Micael
NOSTR ONLY
If you don't live for something, you’ll die for nothing.
Mission: DESTROY CENTRAL BANKS
Bitcoin School Argentina cofounder 🇦🇷
Proof of Work Advocate
Since 588000
Author of -The Great Parasite-
Mark Zuckerberg and Facebook represent the most disturbing intersection of consumer tech and intelligence agencies. The official version cites a network created in a Harvard dorm. However, the timeline suggests something more complex.
As the financial system cracks and gold soars, Bitcoin suffers from artificial price suppression and coordinated media attacks. It's time to abandon institutional custody and regain sovereignty.
As the financial system cracks and gold soars, Bitcoin suffers from artificial price suppression and coordinated media attacks. It's time to abandon institutional custody and regain sovereignty.
As the financial system cracks and gold soars, Bitcoin suffers from artificial price suppression and coordinated media attacks. It's time to abandon institutional custody and regain sovereignty.
As the financial system cracks and gold soars, Bitcoin suffers from artificial price suppression and coordinated media attacks. It's time to abandon institutional custody and regain sovereignty.
As the financial system cracks and gold soars, Bitcoin suffers from artificial price suppression and coordinated media attacks. It's time to abandon institutional custody and regain sovereignty.
As the financial system cracks and gold soars, Bitcoin suffers from artificial price suppression and coordinated media attacks. It's time to abandon institutional custody and regain sovereignty.
As the financial system cracks and gold soars, Bitcoin suffers from artificial price suppression and coordinated media attacks. It's time to abandon institutional custody and regain sovereignty.
As the financial system cracks and gold soars, Bitcoin suffers from artificial price suppression and coordinated media attacks. It's time to abandon institutional custody and regain sovereignty.
“I spent 33 years and four months in active military service and during that period I spent most of my time as a high class muscle man for Big Business, for Wall Street and the bankers. In short, I was a racketeer, a gangster for capitalism.” - Major General Smedley Butler, USMC (1935)
I swear by my life and my love of it that I will never work for a currency that another man can create out of thin air, nor ask another man to do the same.
This is not an argument against vigilance. Organizations should still vet members, should still pay attention when someone's story does not add up, should still refuse to tolerate the aggressive and divisive behavior that documented infiltrators have consistently displayed. The point is that these measures are a second line of defense, not the primary one. The primary defense is structural: build so that even successful infiltration cannot achieve its objectives.
The cypherpunk tradition offers a different framework for thinking about the infiltration problem, one that begins by accepting the presence of adversaries as a design constraint rather than a failure to be prevented. Eric Hughes wrote in A Cypherpunk's Manifesto that "we cannot expect governments, corporations, or other large, faceless organizations to grant us privacy," and the same logic applies to organizational security. The goal is not to achieve perfect exclusion of adversaries but to build systems where their presence cannot accomplish its purpose.
These cases point toward a fundamental asymmetry that detection-focused security culture cannot overcome. The state can afford to be patient, to invest years in building cover, to provide resources and training that make their agents useful to the organizations they infiltrate. The activist trying to spot the spy, by contrast, has only suspicion and intuition to work with. The standard advice to watch for inconsistencies in background stories, unexplained access to resources, or eagerness to push toward illegal activity is not wrong, but it fails against the competent infiltrator who has been coached to avoid exactly these tells. Worse, a detection-obsessed culture breeds the paranoia that COINTELPRO documents explicitly sought to create. An FBI memo from 1970 advised agents to encourage "the impression that there is an FBI agent behind every mailbox" because the resulting suspicion and internal conflict would do more damage than any individual informant. When movements consume themselves with accusations and counter-accusations, the state wins without lifting a finger.
The FBI's COINTELPRO program, which officially operated from 1956 to 1971 but whose tactics continued long after its formal termination, placed informants inside virtually every significant dissident movement of its era. The Black Panthers, the antiwar movement, the civil rights organizations, the socialist parties, and the environmental groups all discovered, often too late, that trusted members had been reporting to handlers throughout. The Church Committee investigation revealed not merely passive surveillance but active provocation: forged documents designed to create internal splits, anonymous letters spreading rumors about leaders, and agents deliberately encouraging illegal activity to justify prosecution. When FBI assistant director William Sullivan testified about these tactics, he was blunt about the operational mindset: "No holds were barred. We have used these techniques against Soviet agents. They have used them against us. We did not differentiate."
Every dissident organization eventually wonders whether it has been infiltrated, and the honest answer is that it probably has been, or will be, or would be if it ever became effective enough to matter. The documented history of state counterintelligence programs reveals an uncomfortable truth that no detection checklist can fully address: when the state decides to penetrate an organization, it brings resources, training, and patience that most targets cannot match. The more important question is not how to spot the spy but how to build structures that render the spy's presence futile.
the Internet was, from its inception, a military weapon. It did not originate with California hippies, but with the Pentagon during the Vietnam War.
When analyzing the history of the so-called “Magnificent Seven” and their founders, a pattern emerges that is far removed from free-market capitalism
Oiréis a la gente en Nostr decir que “el algoritmo somos nosotros”. Hay algo muy poderoso en esa frase: nos hace dueños de las cosas que pasan por nuestros ojos, pero también nos convierte en el filtro curatorial de la gente que nos sigue
The narrative of the “solitary genius in the garage” is perhaps the most effective public relations tool of the last century.
The taxpayers payed the for R&D of decades, while Apple privatized the rewards, packaging military technology into a sleek design to extract what Yanis Varoufakis calls “feudal rents” via the App Store. Typical parasitic behavior
This romantic story, where pure innovation and the free market reward brilliant young college dropouts with trillion-dollar empires, serves as a perfect smoke screen.
The narrative of the "solitary genius in the garage" is perhaps the most effective public relations tool of the last century. This romantic story, where pure innovation and the free market reward brilliant young college dropouts with trillion-dollar empires, serves as a perfect smoke screen. By focusing attention on a supposed individual meritocracy, this myth obscures the immense state, military, and intelligence machinery that served as the foundation, financier, and protector of what we now know as "Big Tech".
The narrative of the "solitary genius in the garage" is perhaps the most effective public relations tool of the last century. This romantic story, where pure innovation and the free market reward brilliant young college dropouts with trillion-dollar empires, serves as a perfect smoke screen. By focusing attention on a supposed individual meritocracy, this myth obscures the immense state, military, and intelligence machinery that served as the foundation, financier, and protector of what we now know as "Big Tech".
The “Educational Industry” fulfilled its objective with terrifying efficiency. It did not create free thinkers; it created interchangeable parts for a machine most people no longer understand.
The "Educational Industry" fulfilled its objective with terrifying efficiency. It did not create free thinkers; it created interchangeable parts for a machine most people no longer understand.
The "Educational Industry" fulfilled its objective with terrifying efficiency. It did not create free thinkers; it created interchangeable parts for a machine most people no longer understand.
The "Educational Industry" fulfilled its objective with terrifying efficiency. It did not create free thinkers; it created interchangeable parts for a machine most people no longer understand.
The "Educational Industry" fulfilled its objective with terrifying efficiency. It did not create free thinkers; it created interchangeable parts for a machine most people no longer understand.
The "Educational Industry" fulfilled its objective with terrifying efficiency. It did not create free thinkers; it created interchangeable parts for a machine most people no longer understand.
The "Educational Industry" fulfilled its objective with terrifying efficiency. It did not create free thinkers; it created interchangeable parts for a machine most people no longer understand.
If money is energy, the corruption of money inevitably leads to the corruption of the vital energy that sustains us.
if everything is a token, everything is collateral; if everything is collateral, everything can be leveraged; if everything can be leveraged, everything can be taxed in the form of exported inflation
This is useful for anyone who has watched a bank freeze accounts without explanation, a social media platform ban users without appeal, or an app store remove software for “policy violations” that change quarterly. The freedom technology stack provides exit from a system where your ability to communicate and transact exists at the pleasure of corporations who do not particularly care about you.
This is useful for anyone who has watched a bank freeze accounts without explanation, a social media platform ban users without appeal, or an app store remove software for “policy violations” that change quarterly. The freedom technology stack provides exit from a system where your ability to communicate and transact exists at the pleasure of corporations who do not particularly care about you.
The comparison to hardware wallets for Bitcoin is apt. Your Bitcoin private keys should live on a device that does nothing except sign transactions. Your Nostr private keys should live in an application that does nothing except sign events
This architecture creates an obvious problem: if you paste your private key into every Nostr client you try, you multiply the attack surface exponentially
The lesson is clear: the final obstacle for Bitcoin is no longer hostile regulators but the platform monopolists who control app distribution channels.
While oil lubricated machines, data lubricates algorithms, and algorithms feed on digital transactions that the system pushed with a clear agenda: more credit and less cash, more control and less privacy, more speculation and less saving, more gambling and less investment
While oil lubricated machines, data lubricates algorithms, and algorithms feed on digital transactions that the system pushed with a clear agenda: more credit and less cash, more control and less privacy, more speculation and less saving, more gambling and less investment. Online payments, online shopping, online brokers. Everything online, everything recorded, everything quantifiable. The digital panopticon as a business model.
While oil lubricated machines, data lubricates algorithms, and algorithms feed on digital transactions that the system pushed with a clear agenda: more credit and less cash, more control and less privacy, more speculation and less saving, more gambling and less investment. Online payments, online shopping, online brokers. Everything online, everything recorded, everything quantifiable. The digital panopticon as a business model.
While oil lubricated machines, data lubricates algorithms, and algorithms feed on digital transactions that the system pushed with a clear agenda: more credit and less cash, more control and less privacy, more speculation and less saving, more gambling and less investment. Online payments, online shopping, online brokers. Everything online, everything recorded, everything quantifiable. The digital panopticon as a business model.
While oil lubricated machines, data lubricates algorithms, and algorithms feed on digital transactions that the system pushed with a clear agenda: more credit and less cash, more control and less privacy, more speculation and less saving, more gambling and less investment. Online payments, online shopping, online brokers. Everything online, everything recorded, everything quantifiable. The digital panopticon as a business model.
While oil lubricated machines, data lubricates algorithms, and algorithms feed on digital transactions that the system pushed with a clear agenda: more credit and less cash, more control and less privacy, more speculation and less saving, more gambling and less investment. Online payments, online shopping, online brokers. Everything online, everything recorded, everything quantifiable. The digital panopticon as a business model.
illustrated above is the masonic tracing board of the first degree (mason simply means builder; if u create anything, u are a mason, deal with it, and better build well); Mark Passio explains the 1st degree tracing board in 10 min;
illustrated above is the masonic tracing board of the first degree (mason simply means builder; if u create anything, u are a mason, deal with it, and better build well); Mark Passio explains the 1st degree tracing board in 10 min;
We must not see the world the way they want us to see it. It is a kind of fraud—ancient and vast—and the key to breaking it is to test every premise we were taught and question every precept.
You do not have to look through other people’s eyes. Hold on to your own. Defend your judgment. You know that what is, is. Say it out loud, like the most sacred of prayers, and let no one tell you otherwise.
We must not see the world the way they want us to see it. It is a kind of fraud—ancient and vast—and the key to breaking it is to test every premise we were taught and question every precept.
We must not see the world the way they want us to see it. It is a kind of fraud—ancient and vast—and the key to breaking it is to test every premise we were taught and question every precept.
We must not see the world the way they want us to see it. It is a kind of fraud—ancient and vast—and the key to breaking it is to test every premise we were taught and question every precept.
We must not see the world the way they want us to see it. It is a kind of fraud—ancient and vast—and the key to breaking it is to test every premise we were taught and question every precept.
We must not see the world the way they want us to see it. It is a kind of fraud—ancient and vast—and the key to breaking it is to test every premise we were taught and question every precept.
THEY DISAPPEARED.
THEY DISAPPEARED.
They both gave the world a gift, and they both disappeared. They didn't want to govern the world or become famous. They wanted to bring moral individuals with an alternative.
They both created a self-sufficient system with no leader. And they both make it clear that free men don't need rulers; they need objective rules and a framework where the mind can create without being looted.
Bitcoin is a revolution: every mind opting out in another mind that strengthens the network and weakens the parasitic system of wealth extraction and mind control.
And the best part? You don't need to as