I defintely hate it when I murder someone and people who aren't involved try to control control my body and shame me for murdering. UGGHHH! So unfair. On top of that when I put myself in a room full of tigers all they ever seem to want to do is eat me! Like WTF?! I know I put myself in that situation but the tigers should respect my bodily autonomy and know that I don't want to be eaten.
I'm just glad someone finally wrote a song about this. It's hard out there for murderous, edible people. 😭😭
nostr:nevent1qqsynkx34czynxzqm93urkyxs7zcty2qlvguefc0zdfp0wxww43qxwgpz9mhxue69uhkummnw3ezuamfdejj7q3q3qrrw2h4z52m7jh0spefrwtysl4psfkfv6j4j672se5hkhvtyw7qxpqqqqqqzj4t8c5
He's reminding the viewer what happens when you do this. I.E.
Meta: We made an AI tower of Babel
Jack: The tower of babel falls
Meta: We're building it anyway.
I defintely hate it when I murder someone and people who aren't involved try to control control my body and shame me for murdering. UGGHHH! So unfair. On top of that when I put myself in a room full of tigers all they ever seem to want to do is eat me! Like WTF?! I know I put myself in that situation but the tigers should respect my bodily autonomy and know that I don't want to be eaten.
I'm just glad someone finally wrote a song about this. It's hard out there for murderous, edible people. 😭😭
nostr:nevent1qqsynkx34czynxzqm93urkyxs7zcty2qlvguefc0zdfp0wxww43qxwgpz9mhxue69uhkummnw3ezuamfdejj7q3q3qrrw2h4z52m7jh0spefrwtysl4psfkfv6j4j672se5hkhvtyw7qxpqqqqqqzj4t8c5
The best I've got is using the Brave Browser or firefox "Add to homescreen" function for Timechaincalender.com
It has pretty much all of that info just one click on your home screen...
Analysis too simplistic. Time preference is a gradiant and no ends can be "high time preference," only means. If the goal is to not have current systems the means could be several actions falling on the time preference spectrum. They also have various levels of efficacy. literally "burning down the system" is not only ineffective but also high timeprefence to the ends of emotional satisfaction, assuming success. Reducing the system to irrelevance by creating and using a superior system "burns the system down" metaphorically but is vastly more efficacious and directly accomplishes the ends.
It's about creating your own networks. Think banking networks. Their ATMs interoperate, why is that? Because they take a cut. For a "profitable" routing node it's about business relationships not hoping your node is well connected. Create (usually the only) pathways to buy things for your local stores in BTC.
Take the day, talk to all local stores who will listen that you can provide essentially an under the table way to have direct customer relations. Open your node to them and have them put up a QR placard in their business to use your routing node to buy items there with Lightning.
Derek has connections, if very plugged into his community and is probably why he is promoting his node.
Just some food for thought. No one is saying put on a parachute and figure it out on the way down.
If you think bitcoin is good at that, you should try using dollars in cash. There's no public ledger to tie you to how you spend it. Way better for being a scumbag piece of shit.
Because a tool is a tool and what you do with your tool is your business. Predators used to use knives, then guns, now protocols. Asking why we don't protect the tools from our enemies is asking the wrong question. The question is knowing the tool exists what do you do to defend yourself and friends. Anarchy is a personal relationship not something imposed.
I like to fantasize that the government will come and hug me at night because i'd love it so much. All of those people who live their own lives peacefully and quietly in their own jurisdictions are idiots. I'm super smart because i like to suck cock have any cop who asked me to.( Oh i'm sorry i thought we were just making up shit we think the other person thinks)
Alaska, and most other uninhabited places. The trade off his self reliance and self responsibility. Build your own shit, protect your own shit, and trade with people who do the same.
Like all other media you either trust a host or you are one. The relays just route your note link to your media server. As far as a client exclusively for video/audio, most are focused of communication or streaming. Zap.Stream is a streaming client that you could use to play your music for an audience. Zap splits are dependant on the client.
I have found Border wallets way better for security and now way to $5 wrench me. If pressed I would embed an NFC key in an innocuous item as a multisig layer.
This true? It seems a little too simplistic. Plant/seed oils are definitely mitochodrial disruptors. Just unsure how much that translates to both uneven subdermal fat in legs and excessive fat deposits in the chest.
I'm sorry nostr:nprofile1qqst94nsmefmya53crp5qq39kewrtgndqcynhnzp7j8lcu0qjple6jspzpmhxue69uhkummnw3ezuamfdejsz9nhwden5te0wfjkccte9ec8y6tdv9kzumn9wsq3qamnwvaz7tmwdaehgu3wd3skueqtvj70p but your relay is the only one Replay guys reach me on. Gotta stop using it. I hope it gets figured out.
Power passthrough is very rare for many standalone powerbanks. (mostly due to a cheap BMS) most times you need a seperate BMS to have voltage overflow stored. Kind of a bulky solution to what would seem like a simple panel, battery, and load, setup.
The real question is why would you want an ISP. Pointing a radio antenna or dish would make way more sense in most cases. Even when it wouldn't (urban centers) running wire is infrasructure not a corporate duty.
I meant in the start over scenario. The cabling construction make it ownable instead of a "tap into a band of frequency" type model. In that world, (RNS sort of already does this) you would not have an ISP and infrustructure would be local but connected to a global network like BTC Nodes or Nostr relays.
This is difficult to articulate in text but I will give it one more shot. The presupposition is that there exists such a thing as "public land." There is no such thing. All land is owned. "Public land" so called, is owned(stolen) by the state. Infrastructure is property that adjoins land owned by two or more parties. (Utilities, roads, and street lights)
The proposal here is using a mesh-type system where your node is a data propagator as well as a send/receiver. Utilizing either a hard-wired mesh (likely to a high bandwidth local propagation node) or a radio (lower bandwidth self-hosted propagation node). This makes the internet as fast as the fewest hops between you an your local website's closest host server farm. Any break in the mesh would be routed around but through I2P and RNS it is end-to-end encrypted web traffic with blind intermediaries. This is currently a possiblity you would only like be using an ISP's infrastructure without their knowledge which could eventually be found and blocked. Anyway the point is there are self-sovereign solutions but the take time and knowledge that people are wasting serving the state.
I always block and mark as spam but they use different Npubs everytime. So, likely unstoppable unless you silo yourself with only your web of trust and never look outside of it.
I can't remember how to check relay image sources but, isn't this a crazy amount of spam for the media relay? I like the movie and all but dang, I feel sorry for the storage on that relay.
I have taken to having a phone with text and voice and data hotspot function. All games, apps and other time wasting is on a tablet. Bringing a tablet out is an intentional act and isn't as easy as a 1-handed phone.
Can somone explain how a direct P2P connection like say I2P is not censorship resistant since it also focuses on privacy? I think this is more of a misunderstanding between a want to be social and a want for secrecy. Nostr isn't private because you are literally attaching a public/private key pair to every transmission. Censorability is about centralization versus decentralization. It is not inherent to privacy that you centralize your protocol.
None of those points really apply to I2P.
-Non persistant tunnels as opposed to persistent TOR circuits
-The inproxy/outproxy model at minimum doubles the amount of "nodes" that would need to be captured for "unmasking" even then it is packet switched.
-IRC routed through I2P is absolutely not like a TOR proxy.
There are several ways to get bitcoin without revealing your real identity. Coinbase has limits to withdrawals capping at .08 BTC per week. From the point of withdrawal your coins will be tied to your identity and can be tracked unless thoroughly mixed(which costs fees). Also there's the ick factor that they promote shitcoins, work with the central banks and US Gov regulators, and hold Blackrock, fidelity, and other ETF coins which makes them a hacker's honey pot.
Well, given that BTC is scarce and I think they did the math and said "if every one of our users bought bitcoin simultaneously, how much could we actually deliver weekly?" Venmo either has far fewer users or has no idea how scarce bitcoin is.
After a full day charging the S9 runs at 1000w for about an hour and 15 minutes. Not exactly the best use but, It's a fun little "free" hash booster. (I could put my Bitaxe on it all day but that battery unit has no power pass-through so I have to turn it on after they charge.)
Notes by JackTheMimic | export