Mark Zuckerberg and Facebook represent the most disturbing intersection of consumer tech and intelligence agencies. The official version cites a network created in a Harvard dorm. However, the timeline suggests something more complex.
Mark Zuckerberg and Facebook represent the most disturbing intersection of consumer tech and intelligence agencies. The official version cites a network created in a Harvard dorm. However, the timeline suggests something more complex.
Crystal Castles - Year Of Silence
test
https://image.nostr.build/767b824e059d18bfebc185e4fb14074eb60cc2576f305301316f835bba1ca589.jpg
This case illustrates how European speech laws increasingly rely on financial pressure rather than territorial jurisdiction. By conditioning access to users on compliance with national speech controls, governments create incentives for platforms to preemptively restrict expression to avoid regulatory conflict.
The result is a system where legal exposure flows from audience size rather than conduct within a country.
Germany’s approach also reveals the paper trail behind modern censorship enforcement. The fine stems not from a specific post or statement, but from alleged failure to comply with aspects of NetzDG. That procedural hook enables broader regulatory reach, transforming administrative requirements into a mechanism for speech governance.
🤫
The solution to collectivist punishment is to have two realms. The first is the totalitarian realm of politics, of violence, of coercion, of theft, of intimidation, and we have the second realm of view of free interactions, voluntary choices, collaboration, and production. It is always possible to have one foot in each of these realms.
The solution to collectivist punishment is to have two realms. The first is the totalitarian realm of politics, of violence, of coercion, of theft, of intimidation, and we have the second realm of view of free interactions, voluntary choices, collaboration, and production. It is always possible to have one foot in each of these realms.
I was recommended an ai one so bad that not only did it not have patterns in it, the creator left an error message on one of the pages.
My kindle and my regular book feed. I was looking at crochet books the other day and I was recommended an ai one so bad that not only did it not have patterns in it, the creator left an error message on one of the pages.
nearly one-third of all internet traffic now comes from bots
According to Cloudflare, nearly one-third of all internet traffic now comes from bots. These are the sophisticated digital vacuum cleaners from companies like OpenAI and Anthropic that suck up website data to train their AI models.
All this comes as OpenAI’s Sam Altman somehow just started realizing that a lot of the people on the internet might be fake. In fact, entire portions of the internet are comprised of bots communicating with other bots, with little to no human involvement in any of it.
I think that we do need to shift that conversation away from censorship resistance and talk more about the things that you can only do on Nostr, like getting zaps.”
“For White Noise to even be able to credibly compete even closely with Signal, WhatsApp, or Telegram, we've got to build a lot of things, and we've got to do it really well. I think that we do need to shift that conversation away from censorship resistance and talk more about the things that you can only do on Nostr, like getting zaps.”
White Noise project aims for Signal-level encryption capabilities and privacy, but on a resilient open protocol where the servers themselves can be swapped out.
Gardner’s White Noise project aims for Signal-level encryption capabilities and privacy, but on a resilient open protocol where the servers themselves can be swapped out.
For builders, the lesson is structural: design for a world where you are not around to run it, distribute through channels no single entity controls, encrypt so censors cannot identify it, and resist the centralization that makes all other defenses irrelevant.
For builders, the lesson is structural: design for a world where you are not around to run it, distribute through channels no single entity controls, encrypt so censors cannot identify it, and resist the centralization that makes all other defenses irrelevant.
For builders, the lesson is structural: design for a world where you are not around to run it, distribute through channels no single entity controls, encrypt so censors cannot identify it, and resist the centralization that makes all other defenses irrelevant.
For builders, the lesson is structural: design for a world where you are not around to run it, distribute through channels no single entity controls, encrypt so censors cannot identify it, and resist the centralization that makes all other defenses irrelevant.
For builders, the lesson is structural: design for a world where you are not around to run it, distribute through channels no single entity controls, encrypt so censors cannot identify it, and resist the centralization that makes all other defenses irrelevant.
For builders, the lesson is structural: design for a world where you are not around to run it, distribute through channels no single entity controls, encrypt so censors cannot identify it, and resist the centralization that makes all other defenses irrelevant.
For builders, the lesson is structural: design for a world where you are not around to run it, distribute through channels no single entity controls, encrypt so censors cannot identify it, and resist the centralization that makes all other defenses irrelevant.
The humans who build these protocols pay real costs: years behind bars and millions in forfeiture. The code they write pays nothing. It copies itself across every willing machine on the network, indifferent to the legal theories arrayed against its creators. The state can punish the hand that types, but it has never succeeded in erasing what was typed. For builders, the lesson is structural: design for a world where you are not around to run it, distribute through channels no single entity controls, encrypt so censors cannot identify it, and resist the centralization that makes all other defenses irrelevant.
For builders, the lesson is structural: design for a world where you are not around to run it, distribute through channels no single entity controls, encrypt so censors cannot identify it, and resist the centralization that makes all other defenses irrelevant.
The humans who build these protocols pay real costs: years behind bars and millions in forfeiture. The code they write pays nothing. It copies itself across every willing machine on the network, indifferent to the legal theories arrayed against its creators. The state can punish the hand that types, but it has never succeeded in erasing what was typed. For builders, the lesson is structural: design for a world where you are not around to run it, distribute through channels no single entity controls, encrypt so censors cannot identify it, and resist the centralization that makes all other defenses irrelevant.
For builders, the lesson is structural: design for a world where you are not around to run it, distribute through channels no single entity controls, encrypt so censors cannot identify it, and resist the centralization that makes all other defenses irrelevant.
The humans who build these protocols pay real costs: years behind bars and millions in forfeiture. The code they write pays nothing. It copies itself across every willing machine on the network, indifferent to the legal theories arrayed against its creators. The state can punish the hand that types, but it has never succeeded in erasing what was typed. For builders, the lesson is structural: design for a world where you are not around to run it, distribute through channels no single entity controls, encrypt so censors cannot identify it, and resist the centralization that makes all other defenses irrelevant.
For builders, the lesson is structural: design for a world where you are not around to run it, distribute through channels no single entity controls, encrypt so censors cannot identify it, and resist the centralization that makes all other defenses irrelevant.
The humans who build these protocols pay real costs: years behind bars and millions in forfeiture. The code they write pays nothing. It copies itself across every willing machine on the network, indifferent to the legal theories arrayed against its creators. The state can punish the hand that types, but it has never succeeded in erasing what was typed. For builders, the lesson is structural: design for a world where you are not around to run it, distribute through channels no single entity controls, encrypt so censors cannot identify it, and resist the centralization that makes all other defenses irrelevant.
For builders, the lesson is structural: design for a world where you are not around to run it, distribute through channels no single entity controls, encrypt so censors cannot identify it, and resist the centralization that makes all other defenses irrelevant.
The humans who build these protocols pay real costs: years behind bars and millions in forfeiture. The code they write pays nothing. It copies itself across every willing machine on the network, indifferent to the legal theories arrayed against its creators. The state can punish the hand that types, but it has never succeeded in erasing what was typed. For builders, the lesson is structural: design for a world where you are not around to run it, distribute through channels no single entity controls, encrypt so censors cannot identify it, and resist the centralization that makes all other defenses irrelevant.
For builders, the lesson is structural: design for a world where you are not around to run it, distribute through channels no single entity controls, encrypt so censors cannot identify it, and resist the centralization that makes all other defenses irrelevant.
The humans who build these protocols pay real costs: years behind bars and millions in forfeiture. The code they write pays nothing. It copies itself across every willing machine on the network, indifferent to the legal theories arrayed against its creators. The state can punish the hand that types, but it has never succeeded in erasing what was typed. For builders, the lesson is structural: design for a world where you are not around to run it, distribute through channels no single entity controls, encrypt so censors cannot identify it, and resist the centralization that makes all other defenses irrelevant.
For builders, the lesson is structural: design for a world where you are not around to run it, distribute through channels no single entity controls, encrypt so censors cannot identify it, and resist the centralization that makes all other defenses irrelevant.
The humans who build these protocols pay real costs: years behind bars and millions in forfeiture. The code they write pays nothing. It copies itself across every willing machine on the network, indifferent to the legal theories arrayed against its creators. The state can punish the hand that types, but it has never succeeded in erasing what was typed. For builders, the lesson is structural: design for a world where you are not around to run it, distribute through channels no single entity controls, encrypt so censors cannot identify it, and resist the centralization that makes all other defenses irrelevant.
For builders, the lesson is structural: design for a world where you are not around to run it, distribute through channels no single entity controls, encrypt so censors cannot identify it, and resist the centralization that makes all other defenses irrelevant.
The humans who build these protocols pay real costs: years behind bars and millions in forfeiture. The code they write pays nothing. It copies itself across every willing machine on the network, indifferent to the legal theories arrayed against its creators. The state can punish the hand that types, but it has never succeeded in erasing what was typed. For builders, the lesson is structural: design for a world where you are not around to run it, distribute through channels no single entity controls, encrypt so censors cannot identify it, and resist the centralization that makes all other defenses irrelevant.
For builders, the lesson is structural: design for a world where you are not around to run it, distribute through channels no single entity controls, encrypt so censors cannot identify it, and resist the centralization that makes all other defenses irrelevant.
The humans who build these protocols pay real costs: years behind bars and millions in forfeiture. The code they write pays nothing. It copies itself across every willing machine on the network, indifferent to the legal theories arrayed against its creators. The state can punish the hand that types, but it has never succeeded in erasing what was typed. For builders, the lesson is structural: design for a world where you are not around to run it, distribute through channels no single entity controls, encrypt so censors cannot identify it, and resist the centralization that makes all other defenses irrelevant.
That which is born of the flesh is flesh; and that which is born of the Spirit is spirit.
That which is born of the flesh is flesh; and that which is born of the Spirit is spirit.
That which is born of the flesh is flesh; and that which is born of the Spirit is spirit.
That which is born of the flesh is flesh; and that which is born of the Spirit is spirit.
For God so loved the world, that he gave his only begotten Son, that whosoever believeth in him should not perish, but have everlasting life.
For God so loved the world, that he gave his only begotten Son, that whosoever believeth in him should not perish, but have everlasting life.
🙏🏻
Jesus
Jesus answered, Verily, verily, I say unto thee, Except a man be born of water and of the Spirit, he cannot enter into the kingdom of God.
test
Jesus
Jesus answered, Verily, verily, I say unto thee, Except a man be born of water and of the Spirit, he cannot enter into the kingdom of God.
test
For God so loved the world, that he gave his only begotten Son, that whosoever believeth in him should not perish, but have everlasting life.
For God so loved the world, that he gave his only begotten Son, that whosoever believeth in him should not perish, but have everlasting life.
test
The return of the Great British Beaver
***Japanese Scooter game show***
What makes the hamlet so eccentric is its world-famous ***Gopher Hole Museum.*** According to its website, the museum features over 80 taxidermied “gophers”
https://www.nasa.gov/wp-content/uploads/2026/02/sdo-02-04-26-1216ut-x4-131-171-v3.jpg
The Stoic Investor does not build wealth to display it; he builds wealth to defend himself against it. The “Citadel” is the strategic allocation of capital toward a specific end: Invulnerability. It is often vulgarly referred to as “F*ck You Money,”
The Stoic Investor does not build wealth to display it; he builds wealth to defend himself against it. The “Citadel” is the strategic allocation of capital toward a specific end: Invulnerability. It is often vulgarly referred to as “F*ck You Money,” but in the halls of high finance and philosophy, we view it as the Capitalization of Autonomy.
The Stoic Investor does not build wealth to display it; he builds wealth to defend himself against it. The “Citadel” is the strategic allocation of capital toward a specific end: Invulnerability. It is often vulgarly referred to as “F*ck You Money,”
The Stoic Investor does not build wealth to display it; he builds wealth to defend himself against it. The “Citadel” is the strategic allocation of capital toward a specific end: Invulnerability. It is often vulgarly referred to as “F*ck You Money,” but in the halls of high finance and philosophy, we view it as the Capitalization of Autonomy.
Unser heutiges Geldsystem basiert darauf, dass immer mehr Geld entsteht. Das ist für viele selbstverständlich geworden, hat aber einen Nebeneffekt: Erspartes verliert mit der Zeit an Kaufkraft. Was heute noch reicht, kann in 20 oder 30 Jahren deutlich weniger wert sein.
Unser heutiges Geldsystem basiert darauf, dass immer mehr Geld entsteht. Das ist für viele selbstverständlich geworden, hat aber einen Nebeneffekt: Erspartes verliert mit der Zeit an Kaufkraft. Was heute noch reicht, kann in 20 oder 30 Jahren deutlich weniger wert sein.
Opus is usually $5/million input and $25/million output. The new fast mode is $30/million input and $150/million output!
The problem arises when the input graph is corrupted.
The problem arises when the input graph is corrupted. Ranking algorithms are, for the most part, agnostic regarding the genuineness of trust. They faithfully process the signal they receive. If a malicious node (Node_X) is artificially connected to many nodes with high authority (even if that authority is itself fraudulently built), the algorithm will mathematically calculate that Node_X is important and trustworthy. Conversely, if a target node (Node_Y) is attacked by a coordinated network of bots (which the algorithm perceives as nodes with some authority because they are integrated into the corrupted WoT), its authority score will plummet.
NIP-05 verification helps people find you on Nostr. But most verification services either:
Cost money to host (VPS, database)
Require manual administration
Don't accept Bitcoin
I wanted a service that runs for $0/month, accepts Lightning payments, and is fully automated.
NIP-05 verification helps people find you on Nostr. But most verification services either:
Ski jumping faces penis-enlargement doping probe
Southern Alberta’s unusually warm February continued on Thursday.
Environment Canada says heat records were broken in 26 communities across the province on Feb. 5, 2026.
"The record label went into a panic," Corgan recalls in a new interview about the making of the double album Mellon Collie and the Infinite Sadness, "They told me I was insane – things like 'career suicide'."
Jeder Mensch gehört sich selbst.
Jeder Mensch gehört sich selbst.
Thailand’s central bank is increasing surveillance and control over cash transactions after flagging two large cash withdrawals of more than $6 million each. The transactions came days before national elections on Feb. 8, as the country’s electoral commission examines allegations of vote buying.
Prism is an Android intent handler for the Nostr protocol. It bridges OS-level ACTION_SEND and ACTION_PROCESS_TEXT intents to the decentralized web.
Vermin Supreme: When I'm President Everyone Gets A Free Pony
Anna’s Archive has faced a barrage of domain takedowns in recent weeks, after Spotify and several major record labels filed a high-profile lawsuit.
It’s an incredible time to be alive.
It’s an incredible time to be alive.
It’s an incredible time to be alive.
It’s an incredible time to be alive.
Open the Local Proxy tab and click “Start Proxy.”
I can't seem to find that. Am I stupid?
Blur - Song 2, but every "woohoo" is done by Mario