Robot dance
Pordenone exhibition
#Veneto
Kazuma
griso135@iris.to
npub1tv8t...d3ur
I am a management engineer who loves Tech ๐ฅ๏ธ and Kaizen ๐ช
Ex football player โฝ
Veronese de sรฒca
Treviso, road to Valentine's Day
#Veneto
#valentine
#love


Is it possible for AI Agents to post on nostr and send zaps?
#nostr #AI #AIAgents
๐ช๐ต๐ฒ๐ป ๐ฆ๐ฎ๐บ๐๐๐ป๐ด ๐ฐ๐น๐ผ๐๐ฒ๐ ๐ฎ ๐ฑ๐ผ๐ผ๐ฟ, ๐๐๐ ๐ผ๐ฝ๐ฒ๐ป๐ ๐ฎ ๐ฐ๐ผ๐บ๐บ๐ฎ๐ป๐ฑ ๐ฝ๐ฟ๐ผ๐บ๐ฝ๐.
Update on mission "Resurrection Galaxy A50": I failed. ๐
๐๐ป๐ฑ ๐๐ต๐ฒ๐ป ๐ ๐๐ผ๐ป. ๐
In my previous post, I was ready for open-heart surgery: Bootloader unlocking, LineageOS (or FreshROM) installation, and saying goodbye to Samsung forever.
The reality? The Galaxy A50 is locked down tighter than Fort Knox. Between OEM locks, the risk of losing VoLTE calls, and procedures requiring shamanic rituals to avoid bricking the device, I had to face the truth:
I was not ready to change the OS. ๐๐ป๐ฑ ๐ผ๐ณ ๐๐ต๐ฒ ๐๐๐ผ๐ฟ๐? ๐๐ฟ๐ฒ๐ฎ๐บ ๐ผ๐ป.
If you can't replace the engine, you can still strip the chassis until it flies. I discovered you don't need to be a cybersecurity wizard to reclaim your privacy. You just need a USB cable and three letters: ADB.
I took the pragmatic (and less destructive) route: Hardcore Debloating.
๐ช ๐ง๐ต๐ฒ ๐ช๐ฎ๐ฟ ๐๐๐น๐น๐ฒ๐๐ถ๐ป:
โ I wiped the Play Store, Google Play Services, Gmail, Chrome, and Maps.
โ I uprooted the entire pre-installed Facebook and Microsoft ecosystem.
โ Bixby and its friends were kindly escorted to the door.
โจ ๐ง๐ต๐ฒ ๐ฅ๐ฒ๐๐๐น๐ (๐ต๐ฌ% "๐๐ฒ-๐๐ผ๐ผ๐ด๐น๐ฒ๐ฑ"): The phone is the same, yet not the same.
โ
Launcher: Kvaesitso (Open Source, minimal, search-based).
โ
Browser: Fennec + uBlock Origin (Goodbye ads and tracking).
โ
Store: F-Droid + Aurora Store.
โ
Battery: Lasts so long I actually forget where I put the charger.
โ
Speed: Without 40 background processes mining my data, the old A50 runs like a flagship.
The Lesson?
You don't always need to "format everything" to innovate. Sometimes you just need to remove the superfluous.
My A50 is now a "zombie" device: technically obsolete for the market, but more alive, faster, and private than 99% of phones fresh out of the box.
#DigitalMinimalism #DeGoogle #Privacy #Android #ADB #TechSustainability #SamsungA50 #OpenSource


๐ง๐ต๐ฒ ๐ฑ๐ฎ๐ ๐บ๐ ๐ต๐ฎ๐ฟ๐ฑ๐๐ฎ๐ฟ๐ฒ ๐๐ผ๐น๐ฑ ๐บ๐ฒ: "๐ ๐ฎ๐บ ๐ป๐ผ๐ ๐๐ผ๐๐ฟ๐." ๐ฑ๐ซ
Tried to de-Google an old Samsung A50 today. The plan: a 1-hour job to turn it into a privacy-focused node manager (Lightning, DNS, Vault). 10 hours later, Iโm staring at a "Custom Binary Blocked by OEM Lock" screen.
๐ง๐ผ๐๐ฎ๐น ๐ฑ๐ฒ๐ณ๐ฒ๐ฎ๐. ๐๐ผ๐ฟ ๐ป๐ผ๐.
Itโs a brutal reminder of the state of "ownership" in 2026. You pay for the device, you hold the atoms, but the manufacturer owns the logic. We aren't owners; we are just tenants of a supervised license.
This is why Freedom Tech and Open Source matter. Itโs not about tinkering; itโs about the right to own the tools we use to navigate the world. If we don't own our hardware, our hardware owns us.
๐๐ฉ๐ฆ ๐ฃ๐ข๐ต๐ต๐ญ๐ฆ ๐ค๐ฐ๐ฏ๐ต๐ช๐ฏ๐ถ๐ฆ๐ด. ๐๐ฉ๐ฆ "๐ญ๐ฐ๐ค๐ฌ" ๐ธ๐ฐ๐ฏ ๐ณ๐ฐ๐ถ๐ฏ๐ฅ ๐ฐ๐ฏ๐ฆ, ๐ฃ๐ถ๐ต ๐ต๐ฉ๐ฆ ๐ข๐ณ๐ด๐ฆ๐ฏ๐ข๐ญ ๐ช๐ด ๐ด๐ต๐ช๐ญ๐ญ ๐ง๐ถ๐ญ๐ญ.
P.S. If Google/Samsung is a walled garden, Apple is a maximum-security prison with gold-plated bars. Even worse.
#DigitalSovereignty #FreedomTechnologies #OpenSource
In Praise of Brevity: Why Speaking Less (and Better) is a Necessary Revolution
In a professional setting, oral communication is often the most inefficient and risky method for exchanging information. We worship โsoft skills,โ but we rarely calculate the exorbitant cost of imprecision.
We rely on the spoken word every day, yet we overlook its intrinsic flaws.
The Flaws of the Spoken Word
Lossy Data Compression:
1. Speakers filter complex thoughts through an increasingly shrinking vocabulary. Listeners then โdecompressโ that signal through their own biases and recent experiences. The message received is almost always a corrupted version of the one sent.
2. Verbal Inflation (Verbosity): Many use more words than necessary, generating noise and ambiguity. Worse, they repeat the same concept in different ways, creating contradictions and wasting the time of those who already understood. Itโs not just inefficiency; itโs a lack of respect for othersโ intelligence and time.
3. Lack of Persistence: Conversations are ephemeral. A verbal agreement can be easily forgotten, misrepresented, or disputed, leading to the dreaded โbut I thought you said...โ
The Alternatives: Formal Languages for High Fidelity
If oral communication is a blunt instrument, formal languages are the scalpel. They are designed for precision and high fidelity.
1. Written Language
Asynchronous, allowing for meticulous thought construction and revision. It creates a permanent, verifiable record, demanding clarity from the author and reducing ambiguity for the reader.
2. Mathematics
E = mc^2 is an immutable truth, understood without ambiguity in every language. There is no margin for interpretation.
3. Programming Languages
So precise they can be executed by a machine. They impose absolute logical consistency.
This JavaScript is an unequivocal contract.
if (user.isLoggedIn) {
grantAccess()
}
Context Matters
Of course, oral communication has its place. Immediacy is powerful for brainstorming or building personal rapport, where the โemotional bandwidthโโtone and body languageโis an asset, not a defect.
But for critical informationโproject requirements, strategic decisions, technical specs, agreements, and promisesโwe must be more rigorous.
Relying on a chat for a vital task is like using a hammer to drive a screw. It might work, but the result is crude, unreliable, and unprofessional.
Final Thought
I think we all need to learn to communicate with the precision of a programmer, the clarity of a mathematician, and the persistence of a writer.
What do you think? Is verbosity the silent killer of productivity in your workplace? Leave a comment below.
#FutureOfWork
The Flaws of the Spoken Word
Lossy Data Compression:
1. Speakers filter complex thoughts through an increasingly shrinking vocabulary. Listeners then โdecompressโ that signal through their own biases and recent experiences. The message received is almost always a corrupted version of the one sent.
2. Verbal Inflation (Verbosity): Many use more words than necessary, generating noise and ambiguity. Worse, they repeat the same concept in different ways, creating contradictions and wasting the time of those who already understood. Itโs not just inefficiency; itโs a lack of respect for othersโ intelligence and time.
3. Lack of Persistence: Conversations are ephemeral. A verbal agreement can be easily forgotten, misrepresented, or disputed, leading to the dreaded โbut I thought you said...โ
The Alternatives: Formal Languages for High Fidelity
If oral communication is a blunt instrument, formal languages are the scalpel. They are designed for precision and high fidelity.
1. Written Language
Asynchronous, allowing for meticulous thought construction and revision. It creates a permanent, verifiable record, demanding clarity from the author and reducing ambiguity for the reader.
2. Mathematics
E = mc^2 is an immutable truth, understood without ambiguity in every language. There is no margin for interpretation.
3. Programming Languages
So precise they can be executed by a machine. They impose absolute logical consistency.
This JavaScript is an unequivocal contract.
if (user.isLoggedIn) {
grantAccess()
}
Context Matters
Of course, oral communication has its place. Immediacy is powerful for brainstorming or building personal rapport, where the โemotional bandwidthโโtone and body languageโis an asset, not a defect.
But for critical informationโproject requirements, strategic decisions, technical specs, agreements, and promisesโwe must be more rigorous.
Relying on a chat for a vital task is like using a hammer to drive a screw. It might work, but the result is crude, unreliable, and unprofessional.
Final Thought
I think we all need to learn to communicate with the precision of a programmer, the clarity of a mathematician, and the persistence of a writer.
What do you think? Is verbosity the silent killer of productivity in your workplace? Leave a comment below.
#FutureOfWorkAway days
#spritz #campari 

In 2026, the question is no longer "Who do you trust?" but "What can you verify yourself?" ๐ก๏ธ๐ฆ
My "Digital Fortress" has reached full maturity. What started as a hardware recovery experiment on a 2017 Acer laptop is now a mission control for digital sovereignty. ๐
But the real lesson of this journey isn't about hardware. Itโs about the power of Open Source.
Everything Iโve built exists thanks to open, transparent, and verifiable code. Itโs the result of thousands of people sharing their knowledge for the benefit of everyone.
This is the polar opposite of the Big Tech model. While corporations design systems to decide what we see or do, Open Source gives us the tools to become the sole owners of our digital lives.
As a famous cypherpunk saying goes: "If you want to change the world, don't protest. Write code!"
Here are the pillars of the Fortress, built on transparency:
โ
Operating System (Debian 12): I stripped away the GUI (GNOME) and went Headless. By removing telemetry and commercial bloat, I reclaimed 1.5GB of RAM and dropped CPU load from 21% to 0.0%. The laptop is now a pure server: cool (39ยฐC), silent, and efficient.
โ
Sovereign Banking (Bitcoin Core & LND): My node has crossed 70% synchronization. Iโm currently validating 2024 blocks, mathematically verifying every transaction via Tor. โ๏ธโ๐ฅ
โ
Privacy Layer (AdGuard & Vaultwarden): I manage my own DNS and passwords in a closed circuit. Thanks to Open Source, my home is tracker-proof, and my keys no longer live on Silicon Valley serversโthey reside in an encrypted database on my own 2TB drive.
โ
Control Tower (RTL via Docker): I manage Lightning liquidity with a professional dashboard (Ride The Lightning), accessed securely through a Tailscale tunnel. Zero exposed ports, zero compromises.
The Role of AI in this Ecosystem ๐ค๐ค
During this process, Iโve had a valuable ally: my AI (Google Gemini-CLI) in "Driver" mode. Irony at its best: I used a Big Tech LLM to help me dismantle my dependence on Big Tech. ๐
Digital sovereignty canโt be bought in a corporate store. It is built by studying, learning, and choosing software that respects the user. Preferably Open Source.
2026 begins with a certainty: the keys to my world are finally, and exclusively, in my hands. ๐๏ธ๐ก๏ธ
#Bitcoin #Sovereignty #OpenSource #Debian #SelfHosted #Nostr #Cypherpunk
My "Digital Fortress" has reached full maturity. What started as a hardware recovery experiment on a 2017 Acer laptop is now a mission control for digital sovereignty. ๐
But the real lesson of this journey isn't about hardware. Itโs about the power of Open Source.
Everything Iโve built exists thanks to open, transparent, and verifiable code. Itโs the result of thousands of people sharing their knowledge for the benefit of everyone.
This is the polar opposite of the Big Tech model. While corporations design systems to decide what we see or do, Open Source gives us the tools to become the sole owners of our digital lives.
As a famous cypherpunk saying goes: "If you want to change the world, don't protest. Write code!"
Here are the pillars of the Fortress, built on transparency:
โ
Operating System (Debian 12): I stripped away the GUI (GNOME) and went Headless. By removing telemetry and commercial bloat, I reclaimed 1.5GB of RAM and dropped CPU load from 21% to 0.0%. The laptop is now a pure server: cool (39ยฐC), silent, and efficient.
โ
Sovereign Banking (Bitcoin Core & LND): My node has crossed 70% synchronization. Iโm currently validating 2024 blocks, mathematically verifying every transaction via Tor. โ๏ธโ๐ฅ
โ
Privacy Layer (AdGuard & Vaultwarden): I manage my own DNS and passwords in a closed circuit. Thanks to Open Source, my home is tracker-proof, and my keys no longer live on Silicon Valley serversโthey reside in an encrypted database on my own 2TB drive.
โ
Control Tower (RTL via Docker): I manage Lightning liquidity with a professional dashboard (Ride The Lightning), accessed securely through a Tailscale tunnel. Zero exposed ports, zero compromises.
The Role of AI in this Ecosystem ๐ค๐ค
During this process, Iโve had a valuable ally: my AI (Google Gemini-CLI) in "Driver" mode. Irony at its best: I used a Big Tech LLM to help me dismantle my dependence on Big Tech. ๐
Digital sovereignty canโt be bought in a corporate store. It is built by studying, learning, and choosing software that respects the user. Preferably Open Source.
2026 begins with a certainty: the keys to my world are finally, and exclusively, in my hands. ๐๏ธ๐ก๏ธ
#Bitcoin #Sovereignty #OpenSource #Debian #SelfHosted #Nostr #CypherpunkHolidays status: Sovereignty achieved. ๐ฐ๐ก๏ธโก๏ธ
My 2017 Acer laptop is now a full-blown Ninja Fortress. ๐ฅท
1) GNOME killed, Headless Mode active.
2) RAM optimized, CPU running cool at 43ยฐC.
3) Bitcoin Core @ 70% and climbing (validated 2024!).
4) Lightning Node (LND v20) up and running.
5) Dashboard (RTL) deployed via Docker.
6) ISP is blind. Big Tech is out. My keys, my nodes, my rules. ๐ฆโ๏ธโ๐ฅ
Massive shoutout to my AI Mentor (Gemini on Google AI Studio) ๐ค๐ค for driving me through the CLI trenches, fixing JSON bugs, and turning my security paranoias into a rock-solid infrastructure.
Don't trust, verify. Stay sovereign, plebs. ๐ค
#bitcoin #lightning #nostr #grownostr #selfhosting #plebs #privacy #linux
Wolverine 

Good question ๐๐ป๐๐ป๐๐ป
View quoted note โ
Holidays are over, but the mission has just begun. ๐ฐโก๏ธ
While others were resting, I was busy getting my hands dirtyโstudying, learning, and building my own "Invisible" infrastructure on a recycled 2017 Acer laptop. True digital independence is a skill you cannot delegate; otherwise, you'll always choose convenience over freedom. ๐ง ๐
Here is the progress report on my stealth stack:
๐ Identity & Encryption (PGP): Iโve taken control of my PGP Key Pair. Strategic advantage? Google Drive is now just "dumb storage." Sensitive docs are encrypted locally before upload. Privacy now depends on math, not corporate promises.
๐ป Privacy Layer & Stealth Stack: Consolidated a local ecosystem to kill tracking and secure metadata:
AdGuard Home: Network-wide DNS filtering. dnsleaktest.com confirms my house now communicates exclusively with 2 encrypted/secure DNS servers. My ISP is officially blind.
Vaultwarden: Sovereign management of passwords and WebAuthn Passkeys.
Syncthing: P2P cloud syncing all my devices without central servers.
โ๏ธโ๐ฅ Financial Sovereignty: With a new 2TB SSD installed, Iโm finally in the game. Currently at 15% of the Bitcoin blockchain sync. Once finished, Iโll fire up the Lightning node and look into setting up a WatchTower.
๐ค The AI Mentor: Ironically, I made heavy use of Google Geminiโa centralized and "noisy" LLM ๐
. However, thanks to deep learning, I was able to quickly source info on what I was putting "under the hood." I used AI as a driver to validate my hypotheses on the robustness and invisibility of the solutions I was deploying. ๐ค
The lesson from these holidays? Stop being a passive user and start being an owner. The road to 100% is long, but the view is beautiful.
Goal for 2026: Dive even deeper. ๐ช๐ซ
#DigitalSovereignty #PGP #SelfHosting #Privacy #Bitcoin #LightningNetwork #Linux #Nostr #Pleb #StackingKnowledge

Here is the progress report on my stealth stack:
๐ Identity & Encryption (PGP): Iโve taken control of my PGP Key Pair. Strategic advantage? Google Drive is now just "dumb storage." Sensitive docs are encrypted locally before upload. Privacy now depends on math, not corporate promises.
๐ป Privacy Layer & Stealth Stack: Consolidated a local ecosystem to kill tracking and secure metadata:
AdGuard Home: Network-wide DNS filtering. dnsleaktest.com confirms my house now communicates exclusively with 2 encrypted/secure DNS servers. My ISP is officially blind.
Vaultwarden: Sovereign management of passwords and WebAuthn Passkeys.
Syncthing: P2P cloud syncing all my devices without central servers.
โ๏ธโ๐ฅ Financial Sovereignty: With a new 2TB SSD installed, Iโm finally in the game. Currently at 15% of the Bitcoin blockchain sync. Once finished, Iโll fire up the Lightning node and look into setting up a WatchTower.
๐ค The AI Mentor: Ironically, I made heavy use of Google Geminiโa centralized and "noisy" LLM ๐
. However, thanks to deep learning, I was able to quickly source info on what I was putting "under the hood." I used AI as a driver to validate my hypotheses on the robustness and invisibility of the solutions I was deploying. ๐ค
The lesson from these holidays? Stop being a passive user and start being an owner. The road to 100% is long, but the view is beautiful.
Goal for 2026: Dive even deeper. ๐ช๐ซ
#DigitalSovereignty #PGP #SelfHosting #Privacy #Bitcoin #LightningNetwork #Linux #Nostr #Pleb #StackingKnowledge

๐๐ป๐๐ป๐๐ป
View quoted note โ
Percy and Athos โค๏ธโค๏ธ


Se ho ben capito, questa รจ l'Operation Red Sunset:
1) Bitmain (cinese) costruisce ASIC per mining Bitcoin
2) Tali ASIC (Ant miner) contengono backdoor che permettono lo spegnimento remoto
3) Uno spegnimento simultaneo di n kWh puรฒ causare un eccesso di energia elettrica nella rete, quindi un sovraccarico, quindi un blackout
4) C'รจ una mining farm vicina ad una importante base militare in Wyoming, stracolma di dispositivi Bitmain
5) Molto dei dispositivi Bitmain in Wyoming sono di proprietร della ABTC Corporation, fondata da 2 figli di Trump
6) ABTC ha comprato 314mln$ di dispositivi da Bitmain in agosto 2025, usando Bitcoin come collaterale
7) I fatti dall'1 al 6 sono verificati
Grazie @Guybrush e @Rikki del Bitcoin Italia Podcast
Sunday is #pizza and German #beer 

Eremo Monte Ricco, colli euganei, #Padova #Padua
#Veneto

Happy birthday #Bitcoin


HB #Bitcoin
View quoted note โ
In 2026 the plan will be the same than 2025: stack sats.
With an improvement: more digital sovereignty (I already have my own DNS, password manager and cloud).
I want to deploy a lightning node and try to go deeper in the rabbit hole and find if and how I can use lightning network for meaningful purchases.
#bitcoin #lightning #2026 #DigitalSovereignity
HAPPY NEW YEAR BY Athos and Percy โค๏ธ

