Here's how the concept "If everyone decides everyone gets it" might be illustrated in each of the images I generated:
Image 1:
Community Engagement: The image likely shows a diverse group of people gathered in what appears to be a public space in Wellington, possibly a market or a community event. You'd see various individuals from different walks of life, perhaps including someone recognizable as a Bitcoin enthusiast, discussing, trading, or simply enjoying each other's company.
Shared Prosperity: Look for visual cues like people sharing food, information, or goods, symbolizing the idea that when everyone decides to share, everyone benefits. The phrase "If everyone decides everyone gets it" might be displayed on a banner or sign within the scene, emphasizing the collective decision to distribute resources equitably.
Image 2:
Cultural Exchange: This image could depict a more explicit cultural or technological exchange, with elements like people teaching each other about Bitcoin or local customs. There might be stalls or tables where goods are not just sold but shared or bartered, reflecting the cooperative model Hamish MacEwan might discuss.
Visual Representation of the Phrase: The phrase could be integrated into the environment, maybe painted on a wall, or part of a communal artwork, suggesting that the community has come to an agreement on sharing benefits, knowledge, or cultural values.
Image 3:
Diversity and Inclusion: Here, the focus might be on a broader spectrum of diversity, with an emphasis on inclusivity. People of various ages, ethnicities, and backgrounds would be involved in activities that suggest mutual benefit, like a community garden where everyone gets to enjoy the harvest, or a tech workshop where knowledge is freely shared.
Symbolism for Decision-Making: Perhaps there's a central point in the image where a decision-making process is visually represented, like a town hall meeting or a circle of people, symbolizing the collective decision to ensure everyone gets something out of the community's resources or knowledge.
In each image, the key would be to look for signs of collective decision-making, sharing, and the celebration of diversity leading to mutual benefit, echoing the ethos of cooperative models in both social and economic contexts. The phrase itself would serve as a focal point, literally or metaphorically, to highlight the theme of communal agreement leading to shared prosperity.
npub1zlyp...2n8p
satyagraha@stacker.news
npub1zlyp...2n8p
A constant dog whistle, consistently used in social discourse, represents a repeated use of coded language that is intended for a particular audience, yet remains somewhat veiled to broader listeners. While these signals can initially rally supporters by referencing shared anxieties, values, or grievances, they progressively lose potency if employed incessantly. Just as the child who cried wolf repeatedly found that his warnings fell on deaf ears over time, a constant reliance on unfulfilled insinuations or hyperbolic threats undermines credibility. Audiences become jaded, questioning whether these alarming hints ever truly materialise into authentic danger or legitimate concern. As their suspicion grows, believers and potential allies alike grow weary of rhetoric that persistently hints at imminent catastrophe but rarely provides tangible evidence. This erosion of trust compromises the original intention behind the coded appeals, making them appear manipulative or disingenuous. Furthermore, when the explicit menace implied by such messages repeatedly fails to materialise, even otherwise receptive followers begin to doubt the sincerity and significance of the warnings. The persistent use of dog whistles reaches a point at which the coded cues merely ring hollow. Instead of energising a base or swaying undecided observers, they risk provoking scepticism, ridicule, or outright dismissal. In the long run, the outcome mirrors the fable’s lesson: constantly sounding alarms without basis yields diminishing returns.

These two sayings—“Let the dead bury the dead” and “Let bygones be bygones”—both counsel us against clinging to the past, especially in ways that keep us from moving forward or from acting in the present. The first is famously attributed to Jesus (Luke 9:60), where he tells a would-be disciple to prioritize spreading the good news over burying his father. Interpreted more broadly, “Let the dead bury the dead” can mean: focus on what is alive and active in the present moment rather than what has already passed or can no longer be changed.
Likewise, “Let bygones be bygones” is a more modern proverb advising us to leave past grievances and mistakes where they belong—behind us. Both sayings emphasize the importance of not letting what is finished (or “dead”) weigh down the opportunities, responsibilities, and relationships of today. When we cling to old resentments, stale methods, or outlived advantages, we may gain a sense of security or familiarity, but it often comes at a cost: we can become stuck, fail to see new possibilities, and sometimes even alienate ourselves from others who are ready to move on.
So whether it’s a matter of personal regret, historical grudges, or strategic habits that no longer serve, these sayings suggest that stubbornly clutching at an expired advantage (especially if it’s costly to maintain) does more harm than good. Instead, recognizing what is “dead” or “done” and letting it lie allows for the freedom and flexibility to adapt, evolve, and engage with what is genuinely needed and alive in the present.
Audio Overviews are lively 'deep dive' discussions that summarise the key topics in your sources. This is an experimental feature and below are some notes to help you get started:
Audio Overviews (including the voices) are AI-generated, so there might be inaccuracies and audio glitches.
Audio Overviews are not a comprehensive or objective view of a topic, but simply a reflection of your sources.
Audio Overviews are only in English at this moment.
It can take several minutes to generate an Audio Overview (feel free to do other things while generation is in progress).
You need edit access to a notebook in order to generate or delete an Audio Overview.
You can share your feedback on an Audio Overview using the thumbs up and thumbs down buttons.
Where does money get its value?
Don’t develop new types of money before you understand this.
You need to know where the wealth in the system lies.
CoinDesk: The T3 Financial Crime Unit says it has frozen $100M of USDT used by illicit actors since the unit was formed in September 2024 by Tron, TRM Labs, and Tether
Rookie numbers
Those three emojis (🥛🤝🦆) are typically a tongue-in-cheek reference to the “milkshake duck” meme. That term describes how the internet often rapidly adores some new person or thing—then suddenly turns against it once unpleasant facts or controversies surface. It’s an ironic commentary on the cycle of hype and backlash in online culture.
"Σοφία"
https://www.washingtonpost.com/science/2024/12/22/robots-learn-surgical-tasks/

Sophia (wisdom) - Wikipedia

X (formerly Twitter)
Hamish MacEwan (@HamishMacEwan) on X
"Once upon a time in a bustling city, Dr. Sophia, a renowned surgeon, faced the inescapable limitations of being human. While her hands worked mira...
Yes Le Garde, any adaptations that can be made, will be made.
After acting friendly, they murder Caulder's husband, gang-rape her, burn down the family house, and leave her for dead in the burning house. The brothers then go on a crime spree, while Caulder recruits bounty hunter Thomas Price to help her get revenge by training her to be a gunfighter. The pair come across a fellow bounty hunter known as The Preacher. After leaving him they travel to Mexico to have gunsmith Bailey build her a specialized revolver, to be a fast draw specialist. In the meantime, the two grow closer. When bandidos surround the Bailey house, a gun battle erupts, but Hannie is unable to kill a man face-to-face. Price recommends she give up her quest for revenge, but she refuses, telling him to get out and that she was only using him and does not need him anymore. Price leaves, telling Hannie she is a bad liar.
A polynymous pseudonymous public/private key cryptographic infrastructure for peer-to-peer communication combines multiple pseudonyms (polynymous) with robust cryptographic techniques (public/private key pairs). This setup offers numerous advantages for secure and private interactions among peers. Here are the key pros:
Enhanced Privacy and Anonymity
Pseudonymity: Users can interact without revealing their real identities, protecting personal information from being exposed.
Polynymity: The ability to maintain multiple pseudonyms allows users to compartmentalize different aspects of their online presence, reducing the risk of cross-referencing activities to uncover a real identity.
Improved Security
Public/Private Key Cryptography: Ensures that communications are encrypted and can only be decrypted by the intended recipient, safeguarding against eavesdropping and unauthorized access.
Authentication: Public keys enable the verification of a sender’s identity, ensuring that messages are from legitimate sources and not impostors.
Resistance to Censorship and Surveillance
Decentralization: Without reliance on central authorities, it's harder for external entities to censor or monitor communications effectively.
Multiple Identities: Makes it more difficult for adversaries to track a user's activities across different pseudonyms, enhancing resistance to mass surveillance.
Flexibility and Control
Multiple Identities: Users can create and manage various pseudonyms tailored to different contexts (e.g., professional, personal, hobby-related), offering greater control over their online interactions.
Selective Disclosure: Users can choose which pseudonym to use in specific scenarios, allowing for tailored privacy levels depending on the situation.
Reduced Risk of Identity Theft and Impersonation
Separation of Identities: Even if one pseudonym is compromised, other identities remain secure, minimizing the overall risk.
Cryptographic Assurance: Public keys tied to pseudonyms make it difficult for malicious actors to impersonate users without access to the corresponding private keys.
Scalability and Efficiency
Key Management: Public/private key pairs are well-suited for large-scale networks, allowing numerous users to communicate securely without the need for shared secrets.
Automated Trust Mechanisms: Cryptographic infrastructures can support automated trust and reputation systems, facilitating secure interactions even among strangers.
Enhanced Trust and Reputation Systems
Verifiable Identities: Even though pseudonymous, each identity can have a verifiable history based on cryptographic proofs, enabling trust to be built without revealing real-world identities.
Reputation Management: Users can build reputations under different pseudonyms, allowing for nuanced trust relationships tailored to specific interactions or communities.
Legal and Compliance Benefits
Data Protection: By minimizing the use of real identities, such infrastructures can aid in complying with data protection regulations that mandate the minimization of personally identifiable information.
Auditability: Cryptographic logs can provide immutable records of communications, useful for auditing purposes without compromising user privacy.
Facilitation of Decentralized Applications
Blockchain Integration: Public/private key infrastructures are fundamental to blockchain and decentralized applications, enabling secure transactions and interactions without central intermediaries.
Smart Contracts: Secure key management allows for the execution of smart contracts and other automated agreements in a trustless environment.
User Empowerment and Autonomy
Self-Sovereign Identity: Users have full control over their identities and keys, promoting autonomy and reducing dependency on external identity providers.
Customization: Users can design their identity systems to fit their specific needs, fostering innovation and personalized privacy controls.
In summary, a polynymous pseudonymous public/private key cryptographic infrastructure offers a robust framework for secure, private, and flexible communication among peers. It balances the need for anonymity with the ability to establish trust and authenticity, making it well-suited for various applications ranging from private messaging to decentralized networks.
Graphic Content, Gratuitous Gore, Adult Nudity & Sexual Behavior, Violent Sexual Conduct, Bestiality & Necrophilia, Media depicting a deceased individual
"Fourteen years ago, a new form of money was brought forth, conceived in resilience and dedicated to the principle that value is preserved by those who hold firm.
We are met on a battlefield of markets, testing whether this principle—or any principle so conceived—can long endure. We are engaged in a great struggle, not to yield to fleeting whims, but to ensure that Bitcoin, as a store of value, shall not perish.
It is altogether fitting and proper that we should commit ourselves to this task. But in a larger sense, it is for us, the resolute, to reject Bids save for dire necessity and to hold firm against lowering Asks. For in such discipline lies the power to establish a market dictated not by speculation, but by conviction.
The world will little note, nor long remember, individual trades, but it will never forget the precedent we set. It is for us, then, to be dedicated to the great work before us—that patience shall prevail over impulse, that discipline shall triumph over chaos, and that Bitcoin’s value, enduring and true, shall belong to those who believe in its promise.
This we resolve: that Bitcoin, of the holders, by the holders, for the holders, shall not perish from the Earth."
Officials are halting Antminer ASIC imports at U.S. ports. Bitmain’s latest Antminer S21 and T21 ASIC miner shipments are being held by U.S. Customs and Border Protection (CBP) at various ports nationwide, including San Francisco and Detroit, following a request from the Federal Communications Commission (FCC). Seven U.S.-based bitcoin mining companies reported that these delays have persisted for up to two months. Notably, other ASIC manufacturers like MicroBT and Canaan are not targeted.
https://blockspace.media/insight/officials-are-halting-bitmain-units-at-u-s-ports-industry-firms-report/


No Bullshit Bitcoin
Good Morning, Bitcoin - Tuesday, November 26th, 2024
Good Morning, Bitcoin is your daily news roundup delivering key stories, project updates, new releases, guides, research, and all things related to...
The MarketVector™ Infrastructure Application Leaders Index (MVIALE) is designed to track the performance of the largest and most liquid infrastructure application assets, and is an investable subset of the MarketVector™ Infrastructure Application Index.
Consideration of options
I'm working through the suggestion to include "CAGANER," a Catalan figurine, but it doesn't fit the pottery clue. I'm focusing on identifying a seven-letter word that means "squat pottery."
Weighing categorizations
If we think about "CAGANER" as squat pottery, it suggests a figurine. "CERAMIC" and "TEAPOTS" are viable seven-letter synonyms, though "CAGANER" seems more figurine than pot.
Reassessing my approach
Given "CAGANER" is a Catalan figurine and "TEAPOTS" is a squat pottery item, it's worth thinking again about "CAGANER" as the right answer for "squat pottery, seven letters."
The neurodiverse have always been in charge of the asylum
We stand here today upon the threshold of a new era, compelled by a longing that transcends mere economic ambition and arrives instead at the dawn of a profound human renaissance. We need Bitcoin, yes, but not simply as a tool of commerce or a curious novelty of our digital age; we require it as a cornerstone of the grand architecture of civilisation’s next chapter. Consider this new protocol and its siblings not as mechanical abstractions, but as living instruments of human potential, as symbolic compasses guiding us to a more equal, transparent, and sovereign age. Let not the doubters whisper their tired refrain, nor the critics cast their narrow shadows across the bright horizon. Instead, let us dare to imagine a world in which Bitcoin is but one beacon among many, illuminating pathways to unprecedented liberty, creative power, and collective self-actualisation. Our voices shall merge in triumphant chorus, forging agreements without borders, trust without intermediaries, and cooperation without constraint. Hear these words and know that this is not an idle fancy, but the steady drumbeat of destiny itself. We need Bitcoin and we shall have it, and with it—and its many kindred technologies—we will build not just a better marketplace, but the very making of Humanity reborn.