Avatar
ᶠᶸᶜᵏᵧₒᵤ!🫵🏼
2961ddb173cd61dbddb61e9b80477de7010f5bc38e79fe242a22be97d459723e
☕️ #coffeechain ⚡️bitchat geohash 👉🏼 #21m #mempool junkie Buy me a beer @ 1nostr5HAT9JLjNQDJGgNhJDjo1df9j2d

History made today #bitaxe #solominer #solopool #ckpool #plebchain block found

#crowdstrike #outage #bug

The image appears to be a Windows kernel crash dump analysis screenshot. It indicates an "Access Violation" error (Exception Code: c0000005) occurred within a process named "System." This type of error typically happens when a program tries to read or write to a memory location that it doesn't have permission to access.

Here's a breakdown of some key details from the image:

* **Exception Record:** A data structure containing information about the exception.

* **Exception Address:** The memory address where the exception occurred (fffff8021df335a1).

* **Exception Code:** The code representing the type of exception (c0000005, Access Violation).

* **Context:** The state of the processor registers at the time of the exception.

* **Process Name:** The name of the crashed process ("System").

* **Read Address:** The memory address that the process was trying to read from (000000000000009c).

* **Error Code (NTSTATUS):** The Windows status code for the error (0xc0000005).

* **Stack Text:** A portion of the call stack at the time of the crash, showing the sequence of function calls leading up to the exception.

The analysis also mentions several "Blackbox" entries (BLACKBOXBSD, BLACKBOXNTFS, BLACKBOXPNP, BLACKBOXWINLOGON), which suggest that additional troubleshooting tools may have been used to gather more information about the crash.

This crash dump analysis indicates a critical error within a core system process. Various factors, such as faulty hardware, driver issues, or conflicts between software components, could cause this error. Further investigation would be needed to pinpoint the exact cause and resolve the problem.

Wow this company support sucks dingleberries. Their telegram is full of issues and complaints but no support. Trash. Lunch on me 🖕🏼#plebchain

#bitcoin #gm #nostr #coffeechain ☕

Anyone else mark this on their astrology charts?

slightly high mg and it has the little flavor gusher that jizz when you bite it

Contrasting Assassination Attempts: Donald Trump vs. Ronald Reagan

Information Dissemination

Ronald Reagan (1981)

- Primary Sources: Television and radio were the main sources of breaking news. Newspapers provided detailed reports the following day.

- Speed of News: Information spread relatively slowly, with updates provided during scheduled news broadcasts.

- Control Over Information: Limited to a few major news networks and agencies, resulting in a more controlled and uniform narrative.

- Public Reaction: The delay in information allowed for a more measured public response, with fewer immediate reactions and speculations.

Donald Trump (2024)

- Primary Sources: Social media platforms (Twitter, Facebook, Instagram) and online news websites dominate. Cable news channels also provide real-time coverage.

- Speed of News: Near-instantaneous updates, with live-streaming capabilities and push notifications keeping the public informed in real-time.

- Control Over Information: Decentralized and less controlled, with a plethora of sources providing varying perspectives, including conspiracy theories and misinformation.

- Public Reaction: Immediate and often polarized reactions due to the rapid spread of information and the ability for anyone to share their opinion instantly.

Access to Video Information

Ronald Reagan (1981)

- Availability: Limited video footage, primarily from professional news cameras and later archived for public viewing.

- Quality: Standard definition, often grainy and not as clear as modern footage.

- Distribution: Video clips were broadcast during news programs and later shared through VHS tapes or archival footage.

- Impact: The limited availability and lower quality of video footage meant fewer people saw the event as it unfolded, reducing the immediate impact.

Donald Trump (2024)

- Availability: Abundant footage from various sources, including security cameras, smartphones, and social media live streams.

- Quality: High-definition and even 4K resolution, providing clear and detailed visuals.

- Distribution: Instantly shared across social media platforms, news websites, and streaming services, reaching a global audience within minutes.

- Impact: The widespread availability and high quality of footage mean that more people witness the event in real-time, increasing its immediate impact and the spread of reactions.

Information Gathering

Ronald Reagan (1981)

- Methods: Reliance on professional journalists, law enforcement reports, and official press releases.

- Speed: Slower due to the manual process of gathering and verifying information before dissemination.

- Accuracy: Generally high, as information was thoroughly vetted before being released to the public.

- Public Trust: Higher trust in the information provided by established news organizations and government sources.

Donald Trump (2024)

- Methods: Diverse sources including citizen journalism, social media posts, live streams, and professional journalists.

- Speed: Extremely fast, with real-time updates and the ability for anyone to share information instantly.

- Accuracy: Varied, with a mix of accurate reports and misinformation, requiring the public to discern credibility.

- Public Trust: Lower trust due to the prevalence of misinformation and the fragmented media landscape.

Summary

- Reagan's Era: Information dissemination was slower, more controlled, and led to a more measured public response with higher trust in the media.

- Trump's Era: Information spreads instantaneously, is less controlled, and leads to immediate and often polarized public reactions with varying levels of trust in the information provided.

#plebchain #tldr

This is the formula to calculate the total supply of Bitcoin that will ever exist. Let's break it down in simple terms:

• Σ (Sigma): This symbol means "summation," indicating that we'll be adding up a series of values.

• i = 0 to 32: This tells us the range of values for 'i' that we'll use in the calculation. We start at 0 and go up to 32.Essentially, this represents 33 cycles of Bitcoin mining, with each cycle lasting about four years.

• 210,000: This is the number of blocks mined in each cycle. A block is a group of Bitcoin transactions that are verified and added to the blockchain (the public record of all Bitcoin transactions).

• 50 / 2^i: This part calculates the block reward for each cycle.

• In the first cycle (i = 0), the block reward is 50 Bitcoins.

• In the second cycle (i = 1), the block reward is halved to 25 Bitcoins.

• This halving continues with each cycle, gradually decreasing the rate at which new Bitcoins are created.

In summary:

The formula calculates the total Bitcoin supply by adding up the number of Bitcoins created in each of the 33 cycles. The number of Bitcoins created in each cycle is found by multiplying the number of blocks mined (210,000) by the block reward for that cycle, which is halved with each successive cycle.

ELI5 #silentpayments

Imagine Bitcoin as digital cash that exists only online. It's like the money in your bank account, but instead of a bank controlling it, it's controlled by a network of computers worldwide.

Now, when you make a payment with regular Bitcoin, it's like writing a check. Everyone can see who sent the money, who received it, and how much was sent.

Silent Payments are a new way to use Bitcoin that's like paying with cash in an envelope. No one can see who sent the money or who received it, just like how no one can see who's paying who when you hand someone an envelope of cash.

Here's how it works behind the scenes:

* Special Address: You have a special Bitcoin address for silent payments. It's like a P.O. Box, not your home address.

* Hidden Identity: When someone wants to send you money, they don't send it directly to your special address. Instead, they use a bit of math magic to create a one-time-use address that's linked to your special address but doesn't reveal it.

* Secret Delivery: The money is sent to the one-time-use address, which then secretly forwards it to your special address. No one can see the connection between the two.

* Private Wallet: Your Bitcoin wallet, where you store your Bitcoins, knows how to handle silent payments and keep your identity hidden.

Think of it like a secret code that only you and your wallet know. It keeps your Bitcoin transactions private and secure, just like paying with cash.

In evaluating decisions made in high-pressure protective scenarios, it's crucial to understand the complex factors at play. Having served at @usmc I urge a nuanced perspective beyond simplistic armchair analysis.

When questioning why a protective action wasn't taken, consider the chain of command. Protection often involves multiple agencies, where the person on the ground may not have the authority to act independently. Decisions that seem obvious in hindsight are often fraught with unknowns in the moment.

It's easy to judge with the benefit of time and full information. However, those making the call rarely have the same situational awareness as those on the ground. Information relayed over radio, potentially from individuals who've just met, introduces an element of uncertainty. The decision-maker must trust that the information is accurate while weighing potential risks.

For agencies like the Secret Service, extended periods of peace can create a false sense of security. Training for hypothetical scenarios can never fully replicate real-world events. Without the experience of actual threats, complacency can set in, leading to suboptimal responses in critical situations.

The adequacy of training is another crucial factor. Budget cuts often impact training programs, which can be challenging to justify when incidents are rare. Understanding the extent and quality of training is key to assessing preparedness.

Lastly, the current climate, where law enforcement officers face scrutiny for their actions, undoubtedly impacts decision-making. The fear of legal repercussions can lead to hesitation or inaction, even when justified.

Blaming individuals for their actions or inactions ignores the broader context we've collectively created. Defunding the police, political polarization, and other societal factors contribute to a complex landscape where simple solutions are elusive.

To truly address these issues, we must ask deeper questions, seeking root causes rather than surface-level explanations. Only then can we develop effective solutions to prevent future incidents. #gm #nostr #plebchain

They didn’t get the memo 🤣🤦🏻 #gm #nostr #plebchain #djt