“When the going gets weird, the weird turn pro” - Hunter S. Thompson #bitcoin #privacy #freedom Paid relay (8000⚡️): wss://relay.orange-crush.com
Orange Crush @Orange Crush - 10mo
Michael's (porkopolis) Quarterly update of #basemoney nostr:nevent1qvzqqqqqqypzp6h0t9jlufuzfatxeclt2nehzj0w9rjd3z6hseuw5qst2ag366meqqs84jtu0cqppz78tyfarhh2l8yrd63a9le486wrefw78rtr7r942wc3zd4yj Incredible thread on current global money supply backed by well designed visual media.
Orange Crush @Orange Crush - 11mo
Boating accident coins don't count.
Just saw a guy on CNBC say what a good opportunity midcap banks are. 🤦♂️
Stuck in zoom meetings and got FOMO for nostr:npub1fnn2h0tgm2mwnl0kar5ez25wztum2w0q0rrrf326n0ljn999znwsqf4xnx new track...🫠
Cracked open three double yolk eggs in a row 🍳🍳🍳 #fortune #yearofthedragon
I think democracy has left. It has been replaced with political theater, and next comes politcal repression. In the US, the legislature is derelict in its duties, the courts are growing polarized, and the administrative state gobbles all responsbilities as the elected class seek high time preference solutions in support of reelection over reason.
They all lie. This is known. I agree Putin is trying to manipulate the people of the West. I also believe the leaders of the West are trying to manipulate the people of the West. All *governors* make themselves obsolete through their inability to rise above their own self-interest. They eventually go one psyop too far. The US blew theirs on COVID and people are waking up, gradually then suddenly.
I agree. Zombie companies are a tax on human energy and are a product of the Fed's disastrous efforts at central control. Thankfully (and painfully), the US government continues to undermine USD hegemony as the elected class advances high time preference policy. Which is not at all surprising seeing as they will all die of old age in the next 10-20 years.
1:17:30; Putin discusses USD and how the politicization of the USD has undermined its position the default reserve currency and pushes energy-rich nations towards the Chinese Yuan.
I agree. Python is very readable and accessible. It makes onboarding easy for new users. Then, the tools make their way to lots of people. nostr:nevent1qqsrnwgrkdwlszgst5j6wnej74xaa0j79vr7s7zynj3g0xeut2myj4qppemhxue69uhkummn9ekx7mp0qgsfg8me4m3cgr666xvsclwq708twp7m0686pspnx8aues53tfqkvfsrqsqqqqqpfmugcu
Stay on top of reality: https://www.shadowstats.com
Seeing things. Lots of broken businesses getting found out. If you work for one (bad management, shit culture), look for a better job NOW. We are reaching the FIND OUT correlation to the free money FUCK AROUND. Stay safe out there plebs. Stack while the sats are cheap.
Re-upped my annual VPS and domain commitments for: wss://relay.orange-crush.com Still 8000 sats for lifetime membership. Still massively underutilized. If you are looking for a cheap paid relay w/o a monthly fee, please consider: https://relay.orange-crush.com
A good read for anyone attempting self-hosting: https://stacker.news/items/404061/r/orangecrush
Setup your lightning address and find out.
Governments violating privacy not new though: AI: During the Roman Empire, how did the empire utilize spying for domestic surveillance? During the Roman Empire, espionage and intelligence gathering were integral parts of maintaining control and ensuring the security of the state. The empire utilized various methods and groups for domestic surveillance: Frumentarii The Frumentarii were an intelligence gathering force in ancient Rome, particularly active during the reign of Emperor Hadrian (117-138 AD). They operated undercover within Roman territory, aiming to gain the trust of those they were investigating. Their activities included tax collecting and detecting subversion, which often led to corruption and made them unpopular with the general public. Political Surveillance Networks Major political players, including Julius Caesar, had their own surveillance networks to keep informed about the schemes of those in power. Politicians like Cicero complained about their letters being intercepted, indicating a widespread practice of monitoring communications. Military Intelligence Roman military tactics included the use of spies, collaborators, diplomats, envoys, and allies to gather information. For example, during the Second Punic War, intercepted messages provided valuable intelligence that helped the Romans in their military campaigns. Imperial Spies and Intercepted Letters Emperors regularly intercepted and investigated the private correspondence of the Roman elite to identify threats, root out conspiracies, and undermine potential rivals. This practice was part of a broader imperial intelligence-gathering effort that included the use of the frumentarii. Speculatores and Exploratores The Romans also used covert agents known as speculatores and scouts called exploratores for intelligence gathering. These individuals were attached to legionary forces and operated both within and outside Roman territory to achieve various intelligence objectives. No Formal Intelligence Service Despite these efforts, it cannot be said that the Romans ever established a formal intelligence service. Instead, they relied on various groups, both civilian and military, to carry out surveillance tasks. This decentralized approach to espionage was characteristic of the late empire. In summary, the Roman Empire employed a range of espionage techniques and groups for domestic surveillance, including the frumentarii, personal surveillance networks of political figures, military intelligence operations, and the interception of private communications by emperors. These methods were used to maintain control, protect the state, and manage the vast territories of the empire.
AI Prompt: Can you provide documented examples of the National security agency breaking encryption to illegally survey the US Population? The National Security Agency (NSA) has been involved in efforts to break encryption and conduct surveillance, some of which have raised legal and ethical concerns. Here are some documented examples: Bullrun Program: The NSA ran a highly classified program called Bullrun, which aimed to crack encryption of online communications and data. This involved using supercomputers, technical trickery, and behind-the-scenes persuasion to undermine encryption tools protecting privacy. Mass Surveillance Program: A mass surveillance program exposed by Edward Snowden was later ruled illegal. This program involved the NSA building a vast database of U.S. telephone records without warrants. Compromising Encryption Standards: The NSA, along with the British GCHQ, has been reported to have compromised encryption standards by inserting secret vulnerabilities into commercial encryption software. This allowed them to access a wide range of data before it was encrypted. Section 702 Surveillance: Under Section 702 of the Foreign Intelligence Surveillance Act, the U.S. government engaged in mass, warrantless surveillance of Americans' international communications. This included phone calls, texts, emails, social media messages, and web browsing activities. NSA Spying on Domestic Communications: Reports have revealed that the NSA engaged in illegal dragnet surveillance of domestic communications and records of millions of Americans since at least 2001. These examples indicate that the NSA has engaged in activities to break encryption and surveil communications, some of which have been challenged as illegal or unconstitutional.
AI Prompt: Can you provide documented examples of the Central Intelligence Agency manipulating the us population through propaganda campaigns? There are several documented instances of the Central Intelligence Agency (CIA) manipulating the US population through propaganda campaigns: Operation Mockingbird: This was an alleged large-scale program that began in the early years of the Cold War. It aimed to recruit leading American journalists into a propaganda network and influenced media institutions to promote the CIA's views. Project MKUltra: This was an illegal human experimentation program designed and undertaken by the CIA, intended to develop procedures and identify drugs that could be used in interrogations and torture to weaken individuals and force confessions. It was motivated largely in response to alleged Soviet, Chinese, and North Korean uses of mind-control techniques on U.S. prisoners of war in Korea. CIA and Mass Media: The CIA has historically made use of mass media assets, both foreign and domestic, for its covert operations. For instance, the CIA has used motion pictures to boost recruitment, mitigate public affairs disasters, bolster its own image, and even intimidate terrorists through disinformation campaigns. Psychological Operations: The CIA has been involved in psychological operations (PSYOP) to convey selected information and indicators to audiences to influence their motives and objectives. This includes the use of mass media to spread propaganda and disinformation. Covert Action Information Bulletin: The CIA has been reported to practice the art of disinformation on a grand scale, manipulating, influencing, and outright purchasing of news throughout the world. These examples illustrate the extent to which the CIA has been involved in manipulating public opinion and disseminating propaganda. However, it's important to note that these activities have been subject to significant controversy and criticism, leading to investigations and policy changes.
Serious question; What would you do with Satoshi’s 1,000,000+ bitcoin? We don’t need any more *Davos-attending* **rich assholes**, so please consider how you would positively impact Bitcoin adoption, open source development, remake world economics, etc, etc.