Kazuma's avatar
Kazuma
griso135@iris.to
npub1tv8t...d3ur
I am a management engineer who loves Tech ๐Ÿ–ฅ๏ธ and Kaizen ๐Ÿช› Ex football player โšฝ Veronese de sรฒca
Kazuma's avatar
Kazuma 21 hours ago
๐Ÿ”๏ธ Discover the Marvellous "Bus de Refos" & Monte Grappa If you are looking for a hike that perfectly blends wild nature with the echoes of history, this route starting from Valle San Liberale (near Pieve del Grappa) is a must. ๐Ÿ•ณ๏ธ The Marvel: Bus de Refos The "Bus de Refos" (which in local dialect means "Hole of the Breath" or referring to the gushing water) is a majestic karst cave and natural gorge. It serves as the primary source of the Lastego stream. The Sight: Itโ€™s an immense, dark rocky opening in the mountainside. The Magic: During the spring thaw or after heavy rainfall, the cave transforms into a spectacular waterfall as water gushes out of its "mouth" with incredible power. In drier periods, you can walk right up to its entrance to feel the cool, damp breath of the mountain. ๐Ÿฅพ The Hike: History on the Rocks The trail typically follows CAI path 153, often combined into a loop with the famous Sentiero delle Meatte (Paths 151 and 152). WWI History: Youโ€™ll walk along historic mule tracks and through tunnels carved into the rock by soldiers during the Great War. These paths were once vital supply lines and are now panoramic balconies. The Views: On clear days, the view is breathtaking. You can see the entire Venetian plain stretching out beneath you, the winding Piave river, and even the Venice Lagoon shimmering on the horizon. Difficulty: The detour to the Bus de Refos itself is a short and easy 20-minute walk from the parking area at San Liberale, making it accessible for families. However, the full loop up to the ridges (Meatte) is a moderate trek for those who want a full day of adventure. ๐Ÿ’ก Pro Tip: Visit in late spring to see the wildflowers in bloom and witness the "Bus" at its most active with gushing water. #Hiking #Italy #MonteGrappa #Nature #BusDeRefos #Veneto #Outdoors #GreatWarHistory More details here ๐Ÿ‘‡๐Ÿป image
Kazuma's avatar
Kazuma yesterday
๐Ÿฐ DIGITAL SOVEREIGNTY: THE NINJA STACK ๐Ÿฅทโšก They say curiosity killed the cat. In my case, it only killed Google's telemetry. After fortifying my DNS, Passwords, and Bitcoin, I asked: "What's left to reclaim?" The answer: Metadata. ๐Ÿง ๐Ÿง People say: "I have nothing to hide!" I say: Neither do I, but I still close the curtains when Iโ€™m in the shower. ๐Ÿšจ THE METADATA TRAP Convenience is the rope they sell you to hang yourself. Metadata doesn't reveal what you sayโ€”it reveals WHO YOU ARE. ๐Ÿ‘‰ The Social Graph: Call an oncologist 3x a week? They know you're sick before your spouse does. ๐Ÿ‘‰ Guilt by Association: Your calendar and contact list are an "indictment list" for any state that wants to suppress movement. ๐Ÿ‘‰ Thiefโ€™s Paradise: A centralized calendar is just a schedule for when your house is empty. ๐Ÿ ๐Ÿ”“ ๐Ÿ›  THE "GHOST MODE" STACK The umbilical cord has been severed with a katana strike. โœ‚๏ธ๐ŸŒ โœ… THE VAULT (Radicale): Installed on my Acer server (Debian 12). Handles CalDAV/CardDAV on 20MB of RAM. Surgical removal of GNOME bloat and trackers. Itโ€™s a ghost ship now. โœ… THE TRANSPORTER (DAVxโต): The invisible engine on my Pixel 7. Syncs everything via Tailscale. Not a single byte touches Googleโ€™s servers. โœ… THE SHOWCASE: I use Fossify (phone) and Thunderbird (PC) for tracker-free contact and calendar management, while jtx Board handles my tasks and journals. Everything stays local, private, and encrypted. โŒ NEXT NINJA GOALS The fortress is solid, but the war for sovereignty continues: Messaging: Severing the cord from WhatsApp and carriers. Maps: Saying goodbye to Googleโ€™s constant location tracking. In 2026, the question is no longer "who do you trust?" but "why should you give the map of your life to those who want to use it against you?" Digital sovereignty is addictive. Once you start taking your pieces back, you never stop. ๐Ÿ—๏ธ๐Ÿ›ก๏ธ Whatโ€™s your take? Are you still leaving the curtains open? ๐Ÿ‘‡ #DigitalSovereignty #Privacy #SelfHosting #Linux #OpenSource image
Kazuma's avatar
Kazuma 2 days ago
Robot dance Pordenone exhibition #Veneto
Kazuma's avatar
Kazuma 6 days ago
Treviso, road to Valentine's Day #Veneto #valentine #love
Kazuma's avatar
Kazuma 1 week ago
Is it possible for AI Agents to post on nostr and send zaps? #nostr #AI #AIAgents
Kazuma's avatar
Kazuma 2 weeks ago
๐—ช๐—ต๐—ฒ๐—ป ๐—ฆ๐—ฎ๐—บ๐˜€๐˜‚๐—ป๐—ด ๐—ฐ๐—น๐—ผ๐˜€๐—ฒ๐˜€ ๐—ฎ ๐—ฑ๐—ผ๐—ผ๐—ฟ, ๐—”๐——๐—• ๐—ผ๐—ฝ๐—ฒ๐—ป๐˜€ ๐—ฎ ๐—ฐ๐—ผ๐—บ๐—บ๐—ฎ๐—ป๐—ฑ ๐—ฝ๐—ฟ๐—ผ๐—บ๐—ฝ๐˜. Update on mission "Resurrection Galaxy A50": I failed. ๐Ÿ›‘ ๐—”๐—ป๐—ฑ ๐˜๐—ต๐—ฒ๐—ป ๐—œ ๐˜„๐—ผ๐—ป. ๐Ÿ† In my previous post, I was ready for open-heart surgery: Bootloader unlocking, LineageOS (or FreshROM) installation, and saying goodbye to Samsung forever. The reality? The Galaxy A50 is locked down tighter than Fort Knox. Between OEM locks, the risk of losing VoLTE calls, and procedures requiring shamanic rituals to avoid bricking the device, I had to face the truth: I was not ready to change the OS. ๐—˜๐—ป๐—ฑ ๐—ผ๐—ณ ๐˜๐—ต๐—ฒ ๐˜€๐˜๐—ผ๐—ฟ๐˜†? ๐——๐—ฟ๐—ฒ๐—ฎ๐—บ ๐—ผ๐—ป. If you can't replace the engine, you can still strip the chassis until it flies. I discovered you don't need to be a cybersecurity wizard to reclaim your privacy. You just need a USB cable and three letters: ADB. I took the pragmatic (and less destructive) route: Hardcore Debloating. ๐Ÿ”ช ๐—ง๐—ต๐—ฒ ๐—ช๐—ฎ๐—ฟ ๐—•๐˜‚๐—น๐—น๐—ฒ๐˜๐—ถ๐—ป: โŒ I wiped the Play Store, Google Play Services, Gmail, Chrome, and Maps. โŒ I uprooted the entire pre-installed Facebook and Microsoft ecosystem. โŒ Bixby and its friends were kindly escorted to the door. โœจ ๐—ง๐—ต๐—ฒ ๐—ฅ๐—ฒ๐˜€๐˜‚๐—น๐˜ (๐Ÿต๐Ÿฌ% "๐——๐—ฒ-๐—š๐—ผ๐—ผ๐—ด๐—น๐—ฒ๐—ฑ"): The phone is the same, yet not the same. โœ… Launcher: Kvaesitso (Open Source, minimal, search-based). โœ… Browser: Fennec + uBlock Origin (Goodbye ads and tracking). โœ… Store: F-Droid + Aurora Store. โœ… Battery: Lasts so long I actually forget where I put the charger. โœ… Speed: Without 40 background processes mining my data, the old A50 runs like a flagship. The Lesson? You don't always need to "format everything" to innovate. Sometimes you just need to remove the superfluous. My A50 is now a "zombie" device: technically obsolete for the market, but more alive, faster, and private than 99% of phones fresh out of the box. #DigitalMinimalism #DeGoogle #Privacy #Android #ADB #TechSustainability #SamsungA50 #OpenSource image
Kazuma's avatar
Kazuma 2 weeks ago
๐—ง๐—ต๐—ฒ ๐—ฑ๐—ฎ๐˜† ๐—บ๐˜† ๐—ต๐—ฎ๐—ฟ๐—ฑ๐˜„๐—ฎ๐—ฟ๐—ฒ ๐˜๐—ผ๐—น๐—ฑ ๐—บ๐—ฒ: "๐—œ ๐—ฎ๐—บ ๐—ป๐—ผ๐˜ ๐˜†๐—ผ๐˜‚๐—ฟ๐˜€." ๐Ÿ“ฑ๐Ÿšซ Tried to de-Google an old Samsung A50 today. The plan: a 1-hour job to turn it into a privacy-focused node manager (Lightning, DNS, Vault). 10 hours later, Iโ€™m staring at a "Custom Binary Blocked by OEM Lock" screen. ๐—ง๐—ผ๐˜๐—ฎ๐—น ๐—ฑ๐—ฒ๐—ณ๐—ฒ๐—ฎ๐˜. ๐—™๐—ผ๐—ฟ ๐—ป๐—ผ๐˜„. Itโ€™s a brutal reminder of the state of "ownership" in 2026. You pay for the device, you hold the atoms, but the manufacturer owns the logic. We aren't owners; we are just tenants of a supervised license. This is why Freedom Tech and Open Source matter. Itโ€™s not about tinkering; itโ€™s about the right to own the tools we use to navigate the world. If we don't own our hardware, our hardware owns us. ๐˜›๐˜ฉ๐˜ฆ ๐˜ฃ๐˜ข๐˜ต๐˜ต๐˜ญ๐˜ฆ ๐˜ค๐˜ฐ๐˜ฏ๐˜ต๐˜ช๐˜ฏ๐˜ถ๐˜ฆ๐˜ด. ๐˜›๐˜ฉ๐˜ฆ "๐˜ญ๐˜ฐ๐˜ค๐˜ฌ" ๐˜ธ๐˜ฐ๐˜ฏ ๐˜ณ๐˜ฐ๐˜ถ๐˜ฏ๐˜ฅ ๐˜ฐ๐˜ฏ๐˜ฆ, ๐˜ฃ๐˜ถ๐˜ต ๐˜ต๐˜ฉ๐˜ฆ ๐˜ข๐˜ณ๐˜ด๐˜ฆ๐˜ฏ๐˜ข๐˜ญ ๐˜ช๐˜ด ๐˜ด๐˜ต๐˜ช๐˜ญ๐˜ญ ๐˜ง๐˜ถ๐˜ญ๐˜ญ. P.S. If Google/Samsung is a walled garden, Apple is a maximum-security prison with gold-plated bars. Even worse. #DigitalSovereignty #FreedomTechnologies #OpenSource image
Kazuma's avatar
Kazuma 2 weeks ago
In Praise of Brevity: Why Speaking Less (and Better) is a Necessary Revolution In a professional setting, oral communication is often the most inefficient and risky method for exchanging information. We worship โ€œsoft skills,โ€ but we rarely calculate the exorbitant cost of imprecision. We rely on the spoken word every day, yet we overlook its intrinsic flaws. image The Flaws of the Spoken Word Lossy Data Compression: 1. Speakers filter complex thoughts through an increasingly shrinking vocabulary. Listeners then โ€œdecompressโ€ that signal through their own biases and recent experiences. The message received is almost always a corrupted version of the one sent. 2. Verbal Inflation (Verbosity): Many use more words than necessary, generating noise and ambiguity. Worse, they repeat the same concept in different ways, creating contradictions and wasting the time of those who already understood. Itโ€™s not just inefficiency; itโ€™s a lack of respect for othersโ€™ intelligence and time. 3. Lack of Persistence: Conversations are ephemeral. A verbal agreement can be easily forgotten, misrepresented, or disputed, leading to the dreaded โ€œbut I thought you said...โ€ The Alternatives: Formal Languages for High Fidelity If oral communication is a blunt instrument, formal languages are the scalpel. They are designed for precision and high fidelity. 1. Written Language Asynchronous, allowing for meticulous thought construction and revision. It creates a permanent, verifiable record, demanding clarity from the author and reducing ambiguity for the reader. 2. Mathematics E = mc^2 is an immutable truth, understood without ambiguity in every language. There is no margin for interpretation. 3. Programming Languages So precise they can be executed by a machine. They impose absolute logical consistency. This JavaScript is an unequivocal contract. if (user.isLoggedIn) { grantAccess() } image Context Matters Of course, oral communication has its place. Immediacy is powerful for brainstorming or building personal rapport, where the โ€œemotional bandwidthโ€โ€”tone and body languageโ€”is an asset, not a defect. But for critical informationโ€”project requirements, strategic decisions, technical specs, agreements, and promisesโ€”we must be more rigorous. Relying on a chat for a vital task is like using a hammer to drive a screw. It might work, but the result is crude, unreliable, and unprofessional. Final Thought I think we all need to learn to communicate with the precision of a programmer, the clarity of a mathematician, and the persistence of a writer. What do you think? Is verbosity the silent killer of productivity in your workplace? Leave a comment below. #FutureOfWork
Kazuma's avatar
Kazuma 3 weeks ago
Away days #spritz #campari image
Kazuma's avatar
Kazuma 3 weeks ago
In 2026, the question is no longer "Who do you trust?" but "What can you verify yourself?" ๐Ÿ›ก๏ธ๐Ÿฆ image My "Digital Fortress" has reached full maturity. What started as a hardware recovery experiment on a 2017 Acer laptop is now a mission control for digital sovereignty. ๐Ÿš€ But the real lesson of this journey isn't about hardware. Itโ€™s about the power of Open Source. Everything Iโ€™ve built exists thanks to open, transparent, and verifiable code. Itโ€™s the result of thousands of people sharing their knowledge for the benefit of everyone. This is the polar opposite of the Big Tech model. While corporations design systems to decide what we see or do, Open Source gives us the tools to become the sole owners of our digital lives. As a famous cypherpunk saying goes: "If you want to change the world, don't protest. Write code!" Here are the pillars of the Fortress, built on transparency: โœ… Operating System (Debian 12): I stripped away the GUI (GNOME) and went Headless. By removing telemetry and commercial bloat, I reclaimed 1.5GB of RAM and dropped CPU load from 21% to 0.0%. The laptop is now a pure server: cool (39ยฐC), silent, and efficient. โœ… Sovereign Banking (Bitcoin Core & LND): My node has crossed 70% synchronization. Iโ€™m currently validating 2024 blocks, mathematically verifying every transaction via Tor. โ›“๏ธโ€๐Ÿ’ฅ โœ… Privacy Layer (AdGuard & Vaultwarden): I manage my own DNS and passwords in a closed circuit. Thanks to Open Source, my home is tracker-proof, and my keys no longer live on Silicon Valley serversโ€”they reside in an encrypted database on my own 2TB drive. โœ… Control Tower (RTL via Docker): I manage Lightning liquidity with a professional dashboard (Ride The Lightning), accessed securely through a Tailscale tunnel. Zero exposed ports, zero compromises. The Role of AI in this Ecosystem ๐Ÿค–๐Ÿค During this process, Iโ€™ve had a valuable ally: my AI (Google Gemini-CLI) in "Driver" mode. Irony at its best: I used a Big Tech LLM to help me dismantle my dependence on Big Tech. ๐Ÿ˜… Digital sovereignty canโ€™t be bought in a corporate store. It is built by studying, learning, and choosing software that respects the user. Preferably Open Source. 2026 begins with a certainty: the keys to my world are finally, and exclusively, in my hands. ๐Ÿ—๏ธ๐Ÿ›ก๏ธ #Bitcoin #Sovereignty #OpenSource #Debian #SelfHosted #Nostr #Cypherpunk
Kazuma's avatar
Kazuma 3 weeks ago
Holidays status: Sovereignty achieved. ๐Ÿฐ๐Ÿ›ก๏ธโšก๏ธ My 2017 Acer laptop is now a full-blown Ninja Fortress. ๐Ÿฅท 1) GNOME killed, Headless Mode active. 2) RAM optimized, CPU running cool at 43ยฐC. 3) Bitcoin Core @ 70% and climbing (validated 2024!). 4) Lightning Node (LND v20) up and running. 5) Dashboard (RTL) deployed via Docker. 6) ISP is blind. Big Tech is out. My keys, my nodes, my rules. ๐Ÿฆโ›“๏ธโ€๐Ÿ’ฅ Massive shoutout to my AI Mentor (Gemini on Google AI Studio) ๐Ÿค—๐Ÿค– for driving me through the CLI trenches, fixing JSON bugs, and turning my security paranoias into a rock-solid infrastructure. Don't trust, verify. Stay sovereign, plebs. ๐Ÿค™ #bitcoin #lightning #nostr #grownostr #selfhosting #plebs #privacy #linux
Kazuma's avatar
Kazuma 1 month ago
Holidays are over, but the mission has just begun. ๐Ÿฐโšก๏ธ While others were resting, I was busy getting my hands dirtyโ€”studying, learning, and building my own "Invisible" infrastructure on a recycled 2017 Acer laptop. True digital independence is a skill you cannot delegate; otherwise, you'll always choose convenience over freedom. ๐Ÿง ๐Ÿ“š image Here is the progress report on my stealth stack: ๐Ÿ” Identity & Encryption (PGP): Iโ€™ve taken control of my PGP Key Pair. Strategic advantage? Google Drive is now just "dumb storage." Sensitive docs are encrypted locally before upload. Privacy now depends on math, not corporate promises. ๐Ÿ‘ป Privacy Layer & Stealth Stack: Consolidated a local ecosystem to kill tracking and secure metadata: AdGuard Home: Network-wide DNS filtering. dnsleaktest.com confirms my house now communicates exclusively with 2 encrypted/secure DNS servers. My ISP is officially blind. Vaultwarden: Sovereign management of passwords and WebAuthn Passkeys. Syncthing: P2P cloud syncing all my devices without central servers. โ›“๏ธโ€๐Ÿ’ฅ Financial Sovereignty: With a new 2TB SSD installed, Iโ€™m finally in the game. Currently at 15% of the Bitcoin blockchain sync. Once finished, Iโ€™ll fire up the Lightning node and look into setting up a WatchTower. ๐Ÿค– The AI Mentor: Ironically, I made heavy use of Google Geminiโ€”a centralized and "noisy" LLM ๐Ÿ˜…. However, thanks to deep learning, I was able to quickly source info on what I was putting "under the hood." I used AI as a driver to validate my hypotheses on the robustness and invisibility of the solutions I was deploying. ๐Ÿค The lesson from these holidays? Stop being a passive user and start being an owner. The road to 100% is long, but the view is beautiful. Goal for 2026: Dive even deeper. ๐Ÿšช๐Ÿšซ #DigitalSovereignty #PGP #SelfHosting #Privacy #Bitcoin #LightningNetwork #Linux #Nostr #Pleb #StackingKnowledge image
Kazuma's avatar
Kazuma 1 month ago
Percy and Athos โค๏ธโค๏ธ image
Kazuma's avatar
Kazuma 1 month ago
Se ho ben capito, questa รจ l'Operation Red Sunset: 1) Bitmain (cinese) costruisce ASIC per mining Bitcoin 2) Tali ASIC (Ant miner) contengono backdoor che permettono lo spegnimento remoto 3) Uno spegnimento simultaneo di n kWh puรฒ causare un eccesso di energia elettrica nella rete, quindi un sovraccarico, quindi un blackout 4) C'รจ una mining farm vicina ad una importante base militare in Wyoming, stracolma di dispositivi Bitmain 5) Molto dei dispositivi Bitmain in Wyoming sono di proprietร  della ABTC Corporation, fondata da 2 figli di Trump 6) ABTC ha comprato 314mln$ di dispositivi da Bitmain in agosto 2025, usando Bitcoin come collaterale 7) I fatti dall'1 al 6 sono verificati Grazie @Guybrush e @Rikki del Bitcoin Italia Podcast
Kazuma's avatar
Kazuma 1 month ago
Sunday is #pizza and German #beer image
Kazuma's avatar
Kazuma 1 month ago
Eremo Monte Ricco, colli euganei, #Padova #Padua #Veneto
โ†‘