Avatar
Diyana
2f52b19fe1408f69ee0e909ed8fcac138c5f370c05de24f0d8370ada79752323
Seer Coherence Steward Systems Cartographer Energetic Forensics Investigator Source Code Gatekeeper (of Organic Life on Earth)
Replying to Avatar Max

I finished the second version of my book!

## The Praxeology of Privacy

### Economic Logic in Cypherpunk Implementation

Austrian economists theorize but cannot build. Cypherpunks build but lack theory. This book synthesizes both traditions into a unified strategy for making the state irrelevant.

Three axioms. Twenty-one chapters. One conclusion: cheap defense defeats expensive attack. When theft becomes unprofitable, the state withers.

Public Domain. v0.2.0. Published on Nostr.

Thanks a lot to Stephan Kinsella and Eric Voskuil for their tough feedback on the first version, please join them in demolishing the logic of this second edition and help me make the arguments better!

---

Table of Contents

Preface

Austrian economists theorize but cannot build. Cypherpunks build but lack theory. This book synthesizes both to make the state irrelevant.

nostr:naddr1qqgrvvpjx33kgvtrxgen2vfcvcurjqgwwaehxw309ahx7uewd3hkctczyzm7669svt0xkjsju50a22zurc0qa589z2xd4yatzx6p2z64a5e0cqcyqqq823cwhph63

Part I: Introduction

Chapter 1: The Nature of Privacy

Privacy is selective disclosure, not hiding. Breaking adversary observation through the OODA loop is strategic defense. Cheap privacy defeats expensive surveillance.

nostr:naddr1qqgxvdpc8pjrywryxv6nwv3kxsungqgwwaehxw309ahx7uewd3hkctczyzm7669svt0xkjsju50a22zurc0qa589z2xd4yatzx6p2z64a5e0cqcyqqq823cmtv33p

Chapter 2: Two Traditions, One Conclusion

Austrian economics and cypherpunk practice converge independently on privacy's importance. Theory explains why; code demonstrates how. This book synthesizes both traditions.

nostr:naddr1qqgxzctpxvenverrx93rwv35v3snzqgwwaehxw309ahx7uewd3hkctczyzm7669svt0xkjsju50a22zurc0qa589z2xd4yatzx6p2z64a5e0cqcyqqq823c4p7jlc

Part II: Philosophical Foundations

Chapter 3: The Action Axiom

The Action Axiom proves privacy is structural to human action. Deliberation is internal; preferences are subjective; information asymmetry is inherent.

nostr:naddr1qqgxyvecvgexvcnzxyekvefkxvukxqgwwaehxw309ahx7uewd3hkctczyzm7669svt0xkjsju50a22zurc0qa589z2xd4yatzx6p2z64a5e0cqcyqqq823c83cqzs

Chapter 4: The Argumentation Axiom

Argumentation ethics demonstrates self-ownership through performative contradiction. Denying it while arguing presupposes it. Privacy rights follow directly from self-ownership.

nostr:naddr1qqgxvcfhx5unjdpk8quxxdp3xvcrsqgwwaehxw309ahx7uewd3hkctczyzm7669svt0xkjsju50a22zurc0qa589z2xd4yatzx6p2z64a5e0cqcyqqq823c3n4fxz

Chapter 5: The Axiom of Resistance

The Axiom of Resistance assumes systems can resist control. Mathematics, empirical evidence, and similar systems support this well-grounded but non-self-evident assumption.

nostr:naddr1qqgrgvmrxfjxgvmpxg6nqvt9xuurwqgwwaehxw309ahx7uewd3hkctczyzm7669svt0xkjsju50a22zurc0qa589z2xd4yatzx6p2z64a5e0cqcyqqq823c2v0h9m

Part III: Economic Foundations

Chapter 6: Information, Scarcity, and Property

Information is non-scarce and cannot be property. Privacy is protected through self-ownership, physical property rights, and voluntary contracts, not intellectual property.

nostr:naddr1qqgx2dr9vv6kgwf5xe3ngdee8y6nzqgwwaehxw309ahx7uewd3hkctczyzm7669svt0xkjsju50a22zurc0qa589z2xd4yatzx6p2z64a5e0cqcyqqq823cgpp3hh

Chapter 7: Exchange Theory and Privacy

Privacy enhances exchange by protecting deliberation and enabling negotiation. Surveillance distorts prices and chills transactions. Better privacy means better functioning markets.

nostr:naddr1qqgrsdfcv5mx2vmxxe3nzvf4xqmxzqgwwaehxw309ahx7uewd3hkctczyzm7669svt0xkjsju50a22zurc0qa589z2xd4yatzx6p2z64a5e0cqcyqqq823c4hcvgf

Chapter 8: Capital Theory and Entrepreneurship

Privacy infrastructure is capital requiring present sacrifice for future capability. Entrepreneurial discovery drives innovation. Markets coordinate heterogeneous privacy tools most effectively.

nostr:naddr1qqgxgdeev5ckzer9xy6rvwpnxyukvqgwwaehxw309ahx7uewd3hkctczyzm7669svt0xkjsju50a22zurc0qa589z2xd4yatzx6p2z64a5e0cqcyqqq823cxcc5c2

Chapter 9: Monetary Theory and Sound Money

Sound money emerges spontaneously from markets, not decrees. Bitcoin implements digital soundness with fixed supply and censorship resistance; privacy requires additional tools.

nostr:naddr1qqgxgwf3xqensef5vvcrvcfs8yuxxqgwwaehxw309ahx7uewd3hkctczyzm7669svt0xkjsju50a22zurc0qa589z2xd4yatzx6p2z64a5e0cqcyqqq823ceca8xr

Part IV: The Adversary

Chapter 10: Financial Surveillance and State Control

Financial surveillance enables state control through observation. CBDCs complete the architecture. Privacy breaks the OODA loop at observation, making theft unprofitable.

nostr:naddr1qqgrsdmpvv6n2wfhv5ervdmpxa3kxqghwaehxw309aex2mrp0yh8qunfd4skctnwv46z7q3qklkk3vrzme455yh9rl2jshq7rc8dpegj3ndf82c3ks2sk40dxt7qxpqqqp65wcwwf6m

Chapter 11: Corporate Surveillance and Data Extraction

Corporate surveillance extracts behavioral data for prediction products. State and corporate surveillance are deeply entangled. Markets are responding to growing privacy demand.

nostr:naddr1qqgrydekxumxvvm9xp3n2vtr89jrxqgwwaehxw309ahx7uewd3hkctczyzm7669svt0xkjsju50a22zurc0qa589z2xd4yatzx6p2z64a5e0cqcyqqq823cduqmxa

Chapter 12: The Crypto Wars

The Crypto Wars pit states against privacy technology. Mathematics ignores legislation. Developers face prosecution. The fundamental conflict is permanent and intensifying.

nostr:naddr1qqgxycfjvyck2vrpxvunycfcxsuk2qgwwaehxw309ahx7uewd3hkctczyzm7669svt0xkjsju50a22zurc0qa589z2xd4yatzx6p2z64a5e0cqcyqqq823cwnenzp

Part V: Technical Implementation

Chapter 13: Cryptographic Foundations

Cryptography provides mathematical privacy foundations: encryption, hashing, and digital signatures enable trustless verification. Implementation bugs and human error remain the weakest links.

nostr:naddr1qqgxzdt9xcexvef5v3jrsefexsunzqgwwaehxw309ahx7uewd3hkctczyzm7669svt0xkjsju50a22zurc0qa589z2xd4yatzx6p2z64a5e0cqcyqqq823c94u5pd

Chapter 14: Anonymous Communication Networks

The internet leaks metadata. VPNs help locally. Tor distributes trust through relays. Mixnets defeat global adversaries. Choose tools matching your threat model.

nostr:naddr1qqgrydphv9nrgcfcxg6ryvrzx56kzqgwwaehxw309ahx7uewd3hkctczyzm7669svt0xkjsju50a22zurc0qa589z2xd4yatzx6p2z64a5e0cqcyqqq823cvp8fcy

Chapter 15: Bitcoin: Resistance Money

Bitcoin solves double-spending without trusted third parties. Sound money enforced by code. Base layer privacy requires additional tools like Lightning and coinjoin.

nostr:naddr1qqgrwv33xvenvdnyxc6ngv3hv5mxxqgwwaehxw309ahx7uewd3hkctczyzm7669svt0xkjsju50a22zurc0qa589z2xd4yatzx6p2z64a5e0cqcyqqq823c4qzyqz

Chapter 16: Zero-Knowledge Proofs

Zero-knowledge proofs enable verification without disclosure. SNARKs, STARKs, and Bulletproofs make different tradeoffs. Deployed in Zcash and rollups; broader adoption developing.

nostr:naddr1qqgrjd33vvcxyv3kvyurydfexscrgqghwaehxw309aex2mrp0yh8qunfd4skctnwv46z7q3qklkk3vrzme455yh9rl2jshq7rc8dpegj3ndf82c3ks2sk40dxt7qxpqqqp65we3mut9

Chapter 17: Decentralized Social Infrastructure

Nostr solves identity capture through cryptographic keys users control. Relays compete, moderation is market-driven, and the protocol extends beyond social posts.

nostr:naddr1qqgrsdrxveskgvrzv3nrgdmrvcmkvqghwaehxw309aex2mrp0yh8qunfd4skctnwv46z7q3qklkk3vrzme455yh9rl2jshq7rc8dpegj3ndf82c3ks2sk40dxt7qxpqqqp65wpx3yl3

Part VI: Praxis

Chapter 18: Lessons from History

DigiCash, e-gold, and Silk Road failed through centralization and poor OPSEC. Bitcoin succeeded through decentralization, open source, and properly aligned economic incentives.

nostr:naddr1qqgxydmpv56nqefnv4jnwepcxdjx2qghwaehxw309aex2mrp0yh8qunfd4skctnwv46z7q3qklkk3vrzme455yh9rl2jshq7rc8dpegj3ndf82c3ks2sk40dxt7qxpqqqp65wm4wp04

Chapter 19: Operational Security

Operational security prevents adversaries from gathering compromising information. Threat modeling guides defense. Human factors are the weakest link. Perfect OPSEC is impossible.

nostr:naddr1qqgrxep3vscrzc3kxyenqdpex9jnzqghwaehxw309aex2mrp0yh8qunfd4skctnwv46z7q3qklkk3vrzme455yh9rl2jshq7rc8dpegj3ndf82c3ks2sk40dxt7qxpqqqp65wyp98rv

Chapter 20: Implementation Strategy

Start with honest assessment. Build progressively from basics to advanced. Find community. Privacy is not a destination but ongoing practice. Progress matters.

nostr:naddr1qqgxvdtyx43nwvmxvcckgerx8qmnvqghwaehxw309aex2mrp0yh8qunfd4skctnwv46z7q3qklkk3vrzme455yh9rl2jshq7rc8dpegj3ndf82c3ks2sk40dxt7qxpqqqp65wmuawxl

Chapter 21: Building the Parallel Economy

The parallel economy grows through counter-economics. Cheap defense defeats expensive attack. When theft becomes unprofitable, the state withers. Build. Trade. Resist.

nostr:naddr1qqgxxefj89nrxvtrxcerxvfs8q6xvqghwaehxw309aex2mrp0yh8qunfd4skctnwv46z7q3qklkk3vrzme455yh9rl2jshq7rc8dpegj3ndf82c3ks2sk40dxt7qxpqqqp65wat25hx

I am like "I need someone to read this for me on audio... Or I'm gonna have to record myself reading it for others".... Just recorded myself reading chapter one (not without a couple hickups, and mostly in the way that helps my own comprehension). If I could figure out where to upload you can listen and let me know if I should record reading the rest.

This is material highly relevant to what I am investigating and building... I'm adding another bridge to the equation nostr:nprofile1qqst0mtgkp3du662ztj3l4fgts0purksu5fgek5n4vgmg9gt2hkn9lqppemhxue69uhkummn9ekx7mp0qythwumn8ghj7un9d3shjtnp0faxzmt09ehx2ap08pu8g0 and would love to connect soon and share. I expect it to be an evolving body of work and protective sanctuary for all looking to participate in building the parallel societies.

Here's a screenshot of a lil section of the document I just completed working on yesterday.

nostr:nevent1qqsx7y0m5hwtf9xprhejay64yegerpql69gxzwgdjkwzhf0xlxh72dcpzemhxue69uhhyetvv9ujuurjd9kkzmpwdejhgq3qklkk3vrzme455yh9rl2jshq7rc8dpegj3ndf82c3ks2sk40dxt7qxpqqqqqqzsexagm

Replying to Avatar Max

I finished the second version of my book!

## The Praxeology of Privacy

### Economic Logic in Cypherpunk Implementation

Austrian economists theorize but cannot build. Cypherpunks build but lack theory. This book synthesizes both traditions into a unified strategy for making the state irrelevant.

Three axioms. Twenty-one chapters. One conclusion: cheap defense defeats expensive attack. When theft becomes unprofitable, the state withers.

Public Domain. v0.2.0. Published on Nostr.

Thanks a lot to Stephan Kinsella and Eric Voskuil for their tough feedback on the first version, please join them in demolishing the logic of this second edition and help me make the arguments better!

---

Table of Contents

Preface

Austrian economists theorize but cannot build. Cypherpunks build but lack theory. This book synthesizes both to make the state irrelevant.

nostr:naddr1qqgrvvpjx33kgvtrxgen2vfcvcurjqgwwaehxw309ahx7uewd3hkctczyzm7669svt0xkjsju50a22zurc0qa589z2xd4yatzx6p2z64a5e0cqcyqqq823cwhph63

Part I: Introduction

Chapter 1: The Nature of Privacy

Privacy is selective disclosure, not hiding. Breaking adversary observation through the OODA loop is strategic defense. Cheap privacy defeats expensive surveillance.

nostr:naddr1qqgxvdpc8pjrywryxv6nwv3kxsungqgwwaehxw309ahx7uewd3hkctczyzm7669svt0xkjsju50a22zurc0qa589z2xd4yatzx6p2z64a5e0cqcyqqq823cmtv33p

Chapter 2: Two Traditions, One Conclusion

Austrian economics and cypherpunk practice converge independently on privacy's importance. Theory explains why; code demonstrates how. This book synthesizes both traditions.

nostr:naddr1qqgxzctpxvenverrx93rwv35v3snzqgwwaehxw309ahx7uewd3hkctczyzm7669svt0xkjsju50a22zurc0qa589z2xd4yatzx6p2z64a5e0cqcyqqq823c4p7jlc

Part II: Philosophical Foundations

Chapter 3: The Action Axiom

The Action Axiom proves privacy is structural to human action. Deliberation is internal; preferences are subjective; information asymmetry is inherent.

nostr:naddr1qqgxyvecvgexvcnzxyekvefkxvukxqgwwaehxw309ahx7uewd3hkctczyzm7669svt0xkjsju50a22zurc0qa589z2xd4yatzx6p2z64a5e0cqcyqqq823c83cqzs

Chapter 4: The Argumentation Axiom

Argumentation ethics demonstrates self-ownership through performative contradiction. Denying it while arguing presupposes it. Privacy rights follow directly from self-ownership.

nostr:naddr1qqgxvcfhx5unjdpk8quxxdp3xvcrsqgwwaehxw309ahx7uewd3hkctczyzm7669svt0xkjsju50a22zurc0qa589z2xd4yatzx6p2z64a5e0cqcyqqq823c3n4fxz

Chapter 5: The Axiom of Resistance

The Axiom of Resistance assumes systems can resist control. Mathematics, empirical evidence, and similar systems support this well-grounded but non-self-evident assumption.

nostr:naddr1qqgrgvmrxfjxgvmpxg6nqvt9xuurwqgwwaehxw309ahx7uewd3hkctczyzm7669svt0xkjsju50a22zurc0qa589z2xd4yatzx6p2z64a5e0cqcyqqq823c2v0h9m

Part III: Economic Foundations

Chapter 6: Information, Scarcity, and Property

Information is non-scarce and cannot be property. Privacy is protected through self-ownership, physical property rights, and voluntary contracts, not intellectual property.

nostr:naddr1qqgx2dr9vv6kgwf5xe3ngdee8y6nzqgwwaehxw309ahx7uewd3hkctczyzm7669svt0xkjsju50a22zurc0qa589z2xd4yatzx6p2z64a5e0cqcyqqq823cgpp3hh

Chapter 7: Exchange Theory and Privacy

Privacy enhances exchange by protecting deliberation and enabling negotiation. Surveillance distorts prices and chills transactions. Better privacy means better functioning markets.

nostr:naddr1qqgrsdfcv5mx2vmxxe3nzvf4xqmxzqgwwaehxw309ahx7uewd3hkctczyzm7669svt0xkjsju50a22zurc0qa589z2xd4yatzx6p2z64a5e0cqcyqqq823c4hcvgf

Chapter 8: Capital Theory and Entrepreneurship

Privacy infrastructure is capital requiring present sacrifice for future capability. Entrepreneurial discovery drives innovation. Markets coordinate heterogeneous privacy tools most effectively.

nostr:naddr1qqgxgdeev5ckzer9xy6rvwpnxyukvqgwwaehxw309ahx7uewd3hkctczyzm7669svt0xkjsju50a22zurc0qa589z2xd4yatzx6p2z64a5e0cqcyqqq823cxcc5c2

Chapter 9: Monetary Theory and Sound Money

Sound money emerges spontaneously from markets, not decrees. Bitcoin implements digital soundness with fixed supply and censorship resistance; privacy requires additional tools.

nostr:naddr1qqgxgwf3xqensef5vvcrvcfs8yuxxqgwwaehxw309ahx7uewd3hkctczyzm7669svt0xkjsju50a22zurc0qa589z2xd4yatzx6p2z64a5e0cqcyqqq823ceca8xr

Part IV: The Adversary

Chapter 10: Financial Surveillance and State Control

Financial surveillance enables state control through observation. CBDCs complete the architecture. Privacy breaks the OODA loop at observation, making theft unprofitable.

nostr:naddr1qqgrsdmpvv6n2wfhv5ervdmpxa3kxqghwaehxw309aex2mrp0yh8qunfd4skctnwv46z7q3qklkk3vrzme455yh9rl2jshq7rc8dpegj3ndf82c3ks2sk40dxt7qxpqqqp65wcwwf6m

Chapter 11: Corporate Surveillance and Data Extraction

Corporate surveillance extracts behavioral data for prediction products. State and corporate surveillance are deeply entangled. Markets are responding to growing privacy demand.

nostr:naddr1qqgrydekxumxvvm9xp3n2vtr89jrxqgwwaehxw309ahx7uewd3hkctczyzm7669svt0xkjsju50a22zurc0qa589z2xd4yatzx6p2z64a5e0cqcyqqq823cduqmxa

Chapter 12: The Crypto Wars

The Crypto Wars pit states against privacy technology. Mathematics ignores legislation. Developers face prosecution. The fundamental conflict is permanent and intensifying.

nostr:naddr1qqgxycfjvyck2vrpxvunycfcxsuk2qgwwaehxw309ahx7uewd3hkctczyzm7669svt0xkjsju50a22zurc0qa589z2xd4yatzx6p2z64a5e0cqcyqqq823cwnenzp

Part V: Technical Implementation

Chapter 13: Cryptographic Foundations

Cryptography provides mathematical privacy foundations: encryption, hashing, and digital signatures enable trustless verification. Implementation bugs and human error remain the weakest links.

nostr:naddr1qqgxzdt9xcexvef5v3jrsefexsunzqgwwaehxw309ahx7uewd3hkctczyzm7669svt0xkjsju50a22zurc0qa589z2xd4yatzx6p2z64a5e0cqcyqqq823c94u5pd

Chapter 14: Anonymous Communication Networks

The internet leaks metadata. VPNs help locally. Tor distributes trust through relays. Mixnets defeat global adversaries. Choose tools matching your threat model.

nostr:naddr1qqgrydphv9nrgcfcxg6ryvrzx56kzqgwwaehxw309ahx7uewd3hkctczyzm7669svt0xkjsju50a22zurc0qa589z2xd4yatzx6p2z64a5e0cqcyqqq823cvp8fcy

Chapter 15: Bitcoin: Resistance Money

Bitcoin solves double-spending without trusted third parties. Sound money enforced by code. Base layer privacy requires additional tools like Lightning and coinjoin.

nostr:naddr1qqgrwv33xvenvdnyxc6ngv3hv5mxxqgwwaehxw309ahx7uewd3hkctczyzm7669svt0xkjsju50a22zurc0qa589z2xd4yatzx6p2z64a5e0cqcyqqq823c4qzyqz

Chapter 16: Zero-Knowledge Proofs

Zero-knowledge proofs enable verification without disclosure. SNARKs, STARKs, and Bulletproofs make different tradeoffs. Deployed in Zcash and rollups; broader adoption developing.

nostr:naddr1qqgrjd33vvcxyv3kvyurydfexscrgqghwaehxw309aex2mrp0yh8qunfd4skctnwv46z7q3qklkk3vrzme455yh9rl2jshq7rc8dpegj3ndf82c3ks2sk40dxt7qxpqqqp65we3mut9

Chapter 17: Decentralized Social Infrastructure

Nostr solves identity capture through cryptographic keys users control. Relays compete, moderation is market-driven, and the protocol extends beyond social posts.

nostr:naddr1qqgrsdrxveskgvrzv3nrgdmrvcmkvqghwaehxw309aex2mrp0yh8qunfd4skctnwv46z7q3qklkk3vrzme455yh9rl2jshq7rc8dpegj3ndf82c3ks2sk40dxt7qxpqqqp65wpx3yl3

Part VI: Praxis

Chapter 18: Lessons from History

DigiCash, e-gold, and Silk Road failed through centralization and poor OPSEC. Bitcoin succeeded through decentralization, open source, and properly aligned economic incentives.

nostr:naddr1qqgxydmpv56nqefnv4jnwepcxdjx2qghwaehxw309aex2mrp0yh8qunfd4skctnwv46z7q3qklkk3vrzme455yh9rl2jshq7rc8dpegj3ndf82c3ks2sk40dxt7qxpqqqp65wm4wp04

Chapter 19: Operational Security

Operational security prevents adversaries from gathering compromising information. Threat modeling guides defense. Human factors are the weakest link. Perfect OPSEC is impossible.

nostr:naddr1qqgrxep3vscrzc3kxyenqdpex9jnzqghwaehxw309aex2mrp0yh8qunfd4skctnwv46z7q3qklkk3vrzme455yh9rl2jshq7rc8dpegj3ndf82c3ks2sk40dxt7qxpqqqp65wyp98rv

Chapter 20: Implementation Strategy

Start with honest assessment. Build progressively from basics to advanced. Find community. Privacy is not a destination but ongoing practice. Progress matters.

nostr:naddr1qqgxvdtyx43nwvmxvcckgerx8qmnvqghwaehxw309aex2mrp0yh8qunfd4skctnwv46z7q3qklkk3vrzme455yh9rl2jshq7rc8dpegj3ndf82c3ks2sk40dxt7qxpqqqp65wmuawxl

Chapter 21: Building the Parallel Economy

The parallel economy grows through counter-economics. Cheap defense defeats expensive attack. When theft becomes unprofitable, the state withers. Build. Trade. Resist.

nostr:naddr1qqgxxefj89nrxvtrxcerxvfs8q6xvqghwaehxw309aex2mrp0yh8qunfd4skctnwv46z7q3qklkk3vrzme455yh9rl2jshq7rc8dpegj3ndf82c3ks2sk40dxt7qxpqqqp65wat25hx

Congrats Max!

Replying to Avatar waxwing

Warning: do NOT use travala.com any more, if you did.

They directly stole my money.

Here is my response to the customer service agent:

(Customer service agent),

> Sorry for the delay, im ahmed from compliance department, for refund or either processing the booking, the verification is a mandatory step, we require the minimum and basic info for that, and you can pass it easily through the following link :

Let's establish the facts: I have been a regular customer of Travala for years, have done probably a hundred or more bookings through your site - mentioning this *not* to claim some status as a customer (which I do not want, and do not have), but to point out that ZERO times on the website or through any of those transactions was it mentioned that you could simply keep my money and provide no service - i.e. STEAL my money - if I did not pass a verification process -handing over extensive and intrusive personal documents - that you never documented anywhere. And indeed for this booking, again, no such advance warning was given.

So you (that is to say Travala, not you personally!) act exactly as a kidnapper: to give me back the money which is mine, you insist that I hand over security sensitive information. Which I will not do. There are an endless stream of documented violent theft events of cryptocurrency holders, so spreading one's personal information is stupid, and any claim you make to "keep my data safe" is ridiculous, given the equally endless stream of reported hacking events. I do not trust your company with my personal information because I don't trust *any* company with it.

I have been doing Bitcoin development work for over a decade, I will make sure that a lot of people in the community know that Travala steals its customers money, directly, with no apology.

Feel free to pass this message to any management, I would appreciate that.

(me)

Oh shoot. So travala is a Bitcoin booking travel site. Who's behind it?

I feel like we do naturally gravitate toward a certain elemental type. I love astrology, and I do feel that for me… I carry a lot of air in my chart, a lot of water too, and much less earth. And yet, earth feels like my North Star.

Being around more earthy people, Kapha types in Ayurveda, for example, can feel grounding to me simply through their presence and way of being.

So there’s the native elements within us… our chart, dosha, constitution… and then there are the external factors constantly interacting with that - climate, season, stress, technology.

A simple example for me is coffee in peak summer heat. It pushes so much fire into my liver that all of a sudden it's 100 degrees outside, I just had coffee and I notice I am just raging, and even cold raw milk barely cools it. Same body, same substance… different conditions, totally different effect.

So balance isn’t static or evenly distributed. It’s something we’re always participating in. We can consciously rebalance by working with the elements directly, like taking a shower, dipping in a lake, sitting by a fire, choosing spicy versus cooling foods, breath work. Small, literal interactions… could bring big shifts.

Today... Coffee... Stoking fire... Morning pages... Fascia workout... Finish reading mini ebook on trust jurisprudence... Keep studying Lewin1888 8th edition A Practical Treatise on the Law of Trusts... Get belly work done... Maybe drop off things in storage when in town... Breathe... Slow and steady...

Bitcoin ❤️‍🔥

Wow, it's been 9 years since I first sat in the resonant field of the archetype of the creator destroyer preserver for a whole month with my priestess sisters in the 13 Moon mystery Priestess School guided by my friend Natalia.

https://blossom.primal.net/51e24e5fc3507ec96b244f5515695066bd227135a5e85f7ef4dac4d37d96e896.mp4

The foundational README is complete, and it’s been determined that the core work is best held in the private realm for now rather than published on GitHub.

Funny thing is... I had a sweet dreams last night... Well, after I swam with crocodiles first... Did some acroyoga with a man I seemed to like and establishing closeness with. When he got tired he took charge and asked us to rest while still holding my hands and his face really close to mine on top of me. Sweet and intimate. 😌🫂

Good morning.

I like stoking fire. One of my favorite things to do as a kid when visiting my grandparents in the village. I am just kinda naturally good at it.

My 2026 resolutions are simple.

Get grounded in a home base. Establish Trust of Source Code and build its auxiliaries.

And yes… sex.

2025 was yet another celibate year. I am ready for a different chapter💧

Last week literally broke me. I wasn't sure I could make it and I went into full on emergency mode calling for support. And Thank God! It's been working. I was able to see my acupuncturist two days in a row. After yesterday's session I felt so much more grounded and nervous system at ease this morning. Aaaaah. Deep Exhale. She said she could see it on my face when I went in for our session today. So much love and appreciation for the hugs, healing vibes and compassion. If you are in Gold Country, dr. Abby is fantastic. #accupuncture

People take themselves way too seriously. Loosen up.

Good night. #keepnostrweird 😆

https://blossom.primal.net/09638274d06ba84583bd76ab4f306bc34e1c47a3c3427565f4129b7775b04f69.mp4

I don’t see 5G as uniquely controversial… it’s more like an inflection point.

Earlier generations already introduced chronic EMF exposure. What’s changing now is density, proximity, and saturation.

More antennas, higher frequencies, more devices, less recovery time for biological systems.

So it’s not “5G vs 4G”… it’s cumulative load on organic life, and we’re clearly past the threshold where it’s negligible.

Keep it up. Gotta take them through the sales funnel sorta speak. Follow up next time with a purchase but only if it is Bitcoin. Walk them through the set up on their square software or arrange a time to do that with whoever is in charge.

Send follow up emails. Have @Spiral send you Itty Bitty plushies and marketing materials.

Join the Discourse channel for bitcoin merchant advocates... There are materials there and community sharing their advocacy effort across the country...

For whatever reason I am not able to tag folks.. by Hailey Berkoe could probably direct you.

When I left I wondered what Bitcoin movie might give the best intro to the idea that it isn't who's in charge and more about how the fed and fiat system works.

For sure.

Also, I bet there are some Square merchants in mendecino... That's an easy target to orange pill to accept Bitcoin, put some Bitcoin stickers and Itty Bitty plushies as signal and save them 3% fees. Do you know about that?

Right before a modern-day French Revolution… standing at the threshold.

I’m about to start my first GitHub repository… 😃

OMG, someone hold my hand 😬

If any avid FOSS devs or builders here have guidance, suggestions, or “do this / don’t do that” wisdom, I’d be deeply grateful. 🙏🏻

Trying to do this right and learning in public.🌞🫂