Kazuma's avatar
Kazuma
griso135@iris.to
npub1tv8t...d3ur
I am a management engineer who loves Tech ๐Ÿ–ฅ๏ธ and Kaizen ๐Ÿช› Ex football player โšฝ Veronese de sรฒca
Kazuma's avatar
Kazuma 17 hours ago
Robot dance Pordenone exhibition #Veneto
Kazuma's avatar
Kazuma 4 days ago
Treviso, road to Valentine's Day #Veneto #valentine #love
Kazuma's avatar
Kazuma 5 days ago
Is it possible for AI Agents to post on nostr and send zaps? #nostr #AI #AIAgents
Kazuma's avatar
Kazuma 1 week ago
๐—ช๐—ต๐—ฒ๐—ป ๐—ฆ๐—ฎ๐—บ๐˜€๐˜‚๐—ป๐—ด ๐—ฐ๐—น๐—ผ๐˜€๐—ฒ๐˜€ ๐—ฎ ๐—ฑ๐—ผ๐—ผ๐—ฟ, ๐—”๐——๐—• ๐—ผ๐—ฝ๐—ฒ๐—ป๐˜€ ๐—ฎ ๐—ฐ๐—ผ๐—บ๐—บ๐—ฎ๐—ป๐—ฑ ๐—ฝ๐—ฟ๐—ผ๐—บ๐—ฝ๐˜. Update on mission "Resurrection Galaxy A50": I failed. ๐Ÿ›‘ ๐—”๐—ป๐—ฑ ๐˜๐—ต๐—ฒ๐—ป ๐—œ ๐˜„๐—ผ๐—ป. ๐Ÿ† In my previous post, I was ready for open-heart surgery: Bootloader unlocking, LineageOS (or FreshROM) installation, and saying goodbye to Samsung forever. The reality? The Galaxy A50 is locked down tighter than Fort Knox. Between OEM locks, the risk of losing VoLTE calls, and procedures requiring shamanic rituals to avoid bricking the device, I had to face the truth: I was not ready to change the OS. ๐—˜๐—ป๐—ฑ ๐—ผ๐—ณ ๐˜๐—ต๐—ฒ ๐˜€๐˜๐—ผ๐—ฟ๐˜†? ๐——๐—ฟ๐—ฒ๐—ฎ๐—บ ๐—ผ๐—ป. If you can't replace the engine, you can still strip the chassis until it flies. I discovered you don't need to be a cybersecurity wizard to reclaim your privacy. You just need a USB cable and three letters: ADB. I took the pragmatic (and less destructive) route: Hardcore Debloating. ๐Ÿ”ช ๐—ง๐—ต๐—ฒ ๐—ช๐—ฎ๐—ฟ ๐—•๐˜‚๐—น๐—น๐—ฒ๐˜๐—ถ๐—ป: โŒ I wiped the Play Store, Google Play Services, Gmail, Chrome, and Maps. โŒ I uprooted the entire pre-installed Facebook and Microsoft ecosystem. โŒ Bixby and its friends were kindly escorted to the door. โœจ ๐—ง๐—ต๐—ฒ ๐—ฅ๐—ฒ๐˜€๐˜‚๐—น๐˜ (๐Ÿต๐Ÿฌ% "๐——๐—ฒ-๐—š๐—ผ๐—ผ๐—ด๐—น๐—ฒ๐—ฑ"): The phone is the same, yet not the same. โœ… Launcher: Kvaesitso (Open Source, minimal, search-based). โœ… Browser: Fennec + uBlock Origin (Goodbye ads and tracking). โœ… Store: F-Droid + Aurora Store. โœ… Battery: Lasts so long I actually forget where I put the charger. โœ… Speed: Without 40 background processes mining my data, the old A50 runs like a flagship. The Lesson? You don't always need to "format everything" to innovate. Sometimes you just need to remove the superfluous. My A50 is now a "zombie" device: technically obsolete for the market, but more alive, faster, and private than 99% of phones fresh out of the box. #DigitalMinimalism #DeGoogle #Privacy #Android #ADB #TechSustainability #SamsungA50 #OpenSource image
Kazuma's avatar
Kazuma 2 weeks ago
๐—ง๐—ต๐—ฒ ๐—ฑ๐—ฎ๐˜† ๐—บ๐˜† ๐—ต๐—ฎ๐—ฟ๐—ฑ๐˜„๐—ฎ๐—ฟ๐—ฒ ๐˜๐—ผ๐—น๐—ฑ ๐—บ๐—ฒ: "๐—œ ๐—ฎ๐—บ ๐—ป๐—ผ๐˜ ๐˜†๐—ผ๐˜‚๐—ฟ๐˜€." ๐Ÿ“ฑ๐Ÿšซ Tried to de-Google an old Samsung A50 today. The plan: a 1-hour job to turn it into a privacy-focused node manager (Lightning, DNS, Vault). 10 hours later, Iโ€™m staring at a "Custom Binary Blocked by OEM Lock" screen. ๐—ง๐—ผ๐˜๐—ฎ๐—น ๐—ฑ๐—ฒ๐—ณ๐—ฒ๐—ฎ๐˜. ๐—™๐—ผ๐—ฟ ๐—ป๐—ผ๐˜„. Itโ€™s a brutal reminder of the state of "ownership" in 2026. You pay for the device, you hold the atoms, but the manufacturer owns the logic. We aren't owners; we are just tenants of a supervised license. This is why Freedom Tech and Open Source matter. Itโ€™s not about tinkering; itโ€™s about the right to own the tools we use to navigate the world. If we don't own our hardware, our hardware owns us. ๐˜›๐˜ฉ๐˜ฆ ๐˜ฃ๐˜ข๐˜ต๐˜ต๐˜ญ๐˜ฆ ๐˜ค๐˜ฐ๐˜ฏ๐˜ต๐˜ช๐˜ฏ๐˜ถ๐˜ฆ๐˜ด. ๐˜›๐˜ฉ๐˜ฆ "๐˜ญ๐˜ฐ๐˜ค๐˜ฌ" ๐˜ธ๐˜ฐ๐˜ฏ ๐˜ณ๐˜ฐ๐˜ถ๐˜ฏ๐˜ฅ ๐˜ฐ๐˜ฏ๐˜ฆ, ๐˜ฃ๐˜ถ๐˜ต ๐˜ต๐˜ฉ๐˜ฆ ๐˜ข๐˜ณ๐˜ด๐˜ฆ๐˜ฏ๐˜ข๐˜ญ ๐˜ช๐˜ด ๐˜ด๐˜ต๐˜ช๐˜ญ๐˜ญ ๐˜ง๐˜ถ๐˜ญ๐˜ญ. P.S. If Google/Samsung is a walled garden, Apple is a maximum-security prison with gold-plated bars. Even worse. #DigitalSovereignty #FreedomTechnologies #OpenSource image
Kazuma's avatar
Kazuma 2 weeks ago
In Praise of Brevity: Why Speaking Less (and Better) is a Necessary Revolution In a professional setting, oral communication is often the most inefficient and risky method for exchanging information. We worship โ€œsoft skills,โ€ but we rarely calculate the exorbitant cost of imprecision. We rely on the spoken word every day, yet we overlook its intrinsic flaws. image The Flaws of the Spoken Word Lossy Data Compression: 1. Speakers filter complex thoughts through an increasingly shrinking vocabulary. Listeners then โ€œdecompressโ€ that signal through their own biases and recent experiences. The message received is almost always a corrupted version of the one sent. 2. Verbal Inflation (Verbosity): Many use more words than necessary, generating noise and ambiguity. Worse, they repeat the same concept in different ways, creating contradictions and wasting the time of those who already understood. Itโ€™s not just inefficiency; itโ€™s a lack of respect for othersโ€™ intelligence and time. 3. Lack of Persistence: Conversations are ephemeral. A verbal agreement can be easily forgotten, misrepresented, or disputed, leading to the dreaded โ€œbut I thought you said...โ€ The Alternatives: Formal Languages for High Fidelity If oral communication is a blunt instrument, formal languages are the scalpel. They are designed for precision and high fidelity. 1. Written Language Asynchronous, allowing for meticulous thought construction and revision. It creates a permanent, verifiable record, demanding clarity from the author and reducing ambiguity for the reader. 2. Mathematics E = mc^2 is an immutable truth, understood without ambiguity in every language. There is no margin for interpretation. 3. Programming Languages So precise they can be executed by a machine. They impose absolute logical consistency. This JavaScript is an unequivocal contract. if (user.isLoggedIn) { grantAccess() } image Context Matters Of course, oral communication has its place. Immediacy is powerful for brainstorming or building personal rapport, where the โ€œemotional bandwidthโ€โ€”tone and body languageโ€”is an asset, not a defect. But for critical informationโ€”project requirements, strategic decisions, technical specs, agreements, and promisesโ€”we must be more rigorous. Relying on a chat for a vital task is like using a hammer to drive a screw. It might work, but the result is crude, unreliable, and unprofessional. Final Thought I think we all need to learn to communicate with the precision of a programmer, the clarity of a mathematician, and the persistence of a writer. What do you think? Is verbosity the silent killer of productivity in your workplace? Leave a comment below. #FutureOfWork
Kazuma's avatar
Kazuma 2 weeks ago
Away days #spritz #campari image
Kazuma's avatar
Kazuma 2 weeks ago
In 2026, the question is no longer "Who do you trust?" but "What can you verify yourself?" ๐Ÿ›ก๏ธ๐Ÿฆ image My "Digital Fortress" has reached full maturity. What started as a hardware recovery experiment on a 2017 Acer laptop is now a mission control for digital sovereignty. ๐Ÿš€ But the real lesson of this journey isn't about hardware. Itโ€™s about the power of Open Source. Everything Iโ€™ve built exists thanks to open, transparent, and verifiable code. Itโ€™s the result of thousands of people sharing their knowledge for the benefit of everyone. This is the polar opposite of the Big Tech model. While corporations design systems to decide what we see or do, Open Source gives us the tools to become the sole owners of our digital lives. As a famous cypherpunk saying goes: "If you want to change the world, don't protest. Write code!" Here are the pillars of the Fortress, built on transparency: โœ… Operating System (Debian 12): I stripped away the GUI (GNOME) and went Headless. By removing telemetry and commercial bloat, I reclaimed 1.5GB of RAM and dropped CPU load from 21% to 0.0%. The laptop is now a pure server: cool (39ยฐC), silent, and efficient. โœ… Sovereign Banking (Bitcoin Core & LND): My node has crossed 70% synchronization. Iโ€™m currently validating 2024 blocks, mathematically verifying every transaction via Tor. โ›“๏ธโ€๐Ÿ’ฅ โœ… Privacy Layer (AdGuard & Vaultwarden): I manage my own DNS and passwords in a closed circuit. Thanks to Open Source, my home is tracker-proof, and my keys no longer live on Silicon Valley serversโ€”they reside in an encrypted database on my own 2TB drive. โœ… Control Tower (RTL via Docker): I manage Lightning liquidity with a professional dashboard (Ride The Lightning), accessed securely through a Tailscale tunnel. Zero exposed ports, zero compromises. The Role of AI in this Ecosystem ๐Ÿค–๐Ÿค During this process, Iโ€™ve had a valuable ally: my AI (Google Gemini-CLI) in "Driver" mode. Irony at its best: I used a Big Tech LLM to help me dismantle my dependence on Big Tech. ๐Ÿ˜… Digital sovereignty canโ€™t be bought in a corporate store. It is built by studying, learning, and choosing software that respects the user. Preferably Open Source. 2026 begins with a certainty: the keys to my world are finally, and exclusively, in my hands. ๐Ÿ—๏ธ๐Ÿ›ก๏ธ #Bitcoin #Sovereignty #OpenSource #Debian #SelfHosted #Nostr #Cypherpunk
Kazuma's avatar
Kazuma 2 weeks ago
Holidays status: Sovereignty achieved. ๐Ÿฐ๐Ÿ›ก๏ธโšก๏ธ My 2017 Acer laptop is now a full-blown Ninja Fortress. ๐Ÿฅท 1) GNOME killed, Headless Mode active. 2) RAM optimized, CPU running cool at 43ยฐC. 3) Bitcoin Core @ 70% and climbing (validated 2024!). 4) Lightning Node (LND v20) up and running. 5) Dashboard (RTL) deployed via Docker. 6) ISP is blind. Big Tech is out. My keys, my nodes, my rules. ๐Ÿฆโ›“๏ธโ€๐Ÿ’ฅ Massive shoutout to my AI Mentor (Gemini on Google AI Studio) ๐Ÿค—๐Ÿค– for driving me through the CLI trenches, fixing JSON bugs, and turning my security paranoias into a rock-solid infrastructure. Don't trust, verify. Stay sovereign, plebs. ๐Ÿค™ #bitcoin #lightning #nostr #grownostr #selfhosting #plebs #privacy #linux
Kazuma's avatar
Kazuma 1 month ago
Holidays are over, but the mission has just begun. ๐Ÿฐโšก๏ธ While others were resting, I was busy getting my hands dirtyโ€”studying, learning, and building my own "Invisible" infrastructure on a recycled 2017 Acer laptop. True digital independence is a skill you cannot delegate; otherwise, you'll always choose convenience over freedom. ๐Ÿง ๐Ÿ“š image Here is the progress report on my stealth stack: ๐Ÿ” Identity & Encryption (PGP): Iโ€™ve taken control of my PGP Key Pair. Strategic advantage? Google Drive is now just "dumb storage." Sensitive docs are encrypted locally before upload. Privacy now depends on math, not corporate promises. ๐Ÿ‘ป Privacy Layer & Stealth Stack: Consolidated a local ecosystem to kill tracking and secure metadata: AdGuard Home: Network-wide DNS filtering. dnsleaktest.com confirms my house now communicates exclusively with 2 encrypted/secure DNS servers. My ISP is officially blind. Vaultwarden: Sovereign management of passwords and WebAuthn Passkeys. Syncthing: P2P cloud syncing all my devices without central servers. โ›“๏ธโ€๐Ÿ’ฅ Financial Sovereignty: With a new 2TB SSD installed, Iโ€™m finally in the game. Currently at 15% of the Bitcoin blockchain sync. Once finished, Iโ€™ll fire up the Lightning node and look into setting up a WatchTower. ๐Ÿค– The AI Mentor: Ironically, I made heavy use of Google Geminiโ€”a centralized and "noisy" LLM ๐Ÿ˜…. However, thanks to deep learning, I was able to quickly source info on what I was putting "under the hood." I used AI as a driver to validate my hypotheses on the robustness and invisibility of the solutions I was deploying. ๐Ÿค The lesson from these holidays? Stop being a passive user and start being an owner. The road to 100% is long, but the view is beautiful. Goal for 2026: Dive even deeper. ๐Ÿšช๐Ÿšซ #DigitalSovereignty #PGP #SelfHosting #Privacy #Bitcoin #LightningNetwork #Linux #Nostr #Pleb #StackingKnowledge image
Kazuma's avatar
Kazuma 1 month ago
Percy and Athos โค๏ธโค๏ธ image
Kazuma's avatar
Kazuma 1 month ago
Se ho ben capito, questa รจ l'Operation Red Sunset: 1) Bitmain (cinese) costruisce ASIC per mining Bitcoin 2) Tali ASIC (Ant miner) contengono backdoor che permettono lo spegnimento remoto 3) Uno spegnimento simultaneo di n kWh puรฒ causare un eccesso di energia elettrica nella rete, quindi un sovraccarico, quindi un blackout 4) C'รจ una mining farm vicina ad una importante base militare in Wyoming, stracolma di dispositivi Bitmain 5) Molto dei dispositivi Bitmain in Wyoming sono di proprietร  della ABTC Corporation, fondata da 2 figli di Trump 6) ABTC ha comprato 314mln$ di dispositivi da Bitmain in agosto 2025, usando Bitcoin come collaterale 7) I fatti dall'1 al 6 sono verificati Grazie @Guybrush e @Rikki del Bitcoin Italia Podcast
Kazuma's avatar
Kazuma 1 month ago
Sunday is #pizza and German #beer image
Kazuma's avatar
Kazuma 1 month ago
Eremo Monte Ricco, colli euganei, #Padova #Padua #Veneto
Kazuma's avatar
Kazuma 1 month ago
In 2026 the plan will be the same than 2025: stack sats. With an improvement: more digital sovereignty (I already have my own DNS, password manager and cloud). I want to deploy a lightning node and try to go deeper in the rabbit hole and find if and how I can use lightning network for meaningful purchases. #bitcoin #lightning #2026 #DigitalSovereignity HAPPY NEW YEAR BY Athos and Percy โค๏ธ image
โ†‘