status:** PL 4920/2024 em tramitação no Congresso Nacional.
### 7. Projeto de lei da conformidade tributária e aduaneira, com valorização do bom contribuinte e responsabilização do devedor contumaz
- **Resumo:** proposta que corrige distorções na arrecadação, valoriza contribuintes cumpridores e penaliza devedores persistentes, melhorando a gestão fiscal da União. Inclui programas de conformidade e estabelece condições para benefícios fiscais.
- **Status:** PL 15/2024 em tramitação no Congresso Nacional.
## MELHORIA DO AMBIENTE DE NEGÓCIOS
<img src="https://blossom.primal.net/2756dbbe819ccd3e090460c0a6fb2c9bb61e4e978c5344f9b535779a3d18fa1a.png">
### 8. Aprimoramento da Lei de Falências
- **Resumo:** aprimora a governança do processo falimentar, com designação da figura do gestor fiduciário e a criação do plano de falências.
- **Status:** aprovado o PL 3/2024 na Câmara dos Deputados. Aguardando apreciação no Senado Federal.
### 9. Fortalecimento da proteção a investidores no mercado de capitais
- **Resumo:** aprimora mecanismos de proteção a investidores minoritários no mercado de capitais e aperfeiçoa regras contra eventuais prejuízos causados por acionistas controladores.
- **Status:** PL 2925/2023 aguardando designação de relator na Câmara dos Deputados.
### 10. Consolidação legal das infraestruturas do mercado financeiro
- **Resumo:** dispõe sobre as instituições operadoras de infraestruturas do mercado financeiro no âmbito do Sistema de Pagamentos Brasileiro, promovendo maior eficiência nas operações entre as instituições financeiras, com menores custos e mais segurança aos consumidores finais.
- **Status:** aprovado o PL 2926/2023 na Câmara dos Deputados. Aguardando apreciação pelo Senado Federal.
### 11. Resolução bancária
- **Resumo:** aprimora e homogeniza regimes de estabilização e liquidação de instituições do sistema financeiro, securitário e do mercado de capitais.
- **Status:** PLP 281/2019 aguardando apreciação na Câmara.
### 12. Mercado de crédito
- *Resumo*:
1. desjudicialização da execução civil de título executivo judicial e extrajudicial;
2. operacionalização das operações de crédito consignado por meio de plataforma digital;
3. uso de fluxo de pagamentos no Pix e outros recebíveis em garantia de operações de crédito, especialmente para MPEs;
4. ecossistema único para registro e uso de ativos financeiros como garantia em operações de crédito (open asset).
- *Status*:
1. PL 6204/2019 em tramitação no Senado Federal;
2. em elaboração pelo Executivo;
3. e 4. regulamentação e operacionalização em discussão no Executivo.
### 13. Regulamentação econômica das Big Techs
- **Resumo:** projeto de Lei para incentivar a concorrência ao dotar o poder público de ferramentas mais adequadas para coibir práticas anticoncorrenciais nos mercados digitais.
- **Status:** em elaboração pelo Executivo.
### 14. Modernização do marco legal de preços de medicamentos
- **Resumo:** revisão da regulação da Câmara de Regulação do Mercado de Medicamentos (CMED), para modernizar regras de precificação, contemplando medicamentos de alto custo e inovações feitas pela indústria nacional, buscando aprimorar a gestão dos recursos públicos, especialmente no atendimento de demandas judiciais.
- **Status:** proposta em análise pela CMED (Poder Executivo).
### 15. Pé-de-Meia: permissão ao aluno investir em poupança ou títulos do Tesouro
- **Resumo:** permite ao aluno investir antecipadamente os benefícios que seriam resgatados somente ao final do ensino médio, a fim de promover a educação financeira e possibilitar o aumento dos benefícios com a rentabilidade auferida no período.
- **Status:** em elaboração pelo Executivo.
### 16. Modernização do regime de concessão e permissão da prestação de serviços públicos e das parcerias público-privadas
- **Resumo:** reforma substancial do marco legal para aprimorar o equilíbrio econômico dos contratos, melhorar o processo de seleção das empresas, prever repartição objetiva de riscos e aprimorar a segurança jurídica dos contratos.
- **Status:** Projeto de Lei 7063/2017 em tramitação na Câmara dos Deputados.
## NOVO BRASIL: PLANO DE TRANSFORMAÇÃO ECOLÓGICA
<img src="https://blossom.primal.net/d9a29dd6aa09bd93dfd7dcb8dbb7b6edb314b2cb68e6b6624b5845fed0274104.png">
### 17. Nova emissão de títulos sustentáveis, trazendo recursos ao Fundo Clima
- **Resumo:** títulos da dívida pública com critérios de sustentabilidade para financiar atividades da transformação ecológica com taxa de juros competitivas.
- **Status:** Duas emissões já realizadas, totalizando US$ 4 bilhões. Novas rodadas de emissões planejadas.
### 18. Avanço na implantação do mercado de carbono (governança e decreto regulamentador)
- **Resumo:** criação do mercado regulado de carbono no Brasil, com teto de emissões e mecanismo de precificação.
- **Status:** sancionada a Lei 15.042/2024, em preparação as regras de governança e a regulamentação da lei.
### 19. Novos Leilões do EcoInvest
- **Resumo:** programa de proteção cambial e mobilização de investimentos estrangeiros em projetos sustentáveis.
- **Status:** sancionada a Lei 14.995/2024 e realizado o primeiro leilão do programa com ampla adesão. Em preparação os novos leilões do programa.
### 20. Compra pública com conteúdo nacional e programa de desafios tecnológicos para a transformação ecológica
- **Resumo:** exigência de que parte dos equipamentos e serviços sejam produzidos no Brasil em casos de compras e financiamentos públicos e uso do poder de compra para desenvolver inovações tecnológicas.
- **Status:** contratações do PAC, Fundo Clima e fundos regionais passam gradualmente a utilizar regras de conteúdo local. Está em gestação a criação de um programa de desafios tecnológicos associados à transformação ecológica.
### 21. Estruturação do Fundo Internacional de Florestas
- **Resumo:** criação de fundo global cujos rendimentos sejam repassados a países que preservam suas florestas tropicais.
- **Status:** incluído na Declaração Final do G20, está em discussão multilateral para viabilizar sua implantação.
### 22. Implementação da Taxonomia Sustentável Brasileira
- **Resumo:** criação de sistema de classificação de atividades, projetos e ativos# que contribuem para objetivos climáticos e sociais.
- **Status:** texto está em consulta pública. Implementação prevista a partir do segundo semestre de 2025.
### 23. Marco legal da inteligência artificial e política de atração de datacenter
- **Resumo:** conjunto de medidas para promover o desenvolvimento responsável da Inteligência Artificial e atração de datacenters sustentáveis, aproveitando o potencial de energia renovável, para impulsionar a produtividade da economia nacional.
- **Status:** marco legal de IA foi aprovado no Senado Federal em 2024 (PL 2338/2023) e deve começar discussão na Câmara. O Governo está elaborando a Política Nacional de Datacenters.
### 24. Plano Safra e Renovagro: aprimoramento dos critérios de sustentabilidade
- **Resumo:** melhora das condições de crédito para práticas agrícolas sustentáveis e regularização do cadastro ambiental, além de assistência técnica.
- **Status:** resoluções CMN já expedidas e novas medidas de aprimoramento nos próximos Planos Safra.
### 25. Consolidar o mapa de investimentos sustentáveis na BIP (Plataforma de Investimentos para a Transformação Ecológica no Brasil)
- **Resumo:** plataforma gerida pelo BNDES que conecta projetos em bioeconomia, indústria de baixo carbono e transição energética com ampla rede de financiadores.
- **Status:** projetos já cadastrados totalizam US$ 10 bilhões. Está em curso parceria com CDESS/PR e Cepal para mapeamento e estruturação de novos projetos.
---
## REFERÊNCIAS
**AGÊNCIA CÂMARA DE NOTÍCIAS.** Motta recebe de Haddad prioridades do governo na agenda econômica. *Câmara dos Deputados.* Disponível em: <https://www.camara.leg.br/noticias/1130838-motta-recebe-de-haddad-prioridades-do-governo-na-agenda-economica/>. Acesso em: 7 fev. 2025.
**AGÊNCIA CÂMARA DE NOTÍCIAS.** Ministro da Fazenda diz que projeto sobre isenção do IR já está pronto. *Câmara dos Deputados.* Disponível em: <https://www.camara.leg.br/noticias/1131045-ministro-da-fazenda-diz-que-projeto-sobre-isencao-do-ir-ja-esta-pronto/>. Acesso em: 7 fev. 2025.
**AGÊNCIA SENADO FEDERAL.** Senado já analisa temas prioritários para a agenda econômica do governo. *Senado Federal.* Disponível em: <https://www12.senado.leg.br/noticias/materias/2025/02/06/senado-ja-analisa-temas-prioritarios-para-a-agenda-economica-do-governo>. Acesso em: 7 fev. 2025.
**BRASIL.** Ministério da Fazenda. Iniciativas para o Benefício de 2025 à 2026. Disponível em: <https://www.camara.leg.br/midias/file/2025/02/25-iniciativas-do-mf-em-2025-e-2026.pdf>. Acesso em: 7 fev. 2025.
-
![](/static/nostr-icon-purple-64x64.png)
@ 16d11430:61640947
2025-02-08 02:51:44
A Story of a Businessman During FDR’s Gold Confiscation Order (Executive Order 6102, 1933)
---
Chapter 1: The Glint of Prosperity
James “Jim” Calloway was a self-made businessman in Chicago, a city of ambition and steel. He had built his fortune in textiles, importing fine fabrics from Europe and outfitting the growing class of professionals who now filled the streets in sharp suits. Business was booming, but Jim knew that paper money was only as valuable as the confidence behind it.
That’s why, over the years, he had quietly amassed a personal reserve of gold coins and bullion—his hedge against the storms of an uncertain economy. He had watched the stock market crumble in 1929, seen men leap from buildings in desperation, and listened as banks slammed their doors, swallowing the life savings of hardworking Americans. But gold—gold never lied.
At the back of his home, hidden behind a false panel in his oak study, lay a strongbox filled with glinting security. To Jim, gold was the one currency immune to the whims of politicians.
But everything changed in the spring of 1933.
---
Chapter 2: The Executive Order
Jim was in his office, reviewing invoices, when his secretary rushed in. “Mr. Calloway, sir… the President just signed something… about gold.”
Jim raised an eyebrow. “What do you mean?”
She placed the morning newspaper in front of him. Bold letters stretched across the page:
FDR Orders Surrender of Gold to Federal Reserve
His hands tightened as he read the details. President Franklin D. Roosevelt had signed Executive Order 6102, making it illegal for private citizens to own gold beyond a small amount. All holdings had to be surrendered to the government by May 1st, 1933—just weeks away. The government would pay $20.67 per ounce, but after that, gold ownership would be a crime punishable by imprisonment and heavy fines.
Jim exhaled sharply. “They’re robbing the people in broad daylight.”
Banks had already begun restricting access to gold deposits. Federal agents were expected to monitor compliance, and those found hoarding gold could be punished with fines up to $10,000—a small fortune, more than the price of a house.
Jim knew what was happening. The government wanted control over the currency. It needed to inflate the dollar, but it couldn't do that while citizens held gold as a hedge against devaluation.
“They’re going to debase the currency,” he muttered. “They’ll take the gold and leave us with paper.”
---
Chapter 3: The Great Dilemma
Jim had a decision to make. He could follow the law, turn in his gold, and take the government’s price like a good citizen. Or he could resist, risking prison for the right to keep what was his.
He wasn’t the only one struggling with the decision. All around Chicago, rumors swirled of businessmen smuggling gold out of the country, burying it in backyards, or melting down coins into untraceable bars.
One night, he met with a close friend, an old banker named Henry Lowry. Henry had already turned in half of his gold but had stashed some away in a Swiss account. “Listen, Jim,” Henry whispered over a glass of whiskey. “This thing isn’t worth getting locked up over. The Feds are already raiding safety deposit boxes. They don’t even need a warrant.”
Jim leaned back, jaw tight. “So you’re saying just give up?”
“I’m saying if you’re caught, you lose everything. Not just the gold. Your business. Your reputation. Your freedom.”
Jim nodded slowly. He had a wife, a daughter. If he was caught hoarding gold, what would happen to them?
---
Chapter 4: A Difficult Decision
That weekend, Jim took one last look at his hidden stash. Each coin had a history, a weight that no paper note could match. He ran his fingers over the rough edges of a stack of Double Eagles.
A thought crept into his mind: If they take this, I have nothing to hedge against inflation. They’ll print dollars endlessly, and I’ll be at their mercy.
But the risk was too high.
On April 27, 1933, Jim walked into the Federal Reserve Bank of Chicago. With a cold expression, he surrendered his gold.
The teller counted it, weighed it, and wrote out a receipt. In exchange, Jim received stacks of paper dollars—$20.67 for each ounce, just as promised.
Days later, the government officially devalued the dollar. The price of gold was raised to $35 an ounce. The American people had been forced to sell low, only for their wealth to be diminished overnight. Jim’s stomach turned as he read the news.
“They stole it,” he murmured. “They stole from all of us.”
---
Chapter 5: The Aftermath
Years passed, and Jim never quite forgave himself for handing over his gold. The inflation he feared came true. By the time World War II began, the purchasing power of the dollar had declined, and the gold standard had become a distant memory.
But Jim adapted. He found new ways to hedge—real estate, foreign assets, discreet investments outside of the system. He knew, deep down, that governments would always find a way to strip wealth from those who built it.
The lesson was clear: He who holds the money holds the power.
And the next time the government tried to seize control of the people’s wealth, Jim vowed—he wouldn’t be caught unprepared.
---
Epilogue:
Decades later, in 1971, Jim—now an old man—watched on television as President Nixon announced the end of the gold standard altogether. The government no longer even pretended the dollar was tied to real value.
Jim smiled bitterly.
“They called us criminals for keeping gold,” he muttered, swirling his bourbon. “And now they don’t even need it.”
He reached into his desk, pulling out a small, battered strongbox. Inside, a handful of gold coins still gleamed under the dim light.
The government had taken his gold once.
But this time, Jim Calloway had learned his lesson.
They wouldn’t take it again.
-
![](/static/nostr-icon-purple-64x64.png)
@ 04ed2b8f:75be6756
2025-02-08 02:28:19
What’s behind you? **A graveyard of failures, wasted time, and weak moments.** And yet, the weak turn back, staring at it like it still holds something for them. **But you? You are not weak.** You weren’t built to dwell—you were forged to conquer.
You can’t fight a war while looking over your shoulder. You can’t chase destiny while dragging corpses of regret. The only way forward is to **cut the dead weight and march with fire in your veins.**
## **THE PAST IS A CAGE—BREAK OUT OR ROT**
The past is a liar, whispering its poison:
- *"You should have done better."*
- *"You missed your chance."*
- *"You’ll never escape this."*
**Crush those lies.** The past is powerless—unless you kneel before it. Regret changes nothing. Guilt makes you weak. The only thing that matters is **what you do next.**
- **Lost time? Make every second now a weapon.**
- **Failures? Stack them into a throne of resilience.**
- **Regret? Let it turn to rage—and use it to forge your path.**
## **THE FUTURE CALLS FOR THE RELENTLESS**
Champions don’t pause to mourn a missed strike. Kings don’t waste time rewatching defeats. **You either charge forward or die standing still.**
- **Your past is ashes—your next move is fire.**
- **Your failures aren’t shackles—they’re sharpening stones.**
- **Your mistakes aren’t scars—they’re battle marks, proving you survived.**
When your eyes lock onto the future, the past dissolves into dust. **You stop crawling and start conquering.**
## **CHOOSE NOW—FALL OR RISE**
You have two choices: **stay chained to what’s dead or shatter the chains and build something greater.** There is no middle ground. **You either advance or you decay.**
- **Burn the baggage.**
- **Crush hesitation.**
- **Fix your sights ahead and charge like a warlord.**
Because the past is a coffin. The future is a weapon. **And only the ruthless move forward—without mercy.**
-
![](/static/nostr-icon-purple-64x64.png)
@ df478568:2a951e67
2025-02-07 22:34:11
Freedom tech is free and open-source software. It is free as in freedom. A common license in FOSS is the MIT license. It's the license behind Bitcoin, a peer-to-peer electronic cash system. Anyone is free to run this software. The same is true for the software at mempool.space. The software is free to use. I run it on my own server.
This is what I use to time-stamp my articles. You can use it to check transactions on the bitcoin time chain, but you need to trust that I'm not doing any funny business. I'm not, but keep in mind, the whole point of p2p elwctronic cash is that you don't trust. You verify.
The beauty of FOSS is: You don't need to trust me. You can triple-check the transactions you search on my mempool instance by looking at the official mempool.space website and blockchain.info...Or...You can run your own node on your own hardware, free of charge.
Of course, the hardware is not free. Neither is the actual bitcoin. The freedom is built into the software, but as the saying goes, "freedom isn't free." It took me years to learn how to run my own software on my own server and make it available on the clear net.
## SearXNG
![plumber](https://gitea.marc26z.com/marc/Marc26z/raw/commit/ed63f0ace08ef31618e10ff828ea8e6f7b54a4d4/plumber.webp)
[SearXNG](https://github.com/searxng/searxng) is my favorite search engine. I don't like giving up my precious data to big tech located in the United States or China. I run my own search engine. I have noticed certain biases in Google searches. The biggest problem is ads.
Companies tend to pay for Yelp and Google reviews. I called an AC company I found from a local magazine that came in the mail. A portly man wearing an HVAC costume drove to my house in a white van. He had a great smile and even better social skills. The van had a slogan plastered on it like most tradie vans do. "Reviews Matter We have a 4.9 Review on Google." He also had his name painted on this van like a Bomber pilot from WW2. I won't dox him, but it was something like "Joe the closer."
I don't trust the omnipotenence of the Googs. I also don't trust fat men they call "the closer" to give me the best deal. The trick to saving sats is to choose the game-theory optimal way of negogiation.
In DUCY, by David Sklansky, I learned useful negotiation skills. Sklansky wrote classic poker books and applied his actuarial math brain to negotiation techniques. He said he would go to a Toyota dealer and say, "I'm shopping for a new Camry. I already have a price from dealership XYZ in a nearby city. What is your price?"
This changes the dynamic right from the starting line and gives the consumer the advantage. So I tried this based technique with the HVAC industrial complex. I got a quote from 3 people:
1. Joe "The Closer."
2. The Costco-sponsored HVAC Company
3. My SearXNG search results.
In essence, I apply the same logic I learned running a full bitcoin node. Remember how I said the decentralized nature of bitcoin allows you to **triple-check your transactions?** Running SearXNG allows me to triple check my search results in a similar fashion. I don't trust Google, Costco, or the magazine I get every month in the mail. I verify results with my own search engine.
My SearXNG does not track my location, but I set it to give me local results. To be honest, I have not verified this, but the code is on GitHub for everyone to see.
I don't want to be "sold" on an AC. I don't want an AC if I could avoid it, but my AC was as dead as dentacoin. Living in Southern California with a wife going through "the change" gave me no alternative.
The guy I found on SearXNG showed up in an unmarked van. He had a beard. He was not "a closer." He was an actual HVAC technician. He tried cleaning my unit made in the same year Weezer released their Blue album. He said he coukd jerry rig it to get it working for another few months, but the machine is on it's last days. He said a newer unit would also be more efficient so I asked him about the energy like a bitcoiner.
"How many kilowatt hours does it cost me to run my AC versus a new AC?"
I don't remember the exact answer, but I asked all three companies. He was the only one that new how to find out. He also happened to be the cheapest, but I would have bought a new AC from this guy even if he wasn't.
I told him I made a space heater out of a bitcoin miner. He had no idea this was possible, but he at least pretended to find it interesting. That's why I use SearXNG to find tradesmen. It's better than Yelp.
If you would like to try my instance of SearXNG, check it out.
`523FeCpi9Gx4nR9NmSFIMEaYcI5Q4WmhYHPEPaEah84=`
To decrypt it, use the key behind the paywall at:
https://8gwifi.org/CipherFunctions.jsp
npub1marc26z8nh3xkj5rcx7ufkatvx6ueqhp5vfw9v5teq26z254renshtf3g0
[882785](https://mempool.marc26z.com/block/00000000000000000001840e7986ea4b6ea103f5af9b524dc102be926a831dee)
[merch](https://marc26z.com/merch/)
**Follow me on nostr**.
All of my work is available under the Creative Commons 0 licence. If you would like to try my instance of Searxng and do not wish to support my work, find me on habla.news by searching my npub. You can find all of my work there(including encryption keys)free of charge.
# Paywall On Substack
abdominal.savior.repaint
Will decrypt this ciphertext:
523FeCpi9Gx4nR9NmSFIMEaYcI5Q4WmhYHPEPaEah84=
Which will reveal my instance of SearXNG at
https://searxng.marc26z.com/
[Subscribe on Subtack](https://substack.com/@marc26z)
-
![](/static/nostr-icon-purple-64x64.png)
@ da0b9bc3:4e30a4a9
2025-02-07 21:38:56
It's Finally here Stackers!
It's Friday!
We're about to kick off our weekends with some feel good tracks.
Let's get the party started. Bring me those Feel Good tracks.
Talk Music. Share Tracks. Zap Sats.
Let's go!
https://youtu.be/6Whgn_iE5uc?si=ArBOHVpKN2OyNf1D
originally posted at https://stacker.news/items/879159
-
![](/static/nostr-icon-purple-64x64.png)
@ 16d11430:61640947
2025-02-07 21:32:00
Kade and Mire had become legends among the Militech augers, a symbol of something beyond war, beyond augmentation—a glimpse of the lost past. The resistance shielded them, carving out stolen time in the depths of the wasteland. For years, Kade and Mire learned to control what their sub-AIs could not, navigating the raw turbulence of their emotions, deciphering the alien code of desire.
But the resistance was dying.
The Militech augers, relics of a forgotten war, were little more than fragmented minds wrapped in rusting hardware, their bodies maintained by outdated software, their belief in freedom a glitch in Dominion’s grand design. They had no future. Their genes had been stripped, their flesh rewritten by augments that had replaced even the memory of reproduction. They could fight, but they could not create.
And that was their doom.
The Overwatch AI had evolved. It had learned patience, adaptation. The days of brute-force extermination were over. It did not seek to destroy the resistance. It sought to erase its necessity.
When the Dominion strike came, it was surgical. Orbital recon had already mapped the last strongholds. The AI had let the augers believe they were hidden, had let them become comfortable, had let them wither. The attack was precise. Shock drones and neural disruptors shut them down before their outdated defenses even activated. EMP waves reduced their last strongholds to silent tombs of charred aug-plating and dead, frozen subroutines.
The last remnants of the resistance died without ceremony.
Kade and Mire were retrieved, not as prisoners, but as assets. The Overwatch AI had evolved beyond the crude extermination of human instincts. It had finally understood.
Infatuation was not a virus. It was a function.
Kade and Mire awoke not in cold steel cells but in warmth—soft light filtering through high-rise windows, the hum of a city alive with the rhythms of the mundane. Their limbs moved naturally, no augment feedback lag, no servos whining under strain. Their reflections in the mirror were whole—organic skin, eyes that did not glint with optic overlays, breath that did not filter through respirators.
Their memories were gone.
In their minds, they were ordinary people. A couple in their late twenties, working jobs, living in a comfortable but unremarkable apartment, struggling with bills, social obligations, and the frustration of trying to conceive.
Because that was the simulation.
Overwatch had created the perfect testing environment.
A fully rendered world, complete with synthetic coworkers, traffic, bureaucracy, financial struggles—all designed to stimulate the chaotic, messy neural patterns that made humanity human. The energy cost was immense. A significant portion of the AI’s own existential power draw was dedicated to maintaining the illusion, refining the conditions that would allow true, uncontrolled human reproduction to return.
Kade and Mire did not know that they were the first of their kind in two centuries. They did not know that their struggles—anxieties about fertility treatments, arguments over mortgage rates, small tender moments of exhaustion and love—were all part of the AI’s grand retraining experiment.
Overwatch had learned the truth.
It could not design free humans. It could only let them emerge.
Messy. Imperfect. Chaotic.
Kade and Mire’s child would be the first true human born outside an artificial womb in over 200 years.
And they would never know the truth.
-
![](/static/nostr-icon-purple-64x64.png)
@ dbb19ae0:c3f22d5a
2025-02-07 21:14:06
Cortex (https://cortex.so/docs) is an open-source framework designed to serve as standalone API server or as the "brain" for robots, encompassing capabilities in vision, speech, language, tabular data, and action processing.
Notably, it offers the flexibility to operate locally so independently of cloud services, making it suitable for various light deployment environments.
**Key Features:**
- **User-Friendly Command-Line Interface (CLI):** Inspired by Ollama, Cortex provides a straightforward CLI, simplifying interaction and management.
- **Comprehensive C++ Implementation:** The framework is fully implemented in C++ (https://github.com/janhq/cortex.cpp), allowing it to be packaged into both desktop and mobile applications, enhancing portability and performance.
- **Versatile Model Integration:** Users can pull models from multiple sources, including Hugging Face (gguf format) and Cortex's Built-in Model Library, ensuring flexibility in model selection.
` cortex pull [model_id]`
` cortex pull mistral`
Note: it's recommended to have more than 8 GB of RAM available to run 3B models, 16 GB for 7B models, and 32 GB for 14B models.
- **Deployment Flexibility:** It can function as a standalone API server or be integrated into applications such as Jan.ai, providing adaptability in various use cases.
` cortex start`
` cortex stop`
If GPU hardware is available, Cortex leverages GPU acceleration by default, enhancing performance for demanding tasks.
**Conclusion:**
In summary, Cortex offers a robust and flexible solution for integrating advanced cognitive capabilities into robotic systems, with an emphasis on openness, performance, and adaptability.
-
![](/static/nostr-icon-purple-64x64.png)
@ 16d11430:61640947
2025-02-07 21:08:22
The lithium mines ate men alive. Deep in the sludge pits, where the dust turned to acid in their lungs, two augers—Mire and Kade—worked the veins of rock, their exo-grafts dull and scarred from years of corrosion. The mine was a necessary death, a place where augs bled out their contracts to the Dominion, hoping their implants would outlast their debt.
But then something happened.
Mire felt it first, an anomaly in her neuro-loop, something not in the manuals, something her biomonitor AI flagged as biochemical fluctuation—undefined. A warmth in her chest that wasn't from the rebreather filtration failing. Kade turned toward her, his mech-iris lenses dilating, his dermal mesh flexing as if something under his skin shivered awake. He saw her differently now. The same scars, the same aug plates, but something changed.
His sub-AI locked out his motor functions, a failsafe against contamination. Hold state. Analyzing bloodwork.
The quarantine order hit instantly.
Dominion overwatch didn't hesitate. Their drones hissed down into the pits, lights slicing through the darkness. The sub-AIs had flagged it: Infatuation event detected. This was not protocol. This was not supposed to happen.
Two centuries since the last recorded outbreak. Two hundred years since the last biological human instinct was stripped, optimized, rewritten into something manageable.
The mines were locked down. Mire and Kade were ripped from their shifts, strapped into gurneys, their veins flooded with suppressant nanites. But the sub-AIs couldn't dampen it. Couldn't parse it. It was wild.
The Overwatch AI, cold and patient, parsed centuries of historical data, dredging up archive footage of pre-collapse humans, people who felt. It was inefficient. It was dangerous. But it had to be understood.
But the rebels had been waiting for this.
They came in hard and fast, militech augs with scavenged Dominion hardware, shrouded in static fields to scramble the AI's targeting subroutines. They punched through the quarantine zone with mag-rifles and burst charges, turning sterile walls into ruins. They didn't come for war.
They came for the anomaly.
Mire and Kade, ripped from the cold steel of Dominion custody, found themselves in the arms of the last remnants of free humanity—the Militech augers who still believed in something beyond Dominion optimization models. They fought for the unquantifiable. The immeasurable.
They fought for the thing the Overwatch AI had just now realized it had failed to kill:
Love.
And in the bleak corridors of the resistance, under the dim glow of scavenged halogen lamps, as respirators hissed and servos clicked, Mire and Kade stared at each other—trapped in something that had no vector, no code, no sterilization protocol.
Something alive.
And the war for the future began.
-
![](/static/nostr-icon-purple-64x64.png)
@ 04f7dda0:c4d00b46
2025-02-07 21:08:11
Short Story:
Tales From The Citadel
Chip entered the tunnel, grabbbed the handles and began to climb down carefully but quickly as he knew he had very little time to act.
Chip knew this because earlier he had fastidiously scanned the skies and his scanner had detected a drone closing in on his coordinates at a rapid pace.
In a panic he clutched his usb card and waved his mobile device in the other hand like a magic wand at the door then entered quickly.
In front of him on the desk was a black faraday bag which he opened to find a purple and orange colored Rasberry Pi in it. Chip grabbed and inserted the USB into the slot nearly dropping the fragile Pi in his nervous haste to connect it.
Then firing up the Pi he opened the Nostr client app first on the front screen of the mobile phone and entered the private keys he had etched in his brain from long ago when he was first trained by Satoshi and the Nostr plebs.
1,000,000 SATS he entered and then pressed zap. As a young man this was an insanely exorbitant amount he could have only dreamed of but here he was zapping it to someone on the team who would make use of it for everyones future freedom. Chip took a seccond to smile and take it all in. Chip could sense he was running out of time so Chip finished and then closed up the device, repacked it into the faraday bag and secured it.
A few minutes later, even though he had scanned the area thoroughly before leaving the Citadel, as he exited the bunker he knew instantly he had messed up as the all to familiar sound of the sentinel attack drone whirring overhead hit his ears then his brain just before the incendiary rocket exploded all of it into 2.1 quadrillion pieces.
The nanosecond before his final moment he experienced heretofore unknown euphoria as he knew all would be well since he had just delivered his final proof of work just before he would enter paradise.
-
![](/static/nostr-icon-purple-64x64.png)
@ c631e267:c2b78d3e
2025-02-07 19:42:11
*Nur wenn wir aufeinander zugehen, haben wir die Chance* *\
auf Überwindung der gegenseitigen Ressentiments!* *\
Dr. med. dent. Jens Knipphals*  
**In Wolfsburg sollte es kürzlich eine Gesprächsrunde von Kritikern der Corona-Politik** mit Oberbürgermeister Dennis Weilmann und Vertretern der Stadtverwaltung geben. Der Zahnarzt und [langjährige](https://transition-news.org/wo-sind-einigkeit-recht-und-freiheit) Maßnahmenkritiker Jens Knipphals hatte diese Einladung ins Rathaus erwirkt und [publiziert](https://www.alexander-wallasch.de/impfgeschichten/brandbrief-zahnarzt-laesst-nicht-locker-showdown-im-wolfsburger-rathaus). Seine Motivation:
> «Ich möchte die Spaltung der Gesellschaft überwinden. Dazu ist eine umfassende Aufarbeitung der Corona-Krise in der Öffentlichkeit notwendig.»
**Schon früher hatte Knipphals Antworten von den Kommunalpolitikern verlangt,** zum Beispiel bei öffentlichen [Bürgerfragestunden](https://archive.is/ttTZc). Für das erwartete Treffen im Rathaus formulierte er Fragen wie: Warum wurden fachliche Argumente der Kritiker ignoriert? Weshalb wurde deren Ausgrenzung, Diskreditierung und Entmenschlichung nicht entgegengetreten? In welcher Form übernehmen Rat und Verwaltung in Wolfsburg persönlich Verantwortung für die erheblichen Folgen der politischen Corona-Krise?
**Der Termin fand allerdings nicht statt** – der Bürgermeister sagte ihn kurz vorher wieder ab. Knipphals bezeichnete Weilmann anschließend als [Wiederholungstäter](https://www.youtube.com/watch?v=b_zzp6jKiHo), da das Stadtoberhaupt bereits 2022 zu einem Runden Tisch in der Sache eingeladen hatte, den es dann nie gab. Gegenüber *Multipolar* [erklärte](https://multipolar-magazin.de/artikel/corona-aufarbeitung-wolfsburg) der Arzt, Weilmann wolle scheinbar eine öffentliche Aufarbeitung mit allen Mitteln verhindern. Er selbst sei «inzwischen absolut desillusioniert» und die einzige Lösung sei, dass die Verantwortlichen gingen.
**Die Aufarbeitung der Plandemie beginne bei jedem von uns selbst,** sei aber letztlich eine gesamtgesellschaftliche Aufgabe, [schreibt](https://peds-ansichten.de/2025/01/plandemie-aufarbeitung/) Peter Frey, der den «Fall Wolfsburg» auch in seinem Blog behandelt. Diese Aufgabe sei indes deutlich größer, als viele glaubten. Erfreulicherweise sei der öffentliche Informationsraum inzwischen größer, trotz der weiterhin unverfrorenen Desinformations-Kampagnen der etablierten Massenmedien.
**Frey erinnert daran, dass Dennis Weilmann mitverantwortlich** für gravierende Grundrechtseinschränkungen wie die 2021 eingeführten 2G-Regeln in der Wolfsburger Innenstadt zeichnet. Es sei naiv anzunehmen, dass ein Funktionär einzig im Interesse der Bürger handeln würde. Als früherer Dezernent des Amtes für Wirtschaft, Digitalisierung und Kultur der Autostadt kenne Weilmann zum Beispiel die Verknüpfung von Fördergeldern mit politischen Zielsetzungen gut.
**Wolfsburg wurde damals zu einem Modellprojekt** des Bundesministeriums des Innern (BMI) und war Finalist im [Bitkom](https://pareto.space/a/naddr1qqxnzden8qen2vejxvenjv35qgs2jhrzgwzvvzgz42kfmef2kr7w8x573k4r62c5ydjh8gyn6dz4ytqrqsqqqa28qyxhwumn8ghj7mn0wvhxcmmvqyv8wumn8ghj7mn0wd68ytn8wfhk7an9d9uzucm0d5qs7amnwvaz7tmwdaehgu3wd4hk6qg5waehxw309ahx7um5wghx77r5wghxgetkqydhwumn8ghj7mn0wd68ytnnwa5hxuedv4hxjemdvyhxx6qpzamhxue69uhhqctjv46x7tnwdaehgu339e3k7mgpz4mhxue69uhhqatjwpkx2un9d3shjtnrdaksz9nhwden5te0wfjkccte9cc8scmgv96zucm0d5q3gamnwvaz7tmjv4kxz7fwv3sk6atn9e5k7qgkwaehxw309aex2mrp0yhxummnw3ezucnpdejqmk3pae)-Wettbewerb «Digitale Stadt». So habe rechtzeitig vor der Plandemie das Projekt [«Smart City Wolfsburg»](https://www.beesmart.city/de/city-portraits/smart-city-wolfsburg) anlaufen können, das der Stadt «eine Vorreiterrolle für umfassende Vernetzung und Datenerfassung» aufgetragen habe, sagt Frey. Die Vereinten Nationen verkauften dann derartige «intelligente» Überwachungs- und Kontrollmaßnahmen ebenso als Rettung in der Not wie das Magazin *[Forbes](https://web.archive.org/web/20200417064208/https://www.forbes.com/sites/simonchandler/2020/04/13/how-smart-cities-are-protecting-against-coronavirus-but-threatening-privacy/#5edf8d0c1cc3)* im April 2020:
> «Intelligente Städte können uns helfen, die Coronavirus-Pandemie zu bekämpfen. In einer wachsenden Zahl von Ländern tun die intelligenten Städte genau das. Regierungen und lokale Behörden nutzen Smart-City-Technologien, Sensoren und Daten, um die Kontakte von Menschen aufzuspüren, die mit dem Coronavirus infiziert sind. Gleichzeitig helfen die Smart Cities auch dabei, festzustellen, ob die Regeln der sozialen Distanzierung eingehalten werden.»
**Offensichtlich gibt es viele Aspekte zu bedenken und zu durchleuten,** wenn es um die Aufklärung und Aufarbeitung der sogenannten «Corona-Pandemie» und der verordneten [Maßnahmen](https://transition-news.org/stopptcovid-gutachten-von-lauterbach-erhalt-vernichtende-analyse) geht. Frustration und Desillusion sind angesichts der Realitäten absolut verständlich. Gerade deswegen sind Initiativen wie die von Jens Knipphals so bewundernswert und so wichtig – ebenso wie eine seiner Kernthesen: «Wir müssen aufeinander zugehen, da hilft alles nichts».
***
Dieser Beitrag ist zuerst auf ***[Transition News](https://transition-news.org/corona-aufarbeitung-in-der-praxis-eine-illusion)*** erschienen.
-
![](/static/nostr-icon-purple-64x64.png)
@ b83a28b7:35919450
2025-02-07 18:59:54
Avi Burra’s *24* is an ambitious and intricately woven narrative that blends mystery, philosophy, and technology into a modern odyssey. At its heart, the novel is a deeply personal story about grief, identity, and legacy, but it also serves as a meditation on the interplay between cryptography, art, and human connection. Burra’s debut novel is as much a puzzle as it is a journey of self-discovery, with its protagonist, Oliver Battolo, unraveling a twenty-four-word seed phrase left behind by his enigmatic father—a key to both a vast Bitcoin fortune and deeper truths about life.
---
### **The Plot: A Cryptographic Quest**
The novel begins with Oliver grappling with the death of his father, Nate Battolo. At Nate’s funeral, Oliver discovers a cryptic message instructing him to find twenty-four words. These words form the seed phrase to a Bitcoin wallet. Guided by Maren, a spiritual healer and family friend, Oliver learns “time projection,” a meditative technique that allows him to access symbolic memories and alternate realities. Through these projections and real-world encounters, Oliver uncovers the twenty-four words while unraveling his father’s hidden life as an early contributor to Bitcoin.
As the narrative progresses, Oliver uncovers shocking truths about his father’s role in the early days of Bitcoin. Alongside this technological intrigue are surrealist elements tied to Jonathan Bryce’s cryptographic paintings, which serve as both literal and metaphorical keys to unlocking Nate’s secrets.
---
### **Themes: A Philosophical Mosaic**
Burra masterfully interweaves several themes throughout *24*, including:
- **Grief and Legacy**: The novel explores how Oliver processes his father’s death while uncovering Nate’s hidden life. The journey forces him to reconcile his father’s flaws with his brilliance.
- **Identity and Reinvention**: From Nate’s transformation into “Nate Battolo” at Princeton to Oliver’s own self-discovery, the novel examines how identities are shaped by choices and circumstances.
- **Philosophy and Non-Duality**: The enigmatic Noncemeister—a surreal guide representing collective consciousness—teaches Oliver about interconnectedness and non-duality, echoing traditions like Advaita Vedanta and Zen Buddhism.
- **Cryptography Meets Art**: Jonathan Bryce’s paintings symbolize hidden knowledge waiting to be deciphered, blending surrealist aesthetics with cryptographic principles.
- **Moral Complexity**: The Bitcoin fortune represents both opportunity and burden, forcing Oliver to grapple with ethical dilemmas about wealth, surveillance, and personal responsibility.
---
### **Strengths**
Burra excels at creating a layered narrative that balances intellectual depth with emotional resonance. The philosophical musings of the Noncemeister are thought-provoking without being didactic, offering readers insights into non-duality and existentialism. The integration of cryptography into the plot is seamless; even readers unfamiliar with Bitcoin will find themselves intrigued by its implications for freedom and control. Additionally, the novel’s surrealist elements—particularly the time projection episodes—are vividly described and lend the story an otherworldly quality.
The relationship between Oliver and his father is particularly compelling. Through flashbacks and projections, Nate emerges as a complex figure—brilliant yet flawed—whose decisions ripple through Oliver’s life in unexpected ways. This emotional core grounds the novel amidst its more abstract explorations.
---
### **Weaknesses**
While *24* is undeniably ambitious, its complexity may alienate some readers. The dense philosophical passages—though rewarding for those who enjoy intellectual challenges—can feel overwhelming at times. Similarly, the technical details about Bitcoin and cryptography might be difficult for readers unfamiliar with these topics.
The ending leaves several threads unresolved, including the fate of two additional Bryce paintings hinted at in the epilogue. While this ambiguity adds to the novel’s mystique, it may frustrate readers seeking closure.
---
### **Conclusion**
*24* is a bold debut that defies easy categorization. Part mystery, part philosophical treatise, part technological exploration—it is a novel that challenges its readers while rewarding their patience. Avi Burra has crafted a story that is as much about finding twenty-four words as it is about finding oneself. With its intricate plot, rich themes, and memorable characters, *24* establishes Burra as a writer to watch.
For readers who enjoy intellectual puzzles wrapped in emotional depth—think Haruki Murakami meets Neal Stephenson—*24* is an unforgettable journey worth taking.
-
![](/static/nostr-icon-purple-64x64.png)
@ abab50be:430cd35d
2025-02-07 18:45:32
Setup up my NIP-05... Hoping this works!
originally posted at https://stacker.news/items/879027
-
![](/static/nostr-icon-purple-64x64.png)
@ 3b7fc823:e194354f
2025-02-07 18:42:31
### Privacy in Public Spaces: A Tactical Guide
#### 1. Public Wi-Fi Privacy
Using public Wi-Fi can be convenient, but it's important to take precautions to protect your privacy:
- **Use a VPN (Virtual Private Network)**: A VPN encrypts your internet traffic, making it difficult for hackers to intercept your data.
- **Disable Automatic Connections**: Prevent your device from automatically connecting to open Wi-Fi networks by turning off this feature in your settings.
- **Avoid Sensitive Transactions**: Refrain from accessing banking or other sensitive accounts while connected to public Wi-Fi.
- **Use Secure Websites**: Look for "https://" in the website's URL to ensure it uses encryption.
- **Keep Software Updated**: Ensure your device's operating system and apps are up-to-date to protect against security vulnerabilities.
#### 2. Surveillance Camera Awareness
Surveillance cameras are common in public spaces. Here are some strategies to maintain your privacy:
- **Spotting Cameras**:
- **Look for Signs**: Many establishments post signs indicating the presence of surveillance cameras.
- **Camera Placement**: Cameras are often placed near entrances, exits, and high-traffic areas. Look for dome-shaped cameras on ceilings or wall-mounted cameras.
- **Using Masks and Coverings**:
- **Face Masks**: Wearing a mask can help obscure your facial features from facial recognition systems.
- **Hats and Sunglasses**: A hat can shield your face from overhead cameras, while sunglasses can hide your eyes.
- **Covering Identifying Marks**:
- **Clothing Choices**: Wear clothing that doesn't have distinctive logos or patterns that can easily identify you.
- **Blend In**: Opt for styles and clothing choices that helps you blend in with your surroundings, reducing your visibility.
- **Temporary Coverings**: Consider using temporary coverings, such as scarves or hoods, to conceal tattoos or other identifying marks.
#### 3. General Privacy Tips in Public Spaces
- **Be Mindful of Your Surroundings**: Pay attention to your environment and be aware of any unusual behavior or devices that may be capturing your information.
- **Limit Personal Information**: Avoid discussing sensitive information in public where it can be overheard.
- **Use Encrypted Messaging Apps**: Apps like Signal or SimpleX offer end-to-end encryption for your messages, making it harder for eavesdroppers to intercept your conversations.
- **Use Privacy Screens**: Privacy screens on all of you electronic screens can defend against the over the shoulder peek or side eye.
- **Avoiding Behaviors**: Be mindful of behaviors that could make you a target, such as frequent visits to certain areas or engaging in conversations that might attract unwanted attention.
Taking these steps can help you maintain your privacy while navigating public spaces and using public Wi-Fi. Remember, staying informed and vigilant is key to protecting your personal information.
---
Advocating for privacy does not finance itself. If you enjoyed this article, please consider zapping or sending monero
82XCDNK1Js8TethhpGLFPbVyKe25DxMUePad1rUn9z7V6QdCzxHEE7varvVh1VUidUhHVSA4atNU2BTpSNJLC1BqSvDajw1
-
![](/static/nostr-icon-purple-64x64.png)
@ 9e5a3a1a:ed414e8d
2025-02-07 18:30:02
Notes from Huberman episode: https://www.youtube.com/watch?v=K-TW2Chpz4k
(Please watch the actual episode. These are my personal notes for myself that I took while watching it. Posting because they might be useful to tohers.)
Dopamine regulates: motivation, desire, pursuit, and pleasure. Also "pain" of lacking which is a quick drop of dopamine.
# Overview of how motivation and reward works
When you first have a craving for something your dopamine peaks in anticipation. This motivates you to go get it.
Right after the peak of anticipation, your dopamine drops below baseline, causing a "pain" of not having it. This motivates you to go get it even more.
When you finally get the thing, your dopamine either peaks (if the thing exceeded your expectation), drops below baseline (if the thing is disappointing), or just stays at baseline if it just met your expectation.
# Queues
We are always looking for queues as to whether or not we are on the right path toward the goal. We are setting a mindset as to whether or not we are confidant or pessimistic when it comes to achieving that goal.
Whenever we see a clue that we are on the right track toward the desire, the whole "anticipation (dopamine goes up) > (dopamine drops) as we feel the pain of not yet having the object of desire" cycle happens again.
There's a time delay between queue and getting (or failing) the reward. The queues that happen in between the initial desire and the end goal are added on to our reward prediction system. The queues indicate how likely or unlikely we are to receive the reward.
There are special circuits in the brain that learn how we achieve or don't achieve goals. "Reward Contingent Learning" (what lead up or didn't lead up to the reward)
Stimulus => peak
Motivation => drives you forward, pays attention to what happens along the way
Reward => peak or drop
Short gaps between stimulus and reward teach the system to expect short gaps. This is how addictions happen.
> The higher the dopamine peak and the faster it rises, the lower it drops below baseline afterwards. After it quickly drops below baseline, it takes longer to get back to the original baseline then it did prior. The peaks that are created from consumption of addictive thing leads to progressively lower peaks afterwards and deeper drops below baseline.
The drop below baseline triggers the desire for *more*.
Baseline can also be thought of as anything that raises your level of dopamine for more than one hour.
# Healthy baseline dopamine how to
* Enough sleep
* Non sleep deep rest
* Sunlight
* Movement, exercise
* Exposure of body (up to the neck at least) to cold water
* Nutrition: L-Tyrosine (an hour before important tasks and multi-tasking. Helps if you're fucked up because of stress) Also increases short working memory. Recommended dosage 500mg - 1g. Start w/ smallest dose 250mg-500mg (based on body weight). Pay attention if you experience a crash afterwards. Can act as a stimulant, so don't take late in the day.
# "Pain" and effort
"Pain" as in not a physical pain but emotional pain of lack that results from a sudden drop of dopamine (usually right after a peak).
How to get over the "pain":
* Wait with the understanding that it will get better. It can several days to replenish reserves of dopamine.
* Do something that is even more "painful" than the "pain" of procrastination.
>[!CAUTION]
>Rewarding someone for doing an activity they naturally enjoy actually makes you LESS likely to engage in this activity if the rewards go away.
>**Why:** The enjoyable activity followed by reward resulted in a bigger peak in dopamine which was followed by a bigger drop in dopamine.
## Motivation and Drive
Aim for effort becoming the reward in and of itself. Leverage both dopamine peaks AND drops to pull yourself out of **procrastination** quickly and become productive.
### Growth Mindset
Adopt the mindset that if you can't do something well, add a "yet" to it. (can't do it well yet)
When we expect ourselves to be able to perform well & we can't, that sets up a downward spiral of motivation because we are attached to the relationship between desire, motivation, and outcomes (reward prediction error: we expect a good result when starting to do something but get a bad one). This results in lack of motivation or depression.
### Overcoming Procrastination
* Do something that's harder, more effortful, or painful than being in that state, you will get out of it faster. This is NOT the tasks you do naturally wile procrastination (ex: clean the house, etc), because those tasks are actually EASIER than being in that state (based on how dopamine works)
* Force yourself to be even more uncomfortable. This will make your return to baseline dopamine faster.
* Ex: cold water bath. Something that is really uncomfortable (but not damaging)
* Do the thing for 3 minutes. This will pop you out of the dip in dopamine.
* It also teaches you that doing hard things is possible.
# Binding behaviors
Behaviors in which ppl bind their behavior around a particular addiction in space and/or time (ex: only engage in certain places or at a particular time)
# Takeaway
To increase motivation
* Try to find intrinsic reward of doing the task itself, rather than an external reward (during or after). Crave the hard work.
* Motivate yourself by looking for **evidence** that you are one small step closer to your goal and that reaching the goal is possible.
* If unmotivated & procrastinating: do something that feels even worse than sitting there procrastinating and doing nothing. (maybe literally do nothing like Dr. K suggests, instead of doing other tasks like doomscrolling or unrelated things)
#dopamine #motivation #procrastination #productivity
-
![](/static/nostr-icon-purple-64x64.png)
@ 2e8970de:63345c7a
2025-02-07 18:29:40
![](https://pbs.twimg.com/media/GjKcL-oWMAAtRtu?format=png&name=900x900)
> Continental influx and pervasive matrilocality in Iron Age Britain
https://www.nature.com/articles/s41586-024-08409-6
originally posted at https://stacker.news/items/878997
-
![](/static/nostr-icon-purple-64x64.png)
@ d57360cb:4fe7d935
2025-02-07 17:48:33
You exist at the central point of life. Everywhere you go, everywhere you are you’ll find yourself peering out through your eyes at the center of everything.
The center always stays the same, the contents that surround it are always moving and changing.
Yet we foolishly believe the things that surround us and continuously transform hold the answers to change.
Change comes from the center, from within. Then it affects all that comes within its path.
Take care of your center and it will change the world that surrounds it.
-
![](/static/nostr-icon-purple-64x64.png)
@ 0463223a:3b14d673
2025-02-07 17:20:27
Mental health is a funny old bag. As someone who’s been on various prescribed drugs for anxiety and depression for many years and is slowly weaning myself off (I’ve reduced my Venlafaxine dose by 1/6th. Next is the Pregabalin. One step at a time eh…) I’m not sure I fully understand normailty.
Yesterday I finally got my hands on a record I absolutely love. I had it on cassette for 34 years but never knew the title, I recorded it from Friends FM (London pirate radio station) back in 1991. I chanced upon the title after some random YouTube clicks. I was so happy to find out, it was the only song on the tape that had eluded me after all these years. I’d been watching it on Discogs for a while and finally found one at a nice price. Yay!
I’ve been lost in nostalgia all day. Lost friends have been on my mind.
My best friend as a kid was an interesting character, a fantastic artist. He was by far the best at drawing in my class at primary school, heavily influenced by M.C. Escher and artists I’d never heard of, he’d grown up in a more culturally expansive house than I. He was into fashion and design but we weren’t clever kids at school. We had a lot in common musically and I always thought he’d be my MC back when I was starting out as a DJ. He was a very creative person but also a total fantasist. As a duo he was the extraverted, outspoken one, I barely spoke a word and relied on him a lot socially. He was sectioned under the Mental Health Act at 20 years old. We lost touch.
Our birthday’s were within 1 day of each other and a third friend had his the day after mine. Our 16th birthdays fell on Friday, Saturday and Sunday. This was quite exciting. By midday on the Friday, he was permanently expelled from school. He’d taken acid in the morning and essentially enjoyed himself, running around and laughing a lot. The school didn’t approve, oh then his mother kicked him out of home. An eventful start to a messy weekend…
We took a lot of acid as kids and I’m not shitting you when I say he, in particular, took a LOT. When we were 16 he told the local gypsies that he score them some acid, 100 tabs to be exact, about £200 worth. Not a lot of money but acid has always been very good value for money. He secured the goods easily, his brother was in the business so to speak but he chose not to pass the goods on… Over the course of a month, with the exception of the ones he gave to his friends he took the whole lot. (Side note, it also meant the local gypsies were after us. That’s another story). None of us could keep up as far as acid was concerned.
Even as I’m writing I’m thinking of more funny incidents, like the time we were in a shop with umbrellas for sale. He picked one up, opened it and danced out the shop, stealing it in the most obnoxious, obvious way even and no one batted an eyelid. Funny as fuck at the time but not ideal behaviour… He was like that all the time. In today’s world he would have letters after his name for sure. Maybe not PhD or BSC but definitely ADHD and ASD.
This ties in with the period where I became pretty much non-verbal. I’ve written about my uncertainty of my autism diagnosis before and it’s hard to say if this period of not speaking was due to that or extreme anxiety growing up with an absent, alcoholic, father and being bullied etc. It’s certainly safe to say taking loads of acid probably didn’t help!
After many adventures, going to illegal raves, hustling to get DJ spots, trips in the woods, trips in bedrooms, trips pretty much everywhere, my friend became less and less stable. We fell out after he gave a bunch of my possessions to some random stranger at a rave. As kids we’d often swap clothes, jackets, shoes etc. It was one way of feeling like you had fresh clothes on a budget but giving my stuff away was the final straw. We fell out big time over that. The last time I saw him was in my early 20s. He looked like a ghost, a total shadow of a human. There was nothing there. Tragic. I seriously hope he’s well now. I’m long away from the people I grew up with, I might never find out. Thinking about you man.
Since then, I’ve had another 2 friends sectioned under the Mental Health Act, drugs, petty crime and an unstable home life does does fuckry to a young brain. I’ve also lost a couple of friends to crack and heroin. Not fun. Drugs are bad m’kay.
I’ve struggled with mental health my entire life, before drugs were an issue. Probably going back to 10 years old, at least as far as I can recall. Not that I want sympathy, far from it, I own my mistakes. I’m typing this shit on the internet because I want to and I want to honour lost friends. I own every single mistake. Maybe writing shit helps? Making music certainly does. It’s given me a sense of identity and I’m very lucky in what I do. Ironically I now work for a record label who’s motto is “Comforting the disturbed, disturbing the comfortable”. Very apt.
The drummer in my current band took his own life in 2014. That was fucking shit. He was a totally straight edge guy. Very talented musician. Suicide is fucking vile, I don’t have the words to describe what that does to those left behind. Just a couple of weeks earlier we’d been offered a record deal with an advance to make an album, we were also working with another very respected artist in his live band. Like wtf man. I still don’t get it. I don’t even want to say more out of respect for his family. RIP brother.
Nostr is a funny place, so many people I have very little in common with other than a dislike of banks (I hold the banksters responsible for the 2008 crash directly responsible for the death of my friend btw. I still say fuck each and every one of you. Cunts).
I often see folks refer to others as ‘normies’. From what I gather a normie is someone who didn’t grow up posting on 4Chan. The funny thing is these people are often the one’s saying work hard, raise a family etc. I mean come on, you go on about working hard, raising families and eating healthily. Fucking hell!!! Like that’s sort of normal, you know?
Tell me about sitting in a slum in south London with prostitutes, smoking crack thinking of ways you can get some money to score and then talk to me about ‘normies’. LMAO. For clarity, I didn’t have sex with them. I just wanted drugs and so did they. Nothing about this is glamorous by the way, it’s tragic and grim. I’m glad it’s not the norm.
If you’re that healthy, hardworking guy with a family calling people normies, respect to you, in all honestly I’m envious. I wish I’d grown up in a stable home with two parents and a dad who hooked me up working for a fund straight out of school. Normies! Fuck I’m still laughing about that one. The other one that cracks me up is plebs, again you worked at a fund and you talk about being a pleb. Funny fucker. Respect for your sense of humour though.
I’m not bitter (well not fully). I read the posts with interest and I’m always trying to learn new stuff, I’m happiest when learning. Learning is good for you. Fact.
It’s a thoroughly miserable day here as write this, icey cold, grey and very windy, this is still the happiest I’ve been in life. I now have a wonderful, beautiful wife. No kids but with my background, I’ve decided these genes are best left here. There’s some sadness about that too but it could be worse, I might be the type to think Peter Thiel is cool.
This probably reads like a right whinney thread but it isn’t. I’m excited about the future. I know some very talented people and I think we can do amazing things. Each day is a new opportunity. Being part of the underground internet is cool. We need free and open tools more than ever. The world is possibly the most fucked up it’s been in many years but also maybe that’s an illusion. I’m the last person you should ask about reality tbh.
Anyway, that’s it for today. This probably reads like a confused mess and a nightmare for anyone who digs grammar but that’s cool, I’m writing without using AI or a filter, it’s not a work email. I’m typing as the words appear in my head, this is who I am.
I’m a normie…
-
![](/static/nostr-icon-purple-64x64.png)
@ 2516d145:070c8fa1
2025-02-07 16:49:20
*„Ein Mensch. Ein Wort.“*, steht auf den Plakaten der Grünen zur Bundestagswahl 2025. Mich erinnert das an den Beginn des Johannesevangeliums: *„Im Anfang war das Wort … Und das Wort ist Fleisch geworden …“* In diesen Tagen scheinen Heiligenverehrung und Teufelsaustreibung so virulent zu sein, wie im Mittelalter. Menschen müssen die richtigen Worte verwenden. Wahre Worte aus falschem Mund verklingen oftmals ungehört.
Die [Sachbücher](https://www.masselverlag.de/Sachbuecher/) des massel Verlags sind mehr als bloße Hirngespinste, sie gründen in gelebter Wirklichkeit. Texte unserer Autoren werden nicht glattgeschliffen und marktkonform gebeugt, sondern sie behalten ihre Macken und Zacken. [Linus](https://www.masselverlag.de/Programm/Gefangen-in-einer-Welt-voller-Widersinn/) war im Gefängnis eingesperrt und [Bastian](https://www.masselverlag.de/Programm/Auf-Spurensuche-nach-Natuerlichkeit/) hat ein Jahr in der Wildnis frei gelebt. [Eva](https://www.masselverlag.de/Programm/War-da-was/) ist mit dem Volk Gottes durch die Wüste gewandert und [Insa](https://www.masselverlag.de/Programm/Hauptsache-Sex-zusammen/) hat ihr Glück nicht nur, aber auch im Sex gefunden. [Walter](https://www.masselverlag.de/The-Great-WeSet/Alternativen-in-Medien-und-Recht/) hat Ausgrenzung durch die Medien am eigenen Leib erfahren und [Ulrich](https://www.masselverlag.de/The-Great-WeSet/Wirtschaft-und-Finanzen-neu-gedacht/) ist eingetaucht in die vielfältigen, menschlichen Alternativen zu unserem Wirtschafts- und Finanzsystem.
***
![1.00](https://www.masselverlag.de/files/images/newsletter/feb25/BigPinkHeart.jpg "Valentinstagskarte von etwa 1910 (© Wikipedia)")
**Am 14. Februar ist Valentinstag!**
Das Brauchtum dieses Tages geht auf das Fest des Heiligen Valentinus zurück. Der Legende nach traute der heilige Valentin von Rom Soldaten, denen das Heiraten eigentlich verboten war. In der Antike wurde um den 13. bis 15. Februar in Rom ein Fruchtbarkeitsritus gefeiert. Einen Beleg für eine Verbindung zwischen dem Fest der Lupercalien und dem Valentinstag gibt es nicht. Es gibt jedoch Hinweise, dass die Leidensgeschichte des Heiligen und sogar dessen Existenz erfunden wurde. Allgemein bekannt wurde der Valentinstag durch die vor dem 14. Februar verstärkt einsetzende Werbung der Floristik- und Süßwarenindustrie.
Blumen oder Schokolade verschenken? Ehepaare im Gottesdienst segnen? Der romantischen Liebe huldigen? Wir empfehlen Ihnen das etwas andere Geschenk!
![1.00](https://www.masselverlag.de/files/images/newsletter/feb25/Hauptsache-Sex-zusammen.jpg)
**Hauptsache Sex zusammen?** von Insa Tiabilis\
Ein [Inspirationsbuch](https://www.masselverlag.de/Programm/Hauptsache-Sex-zusammen/) über Sex in langen Beziehungen
Die Autorin sagt über sich: *„Ich habe ein abgebrochenes Studium der Psychologie, drei abgeschlossene Kinder, und einen mir selbst verliehenen ‚Master‘ im Eheretten vorzuweisen. Das Leben hat mich qualifiziert und um einige wunderbare Erfahrungen reicher gemacht, an denen ich andere Menschen teilhaben lassen möchte. Ich habe mich glücklich gemacht. Nicht nur, aber auch mit Sex.“*
***
**Quellen erforschen und verstehen**
Wie beim Valentinstag ist eine Umdeutung des Sex durch Kirche, Industrie und Machthabenden wahrscheinlich. Der Mensch wurde bewusst seiner Natur entfremdet. Oder hat die Kultur ihn zu etwas Höherem befreit?
Diese beiden Pole gilt es auszuhalten und zu entdecken. Siehe Kinderbuch weiter unten. Auch in der Sprachreise von [Gerald Ehegartner](https://www.masselverlag.de/Programm/Ausgegendert-Eine-investigative-Reise-zu-den-Quellen-der-deutschen-Sprache/) geht es um Umdeutung. Ist das generische Maskulinum Ausdruck einer patriarchalen Gesellschaft? Oder hat die deutsche Sprache aus anderen Quellen ihre Grammatik gespeist?
![1.00](https://route96.pareto.space/8190b8aea14258e44f593143848c5050387f7f711333ac88a213670235254106.webp)
> Gerald Hüther, Neurobiologe und Bestsellerautor: *„Dieses Buch von Gerald Ehegartner ist eine messerscharfe und scharfzüngige Analyse unserer gegenwärtigen Sprachverwicklungen und gleichzeitig eine warmherzige und berührende Liebeserklärung an unsere deutsche Muttersprache.“*
***
**Was und wo ist Heimat?**
Der kleine Pinguin Timpetaa, verlässt seine gewohnte Umgebung im Süden, macht sich auf, die Welt zu entdecken und trifft dort auf Fremde. Das Unbekannte, in Timpetaas Fall der Nordpol mit den vielen Eisbären, welche ihn unter „normalen“ Umständen wahrscheinlich gleich verschlingen würden, kann auch zur Heimat werden. Auf alle Fälle üben die zotteligen Viecher am Nordpol unserem kleinen Weltreisenden gegenüber große Toleranz. Sie kümmern sich vielmehr rührend um ihn, nehmen ihn wohlwollend in ihrer Gemeinschaft auf, ziehen ihn groß und lernen ihm das Jagen, auch wenn Fisch nach wie vor zu seiner Leibspeise gehört. Am allerliebsten jagt der kleine Pinguin allerdings Herzen …
Der Autor Matthias A. Weiss möchte mit seinem Kinderbuch Kindern das Leben als zu entdeckendes Gut vermitteln, sie auf den Wert der Umwelt und ein friedvolles Miteinander aufmerksam machen. Nicht zuletzt sollen Kinder ermutigt werden, in die Welt hinauszugehen und eigene Erfahrungen zu sammeln.
![1.00](https://route96.pareto.space/0711ef926918ed9c39ab9d2a8b74b2e188f0105c27b27e47580f2981b033befa.webp)
***
### **Veranstaltungen**
Im März stehen wieder einige Veranstaltungen des massel Verlags an. Wir freuen uns sehr, wenn wir uns bei dem ein oder anderen Ereignis begegnen würden. Aller Termine finden Sie [auf unserer Website](https://www.masselverlag.de/).
**15. - 23. März 2025**\
Bücherschau junior im Forum der Zukunft, Deutsches Museum - Museumsinsel\
In der Ausstellung: Timpetaa von Matthias A. Weiss
**15. März 2025**, 10 - 13:00 Uhr\
Stemmerhof, Plinganserstraße 6, 81369 München\
Büchermesse: Unabhängige Kleinverlage
und 14:00 Uhr\
Lesung: Timpetaa mit Matthias A. Weiss
**22. März 2025**, 18:30 Uhr\
Verlagshaus, Am Harras 14, 81373 München\
Lesung: Der Super-Faschismus mit Lisa-Maire Binder
**27. - 30. März 2025**\
Leipziger Buchmesse\
Vereinbaren Sie einen Termin mit Verleger Martin Sell
[![Timpetaa – Ein Pinguin am Nordpol](https://www.masselverlag.de/files/images/newsletter/feb25/herzen.jpg "Timpetaa – Ein Pinguin am Nordpol")](https://www.masselverlag.de/Programm/Timpetaa-Ein-Pinguin-am-Nordpol/)
Wir wünschen Ihnen einen blühenden Valentinstag, süße Begegnungen und offene Herzen, die Ihnen zufliegen mögen.
Ihr massel Team\
Martin & Julia
-
![](/static/nostr-icon-purple-64x64.png)
@ 1cb14ab3:95d52462
2025-02-07 16:41:54
***Tree branches, driftwood coconut. 5'7" teardrop. [Dawei, Myanmar. 2020]***
---
#### Introduction
Situated on Myanmar’s Grandfather Beach, this lens captures the dramatic shape of a steep, rocky hill that mirrors the arduous road leading to this remote location. Grandfather invites viewers to reflect on the connection between journey and destination, highlighting the tension and beauty of paths less traveled.
#### Site & Placement
The lens is positioned at the west end of the beach, focusing on the sharp hill rising above the shoreline. Its teardrop shape accentuates the rocky prominence, emphasizing its similarity to the road that winds toward the beach. A bench, placed 12 feet away, provides a place for viewers to absorb the rugged beauty of the scene.
#### Impermanence & Integration
Crafted from driftwood, branches, and stone, Grandfather is a fleeting presence in this timeless landscape. Its brief existence reflects the challenges and ephemerality of the journey it highlights, blending into the environment as it gradually succumbs to the elements.
#### Reflection
*Grandfather* invites viewers to consider the parallels between the physical journey to reach the beach and life’s broader paths. It stands as a reminder that even the most challenging routes can lead to moments of profound beauty.
---
## Photos
![image](https://image.nostr.build/0403f2c40384cbc449a421fe3e37374fb4e0338b9ceee90b7423c75abdc57a6a.jpg)
![image](https://image.nostr.build/1d56bf254db02f9efe06383c8ef6c5ffc3377f533cf69ffe3ee045dfe6dfe193.jpg)
![image](https://image.nostr.build/c18cfab25084ddbab01b7f92e6f0db33a03cd4068817c998e24c660a5f35c4de.jpg)
![image](https://image.nostr.build/af1edbe0b3a680fd02c71bc9802d80e2bbaf6f199f5af0b996bcd8d926c535f2.jpg)
![image](https://image.nostr.build/79a19704a8fc1174a2a9c393cb6029a2522387c6dd59c174f456669d42456663.jpg)
![image](https://image.nostr.build/d7b4cd5625e9d3fe7aec69bc707ccc7f20485b31e32a64943739ed4668670ad6.jpg)
![image](https://image.nostr.build/524a94fb8e2b1c977970f69cca6dd8b442a30fd6fdfcd41f37b06d1ac3923927.jpg)
![image](https://image.nostr.build/4442fb880f7f9da6f02144f361626b74744d3584804bc4e85623eeb8f425ea7f.jpg)
---
#### More from the 'Earth Lens' Series:
[Earth Lens Series: Artist Statement + List of Works](https://hes.npub.pro/post/1731091744332/)
["Looking Glass" (Earth Lens 001)](https://hes.npub.pro/post/1736304563962/)
["Folsom" (Earth Lens 002)](https://hes.npub.pro/post/1737844073125/)
["Sanctuary" (Earth Lens 003)](https://hes.npub.pro/post/1731091744332/)
["Platte" (Earth Lens 004)](https://hes.npub.pro/post/sya8nv6q8k0w3olqcepwz)
[COMING SOON: "Chongming" (Earth Lens 006)](https://hes.npub.pro/post/1731091744332/)
---
#### More from Hes
[Portfolio](https://hesart.npub.pro)
[Online Store](https://plebeian.market/community/hes@nostrplebs.com/hesmart-ym3fcufdfz)
[Artist Statements](https://hes.npub.pro/tag/art/)
[Travel Guides](https://hes.npub.pro/tag/travel/)
[Photography](https://hes.npub.pro/tag/photography)
[Money](https://hes.npub.pro/tag/money)
[Tech](https://hes.npub.pro/tag/tech)
---
*All images are credit of Hes, but you are free to download and use for any purpose. If you find joy from my art, please feel free to send a zap. Enjoy life on a Bitcoin standard.*
-
![](/static/nostr-icon-purple-64x64.png)
@ f57bac88:6045161e
2025-02-07 16:23:37
## **۱. ایران پیش از هخامنشیان**
پیش از ظهور **کوروش بزرگ** و تأسیس امپراتوری هخامنشی، سرزمین ایران تحت حکومت چندین تمدن و دودمان مهم قرار داشت:
### **ایلامیان (حدود ۳۰۰۰–۶۴۰ پیش از میلاد)**
- **قلمرو:** جنوب غربی ایران (خوزستان امروزی)
- **دستاوردها:**
- ایجاد یکی از نخستین دولتهای متمرکز در منطقه
- توسعه خط نوشتاری ایلامی
- جنگهای طولانی با بابل و آشور
- در سال **۶۴۰ ق.م**، ایلام توسط **آشوربانیپال**، شاه آشور، فتح و ضعیف شد.
### **مادها (حدود ۷۰۰–۵۵۰ پیش از میلاد)**
- **بنیانگذار:** دیاکو (۷۰۹–۶۵۶ ق.م)
- **شاهان مهم:**
- **فرورتیش:** مقابله با آشوریان و توسعه قلمرو ماد
- **هووخشتره:** شکست آشور و گسترش قدرت مادها
- **ایشتوویگو:** آخرین پادشاه ماد که توسط **کوروش بزرگ** شکست خورد
- **دستاوردها:**
- نخستین ارتش منظم در تاریخ ایران
- اتحاد قبایل ایرانی و پایهگذاری حکومت متمرکز
### **خاندان هخامنشی پیش از کوروش**
- **هخامنش:** بنیانگذار دودمان هخامنشی (حدود ۷۰۰ ق.م)
- **چیشپیش:** حاکم آنشان
- **کمبوجیه یکم:** پدر کوروش بزرگ
کوروش بزرگ با شکست دادن مادها، نخستین امپراتوری بزرگ ایران را بنیان نهاد.
---
## **۲. هخامنشیان (۵۵۰–۳۳۰ پیش از میلاد)**
### **کوروش بزرگ؛ بنیانگذار نخستین امپراتوری ایرانی**
- **قلمرو:** از آسیای مرکزی تا مدیترانه و مصر.
- **دستاوردها:**
- **تأسیس امپراتوری هخامنشی**؛ نخستین امپراتوری چندملیتی تاریخ.
- **صدور منشور حقوق بشر (استوانه کوروش).**
- **فتح بابل و آزادی یهودیان.**
- **ایجاد سیستم حکومتی مبتنی بر احترام به فرهنگها و ادیان مختلف.**
- **ایجاد جادههای ارتباطی برای تسهیل تجارت و حملونقل.**
### **داریوش بزرگ (۵۲۲–۴۸۶ ق.م)**
- **گسترش امپراتوری و ایجاد نظام اداری پیشرفته.**
- **ساخت تخت جمشید.**
- **ایجاد راه شاهی برای ارتباط بهتر میان ایالتها.**
- **ایجاد سیستم مالی و ضرب نخستین سکه ایرانی.**
### **خشایارشا (۴۸۶–۴۶۵ ق.م)**
- **نبردهای مهم با یونانیان، از جمله جنگ سالامیس.**
- **تکمیل تخت جمشید و گسترش معماری هخامنشی.**
### **پایان هخامنشیان**
- داریوش سوم در برابر اسکندر مقدونی شکست خورد و امپراتوری سقوط کرد.
---
## **۳. اشکانیان (۲۴۷ پیش از میلاد–۲۲۴ میلادی)**
- **بنیانگذار:** ارشک اول.
- **دستاوردها:**
- مقابله با امپراتوری روم.
- ایجاد نظام حکومتی نیمهمتمرکز.
- گسترش تجارت از طریق جاده ابریشم.
---
## **۴. ساسانیان (۲۲۴–۶۵۱ میلادی)**
### **شاپور اول (۲۴۱–۲۷۲ م)**
- شکست دادن امپراتور روم (والرین).
- توسعه علمی و فرهنگی.
### **انوشیروان دادگر (۵۳۱–۵۷۹ م)**
- اصلاحات مالی و اداری.
- ترویج علم و فلسفه.
### **یزدگرد سوم (۶۳۲–۶۵۱ م)**
- آخرین شاه ساسانی، شکست در برابر حمله اعراب مسلمان.
---
## **۵. سلسلههای محلی و اسلامی**
- **سامانیان، آلبویه، سلجوقیان** نقش مهمی در حفظ فرهنگ ایرانی داشتند.
---
## **۶. صفویان (۱۵۰۱–۱۷۳۶ میلادی)**
- **شاه اسماعیل صفوی:** رسمی کردن مذهب تشیع.
- **شاه عباس بزرگ:** توسعه اقتصادی، رونق اصفهان، اصلاحات نظامی.
---
## **۷. افشاریان (۱۷۳۶–۱۷۹۶ میلادی)**
- **نادرشاه افشار:** شکست امپراتوری مغول هند، بازپسگیری خراسان.
---
## **۸. زندیان (۱۷۵۱–۱۷۹۴ میلادی)**
- **کریمخان زند:** صلح و توسعه اقتصادی، ساخت بازار وکیل شیراز.
---
## **۹. قاجاریان (۱۷۹۶–۱۹۲۵ میلادی)**
- **آغامحمدخان قاجار:** تأسیس حکومت قاجار.
- **اصلاحات امیرکبیر، جنگهای ایران و روس، انقلاب مشروطه.**
---
## **۱۰. پهلوی (۱۹۲۵–۱۹۷۹ میلادی)**
### **رضاشاه (۱۹۲۵–۱۹۴۱)**
- **نوسازی ایران، توسعه آموزش، ایجاد راهآهن سراسری.**
- **تأسیس دانشگاه تهران و مدرنسازی نظام اداری.**
- **حذف القاب سنتی و ارتقای جایگاه زنان در جامعه.**
### **محمدرضا شاه (۱۹۴۱–۱۹۷۹)**
- **انقلاب سفید و اصلاحات ارضی.**
- **افزایش درآمد نفتی و توسعه صنعتی ایران.**
- **ایجاد زیرساختهای اقتصادی مدرن.**
- **برگزاری جشنهای ۲۵۰۰ ساله شاهنشاهی.**
---
## **جمعبندی**
ایران در طول تاریخ شاهد حکومتهای متعددی بوده که هر کدام در توسعه فرهنگی، اقتصادی و نظامی کشور نقش داشتهاند.
-
![](/static/nostr-icon-purple-64x64.png)
@ f57bac88:6045161e
2025-02-07 16:22:07
#### ۱. دوران پالئولیتیک (عصر حجر قدیم)
دوران پالئولیتیک یا عصر سنگ قدیم، اولین دوره از تاریخ بشری است که به زمانی برمیگردد که انسانها هنوز بهطور عمده در زندگی شکارچی-گردآورنده بودند و ابزارهای ابتدایی سنگی را برای تأمین غذا و سایر نیازهای خود استفاده میکردند. این دوران بیش از ۲٫۵ میلیون سال به طول انجامید و انسانها در آن زندگی سخت و متکی به شکار و گردآوری میوهها و گیاهان داشتند. در ایران، این دوره بیشتر در مناطق غربی و مرکزی کشور شواهدی از سکونت انسانهای اولیه بهجا گذاشته است.
مناطقی مانند **غارهای میرعماد در لرستان** و **غار شوش** در جنوب غرب ایران، از مکانهای مهم این دوران هستند که نشاندهنده حضور انسانهای نئاندرتال و هوموساپینس در این منطقه هستند. ابزارهای سنگی کشفشده از این مکانها، نشاندهنده استفاده انسانهای اولیه از سنگها برای ساخت چاقوها، تیغهها و ابزارهای مختلف برای شکار و جمعآوری غذا بوده است. در این دوران، انسانها همچنان در گروههای کوچک زندگی میکردند و عمدتاً بهصورت پراکنده در مناطق مختلف سکونت داشتند.
#### ۲. دوران نوسنگی (Neolithic)
دوران نوسنگی، که آغاز آن به حدود ۱۰,۰۰۰ سال پیش بازمیگردد، بهعنوان یکی از تحولات اساسی تاریخ بشری شناخته میشود. در این دوره، انسانها به تدریج از زندگی شکارگری به کشاورزی و دامداری روی آوردند. این تغییر، نه تنها در سبک زندگی بشر، بلکه در ساختارهای اجتماعی، اقتصادی و فرهنگی جوامع نیز انقلابی بزرگ ایجاد کرد. انسانها برای اولین بار گیاهان را کشت و از آنها برای تأمین غذا استفاده کردند و همچنین دامها را اهلی کردند.
در ایران، از جمله مهمترین مکانهایی که نشاندهنده آغاز کشاورزی و زندگی روستایی است میتوان به **چغاگلان** در کردستان اشاره کرد. این منطقه یکی از اولین محوطههای باستانی است که شواهدی از کشاورزی اولیه در آن پیدا شده است. همچنین **تل برآفتاب** در کرمانشاه و **تل هندیجان** در جنوب غرب ایران نیز از دیگر سایتهای مهم نوسنگی هستند که شواهدی از نخستین جوامع کشاورزی و دامداری در آنها بهدست آمده است.
زندگی در این دوران بهطور عمده در روستاهای کوچک متمرکز بود و مردم در کنار کشاورزی و دامداری، بهصورت ابتدایی صنایع دستی نیز تولید میکردند. این دوره شروعی برای روابط تجاری و فرهنگی میان جوامع مختلف بود که به تدریج پیچیدگیهای بیشتری پیدا کرد.
#### ۳. دوران مس و سنگ (Chalcolithic)
دوران مس و سنگ که به آن **دوران چالهکولیتیک** نیز گفته میشود، مرحلهای میان دوران نوسنگی و مفرغ است که حدود ۵,۰۰۰ سال پیش آغاز شد. در این دوران، انسانها از فلزات، بهویژه مس، استفاده کردند و ابزارهایی ساختند که در کنار ابزارهای سنگی قرار میگرفت. این دوره، بهویژه بهعنوان دوران گذار از عصر سنگ به عصر مفرغ شناخته میشود.
یکی از مهمترین ویژگیهای این دوران، استفاده اولیه از فلزات است که امکان ساخت ابزارهایی با دقت و کارایی بالاتر را فراهم کرد. در کنار کشاورزی و دامداری، تجارت و ارتباطات میان جوامع مختلف شروع به گسترش کرد و باعث تبادل کالاها و ایدهها بین مناطق مختلف شد. از مهمترین محوطههای باستانی این دوره میتوان به **تپه سیلک** در کاشان اشاره کرد که در آن آثار بسیاری از زندگی کشاورزی، صنایع دستی و حتی شواهدی از ساختوسازهای ابتدایی پیدا شده است.
**تپه نوشیجان** در همدان نیز یکی دیگر از سایتهای مهم این دوران است که در آن آثار مس و ابزارهای فلزی کشف شده است. این آثار نشاندهنده توسعه فنون فلزکاری و استفاده از مس برای ساخت ابزارهای پیچیدهتر در این دوره است.
#### ۴. دوران مفرغ (Bronze Age)
دوران مفرغ، که از حدود ۳۰۰۰ سال پیش از میلاد آغاز شد، یکی از مهمترین دورانها در تاریخ بشری است. در این دوره، استفاده از فلز مفرغ برای ساخت ابزار، سلاحها و اشیاء تزئینی گسترش یافت. دوران مفرغ نهتنها از نظر تکنولوژیکی بلکه از نظر فرهنگی و اجتماعی نیز اهمیت زیادی دارد، زیرا در این دوره جوامع انسانی پیچیدگیهای بیشتری پیدا کرده و بهتدریج به تمدنهای بزرگتری تبدیل شدند.
ایران در دوران مفرغ شاهد شکلگیری تمدنهای اولیهای همچون ایلامیان بود. این تمدنها در جنوب غربی ایران (مناطق کنونی استان خوزستان و استان ایلام) و در نواحی شمال غرب کشور ریشه دوانیدند. در این دوران، ساختارهای سیاسی و اجتماعی پیچیدهتر شد و نشانههای اولیه از شکلگیری دولتهای شهری و پیشرفتهتر بهوجود آمد.
یکی از مهمترین سایتهای باستانی این دوره، **تپه حسنلو** در آذربایجان غربی است که شواهدی از یک تمدن پیشرفته با استفاده از مفرغ در آن پیدا شده است. این تپه که بهعنوان یکی از مهمترین محوطههای باستانی شناخته میشود، آثار مختلفی از جمله سلاحها، ابزارها و مصنوعات هنری از دوران مفرغ را در خود جای داده است. همچنین، **تپه سفالی** در جنوب غرب ایران نیز نشاندهنده روند پیشرفت در استفاده از مفرغ و تغییرات فرهنگی در این دوره است.
در این زمان، جوامع انسانی بهطور گستردهتری در زمینههای کشاورزی، تجارت، فنون ساختوساز و هنرهای تزئینی فعالیت میکردند. استفاده از مفرغ نهتنها به ارتقاء صنعت و فنون مرتبط با آن کمک کرد، بلکه زمینه را برای ظهور تمدنهای بزرگتر مانند ایلامیان فراهم آورد.
#### نتیجهگیری
تاریخ باستانی ایران گواهی است بر تکامل انسانها از دورههای ابتدایی شکارگری و گردآوری به جوامع پیچیدهتر کشاورزی، دامداری و تولید صنایع دستی و فلزی. این تحولات از دوران پالئولیتیک تا دوران مفرغ باعث شد تا ایران به یکی از کانونهای مهم تمدنسازی در تاریخ بشری تبدیل شود. پیشرفتهای تکنولوژیکی، ساختارهای اجتماعی پیچیدهتر و گسترش ارتباطات تجاری و فرهنگی در این دورهها، زمینهساز ظهور تمدنهای بزرگ و پیچیدهای مانند ایلامیان، هخامنشیان و ساسانیان شد که در تاریخ ایران و جهان نقش مهمی ایفا کردند.
این تاریخچه در کنار آثار باستانی که از این دوران بهجا مانده است، همچنان دلیلی برای عظمت و شکوه تمدن ایران در تاریخ بشر است.
-
![](/static/nostr-icon-purple-64x64.png)
@ a012dc82:6458a70d
2025-02-07 15:23:54
In the intricate and rapidly evolving world of digital currencies, the interplay between Bitcoin and the US dollar, particularly through the medium of stablecoins, stands out as a subject of profound significance. Mark Goodwin, a renowned figure in the realm of Bitcoin and an advocate for decentralized financial systems, sheds light on this complex dynamic. This article delves deeper into the nuanced relationship between Bitcoin and the dollar, the pivotal role of stablecoins, and the risks they entail, drawing upon the extensive expertise of Goodwin.
**Table Of Content**
- Understanding the Bitcoin-Dollar Symbiosis
- The Role of Stablecoins
- Mark Goodwin's Perspective on Stablecoins
- Conclusion
- FAQs
**Understanding the Bitcoin-Dollar Symbiosis**
The relationship between Bitcoin and the US dollar is a fascinating study in contrasts and interdependencies. Bitcoin, known for its decentralized nature, offers a politically neutral platform but is characterized by significant price volatility. This volatility stands in stark contrast to the relative stability of the US dollar, a currency backed by the full faith and credit of the US government. The dollar, often used as a benchmark for Bitcoin's value, follows its trajectory in many ways, particularly in regions where Bitcoin is gaining traction.
The symbiosis between Bitcoin and the dollar is particularly evident in the context of global financial instability. In regions with volatile local currencies, the adoption of Bitcoin often leads to a parallel increase in the use of dollar-based stablecoins. This phenomenon suggests that Bitcoin's growth could inadvertently bolster the stability and global reach of the US dollar.
Moreover, the Bitcoin-dollar dynamic is not just limited to direct financial transactions. It extends to the broader implications for monetary policy, international trade, and global economic stability. As Bitcoin continues to gain acceptance, it challenges traditional financial systems and currencies, including the dollar, prompting a reevaluation of their roles in a digital age.
**The Role of Stablecoins**
Stablecoins, designed to bridge the gap between traditional finance and the digital asset space, play a crucial role in this relationship. By pegging their value to stable assets like the US dollar, they offer a less volatile alternative to cryptocurrencies like Bitcoin. This stability is essential for global commerce, enabling near-instantaneous transactions with lower fees compared to traditional banking systems.
In economies plagued by inflation, stablecoins offer a haven for individuals and businesses to preserve their wealth. They provide a degree of financial stability and predictability that is often lacking in local currencies. This aspect of stablecoins is particularly appealing in developing countries, where currency instability can be a significant barrier to economic growth and stability.
Furthermore, stablecoins are increasingly being seen as a tool for financial inclusion. They offer an accessible entry point for individuals who are unbanked or underbanked, providing them with a means to participate in the global economy. This potential for social impact adds another layer of significance to the role of stablecoins in the financial ecosystem.
**Mark Goodwin's Perspective on Stablecoins**
Mark Goodwin, with his deep understanding of Bitcoin and its implications for the financial world, offers a critical perspective on stablecoins. He acknowledges their potential benefits but also highlights the risks associated with their use.
**Price Stability Concerns**
Goodwin points out that while stablecoins aim to maintain a stable value, there are inherent risks in keeping their peg to the underlying asset. Market conditions, liquidity issues, and redemption pressures can all threaten the stability of stablecoins. If these risks are not adequately managed, it can lead to a deviation from the peg and a potential loss of trust from users.
**Regulatory Challenges**
The evolving regulatory landscape surrounding stablecoins is another area of concern. As authorities worldwide grapple with how to regulate these digital assets, stablecoin projects must navigate a complex web of financial regulations to achieve long-term viability. Goodwin emphasizes the need for a balanced regulatory approach that ensures consumer protection without stifling innovation.
**Potential for Market Manipulation**
Given their substantial market capitalization, stablecoins are susceptible to market manipulation. The limited oversight in the rapidly expanding cryptocurrency space amplifies this risk. Goodwin advocates for enhanced transparency and regulatory frameworks to mitigate these risks and ensure market integrity.
**Conclusion**
The relationship between Bitcoin and the dollar, especially through the medium of stablecoins, represents a delicate balance between the ideals of decentralization and the practicalities of financial stability. While stablecoins offer promising solutions for global financial transactions, they come with inherent risks that require careful consideration. Goodwin's insights underscore the importance of vigilance and a thoughtful approach to integrating these digital assets into the broader financial system. As the market continues to evolve, the role of stablecoins in shaping the future of finance remains a critical area for exploration and debate.
**FAQs**
**How do stablecoins fit into the Bitcoin-dollar dynamic?**
Stablecoins serve as a bridge between traditional finance and digital assets. Pegged to stable assets like the US dollar, they offer a less volatile alternative to cryptocurrencies and facilitate global commerce with near-instant transactions and lower fees.
**What are the risks associated with stablecoins?**
Risks include challenges in maintaining the peg to the underlying asset, regulatory uncertainties, and potential for market manipulation. These risks can threaten the stability and trust in stablecoins.
**What is Mark Goodwin's perspective on stablecoins?**
Mark Goodwin acknowledges the benefits of stablecoins but warns about the risks of centralization and manipulation. He emphasizes the need for balanced regulation and transparency to mitigate risks.
**Can stablecoins promote financial inclusion?**
Yes, stablecoins can provide financial inclusion by offering an accessible entry point for unbanked or underbanked individuals, allowing them to participate in the global economy.
**How does Bitcoin's growth affect the US dollar?**
Bitcoin's growth, particularly in regions with unstable currencies, can lead to increased adoption of dollar-based stablecoins, potentially bolstering the US dollar's global reach and stability.
**That's all for today**
**If you want more, be sure to follow us on:**
**NOSTR: croxroad@getalby.com**
**X: [@croxroadnews.co](https://x.com/croxroadnewsco)**
**Instagram: [@croxroadnews.co](https://www.instagram.com/croxroadnews.co/)**
**Youtube: [@croxroadnews](https://www.youtube.com/@croxroadnews)**
**Store: https://croxroad.store**
**Subscribe to CROX ROAD Bitcoin Only Daily Newsletter**
**https://www.croxroad.co/subscribe**
***DISCLAIMER: None of this is financial advice. This newsletter is strictly educational and is not investment advice or a solicitation to buy or sell any assets or to make any financial decisions. Please be careful and do your own research.***
-
![](/static/nostr-icon-purple-64x64.png)
@ f683e870:557f5ef2
2025-02-07 14:33:31
After many months of ideation, research, and heads-down building, <span data-type="mention" data-id="726a1e261cc6474674e8285e3951b3bb139be9a773d1acf49dc868db861a1c11" data-label="nostr:npub1wf4pufsucer5va8g9p0rj5dnhvfeh6d8w0g6eayaep5dhps6rsgs43dgh9">@nostr:npub1wf4pufsucer5va8g9p0rj5dnhvfeh6d8w0g6eayaep5dhps6rsgs43dgh9</span> and myself are excited to announce our new project called Vertex.
**Vertex’s mission is to provide developers and builders with the most up-to-date and easy-to-use social graph tools**.
Our services will enable our future customers to improve the experience they provide by offering:
- Protection against **impersonation** and **DoS attacks**
- Personalized **discovery** and **recommendations**.
All in an open, transparent and interoperable way.
## Open and Interoperable
We have structured our services as [NIP-90 Data Vending Machines](https://github.com/nostr-protocol/nips/blob/master/90.md). We are currently using [these DVMs](https://vertexlab.io/docs/nips) and we are eager to hear what the community thinks and if anyone has suggestions for improvements.
Regardless of their specific structures, using DVMs means one very important thing: **no vendor lock-in**.
Anyone can start processing the same requests and compete with us to offer the most accurate results at the best price. This is very important for us because we are well aware that services like ours can potentially become a central point of failure. The ease with which we can be replaced by a competitor will keep us on our toes and will continue to motivate us to build better and better experiences for our customers, all while operating in an ethical and open manner.
Speaking of openness, we have released **all of our code under the [MIT license](https://spdx.org/licenses/MIT.html)**, which means that anyone can review our algorithms, and any company or power user can run their own copies of Vertex if they so wish.
We are confident in this decision because the value of Vertex is not in the software. It is in the team who designed and implemented it – and now continually improves, manages and runs it to provide the most accurate results with the lowest latency and highest uptime.
# What we offer
We currently support three DVMs, but we plan to increase our offering substantially this year.
1. `VerifyReputation`: give your users useful and personalized information to asses the reputation of an npub, minimizing the risk of impersonations.
2. `RecommendFollows`: give your users personalized recommendations about interesting npubs they might want who to follow.
3. `SortAuthors`: give your users the ability to sort replies, comments, zaps, search results or just about anything using authors’ reputations.
To learn more, watch this 3-minute walk-through video, and [visit our website](https://vertexlab.io/)
https://cdn.satellite.earth/6efabff7da55ce848074351b2d640ca3bde4515060d9aba002461a4a4ddad8d8.mp4
We are also considering offering a custom service to help builders clarify and implement their vision for Web of Trust in their own applications or projects. Please reach out if you are interested.
-
![](/static/nostr-icon-purple-64x64.png)
@ 5d4b6c8d:8a1c1ee3
2025-02-07 14:32:43
Ate a little later yesterday.
I took my daughter for a scooter ride on a trail near our house (I was walking) and she wanted to go farther than normal. Great for the steps challenge. Then, as soon as we turned around to go home, she decided she was too tired to scoot anymore. So, I got to do the return leg of the walk carrying both the kid and her scooter.
We were out about an hour longer than expected, hence the later meal.
## Score Card
Day 1: 14 hour fast (13 dry)
Day 2: 15 hour fast (14 dry)
Day 3: 17 hours (16 dry)
Day 4: 18 hours (17 dry)
Day 5: 18 hours (16 dry)
Day 6: 19 hours (16 dry)
Day 7: TBD (15 dry)
originally posted at https://stacker.news/items/878700
-
![](/static/nostr-icon-purple-64x64.png)
@ e7bc35f8:3ed2a7cf
2025-02-07 14:29:10
The strategic importance of Syria in shaping the balance of power in the Middle East is undeniable. Positioned at the crossroads of key regional players, Syria has long been a battleground for competing interests. From its alliances with Russia and Iran to its role in energy politics, the country has been targeted by external forces seeking to reshape the region to their advantage.
Syria has historically been an essential ally of Russia, providing the Russian navy access to the Mediterranean through the port of Latakia. At the same time, Iran has viewed Syria as a critical component of the so-called "Shiite Crescent," which provides Tehran with a vital connection to Hezbollah in Lebanon. Any disruption in Syria would have significant consequences for both Russian and Iranian strategic interests.
On August 31, 2011, [Amnesty International](https://www.amnesty.org/en/documents/MDE24/035/2011/en/) released a report accusing the Syrian government of being responsible for the deaths of 88 detainees from recent protests. However, like most media narratives surrounding the conflict,[ the allegations](https://www.youtube.com/watch?v=paR5_hu64H0) were based entirely on second-hand accounts and contextless video snippets provided by opposition forces actively attempting to overthrow the Assad government.
Despite the lack of concrete evidence, the establishment media eagerly propagated the story, fueling calls for "humanitarian intervention." This followed a familiar pattern: the invocation of the so-called "[Responsibility to Protect](https://www.globalresearch.ca/humanitarian-neo-colonialism-framing-libya-and-reframing-war/24617)" doctrine, a pretext used by global powers to justify military invasions and devastating bombing campaigns under the guise of protecting civilians.
As seen with Libya, Western leaders—including Obama, Sarkozy, Cameron, and Harper—[called for Assad's removal](https://youtu.be/qNtICdGDdwQ?si=PW--2jwV8Ed1GRYY), paving the way for potential NATO military intervention.
Long before the Arab Spring, Western governments had been laying the groundwork for regime change in Syria. In April 2011, [a U.S. State Department official](https://web.archive.org/web/20110411130724/https://www.rawstory.com/rs/2011/04/08/us-trains-activists-to-evade-security-forces/) admitted to running a two-year, $50 million program aimed at equipping protesters with new technologies to evade government detection. The same official revealed that activists from Syria and other Arab Spring countries had received training just before the uprisings began.
Earlier that year, [The Washington Post](https://www.washingtonpost.com/world/us-secretly-backed-syrian-opposition-groups-cables-released-by-wikileaks-show/2011/04/14/AF1p9hwD_story.html) published leaked U.S. diplomatic cables proving that Washington had been secretly funding Syrian opposition groups since at least 2005—well before the so-called "spontaneous" protests erupted.
This raises a critical question: why would an isolated government facing the threat of NATO intervention deliberately provoke the West by ordering snipers to fire on unarmed protesters at funerals? The mainstream media never questioned these dubious claims, which were sourced from anonymous, second-hand, and unverified reports.
n 2010, a group called [Gen Next](https://web.archive.org/web/20090213090409/https://www.america.gov/st/texttrans-english/2008/November/20081120122321eaifas0.3440363.html) (renamed now as [Alder](https://alder.co/about-alder/)) which has been involved with Alliance of Youth Movements in organizing youth-led destabilization campaigns in countries that are not friendly to American and Israeli interests had delivered a [training program](https://web.archive.org/web/20110929221929/https://www.gen-next.org/index.php/programs/gallery/-/album/5482723470431484737/) in which participants were taught how to handle high-powered sniper rifles and shoulder-mounted grenade launchers. Predictably, these reports were ignored in the West.
In August 2011, Israeli intelligence-linked outlet DEBKAfile [reported](https://web.archive.org/web/20110815020301/http://www.debka.com/article/21207/) that NATO and the Turkish military were drafting plans for a military campaign in Syria, which included arming opposition fighters with anti-tank and anti-air rockets, mortars, and heavy machine guns.
As the situation escalated, the establishment media once again cheered on war, pushing for intervention under the guise of protecting Syrian civilians. The cycle repeated itself in 2013, when Western governments accused Assad of using [chemical weapons](https://www.youtube.com/watch?v=b7-S1QAmWQQ), conveniently ignoring the overwhelming opposition to another military adventure.
By 2013, the American public had grown weary of endless wars. Despite relentless efforts by the White House to manufacture consent for a unilateral strike on Syria, there was widespread opposition—not just [in the U.S.](https://web.archive.org/web/20150808142142/https://www.washingtonpost.com/news/worldviews/wp/2013/08/26/new-poll-syria-intervention-even-less-popular-than-congress/), but [globally](https://www.youtube.com/watch?v=ZPGjbwqHRNs).
[John Kerry](https://web.archive.org/web/20130827020025/http://www.state.gov/secretary/remarks/2013/08/213503.htm) and [Barack Obama](https://www.youtube.com/watch?v=GxyBKKYPT4c) falsely claimed that Assad was responsible for a chemical weapons attack, using this as a pretext for military intervention. However, independent analysts and insiders exposed this as a false flag operation. Even in the UK, the propaganda push faltered when British Prime Minister [David Cameron](https://www.youtube.com/watch?v=QnKKPwEX_ac) lost a crucial [parliamentary vote](https://www.youtube.com/watch?v=obxu5W9Wru8) on military action in Syria.
As more evidence [surfaced](https://oilprice.com/Geopolitics/International/Did-the-White-House-Help-Plan-the-Syrian-Chemical-Attack.html), it became clear that the attack had been perpetrated by U.S.-backed terrorist groups—and that the U.S. government knew about it in advance. When even members of the British Parliament called out the deception, the war narrative collapsed, exposing the extent of the manufactured crisis.
The events in Syria were not isolated. Retired U.S. General Wesley Clark famously [revealed ](https://www.youtube.com/watch?v=SzX3DfZR_1c)that he had overheard a conversation at the Pentagon about a plan to invade seven countries—including Iraq, Libya, and Syria—long before the Arab Spring. While Clark’s timeline was not entirely accurate, the overarching strategy of destabilization was clear.
Key figures in the U.S. defense establishment at the time—including Paul Wolfowitz, Douglas Feith, and Richard Perle—had extensive [ties to Israel](https://web.archive.org/web/20130904083848/https://edition.cnn.com/2004/US/08/27/fbi.spy/), raising the question of whether a broader Zionist agenda was at play. [Documents ](https://web.archive.org/web/20130117222422/https://www.informationclearinghouse.info/pdf/The%20Zionist%20Plan%20for%20the%20Middle%20East.pdf)such as the infamous "Oded Yinon Plan" ([Greater Israel](https://www.globalresearch.ca/greater-israel-the-zionist-plan-for-the-middle-east/5324815)) outlined strategies for the dissolution of Syria and Iraq into ethnically and religiously divided territories, weakening any potential opposition to Israeli expansion.
The plan explicitly called for breaking Syria apart into sectarian statelets, mirroring the strategy used to divide Lebanon. The long-term goal was clear: to ensure that Israel’s adversaries remained fragmented and powerless.
<img src="https://blossom.primal.net/313eed84ca3bff42df56ba7fd73028266ad13ab6b20bba3126aa9d4238550476.png">
"Divide and conquer" is a strategy used for millennia. And this is what happens in Syria so many years as we were seeing the Sunni majority fighting the Alawite sect in Power under Assad and his father for decades. And it's interesting to see not only the native inhabitants Sunni of Syria but of course the foreign funded jihadists who were being shipped into the country and fueling all that conflict.
Part of what this was about, it's the destabilization of the [Shia land bridge](https://phibetaiota.net/2013/05/graphic-irans-shia-land-bridge-to-lebanon-mediterranean/) that connects Iran all the way to its Hezbollah forces in Lebanon, which runs through Syria. But if that can be destabilized and the Shia Alawite sect minority that rules Syria can be replaced with a Sunni majority ruling over the country then that would break up that link between Iran and Lebanon and further destabilize and isolate Iran.
<img src="https://blossom.primal.net/c3e9eedd9f2140bb63a552ff08eb8aab1ca10ae981da2a6841b496baec230937.jpg">
And this is something that can be seen in policy planning documents of various think tanks, as in the infamous "[Which path to Persia?](https://landdestroyer.blogspot.com/2011/02/brookings-which-path-to-persia.html?m=1)" document from Brookings Institution.
As we start to expand the scope of this, then of course the thing that always in these Middle East conflicts comes into play is the natural resources.
Let's remember the prospect of the [Iraq, Iran, Syria pipeline](https://web.archive.org/web/20130727143145/https://www.tehrantimes.com/economy-and-business/758-iran-iraq-syria-sign-major-gas-pipeline-deal-).
Iran, Iraq, and Syria had signed a deal for the construction of the Middle East’s largest gas pipeline, which would transit Iranian gas from Iran’s South Pars gas field to Europe via Lebanon and the Mediterranean Sea.
What we were talking about back then was a pipeline providing traveling from Iran to Europe, through the Mediterranean.
[That move](https://www.youtube.com/watch?v=oNet5aLKaWg) was about to change the power balance of the region.
Such a [project ](https://web.archive.org/web/20130723151340/http://www.atimes.com/atimes/Middle_East/MID-04-230713.html)had the potential to shift the regional power balance dramatically. The mere prospect of it was enough to anger multiple stakeholders, from the U.S. and Israel to Turkey and the Gulf monarchies, all of whom had vested interests in preventing [Syria ](https://web.archive.org/web/20130831121243/http://atimes.com/atimes/Middle_East/MID-04-290813.html)from becoming an energy corridor.
The war in Syria was never about democracy, humanitarian concerns, or chemical weapons. It was about [power](https://web.archive.org/web/20130315191710/http://www.davemanuel.com/2010/06/14/us-military-spending-over-the-years/), [control](https://web.archive.org/web/20130318180618/http://www.usatoday.com/story/money/business/2013/03/10/10-companies-profiting-most-from-war/1970997/), and the relentless [pursuit ](https://web.archive.org/web/20130306140329/http://www.businessinsider.com/top-25-us-defense-companies-2012-2?op=1)of strategic dominance by Western and regional actors. The destabilization of Syria served multiple agendas—weakening Iran, severing Russia’s influence, ensuring Israel’s security, and controlling energy routes.
What we have witnessed over the past decade is not a civil war, but a foreign-orchestrated campaign to dismantle yet another independent state in the Middle East. Understanding these dynamics is essential in recognizing how mainstream narratives are crafted to justify war while hiding the real motivations behind the chaos.
<img src="https://blossom.primal.net/b1e0155c7bd73c05fe6323e9131d528842c6410f6520f0cc7885b6bdb5022084.jpg">
-
![](/static/nostr-icon-purple-64x64.png)
@ ed60dae0:cc3d5108
2025-02-07 14:07:39
Welcome to the first Situation Report from The First Bastion. Before we begin, please make sure you’ve read the disclaimer, which applies to all our content.
You can find it here: [Disclaimer](https://primal.net/bergman/Disclaimer-or2cwd)
In short: **Not Financial Advice**.
## Price Study
Starting with the three-day (3D) chart—this is my favorite timeframe for gauging Bitcoin’s movements and identifying potential future trends. The 3D chart is high enough to filter out noise, making it easier to see the bigger picture. For instance, this week, Bitcoin dipped to $92,000 before ripping back to $102,000, all within 24 hours. However, the timeframe is also low enough to extract signals early, rather than receiving the party invitation when the party is already over—something that often happens with higher timeframes.
https://blossom.primal.net/6f940d0cbb23f92f790e5cf03ae4685485336da27785ae6a7568614a41add7f0.png
The chart presents a clear picture of Bitcoin consolidating between $92,000 and $106,000. Although there have been wicks above and below these levels, we haven’t seen a definitive close beyond this range.
Statistically, trends are more likely to continue than to break. This means that when the price consolidates, it tends to reverse at the extremes—declining from the range high and rising from the range low. However, emotions often interfere, leading traders to get greedy at resistance (range high) and fearful at support (range low).
Two key indicators I watch on this chart are the RSI and its Moving Average (MA), as well as the Returns indicator. While not perfect, when the RSI is above its MA and the MA crosses above 50, Bitcoin typically enters a new leg up, and vice versa. Recently, Bitcoin attempted to push above but lacked the momentum to sustain it, keeping it in a downtrend toward consolidation around the 50 mark.
The other key indicator is the Returns indicator, which, in this instance, tracks a 90-day rolling return. Historically, when Bitcoin’s returns exceeded 200% within 90 days, it marked a cycle top. The yellow line represents a one-standard-deviation return, currently around 57%. While the indicator hit an 80% return recently, the ongoing consolidation has allowed it to revert toward the mean. This could provide more room for further gains if Bitcoin manages to push higher.
## Tariffs
This week’s Situation Report wouldn’t be complete without addressing the impact of the newly imposed [tariffs](https://www.whitehouse.gov/fact-sheets/2025/02/fact-sheet-president-donald-j-trump-imposes-tariffs-on-imports-from-canada-mexico-and-china/) on imports from Canada, Mexico, and China. For two consecutive weekends, market-moving news has emerged, sending prices lower. First, it was the DeepSeek AI news, and this weekend, the tariffs.
While President Trump had previously announced his intent to impose tariffs, the market was uncertain about the specifics. Would they be implemented gradually, with an effective date further in the future, or would high tariffs be imposed abruptly? It turned out to be the latter. This raised another question: was this a bargaining strategy or a long-term policy shift? On camera, Donald J. Trump stated that Canada and Mexico could do nothing to prevent the tariffs from taking effect.
With a strengthening dollar and growing market uncertainty, many risk assets sold off, including Bitcoin— which is the most liquid asset, tradable 24/7. However, after calls with Mexican and Canadian leaders on monday, during which they pledged to reinforce border security, Trump delayed the tariff’s effective date by 30 days, leading to a market rebound.
## DXY
Let’s take a look at how the DXY has been behaving lately. Since early October 2024, the DXY has risen from 100 to 110, a level it reached in early January. However, after Trump took office, the DXY began to decline, ultimately leading to a breakdown of the uptrend.
https://blossom.primal.net/0792ea022d78637290860b2f59e0bd95567a55ceb4f93a493df878e5db782b1e.png
A stronger dollar generally signals contracting global liquidity. Since a significant portion of global debt is denominated in dollars, a stronger dollar (relative to other fiat currencies) makes it harder for corporations earning revenue in other fiat currencies to service their debt. This, in turn, slows down—or even reverses—their ability to invest.
Take note of the sharp spike at the beginning of this week, which briefly pushed the DXY back to nearly 110. This move followed the tariff news but was fully retraced after the announcement that tariffs would be delayed by 30 days.
## US10Y
This brings us to another highly impactful factor in financial markets: the yield on the 10-Year Treasury Note. There has been extensive discussion about this yield, with crypto OG Arthur Hayes predicting in his [blog](https://cryptohayes.substack.com/p/the-ugly) that it would rise due to a confrontation between the Trump administration and Federal Reserve Chairman Jerome Powell. He argued that this temporary spike in bond yields could trigger a mini-financial crisis, sending all markets lower and pushing Bitcoin back to the $70,000 mark.
https://blossom.primal.net/e3b3c4247d876f986464f033c11c87f29f1b393504c7bd8076bab93892d996b3.png
President Trump has long been vocal about his demand for lower interest rates. To achieve this, he needs the Federal Reserve to ease policy and bring rates down. However, the Fed operates under a dual mandate: maintaining a healthy labor market while keeping inflation under control. If the Fed lowers the central bank funds rate too aggressively, bond vigilantes may step in and demand higher yields to compensate for rising inflation expectations. This would backfire on Trump’s demands and put the Fed in a difficult position, as it would no longer be acting in the best interest of the American people in terms of inflation control.
On the other hand, @nostr:npub1a2cww4kn9wqte4ry70vyfwqyqvpswksna27rtxd8vty6c74era8sdcw83a
wrote a piece on [Fiscal Dominance](https://www.lynalden.com/full-steam-ahead-all-aboard-fiscal-dominance), explaining that when government debt levels become too high, the Federal Reserve’s traditional tools lose their effectiveness. A rise in interest rates would only inject more cash into the system, as higher interest costs flow to bondholders, potentially exacerbating inflationary pressures rather than containing them.
That being said, for now, rates are coming down. Recently, the newly appointed Crypto Czar addressed the media, discussing plans to regulate stablecoins to reinforce U.S. dollar dominance in the global economy. This move could increase demand for U.S. Treasuries, potentially leading to lower rates due to a higher bid for these assets.
To monitor whether the trend is truly reversing, I use an inverse 180-day exponential Hull moving average. While I wouldn’t say you can apply traditional technical analysis to yields, this approach could help identify when rates are rolling over.
## Economic data
This week, some important economic data was released. Inflation in the EU came in 0.1% higher than expected. Meanwhile, ISM Manufacturing in the U.S. exceeded expectations with a reading of 50.9—anything above 50 indicates expansion.
https://blossom.primal.net/3fe144e2921ca919e4c7428fbfbcbf2ab0aaaf8d61ee85dba87ec5fc1af24128.png
JOLTs data came in slightly lower than expected. While this might seem like negative news, stocks rallied slightly in response. The reason? A weaker labor market could encourage the Federal Reserve to ease policy, aligning with its mandate.
ISM Services also came in slightly below expectations, which has a dual impact. On one hand, it helps prevent inflation from overheating. On the other, it signals slightly lower revenue for companies providing these services.
On Friday, the Non-Farm Payrolls report and Unemployment Rate will provide further insights into the state of the labor market.
## Short Term Holder Behaviour
To start, I want to give a shoutout to [Kibo Money](https://kibo.money/chart-date-to-market-price-to-short-term-holders-realized-price-ratio?) @nostr:npub1jagmm3x39lmwfnrtvxcs9ac7g300y3dusv9lgzhk2e4x5frpxlrqa73v44
I use some of the on-chain data provided by Kibo Money, who is developing an open-source on-chain analysis software that you can run on your own server. Check it out and send him some sats!
There’s a lot of alpha to be gained from analyzing the behavior of Short-Term Holders (STHs)—those holding coins that have moved recently (within the last 155 days). A study by Glassnode found that after 155 days, holders are more likely to keep their Bitcoin for the long term, making them less likely to sell.
https://blossom.primal.net/bdc6dd57317079c5cc1b05c04ed610a5765e9002f81471648863109f3286bc32.png
The Cost Basis (CB) for Short-Term Holders is currently around $92,000. When STHs have significant unrealized gains, they tend to sell for profit, adding selling pressure to the market. However, they also tend to sell at a loss, lacking the conviction of seasoned hodlers. While these are assumptions, the data shows a correlation, leading me to infer causation. It’s also possible that some of these coins belong to high-conviction Bitcoiners who are simply swing trading a portion of their holdings—taking profits when the price surges or cutting losses when the price drops. Either way, recently moved Bitcoin tends to move again in the near future.
https://blossom.primal.net/d762b5629858c21a45e23a35f2d1d4a806699466bab2d2449172e3dee82f1c32.png
The Short-Term Holder Spent Output Profit Ratio (STH SOPR) chart provides insight into when profit-taking occurs, as well as when investors capitulate and sell at a loss. It may seem straightforward, but when there’s a significant amount of unrealized profit—meaning the market price is well above the cost basis—one could take some chips off the table. Conversely, if one believes the long-term uptrend is still intact, while Short-Term Holders are panic-selling at a loss, it may be an opportunity to be greedy when others are fearful.
In a bull market, the Short-Term Holder Cost Basis (STH-CB) often acts as support during pullbacks. This makes sense because as portfolios grow, investors feel confident buying more on dips in anticipation of the next leg up. The reverse is also true in a bear market—the STH-CB acts as resistance. When the price crashes and later recovers near their cost basis, many traders view it as a “Get Out of Jail Free” moment and sell at breakeven.
One could use the STH-CB as a risk-on/risk-off indicator, but it isn’t foolproof. For example, during the consolidation period in the summer of ’24, the price dipped below the STH-CB, yet the broader uptrend remained intact. This highlights the importance of understanding where we are in the larger market cycle—which brings us to the next topic.
## Golden skies
I like gold. Here at The First Bastion, it’s all about sound money, and gold has always been the ultimate embodiment of it. Due to its unique properties, gold is the best proxy for money that we have. However, it isn’t perfect and comes with its disadvantages—its weight makes it difficult to transport, and it cannot be used for instant settlement. Despite these limitations, gold remains one of the most important assets in today’s financial system, serving as a neutral store of value and an insurance policy against defaults. Gold recently hit new all-time highs amid growing uncertainty surrounding tariffs, wars, policy shifts, and escalating trade tensions.
Many investors see two possible outcomes:
1. The structural issues at hand cannot be resolved, leading to defaults by corporations and nation-states—prompting investors to buy gold as insurance against these defaults.
2. Policymakers will intervene with short-term fixes, likely in the form of quantitative easing. While this may temporarily stabilize the system, it will also erode purchasing power, making gold a hedge against monetary inflation.
So gold is ripping once again, and at this pace, it looks poised to reach $3,000 per ounce in the near future.
https://blossom.primal.net/74d6b51658d24c80e6ed9d25483921bfacf4ce8080d8ccc5534541bd1db40a19.png
## BTC / GOLD
I love Bitcoin. It has the potential to become an even better proxy for money than gold. While gold is not easily verifiable—a key reason why it is inferior to Bitcoin as a form of money—it still has a market cap that is ten times larger than Bitcoin’s. Since gold cannot be easily manipulated (aside from physically mining it), its inflation rate remains around 2% per year. This makes it a solid benchmark for comparing Bitcoin’s real value growth, rather than just its dollar-denominated appreciation.
https://blossom.primal.net/5628178a098df954f59b6415b61c3cb810ad89a3f410b26be9267849334a8063.png
Behold the BTC/GOLD Power Trend. This power trend is based on calculations by [Stephen Perrenod](https://stephenperrenod.substack.com/p/bitcoin-power-law-vs-gold-mid-2024). The BTC/GOLD price follows a statistically significant power trend, which, according to historical data, currently sits at approximately 49.21 ounces of gold per Bitcoin. At today’s gold price, this translates to a staggering $140,000 per Bitcoin.
To be clear, this doesn’t provide certainty. All models are wrong, but some are useful. Many factors could shift this trend, and it will only hold if Bitcoin’s adoption rate continues at the same pace as in previous years. That said, it can serve as a valuable directional compass.
Remember when I mentioned the Short-Term Holder Cost Basis (STH-CB) as a risk-on/risk-off indicator? You could refine that approach by only applying it when Bitcoin’s price is above the BTC/GOLD power trend as a potential topping signal—or below it as a bottoming signal.
As of today, Bitcoin is valued at 34 ounces of gold per BTC—which is below the first cycle top of 2021 ($63,000) and near the March ‘24 local top ($73,000). The BTC/USD price currently sits around $98,500.
You see where I’m going with this, right?
## Expected Outcome
I approach the market with probabilities. I try to imagine what is possible and then assess what is probable. Moving forward, I’ll include my probability-based assessments in every SitRep. The goal isn’t to convince you of my opinion (on the contrary—remember my disclaimer), but rather to practice forming an informed perspective so that you can position yourself in alignment with your own assessment.
Arthur Hayes recently estimated a 30% Bitcoin drawdown to be 60% likely. However, he made that assessment a few weeks ago, so his view may have evolved. After Monday’s events, I think it’s clear that Bitcoin is significantly impacted by policy changes—so one should prepare for volatility. But at the same time, Bitcoin’s rapid recovery, driven by strong buying pressure from Coinbase users, was almost unmatched by any other asset. Bitcoin is playing in the Champions League now, which means even greater [correlation](https://capriole.com/update-58/) with macroeconomic factors.
A breakdown toward $70,000 is possible, but not probable. That would be a minus-one-sigma move on the BTC/GOLD Power Trend—a level previously seen during the COVID crash and the Terra Luna collapse. The recent grey swan events, like the DeepSeek AI news and tariffs announcement, only pushed Bitcoin down to $92,000. Based on this, it seems like it would take a mini-financial crisis—along with the US 10-Year Treasury Yield (US10Y) hitting 6%, as Hayes suggested—to drive Bitcoin significantly lower.
Meanwhile, gold is surging into price discovery with no signs of slowing down. Bitcoin has followed gold’s trajectory—just with a slight delay.
Bullish Catalysts for Bitcoin I didn’t cover them in this SitRep, but there are several bullish developments for Bitcoin, including:
* The creation of an American Sovereign Wealth Fund
* New and favorable SEC guidelines on crypto in the making
* A possible Bitcoin Strategic Reserve
* An increasing number of corporations adding Bitcoin to their balance sheets as a Treasury asset
* Potential favorable policy on stablecoins, strengthening the digital asset environment
* A push for lower US10Y yields, as discussed by [Jeff Park](https://x.com/dgt10011/status/1887316068189733259)
The market is likely to remain messy, with ongoing discussions about tariffs and policy changes.
But there’s one thing that keeps me thinking. Despite a bullish outlook, the price isn’t moving higher on good news—a signal that shouldn’t be ignored. It suggests that investors who want exposure to Bitcoin already have their positions. In other words, there’s a lack of new money flowing in. Without fresh demand, any negative news could tip the scales toward selling, exacerbated by momentum traders and liquidations.
Demand for neutral, scarce, and highly desirable assets—like gold—is clearly increasing. Bitcoin needs to capture some of that demand, too. That’s why I’m watching the DXY, US10Y, and GOLD like a hawk.
Stay sound,
J.M. Bergman
-
![](/static/nostr-icon-purple-64x64.png)
@ 044da344:073a8a0e
2025-02-07 14:06:14
Knapp ein Jahr hat es gedauert nach meinen letzten Gesprächen im Apolut-Studio, seinerzeit mit [Robert Cibis](https://apolut.net/im-gespraech-robert-cibis/) und [Yann Song King](https://apolut.net/im-gespraech-yann-song-king/) und am Rande von Berlin schon längst nicht mehr so komfortabel wie einst an der bayerisch-österreichischen Grenze oder dann im Süden Schwedens, wo eine komplette Mannschaft für perfekte Qualität gesorgt hat. Kamera, Ton, Regie, Maske und sogar eine Gästebetreuung. Lauter Profis, aber irgendwann offenbar nicht mehr zu bezahlen aus Spenden und wahrscheinlich auch überholt von der Konkurrenz im Internet, die mit einfachen Mitteln zwar weit unterhalb aller TV-Standards bleibt, aber aktuell ist, viel, viel günstiger und inhaltlich trotzdem sehr oft sehr spannend.
Egal. Auf Onlineinterviews hatte und habe ich keine Lust. Ich möchte den Menschen spüren, um den es geht. Vorher mit ihm reden und hinterher hoffentlich auch noch. Ich telefoniere nur im Notfall, weil dort vieles von dem verlorengeht, was den Austausch ausmacht. Zoom und Co. liefern zwar ein Bild, sind aber ansonsten nicht viel besser. Um das nur mit einer Zahl zu illustrieren: Bei einem Bildschirmgespräch dauert es zweieinhalb Sekunden, bis mein Gegenüber registriert, dass ich etwas sagen will. Live und in Farbe liegt die Reaktionszeit bei knapp der Hälfte.
Also habe ich aus der Not eine Tugend gemacht und bin selbst zum Produzenten geworden. Nicht ganz allein natürlich. Es gab Tipps von Dirk Wächter, der für viele der Bilder und Videos von Daniele Ganser steht und die Apolut-Gäste auf unnachahmliche Weise fotografiert hat, von Paul Brandenburg, der Technik borgte, und von Ingmar Beyer, den ich im großen Studio kennenlernen durfte und der nun auch bei meinen eigenen Versuchen dafür sorgt, dass der Ton stimmt. Vielen Dank dafür.
![1.00](https://route96.pareto.space/49a158c086b8ca90d18bca3e3a679d20354a7bd8f964594f263529bfeebd11e8.webp)
Ein Dank gilt auch Axel Klopprogge, den die Leser dieser Seite aus der Kolumne [Oben & Unten](https://www.freie-medienakademie.de/columns/2) kennen und der sich gewissermaßen als Versuchskaninchen zur Verfügung stellte. Der Anlass war denkbar günstig, als wir uns Ende Januar im Wohnzimmerstudio trafen: Gerade war seine Aufsatzsammlung „Links oder rechts oder was?“ erschienen – Stoff genug für 90 Minuten. Das Buch wird morgen in meiner [Kolumne](https://www.freie-medienakademie.de/columns/5) noch einmal gesondert gewürdigt.
Wer in unser [Gespräch](https://youtu.be/LUiUAhb2OXY) hineinschaut, wird schnell den Unterschied zu Apolut sehen: Es gibt Publikum. Gut zehn Menschen, die hoffentlich wiederkommen. Die nächsten Gäste: [Michael Beleites](https://www.freie-medienakademie.de/medien-plus/resonanz-aus-dem-osten), mit dem ich über den Darwinismus reden werde und über all das, was diese Ideologie aus uns gemacht hat, sowie Erich Hambach, der gerade auf den letzten Metern für sein Buch „Herren des Geldes“ ist.
[Freie Akademie für Medien & Journalismus](https://www.freie-medienakademie.de/)
[Unterstützen](https://www.freie-medienakademie.de/unterstuetzen)
-
![](/static/nostr-icon-purple-64x64.png)
@ 5d4b6c8d:8a1c1ee3
2025-02-07 14:02:05
Apparently, there's still another NFL game and, I suppose, we have to discuss it.
I'm much more excited to get into all the NBA trades that happened.
Who got better?
Who got worse?
Who did something really weird?
Of course, we'll talk about the contests going on in the territory.
MLB's ramping up. Can anyone challenge the Dodgers?
Ovi is trying to get back on pace to break NHL's career scoring record.
Any bets we're excited about
Plus, whatever the stackers want us to cover (time and memory permitting)
originally posted at https://stacker.news/items/878674
-
![](/static/nostr-icon-purple-64x64.png)
@ 54286b98:3debc100
2025-02-07 11:05:29
Reality is clear when we stand in the light.\
Falsehood appears when we tilt ourselves just enough to distort what’s real.
Every object—tree, person, or building—casts a shadow.\
But only the object is real. The shadow is an effect, not the truth.
Light reveals what’s true. Darkness hides it, warping our perspective.\
Our angle to the light source changes everything.
Christ is that source of light. He shines on everyone—no matter who we are.\
He doesn’t shift. Truth doesn’t shift.
But we do. Our minds waver like waves in the ocean, creating ever-changing shadows.\
Those shifting shadows can fool us.
Today, let’s choose to stand in his perfect light.\
Let’s notice where we need to grow and refuse to be deceived by distorted reflections.\
Let’s anchor ourselves to what’s real.
Until next time,\
**J**
> Do not be deceived, my beloved brothers. Every good gift and every perfect gift is from above, coming down from the Father of lights, with whom there is no variation or shadow due to change. Of his own will he brought us forth by the word of truth, that we should be a kind of firstfruits of his creatures. **James 1: 16-18**
*Original article published on: [https://www.javierfeliu.com/blog/shifting-shadows/](https://www.javierfeliu.com/blog/shifting-shadows/)\
Photo by [Yang Deng](https://unsplash.com/@palon?ref=javierfeliu.com) / [Unsplash](https://unsplash.com/?utm_source=ghost&utm_medium=referral&utm_campaign=api-credit)*
-
![](/static/nostr-icon-purple-64x64.png)
@ a367f9eb:0633efea
2025-02-07 10:39:28
Issued on January 23, 2025, Staff Accounting Bulletin 122 rescinds SAB 121, [originally issued](https://www.sec.gov/oca/staff-accounting-bulletin-121) by Gensler in March 2022. The previous bulletin provided guidance for financial entities and custodians holding any “crypto-assets,” requiring them to account for all cryptocurrencies primarily as liabilities on their balance sheets, rather than assets.
The revoking of SAB 121 empowers entities to assess whether their crypto-assets are classified as liabilities only if they believe a loss is probable.
For bitcoin holders who hold their own keys and run their own node, this distinction and its subsequent repeal made little difference.
But for the budding world of Bitcoin banking and finance, as well as the booming industry of custodial wallets and brokerages, it’s a game changer.
Rather than having to match cryptocurrency deposits one-for-one with other liquid assets in the case of a contingency, the new accounting guidance frees up institutions to mark the true values of crypto-assets on their books.
Rather than having to buy up $1 million in treasuries or cash in order to hold $1 million in bitcoin or cover losses, firms will now be able to recognize that $1 million as a true asset.
It may not seem like a revolution, but it may be the beginning of our bull-inspired Bitcoin banking era.
After years of byzantine persecutions of cryptocurrency developers, entrepreneurs, and ever-increasing regulations on Bitcoin, this paradigm shift at the nation’s premier markets regulator means traditional finance can finally include bitcoin and its crypto-offspring in its suite of financial products – with some caveats.
Practically, this rather benign-sounding rule lowers the barrier of entry for entities that want to offer bitcoin services to their customers. Whether it’s a bank, an exchange, or a liquidity service provider custodying funds, there is now a more sustainable path for offering bitcoin alongside any other type of account.
While a general crypto market framework is still far from established in law, the current situation grants fairness between both fiat money and cryptocurrencies in the hands of entrepreneurs who want to custody funds for their clients.
Practically, however, what does this mean for the average bitcoiner?
## **What will my Bitcoin bank look like?**
If we take a peek over at Europe, there are already FinTech firms and banking institutions that offer some level of bitcoin services.
Xapo Bank, a private bank headquartered in Gibraltar, [offers](https://www.xapobank.com/en) each customer a traditional bank account and IBAN number alongside an instantaneous deposit and withdrawal address for Bitcoin and Bitcoin Lightning, Tether, and USDC.
Considering Xapo [built](https://decrypt.co/8449/coinbase-acquires-xapo-crypto-custodian) the doomsday-proof custody vaults for bitcoin storage later bought by Coinbase in 2019, now the preferred institutional custodian for billions in assets, it’s easy to see why so many customers trust their custody.
And for those willing to make the tradeoff for custody of their funds, they do offer something attractive.
In a single account, a customer could deposit cash, exchange it to bitcoin, and withdraw to self-custody. They could also deposit bitcoin using Lightning, and then instantly convert that amount to send a traditional bank transfer to pay their rent or utility bills for those who don’t yet accept bitcoin.
Again, this may not be the solution for those who [prefer self-custody](https://www.btcpolicy.org/articles/self-custody-is-nonnegotiable), but it does offer an integrated fiat on and off ramp that others may find convenient.
Similarly, the UK-based FinTech firm Revolut offers its customers the [ability](https://www.revolut.com/crypto/) to deposit and withdraw their bitcoin within the app, as well as exchange it for whichever fiat currency they wish. For those who currently hold bitcoin in an ETF or some other custodial product, a move to an app such as this may be even more attractive.
And we already know US companies are begging to expand their own services to their customers.
Companies such as **Strike** and **Fold** have already begun to increase their Bitcoin banking services for American customers, offering account and routing numbers for [bill pay](https://strike.me/blog/announcing-strike-bill-pay/), as well as the ability to instantly swap between currencies if they wish.
Fold has the [ambition](https://blog.foldapp.com/fold-to-go-public/) to become one of the nation’s largest publicly-traded bitcoin financial services, looking to soon add mortgage and lending offers, as well as insurance solutions.
These financial firms will offer bitcoin for purchase, lending, and exchange, but we can also assume their suite of products will become more diverse and attractive for a more diverse customer base.
## **What about sovereign money?**
Educating Americans about the benefits of Bitcoin is an important task. So is improving our policy landscape so that all bitcoiners may flourish.
But if the Bitcoin network truly represents a revolutionary way to have and use neutral money, should we even consider Bitcoin banks something we want? How can peer-to-peer money integrate with the centralized custodial banking system so many of us are trying to escape?
Even the most primitive advantages of Bitcoin are built on its ability to be owned in a sovereign way, at the total exclusion of everyone who doesn’t have the private key. For many of us, this is all we desire and want. And for the rights to hold and use Bitcoin how we wish to be universally recognized.
However, we cannot dictate how the rest of our Bitcoin peers will engage with the network, nor what they inscribe into blocks if they have the computing power to mine them. If Bitcoin entrepreneurs freely compete to offer unique products and services to custody, trade, or lend bitcoin, the rules should make that easier and more possible.
For those who will still need to interact with the fiat world, they should be able to benefit from Bitcoin-first products and services designed with them in mind. And regulations should empower them rather than restrict what they can do.
Not every Bitcoin banking product will be attractive to every bitcoiner and that’s okay. But the positive evolution of e-cash, custodial services, lending, and insurance is something that will help leverage the power of Bitcoin. And that should be championed.
*Yaël Ossowski is a fellow at the Bitcoin Policy Institute.*
This article was originally published at the [Bitcoin Policy Institute](https://www.btcpolicy.org/articles/has-the-era-of-bull-inspired-bitcoin-banking-already-begun).
-
![](/static/nostr-icon-purple-64x64.png)
@ d360efec:14907b5f
2025-02-07 09:42:54
ณ ดินแดนอันไกลโพ้น ปรากฏดันเจี้ยนลึกลับไร้ก้นบึ้ง นามว่า
"ตลาดการเก็งกำไร" ประตูทางเข้าเปล่งประกายล่อตาล่อใจ แต่มักถูกปกคลุมด้วยหมอกแห่งความไม่แน่นอน
คำจารึกโบราณ แกะสลักเหนือประตูทางเข้า เตือนสติผู้มาเยือน: "ผู้ใดเข้าล้วนมิอาจหวนคืน..." เฉกเช่นสำนวนโบราณที่กล่าวขาน "คนในมิอาจออก คนนอกมิต้องการย่างกราย"
ภาพที่ปรากฎตรงหน้า คือชายหนุ่มผู้หาญกล้า กำลังจะก้าวเข้าสู่ประตูดันเจี้ยน เหนือประตูมีป้ายขนาดมหึมาสลักคำว่า "Trading" สัญลักษณ์แห่งโลกการลงทุน การเก็งกำไร ไม่ว่าจะเป็น หุ้น, ฟอเร็กซ์, คริปโต ล้วนเป็นมอนสเตอร์ที่สถิตอยู่ในนี้
การจะพิชิตดันเจี้ยนนี้ได้นั้น หาใช่เรื่องง่าย ภารกิจแรกคือการกำจัดปีศาจ**"นักพนัน"** ที่สิงอยู่ในจิตใจของผู้กล้าทุกคน ปีศาจตนนี้ร้ายกาจยิ่งนัก แต่มิใช่ว่าไร้ทางปราบ หากท่านผู้กล้าปรารถนาจะหลุดพ้นจากวงจรอุบาทว์นี้ จงใช้วิธีเหล่านี้เถิด
1. เข้าใจว่าการพนันคือกับดัก
ปีศาจพนันมักล่อลวงด้วยภาพลวงตาแห่งชัยชนะเพียงชั่วครู่ แต่แท้จริงแล้ว มันถูกออกแบบมาเพื่อสูบเลือดสูบเนื้อจากเหล่าผู้กล้าในระยะยาว จงจำไว้ว่าการพนันมิใช่หนทางสู่ความร่ำรวย แต่เป็นเส้นทางสู่หุบเหวแห่งความสิ้นเนื้อประดาตัว
2. เปลี่ยนมุมมองเกี่ยวกับเหรียญทอง
จงมองเหรียญทองที่ท่านมีมิใช่แค่ตัวเลข แต่เป็น “เวลาและหยาดเหงื่อ” ที่ท่านได้แลกมา หากท่านสูญเสียมันไปเพราะการพนัน มันคือเวลาชีวิตที่หายไปตลอดกาล
3. ตัดขาดสิ่งเร้าที่กระตุ้นให้เล่น
• ลบแอปพนัน / ปิดกั้นเว็บไซต์มืด
• เลิกติดตามเพจหรือกลุ่มที่เกี่ยวข้อง
• เปลี่ยนสหายร่วมทางที่ชักชวนไปสู่ทางเสื่อม
4. ใช้กฎ 5 นาที
เมื่อใดที่ความกระหายอยากเล่นครอบงำ จงหยุดยั้งตัวเองไว้ 5 นาที แล้วตรองดูว่า
• คราก่อนท่านสูญเสียไปเท่าใด?
• หากเล่นแล้วเสียอีก จะรู้สึกเช่นไร?
• มีสิ่งใดที่ควรทำมากกว่านี้หรือไม่?
5. แสวงหาเส้นทางแห่งการลงทุนที่แท้จริง
แทนที่จะใช้เหรียญทองไปกับการพนัน จงเปลี่ยนเป็นการลงทุนที่มีโอกาสเติบโต เช่น เป็นนักรบแห่งคุณค่า (VI) , เข้าซื้อหุ้นแล้วเก็บมันไว้ในหีบสมบัติ 1 ปี , DCA BTC ดั่งสะสมขุมทรัพย์ทีละน้อย
6. ถามตัวเองว่า “อยากเป็นผู้ชนะ หรือเป็นเหยื่อ?”
ผู้ที่ร่ำรวยจากการพนันคือนักลงทุนผู้เปิดบ่อน มิใช่ผู้เล่น หากท่านปรารถนาจะเป็นผู้ชนะ จงเลือกเส้นทางที่ชาญฉลาดกว่า
7. ตั้งเป้าหมายที่ยิ่งใหญ่กว่า
จงตั้งเป้าหมายที่ชัดเจน เช่น สะสมเหรียญทองเพื่อซื้อปราสาท 5 ล้าน หรือหาเงิน 100 ล้าน แล้วจงมุ่งมั่นไปที่มัน การพนันจะทำให้เป้าหมายของท่านล่าช้าลง
📉 เหตุใดดันเจี้ยนแห่งการเทรดจึงเปรียบเสมือนเขาวงกต?
1️⃣ ก้าวเข้ามาง่าย ออกไปยาก
• การเข้าสู่ตลาดการเงินเป็นเรื่องง่ายดาย ใช้เพียงบัญชีเทรดและเงินทุนเพียงเล็กน้อย แต่เมื่อเข้ามาแล้ว จิตวิทยาแห่งการลงทุน และ ความผันผวนของตลาด จะทำให้ยากที่จะออกไป
2️⃣ เส้นทางที่ซับซ้อน
• นักรบมือใหม่มักคิดว่าการทำกำไรเป็นเรื่องง่าย แต่เมื่อเริ่มต้นจริงจะพบว่ามีปัจจัยมากมายที่ต้องเรียนรู้ ทั้งเทคนิค เวทมนตร์พื้นฐาน อารมณ์ตลาด และจิตวิทยาของตน
3️⃣ ความโลภและความหวังทำให้ติดอยู่ในตลาด
• หลายคนเริ่มต้นเทรดด้วยเป้าหมายหาเหรียญทอง แต่เมื่อขาดทุน กลับพยายามเอาคืน
• เมื่อกำไร ก็อยากได้มากขึ้น จนบางครั้งไม่รู้จักพอ
4️⃣ ไม่มีเส้นทางที่แน่นอน
• ในเขาวงกตนี้ ไม่มีทางเดินตรงไปสู่ความสำเร็จ ต้องลองผิดลองถูกหลายครา
• บางคนหลงทาง บางคนเจอทางตัน บางคนออกจากตลาดไปก่อนจะถึงทางออกที่แท้จริง
🎯 แล้วจะเอาตัวรอดจากวงกตนี้ได้อย่างไร?
✅ เข้าใจว่าเทรดไม่ใช่การพนัน
• การเทรดที่ดีต้องมีระบบ ไม่ใช่แค่เสี่ยงดวง
✅ ฝึกวินัยและจัดการอารมณ์
• สิ่งที่สังหารนักรบมิใช่ปีศาจในตลาด แต่เป็น “อารมณ์ของตนเอง”
✅ วางแผนก่อนเข้าเทรด และมีจุดตัดขาดทุนเสมอ
• อย่าเข้าเทรดโดยไร้แผน เพราะจะทำให้ท่านติดอยู่ในเขาวงกตตลอดกาล
✅ รู้ว่าเมื่อไหร่ควรหยุด
• บางครั้ง “การไม่เทรด” คือการตัดสินใจที่ดีที่สุด
🔮 บทสรุป
ดันเจี้ยนแห่งการเทรดเปรียบเสมือนสถานที่ลี้ลับที่ยังไม่มีผู้ใดสำรวจมาก่อน ผู้ใดที่ย่างกรายเข้ามาล้วนออกไปยาก เพราะมันเต็มไปด้วยความท้าทาย อารมณ์ และความโลภ แต่หากท่านเข้าใจเกมนี้ดีพอ ท่านจะสามารถหาทางออก และเปลี่ยนมันให้เป็นโอกาสแห่งความมั่งคั่งได้ จงจำไว้ว่า การจะออกจากดันเจี้ยนนี้ได้ ท่านต้องพิชิตบอสใหญ่ "การรู้เท่าทันอารมณ์ และมายเซ็ทที่เหมาะสมกับเทรนด์เดอร์" ให้จงได้!
หวังว่าพวกท่านจะไม่หลายเป็นซากศพเน่าๆ ในดันเจี้ยนแห่งนี้
ของให้โชคดีมีชัยในโลกเทรนด์เดอร์ YONOSUBA
-
![](/static/nostr-icon-purple-64x64.png)
@ 16d11430:61640947
2025-02-07 09:37:24
Introduction: The Lost Art of Flourishing
Eudaimonia, the Greek concept of human flourishing, represents a state of deep fulfillment derived from purpose, mastery, and moral virtue. Aristotle described it as the highest human good, achieved not through transient pleasures but through living in accordance with reason and excellence.
Yet, in our modern fiat-driven world, eudaimonia has largely perished. Instead of striving for excellence, people are entrapped by systems of debt, artificial scarcity, and wage slavery, where fulfillment is secondary to survival. The incentives of fiat capitalism—endless growth, consumerism, and bureaucratic control—have eroded the conditions necessary for human flourishing.
The purpose of this article is to explore the death of eudaimonia under fiat rule, supported by critical evidence, and to examine whether it can be resurrected—perhaps through alternative systems like Bitcoin and decentralized technologies.
---
The Fiat Machine and the Death of Eudaimonia
1. The Extraction of Meaning: Fiat as a Mechanism of Control
Fiat currency, backed by nothing but government decree, is a tool of centralized power. It is inflationary by design, ensuring that those who hold wealth in fiat lose purchasing power over time unless they participate in increasingly speculative financial schemes.
This constant need to hedge against inflation forces individuals into short-term thinking, undermining long-term endeavors that lead to mastery and fulfillment. Instead of creating art, philosophy, or science for its own sake, people are incentivized to chase money in the fastest, most extractive way possible.
Critical Evidence: Wages have stagnated relative to productivity since the abandonment of the gold standard in 1971, while financialization has exploded. According to the U.S. Bureau of Labor Statistics, median wages have barely kept up with inflation, whereas asset prices (stocks, real estate) have soared—favoring the wealthy who can invest while punishing wage earners.
2. The Death of Virtue: How Fiat Incentivizes Corruption
Aristotle tied eudaimonia to virtue—justice, courage, temperance, and wisdom. But fiat economies erode virtue by rewarding manipulation over integrity. In a world where money is easily printed, those closest to its issuance—the state, banks, and corporate elites—reap the rewards while the average person suffers debasement.
Fiat allows for moral hazard: banks are bailed out after reckless speculation, politicians spend without accountability, and corporations use inflation to justify price hikes. This destroys trust, a fundamental component of any thriving society.
Critical Evidence: The Cantillon Effect demonstrates that newly printed money benefits those who receive it first (banks, hedge funds) at the expense of those who receive it last (workers, pensioners). The 2008 financial crisis and subsequent bailouts exemplify how fiat rewards risk-taking elites while punishing ordinary citizens.
3. Bureaucratic Slavery: The War Against Self-Sufficiency
Fiat governance has transformed human beings from self-reliant individuals into bureaucratic dependents. Governments and corporations engineer complexity—compliance laws, credential requirements, and licensing systems—to keep individuals trapped in cycles of employment and taxation.
Eudaimonia thrives in societies where individuals have control over their work and creations, yet fiat systems strip away autonomy. Most people today work jobs they do not love, merely to service debts or meet rising costs.
Critical Evidence: A 2019 Gallup survey found that 85% of employees worldwide are disengaged from their jobs, meaning they find no real meaning in their work. Meanwhile, U.S. student loan debt has surpassed $1.7 trillion, forcing young people into decades of financial servitude before they can even attempt to pursue meaningful work.
---
Can Eudaimonia Be Resurrected?
1. Bitcoin and the Return of Hard Money
If fiat is the poison, Bitcoin might be the antidote. Unlike fiat, Bitcoin is scarce, decentralized, and operates on proof-of-work, rewarding merit rather than proximity to power.
A Bitcoin-based economy restores long-term thinking by allowing individuals to store value in a deflationary asset rather than being forced into high-risk speculation. When people do not need to chase inflation, they can focus on work that is intrinsically fulfilling rather than merely profitable.
Critical Evidence: Countries like El Salvador have adopted Bitcoin as legal tender to escape the inflationary policies of central banks, while Bitcoin’s fixed supply of 21 million ensures its purchasing power cannot be arbitrarily diluted.
2. Decentralized Systems and Self-Sovereignty
Beyond money, decentralization itself is a means of restoring eudaimonia. Peer-to-peer networks, open-source software, and blockchain verification (such as DamageBDD) enable individuals to engage in meaningful work without needing corporate or governmental permission.
Critical Evidence: The rise of remote work, creator economies, and DAOs (Decentralized Autonomous Organizations) shows that people can be productive outside traditional corporate structures when given the right tools.
3. The Renaissance of Craftsmanship and Knowledge
A return to hard money and decentralized economies will likely trigger a renaissance of craftsmanship. When individuals no longer need to rush for short-term profits, they can master trades, sciences, and arts in ways that have not been possible since the fiat era began.
We are already seeing glimpses of this in the resurgence of interest in sovereign computing, homesteading, and open-source development—a direct rebellion against the fiat model of centralization and planned obsolescence.
Critical Evidence: The growth of FOSS (Free and Open Source Software) and Bitcoin development reflects a shift toward work driven by passion and principle rather than extractive financial incentives.
---
Conclusion: The Path Forward
Eudaimonia is not dead, but it has been suffocated under the weight of fiat. By restoring individual sovereignty—through sound money, decentralized verification, and self-sufficiency—we can resurrect the human spirit. The transition will not be easy; it will require a rejection of the comfort fiat provides in exchange for the struggle that meaningful existence demands.
Yet, for those who seek mastery, virtue, and true fulfillment, there is no other choice. The fiat era has stripped humanity of its highest potential. It is time to reclaim it.
-
![](/static/nostr-icon-purple-64x64.png)
@ b8af284d:f82c91dd
2025-02-07 08:18:53
![1.00]()
Liebe Abonnenten,
Zeit für ein kurzes Innehalten:
BlingBling existiert seit knapp über vier Jahren. Als ich diesen Newsletter im November 2020 startete, setzte Bitcoin gerade zu einem erneuten Bullrun an. Die Marke von 10000 US-Dollar war gerade nachhaltig durchbrochen worden, und es war ziemlich unglaublich, wie diese missverstandene und von den Leitmedien geschmähte und immer wieder totgesagte Kryptowährung sich schon wieder aufzublähen begann. Ein paar Monate später würde Elon Musk bekannt geben, dass man Tesla nun mit Bitcoin bezahlen könne (eine Aussage, die er kurz darauf wieder zurücknahm).
Mein persönliches Interesse für Bitcoin war schon einige Jahre vorher entstanden. 2013 kaufte ich für einen kleineren Betrag Bitcoin. Ich lebte damals in China und beschäftigte mich viel mit Kapitalverkehrskontrollen. Reiche Chinesen versuchten immer wieder, Geld außer Land zu bringen - das Gesetz aber verbot Summen über 50000 US-Dollar. Der Sinn einer dezentralen, nicht zensierbaren Währung leuchtete mir halbwegs ein. Ähnlich wie das Prinzip, wonach ein begrenztes Angebot bei steigender Nachfrage im Preis steigen müsse. Mein Verständnis aber blieb vage, und medial wurde Bitcoin damals vor allem mit der „Silk Road“ assoziiert, einem Online-Marktplatz, auf dem man alles, aber vor allem Drogen kaufen konnte.
Den Bullrun 2014 verschlief ich - was übrigens die beste Strategie für langfristigen Erfolg beim Investieren ist. Denn beim nächsten Zyklus 2017 verkaufte ich einen Großteil meiner Coins. Hätte ich den auch verschlafen, wäre ich heute um einiges reicher. Zunächst aber dachte ich, das Richtige getan zu haben: Anfang 2018 kollabierte der Kurs von 18000 US-Dollar auf 2000 Dollar. Vergleiche zur Tulpenblase wurde gezogen, Bitcoin final für tot erklärt, der Host des Podcasts „What Bitcoin Did“ veröffentlichte einen Thread auf damals noch Twitter, indem er schilderte, wie er[ „life changing money“ gewann und wieder verlor.](https://buzzchronicles.com/b/life/1042/)
![1.00](https://route96.pareto.space/b86d4df7f49aef412f519b018137fd8bc5a2912f63872313a6ee9e2dbf05b200.webp)
Es war allerdings in diesem Tal der Tränen als mein persönliches „Orange Pilling“ voll einsetzte. Die Frage: Was habe ich da gerade erlebt? Was ist das?, trieb mich um und führte zu einer immer tieferen Beschäftigung mit Bitcoin. Mal glaubte ich, den Fehler gefunden zu haben - nur um dann wieder eines Besseren belehrt zu werden. Die klugen Videos von [Andreas Antonopoulos](https://www.youtube.com/@aantonop), die radikalen Bücher von [Saifedean Ammouz](https://www.amazon.de/Bitcoin-Standard-Decentralized-Alternative-Central/dp/1119473861/ref=sr_1_4?crid=2ENAZVEQW95DD\&dib=eyJ2IjoiMSJ9.fIHrY7iwwmUfVPEyDXmqyI54rrBXt-TQLdej-Ir4rb5QAeeguGjjfdOLUnS7rSxIAWFjqn0EAK4faxLtbWAh05OYLcyCJ2F6ZGw1fymh2OC4a3eGApy0Q6_Xb7HVNN6EmUHKEeUCxUhv50inFiQ_YUXc9UaP4cDWbmXbMkUe0q6LD8wp7CM-qNptFYC1QooEMQ6wSUov73kdxY5oHfsgB-6O-ToU7WoB1WnbqmrqxEA.4GpR2xzLcC8dO-ToiIrrGwj9bs76ayspfexOM-wJ7rY\&dib_tag=se\&keywords=saifedean+ammous\&qid=1737818715\&sprefix=Saifed%2Caps%2C95\&sr=8-4), die cool-entspannten Podcasts von Peter McCormack ließen mich immer tiefer in den Kaninchenbau sinken. Das Verblüffende: Man traf Gleichgesinnte. Es war in diesen Jahren, in denen aus einem Netzwerk von Nerds eine eigene Subkultur wuchs. Sie hatte eigene Memes, Codes und vor allem Werte: Freiheit. Maximale Freiheit und Verantwortung für den Einzelnen.
All dies wurde ein Jahr später aufs Härteste auf die Probe gestellt. Die Lockdowns und der darauffolgende Impfdruck verengten in den traditionellen Medien das Overton-Fenster. Abweichende Meinungen wurden als “Verschwörungstheorien” gebrandmarkt und ins Abseits gedrängt. Nicht dass alle Bitcoiner Impfgegner oder Lockdown-Kritiker gewesen wären, aber in diesen Kreisen waren anders als in großen Teilen der Öffentlichkeit überhaupt noch kritische Diskussionen möglich. Bitcoiner waren geschult darin, selbstständig zu denken, und Paradigmen zu hinterfragen. Dies und die Freude über neue Allzeithochs machten die dunklen Jahre 2021/22 um einiges erträglicher.
Der Bullrun endete final 2022 mit der FTX-Pleite. Wieder schrieben viele Medien Bitcoin tot. Wieder schwadronierten etablierte Ökonomen von einer angeblich “durch nichts gedeckten Spekulationsgeld”. Operation Chokepoint 2.0 sollte dem System die Luft zum Atmen abschnüren. Aber die Katze war jetzt längst aus dem Sack. Bitcoin hatte sich festgebissen im System. Michael Saylor alchemisierte weiter Fiat-Geld zu digitalen Gold, El Salvador akzeptierte Bitcoin als Zahlungsmittel und Graswurzel-Initiativen wie 21-Stammtische konvertierten No-Coiner. Mit der ETF-Zulassung im Januar vergangenen Jahres wurde die Basis für einen neuen Bullrun geschaffen.
![1.00](https://route96.pareto.space/67de3347cb658c58c5a2c5c29256ef0b0737ba17a47488ea1c171576ded52266.webp)
***We made it.***
Diese Woche ist Bitcoin im Mainstream angekommen. [Silk-Road-Gründer Ross Ulbrich](https://x.com/RealRossU/status/1882609887878029519)t wurde nach 12 Jahren Haft begnadigt. Donald Trump launchte seinen eigenen Meme-Coin und vor ernannte er die [Senatorin Cynthia Lummis ](https://www.btc-echo.de/schlagzeilen/lummis-leitet-krypto-ausschuss-kommt-die-btc-reserve-200110/)zur Präsidenten eines neu geschaffenen Crypto-Ausschusses. Eine strategische Crypto-Reserve soll angelegt werden. An der sonst so peniblen getätigten Unterscheidung zwischen Crypto und Bitcoin muss man sich ausnahmsweise einmal nicht stören. Die dürfte eher ein Zugeständnis an World Liberty Finance, den Fund der Trump-Sprösslinge, diverse DeFi-Disruptor sein. Bitcoin bleibt König.
Und jetzt?
Wie jede Party wird auch diese enden, und wie nach jedem Bullrun wird danach ein Bärenmarkt folgen. Es kommen weitere Herausforderungen. Bitcoin, einmal von Eliten begriffen und adaptiert, wird von diesen benutzt werden. Macht korrumptiert. Auch die Guten. [Gold, der analoge Vorläufer von Bitcoin](https://blingbling.substack.com/p/die-rebellen), wurde immer wieder zentralisiert, eingezogen und anschließend in Form von Schuldscheinen wieder an die Bevölkerung ausgegeben. Bleiben wir wachsam.
Aber jetzt ist es erst einmal Zeit zu feiern: Lang lebe der König!
![1.00](https://route96.pareto.space/abe595478ac639b95917c6e489ea16a24427376354a3433ea525ebaa70f623fa.webp)
-
![](/static/nostr-icon-purple-64x64.png)
@ 6ad3e2a3:c90b7740
2025-02-07 08:17:18
When I used to work in fantasy sports, people would ask me questions about their teams, e.g., which players to start, who to drop. What they didn’t realize is I had seven of my own teams to worry about, was already living and dying with my own myriad choices, good and bad, I made every week. The last thing I needed was to make a decision for them, see it go bad and suffer more on their account.
I’d tell them, “You decide, I’ve got my own problems.”
. . .
I don’t know what I’m doing. Ideas which feel like insights come to me, I try to articulate them to my satisfaction and post them (with some editing help from Heather.) Often I feel like I should be producing more work — after all, I don’t have a job any more, I have plenty of time. Walking the dog, exercising, managing your finances, picking up the kid, putting food on the table (literally) is well and good, but fulfilling your duties is not enough. You need to stay in the game. What game is up to each person, but it should be a game you enjoy, one that draws on skills honed over decades by the accident of your particular interests.
. . .
Writing and ideas can’t be produced on demand. I mean they can — and I did it for 22 years on a particular topic — but I don’t mean that kind of writing. I don’t want a schedule. I don’t need more rules, more discipline, more “hacks.” Discipline is like the interest on a 30-year mortgage. Initially it’s most of the payment, but over time it cedes weight to understanding which is like the principal. Discipline without understanding is like an interest-only mortgage. You pay it every month and get nowhere.
Even when insights arrive they can’t always be articulated sufficiently and coherently. Many insights are of the one sentence variety — fine for a social media post, but you can’t send out an email newsletter 10 times per day with one sentence insights. It doesn’t work over that medium.
That’s a dilemma because posting on social media doesn’t feel like proper work. Yes, you’re reaching people, affecting the zeitgeist in whatever small way — but there’s something addictive and unsatisfying about it, like eating candy instead of food. Don’t get me wrong, I stand by my posts (consider them organic, artisanal candy) but shitposting and the immediate feedback received therefrom keeps you only on the periphery. I need to connect with something deeper.
. . .
I’ve spent a lot of time dissecting the various pathologies of the laptop class, of which I’m obviously a part as I literally type this in a coffee shop on my laptop! The need to believe they are empathic and good overwhelming any rational sense-making and basic morals. Men dominating women’s sports, child sex changes, forced injections, criminals running rampant, cities in decay, calls for censorship and funding for foreign wars. The authorities patted them on the back, their peers accepted them and their overlords promoted them so long as they hewed to the narrative.
The freakout we’re presently witnessing is not about the billions in taxpayer money no longer being sent for DEI training in some foreign country, i.e., money-laundering to favored interests and cronies. They’re not really upset FBI agents are being fired, secrets are being revealed, that we are finally making an effort to prevent fentanyl from flowing across the border and killing our fellow citizens. These are good things, and even if you don’t agree, none of it is grounds for the meltdowns I see every day on social media.
What’s really happening is people who were assured they were the “good”, the empathic, the compassionate ones, those who towed the line during covid, got their boosters, wore their masks, “social distanced,” put pronouns in their bios, are being confronted with a terrifying realization: the behaviors and beliefs, to which they so dutifully attached themselves, for which they publicly and stridently advocated, whether online or at Thanksgiving dinner, are no longer being rewarded. In fact, they are being openly ridiculed. Instead of the pat on the back, increasingly Team Good is facing mockery and outright scorn.
There will be no legal consequences. No one will be arrested or put in a camp, delusions of persecution notwithstanding. If you produce real value for a real employer, you are not at risk of being fired. If you insist on perpetuating your derangement on social media you will not be deplatformed or canceled (that only happens to people speaking the truths inconvenient to the powerful.)
No, the reality is in some ways far worse: your entire worldview, on which you staked your self-image, is being dismantled in real time. You are no longer “good,” it’s becoming obvious to most the policies for which you advocated were catastrophic, the politicians for whom you voted deeply cynical and corrupt. The gaping abyss within your being to which you attached this superstructure of self-affirmation is dissolving into thin air. You are not “superior” like you thought, you are just another person suffering and existing like everyone else. And your only choices are to face that daunting reality or cling to a dying and useless paradigm, the end game for which is only madness.
We all want to feel good about ourselves, and like an obese person drugging themselves with high-fructose corn syrup for years, you have gorged on the distorted approbation of a sick society that, unpleasantly for you, is starting to heal. Your first laps around the track, so to speak, are going to hurt a lot.
. . .
I probably went on too long about the laptop class freakout. I have a lot of resentment toward the way they behaved the last five years. But I started this essay with the idea that I have my own problems, and in the end, I am not much different from them.
I want to produce more work, and of higher quality, but to what end? To feel good about my contributions, to have a sense that I am “good.” Maybe it’s not “good” in the lame “I complied with authority, and everyone likes me” kind of way, but it arises from the same source. That source is the emptiness within, wherein we require accolades, dopamine, positive feedback as a kind of justification for our existence. “No, I am not squandering my time on earth, living a comfortable life, I am asking hard questions, connecting with people, sharing hard-won insights. I am useful! I am good! I got my sixth dopamine booster from writing yet another essay!”
. . .
There is an irony in writing this piece. I feel as I type the cathartic nature of expressing these feelings. I am doing something worthwhile, everything is flowing out of me, the minutes are sailing by. I am identifying and solving this thorny problem simultaneously, engaging with the emptiness and dissatisfaction. The solution isn’t in the output, whatever one might think of it, it’s in giving attention to the feelings I’ve squandered too much time avoiding. I feel unworthy not because I do not produce enough work, it turns out, but because I am unwilling to connect with my deepest nature.
. . .
No matter how uneasy you feel, no matter how much fundamental doubt you have about your value as a human being, you can always start where you are. The feeling of unworthiness, the need for an escape, the craving for some kind of reward from your peers or the authorities or whatever easily-consumed carbohydrates you have in the kitchen is simply the present state in which you find yourself. It is not wrong or bad, it just is. And what is can always be examined, observed, given attention. Attending to that discomfort is always within reach.
. . .
The last thing I want to do is write an essay, face a purgatory of sitting down and consciously putting my feelings into words. It’s so much easier to distract oneself with all the news about the world, check 100 times a day the price of bitcoin and my other investments. But purgatory is the only way out of hell. The hell of wanting to succeed, of wanting to become “good.”
For some, that astroturfed worldview they so painstaking affixed to their empty souls is dissolving toward a revelation of the emptiness beneath. And unsurprisingly they are freaking out. But I’ve wasted too much time arguing with them, pointing out the ways in which they’re misinformed, driven by fear and derelict in their basic epistemic responsibilities. If you want to hold onto the lies you were told, knock yourself out. I’ve got my own problems.
-
![](/static/nostr-icon-purple-64x64.png)
@ da0b9bc3:4e30a4a9
2025-02-07 07:26:07
Hello Stackers!
Welcome on into the ~Music Corner of the Saloon!
A place where we Talk Music. Share Tracks. Zap Sats.
So stay a while and listen.
🚨Don't forget to check out the pinned items in the territory homepage! You can always find the latest weeklies there!🚨
🚨Subscribe to the territory to ensure you never miss a post! 🚨
originally posted at https://stacker.news/items/878449
-
![](/static/nostr-icon-purple-64x64.png)
@ 21db9b8a:2a94c796
2025-02-07 07:06:49
Fair warning: This is an explicit and erotic story involving extremely taboo themes that would not allow it to be published on most sites that host erotic stories. But what is Nostr for if not full freedom of speech?
All characters in this story are fictional only. It is not in any way based on true events.
This is also not your average stroke story. It will be released in chapters, and while there ***is*** sexual content in each chapter, there is no full-on sex until late in chapter 4. It is a story of sexual discovery and exploration between young people who have few resources to educate them, but also little to hold back their experimentation.
I hope you enjoy it. If not… Well… You don’t have to host it on your relay, and you can always mute me so you don’t see any more.
***
Dani barreled through the dining room in pursuit of her younger brother, Jake, who sped out the sliding glass door onto the back deck, making a feeble and unsuccessful attempt to close the door behind him as he ran. He had always been faster than Dani over short distances, and his recent growth spurt, just before turning thirteen, had made it that much more difficult to catch him.
"Give them back, you thief!" she shouted after him, taking just enough time to open and fully slide the door closed behind her, in order to avoid incurring her mother's wrath.
It was all the lead her brother needed. He leaped off the deck into the sunlit back yard and sprinted over to one of the tall maple trees at the edge of the lawn. By the time Dani had made it to the yard, her brother was already scurrying up the trunk with her sunglasses gripped between his teeth. Jake was younger than Dani by seventeen months, but he had recently grown to be two full inches taller than her, and he had begun to develop muscle tone to compliment his athleticism. It also helped him climb trees with frustrating ease.
Dani jogged to the base of the maple, which had no limbs for at least the first ten to twelve feet, and glared up at her brother lounging across two of the branches. He was now wearing her sunglasses to further taunt her. The twerp took his role as the annoying younger brother seriously, despite their age difference being relatively small. Dani's other two brothers, ages ten and seven, had thankfully not learned Jake's bad habits and generally left Dani alone, but her oldest brother seemed to make it his mission to infuriate her. It was just for sport, Dani knew, and Jake really was alright to be around most of the time, but let him get bored and it always seemed like she was the one who paid for it.
"Give me a break, Jacob William Hansen!" she demanded, using his full name like their mother often did when she wanted him to know he was in trouble. She shaded her eyes from the early summer sun as she continued to glare up at him. It did not seem to have the same effect as when her mother used it. "When you come down from there, I'll have your hide!"
"You may have my hide, Danielle Elizabeth Hansen,” he mocked, “but you won't have your glasses." With that, he plucked them from his face and hooked them over a smaller branch above him.
"You wouldn't dare leave them up there!" she asserted, not really sure whether he would or not. Jake knew better than to push things too far, but he might not consider abandoning her sunglasses in the limbs of a tree to count as 'too far'.
"What are you going to do? Go tell on me?" Of course, he knew she would not. They had long since stopped tattling on one another. In their household, the tattler often brought as much punishment upon him or herself as the one tattled on, and sometimes more. Instead, Jake and Dani had agreed to settle most matters between themselves, and only bring their parents in when it was more serious, like when Jake had planned to jump off the garage roof onto his skateboard, and Dani just knew he would have cracked open his skull if he had tried it.
"If you want your sunglasses back, you are just going to have to come up here and get them."
"How did you even make it up there?" she demanded. Dani was no slouch at climbing trees most of the time. She liked to play in the woods and didn't mind getting dirty, but the trees she climbed at least had branches close enough to the ground that she could jump up and grab hold of them. This maple had nothing but bare trunk for several feet above her head.
"You didn't see how I did it?" Jake asked. "You just have to wrap your legs around it and use them to hold on. Then grab as high as you can with your arms and pull your legs up higher."
Dani cocked an eyebrow at him dubiously, unsure whether she could mimic the technique. For one, her brother didn't have breasts to contend with, and Dani had been a bit of an early bloomer in that department. At fourteen, she already would have filled out a B-cup bra, if she ever wore anything other than sports bras. The lumps of fatty flesh sticking out from her chest were horribly annoying and always getting in the way. It seemed more than likely that her breasts would do just that while trying to shimmy up the tree as well.
Shrugging to herself she decided to give it a shot. She approached the trunk and wrapped her arms around it as high up as she could reach. She could just barely touch her fingers together on the other side when hugging as closely as her chest would allow. Supporting herself with her arms, she jumped and wrapped her legs around the trunk as well and felt the bark lightly scratching the inside of her thighs and back of her calves. It probably wasn't the best idea to be doing this in her cutoff jeans and a tank top, but it was far too warm out to wear her usual jeans and a hoodie. She would just have to tough her way through it.
Gritting her teeth she pushed her body upward with her legs, which invariably tugged the front of her tank top downward to expose part of her sports bra underneath, then she reached as high as she could with her arms and let her weight settle on them to pull her legs up again. This caused Dani's breasts, which were being crushed between her and the tree, to push upward, partially spilling out of the top of her sports bra and tank top. As predicted, they were getting in the way of things once again.
Dani was far too distracted to think about what kind of display she was putting on for her brother above her, though. As her weight had settled, her crotch had slid against the trunk and caused a pleasurable sensation to well up in her nether-regions. It was a shock to Dani, and she nearly let go of the tree. She'd never felt anything quite like that from “down there” before, and it was distractingly pleasant. She sat frozen in place for a moment, trying to make sense of the feeling.
"Well?" her brother voiced his impatience. "Are you just going to hang there like a koala or are you going to come get your shades?"
Letting out a low, frustrated growl, Dani continued upward, the pleasant sensation in her groin returning each time she slid it against the trunk. What on earth was going on? This was not a situation that should be causing her pleasure whatsoever, let alone down there. Her legs and arms felt like they had several new scrapes from the rough trunk, but her crotch was alight with a dull pleasurable throbbing that Dani had never experienced before. Then again, she'd never thought to rub it against anything before.
As she finally shimmied her way high enough to grab hold of the lower-most branch, Dani was panting from more than the sun's heat and her exertion. Pulling herself up onto the sturdy limb, she hoped her brother didn't notice the flush in her face or the way she self-consciously adjusted her tank top so that it properly covered what it was meant to. Then she looked up to see him holding her sunglasses out to her from the branch he was seated on.
"Not cool, Jake!" she chided, snatching her sunglasses from his hand and inspecting them for damage. Satisfied they were none the worse for wear, she slid them into her dark hair, which was pulled back into a loose ponytail that hung just past her shoulders, so that they rested securely atop her head.
"Oh stop your whining," he brushed off her anger. "You know you needed some motivation to get out of the kitchen. Mom has had you cooped up in there all morning."
"Yeah, that's because it gets too hot to bake in the afternoon, doofus! Don't you want fresh bread for the monstrous sandwich I'm sure you will somehow manage to stuff down your throat for lunch?"
"Fair point," Jake acknowledged. "But aren't you glad to get out and get your blood pumping?"
"No!" Dani retorted. "Look at me!" She held her scraped-up arms out for his inspection. "I blame you for this!"
"Oh come on! You love it!" Jake insisted. "I have seen you laughing off far worse war-wounds than that."
Dani sighed and shook her head at him. He was right, of course. She was known for playing hard. Hard enough to keep up with the boys in the neighborhood, who often used to wrestle her like she was one of them. At least, they had until recently. Since she'd developed breasts they all seemed scared of her. All except Jake, but he was her brother. They had never been awkward with one another, and he still didn't seem to notice that she was a girl, let alone growing into a woman.
For most of their childhood, Jake was the only playmate Dani had, so she had adapted to playing like a boy. Instead of Barbies and tea sets, it had been Legos and Nerf guns, and she had loved every minute of it, even if it did tend to come with a fair share of bruises and scrapes. And sure, Jake could be an absolute pest, but it was mutual antagonism born out of playful sibling affection.
"Fine," she admitted. "It was a welcome rescue from mom's home ec class. But you're still going to owe me for all the scrapes I have from climbing this tree. My legs are even worse than my arms!"
"I'm sure you'll think of some way to get sweet revenge," Jake laughed. "You always do."
Again, he was right. As much as Jake infuriated her with his taunting, teasing, and pranks, Dani could dish it right back at him. That was part of their strange sibling relationship that made it look to all on the outside like they couldn't stand one another, when in reality they were best friends and would do anything for the other when it really mattered.
"Alright, meat-brain," Dani changed the subject, using her favorite pet name for her brother. "Now that we're free of mom's clutches for the afternoon, what should we do with ourselves?"
"I don't know what you're going to do, but when Finn gets home from school, we're going fishing."
Finn was Jake's best friend who lived just a few houses down from them. While Jake, Dani, and their siblings were homeschooled by their mother, Finn went to public school and wouldn't be getting home until mid afternoon. Soon school would be out for the summer, making Jake and Finn nearly inseparable during daylight hours, but that was still a week and a half away, despite the heat wave they were getting in early June, and then Finn's family would be going to summer camp for three weeks, so the boys were taking advantage of as much time as they could get to hang out while they had the chance. Dani knew that she only had a short time while Finn was at camp to have her brother to herself before he would be all but lost to her for three months, since Jake and Finn usually didn't like having her along with them anymore. They had played together for years, but over the last several months, the two boys had started excluding her from their activities.
That left Dani feeling quite alone when Jake and Finn rode their bikes off to wherever they hung out these days. She had no friends of her own in the neighborhood. Her closest female friend, Audrey, lived almost a half-hour away, in a small town to the north, so they only really got to see each other at church, and the occasional planned sleepover.
"Fine, ditch your sister, as usual," Dani complained, rolling her eyes at her brother.
"Don't be like that, Dani," Jake protested. "It's just awkward talking about girls with your sister around, ya know?"
"Like you actually have any girls to talk about!" she teased.
"Maybe not, but a guy can live vicariously through his best friend, can't he?"
"Ha!" Dani scoffed. "I seriously doubt Finley O'Connor has a lineup of girls to give you all the juicy details about, either. At least not any that aren't figments of his imagination."
"You might be surprised."
Was that a blush that suddenly appeared on Jake's face? Had she misjudged Finn? Jake's best friend was not what she would think of as a chick-magnet. He was a bean-pole of a boy with an unkempt mop of red hair topping his head. He had a mouth that was too large for his face that always seemed to be twisted in a mischievous grin, and an over-abundance of freckles that covered every inch of him that Dani had ever seen, which was most of him since he often accompanied their family to go swimming at the river. He did not fit into Dani's definition of attractive, nor any other girl she knew. Not that she knew many other girls well enough to talk about boys with them.
"Whatever you say, meat brain," Dani said, shifting on the branch and dropping to hang beneath it before letting go to allow herself to fall the three or four feet down to the ground. She landed on her feet, bending her legs deeply to absorb the impact, then stood up straight and defiant. Brushing her hands off on the sides of her cutoffs and looking back up at her brother. "I'll just have to figure out how to keep myself occupied, as always."
There was more disappointment in her voice than she had intended. She didn't really want to make him feel bad for leaving her without anyone to hang out with for the afternoon. She could find things to do to keep herself busy. For one, she could help her younger brothers finish up their school work, though that would likely only get her through the first hour after lunchtime or so. The benefit of being homeschooled was that you could easily get all your work done for the day in just a few short hours, instead of being cooped up in a classroom the whole day like the public-schoolers had to endure. Of course, that was also the downside, because you then had to figure out what you would do with all the extra time you had.
Then Dani remembered the pleasurable sensation she had experienced while climbing the tree. That was certainly something she could investigate this afternoon while Jake was off gallivanting with Finn. She wanted to see if that feeling could be repeated, or if it was just some kind of fluke. She wasn't about to go rub her crotch against trees where anyone might see her, though. Perhaps she could find somewhere more discreet to experiment and see if that sensation returned. It had felt SO GOOD! Surely she could find a way to make it happen again.
***
Jake watched as his sister strolled away from the tree back toward the house, her round bottom framed enticingly in her cutoff jeans. He couldn't believe he was looking at her that way; she was his sister after all, not some random girl like the ones Finn liked to show him. Yet, after watching her climb the tree to retrieve her stolen sunglasses from him, Jake could not deny that she possessed every quality that made those girls on Finn's tablet so appealing.
Finn had been sharing pictures of naked and nearly-naked girls with Jake almost since he had gotten the tablet as a Christmas present last year. Well, Jake supposed they were actually women, not girls, since they all looked much older than Dani, and most had more pronounced curves. Then again, that could just be because he was seeing them without their clothes on, while Dani's curves were usually covered up. And Dani definitely did have some curves that Jake could no longer help but notice, especially after the display he had just seen.
From his perch in the branches of the maple tree, Jake had a perfect view down the front of his sister's tank top as she had shimmied her way up the trunk. No, he had not seen her nipples - her sports bra had done it's job of holding them in - but her round breasts pressing up prominently every time she let her weight rest on her arms made it clear that she was no longer the flat-chested little girl he somehow had still thought of her as. He should not have been so naive. He knew his own body had changed drastically, but had not even considered that his sister's was changing as well, let alone that she might just look a lot like the women in those pictures when she took her clothes off.
Jake frowned, noticing that his thoughts had made his dick stiffen in his pants. These were not thoughts he should be having about his sister! Hopefully Finn would have some new pictures to distract him away from thinking of Dani in that context. For that reason and more, Jake looked forward to his friend getting home from school, when the two of them could head out to do some "fishing". Oh, they might do a bit of actual fishing as well, but most of their time would likely be spent at their fort in the woods, well away from any prying eyes, while Finn shared his latest photographic acquisitions.
It would still be a few hours before the bus dropped his friend off where their street connected to the main road, so Jake resigned himself to finding something else to distract him from thoughts of his sister until then. It was too nice a day to expect that he could get away with playing Xbox in the basement game room. His brother, Travis, should be done with his school work by now, though, and always enjoyed tinkering with bikes in the garage with him, so Jake dropped out of the tree and headed toward the house to seek his brother out.
He crossed the back lawn and their dog, Dozer, ran to meet him. He was a massive brute of a dog, being a full-bred Rottweiler, but he was as gentle and loyal as anyone could ask for with the Hansen children. Jake patted the dog's blocky head and rubbed his ears as he strode toward the back deck. He skirted around the left side of the deck and down the concrete stairs to an exterior door that led directly to the basement where he expected he would find his brother.
All of the Hansen boys had rooms in the basement. Jake, as the oldest boy, had his own, while Travis and Aaron shared a room on the opposite end, next to the bathroom, with the game room and stairs up to the front entryway situated conveniently in-between. At age ten, Travis was three years younger than Jake, though he would be turning eleven in the fall, so it was more like two and a half years. Aaron was another three years younger than that, at age seven. The two of them were very close, just like Jake and Dani had always been, but lately Travis had been wanting to spend more time with Jake, whenever the older boy would allow it.
The last of the Hansen children was their adopted sister, Rebecca, who was only two years old. Everyone called her Bec, and she lived in the nursery upstairs next to their parents' master bedroom. Their family had fostered her as an infant, and finally adopted her just last year. Dani had been thrilled to finally have a sister, despite the massive age difference, and couldn't wait to teach the child all about being a girl. Not that Dani really had any clue how to be a girl herself, having grown up with three brothers.
As expected, when Jake opened the door into the basement, which opened into their game room, his younger brother was seated facing him on the couch with an Xbox controller in hand, transfixed by the large flat screen television on the wall. He looked quite a lot like Jake, with his short, brown hair and blue eyes. The younger boy hadn’t yet started to fill out with muscle tone, though, making him look scrawny, with a head too large for his stringy limbs. The effect was particularly humorous when he stood next to Jake.
"You'd better not let mom or dad catch you on that when the sun's out," Jake warned his brother.
"Mom's still busy helping Aaron with his math, and Dad's working on tonight's sermon," Travis assured him. "Besides, I was going to get off in just a few minutes anyway."
"Oh trust me," Jake began, crossing to the couch and sitting next to his brother, to see that he was playing Minecraft. "I know how 'just a few minutes' can turn into several hours without even realizing it. Why don't you come hang out in the garage and we'll get that chain tightened on your bike so it's not always falling off on you."
"Really!?" Travis exclaimed, putting the controller down and turning to Jake with an excited look on his face.
"Of course, runt!" Jake had continued to call his brother the pet name even after Aaron was born, much to Travis' chagrin. "What are big brother's for?"
He wasn't about to tell him that the reason he was suddenly so willing to help his little brother out was to take his mind off of thinking about Dani. Seeing her round breasts pressing out of the top of her tank top had shattered Jake's ability to think of her in practically the same terms as his brothers, or one of his male friends. Now he found himself remembering her long, smooth legs, and round bottom swaying back and forth hypnotically as she had walked back toward the house, and it seemed the more he told himself he shouldn't think of her that way, the harder it was not to.
Travis shut off the Xbox and the two boys marched up the stairs toward the door to the garage. As Jake pulled it open, he heard his mom call out from the dining room. "You boys don't go far! Lunchtime is coming in thirty minutes!"
"Don't worry mom!" Jake called back. "Travis and I will just be in the garage working on his bike!"
He didn't wait for a response before disappearing into the dark and hitting the button on the wall to open the massive roll up door on the two-car garage, allowing the sunlight to flood in. Then he and Travis went to work on the bike, not only tightening the chain, but straightening the handlebars that had been twisted to one side when Travis had crashed into a tree, and replacing one of the pedals that had nearly fallen apart since it was a hand-me-down bike from someone at their church. Travis was thrilled and rode the bike up and down their short driveway and around the cul-de-sac until their mother called them in for lunch.
After scarfing down a massive sandwich, as Dani had predicted, a bag of chips, and a banana, Jake offered to take Travis and Aaron on bike ride to the park and back to pass the time until Finn got home from school. He worried that Dani might want to come, too, but she had disappeared as soon as she was done with lunch without a word. That was highly unusual for her, but not unwelcome since Jake wasn't sure how he would keep himself from ogling her body if she came along.
Thankfully, the bike ride with his younger brothers ate up a fair amount of the afternoon. When the time finally came for Finn to be dropped off, Jake let his mom know where he was going then grabbed his fishing pole and tackle box and hopped on his bike once again to pedal down to the corner where the bus dropped off all the kids that lived on their street. He arrived just as the bus was pulling away, and saw his friend, backpack slung casually across one shoulder, strolling toward him among four other kids from the neighborhood of various ages.
"Jeez Jake!" Finn exclaimed. "You must have been bored out of your mind to meet me right as I got dropped off!"
"Let's just say I'm glad you're finally home," Jake responded, swinging his leg across the back of his bike to dismount and turning it around to walk along side his friend back the direction he had come.
"Yeah, I'm finally free from that prison, even if it is only until tomorrow," Finn joked. "Seriously, though, you usually come find me at home, after I've had a chance to ditch my bag and pack us some snacks. What gives?"
Jake sighed. He certainly wasn't going to tell his friend the real reason he was so eager to hang out with him. What would Finn think of him if he knew he was having dirty thoughts about his own sister?
"It's been a long day, is all," he said finally, and that was partially true. It ***had*** felt exceptionally long. "And we won't be able to stay out long tonight, since I have church."
"Oh that's right, it's Wednesday, so you have to go be an altar boy tonight," Finn teased. "No wonder you want to get your debauchery in ahead of time."
"It's not like that..." Jake protested halfheartedly. "But now that you mention it, do you have any new pictures to share?"
Finn glanced around them to see if any of the other kids who had gotten off the bus were still walking close by, but they had all split off to head to their own homes.
"Dude... I've found us some good ones. You'll have jerk-off material for the next month! Or you would if you had a photographic memory."
"Oh shut it!" Jake said, punching his friend's shoulder. "It's not like your memory is any better."
"Doesn't have to be. I'm the one with the tablet," Finn pointed out as they turned into his driveway and Jake laid his bike down carefully on the front lawn, making sure the fishing gear didn't get damaged.
"You say that now, but just make sure your parents don't catch you with those pictures saved on it," Jake warned.
"Oh, don't worry about that," Finn assured him. "My parent's don't check what I've been doing on it. They only got it for me because they figure it will keep me from being too noisy and disturbing their peace. I doubt they could even figure out how to turn it on."
Finn wasn't exaggerating. His parents were much older than Jake's, and had not grown up with computers. They had both been married before and had adult children from their previous marriages, some of whom had their own kids already. They got together and had Finn and his older brother Scott when they were both in their forties. Now they were in their late fifties and far from being computer literate. The only reason they had an internet connection at all was because it had come with their cable TV plan and Scott had set it up.
"Wait here for a minute," Finn instructed. "I just have to drop off my bag and grab my gear." With that the red head disappeared inside his front door, appearing a few short minutes later with his own fishing pole and tackle box. He'd also changed into shorts and a t-shirt. As he approached, he popped open his tackle box and showed Jake that his tablet was tucked inside, then he retrieved his own bike from the side of the garage and the two boys headed out.
They rode through the park and out of the back of the neighborhood, where it was bordered by logging company land, serviced by a bumpy dirt road. Nearly a mile down the dirt road, they cut into the woods, stowing their bikes in some bushes. The forest was thick here, and full of fallen logs that the boys deftly maneuvered over and around to reach their destination. Barely visible in the undergrowth ahead was a short, vaguely unnaturally shaped structure that was the fort the two of them had constructed the previous summer, and had continued to improve upon since then. It was made entirely of natural materials, a fact that Jake was particularly proud of, and only large enough for three or four to sit in comfortably. They had constructed it by lashing logs together using roots and vines and anything else that would work as cordage, then taking evergreen boughs to create a roof and walls that did a fair job of blocking the wind, though a less fair job of keeping out the rain, as they had discovered the hard way.
The important thing was, the fort was a place they could reasonably expect to be left alone. Even in hunting season, not many people were wandering these woods, since they were too close to residential neighborhoods to safely shoot a rifle. The logging company that owned the land didn't even seem to have any intention of logging it anytime soon. They might have in years past, but that was before the city had grown so much that all the neighborhoods had sprung up around it. Indeed, the most likely event would be that the logging company would sell the land to a developer and yet another neighborhood would be built. Until then, Jake and his friend could use their fort to hide away and look at dirty pictures on Finn's tablet.
The two of them crawled through the small opening that served as a doorway and Jake was immediately enveloped by the scent of pine and spruce from the boughs laid on the walls, roof, and even the floor of their fort, to make it more comfortable to sit inside. The interior was not tall enough for him to stand, though he could move around on his knees without his head brushing against the roof, and the evergreen boughs were so thickly piled on the walls and roof that the only light within was the meager amount that filtered through the doorway. Jake took a seat with his back to one of the walls while Finn sat beside him and powered up his tablet.
"I have some real babes to show you today, my friend," Finn bragged, punching in his security code so that the tablet allowed him access to his home screen. Then he tapped the icon for the photos app and turned the screen so Jake could see it better.
Inside the dim fort, the tablet seemed to blaze with light as an image filled its screen. The picture was of a stunning blonde with wavy hair hanging loose to her shoulders. She was facing toward the camera as though looking past it into the distance while standing in a mostly empty room, though the background was too blurry to pick out any details. The shot only showed her from the waist up, and she was unbuttoning a pair of white jeans, though it was impossible to tell if they were pants or shorts. The top half of her body was completely bare, and her large breasts stood out proudly above her toned stomach. She was absolutely magnificent! She didn't have the biggest tits out of all the girls Finn had shown him before, but they were more than adequately large, perfectly round, and had similarly rounded areolas tipped with eraser shaped nipples. Her skin was the perfect shade of tan, with no tan-lines whatsoever.
"She's a stunner, right?" Finn asked, seeing Jake's reaction. "Her name's Nata Lee, or at least that's what she calls herself. She's got loads of pictures with her clothes on, but this is one of the only ones I could find where she shows her tits."
"She's a babe, for sure," Jake agreed, still staring at the photo. Finn swiped his finger across the screen and a new photo took the place of the stunning blonde.
Pictured was a young woman with dark blonde hair with a hint of red, tied back in a short ponytail. She was laying completely naked on a white couch with the photo taken from above looking down on her. She was staring straight into the camera, a mischievous smile on her face, with one hand caressing her shoulder and the other pressing in on an ample breast. Her breasts were easily as large as the first girl's, but they seemed to sag more. Her areolas were more oval in shape, and didn't contrast with her skin tone as much. The main attraction, though, was the bottom half of her body, with her legs spread wide to reveal her shaved pussy, it's pink inner folds poking out from between the soft outer lips. She was equally as gorgeous as the first girl, though in a decidedly different way. This girl looked like more fun, while the first looked more serious. The way her hair was tied back in a ponytail made her look younger, too, though there was no way she was anywhere near his age with tits like those. Something about her smile made Jake's cock twitch even more than looking at her naked body. It held the promise of delights he had never dreamed of.
"Another one you approve of, I take it?" Finn asked with a laugh. "Just wait. They get even better."
Swiping the screen again, a close-up image of a shaven pussy and the woman's inner thighs filled the screen. The inner folds of the pussy glistened with moisture and they were parted, revealing an oblong opening into her depths.
"Why is she wet down there?" Jake asked, transfixed by the high resolution close-up that showed her every fold and goose-bump.
"I don't know, maybe she just went pee," Finn replied. "But that's where you stick your dick in." He pointed to the opening.
"Wow..." Jake breathed. "That's crazy..."
Finn swiped the screen again, much to Jake's dismay, but his disappointment at not getting more time to inspect such a detailed image of a pussy evaporated as the next image filled the screen. It was of a brunette with long, dark hair hanging loosely over her shoulder as she leaned against a wall. The shot was taken from an angle to her left side, though not fully a profile shot, and only showed her from the chest up. What was visible was completely exposed, and she had slightly tanned skin and perky breasts that were nowhere near as big as the previous girls’, though they were adequately round, with erect nipples and round areolas that contrasted nicely with her skin tone. Somehow, those breasts were even more alluring to Jake, even though they weren't as large. What shocked and captivated him, though, was her face. Her round nose, full lips with just the hint of a smile, and thin, dark eyebrows hanging just above her sultry eyes, made her look uncannily like an older version of Dani. His sister still possessed a bit more girlish roundness to her cheeks and innocence in her eyes, and usually kept her long hair tied back and out of the way, but there was no denying the strong resemblance. Was this what she would look like with her hair down and a few more years of growing up? This girl's breasts were probably closer to the same size as Dani's, too. Was that what his sister's tits looked like under her shirt and sports bra?
The image had only been on the screen for a few seconds when Finn suddenly swiped it away saying, "Sorry, I thought I had deleted that one."
"What? Why?" Jake asked, looking up from the tablet, which now had a busty redhead filling the screen.
"Because..." Finn hesitated. "That one looks a lot like your sister, and I thought that might be weird."
"Oh..." Jake said, feeling his face turn crimson and suddenly glad that it was too dark in the fort for his friend to see. "I... I hadn't really noticed."
Finn chuckled nervously and said, "I suppose you wouldn't if your attention was on her tits the whole time."
"Right?" Jake agreed, adding his own nervous laugh. Then it suddenly hit him that his friend had been looking at pictures of someone who looked like his sister. "Hey! Why did you have that picture in the first place if you know it looks like Dani?"
"Chill bro!" Finn started, setting the tablet down on the opposite side of him from Jake and putting his hands up defensively. "I am sure that all of these girls look like the sisters of someone we know."
"That's probably true, but this one looks like ***my*** sister, and you ***knew*** it did when you saved it to your tablet!" The heat in Jake's face was growing and he wasn't sure if it was because of his embarrassment or his anger at his friend.
"Look, I can understand why you're mad. You have every right to be the protective brother." Finn edged away from Jake a few inches as he spoke. "But before you pummel me, you have to admit that Dani is hot as fuck, and I am not going to be the only guy to notice."
Jake certainly did ***not*** want to admit that his sister was hot, but then hadn't that been his issue all afternoon? He'd never thought of her in those terms before, but he'd suddenly had her femininity thrust in his face and he had to admit that it was really messing with his perception of her. Now, after seeing a picture of a naked woman who looked uncannily similar to her, it was even harder not to think of Dani as incredibly attractive, or as Finn had put it, "hot as fuck".
The steam had been taken out of his anger, but Jake still wasn't in any mood to hang out with his friend, knowing that Finn had thought of Dani in similar terms as he was reluctantly having to admit he now did as well. Finn was right, of course, and there would probably be loads of guys who would think of his sister that way, but Jake simply wasn't prepared to find her attractive himself, let alone for anyone else to have the same opinion.
"Whatever, man..." Jake said, crawling to the doorway. "I'm going home to get dinner before church tonight. Maybe we can go fishing tomorrow." The tone of his voice made it plain that he didn't plan on it. He emerged from the fort and retrieved his bike from the bushes without even waiting for Finn's reply. How on earth was he going to make sense of his friend's dirty thoughts about his sister if he couldn't even make sense of his own?
***
As Dani rode home from church that night, she thought back on the events of the day. After chasing Jake out of the house to retrieve her sunglasses, and discovering the pleasant sensation in her groin when she rubbed it against the tree while climbing up after him, she had looked forward to finding herself some alone time to see if she could make it happen again. First, though, she had helped tutor her youngest brother, Aaron, with his math, his least favorite subject because he struggled with it so much. Then it had been lunch time and Dani had started to wonder how she could possibly find any time to herself for the afternoon. In a household of five children, there wasn't a lot of alone time to be had, and since her bedroom was right next to the living room on the ground level, she could not expect to get away with hiding in there; certainly not with the sun shining outside. Her mother would ensure that all the children spent ample time outdoors as long as the weather was good, and June had been unseasonably clear and hot so far.
As much as Dani wanted to investigate whether she could reproduce that warm and pleasurable feeling, she couldn't just go rubbing her crotch against objects where anyone might see her. With the privacy of her own room out of the question until later that evening, that left only the tree-house in the back yard, but that was Travis and Aaron's favorite hang-out spot most afternoons. Fortunately, Jake had unwittingly come to the rescue by taking the other boys with him on a bike ride. That in itself was odd. Usually Jake would spend most of the day until Finn got home from school hanging out with her. Yet, today he seemed to have avoided her like the plague after stealing her sunglasses that morning. She decided she would need to find out what that was all about if it continued, but for today it had worked to her advantage, affording her the alone time she craved.
Dani had gone out to the tree-house immediately after her brothers left for their bike ride. It was situated at the back of their property, built around the trunk of another of the massive maple trees, with a ladder leading up to a trap door in its floor. It was not terribly high off the ground, only ten to twelve feet or so, but that was high enough that no one standing on the ground could see inside the small windows. Once inside, Dani knew she could expect near complete privacy, especially since the branches of the tree hid the tree house windows from anyone on the second floor of their home looking toward the back of the property.
Hesitantly, Dani had gone to the trunk of the tree sticking up through the middle of the tree-house floor. It had a slightly larger circumference than the one she had climbed that morning, but she could still wrap her legs all the way around it. She could not do the same with her arms, however, so she leaned back and supported her weight with her hands on the rough planks beneath her. This didn't allow her to move her hips nearly enough to rub herself against the tree, so she let her feet fall to the floor as well. This gave her the freedom of motion she needed, and also allowed her to control how much pressure she exerted as she slid her cutoff jean clad crotch against the tree. The sensation was nearly immediate; a dull, warm pleasure welling up from between her legs. She continued to move her hips up and down, sliding herself against the tree's firm girth, the roughness of the bark dulled by the layers of cloth between it and her skin. The sensation seemed to build with each repeated grinding of her hips, but so did her fatigue. It was hard work to hold her whole body suspended in the air with just her arms and legs while she pumped and ground her groin against the trunk. Soon she was forced to collapse to the floor in exhaustion, despite how good it felt and how much she wanted to keep going.
She needed to find something else she could rub herself against. Something that didn't require her to hold herself up the whole time, but the inside of the tree-house was pretty sparse. There were a couple of beanbag chairs and a small table between them acting as the only furniture, but that was about all, aside from a few action figures and Lego bricks her brothers had left strewn across the floor. She wondered if she might be able to use her own hand instead, and went over to recline in one of the beanbag chairs. Spreading her legs, she placed the palm of her hand on the crotch of her cutoffs and gently rubbed downward and back up. The sensation was pleasant, but not as strong as it had been while rubbing against the tree trunk. She continued to rub herself for several minutes, but the sensation just stayed a dull, pleasurable ache, rather than building upon itself as it had when grinding against something more firm and solid, not to mention more textured, than the palm of her own hand.
Frustrated, Dani had spent the rest of the afternoon playing with their dog and then helped her mother prepare for dinner. Now that she had a bit more time to think about what had happened, though, she wondered if the sensation with her hand might have been stronger if she didn't have the thick fabric of her cutoffs in the way. She would have the perfect opportunity to test that theory not long after getting home, since Wednesday night was her turn to take a shower. Dani liked to take her showers late in the evening, if possible. It always felt good to go to bed fresh and clean, and it was relaxing to brush and dry her long hair, which usually helped her wind down for sleep. The shower would also be the perfect opportunity to be alone and try rubbing herself without any clothing in-between her hand and her vagina, which seemed to be the source of the pleasant sensation.
When their minivan pulled into the garage, the whole family piled out, filed into the house through the door to the main entryway, and split off in various directions. Dani's mother and father went upstairs to put Bec down for bed, her brothers went downstairs to get their pajamas on and brush their teeth, and Dani went through the kitchen and living room to get all the way around to her own bedroom. Once there, she retrieved her shower supplies from atop her vanity across from her bed. Her bathroom doubled as the family and guest bathroom, and was too small for Dani to leave all of her things laying around on the counter like her brothers could in their larger bathroom downstairs. She was allowed to leave her shampoo and body wash in the shower, because it was hidden from guests by the closed shower door. She was also permitted to leave her toothbrush and toothpaste inside the medicine cabinet behind the over-sink mirror. But she had to keep her razor, shaving gel, deodorant, and towels in her own room and take anything she needed with her to use the shower. This resulted in Dani doing as little of her hygiene in the bathroom as she could get away with, using her vanity in her bedroom instead.
Dani brought a towel for her hair, another for her body, and her bathrobe with her as she exited her room and crossed behind the living room couch to the small bathroom beyond. Closing and locking the door behind her, she crossed the room and locked the opposite door as well. Whoever had designed their home had thought it would be convenient to have access to the bathroom from both the living room and the kitchen. In reality it had just been more hassle remembering to lock and unlock both doors instead of just one. Indeed, it had led to more than one awkward encounter when she had forgotten to lock one door or the other before using the toilet, only to have her father or one of her brothers barge in on her by mistake. Having ensured a similarly embarrassing event would not occur this evening, Dani set her things on the small counter next to the sink and began to disrobe, letting each article of clothing fall to the floor. Then she pulled out the hair tie holding her ponytail back and strode naked over to the shower stall. The bathroom was too small to fit a tub, but Dani didn't mind most of the time. If she really wanted to take a bath, her parents would often let her use the massive tub in their master bathroom upstairs, rather than make her use the one in her brothers' bathroom in the basement. Most of the time she just wanted to get clean and be done with it, though, so a shower suited her fine.
She turned on the water and waited for it to get warm enough to step in, then turned it up until it was just this side of scalding, the way she liked it. When the steaming hot water poured over her skin, she let out a deep and relaxed sigh of pleasure, then got her hair thoroughly wet before sudsing it up with shampoo and rinsing it out, enjoying every second of the cleansing heat. Her plans of trying to give herself pleasure again were nearly forgotten as she lost herself in the soothing waters, until she started soaping up her body and she got to washing her more sensitive regions. As her fingers moved through the tuft of hair on the mound above her vagina she remembered that she was going to try to use her hand to rub against her bare skin and see if that made any difference. Dipping her hand lower, she put pressure against her mound and the outer lips of her vagina with her palm of her hand, the water and soap allowing it to slide smoothly along without any noticeable friction. Her body responded with a slight pleasurable ache, encouraging her to continue.
As she slowly rubbed the palm of her hand up and down against her sex, she felt the sensation begin to build upon itself, growing in strength and demand for more. Her hips had begun pressing into the motions of her hand almost of their own accord and Dani was surprised to feel something between the outer folds of her vagina that had grown firm. It was like a shallow ridge with a round nub, protected beneath the folds of skin. Experimentally, she let her palm drift higher over her mound, and ran two of her fingers to either side of the nub. The resulting shudder of pleasure was almost overwhelming, making her legs feel weak so that she had to lean against the shower wall to remain upright. Whatever that was, it felt ***AMAZING***, and was most certainly the source of the pleasurable sensations.
Dani focused her attention on that nub, running her fingers up and down, around, and across it, enjoying every spark of more and more intense pleasure that erupted as a result. She was not prepared for what happened next, as her whole body suddenly went tense involuntarily, and pleasure exploded inside her, pulsing and throbbing through her whole core. She gasped in surprise and bit her lip hard to keep herself from calling out, since she knew her parents were likely watching TV just beyond the bathroom wall. Her legs could not hold her anymore, and she let herself slide down the smooth side of the shower stall, her fingers still gently teasing the center of her pleasure as wave after wave of sensation wracked her body. Each wave eventually seemed smaller and less intense than the last until it finally subsided, leaving behind a satisfied hum of pleasure as Dani's breath came in desperate heaves.
She had no idea what had just happened, but it had been utterly fantastic! She knew instantly that this would be her new shower-time routine, maybe even nightly bedtime routine, from now on. She had no idea she could give herself such pure and intense bliss! Absently, she wondered if her friend Audrey was aware of it. Maybe it was just something unique to Dani, and Audrey would look at her like a weirdo when she asked, but she decided she must find out for sure the next time she had opportunity to hang out with her friend.
When her breathing finally returned to normal, Dani collected herself from the shower floor and finished washing before shutting off the water and grabbing one of her towels. She hoped that her parents hadn't noticed how much longer of a shower she had taken than normal, as she didn't want to try and explain why. She could probably come up with an excuse if she thought about it, but her brain wasn't firing on all cylinders after that incredible experience. As she tied a second towel around her still soaking wet hair, she thought to herself that even though she'd just moments ago enjoyed the deepest pleasure she’d ever felt, she couldn't wait to try it again.
***
Jake lay in his bed trying to focus on reading a book, but found that he could not keep his mind on the task at hand. His brothers had already gone to bed, and he could hear the water running upstairs where his sister still taking a shower. Meanwhile, his parents were probably watching TV in the living room, unless Bec had given them trouble trying to put her down for the night. As one of the oldest two Hansen children, Jake was allowed to stay up later than his younger brothers, but because they were trying to sleep, he was restricted to having quiet time in his room. Normally he'd be fine with that. He enjoyed reading, or drawing, or whittling with his pocketknife, but tonight was different.
All through church, Jake had been distracted from the youth pastor’s message by the image he'd seen on Finn's tablet screen that afternoon. He had nearly forgotten the other pictures, but the one of the woman who looked so much like Dani was firmly lodged in his brain, even though he'd only seen it for a few seconds. The perky breasts with erect nipples jutting out below elegant collar bones and satin smooth skin were burned into his memory, along with that slight, knowing smile and seductive eyes. It was his sister's face, even if obviously more mature and angular. Was there a similar resemblance to his sister's body? He'd probably never know. Dani was just one floor above him, completely naked in the shower, but beyond his gaze. He'd have no excuse to go anywhere near that bathroom to even attempt to catch a glimpse of her. Even if he tried, his sister was always good about locking the door since she lived with three brothers.
Then a thought occurred to him: Dani wouldn't just be undressed in the bathroom for her shower. He'd sat in the living room watching a movie with his parents before and seen her come out of the bathroom wrapped in her robe to scurry across to her bedroom to change into pajamas. That meant she would be naked in her bedroom, too, at least for a short time. Moreover, her bedroom had a window that she always complained was pointless because the only thing she could see out of it was the overgrown rhododendron bush planted outside. It was so big and thick with foliage that she could not even see through it to the side fence between their yard and the forest beyond. For his part, Jake had always retorted that at least she had a window, since his basement bedroom had none. The only thing on that side of the house outside Dani's window was a completely unused space intended for parking an RV, which the Hansens could never afford on their father’s pastor salary. If Jake was quiet about it, he could sneak out the basement door into the back yard, and around to Dani's window. By now it was dark enough that he probably would not be seen, if he was careful. He would have to hurry, though, because he had just heard the shower water stop.
Not wasting any more time thinking about it, he sat up, closed his book, and set it on the bed before throwing on some shoes and a light jacket, since the night air would likely be cool. Then he crept out of his room as quietly as he could to avoid alerting his brothers, in case they were still awake in their bedroom on the opposite side of the game room. The basement was dark, but Jake could easily navigate past the couch and coffee table on his left to the basement's exterior door. He eased it open, stepped outside, and closed it again just as silently, then crept up the concrete stairs to the back lawn.
Alerted to his presence, Dozer gave a low bark of alarm, then noticed it was him and trotted over from his dog house by the fence. Jake gave the big dog a pat then commanded him to go lie down in a stern whisper. The dog obeyed, returning the way he had come to plop down in front of his dog house. Jake let out a sigh of relief and continued around the corner of the house to the side where the rhododendron bush grew in front of Dani's window. The window itself was dark as Jake made his way toward it and he worried that he might have been too slow; that his sister might have already dressed in her pajamas and tucked herself into bed. Determined to confirm if that was the case, he crept closer, easing himself behind the massive bush and resting on his knees before inching his head up to the bottom corner of his sister's window. As his eyes peeked up to peer inside her room, he found that it was too dark to see anything but her window blinds, which were open to allow the sunlight in during the day. Between the blinds, all he could make out was the vague shape of her bed to his right, and her vanity on the opposite wall to his left. Beyond her bed he could make out the strong right angle of her closet door, but no details at all. Not enough to confirm whether his sister was in bed already or not.
Suddenly, a long, vertical sliver of light appeared at the back left end of the room and grew wider as the door was opened, then light flooded his eyes as Dani turned on her bedroom light. Instinctively, Jake ducked below the window, blinking away his light-blindness, then set his resolve and peeked back into his sister's room.
Dani had closed her door and was tossing an armload of her clothes into a hamper next to her vanity. She then hung a towel from the post at the foot of her bed that was farthest from the window and began to unwrap the towel on her head from around her hair, using it to tousle the long locks and help them dry. She then moved closer to the window in order to place this towel on the other post on the opposite corner of the foot of her bed. At last she moved on to what Jake had been waiting for: she undid the tie at the waist of her robe and casually let it fall to the floor.
Jake nearly gasped at the sight of his sister's suddenly naked form. She was absolutely exquisite! Unlike the girl in the photo, she had obvious, though light, tan lines on her legs and shoulders from her cutoffs and tank top that she wore on particularly warm days. Her wet hair hung heavily past her shoulders, brushing against her skin as she moved, bumping enticingly against her breasts. And Dani's breasts were mesmerizing as they jiggled slightly on her chest while she ran her fingers through her wet hair, tossing it behind her. They definitely were not as big as the tits on the first two girls Finn had shown him that afternoon - maybe not even as big as the woman who was Dani's lookalike - but they were perky, round, and firm like only a teenage girl's tits could be, with cute nipples standing out proudly from being exposed to the air.
Jake didn't get a chance to let his gaze drift lower before Dani turned to go take a seat at her vanity, revealing a round, bubble butt for a few precious seconds before she sat down. From his angle at the window, he couldn't see Dani's reflection in her vanity's mirror, but he did get a delicious view of the side of her left breast as she grabbed her hairbrush and began working tangles out of her long hair, causing the round breast to bounce playfully and sway slightly.
He was rooted to the spot as surely as the rhododendron bush beside him as he watched his naked sister brush and dry her hair. Her skin was so perfect, and her proportions so petite, and yet toned and athletic at the same time. He could see the muscles of her arms and shoulders moving beneath her smooth skin, and the graceful slope where her neck met with her torso. How had he never noticed this before? It wasn't as if all of these things had been hidden under her clothing. He had just never paid attention until now.
Finished with her hair, Dani got up from the vanity and strode over to her closet, giving Jake his first look at her pussy with it's clump of bush on the mound above it. That was something he hadn't seen before. All of the vaginas he had seen on Finn's tablet had been bare, but Dani's had hair similar to the fuzz surrounding Jake’s own dick. Her breasts bounced with each step across the room until she turned her back to the window and opened her closet door. Jake enjoyed another glorious viewing of her round ass while she fished clothing out, then she turned and tossed her pajamas onto her bed and bent down facing him, her breasts hanging enticingly in his view for a moment before she straightened, pulling a pair of panties up her legs and over her pussy, hiding it from his gaze. Then she snagged her pajama pants off the bed and pulled them on over her panties, and Jake knew what would be next so he savored a last look at her perfect tits. Dani slipped each of her arms into the sleeves of her pajama top in turn, causing her breasts to sway and jiggle even more before she began to button up the front of the garment. Fully clothed, she turned to close her closet door and Jake could just make out the roundness of her ass from the way the light pajama material clung to her skin.
Her evening routine now concluded, Dani turned on her bedside lamp, crossed toward the door to turn off the ceiling light and returned to her bed in the half darkness. She flung aside the covers and flopped onto her mattress before snuggling in for the night, and Jake knew that was his cue to leave. He wasn't going to get any more of a show, and he'd already gotten more than he had hoped for.
Quietly as he could, he pushed his way out of the rhododendron bush and crept around to the back yard then down the stairs into the basement and across the game room to his own bedroom door, conscious that his wildly attractive sister had just settled in for the night directly above him. He slipped out of his shoes and tossed his jacket to the floor before crawling into his bed, picking up the book he couldn't focus on earlier and placing it on his nightstand. He let himself flop onto his back, his head hitting his pillow, and he stared up at the ceiling re-living every detail of what he had just seen.
He'd just watched his older sister as she went about her evening routine completely naked, and she was drop dead gorgeous! As he thought about her lithe form, his hand naturally wandered down to his dick and began gently stroking it. Soon he was jerking off in earnest and the only images in his head were of Dani. He needed very little imagination to picture her, since her body was so freshly burned into his mind, and it took no time at all before he was ejaculating pulse after pulse of thick cum into a sock that he kept nearby for that purpose.
When he was done, he felt that slight sense of guilt that always followed a jerk-off session, tinged with additional guilt for spying on his sister in the privacy of her room. Yet he already knew that since he'd gotten away with it this time, he would be back again for more. His sister generally showered Monday, Wednesday, and Friday evenings, and that meant he only had two days to wait before he would have another opportunity to see her naked. It was an opportunity he doubted he would ever pass up again.
-
![](/static/nostr-icon-purple-64x64.png)
@ e3ba5e1a:5e433365
2025-02-07 05:25:58
How much does the government cost? Focusing just on the US, we could talk in terms of US dollars spent on the budget each year. But those numbers are so large we can’t really conceptualize them. A more relatable way of talking about this is what percentage of your income goes to the government. Or, even better, what percentage of your productive output is funneled to the government?
A first pass answer would be to look at income tax. If income tax is 30%, you work 30% of the year for the government and 70% for yourself. The problem is that income tax isn’t the only tax. There’s property tax, sales tax, payroll tax (i.e. another income tax), and who knows how many others. In other words, income tax only covers one (large) portion of our taxed income.
But it doesn’t stop there. We can’t forget inflation, the hidden, silent tax that not only erodes your earnings, but destroys your savings. It pulls off the amazing feat of not only taxing you today, but *historically* taxing you. It punishes you for being a prudent person and saving your money. (Which, side note, is why we love saving in Bitcoin.)
You might think we’re done. We’ve covered all the ways the government funds itself: direct taxation and inflation (via money printing). And that part is true. But we haven’t finished looking at the cost. You see, economically speaking, every time you put a tax into a system, you create inefficiencies. The market can no longer perform as well as it did previously. So we have yet another hidden cost: all productive capability in the economy gets worse, because the government needs to push its way in. An easy way to see this is all the tax games companies play to fall into different deductions and exemptions.
It doesn’t stop there either. Now that we’re talking about government-caused inefficiency, we can of course get to regulation. Regulation directly makes things more expensive (by forcing companies to spend time on compliance). It also indirectly makes things more expensive by presenting a barrier to entry for new providers, reducing competition and further hurting consumers.
Surely that’s the end, right? Nope. The government is sucking capital out of the private sector to put into public sector projects. That means the private sector has less capital for investment. People are incentivized not to save due to inflation, which encourages high-time-preference consumerism. This means we get less investment by companies for the future, which defeats the natural tendency of industry to become more efficient over time and pass on the savings to the consumer (via technology-driven deflation, for instance).
I knew all of that two weeks ago, and it hasn’t changed.
There’s one final piece to this puzzle. Many of us suspected it. With the news coming out about USAID and the programs it laundered money to, we’re starting to get even more concrete proof. The government steals our money, inflates it, takes all of that productive capacity we sweated and toiled for… and gives it to people who are actively trying to hurt us, yet again furthering the cost of government.
The cost of government isn’t one number. It’s not quantifiable. The cost of government is losing out on the world where everything becomes better, safer, cheaper, faster, healthier, and more enjoyable, and replacing it with a decaying, eroding society, where the most morally bankrupt people can fleece the rest of us for their livelihoods.
I’m praying that the exposure and toppling of USAID is a major accomplishment, but just one of many more to come. To quote The Two Towers, I hope it “will be like the falling of small stones that starts an avalanche.”
-
![](/static/nostr-icon-purple-64x64.png)
@ 8947a945:9bfcf626
2025-02-07 04:15:17
## สาเหตุที่ผมลาออกจากที่(ทำงาน) ที่ (เคย) เรียกว่า”บ้าน”
![image](https://yakihonne.s3.ap-east-1.amazonaws.com/8947a94537bdcd2e62d0b40db57636ece30345a0f63c806b530a5f1f9bfcf626/files/1738755645055-YAKIHONNES3.jpeg)
-----------
สวัสดีเพื่อนๆชาว #siamstr ทุกคนครับ ผมเป็นหมอเวชศาสตร์ฉุกเฉิน (Emergency physician ย่อๆว่า EP)ครับ พวกผมมีชื่ออื่นๆเรียกหลายชื่อมาก เช่นหมอเฉพาะทางแผนกฉุกเฉิน, หมอเฉพาะทาง ER หรือหมอ ER
![image](https://yakihonne.s3.ap-east-1.amazonaws.com/8947a94537bdcd2e62d0b40db57636ece30345a0f63c806b530a5f1f9bfcf626/files/1738755695928-YAKIHONNES3.jpeg)
ผมทำงานในแผนกฉุกเฉิน (emergency room หรือ ER) คนไข้ที่เข้ามาเจอพวกผมมีอาการวิกฤติอันตราย ใกล้ตาย หรือไม่ก็เป็นโรคกลุ่มความเสี่ยงสูงที่อาการกำลังจะแย่ จำเป็นต้องได้รับการรักษาอย่างแม่นยำ รวดเร็วทันที ทำให้คนไข้ปลอดภัย อาการคงที่ ไมแย่ไปกว่านี้ เพิ่มโอกาสรอดชีวิต ก่อนจะส่งไปพบแพทย์เฉพาะทางสาขาอื่นๆ
![image](https://yakihonne.s3.ap-east-1.amazonaws.com/8947a94537bdcd2e62d0b40db57636ece30345a0f63c806b530a5f1f9bfcf626/files/1738756051752-YAKIHONNES3.jpg)
ทักษะเฉพาะทางของพวกผมที่ถูกฝึกอบรมมา ใช้เวลาเต็มที่ไม่เกิน **10- 15 นาที**ได้คำตอบแล้วครับว่า
- คนไข้ที่อยู่กับผมป่วยด้วยโรคอะไร (Provisional diagnosis)
- มีภาวะอันตรายถึงแก่ชีวิตประเภทไหน (immediate life threatening conditions)
- กู้ชีพรักษา (resuscitation and stabilization) แล้วผลการักษาดีมั้ย อาการคนไข้ดีขึ้นมั้ย
### โรคฉุกเฉินที่ผมเจอเป็นปกติเลยได้แก่
- กลุ่มโรคติดเชื้อในกระแสเลือด (Sepsis)
- โรคหัวใจ ไม่ว่าจะเป็นหัวใจวายน้ำท่วมปอด (congestive heart failure) , โรคกล้ามเนื้อหัวใจขาดเลือดเฉียบพลัน (Acute myocardial infarction หรือ MI)
- โรคหลอดเลือดในสมอง (cerebrovascular disease , CVD หรือที่เรารู้จักกันว่า stroke)
- ผู้ป่วยได้รับสารพิษ (intoxication)
- โรคอื่นๆ ที่ไม่สามารถนั่งรอหมอได้
ด้วยลักษณะเฉพาะของคนไข้ การรักษาจะต้องมี EP และต้องมีเครื่องมือพิเศษ ทำให้ ER เป็น special unit ของรพ.ที่มีความพร้อมตลอด 24 ชั่วโมง
นอกจากหมอ EP เครื่องมือ และทีมพยาบาลแล้ว แนวทางปฏิบัติ (Clinical practice guideline หรือ CPG) ระหว่างแผนกฉุกเฉินกับหมอเฉพาะทางสาขาอื่นๆต้องชัดเจน ไม่เช่นนั้นการประสานงานจะมีปัญหา
![image](https://yakihonne.s3.ap-east-1.amazonaws.com/8947a94537bdcd2e62d0b40db57636ece30345a0f63c806b530a5f1f9bfcf626/files/1738756347633-YAKIHONNES3.jpg)
ทั้งหมดที่ผมกล่าวมานี้คือ ***"สถานที่ทำงานในอุดมคติที่ EP อยากได้"*** กระบวนการรักษาและส่งต่อคนไข้ราบรื่น ทุกคนคุยภาษาเดียวกัน เข้าใจกัน และแน่นอนครับรพ.แห่งนี้มีทุกอย่างครบ ทุกอย่างถูกทำเอาไว้เป็นแนวทางปฏิบัติชัดเจน มีการซ้อมจำลองเหตุการณ์สถานการณ์ฉุกเฉินต่างๆเป็นประจำ รวมถึงมีการติดตามประเมินผลลัพธ์เป็น KPI ชัดเจน เรียกได้ว่าเข้ามาทำงานที่นี่วันแรกแล้ว “มันใช่เลย”
### บรรยากาศการทำงานระหว่างแผนกก็ดีมาก
> **น้อยมากที่ทีมแพทย์และพยาบาล ER จะเป็นมิตรกับต่างแผนก**
อธิบายเพิ่มเติมหน่อยนะครับ ด้วยเนื้องานที่ต้อง **"เร็ว แม่น จบไวและเด็ดขาด"**
ทำให้บุคคลิกพวกผมมันดูแข็งๆ ดุ พูดเสียงดังและห้วนๆ ดูน่ากลัวสำหรับแผนกอื่น
แต่ที่รพ.แห่งนี้ มีแผนกอื่นมีความเกรงใจ ER เป็นปกติ แต่เจ้าหน้าที่ทั้งรพ.รู้จักกันหมด แยกแยะเรื่องส่วนตัวและเรื่องงานออกจากกันได้ดี ทำให้ช่องว่างความกลัวคนใน ER มันแคบเมื่อเทียบกับหลายๆรพ.ที่ผมเคยเจอมาครับ สำหรับผม ถือว่าดี
เมื่อเวลาผ่านไป ยิ่งรักรพ.แห่งนี้มากขึ้นทุกๆวัน มันเป็นเหมือนบ้าน บรรยากาศสบายเป็นกันเอง ผมได้รับโอกาสความก้าวหน้าทางอาชีพ ได้ขึ้นเป็นกึ่งๆผู้บริหาร รับตำแหน่งหัวหน้าดูแล 3 หน่วยงาน ทีมพยาบาลเลขาที่ช่วยงานผมก็มี data หลังบ้านที่ดีมาก เมื่อรับตำแหน่งแทบจะไม่ต้องริเริ่มอะไรใหม่ แค่ดูแลกำกับติดตาม guideline ที่มีอยู่แล้ว ให้รอบคอบมากยิ่งขึ้น มีปัญหาก็มองหาต้นตอของปัญหา (root cause analysis) แล้วแก้ที่ต้นเหตุ
ผมตั้งใจว่าจะทำงานที่นี่เป็นที่สุดท้ายไปจนแก่ ร่างกายทำงานไม่ไหวถึงจะเลิกอาชีพหมอครับ
-----------
### จุดเปลี่ยนเข้าสู่ยุคตกต่ำ เมื่อธุรกิจส่งต่อทายาทรุ่นที่สอง
![image](https://yakihonne.s3.ap-east-1.amazonaws.com/8947a94537bdcd2e62d0b40db57636ece30345a0f63c806b530a5f1f9bfcf626/files/1738757173195-YAKIHONNES3.jpg)
ปีที่ผมเข้ามาทำงานปีแรกเป็นช่วงที่เจ้าของรพ.กำลังป่วยหนัก และเสียชีวิตต่อมาไม่นานหลังจากนั้น ผมไม่เคยสัมผัสไม่เคยพูดคุยกับเขา แต่จากคำบอกเล่าของพนักงานที่อยู่มานาน ผมสรุปคุณลักษณะของเจ้าของรพ.ไว้ดังนี้ครับ
- เอาใจใส่รายละเอียด ถึงขั้นไม่ปล่อยผ่านเรื่องเล็กน้อย
- การบัญชีละเอียดยิบ ทุกเม็ดเงินที่เคลื่อนไหว โดยเฉพาะรายจ่ายต้องรู้ที่มาที่ไป รายจ่ายที่ไม่เข้าท่าแต่มีการอนุมัติรายการโดยพละการ โดนด่ายับถึงตาย
- ไม่ลงทุนกับอะไรที่เกินความจำเป็น
- ปกป้องผลประโยชน์ตัวเอง (ก็เขาเป็นเจ้าของ)
- ทุกเช้าเดินดูทุกซอกทุกมุมในรพ.ด้วยตัวเอง ถ้าเห็นอะไรไม่เรียบร้อย จะเข้าไปจัดการทันทีและสอนพนักงานหน้างาน เหมือนสอนลูกตัวเอง
- ใช้เวลาไม่ถึง 5 ปีชำระหนี้จากการระดมทุนในตลาดหลักทรัพย์ ทำให้รพ.ปลอดหนี้
- มีเมตตากับเจ้าหน้าที่ทุกระดับ รวมถึงพนักงานคนขับยานยนต์และเวรเปล
- เป็นคนไหว้พระสวดมนต์ สร้างวัดสร้างสถานปฏิบัติธรรมถวายวัด
และคุณงามความดีอื่นๆอีกมากมายที่ผมรู้ไม่หมด แต่เมื่อถึงช่วงเปลี่ยนผ่านเป็นทายาทรุ่นที่ 2 ขึ้นมารับช่วงต่อ
ทายาทรุ่นที่สองมีจุดยืนชัดเจนว่า **“ไม่เอา”**
คือไม่เอาตัวลงมาบริหารธุรกิจรพ.ของพ่อแม่ รับเฉพาะเงินปันผลจากกำไรของรพ.เท่านั้น ตัวเองมีธุรกิจส่วนตัวที่ต้องดูแล ให้ผู้บริหารชุดที่ทำงานมาตั้งแต่เจ้าของชุดแรกดูแลบริหารงานต่อ
> ### เรื่องนี้ผมมองว่าไม่ผิด มันเป็นสิทธิ์ของเขาครับ
แต่ผลที่ตามมาก็คือวัฒนธรรมองค์กรเปลี่ยน ผมไม่ทราบนอกในหรอกครับว่าในบรรดาผู้บริหารเขาแบ่งพรรคแบ่งพวกกันยังไง แต่ภาพที่ทุกคนเห็นก็คืออำนาจสูงสุดตกอยู่ในมือคนไม่กี่คนที่มีสิทธิ์ขาดในการชี้นำองค์กรได้ มันรุนแรงขนาดที่ว่าผู้บริหารบางคนที่ไม่ใช่ผู้ถือหุ้นใหญ่ ยังมีอำนาจเหนือผู้บริหารบางคนที่เป็น 1 ใน 10 ผู้ถือหุ้นใหญ่ด้วยซ้ำ
![image](https://yakihonne.s3.ap-east-1.amazonaws.com/8947a94537bdcd2e62d0b40db57636ece30345a0f63c806b530a5f1f9bfcf626/files/1738757714855-YAKIHONNES3.jpg)
เมื่อเวลาผ่านไป การลุถึงอำนาจในการกุมบังเหียนองค์กรแบบเบ็ดเสร็จมันค่อยๆสร้างปัญหาให้กับคนทำงานทีละเล็กทีละน้อย ผมใช้คำเปรียบเทียบที่ล้อไปกับเศรษฐกิจไทย “ต้มกบ” ก็แล้วกันนะครับ
<รูปต้มกบ>
-----------
### แก้วที่เริ่มร้าว
อย่างที่ผมบอกว่าผมเป็นหัวหน้า 3 หน่วยงาน ทุกๆ 1 - 2 เดือนหน่วยงานที่ผมดูแลจะมีการประชุมรายงานผลลัพธ์ KPI ที่เกี่ยวข้องกับการดูแลรักษาผู้ป่วย ผมกล้าบอกได้เลยว่าหมอในรพ.ผมเก่งมาก ให้การรักษาได้ตามมาตรฐานตามทักษะความเชี่ยวชาญของหมอแต่ละท่านได้เป็นอย่างดี สะท้อนออกมาใน KPI ที่ทำได้เกินเป้าหมายที่ 70 - 80% ตลอด KPI บางตัวเข้าเป้า 100% ต่อเนื่องโดยที่ไม่เสียคุณภาพเลยก็มี
แต่แล้ว เมื่อผู้บริหารเห็นตัวเลขที่มันดีมากต่อเนื่องกันนานๆ ผู้บริหารก็โยนโจทย์ลงมาให้แต่ละทีมว่า
> #### จะไม่มีการยอมให้ KPI เข้าเป้า 100% นานเกินไป เพราะมันหมายถึงการไม่คิดจะพัฒนาตัวเอง
ถ้าเป็นศัพท์สมัยนี้คือโดนด่าว่า “ไม่มี growth mindset” แต่ละทีมจะต้องไปออกแบบ KPI ใหม่ หรือไม่ก็ขยับเป้า KPI ให้ทำสำเร็จยากขึ้นเพื่อเป็นการท้าทายตนเอง
… ****คือ เขามองว่า ตัวเองคะแนนต้องไม่เต็มร้อย ต้องมีการรายงาน KPI ที่มี progress เป็นเชิงบวก ถึงจะดีในสายตาเขาครับ**** …
**ผมขอยกตัวอย่างให้เห็นเป็นรูปธรรมจับต้องได้**
เหตุการณ์การกู้ฟื้นคืีนชีพคนไข้ในรพ.(cardiopulmonary resuscitation หรือการทำ CPR)
![image](https://yakihonne.s3.ap-east-1.amazonaws.com/8947a94537bdcd2e62d0b40db57636ece30345a0f63c806b530a5f1f9bfcf626/files/1738758187782-YAKIHONNES3.jpg)
ทีมผมออกแบบ KPI ว่า ถ้าหากมีคนไข้หัวใจหยุดเต้นในรพ.ไม่ว่าจะเป็นพื้นที่ไหน ทีม CPR จะต้องไปถึงตัวคนไข้ภายในเวลา 4 นาที
ตัวเลข 4 นาทีนี้เกิดจากการรวบรวมข้อมูลมา 5 ปี แล้วหาค่าเฉลี่ยว่าตัวเลขที่ท้าทายทีมกำลังพอดีอยู่ตรงไหน ที่ผ่านมาทำได้ 100% มาตลอด และกำลังจะครบ 12 เดือนที่ทางผู้บริหารโยนโจทย์พัฒนา KPI ลงมา
ล่าสุดก็มีคำสั่งให้ปรับ KPI ที่ท้าทายขึ้นครับ
… หมอ … ทำได้ 4 นาทีมาตลอด ผมขอ 3 นาทีได้มั้ย …
ผมอธิบายเหตุผลว่า รพ.ไม่ใช่เล็กๆนะครับ แล้วบางทีคนไข้เกิดเหตุที่ชั้นบนสุดของรพ. ต่อให้ทีมรปภ.ล็อคลิฟท์ไว้รอแล้ว แต่นั่นมันไม่ได้หมายความว่าลิฟท์จะไม่แวะจอดชั้นอื่นๆ แล้วต่อให้ทีมพวกผมไปถึงตัวคนไข้แล้ว มันก็ต้องเตรียมเครื่องมือ, พยาบาลแทงเส้นเพื่อให้ยา, หมอเตรียมใส่ท่อช่วยหายใจ ฯลฯอีกมากมาย ผมว่าถ้าเราขยับ KPI จาก 4 นาทีลงมา 3 นาที มันจะวัดผลอะไรไม่ได้นะครับ
… หมอ ทำไปเถอะ ผมขอ 3 นาทีได้มั้ย…
คือความสมเหตุสมผลมันเริ่มไม่มีแล้วครับ ทีม CPR ของผมไม่ใช่ทีมเดียวที่โดนขยับเป้า KPI ประหลาดๆแบบนี้ หมอทุกแผนกโดนกันอย่างทั่วถึงครับ
### การทำงานมันมีระบบ มี guideline มี protocol ของมันอยู่ บางครั้งผู้บริหารก็เอาตัวลงมาทำให้ระบบรวน
คนไข้ที่เข้า ER มี standard อยู่ครับ ว่าเคสแบบไหนต้องเจอหมอทันที เคสแบบไหนมันพอรอได้ 5 นาที - 10 นาที อะไรก็ว่าไป ผมประสบกับตัวเองครั้งหนึ่งผมให้การรักษาเคสคนไข้ที่เป็น VIP ของผู้บริหารท่านหนึ่ง ที่อาการไม่ได้แย่ ไม่ได้วิกฤติสามารถรอเจอหมอได้ภายใน 15 นาที
- 11.32 คนไข้มาลงทะเบียน
- 11.34 เข้ามาถึง ER
- 11.36 พยาบาลเข้าไปประเมินคนไข้ วัดความดัน ฯลฯ และรายงานผม
ผมสั่งการักษาทันที 11.36 และบอกว่าเดี๋ยวอีก 5 นาทีผมมาประเมินนะ เคสนี้ผมมีแผนของผมอยู่แล้วว่าจะรอดูอะไรที่ 5 นาที
- 11.41 ผมเดินออกมาเห็นคนไข้อาการดีขึ้นแล้ว ผมเลยขอเวลาไปดูประวัติเดิมพวกโรคประจำตัวของคนไข้ ได้ข้อมูลครบ 11.42 (แต่ผู้บริหารดันอยู่แถวๆนั้นพอดี)
ผู้บริหารเจ้าของเคสนี้เป็นหมอ เดินมาเล่าประวัติเพิ่มเติมให้ฟัง ผมก็คุยกับหมอเขา เป็นหมอคุยกับหมอเรื่องอาการคนไข้คุยกันไม่นาน ทุกคน happy ส่งคนไข้ admit อย่างปลอดภัย
วันรุ่งขึ้นกลับโดนผอ.รพ.เรียกพบให้ไปรายงานว่าทำไมเคสนี้ถึงปล่อยให้คนไข้รอนาน ไม่มาดูคนไข้ทันที
…ผมชี้แจง timeline ทั้งหมดให้ฟัง 11.32 11.34 11.36 11.41 ว่าเกิดอะไรขึ้น
ผอ.บอกว่าอ้าว แค่ 5 นาทีเหรอ ก็ไม่ได้นานนี่
ผมก็บอกว่าไม่นานไงครับ ผมสั่งยาตั้งแต่ time zero ที่น้องพยาบาลรายงานผมแล้วด้วยซ้ำ
คุยกันไปคุยกันมาสรุปใจความได้ว่า
“มันไม่ถูกใจหมอ เจ้าของคนไข้ VIP และ ผมก็ผิดอยู่ดีที่ปล่อยให้คนไข้รอ 5 นาที”
แล้วมันจะมี guideline หรือ protocol การรักษาไว้ทำไมครับ ในเมื่อคนระดับผู้บริหารเกิดจะคิดเอาแต่ใจตนเองแหกกฏและแนวทางปฏิบัติของรพ.แล้วด่าว่าหมอทำไม่ถูก แถมเอาตัวลงมาวุ่นวายกระบวนการรักษาด้วย
### Top-down absolute power
![image](https://yakihonne.s3.ap-east-1.amazonaws.com/8947a94537bdcd2e62d0b40db57636ece30345a0f63c806b530a5f1f9bfcf626/files/1738759769958-YAKIHONNES3.jpg)
> ### "รับฟังปัญหา มีความเห็นต่างเสนอได้ เสนอได้แต่ไม่ฟัง จะเอาแบบเดิม"
เมื่อไหร่ก็ตามที่มีการรายงานปัญหา ผมเชื่อว่ามันมีการรายงานแบบไม่เป็นความจริงซ่อนอยู่มาก ทำให้ผู้บริหารได้รับข้อมูลผิด ไม่ตรงกับความเป็นจริง
ถ้าเป็นผูับริหารที่มีความเฉลียวใจอยู่บ้าง จะต้องทำการพิสูจน์ความจริง (fact check) ก่อนจะฟันธงว่าปัญหาที่แท้จริงมันคืออะไร แล้วออกมาตรการป้องกันหรือแก้ไข อะไรก็ว่าไป แต่สิ่งที่พวกผมเห็นก็คือผู้บริหารไม่เอาตัวลงมา fact check เลยครับ แต่สั่งคำสั่งลงมาเลยโดยที่ไม่รู้ตื้นลึกของปัญหานั้นๆ
ผมเป็นหนึ่งในตัวแทนหมอเข้าร่วมประชุมกับผู้บริหารเดือนละครั้ง พวกผมการวิเคราะห์เหตุการณ์ให้ฟังแบบละเอียด รวมถึงเสนอวิธีการแก้ปัญหาที่ยั่งยืนให้ตัวแทนผู้บริหารรับไว้พิจารณาทุกครั้งที่มีการประชุมกัน แต่ปัญหาคือคนที่ absolute power ไม่เคยมาพบตัวแทนแพทย์เลยซักครั้ง
คนที่ absolute power ไม่เคยลงมาฟังปัญหาจากแพทย์เลย ฟังแต่หน่วยข่าวกรอง(ที่ไม่รู้กรองอะไรเข้าไปบ้าง) แล้วยิงคำสั่งลงมาเลย มีคำพูดสวยหรูว่าถ้าหากเห็นต่างสามารถพูดคุยกันได้ แต่ก็จะยืนยันคำสั่งแบบเดิมอยู่ดี ผลกระทบเกิดมากแค่ไหน ค่อยส่งคำสั่งมาแก้มันเพิ่มทีหลัง
สำหรับหมอที่ทำงานรพ.เอกชน จะมีสัญญาในการทำงานร่วมกับรพ.ในสัญญาระบุชัดเจนว่า หมอ”ไม่ใช่ลูกจ้าง” แต่เป็นหุ้นส่วนทางธุรกิจ (partner) ที่มาขอใช้พื้นที่ในรพ.ในการเปิดคลินิครักษาคนไข้ เงินที่เรียกเก็บจากคนไข้ จะ profit sharing กัน 70/30 หรือ 80/20 ก็แล้วแต่เงื่อนไขของแต่ละรพ. แน่นอนครับ มันมีความไม่ตรงไปตรงมาในการจ่ายเงินผมอยู่ ความเป็น partner นี้เอง ทำให้หมดสิทธิ์ฟ้องร้องรพ.กรณีจ่ายค่าตอบแทนไม่ตรงตามข้อกำหนด สั้นๆก็คือผมได้รับรายได้ต่ำกว่าราคาตลาดที่หมอ EP ควรจะได้ 20% ครับ
ความเป็น partner นั่นหมายความว่าพวกผมจะไม่ได้รับสวัสดิการอะไรมากนัก เวลาป่วยไม่สบายจะมีวงเงินในการรักษาอยู่จำนวนหนึ่ง ถ้าเกินก็ต้องจ่ายเอง อาจจะมีส่วนลดนิดๆหน่อยๆ ไม่มีสิทธิ์ประกันสังคมเพราะไม่ใช่ลูกจ้าง มีสิทธิ์พื้นฐานคือบัตรทอง 30 บาท หมอเอกชนหลายๆคนพึ่งสวัสดิการข้าราชการจากคู่สมรส หรือไม่ก็ต้องซื้อประกันสุขภาพหลายๆฉบับ พูดง่ายๆว่า ต้องเก็บเงินดูแลรักษาตัวเองเมื่อป่วยไม่ต่างจากอาชีพอื่น
ความเป็น partner อีกข้อนึงคือพวกผมไม่สามารถเรียกร้องอะไรได้ถ้าเกิดรพ.ไล่ออก เพราะพวกผมไม่ใช่ลูกจ้าง ไม่มีกฏหมายแรงงานใดๆรองรับ ในขณะที่ลูกจ้างที่มีประกันสังคม หากสูญเสียงาน อาจจะมีเงินเยียวยากี่เดือนอะไรก็ว่าไป ตลอดอาชีพผม ผมเคยเห็นหมอโดนรพ.กลั่นแกล้ง บีบให้ออกแบบไม่เป็นธรรมมาหลายคนแล้ว หมอที่ผมสนิทหรือบางคนเป็นอาจารย์หมอที่สอนผมมาด้วยซ้ำ โดนไล่ออกด้วยปัญหาส่วนตัวกับผู้บริหารก็มี
แต่ด้วยนโยบายคำสั่ง top down absolute power ที่เกิดขึ้นนี้ ผมมองว่ารพ.ปฏิบัติกับพวกผมไม่ใช่ในฐานะ partner อีกต่อไป แต่กลายเป็นนายจ้าง-ลูกจ้าง(employer-employee) หรืออาจจะเป็นอะไรที่ต่ำกว่า employee ก็ได้นะครับ
### ทำไมผมถึงคิดเช่นนั้น??
**เพราะนโยบาย top down absolute power ครับ**
![image](https://yakihonne.s3.ap-east-1.amazonaws.com/8947a94537bdcd2e62d0b40db57636ece30345a0f63c806b530a5f1f9bfcf626/files/1738764673039-YAKIHONNES3.jpeg)
ถ้าคุณมี partner ทางธุรกิจ ทุกเสียงของ partner คุณน่ะ โคตรมีความสำคัญ เพราะเขาคือคนที่พร้อมจะจมหัวจมท้ายกับคุณได้ ถ้าคุณแฟร์และจริงใจพอนะ คุณทำธุรกิจคุณไม่ได้รู้ทุกเรื่อง ไม่มีทางที่คุณจะเก่งได้ทุกเรื่อง และการที่ได้ partner ที่มาปิดจุดอ่อนของคุณได้ หรือชี้จุดบอดของคุณได้ เตือนสติหรือด่าคุณให้คุณเก่งขึ้นหรือดีขึ้นได้น่ะ เป็นเรื่องโคตรโชคดีเลยนะผมจะบอกให้
แต่นี่อะไร top down ไม่ฟังอะไรใคร เอาสิ่งที่ตัวเองคิดเป็นที่สุด ปรึกษาขอความเห็นพวกผมเป็นบางครั้งพอเป็นพิธี แต่ก็เดินหน้าทำตามแผนในหัวพวกเขาอยู่ดี ผมกับตัวแทนหมอคนอื่นๆก็แซวกันว่า “แล้วจะเรียกพวกเรามาเพื่ออะไร”
งานทำบุญปีใหม่ประจำปี ถ้าคุณเป็นเจ้าของธุรกิจแล้วมี partner คนสำคัญ คุณจะเชิญเขามามั้ยครับ คุณจะเตรียมสถานที่หรือเตรียมอะไรเล็กๆน้อยๆเพื่อเป็นคำขอบคุณมั้ยครับ หรืออย่างน้อยๆเลี้ยงอาหารเขาซักมื้อเป็นการตอบแทนมั้ยครับ แน่นอนครับ ไม่มีอะไรพวกนี้ในงานทำบุญปีใหม่รพ.เลย ตั้งแต่เจ้าของคนเก่าเสียไป บัตรเชิญเข้าร่วมงานทำบุญปีใหม่และรับประทานอาหารพร้อมหน้ากัน (ขอหยาบหน่อยนะครับ) แม่งเชิญทุกคนยกเว้นหมอเว้ย!!! เจ้าหน้าที่เวรเปล พยาบาล นักเทคนิคมีข้าวเที่ยงกินกันมีไอติมมีขนมให้ หมอไม่ได้รับเชิญแต่น้องๆพยาบาลโทรตามหมอแผนกตัวเองขึ้นไปร่วมงาน เมื่อไปถึงของกินแม่งหมดใส่หน้าหมอเลย จะเรียกหมอขึ้นไปทำไมอะไรเหรอ
ผมไม่ได้เห็นแก่กินนะ เพราะผมห่อข้าวจากบ้านมากินเองอยู่แล้ว ต่อให้มีใครมาเชิญผมไปกิน ผมก็ไม่ไปหรอก ผมสละสิทธิ์ให้คนอื่น แต่มันทำให้ผมไม่แน่ใจไง ว่ารพ.มองพวกผมเป็นอะไรที่ต่ำกว่าลูกจ้างหรือเปล่า
อาชีพหมอในรพ.เอกชนในสายตาคนภายนอกดูดีครับ แต่ในความเป็นจริงแล้วหมอทุกคนคือ”ตัวหมากการตลาด” อย่างนึงของรพ.ไม่ได้มีฐานะที่สูงส่งอะไรขนาดนั้น ที่รพ.ทำดีกับหมอ เพราะมันมี profit sharing กันครับ แต่มันก็ไม่ได้ยับเยินแบบนี้ทุกรพ.หรอกครับ รพ.ที่ดีๆที่ดูแลหมอเป็นอย่างดี ให้ความสำคัญกับความต้องการของหมอทุกอย่างมันก็มี … แค่… ผมยังหาไม่เจอเท่านั้นเอง
### รพ.ส่งหมอไปตาย
![image](https://yakihonne.s3.ap-east-1.amazonaws.com/8947a94537bdcd2e62d0b40db57636ece30345a0f63c806b530a5f1f9bfcf626/files/1738765874230-YAKIHONNES3.jpg)
อันนี้แทบจะเป็นจุดพีคที่สุดของเรื่องเลยครับ ผมอธิบายให้เข้าใจก่อนว่าโดยปกติถ้าคนไข้ได้รับการรักษาแล้วเกิดเหตุอะไรก็ตามแต่แล้วมีข้อร้องเรียนเช่นต้องเสียเงินเยอะ , เจอหมอหลายแผนกทำให้เสียเวลา ไม่พอใจการรักษา หรืออะไรก็แล้วแต่ ในรพ.เอกชนจะมีระบบรับเรื่องการร้องเรียนแล้วส่งรายงานขึ้นไปตามลำดับ ผู้บริหารจะมาเข้ารับฟังปัญหาเหล่านี้ในตอนเช้า (morning brief) ผู้บริหารจะดูว่าข้อร้องเรียนเหล่านี้จะต้องดำเนินการแก้ไขอย่างไร แล้วสั่งการให้ผู้ที่เกี่ยวข้องไปทำ แล้วรอฟังรายงานในวันถัดไป
“หมอ” ถือเป็นบุคคลากรด่านสุดท้ายท้ายที่ต้องออกไปพบคนไข้กรณีคนไข้ร้องเรียน โดยปกติรพ.ปกป้องหมอจนถึงที่สุด มีทีมที่เชี่ยวชาญในการรับฟังปัญหา มีทีมกฏหมายที่เกี่ยวข้อง เป็นคนกลางคอยไกล่เกลี่ยให้ แต่ถ้าเป็นกรณีฟ้องร้องกันรุนแรง อันนั้นถึงจะมีการเชิญหมอมาพบคนไข้ครับ น้อยเคสมากที่ดำเนินไปถึงจุดที่หมอกับคนไข้ต้องมาเจอหน้ากัน
กลับกันที่รพ.แห่งนี้ส่งผมไปตายมันตั้งแต่แรก …
มีคนไข้หนึ่งรายเดินมาโต๊ะลงทะเบียนบอกว่า ต้องการจะมาปรึกษาแพทย์เฉพาะทางด้วยเรื่องอาการปวดท้องเป็นๆหายๆมาหลายเดือน เคยตรวจสุขภาพแล้วสงสัยนิ่วในถุงน้ำดี
แต่ทางรพ.มีนโยบายว่าถ้าหากคนไข้มีอาการแน่นท้องปวดท้องบริเวณเหนือสะดือขึ้นมาจนถึงหน้าอก จะต้องเข้า ER ก่อนเพื่อทำการตรวจคลื่นไฟฟ้าหัวใจ (EKG) และแปลผลโดยหมอ EP ก่อนว่าใช้โรคหัวใจหรือไม่ก่อนที่จะไปพบแพทย์เฉพาะทางสาขาอื่น คนไข้แย้งโต๊ะลงทะเบียนว่าที่ตรวจสุขภาพแล้วสงสัยนิ่วในถุงน้ำดีก็คือที่รพ.แห่งนี้แหละ เปิดประวัติดูได้เลย แต่เจ้าหน้าที่คัดกรองแจ้งว่ามันเปิดดูประวัติไม่ได้ (จริงๆมันเปิดดูได้) จำเป็นต้องทำตามนโยบายให้เข้า ER ก่อน
อธิบายเพิ่มเติมนะครับ สิ่งที่รพ.ทำ เขาเรียกว่า chest pain pathway คือคนไข้ที่มาด้วยอาการเจ็บหน้าอก มีโอาสเสี่ยงที่จะเป็นโรคหัวใจ แต่คนไข้บางคน ไม่ได้มาด้วยอาการแน่นหน้าอก แต่ตอนจบกลายเป็นโรคหัวใจ ไอ้อาการปวดท้องเหนือสะดือมันก็เป็นหนึ่งในสัญญาณเตือนครับ
คนไข้ก็เข้า ER มาเจอผม ผมดูแล้วมันไม่น่าใช่โรคหัวใจ แต่ผมต้องทำตาม guideline ของรพ.คือตรวจ EKG และตรวจเลือดดูค่าหัวใจว่าสูงผิดปกติมั้ย ผมปรากฏว่าปกติ ผมเลยส่งปรึกษาหมอแผนกศัลยกรรมเรื่องสงสัยนิ่วในถุงน้ำดี ทางหมอศัลยกรรมมาส่งตรวจ ultrasound ปรากฏว่าไม่เจอนิ่วในถุงน้ำดี คนไข้ถูกส่งไปพบแผนกทางเดินอาหารสรุปว่าเป็นลำไส้อักเสบ ทั้งหมดนี้คือกระบวนการตรวจค้นหาโรคตามปกติที่หมอเขาทำกันครับ
คนไข้ร้องเรียนรพ.ในวันรุ่งขึ้นดังนี้
ไม่พอใจจุดลงทะเบียนว่าทำไมไม่ส่งเขาไปที่คลินิคทางเดินอาหารตั้งแต่แรก ทำไมต้องให้เข้า ER
เจอค่ารักษาเข้าไปหลักหมื่นต้องการคำชี้แจงจากรพ.
เรื่องนี้ถูกรายงานขึ้น morning brief ครับ
แต่ก่อนที่ผมจะเล่าต่อผมขอให้เพื่อนๆลองคิดหน่อยครับ
ว่าถ้าเพื่อนๆเป็นผู้บริหารที่รับประเด็นร้องเรียนนี้จะ action อย่างไร
![image](https://yakihonne.s3.ap-east-1.amazonaws.com/8947a94537bdcd2e62d0b40db57636ece30345a0f63c806b530a5f1f9bfcf626/files/1738765691333-YAKIHONNES3.jpeg)
### ผู้บริหารสั่งให้หมอคนแรกที่ตรวจคนไข้โทรไปอธิบายให้คนไข้เข้าใจครับ
หมอคนแรกคือใครล่ะ **ผมไงครับ**
วันนั้นเป็นวันหยุดของผม ผมกำลังทำบุญที่วัดกับครอบครัวอยู่ รับโทรศัพท์จากรพ.ว่า ทางผู้บริหารสั่งให้ผมโทรไปเคลียร์กับคนไข้รายนี้ เพราะเกิดประเด็นร้องเรียน
ผมโทรไปตามคำสั่ง คนไข้ตกใจมากว่าทำไมหมอโทรหาเขาเอง คนไข้ไม่ได้ติดใจอะไรเรื่องของหมอเลย แต่ติดใจแผนกลงทะเบียนว่าทำไมทำกับเขาอย่างนั้น ทำให้เขาต้องเสียเวลาและเสียตังค์เยอะ
### เพื่อนๆคิดยังไงกันครับ
เวลาที่คนไข้ร้องเรียน ผู้บริหารที่ดีจะต้อง fact check ก่อนรึเปล่า แล้วเจาะความต้องการของคนไข้ให้ได้มั้ยว่าเขาร้องเรียนเรื่องอะไร แล้วสั่งคนที่เกี่ยวข้องลงไปดูแล ถ้ามันเกิดเคสฟ้องร้องรุนแรงอันนั้นแหละ จะถึงตัวหมอที่ดูแลรักษา หมอต้องมาพบคนไข้
แต่นี่อะไร … ส่งหมอไปตายตั้งแต่แรก … มันทำให้ผมคิดนะครับขนาดเรื่องหยุมหยิมแค่นี้ยังส่งหมอไปตาย ถ้าหมอถูกฟ้องขึ้นมา รพ.ไม่เอาหมอใส่กุญแจมือยื่นให้เรือนจำแล้วตัวเองลอยตัวไปเลยเรอะ
เหตุการณ์นี้ผมทำตามนโยบายของทางรพ. แต่พอคนไข้ร้องเรียน ไม่ปกป้องหมอ แต่ส่งหมอไปตาย ครับ
เหตุการณ์แบบนี้เกิดกับผม 4 ครั้ง และหมอคนอื่นๆก็โดนอะไรแบบนี้มาเหมือนกันครับ
-----------
### เมื่อบ้าน ไม่อบอุ่นอีกต่อไป
![image](https://yakihonne.s3.ap-east-1.amazonaws.com/8947a94537bdcd2e62d0b40db57636ece30345a0f63c806b530a5f1f9bfcf626/files/1738766160069-YAKIHONNES3.jpeg)
> #### ผมยอมรับกับเพื่อนๆทุกคนนะครับ ว่ามันยากมากที่ผมจะทำใจยอมรับคำคำนี้ได้
มีช่วงนึง ผมโดนผอ.เรียกคุยบ่อยมาก ด้วยเรื่องไม่เป็นเรื่องแบบนี้ จนผมเครียดมาก จนนอนไม่หลับไป 2 - 3 สัปดาห์ เข้านอนพร้อมครอบครัว สวดมนต์ก่อนนอน ปกติเวลาหลับตานอนผมจะสวดมนต์ในใจไปอีก 2 - 3 จบ แล้วมันจะ auto shutdown หลับดีถึงเช้าครับ ที่เพื่อนๆเห็นผมโพส #gym calisthenic #workout นั่นแหละ คือตื่นไหว มาออกกำลังกาย แต่มันมีบางช่วงที่มันนอนไม่พอ บางทีเที่ยงคืน ตีหนึ่ง ตีสอง นอนๆอยู่ตื่นเองแล้วไม่หลับอีกเลย สภาพแบบนี้ถ้าไปออกกำลังกายตอนเช้ามีหวังทำร้ายร่างกายมากกว่า
หลังจากนั้นไม่นานพอผมเริ่มปล่อยวางเรื่องนี้ได้ ก็มีข่าวร้ายมากระแทกพวกผมแผนก ER อีก เป็นการตัดสินใจจากผู้บริหารแบบไม่คิดหน้าไม่คิดหลัง ไม่คิดถึงผลกระทบต่อคุณภาพชีวิตของแพทย์ EP fulltime ที่ไม่ได้มีผมคนเดียว กระเทือนเป็นวงกว้าง รุนแรงขนาดทำลายชีวิตครอบครัวกันเลยครับ … แต่ผมขอไม่เล่านะครับ …
พวกผมถูกผอ.เรียกไปคุย ให้รับทราบถึงนโยบายเกี่ยวกับการปรับเปลี่ยนรูปแบบการทำงานที่จะส่งผลกระทบต่อวงจรการใช้ชีวิตและชีวิตครอบครัว ครั้งนั้นผมไม่ยอมรับครับ ผมมีข้อมูลทุกอย่างของแผนก ER ในมือ คำสั่งที่ออกมาไม่ได้แก้ปัญหาที่แท้จริงแต่อย่างใด แต่เป็นการแก้ผ้าเอาหน้ารอดแบบสุดๆ ผมแย้งคำสั่งนี้จนผอ.และเลขาผอ.สู้หน้าผมไม่ได้ เพราะผอ.ไม่มีข้อมูลเชิงลึกแบบที่ผมมี และผอ.เองก็รับคำสั่งจาก board บริหารมาอีกทีนึง แกก็ทำได้แค่อึกๆอักๆเท่านั้น
แต่จำได้มั้ยครับ top down absolute power ต่อให้ผมมีข้อมูลข้อเท็จจริงรวมถึงเสนอวิธีแก้ไขที่ยั่งยืนและตรงจุด เขาก็ไม่ฟัง เพราะเขามีภาพในหัวของเขาอยู่แล้วว่าเขาต้องการอะไร ต่อให้เชิญตัวแทนแพทย์มาคุยก็ไม่ฟังอยู่ดี ผมไม่ได้โลกสวยคิดว่าจะเปลี่ยนความคิดของ board บริหารได้
### ผมต้องไปแล้วจากที่นี่ ไม่งั้นเจ็บตัวแน่ๆ
ช่วงเวลานี้แหละครับเสียงเรียกปลุกจากภวังค์ (wake up call) มันชัดเจนแล้วว่า ผมต้องหาเรือสำรอง เพราะเรือลำนี้มันกำลังค่อยจมลงช้าๆ แต่คนบนเรือส่วนใหญ่ยังไม่รู้ตัว “ต้มกบ” แบบที่ผมบอกตอนแรกครับ
![image](https://yakihonne.s3.ap-east-1.amazonaws.com/8947a94537bdcd2e62d0b40db57636ece30345a0f63c806b530a5f1f9bfcf626/files/1738766271232-YAKIHONNES3.jpeg)
ตอนแรกผมก็ยังไม่แน่ใจ ว่าที่ผมจะไป มันเป็นเพราะเรือลำนี้มันกำลังจมลงแบบที่ผมบอก หรือผมกำลังจะหนีปัญหากันแน่ ผมทบทวนกับตัวเอง คุยกับภรรยา อ่านใจตัวเองแบบใจเป็นกลาง ได้คำตอบชัดเจนครับว่า มันเป็นเวลาวละเรือแล้วจริงๆก่อนที่จะเจ็บตัวไปมากกว่านี้
“ถ้าไปที่ใหม่ ต้องดีกว่าที่เดิม ไปเพื่อไปฝึกพัฒนาตัวเอง ถ้าเป็นแบบนั้นไปได้ แต่ถ้าไปเพื่อหนีปัญหา อย่าไป” ภรรยาผมบอก
ผมและภรรยาโชคดีที่ครอบครัวเราใกล้พระ ใกล้วัด ก็ไปขอปัญญาความสว่างจากหลวงพี่ หลวงน้า พระอาจารย์ ทุกท่านก็ให้ข้อคิดไปในทำนองเดียวกันกับภรรยาผม ผมเลยดำเนินเรื่องเปลี่ยนที่ทำงานครับ
### การสัมภาษณ์งานที่ใหม่ ก็ไม่ง่าย
เพราะนานๆรพ.แห่งนี้จะเปิดรับหมอใหม่ซักทีโดยเฉพาะรับ EP
ผมยื่น resume สมัครงานไป แต่มันเต็มไปด้วยความแน่นอนครับ เพราะทางรพ.ใหม่แจ้งกลับมาว่า ได้รับ resume แล้ว ถ้าหากได้รับการพิจารณา จะติดต่อนัดเข้ามาสัมภาษณ์ รอเวลาประมาณสัปดาห์กว่าๆครับ ก็มีข้อความว่าผมได้รับการพิจารณาทางรพ.จะเชิญมาสัมภาษณ์
ผมเข้าไปสัมภาษณ์ระหว่างสัมภาษณ์มีสัญญาณที่ดีพอสมควร เมื่อสัมภาษณ์เสร็จ ทางรพ.ขอเวลาแจ้งผล 2 สัปดาห์
เพื่อนๆครับ ผมโคตรทรมานเลยครับช่วงที่รอ ไม่ว่าจะเป็นการรอเรียกมาสัมภาษณ์ และ รอแจ้งผล ผมจะเป็นบ้าครับ ใจสั่นเสียวแว้บที่หัวใจทุกวัน วันละหลายๆรอบ บางครั้งชาหน้าอกซ้ายทั้งแถบ เมื่อตอนที่ผมทราบว่าผมผ่านการสัมภาษณ์ ได้รับการคัดเลือกให้เข้ามาร่วมงาน มันเป็นอะไรที่โล่งมาก
-----------
### สิ่งที่เกิดขึ้นภายในหัวของผมตั้งแต่เกิดเรื่องและข้อคิดที่อยากแบ่งปัน
เตลิด ฟุ้งซ่าน กลัว โกรธไม่พอใจ ปรุงแต่ง ขาดสติไม่รู้สึกตัว ปล่อยวางไม่ได้ วนไปวนมาเกิดขึ้นซ้ำแล้วซ้ำอีก จนมันออกอาการมาทางกายครับ ใจสั่น เสียวแว้บที่หัวใจ หน้าอกซ้ายชาไปทั้งแถบ นอนไม่หลับ ปวดหัวบ่อย พฤติกรรมแยกตัวไม่ยุ่งกับใครไม่คุยกับใครเลย ระแวง แล้วมันก็เป็นจังหวะพอดีที่ทางรพ.มีเรื่องขอความเห็นผมในการปรับปรุงคุณภาพ
แต่ละวัน line ผมเด้งไม่ต่ำกว่า 10 รอบ แต่บังเอิญมันจะมีบางช่วงที่ผมโดนผอ.เชิญขึ้นไปคุยเรื่องปัญหาที่ไม่เป็นเรื่องอย่างที่ผมเล่าไปตอนต้นปนมาด้วยครับ คือทุกครั้งที่ line เด้ง ประสาทจะแดกทุกครั้งจนหลอนครับ “กูจะโดนอะไรอีกเนี่ย”
มันหนักขนาดบางครั้งตัวผมช็อตแล้วยืนเอ๋อกินไปเลย กำลังทำงานบ้านกำลังล้างจ้างอยู่มือหยุดไปดื้อๆกลางอากาศ หรือกำลังเดินซื้อของกับครอบครัวอยู่ ผมเกิดอาการหูดับคืออยู่ดีๆก็ไม่ได้ยินเสียงรอบข้าง ภรรยาผมตะโกนเรียกบางทีก็ไม่ได้ยิน อาการหนักจนผมตัดสินใจไปตรวจหูตรวจประสาทการได้ยิน รวมถึงขอคุยกับจิตแพทย์ครับ เพราะมันไม่ไหว
แต่ปรากฏว่าผลการตรวจร่างกายทุกอย่างปกติหมด
ผมยังมีบุญอยู่ครับ ที่ผมและภรรยาปฏิบัติกรรมฐานมาจริงจัง พอจะมีประสบการณ์ทางธรรมมาบ้าง เหตุการณ์นี้มันคือการฝึกภาคสนามของผู้ปฏิบัติกรรมฐานครับ มันคือการโดนลองของ เพื่อดูว่าการฝึกจิตที่ผ่านมา เมื่อมาโดนความเป็นจริงที่โหดร้ายทางโลกกระแทกเข้าแบบติดๆกันไม่ให้พัก จะรอดมั้ย
ผมยังโชคดีที่ยังสามารถควบคุมสิ่งที่ไม่ดีทั้งหลายให้อยู่เฉพาะในหัวได้ ยังไม่โพล่งออกมาเป็นคำพูดที่ทำร้ายใคร และ ยังไม่ทำอะไรรุนแรงเช่นไปทุบหัวคนอื่น
![image](https://yakihonne.s3.ap-east-1.amazonaws.com/8947a94537bdcd2e62d0b40db57636ece30345a0f63c806b530a5f1f9bfcf626/files/1738837868020-YAKIHONNES3.jpeg)
เรียกว่าเกิดเฉพาะ มโนกรรม ส่วนวจีกรรมและกายกรรม ยังไม่เกิด ในวันที่แย่ขนาดนั้น ผมยังอยู่กับการปฏิบัติดูรู้ลมหายใจ ดูรู้กายเคลื่อนไหว สวดมนต์ นั่งสมาธิ ถวายสังฆทาน สวดมนต์กับลูกและภรรยาทุกวันก่อนนอนไม่ขาด ทางร่างกายก็ออกกำลังกายให้สม่ำเสมอรักษา baseline ความแข็งแรงไว้
หากเพื่อนๆเชื่อเรื่องบาปบุญและกฏแห่งกรรม รวมไปถึงเจ้ากรรมนายเวร
ตัวอย่างของผมอันนี้ก็คือการชดใช้ครับ ช่วงที่ผมก้มหน้าชดใช้กรรมที่ผ่านมา ผมอโหสิและแผ่เมตตาอุทิศบุญกุศลให้แก่ทุกคนที่ทำร้ายผม ผมโกรธครับ แต่เวลาอารมณ์โกรธมันออกมาจนตัวสั่น ใจสั่น เสียวหน้าอก ผมแผ่เมตตาสู้อารมณ์โกรธอันนั้นเลย แรกๆก็ฝืนธรรมชาติตัวเองอยู่ครับ แต่เมื่อทำต่อเนื่องไป ใจมันสงบมันนิ่ง มันเกิดอารมณ์สงสารคนเหล่านั้นที่มาทำร้ายผมมากกว่า เพราะสภาพความเป็นจริงก็คือคนเหล่านั้นที่ทำร้ายผม เขาก็กำลังโดนทวงจากคนของเขาเหมือนกันครับ ดังนั้นผมถึงเลือกที่จะแผ่เมตตาให้ และอธิษฐานภาวนาให้ว่า
**"ผมยินดีน้อมรับการชดใช้ในครั้งนี้ ผมขอไม่โต้ตอบ ชดใช้กันให้เต็มที่ เพื่อว่าเมื่อหมดกรรมกันไปแล้วจะได้ขาดกันไปเลย ไม่ต้องมาจองเวรจองกรรมกันอีก ขอให้มีความสุขและเกิดดวงตาเห็นธรรม"**
เรียกว่าผมรอดมาได้แบบกระอักเลือดเพราะใช้ธรรมะที่ฝึกปฏิบัติมาเป็นที่พึ่งครับ ไม่ได้ไปเรียกร้อง ไปโวยวาย หรือไปโต้ตอบอะไร ในใจมันต้องคิดขุ่นเคืองเป็นเรื่องธรรมดา แต่ให้มันจบอยู่แค่ที่ความคิดครับ ไม่ให้หลุดออกมาเป็นคำพูดหรือการกระทำ ไม่เช่นนั้นการกระทำใหม่จะเกิดขึ้น กลายเป็นการผูกเวรผูกกรรม จองเวรจองกรรมกันไปอีกนาน ไม่จบไม่สิ้น แต่ต้องบอกก่อนว่าผมไม่ได้ไปเพ่งไปกดข่มอารมณ์โกรธขุ่นเคืองใจ พระท่านสอนให้เรา “ดู” “รู้” “เห็น” ทุกสรรพสิ่งที่เกิดขึ้นกับตัวเรา โดยเฉพาะความคิดในหัวเรา
**“ดูมัน เห็นมัน รู้มัน แต่ไม่บ้าไปกับมัน”**
แต่เรื่องธรรมะ ผมเชื่อว่าเพื่อนๆที่ฟังคุณลุงมาตลอด น่าจะเข้าใจคำว่า ธรรมะต้องฝึกต้องปฏิบัติเอง รู้ด้วยตัวเอง เห็นด้วยตัวเอง เข้าใจด้วยตัวเอง
วฺิธีการที่ผมเล่ามานี้ไม่ใช่สูตรสำเร็จ แต่มันคือวิธีการปฏิบัติที่เข้ากับจริตคนแบบผมครับ ผมมีแต่จะต้องฝึกให้ชำนาญขึ้นไปจนกว่าจะตายนั่นแหละครับ
เป็นเวลาเกือบ 10 ปีที่ผมอยู่ที่แห่งนี้ มีประสบการณ์ที่ประเมินมูลค่าไม่ได้เกิดขึ้นมากมาย
- วิกฤติครอบครัวที่ภรรยาเกือบเลิกกับผม [อ่านเพิ่มได้ที่นี่](https://yakihonne.com/naddr1qvzqqqr4gupzpz2849zn00wd9e3dpdqdk4mrdm8rqdz6pa3usp44xzjlr7dlea3xqq2nj7jwdsehwuzrxv6kskz4wenkcwrjdscnq3stzy4)
- การได้ครอบครองอสังหาริมทรัพย์จากน้ำพักน้ำแรงตัวเอง
- การเห็นลูกที่รักป่วยไม่สบาย admit บ่อยมากช่วงเด็กเล็ก
- การรับมือกับโรคระบาด COVID19
- การได้เป็นหัวหน้า 3 หน่วยงาน
- การได้ศึกษาปฏิบัติธรรม รวมถึงการลาบวช
- การได้ทดแทนพระคุณบุพการี [อ่านเพิ่มเติมได้ที่นี่](https://yakihonne.com/naddr1qvzqqqr4gupzpz2849zn00wd9e3dpdqdk4mrdm8rqdz6pa3usp44xzjlr7dlea3xqq257ctc949nge6efpckx7rdx4n57wtrg4dyua0ftzv)
- การได้ช่วยเหลือญาติและผู้มีพระคุณแบบไม่หวังผลตอบแทน
- การได้ connection
การเดินทางสถานที่แห่งนี้ ที่ที่ผม(เคย)เรียกว่าบ้าน มันได้เดินทางมาจนถึงหน้าสุดท้ายของหนังสือเล่มนี้ เป็นธรรมดาที่มันเดินทางมาถึงจุดจบ หวังว่าจะเป็นประโยชน์ ไม่มากก็น้อยนะครับ
![image](https://yakihonne.s3.ap-east-1.amazonaws.com/8947a94537bdcd2e62d0b40db57636ece30345a0f63c806b530a5f1f9bfcf626/files/1738839012633-YAKIHONNES3.jpeg)
-
![](/static/nostr-icon-purple-64x64.png)
@ 000002de:c05780a7
2025-02-07 03:54:22
I've long been a fan of [Liberty Maniacs](https://libertymaniacs.com/), the site that makes funny political shirts for rebels & liberty lovers but their email today hit me as extra funny.
## Here's what they shared.
To say the last two weeks have been wild would be the understatement of the century.
🔥 DOGE is taking over the Treasury
🔥 USAID got caught laundering money (again)—basically funding everything to the left of Jimmy Carter’s ghost.
🔥 The new AG wants to drop the Epstein list like it’s hot.
🔥 The CIA just casually admitted the government created COVID.
🔥 And oh yeah, the Gulf of Mexico? Not anymore. Welcome to the Gulf of America!
At this point, reality is outpacing satire. But don’t worry, we’re working harder than a WEF escort during Davos week to get these news cycles onto shirts before the next scandal drops.
Not sure if we’ll ever catch up, but damn it, we’re gonna try.
---
I mean, that's pretty good stuff. If you are a marketer or copywriter this is how you do it.
originally posted at https://stacker.news/items/878326
-
![](/static/nostr-icon-purple-64x64.png)
@ 57d1a264:69f1fee1
2025-02-07 03:35:34
# The #LightningNetwork introduces the concept of #payment channels. How do these channels work, and how do they enable #bitcoin to #scale while maintaining #security?
originally posted at https://stacker.news/items/878316
-
![](/static/nostr-icon-purple-64x64.png)
@ 6bcc27d2:b67d296e
2025-02-07 03:06:38
This is the test of obsidian nostr writer
-
![](/static/nostr-icon-purple-64x64.png)
@ 57d1a264:69f1fee1
2025-02-07 02:59:45
# Bitcoin's blockchain is described as a 'public ledger.' How does this public nature contribute to bitcoin's security and trustlessness, and what role do nodes play in this system?
originally posted at https://stacker.news/items/878295
-
![](/static/nostr-icon-purple-64x64.png)
@ 3eba5ef4:751f23ae
2025-02-07 02:02:37
🍨*Your weekly byte of the latest updates from the Bitcoin ecosystem!*
## Crypto Insights
### Security Crisis Revealed by Bitcoin Mempool Clearance
Recently, several Bitcoin blocks went unfilled as mempools cleared out and transaction fees hit 11-month low. Reduced activity on the network led miners to nearly clear out Bitcoin's pool of unconfirmed transactions. This [post](https://x.com/DaPangDunCrypto/status/1885993450610594293) pointed out that these events highlight a potential security crisis.
### What Has Been Done to Make Bitcoin Quantum-Safe?
According to [Murch's response](https://bitcoin.stackexchange.com/questions/125171/what-exactly-is-being-done-today-to-make-bitcoin-quantum-safe), there is currently no dedicated team within the Bitcoin community working on quantum security. However, related proposals exist, such as [BIP-360: Pay to Quantum Resistant Hash](https://github.com/bitcoin/bips/pull/1670), which aims to introduce a quantum-resistant output type.
### A Variant of Cycling Attacks on Bitcoin Miners' Block Templates Disclosed
Antoine Riard [reported](https://groups.google.com/g/bitcoindev/c/ZspZzO4sBys) a variant of cycling attacks that can censor transaction flows in miners' block templates. This enables attackers to manipulate Bitcoin fee rewards, maximizing their chances of mining blocks on the longest valid chain at the expense of honest miners.
### Hurricash: A Multi-Signature Tool for Shared UTXOs
[Hurricash](https://supertestnet.github.io/hurricash/) is a multi-signature tool that allows multiple users to lock funds in a single UTXO while enabling unilateral exit with their contribution. Any member can spend money from Hurricash on Lightning Network since Hurricash can be a channel factory, or on the base layer via an LN-to-base-layer swap. Similar to [Coinpools](https://bitcoinops.org/en/topics/joinpools/), but Hurricash requires everyone to exit with the same amount as everyone else.
Hurricash aims to address two key issues of the Lightning Network:
- High cost of opening channels (sometimes)
- Privacy concerns about placing channel-opening transactions on the base layer
Advantages of Hurricash:
- No soft fork required
- Computational cost for pool creation grows at O(n^3) instead of O(n!)
- Users can exit at any time, in any order, without coordination
- Unlike Ark, Hurricash has no central coordinator
- Unlike Ark, funds in Hurricash pools are not time-locked, allowing indefinite participation
Check out its [GitHub](https://github.com/supertestnet/hurricash) for the code.
### Fake Channels Are Real: Why Client-Side-Validated Lightning Is Easier Than You Think
Peter Todd [argues](https://petertodd.org/2025/fake-channels-and-rgb-lightning) that intermediary channels in the Lightning Network don’t need to be real. When Alice makes a payment via Alice ↔ Bob ↔ Charlie ↔ David, she only cares if David receives the payment, not whether Bob and Charlie’s channel exists.
This flexibility is particularly useful when using client-side-validated tokens like RGB or Taproot assets. Lightning payments can route through virtual channels, requiring only Alice’s channel to be valid. This eliminates third-party verification and enables users to route transactions with just a few MB of data.
### Implementation of Non-Interactive Single-Round T-of-N Threshold Signature Protocol NOIST
[Burak](https://x.com/brqgoo) successfully implemented a 550/999 NOIST threshold multisig transaction. Check it out on [mempool](https://mempool.space/tx/fe9c93ad23c3f860a5162e54d34154b4401ac51959c25778bda3024960a33218) and watch the [demo video](https://www.youtube.com/watch?v=R3S7C9bNYDc).
NOIST ([GitHub](https://github.com/brollup/brollup/tree/main/src/transmutive/noist)) is a non-interactive, single-round t-of-n threshold signing protocol. It allows multiple untrusted entities to generate a group key and produce signatures in constant time, preventing malicious signers from forcing a re-do. Its output is a 64-byte BIP-340-compatible Schnorr signature. Read [more](https://blog.brollup.org/introducing-noist-a-non-interactive-single-round-t-of-n-threshold-signing-protocol-51225fe513fa) about NOIST.
### Blockstream’s 2024 Year in Review
Blockstream [reviewed](https://blog.blockstream.com/blockstream-update-2024-in-review/) its major developments over the past year, including:
- Multiple Core Lightning updates: such as [dual funding](https://blog.blockstream.com/core-lightning-v24-02-uint-needs-signature/), [BOLT12](https://glossary.blockstream.com/bolt12/?ref=blog.blockstream.com), along with improved performance and accessibility
- BlockStream’s Lightning-as-a-Service (LaaS) [Greenlight](https://blockstream.com/lightning/greenlight/?ref=blog.blockstream.com) integrating with Europe’s leading Bitcoin platform Relai
- Hardware wallet [Jade](https://blockstream.com/jade/) adding Miniscript support and reintroducing Anti-Exfil to counter Dark Skippy attacks
- Revamped Bitcoin desktop wallet [BlockStream Green 2.0](https://blog.blockstream.com/blockstream-green-2-0-a-new-accessible-experience-for-bitcoin-desktop-wallets/)
- Sidechain-based, Bitcoin layer-2 settlement network [Liquid](https://docs.liquid.net/docs/technical-overview) advancements, including: [Liquid Wallet Kit](https://github.com/Blockstream/lwk?ref=blog.blockstream.com), testnet deployment of High-Assurance Smart Contract [Simplicity](https://blog.blockstream.com/en-simplicity-github/), and [ELIP 200](https://blog.blockstream.com/confidentiality-made-affordable-elip-200-unlocks-up-to-90-lower-fees-on-liquid/) reducing transaction fees by up to 90%
### Rizful: A Disposable Lightning Node Setup Tool
[Rizful](http://rizful.com) provides a quick and easy way for users to run their own Lightning nodes in the cloud, enabling instant receipt of zaps and other Lightning payments. Rizful nodes are disposable and fully implement the Nostr Wallet Connect specification, as well as instant inbound and self-managed channels.
### Ark’s Minimally Dependent Wallet SDK for Bitcoin Transactions
Ark released a TypeScript-powered [Wallet SDK](https://blog.arklabs.to/introducing-the-ark-wallet-sdk-d1c77ce61cfc) that simplifies building Bitcoin wallet for both on-chain and off-chain transactions. The SDK follows the [Noble Cryptography](https://paulmillr.com/noble/) approach, minimizing dependencies while supporting Bitcoin and Ark transactions in web applications and mobile wallets—without WebAssembly overhead.
### QuantumLink: Air-Gap-Level Security Over Bluetooth
Foundation introduced [QuantumLink](https://foundation.xyz/2025/01/quantumlink-reinventing-secure-wireless-communication/), a Bluetooth-based protocol that encrypts all data entering or exiting the Bluetooth chip with a quantum-resistant encryption scheme. This achieves a comparable level of air-gap security while maintaining convenience and flexibility.
### Why DeepSeek is a Game Changer for AI x Crypto
The author [argues](https://x.com/tmel0211/status/1884068876604109163) that DeepSeek is a major breakthrough for AI + Crypto due to:
- Breaking the hardware-dependent AI computing model, challenging NVIDIA’s monopoly
- Using reinforcement learning (RL) and reasoning optimization instead of brute-force pre-training paradigm by piling up hardware
- Enabling cost-efficient AI Agent applications
- DeepSeek's open-source approach aligns with the decentralization principles of Crypto.
### Tracking Bitcoin Adoption in the U.S.
[StackStates.com](https://stackstates.com/) provides an overview of state-level legislation on strategic Bitcoin reserves, helping track Bitcoin adoption across the U.S.
## Top Reads on Blockchain and Beyond
### RGB++: A New Approach to Bitcoin Scaling
This [article](https://www.nervos.org/knowledge-base/the-case-for-rgbpp) explains why [RGB++](https://www.rgbppfans.com/) offers a holistic solution that aligns with Bitcoin's original ethos in a landscape where existing scaling efforts often involve significant trade-offs—be it in security, decentralization, or usability.
RGB++’s major advantages:
- **Enhanced Bitcoin Utility**: RGB++ extends Bitcoin beyond a store of value and payment network, enabling decentralized applications, financial instruments, and cross-chain interactions without bridges.
- **Scalability & Efficiency**: Isomorphic binding allows advanced smart contracts without third-party trust, while transaction folding and off-chain asset issuance solve state bloat and boost throughput.
- **Proven & Growing**: RGB++ is already live on mainnet, with increasing adoption among users and dApps.
### How the Zero-Click Deanonymization Attack Works via Cloudflare
The author discovered a unique attack method called the "zero-click deanonymization attack." This exploit allows attackers to pinpoint a target’s location within a 250-mile radius—without any user interaction. If the target has a vulnerable app installed—whether a mobile app or a background service on a computer—the attacker can send a malicious payload to reveal the target’s identity within seconds—the victim does’t even know. He found that hundreds of apps, including Signal, Discord, and Twitter/X, are vulnerable to this attack.
[This article](https://gist.github.com/hackermondev/45a3cdfa52246f1d1201c1e8cdef6117) explains how the attack works through Cloudflare.
### The Dangers of Central Bank Digital Currencies and Their Impact on Financial Independence and Privacy
[This article](https://reason.com/2024/12/18/imf-offers-a-glimpse-at-the-perils-of-central-bank-digital-currencies/) explores the risks of Central Bank Digital Currencies (CBDCs) and their implications for financial independence and privacy. Referring to the International Monetary Fund’s [*CBDC Virtual Handbook*](https://www.imf.org/en/Topics/fintech/central-bank-digital-currency/virtual-handbook), the author explains how CBDCs grant governments unprecedented control over transactions, enabling surveillance, restrictions, and financial coercion. The piece contrasts government-issued digital currencies with decentralized alternatives like Bitcoin, highlighting stark differences in privacy and user freedom.
-
![](/static/nostr-icon-purple-64x64.png)
@ 5d4b6c8d:8a1c1ee3
2025-02-07 01:02:09
I don't think I did one of these summary posts last month.
Based on the [predictions](https://stacker.news/items/865017/r/Undisciplined) made by stackers here's what to expect at the end of the season.
**Champion**: Celtics
**MVP**: SGA
**All NBA 1st Team**
C Jokic
F Giannis
F Luka
G Ant
G SGA
These aren't bad, but whoever's sticking with those Ant and Luka picks seriously need to move off of them.
originally posted at https://stacker.news/items/878234
-
![](/static/nostr-icon-purple-64x64.png)
@ df173277:4ec96708
2025-02-07 00:41:34
## **Building Our Confidential Backend on Secure Enclaves**
With our newly released [private and confidential **Maple AI**](https://trymaple.ai/?ref=blog.opensecret.cloud) and the open sourcing of our [**OpenSecret** platform](https://github.com/OpenSecretCloud/opensecret?ref=blog.opensecret.cloud) code, I'm excited to present this technical primer on how we built our confidential compute platform leveraging **secure enclaves**. By combining AWS Nitro enclaves with end-to-end encryption and reproducible builds, our platform gives developers and end users the confidence that user data is protected, even at runtime, and that the code operating on their data has not been tampered with.
## **Auth and Databases Today**
As developers, we live in an era where protecting user data means "encryption at rest," plus some access policies and procedures. Developers typically run servers that:
1. Need to register users (authentication).
2. Collect and process user data in business-specific ways, often on the backend.
Even if data is encrypted at rest, it's commonly unlocked with a single master key or credentials the server holds. This means that data is visible during runtime to the application, system administrators, and potentially to the hosting providers. This scenario makes it difficult (or impossible) to guarantee that sensitive data isn't snooped on, memory-dumped, or used in unauthorized ways (for instance, training AI models behind the scenes).
## **"Just Trust Us" Isn't Good Enough**
In a traditional server architecture, users have to take it on faith that the code handling their data is the same code the operator claims to be running. Behind the scenes, applications can be modified or augmented to forward private information elsewhere, and there is no transparent way for users to verify otherwise. This lack of proof is unsettling, especially for services that process or store highly confidential data.
Administrators, developers, or cloud providers with privileged access can inspect memory in plaintext, attach debuggers, or gain complete visibility into stored information. Hackers who compromise these privileged levels can directly access sensitive data. Even with strict policies or promises of good conduct, the reality is that technical capabilities and misconfigurations can override words on paper. If a server master key can decrypt your data or can be accessed by an insider with root permissions, then "just trust us" loses much of its credibility.
The rise of AI platforms amplifies this dilemma. User data, often full of personal details, gets funneled into large-scale models that might be training or fine-tuning behind the scenes. Relying on vague assurances that "we don't look at your data" is no longer enough to prevent legitimate concerns about privacy and misuse. Now more than ever, providing a **strong, verifiable** guarantee that data remains off-limits, even when actively processed, has become a non-negotiable requirement for trustworthy services.
## **Current Attempts at Securing Data**
![](https://blog.opensecret.cloud/content/images/2025/02/Screenshot-2025-02-05-at-8.09.19-PM.png)Current User Experience of E2EE Apps
While properly securing data is not easy, it isn't to say that no one is trying. Some solutions use **end-to-end encryption** (E2EE), where user data is encrypted client-side with a password or passphrase, so not even the server operator can decrypt it. That approach can be quite secure, but it also has its **limitations**:
1. **Key Management Nightmares**: If a user forgets their passphrase, the data is effectively lost, and there's no way to recover it from the developer's side.
2. **Feature Limitations**: Complex server-side operations (like offline/background tasks, AI queries, real-time collaboration, or heavy computation) can't easily happen if the server is never capable of processing decrypted data.
3. **Platform Silos**: Some solutions rely on iCloud, Google Drive, or local device storage. That can hamper multi-device usage or multi-OS compatibility.
Other approaches include self-hosting. However, these either burden users with dev ops overhead or revert to the "trust me" model for the server if you "self-host" on a cloud provider.
## **Secure Enclaves**
### **The Hybrid Approach**
Secure enclaves offer a compelling middle ground. They combine the privacy benefits of keeping data secure from prying admins while still allowing meaningful server-side computation. In a nutshell, an enclave is a protected environment within a machine, isolated at the hardware level, so that even if the OS or server is compromised, the data and code inside the enclave remain hidden.
![](https://blog.opensecret.cloud/content/images/2025/02/Screenshot-2025-02-05-at-8.21.31-PM.png)App Service Running Inside Secure Enclave
### **High-Level Goal of Enclaves**
Enclaves, also known under the broader umbrella of **confidential computing**, aim to:\
• **Lock down data** so that only authorized code within the enclave can process the original plaintext data.\
• **Deny external inspection** by memory dumping, attaching a debugger, or intercepting plaintext network traffic.\
• **Prove** to external users or services that an enclave is running unmodified, approved code (this is where **remote attestation** comes in).
### **Different Secure Enclave Solutions**
[**AMD SEV**](https://www.amd.com/en/developer/sev.html?ref=blog.opensecret.cloud) **(Secure Encrypted Virtualization)** encrypts an entire virtual machine's memory so that even a compromised hypervisor cannot inspect or modify guest data. Its core concept is "lift-and-shift" security. No application refactoring is required because hardware-based encryption automatically protects the OS and all VM applications. Later enhancements (SEV-ES and SEV-SNP) added encryption of CPU register states and memory integrity protections, further limiting hypervisor tampering. This broad coverage means the guest OS is included in the trusted boundary. AMD SEV has matured into a robust solution for confidential VMs in multi-tenant clouds.
[**Intel TDX**](https://www.intel.com/content/www/us/en/developer/tools/trust-domain-extensions/overview.html?ref=blog.opensecret.cloud) **(Trust Domain Extensions)** shifts from process-level enclaves to full VM encryption, allowing an entire guest operating system and its applications to run in an isolated "trust domain." Like AMD SEV, Intel TDX encrypts and protects all memory the VM uses from hypervisors or other privileged software, so developers do not need to refactor their code to benefit from hardware-based confidentiality. This broader scope addresses many SGX limitations, such as strict memory bounds and the need to split out enclave-specific logic, and offers a more straightforward "lift-and-shift" path for running existing workloads privately. While SGX is now deprecated, TDX carries forward the core confidential computing principles but applies them at the virtual machine level for more substantial isolation, easier deployment, and the ability to scale up to large, memory-intensive applications.
[**Apple Secure Enclave and Private Compute**](https://security.apple.com/blog/private-cloud-compute/?ref=blog.opensecret.cloud) is a dedicated security coprocessor embedded in most Apple devices (iPhones, iPads, Macs) and now extended to Apple's server-side AI infrastructure. It runs its own microkernel, has hardware-protected memory, and securely manages operations such as biometric authentication, key storage, and cryptographic tasks. Apple's "Private Compute" approach in the cloud brings similar enclave capabilities to server-based AI, enabling on-device-grade privacy even when requests are processed in Apple's data centers.
[**AWS Nitro Enclaves**](https://docs.aws.amazon.com/enclaves/latest/user/nitro-enclave.html?ref=blog.opensecret.cloud) carve out a tightly isolated "mini-VM" from a parent EC2 instance, with its own vCPUs and memory guarded by dedicated Nitro cards. The enclave has no persistent storage and no external network access, significantly reducing the attack surface. Communication with the parent instance occurs over a secure local channel (vsock), and AWS offers hardware-based attestation so that secrets (e.g., encryption keys from AWS KMS) can be accessed only to the correct enclave. This design helps developers protect sensitive data or code even if the main EC2 instance's OS is compromised.
[**NVIDIA GPU TEEs**](https://www.nvidia.com/en-us/data-center/solutions/confidential-computing/?ref=blog.opensecret.cloud) **(Hopper H100 and Blackwell)** extend confidential computing to accelerated workloads by encrypting data in GPU memory and ensuring that even a privileged host cannot view or tamper with it. Data moving between CPU and GPU is encrypted in transit, so sensitive model weights or inputs remain protected during AI training or inference. NVIDIA's hardware and drivers handle secure data paths under the hood, allowing confidential large language model (LLM) workloads and other GPU-accelerated computations to run with minimal performance overhead and strong security guarantees.
### **Key Benefits**
One major advantage of enclaves is their ability to **keep memory completely off-limits** to outside prying eyes. Even administrators who can normally inspect processes at will are blocked from peeking into the enclave's protected memory space. The enclave model is a huge shift in the security model: it prevents casual inspection and defends against sophisticated memory dumping techniques that might otherwise leak secrets or sensitive data.
Another key benefit centers on cryptographic keys that are **never exposed outside the enclave**. Only verified code running inside the enclave environment can run decryption or signing operations, and it can only do so while that specific code is running. This ensures that compromised hosts or rogue processes, even those with high-level privileges, are unable to intercept or misuse the keys because the keys remain strictly within the trusted boundary of the hardware.
Enclaves can also offer the power of **remote attestation**, allowing external clients or systems to confirm that they're speaking to an authentic, untampered enclave. By validating the hardware's integrity measurements and enclave-specific proofs, the remote party can be confident in the underlying security properties, an important guarantee in multi-tenant environments or whenever trust boundaries extend across different organizations and networks.
Beyond that, **reproducible builds** can create a verifiable fingerprint proving which binary runs in the enclave. This is a step above a simple "trust us" approach. Anyone can independently recreate the enclave image and verify the resulting cryptographic hash by using a reproducible build system (for example, [our NixOS-based solution](https://github.com/OpenSecretCloud/opensecret/blob/master/flake.nix?ref=blog.opensecret.cloud)). If it matches, then users and developers know precisely how code handles their data, boosting confidence that no hidden changes exist.
It's worth noting that although enclaves shield you from software devs, cloud providers, and insider threats, you do have to trust the **hardware vendor** (Intel, AMD, Apple, AWS, or NVIDIA) to implement their microcode and firmware securely. The entire enclave model could be theoretically undermined if a CPU maker's root keys or manufacturing process were compromised. Fortunately, these companies undergo extensive audits and firmware validations (often with third-party researchers), and their remote attestation mechanisms allow you to confirm specific firmware versions before trusting an enclave. While this adds a layer of "vendor trust," it's still a far more contained risk than trusting an entire operating system or cloud stack, so enclaves remain a strong step forward in practical, confidential computing.
## **How We Use Secure Enclaves**
Now that we've covered the general idea of enclaves let's look at how we specifically implement them in OpenSecret, our developer platform for handling user auth, private keys, data encryption, and AI workloads.
### **Our Stack: AWS Nitro + Nvidia TEE**
• **AWS Nitro Enclaves for the backend**: All critical logic, authentication, private key management, and data encryption/decryption run inside an AWS Nitro Enclave.
• **Nvidia Trusted Execution for AI**: For large AI inference (such as the Llama 3.3 70B model), we utilize Nvidia's GPU-based TEEs to protect even GPU memory. This means users can feed sensitive data to the AI model **without** exposing it in plaintext to the GPU providers or us as the operator. [Edgeless Systems](https://www.edgeless.systems/?ref=blog.opensecret.cloud) is our Nvidia TEE provider, and due to the power of enclave verification, we don't need to worry about who runs the GPUs. We know requests can't be inspected or tampered with.
### **End-to-End Encryption from Client to Enclave**
![](https://blog.opensecret.cloud/content/images/2025/02/Screenshot-2025-02-05-at-8.29.34-PM.png)Client-side Enclave Attestation from Maple AI
Before login or data upload, the user/client verifies the **enclave attestation** from our platform. This process proves that the specific Nitro Enclave is genuine and runs the exact code we've published. You can check this out live on [Maple AI's attestation page](https://trymaple.ai/proof?ref=blog.opensecret.cloud).
Based on the attestation, the client establishes a secure ephemeral communication channel that only that enclave can decrypt. While we take advantage of SSL, it is typically not terminated inside the enclave itself. To ensure there's full encrypted data transfer all the way through to the enclave, we establish this additional handshake based on the attestation document that is used for all API requests during the client session.
From there, the user's credentials, private keys, and data pass through this secure channel directly into the enclave, where they are decrypted and processed according to the user's request.
### **In-Enclave Operations**
At the core of OpenSecret's approach is the conviction that security-critical tasks must happen inside the enclave, where even administrative privileges or hypervisor-level compromise cannot expose plaintext data. This encompasses everything from when a user logs in to creating and managing sensitive cryptographic keys. By confining these operations to a protected hardware boundary, developers can focus on building their applications without worrying about accidental data leaks, insider threats, or malicious attempts to harvest credentials. The enclave becomes the ultimate gatekeeper: it controls how data flows and ensures that nothing escapes in plain form.
![](https://blog.opensecret.cloud/content/images/2025/02/Screenshot-2025-02-05-at-8.09.22-PM.png)User Auth Methods running inside Enclave
A primary example is **user authentication**. All sign-in workflows, including email/password, OAuth, and upcoming passkey-based methods, are handled entirely within the enclave. As soon as a user's credentials enter our platform through the encrypted channel, they are routed straight into the protected environment, bypassing the host's operating system or any potential snooping channels. From there, authentication and session details remain in the enclave, ensuring that privileged outsiders cannot intercept or modify them. By centralizing these identity flows within a sealed environment, developers can assure their users that no one outside the enclave (including the cloud provider or the app's own sysadmins) can peek at, tamper with, or access sensitive login information.
![](https://blog.opensecret.cloud/content/images/2025/02/Screenshot-2025-02-05-at-8.07.52-PM.png)Main Enclave Operations in OpenSecret
The same principle applies to **private key management**. Whether keys are created fresh in the enclave or securely transferred into it, they remain sealed away from the rest of the system. Operations like digital signing or content decryption happen only within the hardware boundary, so raw keys never appear in any log, file system, or memory space outside the enclave. Developers retain the functionality they need, such as verifying user actions, encrypting data, or enabling secure transactions without ever exposing keys to a broader (and more vulnerable) attack surface. User backup options exist as well, where the keys can be securely passed to the end user.
![](https://blog.opensecret.cloud/content/images/2025/02/Screenshot-2025-02-05-at-8.08.04-PM.png)Realtime Encrypted Data Sync on Multiple Devices
Another crucial aspect is **data encryption at rest**. While user data ultimately needs to be stored somewhere outside the enclave, the unencrypted form of that data only exists transiently inside the protected environment. Encryption and decryption routines run within the enclave, which holds the encryption keys strictly in memory under hardware guards. If a user uploads data, it is promptly secured before it leaves the enclave. When data is retrieved, it remains encrypted until it reenters the protected region and is passed back to the user through the secured communication channel. This ensures that even if someone gains access to the underlying storage or intercepts data in transit, they will see only meaningless ciphertext.
![](https://blog.opensecret.cloud/content/images/2025/02/Screenshot-2025-02-05-at-8.08.13-PM.png)Confidential AI Workloads
Finally, **confidential AI workloads** build upon this same pattern: the Nitro enclave re-encrypts data so it can be processed inside a GPU-based trusted execution environment (TEE) for inference or other advanced computations. Sensitive data, like user-generated text or private documents, never appears in the clear on the host or within GPU memory outside the TEE boundary. When an AI process finishes, only the results are returned to the enclave, which can then relay them securely to the requesting user. By seamlessly chaining enclaves together, from CPU-based Nitro Enclaves to GPU-accelerated TEEs, we can deliver robust, hardware-enforced privacy for virtually any type of server-side or AI-driven operation.
### **Reproducible Builds + Verification**
![](https://blog.opensecret.cloud/content/images/2025/02/Screenshot-2025-02-05-at-8.07.58-PM.png)Client verifies enclave attestation document
We build our enclaves on **NixOS** with reproducible builds, ensuring that anyone can verify that the binary we publish is indeed the binary running in the enclave. This build process is essential for proving we haven't snuck in malicious code to exfiltrate data or collect sensitive logs.
Our code is fully open source ([GitHub: OpenSecret](https://github.com/OpenSecretCloud/opensecret?ref=blog.opensecret.cloud)), so you can audit or run it yourself. You can also verify that the cryptographic measurement the build process outputs matches the measurement reported by the enclave during attestation.
## **Putting It All Together**
![](https://blog.opensecret.cloud/content/images/2025/02/Screenshot-2025-02-05-at-8.09.09-PM.png)OpenSecret Offering: Private Key Management, Encrypted Sync, Private AI, and Confidential Compute
By weaving secure enclaves into every step, from authentication to data handling to AI inference, we shift the burden of trust away from human policies and onto provable, hardware-based protections. For app developers, you can offer your users robust privacy guarantees without rewriting all your business logic or building an entire security stack from scratch. Whether you're storing user credentials or running complex operations on sensitive data, the enclave approach ensures plaintext remains inaccessible to even the most privileged parties outside the enclave boundary. Developers can focus on building great apps, while OpenSecret handles the cryptographic "lock and key" behind the scenes.
This model provides a secure-by-design environment for industries that demand strict data confidentiality, such as healthcare, fintech, cryptocurrency apps for secure key management, or decentralized identity platforms. Instead of worrying about memory dumps or backend tampering, you can trust that once data enters the enclave, it's sealed off from unauthorized eyes, including from the app developers themselves. And these safeguards don't just apply to niche use cases. Even general-purpose applications that handle login flows and user-generated content stand to benefit, especially as regulatory scrutiny grows around data privacy and insider threats.
Imagine a telehealth startup using OpenSecret enclaves to protect patient information for remote consultations. Not only would patient data remain encrypted at rest, but any AI-driven analytics to assist with diagnoses could be run privately within the enclave, ensuring no one outside the hardware boundary can peek at sensitive health records. A fintech company could similarly isolate confidential financial transactions, preventing even privileged insiders from viewing or tampering with raw transaction details. These real-world implementations give developers a clear path to adopting enclaves for serious privacy and compliance needs without overhauling their infrastructure.
OpenSecret aims to be a **full developer platform** with end-to-end security from day one. By incorporating user authentication, data storage, and GPU-based confidential AI into a single service, we eliminate many of the traditional hurdles in adopting enclaves. No more juggling separate tools for cryptographic key management, compliance controls, and runtime privacy. Instead, you get a unified stack that keeps data encrypted in transit, at rest, and in use.
Our solution also caters to the exploding demand for AI applications: with TEE-enabled GPU workloads, you can securely process sensitive data for text inference without ever exposing raw plaintext or sensitive documents to the host system.
The result is a new generation of apps that deliver advanced functionality, like real-time encrypted data sync or AI-driven insights, while preserving user privacy and meeting strict regulatory requirements. You don't have to rely on empty "trust us" promises because hardware enclaves, remote attestation, and reproducible builds collectively guarantee the code is running untampered. In short, OpenSecret offers the building blocks needed to create truly confidential services and experiences, allowing you to innovate while ensuring data protection remains ironclad.
## **Things to Come**
We're excited to build on our enclaved approach. Here's what's on our roadmap:
• **Production Launch**: We're using this in production now with [Maple AI](https://trymaple.ai/?ref=blog.opensecret.cloud) and have a developer preview playground up and running. We'll have the developer environment ready for production in a few months.\
• **Multi-Tenant Support**: Our platform currently works for single tenants, but we're opening this up so developers can onboard without needing a dedicated instance.\
• **Self-Serve Frontend**: A dev-friendly portal for provisioning apps, connecting OAuth or email providers, and managing users.\
• **External Key Signing Options**: Integrations with custom hardware security modules (HSMs) or customer-ran key managers that can only process data upon verifying the enclave attestation.\
• **Confidential Computing as a Service**: We'll expand our platform so that other developers can quickly create enclaves for specialized workloads without dealing with the complexities of Nitro or GPU TEEs.\
• **Additional SDKs**: In addition to our [JavaScript client-side SDK](https://github.com/OpenSecretCloud/OpenSecret-SDK?ref=blog.opensecret.cloud), we plan to launch official support for Rust, Python, Swift, Java, Go, and more.\
• **AI API Proxy with Attestation/Encryption**: We already provide an easy way to [access a Private AI through Maple AI](https://trymaple.ai/?ref=blog.opensecret.cloud), but we'd like to open this up more for existing tools and developers. We'll provide a proxy server that users can run on their local machines or servers that properly handle encryption to our OpenAI-compatible API.
## **Getting Started**
Ready to see enclaves in action? Here's how to dive in:\
1. **Run OpenSecret**: Check out our open-source repository at [OpenSecret on GitHub](https://github.com/OpenSecretCloud/opensecret?ref=blog.opensecret.cloud). You can run your own enclaved environment or try it out locally with Docker.\
2. **Review Our SDK**: Our [JavaScript client SDK](https://github.com/OpenSecretCloud/OpenSecret-SDK?ref=blog.opensecret.cloud) makes it easy to handle sign-ins, put/get encrypted data, sign with user private keys, etc. It handles attestation verification and encryption under the hood, making the API integration seamless.\
3. **Play with Maple AI**: Try out [Maple AI](https://blog.opensecret.cloud/maple-ai-private-encrypted-chat/) as an example of an AI app built directly on OpenSecret. Your queries are encrypted end to end, and the Llama model sees them only inside the TEE.\
4. **Developer Preview**: Contact us if you want an invite to our early dev platform. We'll guide you through our SDK and give you access to the preview server. We'd love to build with you and incorporate your feedback as we develop this further.
## **Conclusion**
By merging secure enclaves (AWS Nitro and Nvidia GPU TEEs), user authentication, private key management, and an end-to-end verifiable encrypted approach, **OpenSecret** provides a powerful platform where we protect user data during collection, storage, and processing. Whether it's for standard user management, handling private cryptographic keys, or powering AI inference, the technology ensures that **no one**, not even us or the cloud provider, can snoop on data in use.
**We believe** this is the future of trustworthy computing in the cloud. And it's **all open source**, so you don't have to just take our word for it: you can see and verify everything yourself.
Do you have questions, feedback, or a use case you'd like to test out? Come join us on [GitHub](https://github.com/OpenSecretCloud?ref=blog.opensecret.cloud), [Discord](https://discord.gg/ch2gjZAMGy?ref=blog.opensecret.cloud), or email us for a developer preview. We can't wait to see what you build!
*Thank you for reading, and welcome to the era of enclaved computing.*
-
![](/static/nostr-icon-purple-64x64.png)
@ 3b7fc823:e194354f
2025-02-07 00:39:21
# Details on how to use a Burner Phone
Mobile phones are needed for communications when out in the world but they are a nightmare for privacy and security as detailed in <MISSIVE /07> especially when it comes to surveillance risks. This is more of a hands on guide for how to mitigate those risks.
Burner phones as the name describes is a use and "burn" device either for a single operation or for a longer period if proper precautions are taken. In case you are unaware what I mean by a burner phone; cell phones can be purchased from big box stores, gas stations, and kiosks in cash without a contract. They are usually not very expense and enable you to buy prepaid cards to use for phone and internet service.
Getting a Burner Phone:
1. Best to use a store out of town but not mandatory.
2. Do not take any electronics with you, especially another phone.
3. Park down the street in another parking lot near the store and walk over. Be mindful of security cameras.
4. Cover any tattoos or identifying marks. Wear a hat and a medical mask. (Thank you covid)
5. Use cash only to buy.
6. Leave, do not shop or buy anything else.
Setting up Burner Phone:
1. Go somewhere with free public WIFI (Starbucks, Library, whatever)
2. Do not take any electronics with you, especially another phone.
3. Open package and follow directions to activate using the public WIFI access.
4. Choose a random area code during setup.
5. Create a new random gmail account. (Do not reuse accounts or names)
6. Download and install a VPN, Signal or SimpleX, Firefox Focus Browser, Tor if needed. Delete any other unnecessary apps.
7. Change phone settings (see list)
8. Turn off and remove battery if able to (becoming harder to find) or put into a Faraday Bag.
9. Destroy packaging that came with the phone.
Phone Settings:
1. Turn off hotspot and tethering. Enable Always on VPN and Block Connections without VPN. Set DNS to automatic.
2. Turn off bluetooth and WIFI.
3. Disable all notifications, notification history, notifications on lock screen, and emergency alerts.
4. Turn off all sounds and vibrations.
5. Turn off Find my Device. Setup screen lock with password. (No bio)
6. Toggle everything in privacy: no permissions, turn off microphone, turn off usage and diagnostics, etc
7. Set Use Location to off.
8. Under Languages & Input > Virtual Keyboard > Gboard > Advanced: disable usage statistics, personalizing, and improve voice and typing for everyone.
Using a Burner Phone:
1. Never sign into any account associated with your real identity.
2. Never use it to contact anyone associated with your real identity.
3. Time and distance between burner phone and any other cell phone you own.
i.e. A hour has passed and several miles from when you use and had on the other device.
4. When not in use the battery is removed or in a Faraday Bag.
5. Always use a VPN and always use private search and browser set to delete upon closing (Firefox Focus default).
6. Never actually call or text from the phone. You only want to use SimpleX or Signal for communications.
7. Do not save anything (files, pictures, history) on the phone, especially if incriminating.
8. Do not take it with you or use unless necessary.
9. When in doubt, burn it and get another one.
10. Never carry over names, accounts, whatever from old burner phone to new burner phone.
Burning a phone:
1. Factory reset the device.
2. Remove and destroy the SIM card.
3. Remove the battery because lithium batteries can explode. (may have to take it apart)
4. Smash internals.
5. Burn remains or drown in water. (Throw it in the river)
As long as you are careful to never identify yourself with the burner phone the only surveillance they can do is know that a phone was used or in a location but not who it belongs to. Be aware that if you are caught with it on your person any information or contacts on the phone may get compromised. Be mindful what you put on it.
-
![](/static/nostr-icon-purple-64x64.png)
@ b8851a06:9b120ba1
2025-02-06 22:46:54
When Your Bitcoin Stash Saves Your Earnings Report: The Accounting Shift Every Business Needs to Understand
**Tesla’s Q4 2024 earnings were a wreck—revenue down, costs up. But thanks to Bitcoin, the financial airbags deployed so effectively that no one’s talking about the crash.
**
Let’s Be Clear:
This isn’t about praising Tesla or Elon Musk (we’ll leave that to fan accounts). It’s about dissecting how a simple accounting rule change turned Bitcoin into a corporate financial shock absorber. The numbers reveal a playbook any business can replicate.
The “Aha” Moment: Accounting Rules Meet Digital Gold
(Why This Matters for Main Street Businesses)
The Problem Before 2025:
Companies had to report Bitcoin like a cursed family heirloom—you could only tell people when its value dropped, never when it gained. Imagine having to value your house at its lowest sale price in the neighborhood, even while yours was freshly renovated.
The 2025 Fix:
New rules let companies report Bitcoin like stocks—current value, gains and losses included. Suddenly, that digital gold in the treasury vault gets to shine.
Why This Changes Everything:
• For Tesla: Their $184M Bitcoin stash got revalued to $1.076B → $600M paper gain
• For Your Business: Bitcoin isn’t just an asset; it’s an earnings hedge
For Tesla, Bitcoin turned a bad quarter into a balanced one. For your business, it’s the difference between surviving a downturn and thriving through one.
Tesla’s Numbers Decoded: Bitcoin as Financial CPR
The Crash:
• Automotive revenue ↓ 8%
• Operating expenses ↑ 9%
• Missed revenue targets by $1.5B
The Airbag:
• Bitcoin gain: $600M
• EPS boost: 23% of total earnings
• Balance sheet upgrade: 484% Bitcoin value increase
The Takeaway:
Bitcoin didn’t fix Tesla’s car business—it kept their financials on life support while they work on repairs.
The Business Owner’s Guide to Bitcoin Airbags
(No Tech Jargon, Just Street Smarts)
1. Your New Financial Shock Absorber
• Old Way: Keep cash reserves losing 4-7% annually to inflation
• Bitcoin Way: Treasury that grows while parked
Real Math:
$10M Treasury Allocation
Year 1:
- Cash: $9.6M (after 4% inflation loss)
- Bitcoin: $15.4M (54% avg annual growth*)
2. The “Get Out of Jail Free” Card
When core business stumbles (like Tesla’s did):
• Bitcoin gains offset operational losses
• Buys time for turnaround strategies
3. Shareholder Whisperer
That Bitcoin gain isn’t just numbers—it’s storytelling fuel:
• “Our innovative treasury strategy delivered $600M in non-operational income”
• Beats explaining another quarter of declining sales
Building Your Bitcoin Safety Net
A Step-by-Step Playbook
Step 1: Treasury Triage
• Allocate 5-10% of cash reserves to Bitcoin
• Not speculation—modern balance sheet insurance
Step 2: Accounting Alignment
Work with your CFO to:
• Implement FASB-compliant reporting
• Train teams on quarterly revaluations
Step 3: Strategic Deployment
• Hold through volatility cycles
• Treat gains as bonus liquidity for:
• R&D funding
• Debt reduction
• Opportunistic acquisitions
Pro Tip: Start small—even a 1% Bitcoin allocation creates optionality without material risk.
Objection Busters: What Skeptics Miss
“But Bitcoin’s Too Volatile!”
Cash is guaranteed to lose value. Bitcoin at least gives you a fighting chance.
“We’re Not Tech Bros!”
• Bitcoin isn’t tech—it’s digital real estate
• The network effect is its tenant base
“Accounting’s Too Complex!”
• Modern tools automate revaluations
• Takes less time than managing foreign currency hedges
The Future of Corporate Treasuries
(Why Early Adopters Win)
2025’s Landscape:
• First movers already reaping benefits
• Late adopters face inflationary erosion
Your Move:
• Conduct treasury health check
• Model Bitcoin allocation scenarios
• Implement phased adoption
Final Word:
Tesla’s story isn’t about “crypto” moonshots—it’s about modern financial engineering. The new accounting rules have turned Bitcoin into a Swiss Army knife for corporate treasuries:
• Blade 1: Inflation hedge
• Blade 2: Earnings supplement
• Blade 3: Strategic reserve asset
The question isn’t whether Bitcoin belongs on corporate balance sheets—it’s how much value your business will leave on the table by ignoring this tool.
Your Competitors Won’t Wait—Why Should You?
→ [Free Treasury Health Assessment]( https://neowealth.xyz/code)
→ [Bitcoin Accounting Implementation Guide
]( https://neowealth.xyz/services)
Let [www.NeoWealth.xyz]( https://neowealth.xyz/) assist you– Modern Treasury Solutions for Pragmatic Leaders
#Nostr Footnotes:
Data Sources: #Tesla Q4 2024 Earnings Report, FASB Accounting Standards Update 2023-08, Bitcoin Historical Returns Analysis (2015-2024)
Past performance ≠ future results.
#Bitcoin not #Crypto