Argument 1: Identification makes criminals easier to trace. Rebuttal: Those who seek to identify ‘criminals’ are the very same people who define crime. The danger of increasingly vague definitions of ‘crime’ based on online profiles offer state departments virtually unlimited powers to stifle undesirable behavior.
Argument 1: Identification makes criminals easier to trace. Rebuttal: Those who seek to identify ‘criminals’ are the very same people who define crime. The danger of increasingly vague definitions of ‘crime’ based on online profiles offer state departments virtually unlimited powers to stifle undesirable behavior. Further, creativity and new technology means that bad actors will always be able to penetrate or circumnavigate ringfenced systems before regulators can adapt. Jurisdictional difference and the competition of nation-states also offers optionality to bad actors and criminals.
We continue to have this illusion that things outside of us aren't driving what we think and believe, when in fact so much of what we spend our attention on is driven by decisions of thousands of engineers and product designers.”
“We continue to have this illusion that things outside of us aren't driving what we think and believe, when in fact so much of what we spend our attention on is driven by decisions of thousands of engineers and product designers.” Tristan Harris
Quem liga para blacklist? Bitcoin foi feito para transações P2P e não para enviar para corretoras, onde não existe autocustódia nem descentralização.
https://www.youtube.com/watch?v=ymq_BXN4lu0
https://www.youtube.com/watch?v=ymq_BXN4lu0
his firm is a "big fan of open source,"
hahhaa hhaha. haha. ha
If we do that, we will no longer have unfair differences simply because one person has better access to the new money than others. Instead, everyone simply tries to offer value to the rest of the world and earn money by doing so.
If we do that, we will no longer have unfair differences simply because one person has better access to the new money than others. Instead, everyone simply tries to offer value to the rest of the world and earn money by doing so.
The inherent flaw in the traditional subscription model is its lack of precision. A user pays for a capacity they may not fully utilize, while a provider must maintain infrastructure for a demand that fluctuates unpredictably. This inefficiency is masked by the convenience of the recurring revenue stream, which provides a comfortable buffer for corporate planning. But in a competitive landscape where every cycle of a processor can be bid upon in real-time, the fixed-rate model begins to look like a relic of a slower age. Censorship-resistant protocols take this a step further by removing the middleman—the central authority that dictates who can access software and under what terms. When computing resources are commodified to the point of being tradeable on an open, permissionless market, the logic of the SaaS provider begins to collapse. If a user can broadcast a specific request for a computation—be it a video render, a large-scale data analysis, or a localized search query—and receive multiple bids from competing providers in milliseconds, the need for a persistent, expensive subscription disappears.
This transition is powered by the concept of the Data Vending Machine. In this architecture, a user does not log into a dashboard or maintain an account with a specific company. Instead, they interact with a global relay network, sending out standardized event types that describe a job. These jobs are picked up by specialized workers who compete to provide the most efficient or cost-effective result. The payment is handled via micro-transactions, often using lightning-fast cryptographic currencies that settle instantly upon the delivery of the proof-of-work. This creates a skin-in-the-game environment where only the most efficient providers survive. The predictability that SaaS companies rely on for their valuation is replaced by a chaotic, yet highly efficient, auction. In this environment, the "service" is no longer the product; the "result" is the product. The infrastructure that delivers the result is secondary, as the user is no longer wedded to any single platform or provider.
nostr:npub1pmzlvrwytsjk7f99vwr0q45p9ctnmgmphf4flrj5dfjsu7jldn3qgqurmz
From the perspective of building infra using DVMs
The third and perhaps most profound pillar is the recognition that these digital trust networks are not merely artificial constructs but technological externalizations of deeply ingrained bio-social mechanisms. Human social cognition has evolved over millennia to manage the complexities of tribal life, where survival depended on the ability to discern patterns of trust, kinship, and reputation within a small group.
nostr:npub1ek3yxe7qr4yhkmh6vrmcajwyhwsnvs86tf6dwruhy2zs3za94lpsnva56k
I have a small group and so do you
You own your country
Vou ter que fazer um vídeo sobre a @BlitzWalletApp no meu canal do YouTube
BIP 000, which muffles the screams you hear whenever you sell bitcoin because you "need to eat"
There’s no evidence to suggest that anything we write here will be read by anyone, so we can probably say anything we want. Giraffe refrigerator. Rainbow spaghetti. Tuxedo forest.
Besides, Mossad’s intelligence indicated that street protests inside Iran would begin again and — with the impetus of the Israeli spy agency helping to foment riots and rebellion — an intense bombing campaign could foster the conditions for the Iranian opposition to overthrow the regime.
ZOMG we got Bay of Pigs'ed!!! 😭
In the Situation Room on Feb. 11, Mr. Netanyahu made a hard sell, suggesting that Iran was ripe for regime change and expressing the belief that a joint U.S.-Israeli mission could finally bring an end to the Islamic Republic.
Tenho 42 anos de Mercado,não me lembro de tanto escândalo juntos.
Banco Master
Banco BRB
Contrato de 129 milhões
Fraude no INSS
Comer Paca e anunciar.
E eu que pensava que o país após petrolão iria mudar.
"Eu pensava que o país iria mudar" kkkkkkkkkkkkkkkkkkkk
The constructs become the Gods.
What is God? God is the Creator. Since we are a direct representation of God on Earth, our most basic need and mission is to create. Ourselves, first and foremost, through self-preservation and reproduction. That's why these are the fundamental rules of everything and anything we can loosely categorize as animate. That's why they're called "laws of nature." It is also why man-made constructs that have been given too much energy, become "alive" in some sense, uncontrollable by the people involved in it, with its main goals becoming the same as man's: to survive and procreate. Not to serve and protect us, which is what all man-made constructs should do. And likewise, these constructs will try to find ways to capture more and more energy and to expand themselves. If these constructs were to remain in the "serve and protect" mode, then them gaining more energy would not be a problem. However, since there are always people making and/or enforcing the rules, these groups of people have the power to bend the rules according to their interests or be bought out, and since our nature is to create, and to create we always want more energy, they will invariably, sooner or later, abuse that power. So power does corrupt and absolute power corrupts absolutely, as the saying goes. This is literally the story of every empire there ever has been, the story of fiat money, the story of all institutions, governments, monopolies, oligarchies, etc. This is what happens when the construct is given the chance to use us for energy, rather than us using the constructs. The constructs become the Gods.
UNIVERSE. U-N-I VERSE as in "you and I converse" and "verse" as in a story
The symbolism both conceals and reveals itself through language. Take the word UNIVERSE. U-N-I VERSE as in "you and I converse" and "verse" as in a story, so could also be said as "our story." God and good. Devil and evil. With all that in mind, let's get into the details.
UNIVERSE. U-N-I VERSE as in "you and I converse" and "verse" as in a story
The symbolism both conceals and reveals itself through language. Take the word UNIVERSE. U-N-I VERSE as in "you and I converse" and "verse" as in a story, so could also be said as "our story." God and good. Devil and evil. With all that in mind, let's get into the details.
The whole universe is frequency, vibration. That means it's all music. That means it's all dance. Embrace it.
The whole of our reality is based on energies. We are harnessing, directing, conserving and converting our energies. We, along with the rest of reality, are no more than energy fields ourselves. The whole universe is frequency, vibration. That means it's all music. That means it's all dance. Embrace it.
Style is a finicky thing. Just like that word “taste.” Don’t you think? That’s right. They’re very similar. All you need to know about style is that there are three phases of style where variant 2 is the money:
Ahead of style: “Only you see it.”
In style: “Everyone sees it.”
Out of style: “Everyone’s seen it.”
Let’s use this framing for as second. You can see that foundation models are really good at variant 3. They’re terrible at variant 1. And a few weeks after they’ve been trained, they’re able to be “in style” for just a moment and riding variant 2. But it’s a fleeting moment. And style moves on. That’s … natural and okay!
#design
Satoshi Nakamoto, the pseudonymous creator of Bitcoin, registered his birthday as April 5, 1975, on his P2P Foundation profile. Many think that he chose this date because on that same day in 1933
Satoshi Nakamoto, the pseudonymous creator of Bitcoin, registered his birthday as April 5, 1975, on his P2P Foundation profile. Many think that he chose this date because on that same day in 1933
d sourced under one gith
Project is still in early stages but now it is split into 2 different domain entities.
Everything is opened sourced under one github Nsite-Info">https://github.com/Nsite-Info
d sourced under one gith
Project is still in early stages but now it is split into 2 different domain entities.
Everything is opened sourced under one github Nsite-Info">https://github.com/Nsite-Info
Nsite
A basic website with main info regarding what an Nsite is how it works and a list of tools and repo’s you can use to start building and debugging.
99% Finished, needs some extra translations and the Nsite Debugger can use a small upgrade.
Nsite
A basic website with main info regarding what an Nsite is how it works and a list of tools and repo’s you can use to start building and debugging.
99% Finished, needs some extra translations and the Nsite Debugger can use a small upgrade.
Um brasileiro foi condenado a 14 anos de prisão porque fez um pix de R$ 500 para uma manifestação.
Nessa manifestação, houve quebra-quebra, tratado pelo regime de exceção brasileiro como "tentativa de golpe". Por conta disso, o empresário catarinense foi condenado por "tentativa de golpe armado", mesmo sem jamais ter saído de casa.
Ele, como milhões de outros brasileiros, estava indignado pelo fato de um Descondenado ter sido alçado à presidência numa campanha marcada por censura e perseguição política à direita. Nem que quisesse dar um golpe, conseguiria, porque não teria os meios. Ou seja, o seu verdadeiro "crime" foi se opor ao regime, que busca se manter de pé através da repressão.
É um exemplo entre MILHARES de brutal injustiça que a mais alta corte do Brasil tem praticado nos últimos sete anos.
Enquanto isso, os próprios ministros que promoveram essas atrocidades estão afundados até o pescoço na lama do Banco Master. E NADA acontece.
Na semana passada, o Congresso americano publicou um relatório de mais de 700 páginas expondo o tamanho do regime de exceção no Brasil, com dezenas de ordens sigilosas de censura e perseguição política. É o TERCEIRO relatório do tipo.
Veja o absurdo: é preciso que o Congresso de outro país exponha a ditadura em curso no Brasil, porque o Congresso brasileiro, oscilando entre a cumplicidade e a covardia, jamais teve a capacidade ou a vontade de sequer retirar o sigilo das ordens de censura, quanto mais cumprir a sua função constitucional e colocar um fim no estado de exceção.
A resposta do Supremo, promotor de todas essas arbitrariedades, foi publicar uma longa nota cínica e mentirosa, negando o óbvio estado de exceção.
Diante de tudo isso, fica a pergunta: até quando os brasileiros estarão à mercê de um sistema corrupto e totalitário?
Como é bom ter um sistema de pagamento facilmente rastreável. Governo agradece o amor da população pelo Pix, rs
Walled gardens are terribly convenient
Might be time to consider building our own walled gardens then. Interoperable ones. With organic discovery to other gardens, built in. And with #customoji, obviously.
Your (Meta)data is probably gobbled up all the same
You either make your life from raw ingredients or you swallow whatever’s microwaved for the masses.
You either make your life from raw ingredients or you swallow whatever’s microwaved for the masses.
Step into the arena. Or be a spectator forever, wanting the reward without the cost. A full harvest without planting a single seed. A life that means something, without ever putting anything on the line. But nothing works that way.
Step into the arena. Or be a spectator forever, wanting the reward without the cost. A full harvest without planting a single seed. A life that means something, without ever putting anything on the line. But nothing works that way.
You’re not building anything. You’re just stuffing your pockets with ideas you never use. It feels like freedom, being able to come and go, with no one expecting anything from you. But that’s the trade. If no one expects anything from you, you expect nothing of yourself. So nothing gets risked. Started. Or built.
You can see it in how you hesitate. The way you second-guess. In how little you actually create. You’re not building anything. You’re just stuffing your pockets with ideas you never use. It feels like freedom, being able to come and go, with no one expecting anything from you. But that’s the trade. If no one expects anything from you, you expect nothing of yourself. So nothing gets risked. Started. Or built.
We live, he argues, not under natural law or common law, but under Admiralty maritime law — the law of the sea — which is entirely commercial. Everything is contract. Everything is consent. We just don't know we're consenting, because we were never taught the language.
We live, he argues, not under natural law or common law, but under Admiralty maritime law — the law of the sea — which is entirely commercial. Everything is contract. Everything is consent. We just don't know we're consenting, because we were never taught the language.
An absolutely scarce, unseizable form of money is a plug for the hole through which the control structure feeds itself. That's it. That's the whole thing. Looking at it as a better retirement account, or focusing only on it’s “number go up” attribute, is missing the point. Bitcoin is a barrier against the siphoning of human energy over time.
Bitcoin's relevance in this framing is completely different from the price conversation. An absolutely scarce, unseizable form of money is a plug for the hole through which the control structure feeds itself. That's it. That's the whole thing. Looking at it as a better retirement account, or focusing only on it’s “number go up” attribute, is missing the point. Bitcoin is a barrier against the siphoning of human energy over time.
The financial piece matters enormously, but the full picture is legal literacy, digital privacy, food sovereignty, genuine community, and the internal work of escaping the fear program.
I left this conversation more convinced than ever that the sovereign individual, the one Bitcoin was always pointing toward, is not primarily a financial project. The financial piece matters enormously, but the full picture is legal literacy, digital privacy, food sovereignty, genuine community, and the internal work of escaping the fear program.
Convenience is the most effective control mechanism of the digital age. John's framing: in digital privacy, you can only have two of three: privacy, security, or convenience. Reject convenience. That's more than a Luddite impulse, it’s the first act of digital self-defense available to everyone right now.
Convenience is the most effective control mechanism of the digital age. John's framing: in digital privacy, you can only have two of three: privacy, security, or convenience. Reject convenience. That's more than a Luddite impulse, it’s the first act of digital self-defense available to everyone right now.
The legal system operates like a casino. Walk in without knowing that, and you will never understand why the house always wins. Attorneys are casino ushers: they can guide you between games, help you navigate, argue on your behalf within the rules — but they cannot go against the casino.
The legal system operates like a casino. Walk in without knowing that, and you will never understand why the house always wins. Attorneys are casino ushers: they can guide you between games, help you navigate, argue on your behalf within the rules — but they cannot go against the casino. They work for it. And cases, in large jurisdictions, are often securitized at the front end, with outcomes maneuvered to protect bond values. This is wild. When I got this I was really flabbergasted, and that doesn’t happen often. Justice is really just the branding, while commerce is the function.
At birth, the state registers you. A birth certificate is issued. A trust is opened in your all-caps name; not your name, but a legal entity assigned to you. And that entity is bonded and securitized.
At birth, the state registers you. A birth certificate is issued. A trust is opened in your all-caps name; not your name, but a legal entity assigned to you. And that entity is bonded and securitized. John knows this from experience: he went through a decade-long commercial legal dispute and, through a contact, was able to look up his own case number in a CUSIP database — the Committee on Uniform Security Identification Procedures numbering system used for bonds and securities. His case was sitting in a large fund, pre-packaged and pre-determined.
The financial system was never designed to manage money. It was designed to siphon off human energy and channel it upward into the control structure. Central banking, the fifth plank of the Communist Manifesto was deliberately erected rather than a natural societal evolution.
This reframe hit me hard because of how precisely John articulated it. The financial system was never designed to manage money. It was designed to siphon off human energy and channel it upward into the control structure. Central banking, the fifth plank of the Communist Manifesto was deliberately erected rather than a natural societal evolution. The money printing is the source of the spring. Everything downstream: big tech, technocracy, the medical industrial complex, feeds off it.
The attention economy as currently constructed is a manipulation machine precisely because its signals are free to fake. Its founding assumption, the one baked into every centralized social platform ever built, is that human attention is a resource to be harvested, not a signal to be respected.
The attention economy as currently constructed is a manipulation machine precisely because its signals are free to fake. Its founding assumption, the one baked into every centralized social platform ever built, is that human attention is a resource to be harvested, not a signal to be respected. Algorithmic amplification, coordinated inauthentic behavior, state-sponsored influence operations; all of these exploit the zero cost of digital signaling on centralized platforms. Zaps break that model and introduce economic integrity into the social graph. A proof-of-value mechanism where the strength of a signal is backed by the physical cost required to produce it. This is the first honest attention market the internet has ever had.
Musk’s response was, “Twitter doesn't have a choice but to obey local governments. If we don't obey local government laws, we will get shut down.” In a single sentence, Musk demolished the entire premise of relying on any centralised platform for speech that actually matters.
What a lot of people may be unaware of is that Musk had already explained exactly why this was inevitable. Back in 2023, when Jack Dorsey revealed that India had threatened to shut the platform down if it didn't remove content during a farmers' protest, Musk’s response was, “Twitter doesn't have a choice but to obey local governments. If we don't obey local government laws, we will get shut down.” In a single sentence, Musk demolished the entire premise of relying on any centralised platform for speech that actually matters.
X complied with 71% of all government legal requests to remove content. That is not only a majority but it is a twenty-point jump from 2021 and more than double the roughly 30% compliance rate of prior years!
Then X published its transparency report which shockingly revealed that in the first half of 2024, X complied with 71% of all government legal requests to remove content. That is not only a majority but it is a twenty-point jump from 2021 and more than double the roughly 30% compliance rate of prior years! The self-described free speech absolutist was running the most government-compliant version of the platform in its entire history.
and
For Bitcoin, Nunchuk provides a proper onchain wallet with multisig support and no KYC requirements. Phoenix offers self-custodial Lightning with automatic channel management, letting you send and receive instantly without trusting a third party. For smaller amounts where speed and privacy matter more than self-custody, Cashu.me provides an ecash wallet using Chaumian blinding, meaning the mint cannot link your deposits to your withdrawals. A reasonable setup uses Nunchuk for long-term savings, Phoenix for everyday Lightning payments, and Cashu for receiving zaps and casual transactions where the custodial trade-off is acceptable.
without
For applications, Zapstore pulls updates from a decentralized app store built on Nostr, where developers cryptographically sign their releases and users verify authenticity without trusting a central authority. KeePassDX stores passwords locally with no network permission, making exfiltration impossible by design. Organic Maps provides offline navigation without data collection. Aegis manages two-factor authentication codes with encrypted local storage. Molly hardens Signal with database encryption at rest and automatic lock timeouts. For Nostr users, Amber stores your private key securely and signs events without exposing the key to other applications, while Amethyst provides a full-featured client.
exclusively
GrapheneOS runs exclusively on Google Pixel devices because no other manufacturer meets its hardware requirements. The Titan M secure element provides hardware-backed attestation and encryption key storage. Proper verified boot implementation allows flashing custom signing keys and re-locking the bootloader with full security intact. Samsung, despite taking security seriously, deliberately cripples devices when the bootloader is unlocked. Most other manufacturers lack the necessary hardware entirely. The Pixel 8a offers excellent value as a budget option with full GrapheneOS support, while the Pixel 10 Pro serves users who need high performance.
firmware
The verified boot chain begins in hardware. Pixel devices contain a Titan M secure element with the firmware verification key burned into fuses at the factory. The firmware rollback index is similarly fused, preventing downgrade attacks where an attacker installs an older, vulnerable version. When you install GrapheneOS and lock the bootloader, your device's verified boot key is stored in the secure element. Every subsequent boot cryptographically verifies the entire chain from firmware through the operating system. Any modification, even a single flipped bit, halts the boot process. The Auditor app extends this to runtime, using hardware-backed attestation to verify OS integrity on a schedule you control.
During the conference, in a keynote slot that had been specially cleared so that no other sessions would compete for the audience, Bluesky announced attie, a new AI-powered feed creation tool. The tool allows users to describe the kind of feed they want in natural language and have it generated automatically.
It also directly competes with Graze, an independent startup that had built a custom feed creation tool on atproto and that was a sponsor of the conference. The developers behind Graze had invested time and money into building on the open protocol, had supported the conference financially, and now found themselves watching the protocol’s primary developer announce a competing product to the entire gathered community. The term of art is “sherlocking”: when a platform incorporates the functionality of a third-party tool, making the independent version redundant.
Leading by example in an open ecosystem doesn't just mean promoting other people's work or deferring to them on features you don't want to build. It means building in public when you're working on projects that overlap with the community. It means reaching out before you ship, not after the backlash. It means treating collaboration as part of the development process rather than as a cleanup step.
Bluesky isn't the only entity in this space with funding. Graze raised $1M in pre-seed, Germ has pre-seed backing. Bluesky raised $100 million. They're the platform. They have resources the rest of us can only dream about. They could be supporting and contributing to the projects that are building on and strengthening the Atmosphere. Instead, this presentation said: we'll celebrate your work, but if we like what you're doing, we'll just build our own version and leave the community to figure out what that means.
🍿
One of the reasons why I’m here with Nostr. 🤙🏻 Bluesky seems to be eating their own community.
Frank Herbert (yeah, I know I'm a nerd), in God Emperor of Dune, has a character observe: "What do such machines really do? They increase the number of things we can do without thinking. Things we do without thinking; there's the real danger." Herbert was writing science fiction. I'm writing about my office. The distance between those two things has gotten uncomfortably small.
Unlike medicine, where a cure for Alzheimer's would be invaluable regardless of whether a human or an AI discovered it, astrophysics has no clinical output. The results, in a strict practical sense, don't matter. What matters is the process of getting them: the development and application of methods, the training of minds, the creation of people who know how to think about hard problems. If you hand that process to a machine, you haven't accelerated science. You've removed the only part of it that anyone actually needed.
Which means that, from the institution's perspective, the question of whether Alice or Bob becomes a better scientist is largely someone else's problem. The department needs papers, because papers justify funding, and funding justifies the department. The student is the means of production. Whether that student walks out the door five years later as an independent thinker or a competent prompt engineer is, institutionally speaking, irrelevant.