BitcoinIsFuture

Zero-JS Hypermedia Browser

avatar
BitcoinIsFuture
npub1wl6k...caw8
#Bitcoin #LightningNetwork #Freedom #Peace #Truth #Love Bitcoin, NOT cryptoshit! Not your keys, not your Bitcoin! CBDC is slavery! Bitcoin is Freedom Money! Nostr Public Key: Public Key (Hex): 77f56243a824d22573fb755dd52c73c14986d15c0c98512d45f4deb08e9f879a Public Key (bech32): npub1wl6kysagynfz2ulmw4wa2trnc9ycd52upjv9zt297n0tpr5ls7dqk5caw8

Notes (12)

With the soft fork (BIP444) mining large spam bloats on OP_RETURN won't be even possible. Spam is waste that abuses Bitcoin and needs to be better mitigated. Bitcoin is Freedom Money. Not a spam dump for bad actors and shitcoiners. image image image nostr:nevent1qqsflgsv92lel2sumsgv7tpautp7mw9mer4rqva2x30dewejgfr2u3qppemhxue69uhkummn9ekx7mp0qy08wumn8ghj7mn0wd68yttsw43zuam9d3kx7unyv4ezumn9wshszyrhwden5te0dehhxarj9ekk7mf0epp9dj
2025-12-04 11:12:54 from 1 relay(s) View Thread →
Its unfortunate to see brainwashed clowns like mempool and wicked. image image image nostr:nevent1qqsf8djkj2nrdjk34fmmvyg0wh0mhezv003xqdj7jz2s9w400zn5d9cppemhxue69uhkummn9ekx7mp0qyg8wumn8ghj7mn0wd68ytnddakj7qgcwaehxw309aex2mrp0yhxvmm4de6xz6tw9enx6tca9kgdx
2025-12-01 20:30:06 from 1 relay(s) View Thread →
From @separ8 on X "The “What is spam?” debate is the exact same psychological pattern we saw in the “What is a woman?” discourse. Confusion elevated into a virtue, uncertainty marketed as intelligence, and basic definitions suddenly treated as controversial. It’s the same mechanism, just wrapped in a Bitcoin skin. Core didn’t just drift technically. They turned conceptual fog into a badge of sophistication. And they’ve managed to convince wide-eyed new developers that this fog represents some kind of higher philosophical plane, rather than a failure to anchor Bitcoin in its founding principles. One day, people will look back and genuinely ask: “How did anyone ever equate spam-prevention with censorship?” The same way we now ask how anyone ever pretended a man could become a woman. The irony: Core’s most enduring legacy may be neither code nor design. Core’s only immortal contribution to humanity will be the word “Coretard”: the clinical term for someone so marinated in abstractions they can no longer tell what is spam on Bitcoin. Truly fascinating. Dec 1, 2025 · 12:54 PM UTC" nostr:nevent1qqsfpcet8l8x3dc336zvdq9pt0x6edrshf6fp9m5h879jkdg8n8cldsppemhxue69uhkummn9ekx7mp0qyg8wumn8ghj7mn0wd68ytnddakj7qgkwaehxw309aex2mrp0yhxummnw3ezumn9wshsvhl3zy
2025-12-01 20:14:07 from 1 relay(s) View Thread →
Bitcoin in self-custody is The Freedom. Be free 🤙
2025-12-01 13:43:37 from 1 relay(s) View Thread →
image nostr:nevent1qqs85r39pqkp0k35qxt47swectc06gdtv80nd64fflsky9av5kadj0sppemhxue69uhkummn9ekx7mp0qy2hwumn8ghj7un9d3shjtnyv9kh2uewd9hj7qgewaehxw309aex2mrp0yh8xmn0wf6zuum0vd5kzmp0wsx2f5 nostr:nevent1qqsz5wnm7h9r46crm7pgx2xnaztsfz93jylhclsyud4qqa5wp8pkwscppemhxue69uhkummn9ekx7mp0qyg8wumn8ghj7mn0wd68ytnddakj7qgkwaehxw309aex2mrp0yhxummnw3ezumn9wshsvra270
2025-11-30 04:35:01 from 1 relay(s) View Thread →
Asked AI - "How Facebook (Meta) can surveil people and build profiles?" and got nice answer. This applies to other [a]social networks too. Below is a concise, evidence-based breakdown of common mechanisms Meta uses to collect data and create profiles — for both users and non‑users — and what that profile typically contains. Data sources On‑platform activity: posts, likes, shares, comments, stories, reactions, search history, pages/groups you follow, events you RSVP to. Messenger/Instagram activity: messages, call metadata, DMs, story interactions. Device and app signals: device IDs, OS, browser, app version, language, timezones, installed apps, battery/connection metadata. Location: GPS, IP geolocation, Wi‑Fi and Bluetooth signals, check‑ins, location tags, inferred home/work. Contact lists & uploads: address books synced by users (creates “shadow” links to non‑users). Pixel and SDK tracking: Facebook Pixel, Conversions API, and SDKs on third‑party websites and apps report page views, clicks, purchases, cart contents, form submissions. Cookies and cross‑site trackers: first‑ and third‑party cookies, browser fingerprinting, and cross‑site identifiers that follow users across sites. Ad network and partner data: data brokers, advertisers, measurement partners, CRM uploads, offline event imports (store visits, purchases). Social graph & interactions: friends, followers, group memberships, mutual connections, tags in photos — used to infer attributes about you. External signals and public records: scraped public profiles, public posts, business listings, news, or other available datasets. Key technical methods Tracking pixels & SDKs: embed code that sends user actions from third‑party sites/apps back to Meta. Browser fingerprinting: combine small device/browser attributes to identify users without cookies. Cross‑device matching: link activity across phone, tablet, desktop using logins, device graphs, or hashed identifiers. Machine learning inference: predict interests, demographics, political views, health, wealth, and purchase intent from behavioral patterns and correlated data. Data linkage / identity resolution: match emails, phone numbers, hashed identifiers, and contact lists to connect records (creates “shadow profiles” for non‑users). Lookalike modelling: build audiences by finding people who resemble known users for ad targeting. What a profile can include Demographics: age range, gender, language, likely location, inferred ethnicity. Interests & behaviours: hobbies, pages liked, frequently visited sites, shopping categories, travel habits. Political, religious, health, sexual orientation (inferred): flagged via behavior and proxies (often sensitive). Commercial signals: purchase history, propensity to buy, lifetime value estimate. Social connections: friends, family, workplace, group affiliations. Device and technical identifiers: device IDs, IP ranges, browser fingerprints. Engagement scores: how likely you are to click, convert, or engage with specific ad types. Uses of these profiles Ad targeting and measurement: serve, optimize, and report ads (custom audiences, lookalikes, retargeting). Personalization: content ranking, recommendations, friend suggestions, notifications. Security & fraud detection: anomaly detection, account verification. Product development & research: train models to improve features and targeting tools. Special note: shadow profiles and non‑users Meta can construct profiles for non‑users from others’ address books, tracker signals on websites/apps, and aggregated inferences. Academic research has documented shadow profiles and cross‑site tracking that covers many non‑users. Mitigations (brief) Use browser privacy protections (block third‑party cookies, disable trackers), tracker‑blocking extensions, private browsing, and VPNs. Limit contact uploads to services, avoid logging into sites with Facebook/Meta, opt out of ad personalization where possible, and review app permissions. For accounts: tighten privacy settings, remove third‑party app access, and limit profile info and tagging.
2025-11-30 01:49:44 from 1 relay(s) View Thread →
Fuck the scams and the shitcoins and fuck the scammers and the shitcoiners. Shitcoins are slavery. nostr:nevent1qqs9fh63c3kc5260kv74vd2g80hyl6cdk9ckympqehsl7mfr2svwfesppemhxue69uhkummn9ekx7mp0qyg8wumn8ghj7mn0wd68ytnddakj7qgkwaehxw309aex2mrp0yhxummnw3ezumn9wshsvmfehc
2025-11-29 15:44:10 from 1 relay(s) View Thread →