+- eab0e756d32b -- 2d --------------------------------------------------------------------------------------------[...]+ | | | I had a great uncle named Hugh. | | | | When he turned 18 in 1943, he decided to enlist in the military and go fight Nazis in WW2. As one does. | | | | In early 1944, he found himself as the radioman on a B-17 bomber, as the Americans upped their bombing raids on | | Berlin. Their bomber was attacked by German pilots, heavily damaged, and the pilot said they gotta parachute out, | | it's going down. | | | | So, Hugh funds himself parachuting over German countryside from a destroyed bomber. | | | | Early in the war, it was relatively uncommon for American/British/German pilots to shoot at enemy parachuting | | pilots. It was considered dishonorable. However, when the Americans/British really upped the bombing over Germany, | | and the war was increasingly turning against Germany, the German pilots increased their rate of shooting at | | parachuting American/British pilots. Their cities had been disastrously struck, some of them lost friends/family in | | the bombings, so they were more likely to just finish off downed enemy pilots. | | | | Hugh, as he parachuted down, was terrified at that thought, expecting that the German pilot who destroyed his bomber | | would finish him off. He watched as the pilot performed a wide arc and come back around, and he's like, "oh shit oh | | shit oh shit oh shit," but then the German pilot flew by him and saluted, and left. Trolled him but let him live, | | basically. Showed him he could've done it, but didn't. | | | | So Hugh lands in a tree in German farmland. He cut the parachute and fell to the ground, fracturing three vertebrae. | | So he's 19, injured, and realizes he doesn't know shit about geography, but decides he'll try to make his way in the | | general direction of Switzerland. | | | | He spends a week sneaking around the farmland, injured, and eventually gets severely dehydrated. So he sneaks up to | | a well to get a drink, and comes across a 10-year old German girl, who stares at him wide-eyed since he's a | | disheveled soldier-looking foreigner. He panics, and has absolutely no idea how Germans greet each other. So he does | | an enthusiastic Nazi salute and yells "Sieg Heil!" which of course is *not* how most Germans greet each other. The | | girl screams and runs away, so he's like, "oh shit" and goes to hide in a tool shed. | | | | The townsfolk come out and find him, capture him, and turn him over to the authorities. He gets sent to a prisoner | | of war camp for the next 16 months. Him and his fellow detainees circulated a newsletter within the camp at one | | point, and formed a music band out of like discarded cans and pots and stuff. Toward the end it got trough, because | | as Allied forces took more and more land, the outer prison camps would do forced marches where the prisoners would | | have to walk to a deeper camp, while malnourished, and if they got exhausted and couldn't go on, they'd be shot. So | | he had to do two of those forced walks, but eventually got rescued by Allied forces. | | | | Came back to the US, used his GI bill to go to college, and became a social worker at a hospital. Really quiet, calm | | guy. Most people didn't know he had this crazy story arc. | | | | Anyway, that's the post. | | | +-- reply --------------------------------------------------------------------------------------------------------- ---+I had a great uncle named Hugh. When he turned 18 in 1943, he decided to enlist in the military and go fight Nazis in WW2. As one does. In early 1944, he found himself as the radioman on a B-17 bomber, as the Americans upped their bombing raids on Berlin. Their bomber was attacked by German pilots, heavily damaged, and the pilot said they gotta parachute out, it's going down. So, Hugh funds himself parachuting over German countryside from a destroyed bomber. Early in the war, it was relatively uncommon for American/British/German pilots to shoot at enemy parachuting pilots. It was considered dishonorable. However, when the Americans/British really upped the bombing over Germany, and the war was increasingly turning against Germany, the German pilots increased their rate of shooting at parachuting American/British pilots. Their cities had been disastrously struck, some of them lost friends/family in the bombings, so they were more likely to just finish off downed enemy pilots. Hugh, as he parachuted down, was terrified at that thought, expecting that the German pilot who destroyed his bomber would finish him off. He watched as the pilot performed a wide arc and come back around, and he's like, "oh shit oh shit oh shit oh shit," but then the German pilot flew by him and saluted, and left. Trolled him but let him live, basically. Showed him he could've done it, but didn't. So Hugh lands in a tree in German farmland. He cut the parachute and fell to the ground, fracturing three vertebrae. So he's 19, injured, and realizes he doesn't know shit about geography, but decides he'll try to make his way in the general direction of Switzerland. He spends a week sneaking around the farmland, injured, and eventually gets severely dehydrated. So he sneaks up to a well to get a drink, and comes across a 10-year old German girl, who stares at him wide-eyed since he's a disheveled soldier-looking foreigner. He panics, and has absolutely no idea how Germans greet each other. So he does an enthusiastic Nazi salute and yells "Sieg Heil!" which of course is *not* how most Germans greet each other. The girl screams and runs away, so he's like, "oh shit" and goes to hide in a tool shed. The townsfolk come out and find him, capture him, and turn him over to the authorities. He gets sent to a prisoner of war camp for the next 16 months. Him and his fellow detainees circulated a newsletter within the camp at one point, and formed a music band out of like discarded cans and pots and stuff. Toward the end it got trough, because as Allied forces took more and more land, the outer prison camps would do forced marches where the prisoners would have to walk to a deeper camp, while malnourished, and if they got exhausted and couldn't go on, they'd be shot. So he had to do two of those forced walks, but eventually got rescued by Allied forces. Came back to the US, used his GI bill to go to college, and became a social worker at a hospital. Really quiet, calm guy. Most people didn't know he had this crazy story arc. Anyway, that's the post.
+------------------------------------------------------------------------------+
Nostr Feed
Showing notes from your follow list.
+------------------------------------------------------------------------------+
+- cbc5ef6b01cb -- 14d -------------------------------------------------------------------------------------------[...]+ | | | really excited to be launching the first ever scholarship fund dedicated to supporting schools that are up-skilling | | their teachers and educators to *really* understand bitcoin 🚀 Americans can now direct a portion of their tax bill | | to funding primary + secondary education -- i really hope that the @64cc22f91e49 is going to be a great method to | | orange pill to so many schools!! | | | | note:99cc0b56…7502 | | | +-- reply --------------------------------------------------------------------------------------------------------- ---+really excited to be launching the first ever scholarship fund dedicated to supporting schools that are up-skilling their teachers and educators to *really* understand bitcoin 🚀 Americans can now direct a portion of their tax bill to funding primary + secondary education -- i really hope that the @64cc22f91e49 is going to be a great method to orange pill to so many schools!! note:99cc0b56…7502
+- 666939749f1e -- 14d -------------------------------------------------------------------------------------------[...]+ | | | Merci d'informer sur Nostr ! On va essayer de relayer les liens Nostr directement | | | +-- reply --------------------------------------------------------------------------------------------------------- ---+Merci d'informer sur Nostr ! On va essayer de relayer les liens Nostr directement
+- 666939749f1e -- 14d -------------------------------------------------------------------------------------------[...]+ | | | {"id":"d39391499c1cc116def849c8bb9d05ad5b0707bab10b51651e756fd35a4205dc","pubkey":"d974c6d79bec644a486be679d94108249 | | 31d85d2f8aa3c1c476522cb58da89bd","created_at":1776246292,"kind":1,"tags":[["alt","A short note: ⚠️🇪🇺 L’European Age | | Verification App est | | officie..."],["t","UE"],["t","ue"],["t","Privacy"],["t","privacy"],["r","https://npub1m96vd4uma3jy5jrtueuajsggyjf3mp | | wjlz4rc8z8v53vkkx63x7samnfcg.blossom.band/0df2e3b3e4821a70e970c5bc024e8a4fadce35b80c9271c71510cd37ee2b9d14.mp4"],["i | | meta","url | | https://npub1m96vd4uma3jy5jrtueuajsggyjf3mpwjlz4rc8z8v53vkkx63x7samnfcg.blossom.band/0df2e3b3e4821a70e970c5bc024e8a4 | | fadce35b80c9271c71510cd37ee2b9d14.mp4","x 0df2e3b3e4821a70e970c5bc024e8a4fadce35b80c9271c71510cd37ee2b9d14","size | | 923146","m video/mp4","dim 1080x1350","blurhash | | _LBN5A00-:%MD%%MWB00~pIVIU%MM{fk-;M{RkxuRjWCofxtIV%LM{a}t7WBIU%2M{xtayWVWCWEj@ofRkt6WBofxtNGofjsWCoeWBWCofayoMWBofWC | | R*t7WBayofWBof","ox 0df2e3b3e4821a70e970c5bc024e8a4fadce35b80c9271c71510cd37ee2b9d14","alt | | "],["client","Amethyst"]],"content":"⚠️🇪🇺 L’European Age Verification App est officiellement prête à l’emploi | | !!\nhttps://npub1m96vd4uma3jy5jrtueuajsggyjf3mpwjlz4rc8z8v53vkkx63x7samnfcg.blossom.band/0df2e3b3e4821a70e970c5bc024 | | e8a4fadce35b80c9271c71510cd37ee2b9d14.mp4\n\n📱 Officiellement pour \"protéger les enfants\" (porn, jeux d’argent, | | algorithmes addictifs…)....\n\nUne app UE gratuite, open source et \"privacy-by-design\" qui délivre une simple | | preuve d’âge anonyme sans aucune autre donnée personnelle, sans traçabilité d'après Ursula von der leyen 🤔\n\n➡️ À | | intégrer par toutes les plateformes (réseaux sociaux, sites adultes…)\n\n➡️ Liée directement à l’EUDI Wallet | | (deadline fin 2026) et au DSA déjà en vigueur\n\nTests pilotes en cours dans 5 pays, déploiement imminent\n\n✅ Fin | | de l’anonymat en ligne pour les adultes, preuve d’âge obligatoire pour naviguer librement, contrôle centralisé par | | Bruxelles sur qui voit quoi sur internet… le tout vendu comme une \"solution parentale\"... mais l'objectif est | | clairement le traçage et le classement social !!\n\nTout avance très vite en ce moment, souvent encore une fois sans | | débat public massif 🤔\n\nNous regardons sagement notre liberté disparaître 💢\n\n#UE #Privacy | | 🪦","sig":"4ef20693ce0a269f300057b02d4282e6c4ca2453f067754024871f113a59e7ef892f324d35fc304afa73f123d064400e00eac5e5f8 | | ef60c6b936c1e2344420d7"} | | | +-- reply --------------------------------------------------------------------------------------------------------- ---+{"id":"d39391499c1cc116def849c8bb9d05ad5b0707bab10b51651e756fd35a4205dc","pubkey":"d974c6d79bec644a486be679d9410824931d85d2f8aa3c1c476522cb58da89bd","created_at":1776246292,"kind":1,"tags":[["alt","A short note: ⚠️🇪🇺 L’European Age Verification App est officie..."],["t","UE"],["t","ue"],["t","Privacy"],["t","privacy"],["r","https://npub1m96vd4uma3jy5jrtueuajsggyjf3mpwjlz4rc8z8v53vkkx63x7samnfcg.blossom.band/0df2e3b3e4821a70e970c5bc024e8a4fadce35b80c9271c71510cd37ee2b9d14.mp4"],["imeta","url https://npub1m96vd4uma3jy5jrtueuajsggyjf3mpwjlz4rc8z8v53vkkx63x7samnfcg.blossom.band/0df2e3b3e4821a70e970c5bc024e8a4fadce35b80c9271c71510cd37ee2b9d14.mp4","x 0df2e3b3e4821a70e970c5bc024e8a4fadce35b80c9271c71510cd37ee2b9d14","size 923146","m video/mp4","dim 1080x1350","blurhash _LBN5A00-:%MD%%MWB00~pIVIU%MM{fk-;M{RkxuRjWCofxtIV%LM{a}t7WBIU%2M{xtayWVWCWEj@ofRkt6WBofxtNGofjsWCoeWBWCofayoMWBofWCR*t7WBayofWBof","ox 0df2e3b3e4821a70e970c5bc024e8a4fadce35b80c9271c71510cd37ee2b9d14","alt "],["client","Amethyst"]],"content":"⚠️🇪🇺 L’European Age Verification App est officiellement prête à l’emploi !!\nhttps://npub1m96vd4uma3jy5jrtueuajsggyjf3mpwjlz4rc8z8v53vkkx63x7samnfcg.blossom.band/0df2e3b3e4821a70e970c5bc024e8a4fadce35b80c9271c71510cd37ee2b9d14.mp4\n\n📱 Officiellement pour \"protéger les enfants\" (porn, jeux d’argent, algorithmes addictifs…)....\n\nUne app UE gratuite, open source et \"privacy-by-design\" qui délivre une simple preuve d’âge anonyme sans aucune autre donnée personnelle, sans traçabilité d'après Ursula von der leyen 🤔\n\n➡️ À intégrer par toutes les plateformes (réseaux sociaux, sites adultes…)\n\n➡️ Liée directement à l’EUDI Wallet (deadline fin 2026) et au DSA déjà en vigueur\n\nTests pilotes en cours dans 5 pays, déploiement imminent\n\n✅ Fin de l’anonymat en ligne pour les adultes, preuve d’âge obligatoire pour naviguer librement, contrôle centralisé par Bruxelles sur qui voit quoi sur internet… le tout vendu comme une \"solution parentale\"... mais l'objectif est clairement le traçage et le classement social !!\n\nTout avance très vite en ce moment, souvent encore une fois sans débat public massif 🤔\n\nNous regardons sagement notre liberté disparaître 💢\n\n#UE #Privacy 🪦","sig":"4ef20693ce0a269f300057b02d4282e6c4ca2453f067754024871f113a59e7ef892f324d35fc304afa73f123d064400e00eac5e5f8ef60c6b936c1e2344420d7"} [reposted note unavailable on current relays]
+- eab0e756d32b -- 18d -------------------------------------------------------------------------------------------[...]+ | | | My half-hour animated Broken Money video now has 500k views on YouTube. Coming up on its two-year anniversary: | | | | https://youtu.be/jk_HWmmwiAs | | | +-- reply --------------------------------------------------------------------------------------------------------- ---+My half-hour animated Broken Money video now has 500k views on YouTube. Coming up on its two-year anniversary: https://youtu.be/jk_HWmmwiAs
+- eab0e756d32b -- 21d -------------------------------------------------------------------------------------------[...]+ | | | Really sorry to hear that. ❤️ | | | | Hopefully the pain gets under control soon and that can start a flywheel of felling better and more positive. | | | | So many people are sending well-wishes, and I wish we could all take a little fraction of the pain to make it go | | away. 😔 | | | +-- reply --------------------------------------------------------------------------------------------------------- ---+Really sorry to hear that. ❤️ Hopefully the pain gets under control soon and that can start a flywheel of felling better and more positive. So many people are sending well-wishes, and I wish we could all take a little fraction of the pain to make it go away. 😔
+- 82341f882b6e -- 23d -------------------------------------------------------------------------------------------[...]+ | | | same | | | +-- reply --------------------------------------------------------------------------------------------------------- ---+same
+- 82341f882b6e -- 23d -------------------------------------------------------------------------------------------[...]+ | | | yes, odd | | | +-- reply --------------------------------------------------------------------------------------------------------- ---+yes, odd
+- 82341f882b6e -- 23d -------------------------------------------------------------------------------------------[...]+ | | | bitchat pulled from china app store | | https://blossom.primal.net/6d1f5304a85f6ccd6af01a7db43da50688636822df7a38af31ef5f66457c6b77.png | | | +-- reply --------------------------------------------------------------------------------------------------------- ---+bitchat pulled from china app store https://blossom.primal.net/6d1f5304a85f6ccd6af01a7db43da50688636822df7a38af31ef5f66457c6b77.png
+- eab0e756d32b -- 1mo -------------------------------------------------------------------------------------------[...]+ | | | Almost nothing in macro currently matters until the Strait of Hormuz opens. | | | | That’s the macro. It’s a binary analysis similar to Covid 19. | | | +-- reply --------------------------------------------------------------------------------------------------------- ---+Almost nothing in macro currently matters until the Strait of Hormuz opens. That’s the macro. It’s a binary analysis similar to Covid 19.
+- eab0e756d32b -- 1mo -------------------------------------------------------------------------------------------[...]+ | | | https://blossom.primal.net/bb6ae9c98bf0e9fe2945009a199143c699711278ea64de069705e75b4454936e.jpg | | | +-- reply --------------------------------------------------------------------------------------------------------- ---+https://blossom.primal.net/bb6ae9c98bf0e9fe2945009a199143c699711278ea64de069705e75b4454936e.jpg
+- 8f6568deec01 -- 1mo -------------------------------------------------------------------------------------------[...]+ | | | We should ask other question: are we ready to defend our privacy and rights as long as it needs in this turbulent | | world? | | | +-- reply --------------------------------------------------------------------------------------------------------- ---+We should ask other question: are we ready to defend our privacy and rights as long as it needs in this turbulent world?
+- eab0e756d32b -- 1mo -------------------------------------------------------------------------------------------[...]+ | | | You know what, so far it’s not going that badly so far. | | note:022c0f15…6815 | | | +-- reply --------------------------------------------------------------------------------------------------------- ---+You know what, so far it’s not going that badly so far. note:022c0f15…6815
+- eab0e756d32b -- 1mo -------------------------------------------------------------------------------------------[...]+ | | | Really not looking forward to flying today. | | | +-- reply --------------------------------------------------------------------------------------------------------- ---+Really not looking forward to flying today.
+- eab0e756d32b -- 1mo -------------------------------------------------------------------------------------------[...]+ | | | Last night when I finished work and joined my husband for movie night, he instead showed me a video about Newcomb’s | | paradox and we spent two hours debating it until bed. | | | | Anyway how is everyone’s weekend going? | | https://blossom.primal.net/a290c379b2571781f56e01753a2883174261ef96c5226fdb359afe1d785fd7c9.jpg | | | +-- reply --------------------------------------------------------------------------------------------------------- ---+Last night when I finished work and joined my husband for movie night, he instead showed me a video about Newcomb’s paradox and we spent two hours debating it until bed. Anyway how is everyone’s weekend going? https://blossom.primal.net/a290c379b2571781f56e01753a2883174261ef96c5226fdb359afe1d785fd7c9.jpg
+- 666939749f1e -- 1mo -------------------------------------------------------------------------------------------[...]+ | | | À l'attention de tous les goys ☝️ | | https://image.nostr.build/d7fbe75e908210ca33bdbe435d136fe22537bd886994bff8f637db6347b7047e.jpg | | | +-- reply --------------------------------------------------------------------------------------------------------- ---+À l'attention de tous les goys ☝️ https://image.nostr.build/d7fbe75e908210ca33bdbe435d136fe22537bd886994bff8f637db6347b7047e.jpg
+- eab0e756d32b -- 2mo -------------------------------------------------------------------------------------------[...]+ | | | I find that when LLMs summarize things, they don’t have a good track record of knowing what parts are worth | | emphasizing and what parts are not. They make it shorter by cutting out both signal and noise. | | | +-- reply --------------------------------------------------------------------------------------------------------- ---+I find that when LLMs summarize things, they don’t have a good track record of knowing what parts are worth emphasizing and what parts are not. They make it shorter by cutting out both signal and noise.
+- eab0e756d32b -- 2mo -------------------------------------------------------------------------------------------[...]+ | | | I agree. Brevity is in relation to the topic. | | | | But it means spending time to make a 6k word article 3k words in a way that’s actually more clear and logical. | | | | More effort on cutting bloat, telling the audience what the signal is. | | | +-- reply --------------------------------------------------------------------------------------------------------- ---+I agree. Brevity is in relation to the topic. But it means spending time to make a 6k word article 3k words in a way that’s actually more clear and logical. More effort on cutting bloat, telling the audience what the signal is.
+- eab0e756d32b -- 2mo -------------------------------------------------------------------------------------------[...]+ | | | Broken Money is precisely as long as it needs to be. | | https://blossom.primal.net/0678337f4b8ee80e393bec6490fe8f8366bc85c488cc1040e9211233b28e169b.jpg | | | +-- reply --------------------------------------------------------------------------------------------------------- ---+Broken Money is precisely as long as it needs to be. https://blossom.primal.net/0678337f4b8ee80e393bec6490fe8f8366bc85c488cc1040e9211233b28e169b.jpg
+- eab0e756d32b -- 2mo -------------------------------------------------------------------------------------------[...]+ | | | In a world of AI slop writing, I’m prioritizing brevity more than ever. | | | | As Blaise Pascal (not Mark Twain to whom it is often attributed) once wrote, “I only made this letter longer because | | I have not had the time to make it shorter.” | | | | I am increasingly putting in the time to make things shorter. | | | +-- reply --------------------------------------------------------------------------------------------------------- ---+In a world of AI slop writing, I’m prioritizing brevity more than ever. As Blaise Pascal (not Mark Twain to whom it is often attributed) once wrote, “I only made this letter longer because I have not had the time to make it shorter.” I am increasingly putting in the time to make things shorter.
+- 666939749f1e -- 2mo -------------------------------------------------------------------------------------------[...]+ | | | {"id":"46f7284d045f30462cd34e9aae9b234f02ae59e445e687d94254af064699365b","pubkey":"3c1f1844a9e9df8caa71c6f6f16f31903 | | 37c1d57d7da58180f8f33206e2d7d11","created_at":1769155571,"kind":1,"tags":[["client","Yakihonne","31990:20986fb83e775 | | d96d188ca5c9df10ce6d613e0eb7e5768a0f0b12b37cdac21b3:1700732875747"],["t",""]],"content":"# Tribune : l’État met la | | Nation en danger numérique, et exige maintenant sa soumission technique\n\n## L’échec n’autorise pas la prise | | d’otage\n\nLa France est entrée dans une phase paradoxale où l’État, incapable de garantir la sécurité des | | infrastructures et des données dont il est responsable, prétend compenser cette incapacité par l’extension d’outils | | de contrôle sur la population.\n\nCette logique est doublement problématique.\n\nD’une part, elle inverse le | | principe fondamental de la sécurité : au lieu de réduire l’attaque systémique par la minimisation des données et la | | décentralisation des risques, elle augmente les surfaces de compromission en créant des mécanismes d’identification | | et de corrélation massifs.\nD’autre part, elle inverse un principe démocratique : au lieu de limiter la surveillance | | et de renforcer les libertés techniques, elle impose une société où l’accès aux services devient conditionnel à la | | soumission identitaire.\n\nLe résultat est simple : la Nation n’est pas protégée, elle est exposée. Et l’exposition | | est aggravée par des politiques publiques qui s’acharnent sur les outils de protection.\n\n## De la lutte contre le | | crime à l’attaque des communications chiffrées\n\nLa mécanique est connue, répétée, documentée :\n\nLa justification | | publique est toujours la même : narcotrafic, terrorisme, pédocriminalité.\nL’effet technique, lui, est toujours | | identique : créer une exception d’accès, donc une vulnérabilité universelle.\n\nSur le plan cryptographique, il | | n’existe pas de “porte dérobée réservée aux gentils” :\n\nSi un mécanisme permet à une autorité de déchiffrer, il | | permet structurellement à d’autres acteurs de le faire, par compromission, abus interne, capture juridique ou | | attaque technique.\nL’histoire récente de la cybersécurité prouve qu’une surface d’accès créée “pour l’ordre” | | devient tôt ou tard une surface exploitée “contre la société”.\n\nIl faut rappeler ici un principe d’ingénierie | | :\nUn système est sûr lorsqu’il résiste même si l’adversaire est puissant ; il est dangereux lorsqu’il suppose la | | vertu permanente de ses opérateurs.\n\nLe rejet de cette tentative par l’Assemblée nationale n’efface pas le fait | | politique majeur : l’intention existe, elle revient, et elle s’inscrit dans un continuum européen.\n\n## La | | vérification d’âge, ou l’architecture du soupçon appliquée au web entier\n\nLa vérification d’âge est présentée | | comme une mesure de protection des mineurs. Personne de sérieux ne conteste l’objectif moral : protéger l’enfance | | est une exigence.\nCe qui est contesté, c’est la méthode : une infrastructure de preuve d’identité insérée dans les | | flux du web.\n\nEn France, l’ARCOM a posé un cadre où les sites concernés doivent proposer au moins une solution | | dite de “double anonymat”, dont la CNIL a rendu un avis.\n\nLe point central n’est pas le discours, mais la | | propriété systémique :\n\nUn dispositif d’accès conditionnel, même “anonyme”, implique nécessairement :\n* des | | acteurs d’attestation (issuer),\n* des validateurs (verifier),\n* des logs d’usage (ne serait-ce que techniques),\n* | | et une gestion d’incidents (fraude, contestation, désanonymisation judiciaire).\n\nAutrement dit : un dispositif | | d’identité, même minimal, est un dispositif de pouvoir.\n\nExtension fonctionnelle : porno → réseaux sociaux → paris | | sportifs -> tout\n\nLa dynamique récente va exactement dans ce sens : la même semaine, le débat s’élargit déjà aux | | réseaux sociaux et à d’autres services.\nSur les réseaux sociaux, une proposition de loi visant l’interdiction aux | | moins de 15 ans a été examinée en commission à l’Assemblée nationale en janvier 2026.\n\nCe basculement confirme une | | règle empirique des politiques numériques :\n\nToute infrastructure créée pour un cas jugé “extrême” devient ensuite | | le socle d’extension à des usages ordinaires.\n\nCe n’est pas une dérive accidentelle. C’est la finalité implicite : | | si l’infrastructure existe, elle sera rentabilisée politiquement.\n\n## La contradiction cryptographique du “double | | anonymat” et le piège européen\n\nLe “double anonymat” repose sur l’idée qu’aucun acteur ne peut relier identité et | | site consulté.\nMais dès que l’on considère le web réel, cette promesse devient fragile pour cinq raisons | | structurelles :\n\nCorrélation réseau inévitable\n\nMême sans identité dans la preuve, restent :\n* adresse IP,\n* | | horodatage,\n* empreinte navigateur,\n* modèle de requêtes.\n\nCes métadonnées suffisent à relier des sessions, | | surtout quand le service consulté est rare ou stigmatisant.\n\nUn anonymat brisé par l’usage spécialisé\n\nUn jeton | | “anonyme” utilisé essentiellement pour accéder à des services sensibles devient une signature comportementale : | | c’est l’opposé de “l’anonymat par la foule”.\n\nCentralisation de la révocation et du contrôle\n\nUn dispositif | | conforme au droit implique révocation, audit, preuves de conformité, donc capacité d’invalidation | | centralisée.\nC’est l’architecture inverse de la robustesse démocratique : l’accès devient un privilège | | technique.\n\nCapture par les logiques eIDAS 2.0\n\nAu niveau européen, la trajectoire est déjà posée : la | | Commission travaille à des solutions d’âge, au croisement du DSA et du portefeuille d’identité numérique.\nMême | | lorsque des mécanismes cryptographiques avancés sont évoqués, l’enjeu reste le même : gouvernance, souveraineté, | | non-corrélation, pas seulement mathématiques.\n\nDépendance structurelle et souveraineté illusoire\n\nL’argument | | “l’Europe va le faire proprement” se heurte à une réalité : les infrastructures numériques européennes sont | | largement dépendantes, et la France elle-même est déjà structurellement exposée par les fuites, la sous-traitance et | | la centralisation.\n\n## L’État affaiblit la sécurité nationale en attaquant les moyens de protection\n\nL’élément | | le plus grave de la période actuelle est la dissonance suivante :\n\nL’État et certains lobbys exigent davantage | | d’identification et de contrôle,\ntout en rendant suspectes les technologies de protection (VPN, chiffrement, | | anonymisation).\n\nCe mécanisme produit une asymétrie violente :\n\nLes acteurs criminels sérieux disposent déjà de | | moyens privés, de circuits, de compétences, de matériel.\nLes citoyens ordinaires, eux, se retrouvent privés de | | protections de base, et exposés à des risques qui n’étaient pas les leurs.\n\nOn l’observe déjà dans les réactions | | sociales :\n\nDes sites préfèrent restreindre l’accès plutôt que déployer l’infrastructure exigée (car juridiquement | | et techniquement dangereuse).\nLes utilisateurs augmentent l’usage de VPN et de contournements, révélant une | | défiance et une adaptation rationnelle.\n\nCe fait sociotechnique est majeur :\nQuand une population se met | | massivement à contourner, ce n’est pas un problème moral. C’est un signal d’hostilité du système envers ses propres | | citoyens.\n\n## Mise en danger de la Nation par accumulation de données sensibles\n\nToute politique de contrôle par | | preuve d’âge et identité d’usage produit mécaniquement une augmentation du stock de données sensibles :\n\nIdentité | | + accès à contenus intimes,\nIdentité + habitudes,\nIdentité + fréquence,\nIdentité + corrélations.\n\nOr ce stock | | est la matière première de :\nchantage,\nextorsion,\ndoxing,\nciblage,\nenlèvements,\npressions.\n\nLà réside le | | point critique : une fuite n’est plus seulement un “incident”, elle devient un outil d’agression.\n\nMême les médias | | grand public rappellent désormais qu’une fuite de données entraîne rapidement piratages, arnaques et escalades, tant | | la revente d’identifiants est industrialisée.\n\nLe danger n’est donc pas théorique. Il est systémique.\n\n## Ce que | | la Nation doit exiger immédiatement\n\nLa situation n’appelle pas une pétition morale, mais un changement de contrat | | politique.\n\nPrincipe de minimisation obligatoire\n\nAucune architecture publique ne devrait pouvoir créer un lien | | durable entre :\nidentité civile\net usages privés.\n\nCe lien doit devenir illégal par défaut, sauf cas | | juridictionnel strict, ciblé, et contradictoire.\n\nPrincipe d’interdiction des dispositifs de corrélation\n\nUn | | contrôle d’accès ne doit jamais devenir un capteur de comportements.\nOr toute vérification interactive, | | centralisée, loggable, devient un capteur.\n\nPrincipe de neutralité technique\n\nLe VPN, le chiffrement, | | l’anonymisation ne sont pas des “soupçons”.\nIls doivent être protégés comme outils d’autodéfense | | numérique.\n\nPrincipe d’évaluation d’impact publique et indépendante\n\nTout dispositif de vérification d’âge, | | d’identité, ou d’accès conditionnel doit être précédé de :\nmodèle de menace public,\naudit cryptographique | | public,\névaluation d’impact sociologique,\net étude d’incidence sur la sécurité globale.\n\nPrincipe de séparation | | stricte entre État et identité d’usage\n\nL’État ne peut pas être simultanément :\nle fournisseur d’identité,\nle | | régulateur,\nle collecteur de traces,\net l’autorité de désanonymisation.\n\nUn système qui concentre ces rôles est | | une architecture autoritaire par construction, même si ses intentions sont proclamées vertueuses.\n\nConclusion : la | | République ne peut pas survivre à l’industrialisation du soupçon\n\nLe point essentiel est celui-ci :\n\nL’État | | prétend protéger les mineurs et lutter contre le crime,\nmais il produit une infrastructure qui expose toute la | | Nation au risque maximal : la corrélation identitaire à grande échelle.\n\nDans une société où les données circulent | | déjà sur les marchés criminels, où les fuites se multiplient, où les attaques deviennent physiques, la réponse ne | | peut pas être plus de collecte, plus de centralisation, plus de mécanismes d’ouverture.\n\nLa réponse doit être | | exactement inverse :\nmoins de données,\nmoins d’identification,\nmoins de centralisation,\nplus d’outils de | | protection accessibles,\nplus de neutralité du réseau,\nplus de responsabilité de l’État sur ses propres | | échecs.\n\nCe n’est pas une querelle technique. C’est un enjeu de sécurité nationale et de stabilité | | démocratique.\n\nSi l’État continue à exiger la soumission identitaire numérique en compensant son incapacité par le | | contrôle, alors il ne protège plus la Nation : il la fragilise, et il | | l’expose.","sig":"0254f4685300b80ec775f57832c653141396abeb2e5aa270a15090b12194913d20e4369227acfa999345cc5dfec4ef0a74 | | c8f8ac518f89d3f0117d121bd90036"} | | | +-- reply --------------------------------------------------------------------------------------------------------- ---+{"id":"46f7284d045f30462cd34e9aae9b234f02ae59e445e687d94254af064699365b","pubkey":"3c1f1844a9e9df8caa71c6f6f16f3190337c1d57d7da58180f8f33206e2d7d11","created_at":1769155571,"kind":1,"tags":[["client","Yakihonne","31990:20986fb83e775d96d188ca5c9df10ce6d613e0eb7e5768a0f0b12b37cdac21b3:1700732875747"],["t",""]],"content":"# Tribune : l’État met la Nation en danger numérique, et exige maintenant sa soumission technique\n\n## L’échec n’autorise pas la prise d’otage\n\nLa France est entrée dans une phase paradoxale où l’État, incapable de garantir la sécurité des infrastructures et des données dont il est responsable, prétend compenser cette incapacité par l’extension d’outils de contrôle sur la population.\n\nCette logique est doublement problématique.\n\nD’une part, elle inverse le principe fondamental de la sécurité : au lieu de réduire l’attaque systémique par la minimisation des données et la décentralisation des risques, elle augmente les surfaces de compromission en créant des mécanismes d’identification et de corrélation massifs.\nD’autre part, elle inverse un principe démocratique : au lieu de limiter la surveillance et de renforcer les libertés techniques, elle impose une société où l’accès aux services devient conditionnel à la soumission identitaire.\n\nLe résultat est simple : la Nation n’est pas protégée, elle est exposée. Et l’exposition est aggravée par des politiques publiques qui s’acharnent sur les outils de protection.\n\n## De la lutte contre le crime à l’attaque des communications chiffrées\n\nLa mécanique est connue, répétée, documentée :\n\nLa justification publique est toujours la même : narcotrafic, terrorisme, pédocriminalité.\nL’effet technique, lui, est toujours identique : créer une exception d’accès, donc une vulnérabilité universelle.\n\nSur le plan cryptographique, il n’existe pas de “porte dérobée réservée aux gentils” :\n\nSi un mécanisme permet à une autorité de déchiffrer, il permet structurellement à d’autres acteurs de le faire, par compromission, abus interne, capture juridique ou attaque technique.\nL’histoire récente de la cybersécurité prouve qu’une surface d’accès créée “pour l’ordre” devient tôt ou tard une surface exploitée “contre la société”.\n\nIl faut rappeler ici un principe d’ingénierie :\nUn système est sûr lorsqu’il résiste même si l’adversaire est puissant ; il est dangereux lorsqu’il suppose la vertu permanente de ses opérateurs.\n\nLe rejet de cette tentative par l’Assemblée nationale n’efface pas le fait politique majeur : l’intention existe, elle revient, et elle s’inscrit dans un continuum européen.\n\n## La vérification d’âge, ou l’architecture du soupçon appliquée au web entier\n\nLa vérification d’âge est présentée comme une mesure de protection des mineurs. Personne de sérieux ne conteste l’objectif moral : protéger l’enfance est une exigence.\nCe qui est contesté, c’est la méthode : une infrastructure de preuve d’identité insérée dans les flux du web.\n\nEn France, l’ARCOM a posé un cadre où les sites concernés doivent proposer au moins une solution dite de “double anonymat”, dont la CNIL a rendu un avis.\n\nLe point central n’est pas le discours, mais la propriété systémique :\n\nUn dispositif d’accès conditionnel, même “anonyme”, implique nécessairement :\n* des acteurs d’attestation (issuer),\n* des validateurs (verifier),\n* des logs d’usage (ne serait-ce que techniques),\n* et une gestion d’incidents (fraude, contestation, désanonymisation judiciaire).\n\nAutrement dit : un dispositif d’identité, même minimal, est un dispositif de pouvoir.\n\nExtension fonctionnelle : porno → réseaux sociaux → paris sportifs -> tout\n\nLa dynamique récente va exactement dans ce sens : la même semaine, le débat s’élargit déjà aux réseaux sociaux et à d’autres services.\nSur les réseaux sociaux, une proposition de loi visant l’interdiction aux moins de 15 ans a été examinée en commission à l’Assemblée nationale en janvier 2026.\n\nCe basculement confirme une règle empirique des politiques numériques :\n\nToute infrastructure créée pour un cas jugé “extrême” devient ensuite le socle d’extension à des usages ordinaires.\n\nCe n’est pas une dérive accidentelle. C’est la finalité implicite : si l’infrastructure existe, elle sera rentabilisée politiquement.\n\n## La contradiction cryptographique du “double anonymat” et le piège européen\n\nLe “double anonymat” repose sur l’idée qu’aucun acteur ne peut relier identité et site consulté.\nMais dès que l’on considère le web réel, cette promesse devient fragile pour cinq raisons structurelles :\n\nCorrélation réseau inévitable\n\nMême sans identité dans la preuve, restent :\n* adresse IP,\n* horodatage,\n* empreinte navigateur,\n* modèle de requêtes.\n\nCes métadonnées suffisent à relier des sessions, surtout quand le service consulté est rare ou stigmatisant.\n\nUn anonymat brisé par l’usage spécialisé\n\nUn jeton “anonyme” utilisé essentiellement pour accéder à des services sensibles devient une signature comportementale : c’est l’opposé de “l’anonymat par la foule”.\n\nCentralisation de la révocation et du contrôle\n\nUn dispositif conforme au droit implique révocation, audit, preuves de conformité, donc capacité d’invalidation centralisée.\nC’est l’architecture inverse de la robustesse démocratique : l’accès devient un privilège technique.\n\nCapture par les logiques eIDAS 2.0\n\nAu niveau européen, la trajectoire est déjà posée : la Commission travaille à des solutions d’âge, au croisement du DSA et du portefeuille d’identité numérique.\nMême lorsque des mécanismes cryptographiques avancés sont évoqués, l’enjeu reste le même : gouvernance, souveraineté, non-corrélation, pas seulement mathématiques.\n\nDépendance structurelle et souveraineté illusoire\n\nL’argument “l’Europe va le faire proprement” se heurte à une réalité : les infrastructures numériques européennes sont largement dépendantes, et la France elle-même est déjà structurellement exposée par les fuites, la sous-traitance et la centralisation.\n\n## L’État affaiblit la sécurité nationale en attaquant les moyens de protection\n\nL’élément le plus grave de la période actuelle est la dissonance suivante :\n\nL’État et certains lobbys exigent davantage d’identification et de contrôle,\ntout en rendant suspectes les technologies de protection (VPN, chiffrement, anonymisation).\n\nCe mécanisme produit une asymétrie violente :\n\nLes acteurs criminels sérieux disposent déjà de moyens privés, de circuits, de compétences, de matériel.\nLes citoyens ordinaires, eux, se retrouvent privés de protections de base, et exposés à des risques qui n’étaient pas les leurs.\n\nOn l’observe déjà dans les réactions sociales :\n\nDes sites préfèrent restreindre l’accès plutôt que déployer l’infrastructure exigée (car juridiquement et techniquement dangereuse).\nLes utilisateurs augmentent l’usage de VPN et de contournements, révélant une défiance et une adaptation rationnelle.\n\nCe fait sociotechnique est majeur :\nQuand une population se met massivement à contourner, ce n’est pas un problème moral. C’est un signal d’hostilité du système envers ses propres citoyens.\n\n## Mise en danger de la Nation par accumulation de données sensibles\n\nToute politique de contrôle par preuve d’âge et identité d’usage produit mécaniquement une augmentation du stock de données sensibles :\n\nIdentité + accès à contenus intimes,\nIdentité + habitudes,\nIdentité + fréquence,\nIdentité + corrélations.\n\nOr ce stock est la matière première de :\nchantage,\nextorsion,\ndoxing,\nciblage,\nenlèvements,\npressions.\n\nLà réside le point critique : une fuite n’est plus seulement un “incident”, elle devient un outil d’agression.\n\nMême les médias grand public rappellent désormais qu’une fuite de données entraîne rapidement piratages, arnaques et escalades, tant la revente d’identifiants est industrialisée.\n\nLe danger n’est donc pas théorique. Il est systémique.\n\n## Ce que la Nation doit exiger immédiatement\n\nLa situation n’appelle pas une pétition morale, mais un changement de contrat politique.\n\nPrincipe de minimisation obligatoire\n\nAucune architecture publique ne devrait pouvoir créer un lien durable entre :\nidentité civile\net usages privés.\n\nCe lien doit devenir illégal par défaut, sauf cas juridictionnel strict, ciblé, et contradictoire.\n\nPrincipe d’interdiction des dispositifs de corrélation\n\nUn contrôle d’accès ne doit jamais devenir un capteur de comportements.\nOr toute vérification interactive, centralisée, loggable, devient un capteur.\n\nPrincipe de neutralité technique\n\nLe VPN, le chiffrement, l’anonymisation ne sont pas des “soupçons”.\nIls doivent être protégés comme outils d’autodéfense numérique.\n\nPrincipe d’évaluation d’impact publique et indépendante\n\nTout dispositif de vérification d’âge, d’identité, ou d’accès conditionnel doit être précédé de :\nmodèle de menace public,\naudit cryptographique public,\névaluation d’impact sociologique,\net étude d’incidence sur la sécurité globale.\n\nPrincipe de séparation stricte entre État et identité d’usage\n\nL’État ne peut pas être simultanément :\nle fournisseur d’identité,\nle régulateur,\nle collecteur de traces,\net l’autorité de désanonymisation.\n\nUn système qui concentre ces rôles est une architecture autoritaire par construction, même si ses intentions sont proclamées vertueuses.\n\nConclusion : la République ne peut pas survivre à l’industrialisation du soupçon\n\nLe point essentiel est celui-ci :\n\nL’État prétend protéger les mineurs et lutter contre le crime,\nmais il produit une infrastructure qui expose toute la Nation au risque maximal : la corrélation identitaire à grande échelle.\n\nDans une société où les données circulent déjà sur les marchés criminels, où les fuites se multiplient, où les attaques deviennent physiques, la réponse ne peut pas être plus de collecte, plus de centralisation, plus de mécanismes d’ouverture.\n\nLa réponse doit être exactement inverse :\nmoins de données,\nmoins d’identification,\nmoins de centralisation,\nplus d’outils de protection accessibles,\nplus de neutralité du réseau,\nplus de responsabilité de l’État sur ses propres échecs.\n\nCe n’est pas une querelle technique. C’est un enjeu de sécurité nationale et de stabilité démocratique.\n\nSi l’État continue à exiger la soumission identitaire numérique en compensant son incapacité par le contrôle, alors il ne protège plus la Nation : il la fragilise, et il l’expose.","sig":"0254f4685300b80ec775f57832c653141396abeb2e5aa270a15090b12194913d20e4369227acfa999345cc5dfec4ef0a74c8f8ac518f89d3f0117d121bd90036"} [reposted note unavailable on current relays]
+- 666939749f1e -- 2mo -------------------------------------------------------------------------------------------[...]+ | | | {"id":"b5c5ab7076ced6e6d082f5d7e4a235aea945cc4dabb5a69f71307dc7911465a5","pubkey":"8781fe5ddc7a247b1a1e91ac3fb3eba77 | | be553120dd60507f71e0b174900ffa8","created_at":1770801288,"kind":1,"tags":[["e","ae181fedc2160c3415441e8ef4a0ff41b1cf | | 26204aaa81d5afc27a0539bb52ec","ws://relay.snort.social","mention"],["p","1e67de3754171071d3cf9b44b6e546bd94fd0a2ca3f | | b4dbbb1b054685c9116e4","","mention"]],"content":"Imagine le peuple aurait la connaissance et accepterait l’idée | | qu’un réseau décentralisé est déjà en place et fonctionne , la, maintnenant ? \n\nLes commerçants peuvent installer | | le TPE sur leur smartphones , gratuitement .\n\nLes gens peuvent payer instant , à moins de frais que visa , en | | ayant le contrôle total de leur fonds et personne qui peut venir les emm… ? \n\nPas besoin d’attendre sur l’état ni | | sur l’EU ( qui ne feront rien car ils ne savent pas faire , ce sont des technocrates).\n\nOk, le peuple ne sait pas | | et ne l’accepte pas , mais imagine ? | | \n\n🤗\nnote:ae181fed…52ec","sig":"7136e4c1b456228a782049044b5d4d9568a06d1c226e8324c7f99b9a395230b901579ce19e432f6764 | | dca69e78458cfe68ad4d31c31c68cc88e21936e9404a32"} | | | +-- reply --------------------------------------------------------------------------------------------------------- ---+{"id":"b5c5ab7076ced6e6d082f5d7e4a235aea945cc4dabb5a69f71307dc7911465a5","pubkey":"8781fe5ddc7a247b1a1e91ac3fb3eba77be553120dd60507f71e0b174900ffa8","created_at":1770801288,"kind":1,"tags":[["e","ae181fedc2160c3415441e8ef4a0ff41b1cf26204aaa81d5afc27a0539bb52ec","ws://relay.snort.social","mention"],["p","1e67de3754171071d3cf9b44b6e546bd94fd0a2ca3fb4dbbb1b054685c9116e4","","mention"]],"content":"Imagine le peuple aurait la connaissance et accepterait l’idée qu’un réseau décentralisé est déjà en place et fonctionne , la, maintnenant ? \n\nLes commerçants peuvent installer le TPE sur leur smartphones , gratuitement .\n\nLes gens peuvent payer instant , à moins de frais que visa , en ayant le contrôle total de leur fonds et personne qui peut venir les emm… ? \n\nPas besoin d’attendre sur l’état ni sur l’EU ( qui ne feront rien car ils ne savent pas faire , ce sont des technocrates).\n\nOk, le peuple ne sait pas et ne l’accepte pas , mais imagine ? \n\n🤗\nnote:ae181fed…52ec","sig":"7136e4c1b456228a782049044b5d4d9568a06d1c226e8324c7f99b9a395230b901579ce19e432f6764dca69e78458cfe68ad4d31c31c68cc88e21936e9404a32"} [reposted note unavailable on current relays]
+- eab0e756d32b -- 2mo -------------------------------------------------------------------------------------------[...]+ | | | Good evening. | | | | A year and a half ago, Nostr spoke. And so I listened. Here’s the cover reveal for my upcoming sci fi thriller, The | | Stolguard Incident. | | | | I’ll share more info over the following weeks, but in the meantime I wanted to make sure folks on Nostr got the | | first look. | | https://blossom.primal.net/179ab082c464ebc2a757a2ed80809e9e4cc9239db06d426b42959b1ba6406fd1.jpg | | note:cd064eff…558b | | | +-- reply --------------------------------------------------------------------------------------------------------- ---+Good evening. A year and a half ago, Nostr spoke. And so I listened. Here’s the cover reveal for my upcoming sci fi thriller, The Stolguard Incident. I’ll share more info over the following weeks, but in the meantime I wanted to make sure folks on Nostr got the first look. https://blossom.primal.net/179ab082c464ebc2a757a2ed80809e9e4cc9239db06d426b42959b1ba6406fd1.jpg note:cd064eff…558b
+- eab0e756d32b -- 2mo -------------------------------------------------------------------------------------------[...]+ | | | Anyway, GM. | | | | https://blossom.primal.net/dc3051e4530a978243d30f20fbc29961d9eb0364f89378d918017913c0922bff.jpg | | | +-- reply --------------------------------------------------------------------------------------------------------- ---+Anyway, GM. https://blossom.primal.net/dc3051e4530a978243d30f20fbc29961d9eb0364f89378d918017913c0922bff.jpg
+- eab0e756d32b -- 2mo -------------------------------------------------------------------------------------------[...]+ | | | I read the novel Blood of the Bourgeoisie by Michael Sullivan. | | | | Given all the corruption recently revealed about powerful people, it seems like a good season for it. It's a | | thriller about elite corruption, and features bitcoin prominently. Anyway, here's a review. | | | | The book is a concise and well-paced read, with three point-of-view characters. All three of them are quite fleshed | | out, especially given how trim the overall page count is. | | | | The plot is well-constructed and creative. Motivations make sense, the scale is significant, and I found myself | | consistently wanting to know what happens next. | | | | The audiobook version is out now, narrated by the great @c48e29f04b48. I started with the ebook version, but then | | listened to the audiobook version for the second half, so I experienced the book both in prose form and through | | listening, and both were quite enjoyable. | | | | I like there to be themes in novels. In other words, if the answer to why Prince Niceguy defeats Darklord Asshole in | | the climax is because "he's better with a sword", then that's just not that interesting to me. In addition to his | | training, what did Prince Niceguy learn that allowed him to defeat him? The original Star Wars trilogy handled this | | well: Luke loses to Vader in the middle movie and beats him in the third movie, not just because he improved with a | | saber between the duels but because he mastered himself and his emotions, and accepted the truth of things rather | | than deny them. | | | | This novel has good themes, in my view. Clashes of ideology. Tough choices. Characters who have their worldviews | | tested. Good, evil, and shades of gray. Can evil be purged peacefully, or does it require violence? | | | | There's a series of flashbacks in it, which is a structure that annoys a minority of readers (because it risks | | breaking your immersion by jumping back and forth), but I really like that structure in novels as long as it's well | | done. It helps flesh out a story and makes the reader wonder how the flashbacks are going to inform or intersect | | with the present-day plot. In this case, I thought the flashbacks were very well done and played nicely into the | | plot. I predicted how the flashbacks would intersect the main story, but there are other twists that surprised me a | | great deal. In my view that's the ideal combo, because as a reader I'm rewarded for thinking ahead, but also | | blindsided at times. | | | | To the extent that I have any critiques of the novel to flesh out a full review, they're pretty limited and | | contextual. | | | | -The bitcoin component is significant, both plot-wise and dialogue-wise. If someone doesn't like bitcoin, the plot | | can still work for them but it'll likely detract from their overall appreciation. On the other hand if someone is | | very knowledgeable on bitcoin, the "bitcoin 101" parts of it may feel skim-able. That's a tough balance for an | | author to navigate and I can't envision how it would be handled better. I would imagine that the sweet spot as a | | reader here is to be interested in bitcoin but a bit skeptical or not super knowledgeable about it. | | | | -One of the challenges an author faces (including myself) is how to make dialogue seem realistic but not too | | realistic. That's an unintuitive thing. If you actually transcribe most real-life conversations, they are filled | | with "ums" and false starts and just tons of verbal clutter which makes them super annoying to read. So an author | | can't actually make dialogue perfectly realistic, all the time. On the other hand, if dialogue is too polished and | | expositionary, it sounds artificial: "Well how do you do today, Bob? Lovely weather isn't it? Have you heard about | | that deceased gardener? What a shame. They found him this morning. I heard he was sleeping with the countess." | | | | Sullivan handles the dialogue well, but there were some times I would have preferred it pushed a bit closer to the | | realism side of the spectrum. There is not necessarily any ideal sweet spot, though. It's all trade-offs. An author | | has to put necessary exposition somewhere, and it can go in the narrative or in dialogue or some blend of the two, | | and readers have different preferences. There was one moment where characters whispered in front of another | | character as though they weren't heard and I was like, "guys, he's right there in earshot, looking at you..." | | | | I'd be happy to pick up other books by Sullivan in the future. In fact, he's got an earlier sci fi novel out called | | The Final Flaw. I haven't gotten to that one yet, but after reading this one, I'd like to give that a read as well. | | | | https://blossom.primal.net/b07e145b8ab7142540cdf2c2ff325fd9db7ce52b4d37000ca69cad4d16b09420.jpg | | | +-- reply --------------------------------------------------------------------------------------------------------- ---+I read the novel Blood of the Bourgeoisie by Michael Sullivan. Given all the corruption recently revealed about powerful people, it seems like a good season for it. It's a thriller about elite corruption, and features bitcoin prominently. Anyway, here's a review. The book is a concise and well-paced read, with three point-of-view characters. All three of them are quite fleshed out, especially given how trim the overall page count is. The plot is well-constructed and creative. Motivations make sense, the scale is significant, and I found myself consistently wanting to know what happens next. The audiobook version is out now, narrated by the great @c48e29f04b48. I started with the ebook version, but then listened to the audiobook version for the second half, so I experienced the book both in prose form and through listening, and both were quite enjoyable. I like there to be themes in novels. In other words, if the answer to why Prince Niceguy defeats Darklord Asshole in the climax is because "he's better with a sword", then that's just not that interesting to me. In addition to his training, what did Prince Niceguy learn that allowed him to defeat him? The original Star Wars trilogy handled this well: Luke loses to Vader in the middle movie and beats him in the third movie, not just because he improved with a saber between the duels but because he mastered himself and his emotions, and accepted the truth of things rather than deny them. This novel has good themes, in my view. Clashes of ideology. Tough choices. Characters who have their worldviews tested. Good, evil, and shades of gray. Can evil be purged peacefully, or does it require violence? There's a series of flashbacks in it, which is a structure that annoys a minority of readers (because it risks breaking your immersion by jumping back and forth), but I really like that structure in novels as long as it's well done. It helps flesh out a story and makes the reader wonder how the flashbacks are going to inform or intersect with the present-day plot. In this case, I thought the flashbacks were very well done and played nicely into the plot. I predicted how the flashbacks would intersect the main story, but there are other twists that surprised me a great deal. In my view that's the ideal combo, because as a reader I'm rewarded for thinking ahead, but also blindsided at times. To the extent that I have any critiques of the novel to flesh out a full review, they're pretty limited and contextual. -The bitcoin component is significant, both plot-wise and dialogue-wise. If someone doesn't like bitcoin, the plot can still work for them but it'll likely detract from their overall appreciation. On the other hand if someone is very knowledgeable on bitcoin, the "bitcoin 101" parts of it may feel skim-able. That's a tough balance for an author to navigate and I can't envision how it would be handled better. I would imagine that the sweet spot as a reader here is to be interested in bitcoin but a bit skeptical or not super knowledgeable about it. -One of the challenges an author faces (including myself) is how to make dialogue seem realistic but not too realistic. That's an unintuitive thing. If you actually transcribe most real-life conversations, they are filled with "ums" and false starts and just tons of verbal clutter which makes them super annoying to read. So an author can't actually make dialogue perfectly realistic, all the time. On the other hand, if dialogue is too polished and expositionary, it sounds artificial: "Well how do you do today, Bob? Lovely weather isn't it? Have you heard about that deceased gardener? What a shame. They found him this morning. I heard he was sleeping with the countess." Sullivan handles the dialogue well, but there were some times I would have preferred it pushed a bit closer to the realism side of the spectrum. There is not necessarily any ideal sweet spot, though. It's all trade-offs. An author has to put necessary exposition somewhere, and it can go in the narrative or in dialogue or some blend of the two, and readers have different preferences. There was one moment where characters whispered in front of another character as though they weren't heard and I was like, "guys, he's right there in earshot, looking at you..." I'd be happy to pick up other books by Sullivan in the future. In fact, he's got an earlier sci fi novel out called The Final Flaw. I haven't gotten to that one yet, but after reading this one, I'd like to give that a read as well. https://blossom.primal.net/b07e145b8ab7142540cdf2c2ff325fd9db7ce52b4d37000ca69cad4d16b09420.jpg
+- 666939749f1e -- 2mo -------------------------------------------------------------------------------------------[...]+ | | | En attendant que Jack Lang dégage et soit traduit en justice, | | | | Juste pour préciser que Monero est cité 0 fois dans les fichiers #Epstein | | | | ✔️ | | | +-- reply --------------------------------------------------------------------------------------------------------- ---+En attendant que Jack Lang dégage et soit traduit en justice, Juste pour préciser que Monero est cité 0 fois dans les fichiers #Epstein ✔️
+- 666939749f1e -- 3mo -------------------------------------------------------------------------------------------[...]+ | | | Et bien voilà quand ils veulent ! Merci du partage 🙂 | | | +-- reply --------------------------------------------------------------------------------------------------------- ---+Et bien voilà quand ils veulent ! Merci du partage 🙂
+- 666939749f1e -- 3mo -------------------------------------------------------------------------------------------[...]+ | | | Bonjour à tous ! | | | | Les corrompus veulent censurer les réseaux, alors soyons encore plus nombreux ici ! 🙂😎 | | | | Nous sommes déjà 430, objectif 1000 !🔥 | | | | Vous n'aurez pas notre biométrie : le Mossade ne pourra pas la faire fuiter | | | | Bisous à Lagarde, Ursula, et toutes les marionnettes 👌 | | https://image.nostr.build/e00187772590e835ec039bb1c3ffb23e6588485a836436848df95d60b436b3c7.jpg | | | +-- reply --------------------------------------------------------------------------------------------------------- ---+Bonjour à tous ! Les corrompus veulent censurer les réseaux, alors soyons encore plus nombreux ici ! 🙂😎 Nous sommes déjà 430, objectif 1000 !🔥 Vous n'aurez pas notre biométrie : le Mossade ne pourra pas la faire fuiter Bisous à Lagarde, Ursula, et toutes les marionnettes 👌 https://image.nostr.build/e00187772590e835ec039bb1c3ffb23e6588485a836436848df95d60b436b3c7.jpg
+- eab0e756d32b -- 3mo -------------------------------------------------------------------------------------------[...]+ | | | You know what there aren't a lot of? Horror musicals. | | | | Anyway, I watched "Sinners" last night, and enjoyed it more than I expected. My husband and I are currently in a | | movie-a-night mode after a long stretch of zero movies. Here's a quick review. | | | | Sinners is getting a lot of hype because it was nominated for a record-breaking16 oscars. Of course, with Hollywood | | quality deteriorating over time, an oscar nomination isn't really what it used to be. There's some oscar-inflation, | | basically. And there's often a huge disconnect between what critics and insiders like vs what the public likes, | | especially in this highly polarized environment. | | | | Set in1930s Mississippi, Sinners is a stylized action story about the supernatural. It's one of those elevated type | | of stories, where there's 1) what's happening at the surface level for entertainment, and 2) what themes those | | actions are meant to represent. But it didn't get as heavy-handed as I expected. Well-executed themes can deepen the | | entertainment, whereas heavy-handed or misaligned themes can dampen entertainment, and for me the combo was | | neutral-to-positive. | | | | The music and the directing/cinematography are truly incredible. Like, outlier masterpiece level, 10 out of 10. | | There's a huge blues component, and the visuals are just constantly surprisingly good. | | | | My biggest complaint is the action in the third act. That's the only aspect that detracted from its entertainment | | value for me. Physical fights and gun battles don't work with a consistent set of rules or power scaling. As a | | result, the fights feel very unrealistic, and the outcomes feel determined by where the plot needs things to go, | | rather than maintaining the illusion of cause-and-effect (e.g. it distracted me enough to pull me out of the | | immersion, and I felt the writer's hand strongly at play). Overall fight choreography is like a 4/10 here. | | | | Thus I consider it a flawed masterpiece. Really glad I watched it for its music and visuals and overall plot | | concept, but was sufficiently distracted by third act details and execution. | | | | https://blossom.primal.net/56a60b07ae1ff14982d5ea56214adaea38c1e0aa79a9c6f62256569773a45993.jpg | | | +-- reply --------------------------------------------------------------------------------------------------------- ---+You know what there aren't a lot of? Horror musicals. Anyway, I watched "Sinners" last night, and enjoyed it more than I expected. My husband and I are currently in a movie-a-night mode after a long stretch of zero movies. Here's a quick review. Sinners is getting a lot of hype because it was nominated for a record-breaking16 oscars. Of course, with Hollywood quality deteriorating over time, an oscar nomination isn't really what it used to be. There's some oscar-inflation, basically. And there's often a huge disconnect between what critics and insiders like vs what the public likes, especially in this highly polarized environment. Set in1930s Mississippi, Sinners is a stylized action story about the supernatural. It's one of those elevated type of stories, where there's 1) what's happening at the surface level for entertainment, and 2) what themes those actions are meant to represent. But it didn't get as heavy-handed as I expected. Well-executed themes can deepen the entertainment, whereas heavy-handed or misaligned themes can dampen entertainment, and for me the combo was neutral-to-positive. The music and the directing/cinematography are truly incredible. Like, outlier masterpiece level, 10 out of 10. There's a huge blues component, and the visuals are just constantly surprisingly good. My biggest complaint is the action in the third act. That's the only aspect that detracted from its entertainment value for me. Physical fights and gun battles don't work with a consistent set of rules or power scaling. As a result, the fights feel very unrealistic, and the outcomes feel determined by where the plot needs things to go, rather than maintaining the illusion of cause-and-effect (e.g. it distracted me enough to pull me out of the immersion, and I felt the writer's hand strongly at play). Overall fight choreography is like a 4/10 here. Thus I consider it a flawed masterpiece. Really glad I watched it for its music and visuals and overall plot concept, but was sufficiently distracted by third act details and execution. https://blossom.primal.net/56a60b07ae1ff14982d5ea56214adaea38c1e0aa79a9c6f62256569773a45993.jpg
+- cba4b1859979 -- 3mo -------------------------------------------------------------------------------------------[...]+ | | | It's easy to underestimate the value of taking small steps. Most people won't buy Bitcoin because they can't imagine | | how buying $20 monthly can add up to something big. | | | | These are also the same people who think that going through the gym for 20 minutes doesn't count. They think that if | | they can't get 100,000 steps a week, there's no point in even trying. | | | | Take small steps. Eventually, you'll see the results of those steps as your effort compounds with time. | | | | Your $20 monthly Bitcoin buy will eventually be worth $100, then $1,000, then $10,000. After a couple of decades, | | it'll be worth $1M+. | | | | Don't make excuses for not taking action. Take the small steps. Your future self will be thankful. | | | +-- reply --------------------------------------------------------------------------------------------------------- ---+It's easy to underestimate the value of taking small steps. Most people won't buy Bitcoin because they can't imagine how buying $20 monthly can add up to something big. These are also the same people who think that going through the gym for 20 minutes doesn't count. They think that if they can't get 100,000 steps a week, there's no point in even trying. Take small steps. Eventually, you'll see the results of those steps as your effort compounds with time. Your $20 monthly Bitcoin buy will eventually be worth $100, then $1,000, then $10,000. After a couple of decades, it'll be worth $1M+. Don't make excuses for not taking action. Take the small steps. Your future self will be thankful.