-

@ 4fe4a528:3ff6bf06
2025-03-01 12:24:49
Technology adoption has been hard for a lot of people to understand. Tucker this week finally understood why gold became money. He finally understood that hard money drives out money that isn’t scarce. Still, most people don’t store their wealth in the hardest money ever made—Bitcoin.
Yes, Bitcoin went down 20-25% this week. How can the scarcest asset vary that much? Humans tend toward emotion—fear or greed. I am no exception, but if you have a plan or have been here before, you can control your emotion.
Let me illustrate. I installed a camera on the barn this week so I could save time checking on the cows. Lo and behold, the WiFi wasn’t strong enough, so I bought two outdoor access points. Whenever I would add them to the house, the WiFi mesh system would cause my internet to go down on the main computer. Fear of losing internet was causing me to consider taking a $100 write-off on my idea of saving time. Because I have solved networking issues before, I had the courage to be greedy and keep working at it. I know a lot of people would give up on technology and throw their cell phone in the snowbank - my neighbor does that. He usually comes back for it because he likes communication. Is a cell phone a feature or a bug? Answer… both.
What Satoshi solved 16 years ago was how to move 1s and 0s to different devices and keep them secure. What Vint Cerf solved 35 years ago was how to route 1s and 0s and have the packets arrive at the intended destination. Both Bitcoin and the Internet rely on people not throwing their cell phone in the snowbank.
This last drawdown in Bitcoin has given me hope that people will start to understand technology better and give up on Sol and Eth. Finally, people are realizing that printing digital coins doesn’t help people, just like printing Canadian dollars doesn’t help the average Canadian get ahead. It could be that Sam Bankman-Fried is in jail, but I think it has more to do with people starting to get comfortable with technology.
https://youtu.be/fxWZO0FEQ1g
-

@ a95c6243:d345522c
2025-03-01 10:39:35
*Ständige Lügen und Unterstellungen, permanent falsche Fürsorge* *\
können Bausteine von emotionaler Manipulation sein. Mit dem Zweck,* *\
Macht und Kontrolle über eine andere Person auszuüben.* *\
Apotheken Umschau*  
**Irgendetwas muss passiert sein: «Gaslighting» ist gerade Thema** in vielen Medien. Heute bin ich nach längerer Zeit mal wieder über dieses Stichwort gestolpert. Das war in einem [Artikel](https://norberthaering.de/propaganda-zensur/dwd-referenzperiode/) von Norbert Häring über Manipulationen des Deutschen Wetterdienstes (DWD). In diesem Fall ging es um eine Pressemitteilung vom Donnerstag zum «viel zu warmen» Winter 2024/25.
**Häring wirft der Behörde vor, dreist zu lügen und Dinge auszulassen,** um die Klimaangst wach zu halten. Was der Leser beim DWD nicht erfahre, sei, dass dieser Winter kälter als die drei vorangegangenen und kälter als der Durchschnitt der letzten zehn Jahre gewesen sei. Stattdessen werde der falsche Eindruck vermittelt, es würde ungebremst immer wärmer.
**Wem also der zu Ende gehende Winter eher kalt vorgekommen sein sollte,** mit dessen Empfinden stimme wohl etwas nicht. Das jedenfalls wolle der DWD uns einreden, so der Wirtschaftsjournalist. Und damit sind wir beim Thema Gaslighting.
**Als** **[Gaslighting](https://bayern-gegen-gewalt.de/gewalt-infos-und-einblicke/formen-von-gewalt/psychische-gewalt/gaslighting/)** **wird eine Form psychischer Manipulation bezeichnet,** mit der die Opfer desorientiert und zutiefst verunsichert werden, indem ihre eigene Wahrnehmung als falsch bezeichnet wird. Der Prozess führt zu Angst und Realitätsverzerrung sowie zur Zerstörung des Selbstbewusstseins. Die Bezeichnung kommt von dem britischen Theaterstück «Gas Light» aus dem Jahr 1938, in dem ein Mann mit grausamen Psychotricks seine Frau in den Wahnsinn treibt.
**Damit Gaslighting funktioniert, muss das Opfer dem Täter vertrauen.** Oft wird solcher Psychoterror daher im privaten oder familiären Umfeld beschrieben, ebenso wie am Arbeitsplatz. Jedoch eignen sich die Prinzipien auch perfekt zur Manipulation der Massen. Vermeintliche Autoritäten wie Ärzte und Wissenschaftler, oder «der fürsorgliche Staat» und Institutionen wie die UNO oder die WHO wollen uns doch nichts Böses. Auch Staatsmedien, Faktenchecker und diverse NGOs wurden zu «vertrauenswürdigen Quellen» erklärt. Das hat seine Wirkung.
**Warum das Thema Gaslighting derzeit scheinbar so populär ist,** vermag ich nicht zu sagen. Es sind aber gerade in den letzten Tagen und Wochen auffällig viele Artikel dazu erschienen, und zwar nicht nur von Psychologen. Die *Frankfurter Rundschau* hat gleich mehrere publiziert, und [Anwälte](https://www.anwalt.de/rechtstipps/gaslighting-beispiele-anzeichen-strafbarkeit-212449.html) interessieren sich dafür offenbar genauso wie Apotheker.
**Die** ***Apotheken Umschau*** **machte sogar auf** **[«Medical Gaslighting»](https://archive.is/Wx5YM)** **aufmerksam.** Davon spreche man, wenn Mediziner Symptome nicht ernst nähmen oder wenn ein gesundheitliches Problem vom behandelnden Arzt «schnöde heruntergespielt» oder abgetan würde. Kommt Ihnen das auch irgendwie bekannt vor? Der Begriff sei allerdings irreführend, da er eine manipulierende Absicht unterstellt, die «nicht gewährleistet» sei.
**Apropos Gaslighting: Die noch amtierende deutsche Bundesregierung** [meldete](https://www.bundesregierung.de/breg-de/service/newsletter-und-abos/bundesregierung-aktuell/ausgabe-08-2025-februar-28-2336254?view=renderNewsletterHtml) heute, es gelte, «weiter \[sic!] gemeinsam daran zu arbeiten, einen gerechten und dauerhaften Frieden für die Ukraine zu erreichen». Die Ukraine, wo sich am Montag «der völkerrechtswidrige Angriffskrieg zum dritten Mal jährte», [verteidige](https://transition-news.org/wikileaks-der-westen-wusste-dass-ein-nato-beitritt-der-ukraine-riskant-war) ihr Land und «unsere gemeinsamen Werte».
**Merken Sie etwas? Das Demokratieverständnis mag ja tatsächlich** inzwischen in beiden Ländern ähnlich traurig sein. Bezüglich Friedensbemühungen ist meine Wahrnehmung jedoch eine andere. Das muss an meinem Gedächtnis liegen.
***
Dieser Beitrag ist zuerst auf ***[Transition News](https://transition-news.org/bitte-nicht-von-gaslichtern-irritieren-lassen)*** erschienen.
-

@ 04c195f1:3329a1da
2025-03-01 10:36:50
***Yesterday's chaotic Oval Office meeting between Trump, Vance, and Zelensky exposes a harsh truth: Europe can no longer depend on American protection. The time has come for Europe to reclaim its sovereignty and rebuild as an independent power.***
## A Diplomatic Theater With No Happy Ending
Yesterday's chaotic scenes in the Oval Office revealed more than just diplomatic tension—they exposed the fundamental weakness of Europe's strategic position. As President Trump, Vice President Vance, and President Zelensky engaged in their uncomfortable public spectacle, one truth became painfully clear: Europe can no longer rely on American protection.
The awkward press conference featured about 40 minutes of relative calm before descending into 10 minutes of complete chaos. This final meltdown was likely never intended to produce meaningful results. Each participant appeared to be performing for different audiences—Trump and Vance signaling to their base, Zelensky demonstrating resolve to European allies. Without concrete security guarantees, any agreement would be meaningless for Ukraine, a reality all parties surely understood beforehand.
When Vance spoke of diplomacy as a "new strategy"—ignoring numerous failed diplomatic initiatives—he crossed a line that provoked Zelensky's visible frustration. The subsequent breakdown wasn't merely a failure of diplomatic protocol but the public collapse of a relationship Europe has staked its security upon.
## The Price of Misguided Priorities
This moment of crisis presents an opportunity if European nations are willing to confront uncomfortable realities. The time has come for Europe to emerge as a third global power, independent from both Eastern and Western influence. However, the path forward requires acknowledging our current weaknesses.
European leadership has squandered decades pursuing ideological luxuries while our industrial and military capabilities have atrophied. While obsessing over multicultural social engineering, progressive identity politics, and globalist agendas, we've neglected the fundamental responsibilities of sovereign nations: securing borders, building defensive capabilities, and fostering national cohesion.
The defense of European nations begins with domestic policy. A society divided against itself cannot stand firm in the face of external threats. This principle applies whether discussing Sweden's defense posture or the broader European security architecture.
Photo by [Christian Lue](https://english.daneriksson.com/p/true) on [Unsplash](https://unsplash.com/)
## Reclaiming National Identity and Purpose
To rebuild our defensive capabilities, we must first address the internal fragmentation deliberately cultivated across the political spectrum. The active policies of societal division pursued with increasing fervor since the latter half of the 20th century have undermined the very foundations of national identity and common purpose.
Strengthening national defense requires citizens who understand their shared heritage and believe their nation is worth defending. In practical terms, this means confronting difficult questions about immigration, assimilation, and the presence of potential fifth-column elements within our societies. Nations with higher social cohesion demonstrate greater willingness to defend their collective interests.
The current crisis in Ukraine and the uncertain American commitment should serve as a wake-up call. European nations must rapidly rebuild industrial capacity, military strength, and most importantly, a sense of shared purpose. This demands breaking free from the ideological constraints that have guided European politics for generations.
Although European establishment politicians show little appetite for such fundamental reassessment, events are accelerating rapidly. The dramatic scenes in Washington should catalyze serious reflection across European capitals. We cannot hold our breath waiting for political leadership to regain sense—we must push the conversation forward ourselves.
Europe stands at a crossroads. We can continue our dangerous dependence on unreliable partners, or we can reclaim our sovereignty and rebuild our strength. The choice should be obvious, but making it requires courage our leaders have thus far failed to demonstrate.
■
-

@ fd78c37f:a0ec0833
2025-03-01 08:57:55
**Author**: Zhengyu Qian, Eric Zhang
**Original Link**: https://research.dorahacks.io/2025/02/22/maci-mailbox/
We are not reinventing email.
Even a glance at the TOC of [IETF RFC 5322](https://datatracker.ietf.org/doc/html/rfc5322) reveals: email is long-standing and well-established, but far from simple. This is just one piece of the puzzle in today’s email system.
What we would like to do first is to review the essence of message delivery.
## Proto-mail
A typical process of message delivery can be broken down into three critical components:
1. Individuals intending to exchange messages—referred to as the **users**.
2. An intermediary, or **agent**, that facilitates the delivery.
3. The **message** itself.

Message delivery takes place when the sender hands over the message (e.g., a written note) to an agent—a person (a messenger), a device (a beacon), or an institution (a post office). The agent then dispatches the message to the recipient.
Though direct communication, such as face-to-face conversation, falls outside the scope of this context.
## The Protocol of MACI Mailbox
The MACI Mailbox is an encryption-based mailing protocol that builds directly on the three components above, with modifications and extensions.

1. The **user** consists of two parts:
- An **account**, typically with a publicly visible **mailing address**.
- A **keypair**(a private key and its corresponding public key), which works its magic in encrypted communication.
2. The **agent** has a similar structure:
- An **account**.
- A **keypair**.
3. The message is simple, consisting of two fields:
- **Subject**.
- **Body**.
The following outlines the flow of message delivery in the MACI Mailbox protocol. The process of sending a message is addressed first.

1. The sender writes a **message**.
2. The **agent** encrypts the message **using its public key**, posts and stores it in a shared public database (e.g. a blockchain, Nostr), and assigns it a queryable **ID**.
3. The sender wraps the **ID** of encrypted message together with the **agent’s private key**, encrypts them using the **recipient’s public key**, and broadcasts the resulting encrypted data to a public space. Yes, **broadcasts it publicly**—feeling like encrypted radio communication yet?
In this process, asymmetric encryption is introduced twice, achieving something valuable: the decoupling of message storage from broadcast. This has at least two key implications:
1. It’s highly flexible to choose the infrastructures for encrypted message **posting and storage** as well as **broadcasting** facilities—both of which are **modular, replaceable, and trustless**.
2. Storage and broadcast infrastructures can be separately tailored to meet specific requirements. Typically:
- Message storage is expected to be inexpensive, reliable, and scalable.
- Broadcast infrastructure can be customized to fit the varying user ecosystems or needs.

Receiving a message is basically the reverse process:
1. The recipient indexes their mail in the broadcast space, decrypts it with **their own private key** (guaranteed by the principles of asymmetric encryption), and retrieves both the **ID of encrypted message** (storage address) and **the agent’s private key** (which, as you may recall, was bundled with the message ID before broadcast).
2. With the message ID, the recipient fetches the encrypted message from storage and decrypts it using the agent’s private key to obtain the plaintext message.
3. Tada.
It can be observed that the agent’s role described above is highly procedural, lending itself to a modular and replaceable design. This enables significant flexibility in the implementation of MACI Mailbox services and applications.
## Vota-Nostr Mailbox: basic architecture
The Vota-Nostr Mailbox is the first implementation of the Protocol by Dora Factory, consisting of several core modules:
- **A smart contract** deployed on [Dora Vota](https://research.dorahacks.io/2023/07/31/vota/) appchain to handle the broadcasting of messages.
- [Nostr relays](https://nostr.com/relays), used for publishing and storing encrypted messages.
- **An indexer service** to assist users in locating relevant messages, such as those sent to or from themselves.
- **A web app** as the interface for interacting with the Vota-Nostr Mailbox.


First, user accounts are implemented as on-chain accounts of Dora Vota (represented as a wallet address) paired with a public/private [ECC](https://en.wikipedia.org/wiki/Elliptic-curve_cryptography) keypair. Message content is kept simple as plain-text strings, with the flexibility to upgrade it later (Everybody Loves Rich Text).
Next, let’s push the boundaries for the agent. Ideally, users shouldn’t have to learn how to interact with it actively—think about fully automated agents. Or picture a stylish scene from *[The Day of the Jackal](https://www.imdb.com/title/tt24053860/)*: [Eddie Redmayne](https://www.imdb.com/name/nm1519666/) casually discarding a phone after each call.
Thus, a disposable, one-time auto agent is designed for each mail flow. This agent consists of a randomly generated ECC keypair and a temporarily created Nostr account (essentially another keypair: [npub/nsec](https://nostr.com/get-started#understanding-keys)).
## Vota-Nostr Mailbox: communication workflow
In [Vota-Nostr implementation](https://vota.dorafactory.org/mailbox) of MACI Mailbox Protocol, the communication flow is as follows. Both the encryption/decryption of message content and the broadcast rely on elliptic-curve cryptography.


To enhance user experience, a “Sent Messages” feature has been implemented, allowing senders to index, decrypt, and review their sent messages. In general, with asymmetric encryption, only the recipient’s private key can decrypt the encrypted content. Technically, there are cryptographic methods to enable mutual decryption by both sender and recipient.
For simplicity at this stage, this issue is addressed by creating **a duplicate of each broadcast data** (on Dora Vota appchain). This duplicate is encrypted using the sender’s own public key, allowing the sender to decrypt it with their private key.
Since the Protocol decouples the storage of encrypted message from the broadcast data, this duplication doesn’t significantly increase the payload on the broadcast infrastructure. Only the **message ID** and the **agent’s private key** need to be processed as duplicates, both of which are compact and independent of the actual message size (the length of your address line and the size of your front door key don’t depend on the dimensions of your house).
Below outlines the entire communication process:
1. The sender encrypts their message using the **agent’s one-time public key** and publishes it to Nostr relay(s) via the **agent’s one-time Nostr account**, obtaining the encrypted message’s ID (i.e., **Nostr event ID**).
2. The sender wraps the encrypted message ID along with the **agent’s one-time private key**, encrypts them using the **recipient’s public key**, and broadcasts the resulting encrypted data to the appchain via **their own Dora Vota account**. This process leverages wallet apps/extensions for transaction submission and the smart contract for processing, closely resembling how users typically interact with blockchains and dapps.
3. Once the on-chain transaction is processed, the encrypted data is broadcast on Dora Vota. Both the sender and the recipient can retrieve the data at any time via the **Mailbox Indexer**.
4. The recipient decrypts the broadcast encrypted data using **their own private key**, finding the **Nostr event ID** and the corresponding decryption key (**one-time agent private key**). They then fetch the encrypted message from Nostr relay(s) by the ID and decrypt it with the one-time private key.
5. The sender can follow a nearly identical process to fetch and decrypt their own duplicate, enabling them to review sent messages.
##
**Acknowledgements**
The MACI Mailbox protocol was conceived during a Dora Factory developer meeting in Kyoto, March 2024. Eric Zhang supported its implementation in October as a tool to facilitate communications and campaigns in MACI decentralized governance. Shrey Khater and Divyansh Joshi contributed to an MVP of the Vota-Nostr implementation. The protocol was officially integrated with Dora Vota appchain as well as its frontend with efforts from Zhengyu Qian, Dennis Tang, and Vegebun.
-

@ da0b9bc3:4e30a4a9
2025-03-01 08:36:18
Hello Stackers!
Welcome on into the ~Music Corner of the Saloon!
A place where we Talk Music. Share Tracks. Zap Sats.
So stay a while and listen.
🚨Don't forget to check out the pinned items in the territory homepage! You can always find the latest weeklies there!🚨
🚨Subscribe to the territory to ensure you never miss a post! 🚨
originally posted at https://stacker.news/items/900550
-

@ 95cb4330:96db706c
2025-03-01 07:38:13
Embracing The Principle of Asymmetric Bets
Embracing the principle of asymmetric bets, as practiced by visionaries like Jeff Bezos and Peter Thiel, involves seeking opportunities where the potential gains far outweigh the possible losses. This strategy enables bold decision-making while minimizing exposure to significant failures.
---
## Understanding Asymmetric Bets
- **Definition:**
An asymmetric bet is a strategic decision where the potential upside is substantially greater than the downside risk. This approach allows individuals and organizations to pursue high-reward opportunities without jeopardizing overall stability.
---
## Examples in Practice
- **Jeff Bezos and Amazon Web Services (AWS):**
Bezos invested in AWS when cloud computing was still emerging. The potential upside—a trillion-dollar business—vastly outweighed the moderate research and development costs, exemplifying an asymmetric bet.
- **Peter Thiel's Investment in Facebook:**
Thiel's early $500,000 investment in Facebook transformed into a multi-billion-dollar return, showcasing the immense potential of asymmetric bets in venture capital.
---
## Implementing Asymmetric Bets
1. **Identify Opportunities with High Upside and Low Downside:**
Seek situations where the potential benefits are disproportionately higher than the risks involved.
2. **Evaluate the Risk-to-Reward Ratio:**
Assess scenarios where even a small probability of success can lead to substantial rewards, justifying the risk taken.
3. **Diversify Bets:**
Spread resources across multiple asymmetric opportunities to increase the likelihood of significant returns while mitigating individual risks.
---
## Action Step
Identify a decision or project where the potential upside is considerable and the downside is limited. Take action on this opportunity today, leveraging the principle of asymmetric bets to maximize success while minimizing risk.
---
By adopting this mindset, you position yourself to capitalize on transformative opportunities that can lead to substantial growth and innovation.
---
-

@ b4403b24:83542d4e
2025-02-28 23:05:36
https://x.com/JacquiHeinrich/status/1895547519117246611
originally posted at https://stacker.news/items/900278
-

@ 88cc134b:5ae99079
2025-02-28 22:18:17
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Morbi eget mi euismod, porta enim at, congue erat. **Vivamus in ante leo. Vestibulum feugiat**, mauris a faucibus ultrices, enim massa bibendum magna, eu consequat leo mi eu velit. Mauris et magna rhoncus, ornare justo a, dictum sapien. Maecenas mattis rhoncus lacus ac lacinia*. Donec pulvinar finibus rutrum. Cras quis sapien lectus.*
Ut odio est, condimentum vel consectetur at, elementum et neque. Donec dignissim metus eu nisi vestibulum vehicula. Maecenas vel dictum leo. Ut nisi lorem, tempor nec enim a, porta elementum augue. Vestibulum dictum ex at magna viverra, a tincidunt sem tempor. Fusce sit amet bibendum dui. Pellentesque congue tempus purus eu faucibus. Suspendisse non ex nunc. Quisque posuere euismod dui eget euismod. Praesent convallis turpis ac tellus gravida suscipit. Sed nulla lorem, auctor at ornare vel, tristique sit amet metus. Nullam id tristique arcu. Morbi sit amet velit nisi. Quisque quis est ut ex tempus lobortis in ut turpis.
Sed eu diam ut leo suscipit dapibus nec at nisi. Etiam vel vulputate turpis. Suspendisse non ligula finibus, vestibulum magna ac, semper sapien. Integer dignissim dolor eros. Morbi nisl arcu, tincidunt non libero luctus, sagittis tempor urna. Duis sagittis nisi sed sagittis iaculis. Donec neque mi, fermentum nec suscipit ac, scelerisque vitae augue. Pellentesque id felis pharetra urna ornare congue ac quis augue. In posuere vulputate libero at pulvinar. Integer tincidunt justo nec cursus varius. Pellentesque habitant morbi tristique senectus et netus et malesuada fames ac turpis egestas. Donec fringilla tellus nibh, at feugiat risus vulputate in. Nulla commodo sem porttitor erat sodales, eu tincidunt nibh vulputate. Sed non massa volutpat nibh venenatis laoreet. Etiam arcu lectus, placerat sed porta et, aliquet sagittis elit. Integer pharetra nunc eget lacus vehicula bibendum.
Fusce non libero interdum, vulputate mi a, ornare justo. Sed fermentum sapien lacus, et iaculis est pharetra a. Cras elementum magna velit, et tempor nibh egestas sed. Cras sollicitudin maximus ligula sit amet interdum. Aenean ullamcorper congue tincidunt. Aliquam condimentum, nisl quis ullamcorper facilisis, urna est ultricies lorem, quis dapibus velit quam eu ante. Integer vulputate feugiat molestie. Donec vestibulum eros eu velit gravida accumsan. Phasellus elementum arcu non ultricies rutrum. Morbi ac rhoncus ante.
Maecenas scelerisque scelerisque nibh, ac lobortis tellus aliquam quis. Proin mi tellus, fringilla et hendrerit id, tincidunt nec turpis. Aenean ultrices magna iaculis felis tincidunt, eu molestie lorem cursus. Sed est eros, ultricies ut ornare non, suscipit vitae dui. Nunc nec rhoncus est. Aliquam at laoreet sapien, in ornare turpis. Morbi in quam at mi elementum vulputate. Donec sed sagittis purus. Morbi rutrum non mi vitae hendrerit. Nulla auctor ante lorem, eget scelerisque nunc hendrerit ornare.
-

@ 88cc134b:5ae99079
2025-02-28 21:58:37