Correlation does not equal causation but damn; reducing my time on Twitter(X) to < 10% the former peak of mine (2022) and my dreams are happening. Absolutely melting though goals lately.
If I had to look back, Twitter(X) is for networking not achieving goals. The people are the value as is in life but at the end of the day Twitter(X) doesn't get you Proof of Work.
As is everything moderation is key.
/rant
https://void.cat/d/HMmRKNmATtoSYmnwLYVF9r.webp
My latest embedded project just got a mini operating system that can be interacted with over a built in USB serial endpoint! Next is the BitCoin mining program. Just for fun.
This project means so much to me because of the number of years it took me to get to this level, 8 years ago the idea came to me. 4 years ago I tried and failed. Move to 2023 and i've put in a month and some and am well on the road to completion.
FPGA based keyboard where each key is wired individually. As such removes the need to scan a matrix and reduces latency substantially. Debounce timers all run in parallel on the FPGA too.
Each key can be re-mapped to anything as well.
As a bonus it also does sha256 hashing :p just in case
https://image.nostr.build/05f5b4ecac822f3b34ad7cadc55b1861e3470ef38702f3492ef153352239b4fa.jpg
TY, I am working my way up to thicker cuts. The thick cuts I have cooked have all came out rather undercooked in middle, or if I try to cook it longer the outside turns to carbon.
My setup.
1. Electric stovetop
2. Cast iron
3. Olive oil in the pan
4. Salt and pepper seasoning
Note: By undercooked I mean blue.
So that if their database is breached you don't become a target with name, address, payment method etc.
Assuming you can trust them... which I do.
Ledger is a good example of how not to handle customer records and the fallout that can occur when they are breached. Coins were lost in various types of phishing attacks.
You can put on chain the expected pr possible results of VM, then off chain the participants can use it.
If anyone cheats its easy to verify.
A VM is like a program. It can do anything you want.
https://github.com/russeree/docker-lnurl-commando
Small little project I worked on this weekend based on @jb55 lnurl-commando to quicly and easily enable zaps and lnurl on top of Core Lightning using a single .env and a docker container.
If you are using CLN and want zaps! Give this a shot.
Agreed, TABConf would be the only conference I would consider again purely for the aspect of development. From now on I am going to be spending a lot more time curating our local BitDevs instead.
Can you connect to any other tor nodes? It seems like it can't convert the TOR name into a destination.
This is usually seen when the settings are incorrect for TOR.
Notes by Portland.HODL | export