Net Liquidity formula:
Net Liquidity = Federal Reserve Balance sheet - Treasury General Account - Reverse Repo
Twitter thread by Max Anderson:
#!/bin/bash | |
# Colors | |
RED='\033[0;31m' | |
GREEN='\033[0;32m' | |
NO_COLOR='\033[0m' | |
BLUE='\033[0;34m' | |
YELLOW='\033[0;33m' | |
NO_COLOR='\033[0m' |
<div class="min-h-screen justify-center flex p-16 bg-blue-200"> | |
<div> | |
<!-- This is a revised version. See the original clunky version here: https://codepen.io/KevinBatdorf/pen/ff805cf637420bcbb2caa9d199527247?editors=1010 --> | |
<p class="mb-10 text-center">Drag & drop or press the menu icon button <br>(or use your tab key)</p> | |
<div class="pt-6 pb-4 bg-indigo-500 rounded-lg shadow-xl max-w-sm"> | |
<h1 id="agenda-title" class="text-white font-extrabold text-lg p-6 pt-0">What's the agenda for today?</h1> | |
<ul |
IO.puts("Using .iex.exs file loaded from #{__DIR__}/.iex.exs") | |
defmodule Util do | |
def atom_status do | |
limit = :erlang.system_info(:atom_limit) | |
count = :erlang.system_info(:atom_count) | |
IO.puts("Currently using #{count} / #{limit} atoms") | |
end |
Net Liquidity formula:
Net Liquidity = Federal Reserve Balance sheet - Treasury General Account - Reverse Repo
Twitter thread by Max Anderson:
#!/usr/bin/env bash | |
# Small shell script to more easily automatically download and transcribe live stream VODs. | |
# This uses YT-DLP, ffmpeg and the CPP version of Whisper: https://github.com/ggerganov/whisper.cpp | |
# Use `./transcribe-vod help` to print help info. | |
# MIT License | |
# Copyright (c) 2022 Daniils Petrovs |
### | |
### [2023-06-19] UPDATE: Just tried to use my instructions again on a fresh install and it failed in a number of places. | |
###. Not sure if I'll update this gist (though I realise it seems to still have some traffic), but here's a list of | |
###. things to watch out for: | |
### - Check out the `nix-darwin` instructions, as they have changed. | |
### - There's a home manager gotcha https://github.com/nix-community/home-manager/issues/4026 | |
### | |
# I found some good resources but they seem to do a bit too much (maybe from a time when there were more bugs). | |
# So here's a minimal Gist which worked for me as an install on a new M1 Pro. |
#!/bin/bash | |
# | |
# Convert an SVG file to a PDF file by using headless Chrome. | |
# | |
if [ $# -ne 2 ]; then | |
echo "Usage: ./svg2pdf.bash input.svg output.pdf" 1>&2 | |
exit 1 | |
fi |
For context: https://twitter.com/21isenough/status/1255182788686462983?s=20 | |
TorThisTx() { | |
# Rename "TorThisTx() to whatever you want the command to be | |
# Broadcast raw hex transaction over blockstreams TOR API with curl | |
curl --socks5-hostname localhost:9050 -d $1 -X POST http://explorerzydxu5ecjrkwceayqybizmpjjznk5izmitf2modhcusuqlid.onion/api/tx | |
} |
brew cask install adoptopenjdk8
brew cask install android-sdk
Today (April 16th 2019 at noon) the first major clues to discover key #1 was set to be released in a few cities. A QR code with the words 'orbital' were found at these locations and looked like this: (https://imgur.com/a/6rNmz7T). If you read the QR code with your phone you will be directed to this url: https://satoshistreasure.xyz/k1
At this URL you are prompted to input a passphrase to decrypt the first shard. An obvious first guess was to try the word 'orbital' from the QR code. Not suprisingly this worked! This reveals a congratulations page and presents the first key shard:
ST-0001-a36e904f9431ff6b18079881a20af2b3403b86b4a6bace5f3a6a47e945b95cce937c415bedaad6c86bb86b59f0b1d137442537a8
.
Now, we were supposed to wait until April 17th to get clues from the other cities for keys #2 and #3 but that wouldn't stop me from digging around with all the new information we had. All that time "playing" notpron (http://notpron.org/notpron/) years ago was going to help me here.
The first thing I noticed was