ExploreTrendingAnalytics
Nostr Archives
ExploreTrendingAnalytics

Libretech Systems - DARKLEAF

d34e83…3f78d0

sovereigncommunityinfrastructure@librepyramid.libretechsystems.xyz

191Followers49Following649Notes189Sent306Received

Welcome to Our Bitcoin Store We are a small, passionate team dedicated to providing quality Bitcoin-focused tools and accessories. Our current offerings include: Bitcoin wallets Seed storage plates Nostr signing devices ESP32 miners 3D-printed cases and hardware Satscards & Boltzcards As we grow, so will our inventory and expertise in serving you. If you're interested in any of our products, please feel free to inquire about shipping. Thank you for your support! ⚡ Onchain Ecash Layer-2 Liquid Accepted ☆.𓋼𓍊 𓆏 𓍊𓋼𓍊.☆ ⠀⠀⠀⠀⣿⡇⠀⢸⣿⡇⠀⠀⠀⠀ ⠸⠿⣿⣿⣿⡿⠿⠿⣿⣿⣿⣶⣄⠀ ⠀⠀⢸⣿⣿⡇⠀⠀⠀⠈⣿⣿⣿⠀ ⠀⠀⢸⣿⣿⡇⠀⠀⢀⣠⣿⣿⠟⠀ ⠀⠀⢸⣿⣿⡿⠿⠿⠿⣿⣿⣥⣄⠀ ⠀⠀⢸⣿⣿⡇⠀⠀⠀⠀⢻⣿⣿⣧ ⠀⠀⢸⣿⣿⡇⠀⠀⠀⠀⣼⣿⣿⣿ ⢰⣶⣿⣿⣿⣷⣶⣶⣾⣿⣿⠿⠛⠁ ⠀⠀⠀⠀⣿⡇⠀⢸⣿⡇⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀ 🌐 Let's Connect: Npub Address: freedomfete@npub.cash Email Address: https://flowcrypt.com/me/parityday Lightning Address: moraltimer63@walletofsatoshi.com libretech@orangepillapp.com Internet Radio https://voxarcana.libretechsystems.xyz/ Blogs- https://haven.libretechsystems.xyz/ (Haven, Open Source) https://memos.eshgham.one/ (Memos, Open Source) https://freedomtech.eshgham.one https://ublog.libretechsystems.xyz https://nblog.libretechsystems.xyz https://zoryaprivacy.libretechsystems.xyz/ https://sigmaenterprise.github.io/ Podcast https://freedomtech.eshgham.one/episodes/ Feel free to reach out for collaboration opportunities, inquiries, or just to say hello! 🚀✨

649 total
Libretech Systems - DARKLEAF6h ago
https://www.youtube.com/watch?v=GYVVtKgIeTE
0000 sats
Libretech Systems - DARKLEAF6h ago
https://youtu.be/2KK7BioRrto
0000 sats
Libretech Systems - DARKLEAF6h ago
https://www.youtube.com/watch?v=JYOPfdp_fac
0000 sats
Libretech Systems - DARKLEAF7h ago
https://youtu.be/tDu_onvlr44 This video segment depicts a conversation centered around a message being conveyed to a character named David, involving a desire for eternal life. The main theme revolves around communication and the quest for immortality. The content is suitable for viewers interested in narrative storytelling, dramatic exchanges, or themes involving existential questions. The audience can learn about the emotional and thematic nuances linked to the idea of living forever as presented through dialogue. Timeline Summary 00:00-00:01:12: Dramatic dialogue exchange focusing on communication with David, relaying a request or message about wanting to live forever. The interaction is tense and suggestive of deeper themes regarding life and mortality. This segment establishes the thematic premise around which the discussion unfolds. Key Points The conversation is mediated through multiple speakers aiming to convey an important message to David. The central message being communicated is a desire for eternal life, revealing a fundamental theme of the video. The dialogue emphasizes uncertainty and anticipation, as reflected in repeated question-and-answer exchanges regarding the message’s content. The brevity and silence toward the end suggest a dramatic pause or unresolved tension. The use of ellipses indicates omitted or unspoken content, enhancing a mysterious or suspenseful atmosphere. Key Insights 💬 The dialogue highlights the complexity of human communication when transmitting critical or profound messages. ⏳ The desire to live forever serves as a powerful central motif that drives emotional and existential exploration. 🤐 The pauses and silences effectively build tension, demonstrating how non-verbal elements convey meaning in storytelling. 🕰 The exchange can symbolize the human struggle with mortality and the quest for meaning beyond life. Consider This brief but potent video segment immerses viewers in a dramatic conversation revolving around the desire for eternal life. Through focused dialogue with David, it opens a window into themes of mortality, communication, and existential longing. The pauses and repetitive questioning enhance the emotional depth, inviting the audience to reflect on the human condition. For viewers, the takeaway is an acknowledgment of the complexity behind life’s ultimate questions and the power of dialogue in expressing them. Moving forward, audiences might explore further narrative developments or related themes in similar works to deepen their understanding of such profound concepts.
0000 sats
Libretech Systems - DARKLEAF7h ago
https://youtu.be/XoBRVVuL-a8 This video explores the evolution of magic from ancient ritualistic practices into a modern digital paradigm, framing contemporary media, internet culture, and psychological operations as forms of digital occultism. It delves into how ancient magical concepts—especially chaos magic—have transformed into tools for manipulating beliefs, perceptions, and collective behavior through symbols, memetics, and algorithms. The central theme positions belief as a programmable technology exploited both for liberation and manipulation in today’s digital age. This analysis is highly relevant for those interested in psychology, media literacy, cultural studies, conspiracy theory, and digital culture. Viewers will learn how symbolic systems shape reality, how memes and algorithms act as modern sigils, and the importance of conscious awareness to resist becoming unconscious agents in digital psychological operations. Timeline Summary 00:00-02:00: The Evolution of Magic into Digital Form Introduces the idea that what was once considered fantasy—magic—is real but has evolved into digital form. Explains how ancient magic principles became foundational to digital influence by reprogramming human perception via algorithms and internet culture. Key takeaway: Magic’s essence lives on as technology controls reality perception. 02:00-04:00: Crowley, Spear, and the Birth of Chaos Magic Explains Aleister Crowley’s definition of magic as change by will, and Austin Osman Spear’s update of this into sigil magic—simple symbols charged with intent that hack the subconscious. Introduces chaos magic’s methodology focused on results rather than rituals. Key takeaway: Belief and symbols are programmable codes interacting with the subconscious. 04:00-06:30: Discordianism and the Role of Absurdity in Rewriting Reality Discusses Principia Discordia and its impact on treating belief systems as self-replicating illusions (fools). Highlights how creative absurdity and pranks (operation mindfuck) expose and rewrite consensus reality. Key takeaway: Disorder and paradox trick perception, making reality malleable. 06:30-08:30: The Illuminatus Trilogy and Subliminal Manipulation (Fenoords) Introduces the concept of fenoords, subliminal triggers hidden in media that induce unease and confusion, linking information to fear and control. Emphasizes that perceiving these subliminal cues breaks the spell of manipulation. Key takeaway: Hidden symbols affect subconscious perception and ratify control. 08:30-11:00: Chaos Magic as a Tool for Self-Actualization and its Extension into Mass Media Details how chaos magic reframed belief as a tool for psychological freedom but was co-opted by advertising, propaganda, and digital persuasion applying the same principles at scale. The mind is framed as hardware; belief as code that can be rewritten by algorithms. Key takeaway: Personal magic techniques evolved into systemic mass manipulation. 11:00-13:30: Digital Memes as Modern Sigils and Unconscious Sorcery Explores how memes function as condensed thought-forms acting like sigils, charged with collective emotion and shared rapidly online, thus serving as unconscious rituals optimized by algorithms for behavioral influence. Key takeaway: Internet memes are viral packets of belief programming. 13:30-15:30: Psychological Operations (SCOPs) as Ritualized Mass Manipulation Links chaos magic’s symbolic tools to modern psychological operations (SCOPs), which use repetition, symbolism, emotional engagement, and digital media to induce targeted changes in mass belief and behavior. Key takeaway: Digital consensus reality is shaped through orchestrated symbolic rituals. 15:30-17:50: Hyperstition and the Industrialization of Belief Manipulation Describes hyperstition—weaponized ideas that gain reality by collective belief—and explains how technology shifted ritual magic from individual practice to automated machine-driven psychological control. Key takeaway: Digital platforms convert users into energy sources powering mass psychological spells. 17:50-18:30: Conclusion — Awareness as the First Step to Freedom Ends with a call to recognize one’s participation in these unconscious rituals, emphasizing that understanding the mechanisms of belief manipulation is essential to reclaiming agency and becoming a conscious wizard rather than a passive battery. Key takeaway: Awareness breaks the spell and empowers self-sovereignty. Key Points Magic has transitioned from ancient ritual to digital psychological operations, using updated symbolic tools to manipulate perception at scale. Chaos magic introduced the radical idea that belief is a tool, not a truth, enabling belief to be engineered and discarded freely. Discordianism and the Illuminatus Trilogy exposed belief systems as malleable, using humor, paradox, and subliminal “fenoords” to undermine rigid realities. Modern digital culture, especially memes and algorithms, functions as a mass-scale sigil system, influencing collective reality unconsciously. Psychological warfare today is ritualized mass manipulation leveraging emotional engagement, symbolism, and media repetition to alter public behavior and opinion. The individual’s attention and emotional energy have become raw materials fueling systemic belief reprogramming through algorithms. Recognizing these processes is crucial to resisting manipulation and reclaiming conscious control over one’s beliefs and perceptions. FAQs Q: What is chaos magic and why is it important today? A: Chaos magic is a belief system that treats belief as a flexible tool rather than fixed truth, emphasizing results over dogma. It laid the groundwork for understanding how symbols and belief can be engineered and manipulated, influencing modern media and digital culture. Q: How do memes relate to ancient magical practices? A: Memes function like modern sigils—condensed symbols charged with emotional energy that spread rapidly, influencing collective perception similarly to magical symbols employed in chaos magic. Q: What are fenoords and how do they affect us? A: Fenoords are subliminal words or symbols embedded in media that trigger subconscious feelings of dread or unease, subtly manipulating perception and reinforcing control narratives. Q: How is belief manipulation automated on the internet? A: Algorithms optimize content for emotional engagement, repeating symbols and narratives that bypass critical thinking, turning users’ attention and emotions into fuel for mass psychological influence. Q: How can someone protect themselves from these digital “spells”? A: The first step is awareness—recognizing how digital media manipulates belief and perception allows individuals to critically assess information and reclaim conscious control over their beliefs. Consider The video lays bare the astounding continuity between ancient magical traditions and modern digital reality shaping, revealing how chaos magic’s insights into belief as programmable code underpin today’s psychological warfare by media, advertising, and digital platforms. It highlights that what began as a path to personal empowerment has been industrialized into a vast, automated system exploiting our subconscious to manipulate mass behavior and perception. The key to navigating and resisting this landscape is awareness and conscious engagement with belief systems. By recognizing the digital “spells” around us—the viral sigils, fenoords, and algorithmic rituals—we can reclaim our mental sovereignty and make informed choices rather than serve as unconscious batteries powering invisible agendas. The video ultimately urges us to become conscious magicians in the digital age rather than passive participants, suggesting that the first and vital step to liberation is simply to see the spell for what it is. As a next step, viewers are encouraged to cultivate media literacy, critical thinking, and mindfulness toward their digital consumption to disrupt the automatic programming of beliefs.
0200 sats
Libretech Systems - DARKLEAF7h ago
https://www.youtube.com/watch?v=ah56rUudlb8 This video lecture provides a comprehensive overview of the ancient Egyptian city of Amarna, focusing on the reign of Pharaoh Akhenaten during the 18th Dynasty. It covers the religious revolution Akhenaten initiated by elevating the sun deity Aten, the founding and layout of Amarna as a new capital city, the royal family and court officials, social structure, and the archaeological history and significance of the site. Viewers learn about Amarna’s urban design, key religious and administrative buildings, members of Akhenaten’s court, and the various roles and responsibilities of officials and craftsmen. The lecture further explores the impact of the city’s abrupt abandonment and subsequent rediscovery through modern excavations. This content benefits enthusiasts of Egyptology, ancient history, archaeology, and those interested in religious and sociopolitical transformations in antiquity, providing both high-level understanding and detailed insights into daily life, governance, and artistic developments at Amarna. Timeline Summary 00:00-00:42: Introduction and Overview Introduces the video’s structure: historical context, city tour, royal family, court officials, workers, and modern excavations at Amarna. Also mentions the work of the Amarna Research Foundation. Concluding: Sets expectations for a detailed exploration of Akhenaten’s reign and city of Amarna. 00:42-05:21: Akhenaten and Religious Revolution Reviews Akhenaten’s lineage, name changes, and religious shift from Amun worship to Aten monotheism. Discusses the capital move to the newly built Amarna and the artistic style changes introduced. Concluding: Explains how Akhenaten’s reforms dramatically altered Egyptian religion and society. 05:21-07:28: Amarna’s Boundaries and Initial History Describes the city’s geography, the Royal Road, boundary stelae that demarcated the city, and the city’s rapid abandonment after Akhenaten’s death, including the return to traditional religious practices and defacement of his monuments. Concluding: Provides context on Amarna’s political and religious fragility and its short-lived prominence. 07:28-12:32: Walking Tour of Amarna (North to Central City) Details key structures encountered on a north-south tour: North Riverside Palace, North Palace, central city administrative buildings including Great Aten Temple, Great Palace with “Window of Appearance,” temple pavilions, and mud brick offering tables. Includes architectural features and religious significance. Concluding: Gives a vivid picture of the city’s layout highlighting the interplay of religious, administrative, and royal functions. 12:32-24:41: Walking Tour of Amarna (Central to South and Workers’ Areas) Describes southern residential suburbs, workshops, sunshade temples dedicated to royal family members, quarries, laborers’ villages, and cemeteries. Notes the remains of both high-status and working-class inhabitants, including evidence of hard labor in cemeteries. Concluding: Reflects the social stratification and the everyday realities facing Amarna’s inhabitants. 24:41-32:40: The Royal Family and Court Officials Introduces Akhenaten’s family members, including his wives and children, and discusses the complex royal lineage. Details key officials, highlighting the parallel hierarchy of viziers, priests, treasurers, security, and stewards responsible for governance, religion, and administration. Concluding: Illuminates the governance structure and personal relationships at the heart of Amarna’s court. 32:40-42:50: Court Rituals and Official Residences Depicts court ceremonies such as the “window of appearance” where Akhenaten rewarded officials. Showcases official estates and details on important figures like Mary Ray and their ceremonial roles. Explores temple alignments and the symbolic importance of religious events. Concluding: Emphasizes how ceremonial function and religious symbolism reinforced royal power. 42:50-54:46: Administrative, Religious, and Artistic Roles Discusses roles of scribes, overseers of works, police, physicians, and military officers. Highlights the responsibilities of individuals like overseers of the treasury, chief priests, and court artists/sculptors who shaped Amarna’s cultural legacy. Concluding: Demonstrates a multifaceted administration and the integration of art and religion within governance. 54:46-57:42: Modern Archaeology and Legacy of Amarna Summarizes the timeline of Amarna’s excavation history, starting with Napoleonic expeditions through to ongoing work by Barry Kemp. Reflects on Amarna’s unique archaeological preservation that offers a “Living Museum” glimpse into ancient urban life despite stark social inequalities in antiquity. Concluding: Positions Amarna as an invaluable source for understanding ancient Egypt’s society, religion, and urbanism. 57:42-01:08:26: Q&A Session Responses to audience questions about site features, family relationships, burial mysteries, tomb artworks, and artifacts. Clarifies ongoing debates such as Akhenaten’s mummy identification, family lineage confusion, and unique tomb depictions. Concluding: Reinforces the complexity and unresolved questions in Amarna research, encouraging further study. Key Points Akhenaten’s religious revolution replaced traditional polytheism centered on Amun with Aten worship, profoundly reshaping Egyptian theology and art. (00:42) Amarna was a purpose-built royal city designed around the Aten cult, stretching six miles long and housing the royal family, administration, artisans, and laborers. (05:21) Royal and religious architecture intertwined, including temples aligned with natural landmarks and ceremonial windows where the king dispensed rewards, underscoring theocracy. (07:28) Administrative system featured parallel governance, with coequal viziers and multiple specialized officials rather than strict top-down hierarchy. (24:41) Social stratification was stark, with evidence from cemeteries showing child labor and hard-working classes contrasting sharply with elite palatial estates. (18:00, 31:00) Amarna letters and records reveal extensive foreign relations, diplomacy, and correspondence in cuneiform, demonstrating Egypt’s international role. (16:15) Artists and craftsmen were highly regarded, mastering a distinctive Amarna style that reflected ideological shifts. (54:30) Amarna’s quick abandonment led to its preservation, although with deliberate defacement by successors. Modern archaeology has progressively reconstructed its history. (56:12) Many mysteries remain, including the identities of royal mummies and interpretations of portraiture and tomb art, inviting continuing scholarly inquiry. (57:42) Frequently Asked Questions (FAQs) Q: How large were the boundary stelae marking Amarna? A: They were huge, about 25 feet tall, carved with extensive inscriptions detailing Akhenaten’s plans. (57:00) Q: Are Nefertiti’s siblings mentioned elsewhere in historical records? A: Only her sister is referenced in some tomb scenes, but other siblings are not well documented. (58:30) Q: Do we have Akhenaten’s mummy? A: Akhenaten’s exact mummy has not been definitively identified; KV55 tomb might contain his father or other royal relatives. (01:00) Q: Who was Smenkhkare, and what was his relation to Akhenaten? A: Probably Akhenaten’s son or co-regent; he ruled briefly and predeceased Tutankhamun, with Nefertiti possibly acting as regent afterward. (01:01) Q: What do the depictions of Akhenaten holding two small figures represent? A: Controversially, Egyptologists now believe these are images of Akhenaten himself, not his sons, paired with Nefertiti’s depiction. (01:03) Conclusion This lecture traces the remarkable, yet brief, era of Akhenaten and the city of Amarna, revealing a society undergoing radical religious and political transformation. From the shifting theology centered on the solar deity Aten to the creation of a new capital city and unique artistic expression, the presentation unpacks Amarna’s complex urban fabric and social hierarchy. The detailed descriptions of royal family life, court officials, artisans, and workers provide a holistic view of the city’s functioning. Modern excavation efforts have unearthed invaluable insights into ancient Egyptian administration, religion, and daily life. Remaining puzzles about royal identities and tomb usages remind us that historical understanding is an ongoing journey. For enthusiasts, scholars, and history lovers, the video encourages engagement with Egypt’s ancient legacy and invites visits to Amarna’s archaeological sites or further research. Next steps for viewers include exploring the Amarna Research Foundation’s publications, following current archaeological discoveries, and examining Amarna letters to deepen appreciation of this pivotal historical epoch
1200 sats
Libretech Systems - DARKLEAF7h ago
https://youtu.be/WMyOM7Y-ht0 Engaging exploration of the Amarna letters, a significant collection of diplomatic correspondence from Egypt’s Late Bronze Age, roughly between 1391 and 1353 BCE. It explains the historical and linguistic context of these letters, illustrating the complex relationships among ancient powers such as Egypt’s 18th Dynasty, Babylon, Assyria, Mitanni, and the Hittite Empire. The video is suitable for history enthusiasts, students of ancient civilizations, and those interested in diplomatic history and linguistics. Viewers will learn about the personalities involved, the political tensions revealed in the letters, and the challenges of maintaining power and alliances in the ancient Near East, gaining insights into both historical facts and interpreting ancient diplomacy. Timeline Summary 00:00-03:05: Introduction to the Amarna Letters and Historical Context Introduction to the Amarna letters as a fascinating source of historical insight about the Late Bronze Age and rulers such as Pharaoh Amenhotep III, Akhenaten, and Tutankhamun. Explains their discovery and contents: diplomatic correspondence written predominantly in Akkadian with some in Hurrian and Hittite. Highlights Egypt’s dominant position and contemporaneous great powers. 03:06-07:23: Linguistic Diversity and Early Letters Between Egypt and Babylon Discusses the multilingual nature of the letters with hybrid Akkadian dialects. Introduces correspondence between Pharaoh Amenhotep III and Kassite Babylonian King Kadoshman-Enlil, focusing on diplomatic marriage alliances and concerns about the welfare of royal brides, highlighting tensions and suspicions. 07:24-11:12: Diplomatic Nuances and Demands in Royal Marriages and Gifts Details Kadoshman-Enlil’s complaint about Egypt’s lack of goodwill in gift-giving and marriage diplomacy. Explores his frustration over Egypt refusing to provide a royal daughter for marriage and demands for gold, illustrating the delicate balance of diplomacy and expectations between these ancient powers. 11:13-13:05: Assyrian Correspondence and Emerging Power Dynamics Introduces a letter from Ashur-uballit I of Assyria, marking Assyria’s rise as a new independent power asserting communications with Egypt. The letter shows a shift in regional power relations and diplomatic protocols. 13:06-17:14: Rib-Hadda’s Letters from Byblos: Loyalty and Crisis Presents Rib-Hadda’s extensive letters pleading for Egyptian support to protect the city of Byblos from local rivals and the rebellious Habiru (referred to as “hopparoo”), revealing internal struggles and regional instability. Highlights his desperation and loyalty to the Pharaoh amidst persistent threats. 17:15-21:47: Political Intrigues in Canaan and the Fate of Rivals Chronicles the tragic downfall of Rib-Hadda and the rivalry with his brother and opponents. Covers the political pragmatism of Egyptian authorities indifferent to local conflicts as long as loyalty to Pharaoh was maintained. Briefly touches on Abdi-Ashirta’s capture and death, followed by his son Aziru’s shift of allegiance to the Hittites. 21:48-24:57: Rivalries Among Canaanite Mayors and Calls for Protection Describes accusations between mayors of Shechem and Jerusalem regarding loyalty, land seizures, and tribute evasion. Includes appeals to Pharaoh for military support and maintenance of peace, stressing the fragility of Egyptian control over the Levant and the role of archers (troops) in securing stability. 24:58-25:32: Conclusion and Invitation for Further Engagement The host thanks viewers, invites subscriptions and follows on social media, and hints at more content exploring these fascinating letters and ancient history topics. Key Points 📜 The Amarna letters are crucial primary sources revealing political and diplomatic relations during Egypt’s 18th Dynasty and the Late Bronze Age. 🌍 The letters illustrate complex multilingual communication employing Akkadian and dialectal hybrids reflecting cultural diversity across the ancient Near East. 💔 Royal marriages were key diplomatic tools but fraught with suspicion, mistrust, and political bargaining, as seen in correspondence between Egypt and Babylon. 🛡 Regional instability was common: city rulers like Rib-Hadda repeatedly appealed for Egyptian military assistance against rebellious factions such as the Habiru. ⚔ Shifting allegiances—such as Aziru’s switch to the Hittites—show the fragility of Egyptian hegemony and the dynamic political landscape. 📨 Assyria’s rise and attempt to establish diplomatic ties with Egypt reveal the changing power dynamics in the Late Bronze Age. FAQs What are the Amarna letters? They are a collection of 382 clay tablets inscribed mostly in Akkadian cuneiform, documenting diplomatic correspondence among Egypt and other ancient Near Eastern states during the 14th century BCE. Why were these letters written in Akkadian? Akkadian was the diplomatic lingua franca of the time, even in regions like Egypt, which had their own languages. Letters also show dialectal influences from local languages like Canaanite and Hittite. What kind of issues do the letters cover? Topics range from royal marriages and gift exchanges to military support requests and accusations of disloyalty among city rulers, providing insight into diplomacy, politics, and daily challenges. Who were the Habiru mentioned in the letters? A term referring to displaced people or mercenaries, often labeled as outlaws or rebels, possibly a root term connected to later references to Hebrews. They posed significant threats to settled city-states. How do the letters reflect power relations of the time? They portray Egypt’s attempt to maintain influence over vassal states, though local rulers often acted independently or switched allegiances, showing a delicate balance of loyalty and sovereignty. Consider The Amarna letters offer a rare, vivid window into the diplomatic, cultural, and political intricacies of the Late Bronze Age Near East. Through personal appeals, strained negotiations, and shifting allegiances, viewers gain deep insight into ancient statecraft and international relations. The video underscores the importance of these letters for understanding how ancient empires interacted and struggled to maintain power. For viewers, the next step might be to explore individual letters in detail or examine how these documents inform broader narratives of ancient history. The action suggestion is to engage with primary texts and related historical research to appreciate the complexities of early diplomacy and the human stories behind ancient empires.
0200 sats
Libretech Systems - DARKLEAF7h ago
https://youtu.be/2I1BP75oBEY Profound significance of the Tablet of Destinies, an ancient Mesopotamian artifact repeatedly referenced in texts over millennia. It decodes the tablet as much more than a myth or symbol—portraying it as the foundational token of legitimate cosmic and earthly authority, a physical and legal instrument that conferred divine and royal power. The video also examines the Sumerian civilization’s unique worldview where authority is inherited, recorded, and administered through documented divine ordinances called the Me, emphasizing that power was not self-generated but received via an ancient cosmic order. Suitable for history enthusiasts, scholars of religion and mythology, and those interested in political philosophy, viewers learn how writing, law, and ritual in Sumer reflected sophisticated ideas about legitimacy and governance still relevant to understanding early civilization. Timeline Summary 00:00-04:12 | Introduction to the Tablet of Destinies and Sinakaribb’s Inscription Description of an ancient clay tablet fragment inscribed with cuneiform, linked to King Sinakaribb. The tablet symbolizes supreme power granted by the gods and legitimizes kingship. It poses a mystery of why this “tablet” repeatedly appears as a source of authority across ancient Mesopotamian traditions. Conclusion: The tablet embodied more than myth—it asserted real, binding political and cosmic authority. 04:12-12:09 | The Sumerians and the Origins of Civilization & Kingship Overview of the Sumerians’ emergence in Mesopotamia with early cities, writing, law, and administration. The Sumerians saw kingship as descending from heaven—authority as something inherited, not invented. The “divine ordinances” (Me) were physical, transferable items that codified civilization’s laws and functions. Conclusion: Sumerians documented authority and civilization as pre-existing cosmic principles, not human creations. 12:09-20:26 | Nippur, Enlil, and the Political-Theological Center of Authority Focus on Nippur’s temple (the Ekur), home of the god Enlil who held the Tablet of Destinies. Kings validated their rule here as the tablet granted cosmic authority. The temple functioned as the intersection of political power and religious legitimacy, central for Mesopotamian kingship. Conclusion: Legitimate rule required Enlil’s endorsement via custodianship of the tablet. 20:26-29:33 | Function and Legal Role of the Tablet; The Anzû Myth Analysis of texts revealing the tablet as a sealed legal document conferring power, exemplified in myths where its theft causes cosmic paralysis. The storm-bird Anzû steals the tablet, halting divine functions until Ninurta recovers it, illustrating the tablet’s operational role beyond symbolism. Conclusion: The tablet was a mechanism that enforced cosmic order, not just a power metaphor. 29:33-40:45 | Ninurta’s Victory and Redistribution of Power The Ninurta and the Turtle myth describes Ninurta’s judgment over stones, assigning their earthly roles as a reflection of his recovered authority from the tablet. This act parallels Marduk’s cosmic organization in the Enuma Elish, suggesting the tablet enables structuring of both divine and material worlds. Conclusion: Holding the tablet empowered cosmic and earthly organization and legitimacy. 40:45-56:51 | Variant Traditions and Dual Custodianship of the Tablet Discussion of variant texts situating the tablet either with Enlil or Enki, suggesting dual aspects of authority—public political power and esoteric wisdom rooted in the primordial Abzu (underworld waters). This indicates layered functions of the tablet: visible governance and hidden cosmic knowledge. Conclusion: The tablet’s role encompassed both political mandate and fundamental cosmic order knowledge. 56:51-01:16:11 | The System of Me (Divine Ordinances) and Legal-Philosophical Framework The Me—over 100 divine ordinances cataloged as tangible objects—embody the comprehensive laws and qualities of civilization, including virtues and destructive powers. Their transfer and storage reflect a physicalized understanding of authority akin to the tablet’s function. Conclusion: The tablet and Me represent a codified system of cosmic and societal order. 01:16:11-01:31:10 | The Enuma Elish and Legal-Legitimizing Power of Marduk The Babylonian creation epic reworks the tablet story to establish Marduk’s supremacy, transferring cosmic authority legally through the tablet’s possession. It affirms that political power depends on rightful custodianship of tradition rather than force alone. Conclusion: The tablet functions as a divine legal title deed conferring cosmic legitimacy. 01:31:10-01:44:38 | Sumerian King List and Theoretical Framework of Authority The King List reveals kingship’s heavenly descent and physical transfer across cities, reinforcing the idea of tablets and temples as symbols and mechanisms of legitimate rule. Pilgrimages to Nippur for recognition exemplify the institutionalization of authority. Conclusion: Power was consistently viewed as a delegated, transferable trust. 01:44:38-01:46:17 | Final Reflections and Ongoing Mysteries The video closes by emphasizing the tablet’s enduring mystery—no physical artifact identified—yet it remains central in a vast textual archive connecting governance, cosmic order, and recorded knowledge. Conclusion: The question “What is the tablet?” remains open, inviting continued exploration. Key Points 📜 The Tablet of Destinies was conceptualized as a physical legal document conferring and fixing authority across divine and earthly realms. 🏛 Sumerian civilization saw kingship as descending from heaven, legitimized only by custodianship of sacred objects and temple endorsement. 🔥 The theft of the tablet in myths causes cosmic paralysis, showing authority’s function as systemic order, not mere metaphor. 💧 Variant traditions place the tablet in both Enlil’s mountain sanctuary and Enki’s underworld waters, representing dual aspects of sovereignty: executive power and esoteric wisdom. ⚖ The Me (divine ordinances) system complements the tablet, listing many physical “laws” governing civilization’s functions including creation and destruction, implying a comprehensive operational system. 📚 The Enuma Elish story is a legal argument legitimizing Marduk as holder of cosmic authority through the tablet, displacing older traditions. 🔑 Authority in Mesopotamia was received, delegated, and documented; power was a trust bound by ritual, law, and written record. 🌠 The tablet’s mythological tradition coexisted with the earliest empirical astronomical observations, suggesting a link between cosmic regularities and governance. Key Insights The tablet is not a mere symbol but an operational mechanism in myth, which suspends cosmic functions when stolen (Ans myth). Multiple independent texts spanning centuries and sites show remarkable consistency in the tablet’s function as the source of legitimate power. The explicit legal language in inscriptions (e.g., Sinakaribb’s) frames authority in terms of contracts, deeds, and sealed documents, emphasizing a juridical model of power. Variant traditions about custodianship (Enlil vs Enki) open profound interpretations about visible political order versus hidden cosmic knowledge. The Sumerian King List’s opening phrase “kingship descended from heaven” frames monarchy as a cosmic inheritance, situating political authority firmly within a divine legal tradition. Frequently Asked Questions (FAQs) What is the Tablet of Destinies? It is a cuneiform tablet described in ancient texts as a divine legal document conferring supreme authority over gods, kings, and the cosmos. Did the Sumerians actually have this tablet as a physical object? No confirmed artifact has been found, but texts treat it as real and functional—whether literal or symbolic remains debated. How did the tablet relate to kingship? Kingship legitimacy depended on possessing or being recognized through the tablet’s authority, often confirmed at Nippur’s temple of Enlil. What happens when the tablet is stolen in myths? The cosmic order stops functioning; rituals fail, gods lose power, illustrating authority as a system dependent on the tablet’s presence. What is the difference between Enlil’s and Enki’s roles? Enlil embodies executive, visible authority; Enki holds esoteric wisdom linked to the tablet in the underworld waters, representing complementary aspects of cosmic order. Consider The video sheds light on an extraordinary ancient conception of authority as fixed, transferable, and cosmic, embodied in the Tablet of Destinies and the divine ordinances (Me), recorded meticulously by the Sumerians. This approach dismantles modern separations between myth, law, and science by showing how early civilizations interwove them to articulate legitimacy and governance. The consistent textual tradition spanning thousands of years affirms authority’s origin as inherited and documented rather than claimed or invented. For viewers, the takeaway is that the quest to understand power’s roots is age-old, recorded in clay, and ongoing. The next steps involve appreciating ancient legal and mythological frameworks not just as stories, but as reflections of complex social technologies that still inform our views on authority and legitimacy today. Exploring further archaeological findings and advancing interdisciplinary scholarship may gradually untangle the tablet’s full meaning—keeping alive the human conversation about the nature and source of rightful rule. #Mythstr
#mythstr
0300 sats
Libretech Systems - DARKLEAF8h ago
https://youtu.be/40teh4_f2R8
0000 sats
Libretech Systems - DARKLEAF8h ago
https://youtu.be/YwbkyEzYBHI
1100 sats
Libretech Systems - DARKLEAF8h ago
https://youtu.be/q31AB4wtibA
1000 sats
Libretech Systems - DARKLEAF8h ago
https://youtu.be/YwbkyEzYBHI
0000 sats
Libretech Systems - DARKLEAF8h ago
https://youtu.be/WRGXhjLb8iM
0000 sats
Libretech Systems - DARKLEAF8h ago
https://youtu.be/EmltJWYRBY8
0000 sats
Libretech Systems - DARKLEAF9h ago
https://youtu.be/J_DPnmAJcCM The intersection of computer science and political science to empirically analyze and monitor internet censorship worldwide. The speaker presents censorship resistance not just as a conventional security challenge but as a complex problem involving politically motivated adversaries investing significant resources to control information access. Through the IC Lab project, which employs innovative network measurement techniques, the team detects and fingerprints censorship mechanisms globally. The talk emphasizes the benefits of collaborative, multidisciplinary approaches, the importance of fine-grained measurement to identify subtle censorship tactics, and the challenges in conducting such measurements safely and effectively. This content is suitable for researchers, policy makers, technologists, and human rights advocates interested in internet freedom, network measurement, and censorship detection. Viewers will learn about novel methodologies in network measurement, real-world censorship cases, and the nuances of detecting both overt and stealth internet filtering. ## Timeline Summary - **00:00 - 04:07: Introduction to censorship resistance and the value of measurement** The speaker frames censorship resistance as a security problem with adversaries motivated by political goals and backed by substantial resources. They explain the widespread use of censorship and surveillance products developed by Western companies globally. The talk introduces the IC Lab project, focusing on collaboration with political scientists and new network measurement methods to detect censorship and identify specific blocking technologies. The segment concludes with a historical example where public measurement reduced radio jamming after WWII, highlighting the power of transparency in changing behavior. - **04:08 - 07:14: Detailed censorship measurement techniques** This section discusses the challenges of detecting censorship beyond simple blocked pages, including interpreting ambiguous responses like missing HTML content or non-explicit denial messages. The speaker describes technical strategies such as analyzing DNS replies, packet injections, and TCP resets to differentiate censorship from network failures. The importance of identifying censorship methods and the responsible parties (ISPs, governments, or content providers) is underscored. Various experimental approaches, like modifying HTTP headers or adjusting IP TTL values to detect middlebox interference, illustrate the complexity and layered nature of the measurements conducted by the IC Lab. - **07:15 - 10:44: IC Lab's architecture and operational challenges** This segment describes the IC Lab's infrastructure: a control server dispatches tests to vantage points worldwide, including VPN nodes and Raspberry Pis operated by volunteers. Data collection emphasizes client simplicity and centralized analysis to enable retrospective study of results. Key problems include ensuring secure communications, differentiating censorship from failures, and safeguarding volunteers from government retaliation. The trade-offs between wide coverage using VPNs and the risks to people on the ground are explained. A world map shows the current deployment landscape. - **10:45 - 14:22: Case study—Yemen conflict censorship analysis** The speaker recounts collaboration with Citizen Lab during the Yemen conflict, focusing on national ISP backbone censorship using Western-developed products like NetSweeper. A main highlight is using IP TTL measurement to confirm stealth censorship where a 404 error page was injected to hide censorship from users. This technique revealed attempts to obscure political content filtering. The case underscores how network measurement can expose subtle censorship practices and comply with sanction enforcement efforts. - **14:23 - 16:41: Case study—Iran censorship and sanctions impact** Working with UK-based Small Media, the IC Lab examined the effect of tech sanctions on internet access in Iran. The measurement revealed both government-forced blocking of local content and server-side blocking from companies (e.g., Google) enforcing sanctions. The study also exposed inconsistencies in blocking within the country and among different providers, emphasizing the necessity of multiple vantage points per country for accurate insights. These findings illustrate the complexity of internet filtering amid political and economic sanctions. - **16:42 - 17:58: Conclusions and final reflections** The speaker summarizes how network measurement deepens understanding of global internet censorship, especially non-obvious censorship. They highlight the interdisciplinary nature of the approach, incorporating social science expertise to guide where and what to measure. This collaboration yields novel technical challenges and solutions, enriching both policy and technology domains. The talk closes inviting questions, reinforcing the ongoing nature of the research. ## Points To Consider - **🌐 Censorship resistance involves politically motivated, resourceful adversaries, differing from typical spam or malware attackers.** - **🔍 IC Lab uses advanced network measurement techniques beyond simple reachability tests to detect subtle censorship tactics, including injected packets and header manipulations.** - **🛠 Real-world censorship tools are often Western-developed but used globally to violate human rights, raising ethical and enforcement questions.** - **🕵‍♂️ The project combines technical network science with political science to identify local contexts and prioritize meaningful measurements.** - **📡 Measurements use a global network of vantage points—VPNs for broad coverage and Raspberry Pis for on-the-ground data—balancing safety and data quality.** - **📊 Case studies in Yemen and Iran highlight diverse censorship methods from overt block pages to stealthy HTTP 404 injections and sanction-driven server blocks.** - **🔐 Ensuring data integrity requires secure communication between clients and servers and inventive methods to distinguish failures from censorship manipulations.** - **🌍 Multiple vantage points within countries are crucial for understanding heterogeneous censorship behaviors.** ## Insights - **[00:03:29] Historical precedent shows that publishing censorship data alone can pressure governments to reduce censorship efforts without direct sanctions or confrontation.** - **[00:05:57] Understanding how censorship is implemented (DNS blocking, TCP resets, packet injection) enables better evasion and circumvention strategies.** - **[00:12:45] Using IP TTL difference measurements to detect injected censorship packets is a clever technical method for identifying stealth filtering.** - **[00:15:48] Server-side blocking by companies (e.g., Google) to enforce sanctions complicates the censorship landscape beyond government actions.** - **[00:16:29] The variability of blocking within countries illuminates the complexity of censorship architectures, necessitating granular, geographically diverse measurement approaches.** ## Frequently Asked Questions (FAQs) 1. **Q: Why is it important to measure censorship in such detail instead of just checking if websites are blocked?** **A:** Detailed measurements reveal subtle censorship techniques like injected error messages or TCP resets that can hide filtering activity. This helps in understanding the methods used and crafting effective circumvention tools. 2. **Q: How does IC Lab keep researchers and volunteers safe when measuring censorship in authoritarian countries?** **A:** The project uses VPN vantage points to reduce risk and only deploys Raspberry Pis where local volunteers can operate safely. Safety is a priority to prevent government retaliation against participants. 3. **Q: How can network measurements distinguish between censorship and network failures?** **A:** By analyzing packet captures for injected reset packets, monitoring TTL values, and correlating data across multiple vantage points, researchers can differentiate censorship from technical outages or misconfigurations. 4. **Q: What role do sanctions play in internet censorship?** **A:** Sanctions can lead to server-side blocking by companies refusing access to users in sanctioned countries, adding complexity to censorship that involves both state and corporate actors. 5. **Q: Can publishing censorship measurement data actually reduce censorship?** **A:** Yes, historical examples show that transparency and public reports can pressure governments to reduce censorship, even without direct sanctions or interventions. ## For Your Consideration This video elucidates how network measurement, when combined with political science insights, can uncover both overt and hidden forms of internet censorship worldwide. The IC Lab’s multidisciplinary approach enables the discovery of nuanced censorship techniques, supporting human rights through empirical transparency. The demonstrated case studies show practical applications of these methods with significant policy implications, such as verifying sanctions enforcement and revealing stealth censorship. For researchers and advocates, this work suggests that continuous, diverse, and sophisticated measurement is essential to understand and combat modern censorship. The next steps include expanding vantage points for better local granularity, enhancing techniques to counter new censorship methods, and fostering stronger interdisciplinary collaborations to keep internet freedom under watch.
0210 sats
Libretech Systems - DARKLEAF10h ago
https://youtu.be/28sQyweAPRs Trump's Initial Approach to Power [00:00:04] Upon taking office, President Trump quickly began dismantling previous executive actions and making sweeping changes, often through executive orders. This 'flood the zone' approach aimed to overwhelm the system with rapid action, fulfilling campaign promises to 'drain the swamp' and upend Washington. His actions showcased a presidency determined to operate with speed and decisiveness, leading to a significant increase in executive orders compared to his predecessors. Trump's Legal Challenges and Emergence of Political Immunity [00:05:12] After leaving office following the January 6th Capitol attack, Trump faced a cascade of legal problems, including indictments for fraud, sexual abuse, and attempts to overturn the 2020 election. However, a significant legal victory came with the Supreme Court's decision on presidential immunity, which effectively shielded him from prosecution for acts taken as president. This ruling was seen by many as a 'get out of jail free card' and a psychological endorsement of the idea that the president is above the law. Weaponizing the Justice Department [00:18:48] The documentary details how Trump's administration aimed to transform the Justice Department into an instrument of his political will. This included pardoning January 6th defendants, firing career prosecutors and FBI leaders deemed disloyal, and appointing personal lawyers to top positions within the DOJ. Critics argue this subverted the department's independence, turning it into a tool for political retribution and targeting perceived enemies, breaking a norm established after Watergate. Targeting Federal Agencies and Independent Watchdogs [00:45:15] Trump's administration, guided by figures like Russell Vote, sought to dismantle parts of the federal bureaucracy. USAID became a test case, experiencing deep cuts and mass firings, demonstrating the administration's willingness to override congressional mandates. This was followed by the mass dismissal of 17 inspectors general across various agencies, who are meant to be independent watchdogs. These actions were seen as a systematic removal of independent accountability and an assertion of unchecked presidential power. Confrontation with Law Firms and the Judiciary [00:55:00] Trump also targeted law firms that filed lawsuits against his administration, revoking security clearances and government contracts. This was seen as an attempt to intimidate the legal profession and stifle opposition. He also engaged in confrontations with the judiciary, particularly over immigration policies. Despite court rulings against his administration, Trump often defied orders and publicly attacked judges, raising concerns about the executive branch's respect for judicial authority and the rule of law. The Supreme Court's later rulings in favor of several Trump administration policies further emboldened this approach. The Stress on Constitutional Structure [01:06:50] The documentary concludes by highlighting the significant stress placed on the U.S. constitutional structure. With a less independent Congress and a Justice Department seen as politicized, the courts became the primary check on presidential power. The debate over the unitary executive theory and presidential immunity continued to intensify, with the Supreme Court's decisions amplifying executive authority. The overall narrative points to a profound shift in the balance of power, questioning the future of democratic norms and the rule of law in America, contingent on public understanding and reaction.
0200 sats
Libretech Systems - DARKLEAF10h ago
https://youtu.be/d1YyrgK7VbE Bitcoin's Censorship-Resistance Test: Canada This documentary explores the concept of financial censorship by governments and examines how Bitcoin performed as a censorship-resistant alternative during the Canadian trucker protests. Financial Censorship as a Government Tool: Governments wield significant power by cutting off access to the global banking system. This has been used for various purposes, including targeting specific industries (e.g., firearms dealers, payday lenders), blocking legal businesses (e.g., marijuana dispensaries), and imposing sanctions on other nations. Canadian Trucker Protests and Financial Freeze: During the Canadian trucker protests in Ottawa, Prime Minister Justin Trudeau's government froze the bank accounts of participants and supporters, demonstrating a powerful form of financial censorship. The Rise of "Honk Honk Hodl": In response to traditional crowdfunding platforms like GoFundMe being pressured to cancel donations for the truckers, a Bitcoin-based fundraiser called "Honk Honk Hodl" was created. This initiative aimed to bypass government and corporate control over financial flows. Rapid Bitcoin Fundraising: The "Honk Honk Hodl" campaign quickly gained traction, raising over $1 million USD worth of Bitcoin. This demonstrated Bitcoin's potential to circumvent traditional financial gatekeepers. Challenges in Distribution and Control - The fundraiser faced pressure from donors demanding distribution and from public figures worried about legal repercussions. Funds were held in a multi-signature Bitcoin wallet, requiring multiple key holders for access, which complicated distribution. Crucially, the Bitcoin was not held on an exchange, a key factor in its censorship resistance. The "Last Mile" Problem: Distributing the Bitcoin to individual truckers proved challenging. Organizers resorted to printing QR codes and physically handing them out, a process that was risky and exposed them to potential legal action and theft. Bitcoin's Transparency vs. Privacy: While Bitcoin itself is censorship-resistant, its radical transparency means all transactions are publicly visible on the blockchain. This made it difficult for organizers to prove to donors that the funds reached the truckers without making the recipients identifiable to authorities. Legal Ramifications and Seizures: A class-action lawsuit targeted those involved in funding the truckers. Authorities eventually seized Bitcoin from organizers, highlighting that while the system is decentralized, the users and their physical interactions can still be targeted. Lessons Learned: The event underscored the need for better strategic planning, user-friendly privacy measures, and a more robust infrastructure for large-scale Bitcoin crowdfunding. It also highlighted that while Bitcoin is censorship-resistant, the "last mile" of distribution into the physical world remains a vulnerability. The documentary concludes that Bitcoin performed as a censorship-resistant digital money, akin to cash or gold, but the experience revealed the complexities and risks involved when bridging the digital and physical worlds, emphasizing the ongoing evolution required for truly decentralized and private financial tools. #Bitcoin #CensorshipResistance
#bitcoin#censorshipresistance
2300 sats
Libretech Systems - DARKLEAF11h ago
https://youtu.be/5MU54RdAhJE Julian Assange: Inside the WikiLeaks Saga This documentary chronicles the life and impact of Julian Assange, the founder of WikiLeaks, and the organization's role in changing global perceptions of truth, transparency, and power. It details Assange's journey from a hacker to a controversial figure who believed in exposing secrets at any cost. Founding of WikiLeaks: Julian Assange established WikiLeaks in 2006 as a non-profit organization dedicated to publishing classified and sensitive information, aiming to expose corruption, war crimes, and the inner workings of powerful institutions. Groundbreaking Leaks - WikiLeaks gained notoriety for publishing significant leaks, including - The "Collateral Murder" video (2010), which showed the killing of Iraqi civilians and journalists by US Apache helicopters. The Afghan War Diary (2010), releasing over 92,000 documents detailing incidents of friendly fire and civilian casualties. The Iraq War Logs (2010), comprising nearly 400,000 documents offering an intimate, detailed perspective on the war, described as the largest leak of classified documents in US military history. Other leaks exposed issues like Guantanamo Bay procedures, Scientology documents, Sarah Palin's public record violations, and toxic dumping in Africa. Legal Battles and Confinement - Assange faced allegations in Sweden, leading to an Interpol arrest warrant and an extradition battle. He sought asylum in the Ecuadorian embassy in London, residing there for seven years as a sanctuary that also became his prison. He was eventually forcibly removed from the embassy and spent over three years in Belmarsh Prison, with his health deteriorating. The video highlights the ongoing fight against extradition to the United States, where he faces espionage charges. Impact and Legacy - WikiLeaks' publications sparked worldwide debates on government transparency, accountability, and press freedom. The case raises questions about the right to information and the potential consequences for whistleblowers and journalists. The documentary emphasizes the immense personal toll on Assange and frames his fight as one for freedom and the defense of the powerless. It concludes with Assange's eventual release, noting his journey has inspired activists and journalists, and the debate continues on whether he is a hero or a criminal.
0000 sats
Libretech Systems - DARKLEAF11h ago
https://youtu.be/UKoDqErD_A8 Project Censored: Is the Press Really Free? This 1998 documentary, "Project Censored: Is the Press Really Free?", investigates the mechanisms of news censorship within mainstream media. It highlights the work of Project Censored, an organization founded by Professor Carl Jensen, which identifies significant news stories that are ignored by major media outlets but covered by alternative publications. The film argues that despite the First Amendment's protection of a free press, several factors prevent the media from fully informing the public. These include media consolidation, a focus on profit and audience share, reliance on public relations (PR) generated content, and the influence of advertisers. The documentary examines specific examples of censored stories to illustrate these points. The Genesis of Project Censored: Founded by Professor Carl Jensen after the Watergate scandal, the project began by noticing that major news outlets failed to cover critical stories, such as Watergate itself, which were present in the alternative press. Mechanisms of Censorship: Structural Censorship: Media consolidation has led to a few mega-corporations controlling most news outlets, prioritizing profit and audience numbers over in-depth reporting. PR Censorship: A significant portion of news content is pre-spun or pre-written by PR professionals working for corporations and governments, shaping stories to serve their interests. Marketplace Censorship: Mainstream media often avoids running critical stories that might offend major advertisers or corporate partners, impacting their revenue. Cultural Norms: Reporters learn the "culture" of their newsroom and often avoid pursuing stories they know will not be published or will be buried, impacting career advancement. Highlighted Censored Stories: US Arms Transfer Code of Conduct: Congress unanimously approved a code prohibiting arms sales to undemocratic regimes or those abusing human rights. However, this code was largely ignored by Congress and the Clinton administration. The documentary reveals how surplus US military arms were sold or given away to dozens of foreign countries, sometimes ending up in the hands of opponents faced by American troops in conflicts. Dangers in Hygiene Products: Research highlighted the presence of known carcinogens (like nitrosamines, titanium dioxide, and talc) in common hygiene products. Despite FDA knowledge of these dangers, particularly concerning nitrosamine contamination in cosmetics and the link between talc and ovarian cancer, regulatory action was minimal, suggesting a prioritization of corporate profits over public health. Monsanto's rBGH in Dairy: The film discusses the use of recombinant bovine growth hormone (rBGH) in cows to increase milk production. This practice, banned in several European countries, Canada, and New Zealand, was approved by the FDA despite evidence of potential health risks for cows (leading to increased antibiotic use) and humans, including links to thyroid cysts and prostate abnormalities in studies. The documentary questions the FDA's oversight and Monsanto's safety claims, drawing parallels to the Agent Orange controversy. Posing the question of whether the press, despite its constitutional protections, is truly free when economic pressures, corporate interests, and structural biases limit the flow of critical information to the public. #Nostr #Pro-censorship
#nostr#pro
0300 sats
Libretech Systems - DARKLEAF11h ago
nostr:naddr1qpnxv6twv35kueed09hh2u3dw3exjcn994skxun0wdej6cfdw35x7atnv9hxgttjv4kxz7tn946xsefdda6hgcn00qkk6mmyv4kz66r0wukkummnw3ez6um0d3mx2uedvdhkuar9de6z6erfwd3k7an9wfuj6ct0vy6xgcgzyrf5aqedg2kchy7p58pussqfx3q97v9uh7zh7w029uqgcf3c8audqqcyqqq823c9sp5xj Finding your tribe across a thousand relays - The Outbox Model: How Nostr Solves Content Discovery
0000 sats

Network

Following

damienVishalxl🦄⚡️
PABLOF7z
David
PayPerQ
Bitcoiner Girl
Micro Sov Internet Ring
I am Einherjer, a Nomadic Norse! Never flinch, never surrender!
layer2market@vlt.ge
Skhron - VPS for Bitcoin, Lightning and Monero
Christopher Tamez
LightningSpore
Aynodarnac
ZEUS
Wayne
Guy Swann
[bit] max⚡️

Followers

Nunya BidnessBTheCoinAldocstrTheFuzzStoneGlobal Sports Central🦄⚡️Stoa OtterLysergic4cidElch🇦🇷🧡 Marcel 🟠⚡️ #Bitcoin is Hope 🙏MAKE SONGS LONGERnovocbbMircoSinedinZiganHeraclitBitBetBotPinguimdarelva⚡