The Ice Age animation series truly never gets old; every time I watch it, the child within me comes to the surface.
Turgon
npub1kjzx...autm
Looks like something’s finally happening…
#btc #bitcoin #ethereum #bull 

Public transportation is often called a mirror of a nation’s civility. Why? Because you can learn a lot about a society by observing how people behave in those crowded buses and minibuses at the crack of dawn. A country’s level of development may not be measured by the number of buses per capita, but whether those buses are on time, the seats are clean, the driver is courteous, or at least if people make an effort to give up their seats – even discreetly – says a great deal.
The quality of public transportation is a subtle yet striking indicator of the “true” level of civilization in a region. Imagine this: as someone hanging onto a bus handle in the early morning, still half asleep, you find yourself given a seat, not out of kindness, but simply as a matter of “duty.” A silent scream rises within you, “Is this for real?” Yet, as the bus fills to the brim and punctuality becomes a luxury overlooked, it’s not hard to see how deeply ingrained – or absent – mutual respect, empathy, and even societal peace truly are in that country.
In a place where the metro runs like clockwork, schedules are reliable to the minute, and people actually line up to board – and yes, there are such places – that society has not only mastered public transportation but achieved a level of respect and trust among people. But where public transit triggers arguments before the next stop, where a missed announcement has everyone looking around, wide-eyed, asking, “What’s going on now?” there, a certain unease is surfacing. Because the chaos in public transportation is a miniature of a greater chaos.
We live this chaos every day; the pushing and shoving, sweaty faces, buses that never arrive on time… In a system without punctuality, people’s daily stresses are a stark reminder that what we call “civility” may exist only on the surface. It’s like a polite slap in the face; we may believe we live in a civilized society, but maybe we’re just part of a “survival” game.
Sometimes, even a one-minute delay, a seemingly minor problem at first, can set people into a downward spiral of negativity. A person who arrives late to work because the bus was late may stew in that stress all day long. By the time they get home in the evening, that single delay has essentially drained their entire day. So, the quality of public transport – its timing, comfort, and reliability – serves as the lubricant in the machinery of societal peace. When this machinery runs smoothly, people are at ease; when it doesn’t, everyone lives in a state of tension with one another.
In short, the quality of public transportation is an indirect yet sharp reflection of a nation’s level of civility, of the respect people hold for each other and for life itself. And let’s not forget: “If a country forces its citizens to endure cramped, sweat-filled commutes, then that veneer of civility may only be a superficial smile plastered on the surface.” 

I hate my sleep problem. First, I stay awake for hours until morning, unable to sleep, and after I finally fall asleep, I can’t wake up for hours because I didn’t sleep enough. It’s terrifying to have so little control over my brain when it comes to something as basic as sleep.
“Solar Opposites” drags us into the adventures of an alien family on Earth. But the real intrigue comes from discovering The Wall in this series by the creators of Rick and Morty. The Wall is where abducted humans, shrunk by Yumyulack, build their own society filled with power games and tales of resistance. We witness the darker sides of human nature in this enclosed community. Each episode pulls me deeper into this society, transforming the show from just an animation to something thought-provoking and questioning. “Solar Opposites,” with its Rick and Morty-like absurdity and critical approach, totally captivates me. I liked it a lot👍🏻
👁️🗨️ #meme 

The brain is truly fascinating. During the day, when we recall the past, it tends to highlight our pleasant memories, filling us with a sense of peace. Yet, as soon as we lie down to sleep, it brings forth our most embarrassing memories, robbing us of sleep. It’s almost as if the brain’s existence is like a form of natural schizophrenia.
This duality can be explained from an evolutionary perspective. Our brain has a tendency to suppress negative memories over time and emphasize positive ones, a phenomenon known as “positive illusion.” This mechanism might have evolved to protect our mental well-being and to maintain our motivation for survival. Constantly dwelling on traumatic or negative events could lead to chronic stress, which would lower our chances of survival. By highlighting the positive, the brain helps us stay resilient, and this sense of nostalgia is further reinforced by the release of hormones such as serotonin and oxytocin, which enhance feelings of warmth and tranquility.
On the other hand, the brain’s tendency to bring up shameful memories just before sleep can also be traced back to evolutionary functions. The moments before sleep involve a shift to alpha and theta brainwave states, where our connection with the subconscious becomes more pronounced. The brain might be presenting these memories to process them, ensuring that we don’t repeat socially risky behaviors in the future. Especially before important days or in moments of stress, this might serve as a preparatory process, allowing us to learn from past mistakes.
Additionally, since moments before sleep or before an important day tend to be more anxiety-inducing, the brain’s focus on past embarrassing events could be an attempt to rehearse avoiding similar situations, even though in modern life this mechanism often becomes counterproductive…
Sometimes going back to old songs feels like a nostalgic therapy
What is Post-Quantum Cryptography and Why is it Important?
Post-quantum cryptography refers to encryption techniques designed to be secure even against the power of quantum computers. Current encryption methods such as RSA, DSA, and ECC rely on mathematical problems that are practically impossible for classical computers to solve. However, quantum computers have the potential to break these codes quickly. As a result, post-quantum cryptography focuses on using mathematical problems that even quantum computers find incredibly difficult to solve.
Alice and Bob’s Post-Quantum Security Adventure
To illustrate, let’s revisit our classic characters, Alice and Bob. Alice wants to send a secure message to Bob, but she knows that there’s a risk of Eve, a malicious eavesdropper equipped with a quantum computer, intercepting the message. Alice needs to use post-quantum encryption techniques to ensure her communication remains secure.
1. Lattice-Based Cryptography
- Scenario: Alice decides to use lattice-based cryptography to send a post-quantum secure message to Bob.
- How It Works: In lattice-based cryptography, Alice represents her message as a point within a large, multi-dimensional grid (lattice). She then sends Bob a "short vector" that helps him locate the correct point within this grid, allowing him to decode the message.
- Alice’s Steps:
1. Constructs a large, multi-dimensional lattice and encodes her message as a point within this grid.
2. Encrypts this point with a special key and sends it, along with a "short vector," to Bob.
- Bob’s Steps:
1. Uses the short vector and the key to navigate the lattice and find Alice’s original message.
- Eve’s Challenge: Even with a quantum computer, Eve faces an overwhelming mathematical challenge to decode the message. The complexity of the lattice makes it virtually impossible to determine the correct point without the proper vector and key.
2. Code-Based Cryptography
- Scenario: Alice and Bob use a code-based encryption technique to communicate.
- How It Works: Alice encodes her message using a random error-correcting code and sends it to Bob. While Bob has the necessary key to correct these errors, Eve cannot decipher the message without it.
- Alice’s Steps:
1. Takes her message and encodes it with random errors using a code-based encryption technique.
2. Sends the encoded message to Bob.
- Bob’s Steps:
1. Uses his secret decoding key to correct the errors and extract Alice’s original message.
- Eve’s Challenge: Without the error-correction key, Eve faces an insurmountable task in decoding Alice’s message, even with a quantum computer.
3. Hash-Based Signatures
- Scenario: Alice needs to send a digitally signed message to Bob to ensure its authenticity.
- How It Works: Alice generates a hash (a condensed representation) of her message and then uses her private key to create a digital signature. This signature, along with the original message, is sent to Bob, who can verify its authenticity using Alice's public key.
- Alice’s Steps:
1. Creates a hash of her message.
2. Signs the hash using her private key and sends both the message and the signature to Bob.
- Bob’s Steps:
1. Uses Alice’s public key to verify that the signature matches the hash, ensuring the message’s authenticity.
- Eve’s Challenge: The hash function is designed to be computationally infeasible to reverse, even for quantum computers, meaning Eve cannot forge Alice’s signature or tamper with the message.
Quantum Computers’ Cracking Abilities: Shor and Grover Algorithms
- Shor’s Algorithm: This quantum algorithm efficiently factors large numbers, which would compromise RSA and ECC encryption methods.
- Grover’s Algorithm: It accelerates the search process for finding pre-images of hash functions, but post-quantum cryptographic methods are constructed to withstand even this enhanced capability.
Hybrid Encryption: A Practical Approach
In practical applications, Alice and Bob may use a combination of post-quantum algorithms alongside traditional encryption methods to maximize security:
- Alice uses a post-quantum algorithm to encrypt a shared secret key.
- She then uses a classical encryption method, like AES, to encrypt the actual message using that key.
This hybrid approach provides protection against both current classical threats and future quantum threats.
The Real-World Importance and Applications of Post-Quantum Cryptography
Post-quantum cryptography is not just a theoretical concept; it has started to be implemented in various applications* . From financial transactions to secure communication, integrating post-quantum algorithms into existing systems offers early protection against the emerging quantum threat. This shift is essential to safeguard data against the possibility of future quantum attacks.
Conclusion
Post-quantum cryptography represents a critical advancement in safeguarding data against the potential dangers posed by quantum computers. Lattice-based, code-based, and hash-based encryption techniques provide layers of security that are designed to withstand even the most advanced quantum attacks. Through Alice and Bob’s journey, we've explored how these post-quantum algorithms function and why they are so vital for future-proofing our digital security.
As the capabilities of quantum computers continue to grow, the adoption of post-quantum cryptographic techniques will be an essential step in ensuring that our information remains protected. This isn't just a temporary fix but a foundational element in securing a future where quantum threats are a reality.
* For example: mullvad vpn, which I love to use, uses these algorithms practically. Not advertising
#privacy #cryptography #freeinternet #nostr #edu #postquantum #xmr #monero #btc #bitcoin
On Nostr, there are now replyguys who respond even to the replies of other replyguys🤦🏼♂️ I wonder if these people have a rational reason for their existence that I’m unaware of
#nostr #asknostr
:,) #meme #memes #love


Similarities Between Religions and Blockchains
When we consider the similarities between religions and blockchains, it’s fascinating to discover how they share some intriguing commonalities.
First of all, both systems revolve around a “type of book.” Religions center around sacred texts, while blockchains create their own “ledgers” (blockchain records). Religious teachings are often found in holy books, and although these books may have been written at different times, they essentially contain compatible messages. Similarly, blockchains maintain records in each block, which are linked over time to form a chain. Both aim for a sense of continuity and coherence.
Throughout history, religions have given rise to many versions, with some “forking” the original texts to create new interpretations🤣. In the same way, blockchains evolve through various “forks.” A group of developers might take an existing blockchain and create a new version. This is like a group of devoted followers creating a “new commentary” on an old religion.
#btc #bitcoin #nostr #religion #blockchain #meme #memes
In Nostr, the ease of increasing follower count (as easy as writing a software bot) makes it gradually lose its significance. The self-censorship that follower counts induce on traditional social media disappears here. This enables us to use social media more freely. Simplicity can sometimes lead to insignificance, but this insignificance can liberate us. It creates a space where we can share our thoughts without being concerned about follower numbers.
#nostr #grownostr #damus
How Are Atomic Swaps Secure Even Though They Are Off-Chain?
On-Chain vs. Off-Chain Swaps:
Atomic swaps can occur both on-chain and off-chain. Off-chain swaps happen outside the main blockchain, which speeds up transactions and reduces the load on the network. However, the primary concern is how to ensure security in off-chain transactions. Off-chain atomic swaps are often executed through second-layer solutions like the Lightning Network.
In off-chain swaps, security is primarily maintained using Hashed Time-Locked Contracts (HTLCs) and cryptographic verifications. HTLCs are crucial in both on-chain and off-chain atomic swaps.
Technical Details:
What Are HTLCs?
HTLCs are smart contracts that impose conditions based on time and cryptographic hash values. They ensure that a transaction will only complete if a specific encrypted value (hash) is revealed within a set time frame. If the value is not revealed, the transaction is canceled, and the funds are returned. These two mechanisms maintain security.
uploaded as image HTLC code example
What’s Happening Here?
1. Contract Creation: Alice initiates the contract to swap with Bob. Alice creates a hash value (hashlock), and Bob needs to unlock it by providing the preimage. There is also a time limit (timelock) defined; if the swap is not completed in time, Alice can retrieve her funds.
2. Withdraw Function: Bob unlocks Alice’s funds by providing the correct preimage. The contract checks whether the preimage matches the hashed value using keccak256 hashing.
3. Refund Function: If Bob fails to provide the preimage within the time limit, Alice can call the refund function to retrieve her funds.
The security of this system relies on the cryptographic hash lock and the time-bound conditions. Both parties must act within the time constraints and with the correct information, or the funds will be refunded, ensuring no loss of assets.
Additional Security in Off-Chain Atomic Swaps:
In off-chain atomic swaps, additional security is ensured through second-layer solutions like the Lightning Network. Transactions happen outside the main blockchain and are finalized without being recorded on-chain. Security is ensured using multi-signature wallets and signed data that validate every step of the process.
Example: When Alice and Bob perform an atomic swap through the Lightning Network, they open payment channels. These channels ensure that funds cannot be moved without both parties’ signatures. In case of a dispute, the payment channels are closed, and the funds revert to the main blockchain, guaranteeing security.
#btc #bitcoin #xmr #monero #eth #ethereum #evm #contract #solidity #code #atomic #swap #edu 

Cross-Chain Atomic Swaps in Bitcoin: How Do They Work?
Bitcoin is a decentralized and secure digital currency that allows users to exchange value without relying on a central authority. However, transferring assets between different blockchains (for example, Bitcoin and Ethereum) can be challenging because these systems are not inherently designed to interact with each other. This is where cross-chain atomic swaps come into play. This technology enables the exchange of cryptocurrencies between two different blockchains without the need for a third-party intermediary. So, how does it work?
Atomic swaps allow two parties to exchange digital assets on different blockchains without relying on each other’s trust or a centralized middleman. The term “atomic” refers to the fact that the transaction either happens fully or doesn’t happen at all. Both parties either get what they want or the deal is canceled, leaving everyone with their original assets.
To understand this better, let’s use the classic “Alice and Bob” example. Alice has Bitcoin, and Bob has Ethereum. Alice wants to exchange her Bitcoin for Bob’s Ethereum, and Bob wants to exchange his Ethereum for Alice’s Bitcoin. However, they don’t trust each other, so they decide to use a cross-chain atomic swap instead of going through a centralized exchange.
Step 1: Alice Locks Her Bitcoin
Alice creates a contract on the Bitcoin blockchain using a Hashed Time-Locked Contract (HTLC). This contract locks her Bitcoin for a certain period of time and can only be unlocked by Bob if he knows a specific “secret” that Alice has generated (the hash of the secret is used in the contract).
Step 2: Bob Locks His Ethereum
Bob also creates an HTLC on the Ethereum blockchain, locking his Ethereum. This contract allows Alice to claim Bob’s Ethereum, but only if Alice reveals the secret used to unlock her Bitcoin. Bob can’t unlock Alice’s Bitcoin without this secret, and Alice can’t unlock Bob’s Ethereum without revealing it.
Step 3: Alice Claims Bob’s Ethereum
Alice now uses the secret to unlock Bob’s Ethereum. This action is recorded on the Ethereum blockchain, and Bob can see that Alice has revealed the secret.
Step 4: Bob Uses the Secret to Claim Alice’s Bitcoin
Bob, having seen the secret that Alice used, now uses it to unlock Alice’s Bitcoin. Thus, both parties successfully complete the swap without ever needing to trust each other or involve a third party.
If at any point the swap isn’t completed (for example, if one party doesn’t unlock their assets within the time limit), the contracts will automatically expire, and the funds will be returned to their respective owners. This ensures the system remains safe and fair.
Why Use Atomic Swaps?
• Security: No need for a centralized exchange or a trusted third party.
• Privacy: More private than conducting trades on an exchange.
• Decentralized: No one can stop or delay the transaction
#btc #bitcoin #eth #ethereum #xmr #monero #nostr #edu #atomic #swap
I’m getting tired of the forced social justice elements in new movies and series. Instead of adding value to minorities or the values they aim to represent, it’s making people turn away from them. I mean, seriously, a black elf? 🧝🏿♂️!? Wtf.
The “Internet is Dead” theory suggests that the internet, once a place of organic and free exchange of information, has now become a tool dominated by big tech corporations. Instead of user-driven, authentic content, the internet today is flooded with manipulative, artificial content designed to fit specific agendas. In its early days, the internet was a platform where people could freely communicate and share knowledge. But today, search engines and social media platforms manipulate what users see, leading to the claim that the original internet has “died.”
This theory highlights the growing need for decentralized technologies. This is where Nostr comes into play. Nostr is a decentralized protocol designed to revive the original spirit of the internet.
Nostr emerges as one of the communication tools of the future, offering an alternative to the constraints imposed after the “death” of the internet. It represents a crucial step towards reclaiming the freedom of information sharing.
I hope this awareness reaches more people.
for the article about this theory: https://link.springer.com/article/10.1007/s00146-023-01857-0
#nostr #grownostr #bitcoin #free #internetisdead


Monero is talked about so little that even if you manage to hear its name, the privacy is so good you immediately forget it 🤫🤦🏼♂️ lmao
#xmr #monero #nostr #privacy #meme


Hello world -Tradition
#introductions