The environmental impact of fiat money

Ignorant people rant about the environmental impact of cryptocurrencies. They don't know shit. How many wars were created over fiat currencies and the power plays of politicians and central bankers?

Fiat currencies are inflationary, so they encourage economic growth (at what cost? At whose expense?). That inflation also attenuates the indebtedness of states, it is like an invisible tax against the poor and the financially uneducated.

Dumb journalists, central bankers and politicians try to hinder financial independence and privacy with bans and biased news. They have failed; they will not succeed. It would be like trying to ban precious metals.

There are cryptocurrencies that are trash, that don't provide privacy, etc., but you can't tar everything with the same brush. Moreover, the environmental impact is minimal compared to fiat currencies. There are cryptocurrencies that pollute more than others, of course. For those who care more about the environment, there are cryptocurrencies that do not use proof-of-work algorithms.

Almost 4% of personal computers use GNU/Linux

According to Statcounter, GNU/Linux is the operating system used on 3.77% of desktop computers (laptops and desktop computers)1. In the chart we can see that in January 2021 the share of GNU/Linux was 1.91%, which means that in three years it has doubled its popularity. It's also worth mentioning that the share of Chrome OS (which uses the Linux kernel) is 1.78%.

However, this statistic is not fully representative, since Statcounter's tracking code is installed on only 1.5 million websites2. Also, some GNU/Linux users — those who care more about privacy — use tools that change the User-Agent (an example is Tor Browser, which always claims to use Windows to camouflage itself better).

In any case, this is an impressive growth that will probably continue in the coming years, as GNU/Linux is increasingly used in educational institutions and many countries are trying to increase their technological sovereignty (GNU/Linux is the cheapest and safest way to do it).


  2. «Our tracking code is installed on more than 1.5 million sites globally»: that's what they say in

Be quiet to protect your privacy

There are things we shouldn't disclose: that we cracked a website, bought cryptocurrencies and gold, robbed something, etc. To avoid being identified we must use technologies that allow anonymity (such as Tor and virtual private networks), pay in cash, and not show IDs, that's clear. However, we often forget something very basic: to be quiet.

Creating an anonymous digital identity, for example, is very simple: you register with a username on a website using a VPN or Tor and upload content. Losing that anonymity, on the other hand, is also very easy: just reveal some data related to your real identity. These digital identities can have data, but they must be false. The way we write can also reveal our real identity, so it's recommended to make an effort to change your writing style.

The people you interact with shouldn't know anything you want to keep hidden, even if they are people you trust. You never know if those people you trust today will still be trustworthy tomorrow. The con man who sold the Eiffel Tower twice, Victor Lustig, was arrested because his mistress became jealous of a relationship he was having with another woman and decided to rat him out.

Of course, many times we want to brag about our feats. We want to brag about our hacks, we want to show off.... Better not to do it. It's better to be humble and make up some excuse. “That's money my father gave me”; “I have cryptocurrencies, but not much”... In short, the best thing to do is to keep your mouth shut if you don't want to get caught and you don't want to be in the spotlight. Don't be the fool who brags about buying 100 grams of gold and the next day finds his house ransacked.

The battle of Usonansk

This story is based on real events. Identifying information has been distorted.

“According to the sources we have, they plan to focus their forces in this region”. Little did the generals know that their sources had been intentionally poisoned with false information. Something quite different happened.

It turns out that certain military and high-ranking people were doing research on the region that was going to be attacked, leaving a digital trail that allowed the enemy to confirm that they had swallowed their false information. They had found weaknesses in the chain of command and would not fail to exploit them. Some of these people were stubborn and had long careers, so they had no interest in leaving their high positions, despite their successive mistakes. Thus, they suffered social engineering attacks.

The social circle of key people was highly monitored to obtain all kinds of information, identify weak points, etc. The danger of direct confrontation and the fear of escalating the conflict were some of the weaknesses identified in the enemy.

On August 14, they received a surprise attack that went around the world. Their hasty response was discussed, very thoroughly in important offices. They were losing credibility and power by leaps and bounds. No-one believed in victory. They were pulling their money out of stocks and banks, out of those places they thought so safe.

They were severely infected by parasites who lived off them and let the cat out of the bag, waging internal struggles... The huge giant had feet of clay.