This is interesting
They’re artificially re-flooding wetlands cut off by the building of a dam several decades ago as part of a habitat restoration project
Freedom Curious
npub1828n...ylrm
Snowden to talk at #Bitcoin Amsterdam
"#Bitcoin is free money... When I think about liberty, that's what this is all about. It's freedom from permission"


Bitcoin Magazine
Whistleblower Edward Snowden To Headline The Bitcoin Amsterdam Conference
The cybersecurity expert is set to share his insights on the intersection of digital currency, privacy, and the future of financial freedom.

View quoted note →
This is too real
View quoted note →
This makes me want to vomit 🤮
They aren’t even denying they’re trying to build a huge “financial and identity" database.
I’m not religious at all, but all I can think is
Step Right Up and get your
Mark of the Beast
View quoted note →
It’s delightful to see how quickly this bounty got implemented! I hope to hear more about this as it develops.
Found this intriguing paper on #privacy. I only read the abstract and TOC so far, I may read more later.
https://www.reddit.com/r/privacy/comments/14ykp0a/public_discourse_on_privacy_suffers_from_a_narrow/
But I like the summary in one of the Reddit comments:
[Begin excerpt, edited for readability]
Might be helpful to reword these for different audiences.
Consuming data for personal gratification – Section 2.1
=
Bad people get off on reading or seeing your private stuff
Generating coercive incentives – Section 2.2
=
Bad people can use your private info to try and trick you
Compliance monitoring – Section 2.3
=
People will spy on you to make sure you are doing what THEY want
Discrediting – Section 2.4
=
Bad people will use your info against you to make you look stupid, or make you look like a liar
Assessment and discrimination – Section 2.5
=
Bad people will use your info to see if you 'measure up' to their standards, or may be racist and use your info against you
Identification of personal weak spots – Section 2.6
=
Bad people will steal your info and use it to find a weakness you might have and use it against you
Personalized persuasion – Section 2.7
=
Bad people will spy on you to get information to help them manipulate you into what they want
Locating and physically accessing the data subject – Section 2.9
=
Bad people will spy on you to find out where you are, were you go, your routines, etc.
Contacting the data subject – Section 2.8
=
Bad people will spy on you to send you scam calls or spam you
Accessing protected domains or assets – Section 2.10
=
Bad people will spy on you to learn about shit you own that they can steal.
Reacting strategically to actions or plans of the data subject – Section 2.11
=
bad people will CONTINUE to spy on you, so they can change plans to scam you better.
[end excerpt]

