Micael
NOSTR ONLY
If you don't live for something, you’ll die for nothing.
Mission: DESTROY CENTRAL BANKS
But in order to achieve this goal, bankers redefined the word money to mean the opposite of money: credit/debt. This is like calling a night a day or evil a good.
Bank-notes are not money. It 's currency. It’s unfair to take banks' currency as a standard for comparison.
Bank-note currency is not “lawful money”. It never could be counted as part of banks cash reserves. It would be too much like a man writing and signing his own promissory note for a million and then claiming that this made him a millionaire.
The very grave evils any currency depreciation always impose upon businesses and the people.
Alfred Owen Crozier, US Money vs Corporate currency, 1912
He runs his node in silence,
behind encrypted walls and firewalled tunnels,
but his presence is felt.
Every block he validates is a quiet, unbreakable statement:
truth requires no permission.
Loading preview...
Kind: 30023
Not as speculation, but as infrastructure.
A last bastion of voluntary cooperation —
of value without authority.
Loading preview...
Kind: 30023
Bitcoin is the Sennholzian underground economy, operating at global scale, with a fixed monetary policy that no emergency session of any legislature can amend. It not only is foundation for a parallel economic system but is the biggest opportunity that sovereign individuals have at conducting commerce peer to peer outside of the fiat system, which will soon be a node in the Palantir world order.
Loading preview...
Kind: 30023
The Underground Economy written in 1984 , the year Orwell chose for his dystopia, not coincidentally, Sennholz documented a phenomenon that governments have always found both maddening and inexhaustible: the underground economy. His central observation deserves to be read as prophecy. "The underground economy," he wrote, "is as old as government itself. It springs from human nature that makes man choose between given alternatives. Facing the agents of government and their exactions, man will weigh the alternatives and may choose to go underground." Every tightening of the regulatory vise, every new layer of taxation and surveillance, every additional mandate layered onto productive human activity, produced the same result: a compensatory expansion of the shadow economy operating beyond the state's line of sight. The underground did not defy human nature. It expressed it.
Loading preview...
Kind: 30023
First a crisis is identified or manufactured, a solution is proposed by the very parties who will benefit from it, the solution is framed in the language of national interest and public safety, and the resulting institution becomes a permanent extraction mechanism answerable to no democratic constituency. The Federal Reserve Act of 1913 was passed because the panic of 1907 had demonstrated, its architects argued, that the nation required a "lender of last resort," a stabilizing institution that would protect ordinary Americans from financial ruin.
Loading preview...
Kind: 30023
What is conspicuously absent is any discussion of what people are for, what they are permitted to want, or how they might live outside the system's requirements. It is, to borrow Viktor Shvets' meteorological borrowing, a Fujiwara Effect; multiple hurricanes of control converging into a single, cataclysmic system: the debt crisis requiring financial repression, the security apparatus requiring data integration, the AI arms race requiring permanent militarized research infrastructure, all spiraling together into something that looks, from close enough, merely like governance.
Loading preview...
Kind: 30023
His gamble was that the revelation of these unconstitutional mass surveillance programs would trigger so much public outrage that they would become political hot potatoes and ultimately be shut down. He sacrificed his career and his freedom on that bet and he lost it. Following brief periods of outrage and minor legislative tweaks, the surveillance apparatus returned to its status quo, with data flows remaining uninterrupted and contractors maintaining their access. This outcome demonstrated that public approval is unnecessary once a population has been conditioned into a state of learned helplessness through decades of propaganda regarding security tradeoffs
Loading preview...
Kind: 30023
The 2013 revelations by Edward Snowden provided irrefutable evidence of what had long been dismissed as mere conspiracy theory; which is that the US government, alongside allied intelligence services and major tech firms, had built a global surveillance network of staggering proportions. Programs such as PRISM, XKeyscore, MUSCULAR, and Boundless Informant represented industrial-grade systems designed for the mass harvesting of email content, phone metadata, location records, and browsing histories from hundreds of millions of unsuspecting individuals who had committed no crime and attracted no specific suspicion. Snowden's objective was not to embarrass the NSA, but rather a gamble on the power of an informed public to demand democratic accountability.
Loading preview...
Kind: 30023
However, based on the principles articulated in this manifesto, and the furore it has generated online, it seems evident that the world they envision is not one where most people (myself included) would want to live in. It paints a dystopian vision of a technofascist society that will arise out of the complete replacement of democracy with technocracy. This manifesto is merely a roadmap for manufacturing consent for the permanent surveillance state they intend to build and profit from.
Loading preview...
Kind: 30023
tokenization is not just a technical fallacy: it is a tool designed to perpetuate the hyper-leverage of the fiat system and establish a model of absolute surveillance and control.
From the perspective of systems architecture, economic history, and institutional law, RWA tokenization is not just a technical fallacy: it is a tool designed to perpetuate the hyper-leverage of the fiat system and establish a model of absolute surveillance and control.
tokenization is not just a technical fallacy: it is a tool designed to perpetuate the hyper-leverage of the fiat system and establish a model of absolute surveillance and control.
From the perspective of systems architecture, economic history, and institutional law, RWA tokenization is not just a technical fallacy: it is a tool designed to perpetuate the hyper-leverage of the fiat system and establish a model of absolute surveillance and control.
So, the 1984 Index appears during major political crises, as sales of this book skyrocket.
Edward Snowden reveals CIA surveillance programs to the world. Year 2013: book sales jump 7000%.
Donald Trump takes office in 2017: sales go through the roof.
Russia–Ukraine War (2022): in Russia, sales of this great book surge again.
Loading preview...
Kind: 30023
Assuming, hypothetically and against all evidence, that the idea was even remotely feasible - fortunately there will never be enough consensus to activate this soft-fork - it would be an extremely dangerous precedent. Today we freeze for the quantum "emergency" - entirely nonexistent and fueled by irrational fear and economic interests. Tomorrow for what? For dormant UTXOs that risk destabilizing the market? For those linked to OFAC-sanctioned addresses? For the funds of a failed exchange that need to be redistributed fairly? Once the network accepts the principle, the list of good reasons for introducing arbitrary rules grows on its own. Those who know the history of civil liberties know how this ends: emergency rules remain, emergencies pass.
Assuming, hypothetically and against all evidence, that the idea was even remotely feasible - fortunately there will never be enough consensus to activate this soft-fork - it would be an extremely dangerous precedent. Today we freeze for the quantum "emergency" - entirely nonexistent and fueled by irrational fear and economic interests. Tomorrow for what? For dormant UTXOs that risk destabilizing the market? For those linked to OFAC-sanctioned addresses? For the funds of a failed exchange that need to be redistributed fairly? Once the network accepts the principle, the list of good reasons for introducing arbitrary rules grows on its own. Those who know the history of civil liberties know how this ends: emergency rules remain, emergencies pass.
The social credit system does not require a single authoritarian decree. It requires that financial transactions be attributable, that internet sessions be authenticated, that identity be the precondition for participation in digital life. Each piece is being built separately, justified separately, normalised separately. The integration is the last step and it is much easier than the construction, because by then each piece will already be load-bearing infrastructure that nobody can afford to remove.
If you believe that, well you probably believe that Covid came from eating bat soup from a Wuhan wet market. The truth is that this has absolutely nothing to do with child safety. Just in case you hadn’t realized, this app is a key component of the digital ID surveillance infrastructure being built under the guise of a child safety costume, and we have seen this exact playbook before.
The US periodically targeted this infrastructure. Kinetic strikes in mid-2025, officially framed as hitting nuclear enrichment facilities, appear to have had a secondary effect: Iran's Bitcoin hashrate dropped by 77% in the months following, falling from roughly 9 exahashes per second to 2. Whether that was deliberate targeting of energy-to-money infrastructure or collateral damage from disrupted power grids is a matter of debate. But the implication is worth examining: if true, the US military was treating Bitcoin mining capacity as a legitimate theater of war.
Washington had run this playbook before: financial pressure creates political pressure, political pressure creates regime change, regime change creates compliance.
The legacy system realized that if it could not beat the network, it must buy it, financialize it, and control the narrative
warfare. We are now entering the final battle: a massive, coordinated psychological operation
Do not let them steal the greatest financial revolution of our lifetime through narrative warfare. You must become an active participant in this story. The code remains open-source, the cryptography holds firm, and the network is still maintained by thousands of defiant, independent nodes.
Why does the traditional financial system desperately want Bitcoin to be classified solely as an asset, property, or digital gold?
Why does the traditional financial system desperately want Bitcoin to be classified solely as an asset, property, or digital gold? Because treating it strictly as a speculative commodity effectively castrates its utility as money.
Why does the traditional financial system desperately want Bitcoin to be classified solely as an asset, property, or digital gold? Because treating it strictly as a speculative commodity effectively castrates its utility as money.
Why does the traditional financial system desperately want Bitcoin to be classified solely as an asset, property, or digital gold? Because treating it strictly as a speculative commodity effectively castrates its utility as money.
Satoshi Nakamoto, the pseudonymous creator of Bitcoin, registered his birthday as April 5, 1975, on his P2P Foundation profile. Many think that he chose this date because on that same day in 1933
Mark Zuckerberg and Facebook represent the most disturbing intersection of consumer tech and intelligence agencies. The official version cites a network created in a Harvard dorm. However, the timeline suggests something more complex.
Loading preview...
Kind: 30023
As the financial system cracks and gold soars, Bitcoin suffers from artificial price suppression and coordinated media attacks. It's time to abandon institutional custody and regain sovereignty.
As the financial system cracks and gold soars, Bitcoin suffers from artificial price suppression and coordinated media attacks. It's time to abandon institutional custody and regain sovereignty.
As the financial system cracks and gold soars, Bitcoin suffers from artificial price suppression and coordinated media attacks. It's time to abandon institutional custody and regain sovereignty.
As the financial system cracks and gold soars, Bitcoin suffers from artificial price suppression and coordinated media attacks. It's time to abandon institutional custody and regain sovereignty.
As the financial system cracks and gold soars, Bitcoin suffers from artificial price suppression and coordinated media attacks. It's time to abandon institutional custody and regain sovereignty.
As the financial system cracks and gold soars, Bitcoin suffers from artificial price suppression and coordinated media attacks. It's time to abandon institutional custody and regain sovereignty.
As the financial system cracks and gold soars, Bitcoin suffers from artificial price suppression and coordinated media attacks. It's time to abandon institutional custody and regain sovereignty.
As the financial system cracks and gold soars, Bitcoin suffers from artificial price suppression and coordinated media attacks. It's time to abandon institutional custody and regain sovereignty.
“I spent 33 years and four months in active military service and during that period I spent most of my time as a high class muscle man for Big Business, for Wall Street and the bankers. In short, I was a racketeer, a gangster for capitalism.” - Major General Smedley Butler, USMC (1935)
Loading preview...
Kind: 30023
I swear by my life and my love of it that I will never work for a currency that another man can create out of thin air, nor ask another man to do the same.
Loading preview...
Kind: 30023
This is not an argument against vigilance. Organizations should still vet members, should still pay attention when someone's story does not add up, should still refuse to tolerate the aggressive and divisive behavior that documented infiltrators have consistently displayed. The point is that these measures are a second line of defense, not the primary one. The primary defense is structural: build so that even successful infiltration cannot achieve its objectives.
Loading preview...
Kind: 30023
The cypherpunk tradition offers a different framework for thinking about the infiltration problem, one that begins by accepting the presence of adversaries as a design constraint rather than a failure to be prevented. Eric Hughes wrote in A Cypherpunk's Manifesto that "we cannot expect governments, corporations, or other large, faceless organizations to grant us privacy," and the same logic applies to organizational security. The goal is not to achieve perfect exclusion of adversaries but to build systems where their presence cannot accomplish its purpose.
Loading preview...
Kind: 30023
These cases point toward a fundamental asymmetry that detection-focused security culture cannot overcome. The state can afford to be patient, to invest years in building cover, to provide resources and training that make their agents useful to the organizations they infiltrate. The activist trying to spot the spy, by contrast, has only suspicion and intuition to work with. The standard advice to watch for inconsistencies in background stories, unexplained access to resources, or eagerness to push toward illegal activity is not wrong, but it fails against the competent infiltrator who has been coached to avoid exactly these tells. Worse, a detection-obsessed culture breeds the paranoia that COINTELPRO documents explicitly sought to create. An FBI memo from 1970 advised agents to encourage "the impression that there is an FBI agent behind every mailbox" because the resulting suspicion and internal conflict would do more damage than any individual informant. When movements consume themselves with accusations and counter-accusations, the state wins without lifting a finger.
Loading preview...
Kind: 30023
The FBI's COINTELPRO program, which officially operated from 1956 to 1971 but whose tactics continued long after its formal termination, placed informants inside virtually every significant dissident movement of its era. The Black Panthers, the antiwar movement, the civil rights organizations, the socialist parties, and the environmental groups all discovered, often too late, that trusted members had been reporting to handlers throughout. The Church Committee investigation revealed not merely passive surveillance but active provocation: forged documents designed to create internal splits, anonymous letters spreading rumors about leaders, and agents deliberately encouraging illegal activity to justify prosecution. When FBI assistant director William Sullivan testified about these tactics, he was blunt about the operational mindset: "No holds were barred. We have used these techniques against Soviet agents. They have used them against us. We did not differentiate."
Loading preview...
Kind: 30023
Every dissident organization eventually wonders whether it has been infiltrated, and the honest answer is that it probably has been, or will be, or would be if it ever became effective enough to matter. The documented history of state counterintelligence programs reveals an uncomfortable truth that no detection checklist can fully address: when the state decides to penetrate an organization, it brings resources, training, and patience that most targets cannot match. The more important question is not how to spot the spy but how to build structures that render the spy's presence futile.
Loading preview...
Kind: 30023
the Internet was, from its inception, a military weapon. It did not originate with California hippies, but with the Pentagon during the Vietnam War.
Loading preview...
Kind: 30023
When analyzing the history of the so-called “Magnificent Seven” and their founders, a pattern emerges that is far removed from free-market capitalism
Loading preview...
Kind: 30023
Oiréis a la gente en Nostr decir que “el algoritmo somos nosotros”. Hay algo muy poderoso en esa frase: nos hace dueños de las cosas que pasan por nuestros ojos, pero también nos convierte en el filtro curatorial de la gente que nos sigue
The narrative of the “solitary genius in the garage” is perhaps the most effective public relations tool of the last century.
Loading preview...
Kind: 30023
The taxpayers payed the for R&D of decades, while Apple privatized the rewards, packaging military technology into a sleek design to extract what Yanis Varoufakis calls “feudal rents” via the App Store. Typical parasitic behavior
Loading preview...
Kind: 30023
This romantic story, where pure innovation and the free market reward brilliant young college dropouts with trillion-dollar empires, serves as a perfect smoke screen.
Loading preview...
Kind: 30023
The narrative of the "solitary genius in the garage" is perhaps the most effective public relations tool of the last century. This romantic story, where pure innovation and the free market reward brilliant young college dropouts with trillion-dollar empires, serves as a perfect smoke screen. By focusing attention on a supposed individual meritocracy, this myth obscures the immense state, military, and intelligence machinery that served as the foundation, financier, and protector of what we now know as "Big Tech".
Loading preview...
Kind: 30023
The narrative of the "solitary genius in the garage" is perhaps the most effective public relations tool of the last century. This romantic story, where pure innovation and the free market reward brilliant young college dropouts with trillion-dollar empires, serves as a perfect smoke screen. By focusing attention on a supposed individual meritocracy, this myth obscures the immense state, military, and intelligence machinery that served as the foundation, financier, and protector of what we now know as "Big Tech".
Loading preview...
Kind: 30023
The “Educational Industry” fulfilled its objective with terrifying efficiency. It did not create free thinkers; it created interchangeable parts for a machine most people no longer understand.
Loading preview...
Kind: 30023
The "Educational Industry" fulfilled its objective with terrifying efficiency. It did not create free thinkers; it created interchangeable parts for a machine most people no longer understand.
Loading preview...
Kind: 30023