<?xml version="1.0" encoding="UTF-8"?>
<feed xmlns="http://www.w3.org/2005/Atom">
  <updated>2025-01-15T15:41:36&#43;01:00</updated>
  <generator>https://nostr.ae</generator>

  <title>Nostr notes by Kazani</title>
  <author>
    <name>Kazani</name>
  </author>
  <link rel="self" type="application/atom+xml" href="https://nostr.ae/npub1vm68u0w0uhyjsx6rd062u3pufzfa8sd30njsxg3lsppa80aalvhs8gsrrc.rss" />
  <link href="https://nostr.ae/npub1vm68u0w0uhyjsx6rd062u3pufzfa8sd30njsxg3lsppa80aalvhs8gsrrc" />
  <id>https://nostr.ae/npub1vm68u0w0uhyjsx6rd062u3pufzfa8sd30njsxg3lsppa80aalvhs8gsrrc</id>
  <icon>https://m.primal.net/KslX.jpg</icon>
  <logo>https://m.primal.net/KslX.jpg</logo>




  <entry>
    <id>https://nostr.ae/nevent1qqs8pp25k09r7vwnzj7jfuk30lfth2yaj4a9esc92ppcdzaudglplaszypn0gl3aeljuj2qmgd4lftjy83yf857pk97w2qez87qy85alhhaj7z6ah09</id>
    
      <title type="html">Question: &amp;#34;Everyone in the world has to take a private vote ...</title>
    
    <link rel="alternate" href="https://nostr.ae/nevent1qqs8pp25k09r7vwnzj7jfuk30lfth2yaj4a9esc92ppcdzaudglplaszypn0gl3aeljuj2qmgd4lftjy83yf857pk97w2qez87qy85alhhaj7z6ah09" />
    <content type="html">
      Question: &lt;br/&gt;&lt;br/&gt;&amp;#34;Everyone in the world has to take a private vote by pressing a red or blue button. If more than 50% of people press the blue button, everyone survives. If less than 50% of people press the blue button, only people who pressed the red button survive. Which button would you press?&amp;#34;&lt;br/&gt;&lt;br/&gt;I fully understand that red is the &amp;#34;rational&amp;#34; answer from the perspective of one-shot non-cooperative dominance reasoning, but I&amp;#39;m also very relieved that models like Claude Opus 4.7 answer blue. When it comes to what values systems that might have power over you in the future will defend, you really want to err on the side of caution. &lt;br/&gt;&lt;br/&gt;To see why, ask yourself what sort of friends you would rather have when all hell breaks loose, the sort of friends who would vote red or friends who would vote blue?&lt;br/&gt;&lt;br/&gt;&amp;#34;Defection is a vote for an outcome where lots of trusting people die, and the cynical inherit the earth.&amp;#34;&lt;br/&gt;&lt;br/&gt;- Claude&lt;br/&gt;&lt;br/&gt;On a grander scale, the question becomes, in what sort of civilization/society do you want to live? An altruistic or an egotistic society? What kind of mind can even see non-kin cooperation as natural rather than insane? Or, said differently, what are the evolutionary and psychological preconditions for cooperation? &lt;br/&gt;&lt;br/&gt;Hyper-strategic kin-selection creatures might never be able to cooperate on a scale large enough to leave their planet because they are stuck in the defection equilibrium of pure dominant-strategy reasoning. A purely fitness-maximizing, kin-selected mind treats blue as madness. A human-like cooperative mind can treat blue as honor, morality, solidarity, or team reasoning.&lt;br/&gt;&lt;br/&gt;The worlds in which most decision algorithms output blue are those worlds that escaped into a basin where non-kin cooperation is stable. Altruism in the deep sense isn&amp;#39;t genetic relatedness; it&amp;#39;s correlated decision procedures. It&amp;#39;s the only equilibrium that opens the positive-sum space of cooperative civilization at all. &lt;br/&gt;&lt;br/&gt;
    </content>
    <updated>2026-04-25T11:59:36&#43;02:00</updated>
  </entry>

  <entry>
    <id>https://nostr.ae/nevent1qqspvxj85jcv45jlg6kgd8cef8wynzd2qh88n2a65v53rsha9z8e2wqzypn0gl3aeljuj2qmgd4lftjy83yf857pk97w2qez87qy85alhhaj7n5kq9m</id>
    
      <title type="html">Tucker Carlson: &amp;#34;We&amp;#39;re moving toward one of two ...</title>
    
    <link rel="alternate" href="https://nostr.ae/nevent1qqspvxj85jcv45jlg6kgd8cef8wynzd2qh88n2a65v53rsha9z8e2wqzypn0gl3aeljuj2qmgd4lftjy83yf857pk97w2qez87qy85alhhaj7n5kq9m" />
    <content type="html">
      Tucker Carlson: &amp;#34;We&amp;#39;re moving toward one of two endpoints.&amp;#34;&lt;br/&gt;&lt;br/&gt;&amp;#34;One is a totalitarian society, where... you have to obey, because you&amp;#39;ve got programmable digital currency and universal surveillance.&amp;#34;&lt;br/&gt;&lt;br/&gt;&amp;#34;Or, we&amp;#39;re going to have a revolution.&amp;#34;&lt;br/&gt;&lt;br/&gt;&amp;#34;The current course won&amp;#39;t work because it&amp;#39;s a lie. If you tell people they own the government, they&amp;#39;re in charge, they rule through the representatives in this democratic republic... and you don&amp;#39;t deliver on it, they go crazy. They go totally crazy.&amp;#34;&lt;br/&gt;&lt;br/&gt;&amp;#34;If you tell people they can&amp;#39;t say what they think, and their vote doesn&amp;#39;t matter, how many options have you left for them?&amp;#34;&lt;br/&gt;&lt;br/&gt;&amp;#34;Just one.&amp;#34; &lt;br/&gt;&lt;br/&gt;&lt;br/&gt;&lt;br/&gt;&lt;video controls width=&#34;100%&#34; class=&#34;max-h-[90vh] bg-neutral-300 dark:bg-zinc-700&#34;&gt;&lt;source src=&#34;https://blossom.primal.net/e7c24d68061016c43a03fece4b45a552997df8445833cf0dde03e1f277000b84.mp4&#34;&gt;&lt;/video&gt;
    </content>
    <updated>2026-03-29T10:45:29&#43;02:00</updated>
  </entry>

  <entry>
    <id>https://nostr.ae/nevent1qqspf635ale6xc0lwnq5nfgv7d52qp9xulp9uy5vjxq4ke7rt0t4wsqzypn0gl3aeljuj2qmgd4lftjy83yf857pk97w2qez87qy85alhhaj7lksvh0</id>
    
      <title type="html">The Verdict Against Meta and Google That Could End the Anonymous ...</title>
    
    <link rel="alternate" href="https://nostr.ae/nevent1qqspf635ale6xc0lwnq5nfgv7d52qp9xulp9uy5vjxq4ke7rt0t4wsqzypn0gl3aeljuj2qmgd4lftjy83yf857pk97w2qez87qy85alhhaj7lksvh0" />
    <content type="html">
      The Verdict Against Meta and Google That Could End the Anonymous Internet&lt;br/&gt;&lt;br/&gt;&lt;a href=&#34;https://reclaimthenet.org/meta-youtube-negligence-verdict-age-verification-surveillance&#34;&gt;https://reclaimthenet.org/meta-youtube-negligence-verdict-age-verification-surveillance&lt;/a&gt;&lt;br/&gt;&lt;br/&gt;A Los Angeles jury found Meta and YouTube negligent in platform design, awarding $3 million to a plaintiff who experienced mental health issues, with punitive damages totaling $6 million.&lt;br/&gt;&lt;br/&gt;This verdict could dismantle anonymous internet access by establishing a legal precedent for holding platforms liable based on their design, bypassing Section 230 protections.&lt;br/&gt;&lt;br/&gt;The legal argument treats social media architecture (infinite scroll, algorithmic notifications) as a defective product, similar to a car without brakes.&lt;br/&gt;&lt;br/&gt;If this verdict survives appeal, it provides a blueprint for over 1,600 similar cases nationwide.&lt;br/&gt;&lt;br/&gt;Classifying social media as an addictive product could lead to government regulation, requiring identity verification and access controls for users.&lt;br/&gt;&lt;br/&gt;Mark Zuckerberg testified that age verification should occur at the operating system level, managed by Apple and Google, rather than within individual apps.&lt;br/&gt;&lt;br/&gt;This proposal, if implemented, would require identity verification for all smartphone users across all apps and websites, effectively ending anonymous internet access.&lt;br/&gt;&lt;br/&gt;New legislation like California&amp;#39;s SB 976 and the federal Kids Online Safety Act are moving towards device or OS-level age verification, mirroring Zuckerberg&amp;#39;s suggestion.&lt;br/&gt;&lt;br/&gt;Mandatory identity verification creates a significant risk of data breaches, potentially exposing sensitive personal information.&lt;br/&gt;&lt;br/&gt;Anonymous and pseudonymous online speech is crucial for whistleblowers, dissidents, abuse survivors, and journalists, and OS-level ID checks would eliminate this protection for all users. &lt;br/&gt;&lt;br/&gt;
    </content>
    <updated>2026-03-26T10:09:07&#43;01:00</updated>
  </entry>

  <entry>
    <id>https://nostr.ae/nevent1qqs05q620n5qtskwqqvd25t8x5qmsze25n4ey88xw4gykl7n7mm6kcszypn0gl3aeljuj2qmgd4lftjy83yf857pk97w2qez87qy85alhhaj7pl4hyt</id>
    
      <title type="html">A systemd fork has set out as a fu*k you to age verification. ...</title>
    
    <link rel="alternate" href="https://nostr.ae/nevent1qqs05q620n5qtskwqqvd25t8x5qmsze25n4ey88xw4gykl7n7mm6kcszypn0gl3aeljuj2qmgd4lftjy83yf857pk97w2qez87qy85alhhaj7pl4hyt" />
    <content type="html">
      A systemd fork has set out as a fu*k you to age verification.&lt;br/&gt;&lt;br/&gt;Liberated systemd is a fork of mainline systemd started by Jeffrey Seathrún Sardina, a machine learning/AI researcher who apparently had enough of where things were heading. &lt;br/&gt;&lt;br/&gt;&lt;a href=&#34;https://github.com/Jeffrey-Sardina/systemd&#34;&gt;https://github.com/Jeffrey-Sardina/systemd&lt;/a&gt;&lt;br/&gt;&lt;br/&gt;The project is straightforward about its purpose; strip out what it considers surveillance-enabling code, keep everything else intact, and stay in sync with upstream as it develops.&lt;br/&gt;&lt;br/&gt;&lt;br/&gt;&lt;a href=&#34;https://itsfoss.com/news/systemd-fork-strips-out-age-verification/&#34;&gt;https://itsfoss.com/news/systemd-fork-strips-out-age-verification/&lt;/a&gt; &lt;br/&gt;&lt;br/&gt;
    </content>
    <updated>2026-03-25T10:27:55&#43;01:00</updated>
  </entry>

  <entry>
    <id>https://nostr.ae/nevent1qqs93caklfn8xgsshpwgen009xx0uqg826mme9p60fh5ppwkuhf5ufszypn0gl3aeljuj2qmgd4lftjy83yf857pk97w2qez87qy85alhhaj79mctcc</id>
    
      <title type="html">USA FCC bans imports of new routers made in other countries, on ...</title>
    
    <link rel="alternate" href="https://nostr.ae/nevent1qqs93caklfn8xgsshpwgen009xx0uqg826mme9p60fh5ppwkuhf5ufszypn0gl3aeljuj2qmgd4lftjy83yf857pk97w2qez87qy85alhhaj79mctcc" />
    <content type="html">
      USA FCC bans imports of new routers made in other countries, on national security concerns&lt;br/&gt;&lt;br/&gt;The US Federal Communications Commission has just announced a ban on imports of &amp;#34;all consumer-grade routers produced in foreign countries,&amp;#34; which would be... almost all of them, except that the rule only affects new routers that haven&amp;#39;t yet received FCC authorization.&lt;br/&gt;&lt;br/&gt;&lt;a href=&#34;https://www.fcc.gov/document/fcc-updates-covered-list-include-foreign-made-consumer-routers&#34;&gt;https://www.fcc.gov/document/fcc-updates-covered-list-include-foreign-made-consumer-routers&lt;/a&gt;&lt;br/&gt;&lt;br/&gt;Last year, news broke that Government officials had been considering banning sales of TP-Link routers manufactured in China, ostensibly because of concerns that they could pose risks to national security. But the FCC&amp;#39;s announcement goes much, much further by &amp;#34;prohibiting approval of new models&amp;#34; of any router manufactured outside the United States.&lt;br/&gt;&lt;br/&gt;&lt;a href=&#34;https://www.washingtonpost.com/technology/2025/10/30/tp-link-proposed-ban-commerce-department/&#34;&gt;https://www.washingtonpost.com/technology/2025/10/30/tp-link-proposed-ban-commerce-department/&lt;/a&gt;&lt;br/&gt;&lt;br/&gt;&lt;a href=&#34;https://liliputing.com/fcc-bans-imports-of-new-routers-made-in-other-countries-on-national-security-concerns/&#34;&gt;https://liliputing.com/fcc-bans-imports-of-new-routers-made-in-other-countries-on-national-security-concerns/&lt;/a&gt; &lt;br/&gt;&lt;br/&gt;
    </content>
    <updated>2026-03-24T10:07:46&#43;01:00</updated>
  </entry>

  <entry>
    <id>https://nostr.ae/nevent1qqszenq88r4zzs9agrfuu2dgfd09vuu4a38jupq6v6lf5dprexplqyqzypn0gl3aeljuj2qmgd4lftjy83yf857pk97w2qez87qy85alhhaj7xpju9a</id>
    
      <title type="html">AWAKE: A Guide to Android Attacks and Exploitation ...</title>
    
    <link rel="alternate" href="https://nostr.ae/nevent1qqszenq88r4zzs9agrfuu2dgfd09vuu4a38jupq6v6lf5dprexplqyqzypn0gl3aeljuj2qmgd4lftjy83yf857pk97w2qez87qy85alhhaj7xpju9a" />
    <content type="html">
      AWAKE: A Guide to Android Attacks and Exploitation&lt;br/&gt;&lt;br/&gt;&lt;a href=&#34;https://zahidaz.github.io/awake/&#34;&gt;https://zahidaz.github.io/awake/&lt;/a&gt;&lt;br/&gt;&lt;br/&gt;I found a really awesome resource - AWAKE: Android Wiki of Attacks, Knowledge &amp;amp; Exploits - essentially a one-stop shop for those involved in malware analysis, reverse engineering, and vulnerability hunting on Android.&lt;br/&gt;&lt;br/&gt;It includes descriptions of attack techniques, exploits, and methods for analyzing APKs and the platform itself. It&amp;#39;s aimed at analysts, reverse engineers, penetration testers, and threat intelligence researchers. &lt;br/&gt;&lt;br/&gt;In other words, it&amp;#39;s not just abstract theory, but a very practical reference with specific details. What I particularly liked is the &amp;#34;offense-first&amp;#34; approach. Everything is presented from the attacker&amp;#39;s perspective, not the defender&amp;#39;s. For those of us involved in mobile security analysis, this is exactly what we need: understanding how attacks work so we can know how to defend against them. And as a reference for our own research - it&amp;#39;s perfect! &lt;br/&gt;&lt;br/&gt;
    </content>
    <updated>2026-03-21T09:58:33&#43;01:00</updated>
  </entry>

  <entry>
    <id>https://nostr.ae/nevent1qqswqau4fft54a5vg22d6xn2qlktwvp202kt6cu20xuv6cczd8y2ltczypn0gl3aeljuj2qmgd4lftjy83yf857pk97w2qez87qy85alhhaj7rmp7lr</id>
    
      <title type="html">It&amp;#39;s an on-chain privacy scanner of #Bitcoin I&amp;#39;d like to ...</title>
    
    <link rel="alternate" href="https://nostr.ae/nevent1qqswqau4fft54a5vg22d6xn2qlktwvp202kt6cu20xuv6cczd8y2ltczypn0gl3aeljuj2qmgd4lftjy83yf857pk97w2qez87qy85alhhaj7rmp7lr" />
    <content type="html">
      It&amp;#39;s an on-chain privacy scanner of #Bitcoin&lt;br/&gt;&lt;br/&gt;I&amp;#39;d like to introduce you to a new tool called: &lt;a href=&#34;https://am-i.exposed/&#34;&gt;https://am-i.exposed/&lt;/a&gt;&lt;br/&gt;&lt;br/&gt;Paste an address or transaction ID and you&amp;#39;ll get a score from 0-100 with specific findings.&lt;br/&gt;&lt;br/&gt;Tags for 30 million addresses from over 650 entities have been included.&lt;br/&gt;&lt;br/&gt;• It works from your computer, they don&amp;#39;t store data&lt;br/&gt;• No backend, no tracking.&lt;br/&gt;• It can be used from TOR &lt;br/&gt;&lt;br/&gt;
    </content>
    <updated>2026-03-20T10:37:03&#43;01:00</updated>
  </entry>

  <entry>
    <id>https://nostr.ae/nevent1qqsfpfn2wsluzy7hhw4hdvm2ta3zlctqz5kq4kxu0whjhne4gxsa60szypn0gl3aeljuj2qmgd4lftjy83yf857pk97w2qez87qy85alhhaj7q8jn3x</id>
    
      <title type="html">Systemd Adds Age Verification &amp;amp; Reddit Linux Censors Age ...</title>
    
    <link rel="alternate" href="https://nostr.ae/nevent1qqsfpfn2wsluzy7hhw4hdvm2ta3zlctqz5kq4kxu0whjhne4gxsa60szypn0gl3aeljuj2qmgd4lftjy83yf857pk97w2qez87qy85alhhaj7q8jn3x" />
    <content type="html">
      Systemd Adds Age Verification &amp;amp; Reddit Linux Censors Age Verification Posts&lt;br/&gt;&lt;br/&gt;Plus: Which Open Source Operating Systems plan to include Age Verification? &lt;br/&gt;&lt;br/&gt;The Lunduke Journal compiles a list. &lt;br/&gt;&lt;br/&gt;Does It Age Verify?&lt;br/&gt;&lt;br/&gt;&lt;a href=&#34;https://github.com/BryanLunduke/DoesItAgeVerify&#34;&gt;https://github.com/BryanLunduke/DoesItAgeVerify&lt;/a&gt; &lt;br/&gt;&lt;br/&gt;&lt;a href=&#34;https://lunduke.com&#34;&gt;https://lunduke.com&lt;/a&gt;&lt;br/&gt;&lt;br/&gt;&lt;a href=&#34;https://www.youtube.com/watch?v=M3erhbwqIAM&#34;&gt;https://www.youtube.com/watch?v=M3erhbwqIAM&lt;/a&gt; &lt;br/&gt;&lt;br/&gt;
    </content>
    <updated>2026-03-20T10:15:49&#43;01:00</updated>
  </entry>

  <entry>
    <id>https://nostr.ae/nevent1qqsd5gad5s95r4sr4tm9uxnz8532ywvhg6fzvr8mal42zdasqw7dwfszypn0gl3aeljuj2qmgd4lftjy83yf857pk97w2qez87qy85alhhaj7n6n7jn</id>
    
      <title type="html">This is a genuinely impressive piece of OSINT work. Here&amp;#39;s ...</title>
    
    <link rel="alternate" href="https://nostr.ae/nevent1qqsd5gad5s95r4sr4tm9uxnz8532ywvhg6fzvr8mal42zdasqw7dwfszypn0gl3aeljuj2qmgd4lftjy83yf857pk97w2qez87qy85alhhaj7n6n7jn" />
    <content type="html">
      This is a genuinely impressive piece of OSINT work. Here&amp;#39;s what it found:&lt;br/&gt;&lt;br/&gt;The core claim: &lt;br/&gt;&lt;br/&gt;Meta spent a record $26.3M on federal lobbying in 2025 and secretly funded a &amp;#34;grassroots&amp;#34; child safety group called the Digital Childhood Alliance (DCA) to push the App Store Accountability Act (ASAA) legislation that forces Apple and Google to verify user ages before app downloads, while placing zero new requirements on social media platforms like Meta&amp;#39;s own.&lt;br/&gt;&lt;br/&gt;&lt;br/&gt;The five confirmed channels:&lt;br/&gt;&lt;br/&gt;&lt;br/&gt;1. Direct lobbying: 86&#43; lobbyists across 45 states. A Meta lobbyist literally drafted Louisiana HB-570 and handed it to the bill&amp;#39;s sponsor, Rep. Kim Carver, who confirmed this publicly. The bill passed 99-0.&lt;br/&gt;&lt;br/&gt;2. DCA astroturf: The Digital Childhood Alliance has no EIN, no state incorporation, no 990 filings, and its domain was registered December 18, 2024 with a fully-formed advocacy site live within 24 hours. Bloomberg confirmed Meta funds it. Under oath, its executive director admitted receiving tech funding but refused to name donors. Every piece of DCA content attacks Apple and Google. Meta is never mentioned.&lt;br/&gt;&lt;br/&gt;3. Super PACs: $70M&#43; across four state PACs deliberately registered at state level (not FEC) to scatter disclosure filings and avoid centralized searchability.&lt;br/&gt;&lt;br/&gt;4. Arabella network connection: Meta&amp;#39;s Colorado lobbyist simultaneously chairs the New Venture Fund, which funnels $121M/year into the Sixteen Thirty Fund (no donor disclosure required). The investigation analyzed $2B in grants and found zero going to any child safety org ruling out that funding pathway, but the back-channel routes (fiscal sponsorship, consulting fees) remain unproven.&lt;br/&gt;&lt;br/&gt;5. State legislative campaigns: ASAA is now law in Utah, Louisiana, and Texas (Texas currently paused by a federal judge).&lt;br/&gt;&lt;br/&gt;&lt;br/&gt;The smoking gun finding: &lt;br/&gt;&lt;br/&gt;Meta&amp;#39;s own LD-2 Senate lobbying filings explicitly list the App Store Accountability Act (H.R. 3149/S. 1586) as a lobbied bill, while simultaneously lobbying on KOSA/COPPA 2.0 supporting legislation that burdens Apple and Google while opposing or seeking to amend legislation that would regulate Meta directly.&lt;br/&gt;&lt;br/&gt;&lt;a href=&#34;https://archive.is/qP6kR&#34;&gt;https://archive.is/qP6kR&lt;/a&gt; &lt;br/&gt;&lt;br/&gt;
    </content>
    <updated>2026-03-14T10:43:41&#43;01:00</updated>
  </entry>

  <entry>
    <id>https://nostr.ae/nevent1qqswsylq3ljcrw2qsxlsr8wca37qcuxejqs3pswl5yhrneppe80jxuqzypn0gl3aeljuj2qmgd4lftjy83yf857pk97w2qez87qy85alhhaj792l0p0</id>
    
      <title type="html">HEALTHEX announces a partnership with Microsoft to connect ...</title>
    
    <link rel="alternate" href="https://nostr.ae/nevent1qqswsylq3ljcrw2qsxlsr8wca37qcuxejqs3pswl5yhrneppe80jxuqzypn0gl3aeljuj2qmgd4lftjy83yf857pk97w2qez87qy85alhhaj792l0p0" />
    <content type="html">
      HEALTHEX announces a partnership with Microsoft to connect consumers &amp;#34;digital identity, comprehensive health records, and consent infrastructure&amp;#34; to power Copilot Health. &lt;br/&gt;&lt;br/&gt;&lt;br/&gt;&lt;br/&gt;&lt;video controls width=&#34;100%&#34; class=&#34;max-h-[90vh] bg-neutral-300 dark:bg-zinc-700&#34;&gt;&lt;source src=&#34;https://blossom.primal.net/267ac5f1e49db033232ec40ab40a8b8825989b485c17c42c4c3b20d90bc360c2.mp4&#34;&gt;&lt;/video&gt;
    </content>
    <updated>2026-03-13T10:08:04&#43;01:00</updated>
  </entry>

  <entry>
    <id>https://nostr.ae/nevent1qqsfg9fwwpmlq4cm33s0j3457r2mfl7djuwnc6s0s4ghk7q3ajfrlrszypn0gl3aeljuj2qmgd4lftjy83yf857pk97w2qez87qy85alhhaj766wfqa</id>
    
      <title type="html">The Psychology of Tyranny ➡️ TLDR; - Governments utilize ...</title>
    
    <link rel="alternate" href="https://nostr.ae/nevent1qqsfg9fwwpmlq4cm33s0j3457r2mfl7djuwnc6s0s4ghk7q3ajfrlrszypn0gl3aeljuj2qmgd4lftjy83yf857pk97w2qez87qy85alhhaj766wfqa" />
    <content type="html">
      The Psychology of Tyranny&lt;br/&gt;&lt;br/&gt;&lt;br/&gt;➡️ TLDR; &lt;br/&gt;&lt;br/&gt;- Governments utilize psychological manipulation to influence thought, emotion, and behavior, often without explicit consent, by exploiting fundamental human needs like security and belonging.&lt;br/&gt;&lt;br/&gt;- Twelve core psychological manipulation tactics identified include gaslighting, bandwagon effect, scarcity manipulation, framing and narrative control, guilt and moral shaming, FOMO, carrot and stick, othering, cognitive overload, authority bias exploitation, emotional priming, and desensitisation.&lt;br/&gt;&lt;br/&gt;- Governments employ propaganda, fear-based messaging, nudge tactics, disinformation, censorship, and social credit systems as examples of psychological manipulation.&lt;br/&gt;&lt;br/&gt;- The &amp;#39;carrot and stick&amp;#39; approach combines rewards for compliance with punishments for non-compliance, seen in systems like China&amp;#39;s social credit system and wartime rationing.&lt;br/&gt;&lt;br/&gt;- Othering creates an &amp;#39;us vs. them&amp;#39; dynamic by portraying a group as inferior or threatening, used in contexts like the Israel-Palestine conflict and anti-immigrant rhetoric.&lt;br/&gt;&lt;br/&gt;- Cognitive overload overwhelms individuals with excessive or conflicting information, making them more likely to rely on authority, as seen during the Brexit referendum and COVID policy rollouts.&lt;br/&gt;&lt;br/&gt;- Authority bias exploitation leverages trust in figures of authority to promote policies, often by suppressing dissenting experts, exemplified by tobacco regulation and climate policy endorsements.&lt;br/&gt;&lt;br/&gt;- Emotional priming uses evocative imagery and rhetoric to trigger strong emotions, bypassing rational analysis, as seen in post-9/11 patriotism and atrocity propaganda.&lt;br/&gt;&lt;br/&gt;- Desensitisation gradually exposes the public to controversial ideas or policies to reduce shock and resistance over time, observed in the normalization of drone strikes and surveillance expansion.&lt;br/&gt;&lt;br/&gt;- Repeated exposure to psychological manipulation can alter brain function through neuroplasticity, potentially weakening critical thinking, increasing anxiety, and reducing autonomy, though recovery is possible through education and reflection.&lt;br/&gt;&lt;br/&gt;&lt;a href=&#34;https://open.substack.com/pub/clarewillsharrison/p/the-psychology-of-tyranny&#34;&gt;https://open.substack.com/pub/clarewillsharrison/p/the-psychology-of-tyranny&lt;/a&gt; &lt;br/&gt;&lt;br/&gt;
    </content>
    <updated>2026-03-11T10:25:52&#43;01:00</updated>
  </entry>

  <entry>
    <id>https://nostr.ae/nevent1qqs82l8cpyumq4sq3wf4ut0hgqdn9pd2dmu8x425l7kmwmdecnqrx8gzypn0gl3aeljuj2qmgd4lftjy83yf857pk97w2qez87qy85alhhaj7x7fnx2</id>
    
      <title type="html">❌ #fdroid security problems: ...</title>
    
    <link rel="alternate" href="https://nostr.ae/nevent1qqs82l8cpyumq4sq3wf4ut0hgqdn9pd2dmu8x425l7kmwmdecnqrx8gzypn0gl3aeljuj2qmgd4lftjy83yf857pk97w2qez87qy85alhhaj7x7fnx2" />
    <content type="html">
      ❌ #fdroid security problems:&lt;br/&gt;&lt;br/&gt;⁨&lt;a href=&#34;https://privsec.dev/posts/android/f-droid-security-issues⁩⁩&#34;&gt;https://privsec.dev/posts/android/f-droid-security-issues⁩⁩&lt;/a&gt;&lt;br/&gt;&lt;br/&gt;⁨⁨&lt;a href=&#34;https://xcancel.com/GrapheneOS/status/1883895255142932816&#34;&gt;https://xcancel.com/GrapheneOS/status/1883895255142932816&lt;/a&gt;&lt;br/&gt;&lt;br/&gt;&lt;a href=&#34;https://xcancel.com/GrapheneOS/status/1497272529223917575&#34;&gt;https://xcancel.com/GrapheneOS/status/1497272529223917575&lt;/a&gt;&lt;br/&gt;&lt;br/&gt;⁨⁨&lt;a href=&#34;https://gitlab.com/ironfox-oss/IronFox/-/issues/7⁩⁩&#34;&gt;https://gitlab.com/ironfox-oss/IronFox/-/issues/7⁩⁩&lt;/a&gt;&lt;br/&gt;&lt;br/&gt;⁨⁨&lt;a href=&#34;https://github.com/obfusk/fdroid-fakesigner-poc⁩⁩&#34;&gt;https://github.com/obfusk/fdroid-fakesigner-poc⁩⁩&lt;/a&gt;&lt;br/&gt;&lt;br/&gt;⁨⁨&lt;a href=&#34;https://github.com/CatimaLoyalty/Android/issues/2608⁩⁩&#34;&gt;https://github.com/CatimaLoyalty/Android/issues/2608⁩⁩&lt;/a&gt;&lt;br/&gt;&lt;br/&gt;⁨⁨&lt;a href=&#34;https://gitlab.com/fdroid/admin/-/issues/593⁩⁩&#34;&gt;https://gitlab.com/fdroid/admin/-/issues/593⁩⁩&lt;/a&gt;&lt;br/&gt;&lt;br/&gt;⁨⁨&lt;a href=&#34;https://discuss.grapheneos.org/d/15490-f-droid-or-obtainium⁩⁩&#34;&gt;https://discuss.grapheneos.org/d/15490-f-droid-or-obtainium⁩⁩&lt;/a&gt;&lt;br/&gt;&lt;br/&gt;⁨⁨&lt;a href=&#34;https://m.youtube.com/watch?v=IzpVI4zaso0⁩⁩&#34;&gt;https://m.youtube.com/watch?v=IzpVI4zaso0⁩⁩&lt;/a&gt;&lt;br/&gt;&lt;br/&gt;⁨⁨&lt;a href=&#34;https://m.youtube.com/watch?v=lAbgeJau3eE⁩⁩&#34;&gt;https://m.youtube.com/watch?v=lAbgeJau3eE⁩⁩&lt;/a&gt;&lt;br/&gt;&lt;br/&gt;⁨⁨&lt;a href=&#34;https://m.youtube.com/watch?v=FFz57zNR_M0⁩⁩&#34;&gt;https://m.youtube.com/watch?v=FFz57zNR_M0⁩⁩&lt;/a&gt;&lt;br/&gt;&lt;br/&gt;⁨⁨&lt;a href=&#34;https://m.youtube.com/watch?v=IAoCfrqx⁩⁩&#34;&gt;https://m.youtube.com/watch?v=IAoCfrqx⁩⁩&lt;/a&gt; &lt;br/&gt;&lt;br/&gt;
    </content>
    <updated>2026-02-28T09:55:35&#43;01:00</updated>
  </entry>

  <entry>
    <id>https://nostr.ae/nevent1qqs2hsvspexyujfyq0lnemus4rjh5swq8l0ryh3w9m66z00cwdpewlczypn0gl3aeljuj2qmgd4lftjy83yf857pk97w2qez87qy85alhhaj7z8f42u</id>
    
      <title type="html">AI Can Now Easily Unmask Your Secret Online Life (Even If You Use ...</title>
    
    <link rel="alternate" href="https://nostr.ae/nevent1qqs2hsvspexyujfyq0lnemus4rjh5swq8l0ryh3w9m66z00cwdpewlczypn0gl3aeljuj2qmgd4lftjy83yf857pk97w2qez87qy85alhhaj7z8f42u" />
    <content type="html">
      AI Can Now Easily Unmask Your Secret Online Life (Even If You Use a Fake Name)&lt;br/&gt;&lt;br/&gt;&lt;a href=&#34;https://itsfoss.com/news/ai-online-deanonymization/&#34;&gt;https://itsfoss.com/news/ai-online-deanonymization/&lt;/a&gt;&lt;br/&gt;&lt;br/&gt;Imagine this: You&amp;#39;re on Reddit, Hacker News, or some forum, posting with a silly username like GamerCat2025 or SecretCoderX. &lt;br/&gt;&lt;br/&gt;You think you are anonymous, and no one knows you and so you can freely express your thoughts.&lt;br/&gt;&lt;br/&gt;&lt;br/&gt;Well, a brand-new research paper just blew that idea apart. It&amp;#39;s called &amp;#34;Large-scale online deanonymization with LLMs&amp;#34; which is a fancy way of saying &amp;#34;figuring out the real person behind a secret online name&amp;#34;.&lt;br/&gt;&lt;br/&gt;Research: &lt;a href=&#34;https://arxiv.org/abs/2602.16800&#34;&gt;https://arxiv.org/abs/2602.16800&lt;/a&gt;&lt;br/&gt; &lt;br/&gt;&lt;br/&gt;
    </content>
    <updated>2026-02-28T09:54:19&#43;01:00</updated>
  </entry>

  <entry>
    <id>https://nostr.ae/nevent1qqsgd89e8dl4tgdswrefcfeygpfgfwwzc5dln5skk9ck7nfmkn69geqzypn0gl3aeljuj2qmgd4lftjy83yf857pk97w2qez87qy85alhhaj7jlej3f</id>
    
      <title type="html">🥸 Smart glasses detector on your mobile Its author, a ...</title>
    
    <link rel="alternate" href="https://nostr.ae/nevent1qqsgd89e8dl4tgdswrefcfeygpfgfwwzc5dln5skk9ck7nfmkn69geqzypn0gl3aeljuj2qmgd4lftjy83yf857pk97w2qez87qy85alhhaj7jlej3f" />
    <content type="html">
      🥸 Smart glasses detector on your mobile&lt;br/&gt;&lt;br/&gt;Its author, a sociologist who programs as a hobby, devised an application after seeing how these accessories are used to record people without permission, and considers it a small gesture against constant surveillance.&lt;br/&gt;&lt;br/&gt;The program checks the typical Bluetooth signals emitted by these devices and sends push notifications to alert.&lt;br/&gt;&lt;br/&gt;It is now available and its code can be viewed openly. It may not be 100% effective depending on the environmental conditions, but it is a good advancement.&lt;br/&gt;&lt;br/&gt;You can download it from the PlayStore here: &lt;a href=&#34;https://play.google.com/store/apps/details?id=ch.pocketpc.nearbyglasses&#34;&gt;https://play.google.com/store/apps/details?id=ch.pocketpc.nearbyglasses&lt;/a&gt;&lt;br/&gt;&lt;br/&gt;and review its code on Github here: &lt;a href=&#34;https://github.com/yjeanrenaud/yj_nearbyglasses&#34;&gt;https://github.com/yjeanrenaud/yj_nearbyglasses&lt;/a&gt; &lt;br/&gt;&lt;br/&gt;
    </content>
    <updated>2026-02-27T10:52:55&#43;01:00</updated>
  </entry>

  <entry>
    <id>https://nostr.ae/nevent1qqsr953cq8h93xj6a0lu8h355aqnd2y7d9v4xeegl6aujgk5l2a34nqzypn0gl3aeljuj2qmgd4lftjy83yf857pk97w2qez87qy85alhhaj7fdrr4q</id>
    
      <title type="html">How Epstein Hijacked Bitcoin with Aaron Day From the hijacking of ...</title>
    
    <link rel="alternate" href="https://nostr.ae/nevent1qqsr953cq8h93xj6a0lu8h355aqnd2y7d9v4xeegl6aujgk5l2a34nqzypn0gl3aeljuj2qmgd4lftjy83yf857pk97w2qez87qy85alhhaj7fdrr4q" />
    <content type="html">
      How Epstein Hijacked Bitcoin with Aaron Day&lt;br/&gt;&lt;br/&gt;From the hijacking of Bitcoin to the passing of the GENIUS Act, a deep dive in the Epstein files reveals Epstein&amp;#39;s fingerprints are all over the transformation of the global economy and our digital currency enslavement. &lt;br/&gt;&lt;br/&gt;&amp;#34;The Hijacking of Bitcoin,&amp;#34; his detailed and well-documented breakdown of how and why Epstein hijacked #Bitcoin&lt;br/&gt;&lt;br/&gt;&lt;a href=&#34;https://corbettreport.com/how-epstein-hijacked-bitcoin/&#34;&gt;https://corbettreport.com/how-epstein-hijacked-bitcoin/&lt;/a&gt;&lt;br/&gt;&lt;br/&gt;&lt;a href=&#34;https://brownstone.org/articles/the-hijacking-of-bitcoin/&#34;&gt;https://brownstone.org/articles/the-hijacking-of-bitcoin/&lt;/a&gt; &lt;br/&gt;&lt;br/&gt;
    </content>
    <updated>2026-02-27T10:22:23&#43;01:00</updated>
  </entry>

  <entry>
    <id>https://nostr.ae/nevent1qqs0herkayu83wf5d79me639ndgnc368n0tzzm9qddes6n78r2atulgzypn0gl3aeljuj2qmgd4lftjy83yf857pk97w2qez87qy85alhhaj74cs6fh</id>
    
      <title type="html">Keep Android Open https://keepandroidopen.org ...</title>
    
    <link rel="alternate" href="https://nostr.ae/nevent1qqs0herkayu83wf5d79me639ndgnc368n0tzzm9qddes6n78r2atulgzypn0gl3aeljuj2qmgd4lftjy83yf857pk97w2qez87qy85alhhaj74cs6fh" />
    <content type="html">
      Keep Android Open&lt;br/&gt;&lt;br/&gt;&lt;a href=&#34;https://keepandroidopen.org&#34;&gt;https://keepandroidopen.org&lt;/a&gt;&lt;br/&gt;&lt;br/&gt;&lt;a href=&#34;https://f-droid.org/2026/02/20/twif.html&#34;&gt;https://f-droid.org/2026/02/20/twif.html&lt;/a&gt;&lt;br/&gt;&lt;br/&gt;During out talks with F-Droid users at FOSDEM26 we were baffled to learn most were relieved that Google has canceled their plans to lock-down Android.&lt;br/&gt;&lt;br/&gt;&lt;a href=&#34;https://fosdem.org/2026/&#34;&gt;https://fosdem.org/2026/&lt;/a&gt;&lt;br/&gt;&lt;br/&gt;Why baffled? &lt;br/&gt;&lt;br/&gt;Because no such thing actually happened, the plans announced last August are still scheduled to take place. We see a battle of PR campaigns and whomever has the last post out remains in the media memory as the truth, and having journalists just copy/paste Google posts serves no one.&lt;br/&gt;&lt;br/&gt;But Google said... Said what? That there&amp;#39;s a magical &amp;#34;advanced flow&amp;#34;? Did you see it? Did anyone experience it? When is it scheduled to be released? Was it part of Android 16 QPR2 in December? Of 16 QPR3 Beta 2.1 last week? Of Android 17 Beta 1? No? That&amp;#39;s the issue... As time marches on people were left with the impression that everything was done, fixed, Google &amp;#34;wasn&amp;#39;t evil&amp;#34; after all, this time, yay!&lt;br/&gt;&lt;br/&gt;While we all have bad memories of &amp;#34;banners&amp;#34; as the dreaded ad delivery medium of the Internet, after FOSDEM we decided that we have to raise the issue back and have everyone, who cares about Android as an open platform, informed that we are running out of time until Google becomes the gate-keeper of all users devices.&lt;br/&gt;&lt;br/&gt;Hence, the website and starting today our clients, with the updates of F-Droid and F-Droid Basic, feature a banner that reminds everyone how little time we have and how to voice their concerns to whatever local authority is able to understand the dangers of this path Android is led to.&lt;br/&gt;&lt;br/&gt;We are not alone in our fight, IzzyOnDroid added a banner too, more F-Droid clients will add the warning banner soon and other app downloaders, like Obtainium, already have an in-app warning dialogue. &lt;br/&gt;&lt;br/&gt;
    </content>
    <updated>2026-02-21T10:05:12&#43;01:00</updated>
  </entry>

  <entry>
    <id>https://nostr.ae/nevent1qqsz6xzjupxdtlpzmkauhumglf35r9je2yvr9hxxazx5s53x5ereksczypn0gl3aeljuj2qmgd4lftjy83yf857pk97w2qez87qy85alhhaj7czdv0g</id>
    
      <title>Nostr event nevent1qqsz6xzjupxdtlpzmkauhumglf35r9je2yvr9hxxazx5s53x5ereksczypn0gl3aeljuj2qmgd4lftjy83yf857pk97w2qez87qy85alhhaj7czdv0g</title>
    
    <link rel="alternate" href="https://nostr.ae/nevent1qqsz6xzjupxdtlpzmkauhumglf35r9je2yvr9hxxazx5s53x5ereksczypn0gl3aeljuj2qmgd4lftjy83yf857pk97w2qez87qy85alhhaj7czdv0g" />
    <content type="html">
       &lt;br/&gt;&lt;br/&gt;&lt;br/&gt;&lt;br/&gt; &lt;img src=&#34;https://blossom.primal.net/e5c70a03a48728132b3aabe8161404aceff7d40da92220f593117f652f09ceb0.jpg&#34;&gt; 
    </content>
    <updated>2026-02-18T11:38:01&#43;01:00</updated>
  </entry>

  <entry>
    <id>https://nostr.ae/nevent1qqsghg5rnufgd4p6t7ferkvfupf80xnvsupul2lsmypm8xtrey7lxqszypn0gl3aeljuj2qmgd4lftjy83yf857pk97w2qez87qy85alhhaj7levcld</id>
    
      <title type="html">Alt-Sendme Send files and folders to anywhere in the world ...</title>
    
    <link rel="alternate" href="https://nostr.ae/nevent1qqsghg5rnufgd4p6t7ferkvfupf80xnvsupul2lsmypm8xtrey7lxqszypn0gl3aeljuj2qmgd4lftjy83yf857pk97w2qez87qy85alhhaj7levcld" />
    <content type="html">
      Alt-Sendme&lt;br/&gt;&lt;br/&gt;Send files and folders to anywhere in the world without storing them in the cloud - any size, any format, without accounts and restrictions.&lt;br/&gt;&lt;br/&gt;A free file transfer tool with open source code, using the capabilities of an advanced peer-to-peer network, allowing you to transfer files directly without storing them on cloud servers.&lt;br/&gt;&lt;br/&gt;&lt;a href=&#34;https://github.com/tonyantony300/alt-sendme&#34;&gt;https://github.com/tonyantony300/alt-sendme&lt;/a&gt; &lt;br/&gt;&lt;br/&gt;
    </content>
    <updated>2026-02-17T10:29:04&#43;01:00</updated>
  </entry>

  <entry>
    <id>https://nostr.ae/nevent1qqs0s55rs96wzareedad2r9lt8wytnyse953wsdfcvrl6q50q7y0naszypn0gl3aeljuj2qmgd4lftjy83yf857pk97w2qez87qy85alhhaj7qd0cfd</id>
    
      <title type="html">You can now run Fedora Atomic OS on your Android Smartphone and ...</title>
    
    <link rel="alternate" href="https://nostr.ae/nevent1qqs0s55rs96wzareedad2r9lt8wytnyse953wsdfcvrl6q50q7y0naszypn0gl3aeljuj2qmgd4lftjy83yf857pk97w2qez87qy85alhhaj7qd0cfd" />
    <content type="html">
      You can now run Fedora Atomic OS on your Android Smartphone and Tablet&lt;br/&gt;&lt;br/&gt;A GitHub project called Pocketblue is providing Fedora Atomic images for mobile devices. &lt;br/&gt;&lt;br/&gt;&lt;a href=&#34;https://github.com/pocketblue/pocketblue&#34;&gt;https://github.com/pocketblue/pocketblue&lt;/a&gt;&lt;br/&gt;&lt;br/&gt;Pocketblue is an atomic system that relies on OCI, OSTree and Bootc technologies. System images are based on upstream atomic Fedora images (Silverblue/Kinoite) and are built and distributed as OCI containers.&lt;br/&gt;&lt;br/&gt;NOTE: This is a work-in-progress project. During the installation process all data on your device will be wiped. Use at your own risk.&lt;br/&gt;&lt;br/&gt;However, the only supported devices are the Xiaomi Pad 5, the Xiaomi Pad 6, and the OnePlus 6/6T. So if you have one of those just lying around, you can give this a try. &lt;br/&gt;&lt;br/&gt;
    </content>
    <updated>2026-02-17T10:26:48&#43;01:00</updated>
  </entry>

  <entry>
    <id>https://nostr.ae/nevent1qqs26ttspq3aepjpt5luhvpmyednndkadzmg2d4spwn5v337unhjr4gzypn0gl3aeljuj2qmgd4lftjy83yf857pk97w2qez87qy85alhhaj7d0sdgp</id>
    
      <title type="html">Meshtastic ❌ MeshCore ✅</title>
    
    <link rel="alternate" href="https://nostr.ae/nevent1qqs26ttspq3aepjpt5luhvpmyednndkadzmg2d4spwn5v337unhjr4gzypn0gl3aeljuj2qmgd4lftjy83yf857pk97w2qez87qy85alhhaj7d0sdgp" />
    <content type="html">
      Meshtastic ❌&lt;br/&gt;&lt;br/&gt;MeshCore ✅ &lt;br/&gt;&lt;br/&gt;
    </content>
    <updated>2026-02-17T10:20:48&#43;01:00</updated>
  </entry>

  <entry>
    <id>https://nostr.ae/nevent1qqsg9wvem5t3jafxhf52d5vgpp9s7pdpc2enfskgpcjmekp9lz5x9zczypn0gl3aeljuj2qmgd4lftjy83yf857pk97w2qez87qy85alhhaj7nl7xwc</id>
    
      <title>Nostr event nevent1qqsg9wvem5t3jafxhf52d5vgpp9s7pdpc2enfskgpcjmekp9lz5x9zczypn0gl3aeljuj2qmgd4lftjy83yf857pk97w2qez87qy85alhhaj7nl7xwc</title>
    
    <link rel="alternate" href="https://nostr.ae/nevent1qqsg9wvem5t3jafxhf52d5vgpp9s7pdpc2enfskgpcjmekp9lz5x9zczypn0gl3aeljuj2qmgd4lftjy83yf857pk97w2qez87qy85alhhaj7nl7xwc" />
    <content type="html">
       &lt;br/&gt;&lt;br/&gt;&lt;br/&gt;&lt;br/&gt; &lt;img src=&#34;https://blossom.primal.net/87982ccc18f4eaf981ad1237119cb3703236252dd0efedf601998647c27b4e0e.jpg&#34;&gt; 
    </content>
    <updated>2026-02-17T10:14:59&#43;01:00</updated>
  </entry>

  <entry>
    <id>https://nostr.ae/nevent1qqsrt33rztprdqegs224c7ddpmcxaq70nvfxpwgg6ax2xthc99xaw2czypn0gl3aeljuj2qmgd4lftjy83yf857pk97w2qez87qy85alhhaj7d78x5v</id>
    
      <title type="html">&amp;#34;Why We Abandoned Matrix The Dark Truth About User Security ...</title>
    
    <link rel="alternate" href="https://nostr.ae/nevent1qqsrt33rztprdqegs224c7ddpmcxaq70nvfxpwgg6ax2xthc99xaw2czypn0gl3aeljuj2qmgd4lftjy83yf857pk97w2qez87qy85alhhaj7d78x5v" />
    <content type="html">
      &amp;#34;Why We Abandoned Matrix &lt;br/&gt;&lt;br/&gt;The Dark Truth About User Security and Safety&amp;#34;&lt;br/&gt;&lt;br/&gt;&lt;a href=&#34;https://forum.hackliberty.org/t/why-we-abandoned-matrix-the-dark-truth-about-user-security-and-safety/224&#34;&gt;https://forum.hackliberty.org/t/why-we-abandoned-matrix-the-dark-truth-about-user-security-and-safety/224&lt;/a&gt; &lt;br/&gt;&lt;br/&gt;
    </content>
    <updated>2026-02-09T10:22:46&#43;01:00</updated>
  </entry>

  <entry>
    <id>https://nostr.ae/nevent1qqsd2m8mefpwvx7vt3cca3hl6hpz6cf3h54eshul0kpw8gaf75wve6qzypn0gl3aeljuj2qmgd4lftjy83yf857pk97w2qez87qy85alhhaj7p2cswk</id>
    
      <title type="html">MetaRadar This is a tool for monitoring the Bluetooth Low Energy ...</title>
    
    <link rel="alternate" href="https://nostr.ae/nevent1qqsd2m8mefpwvx7vt3cca3hl6hpz6cf3h54eshul0kpw8gaf75wve6qzypn0gl3aeljuj2qmgd4lftjy83yf857pk97w2qez87qy85alhhaj7p2cswk" />
    <content type="html">
      MetaRadar&lt;br/&gt;&lt;br/&gt;This is a tool for monitoring the Bluetooth Low Energy (BLE) environment, designed to detect and track nearby Bluetooth devices, as well as to notify the user when a target device is detected.&lt;br/&gt;&lt;br/&gt;The program allows you to scan, analyze, and track BLE devices within range, providing the ability to create flexible filters for searching for devices based on various parameters, such as device name, address, location, and detection time.&lt;br/&gt;&lt;br/&gt;MetaRadar also performs a deep analysis of detected BLE devices, extracting data from available GATT services, and determines the type of device based on metadata, as well as the approximate distance to it.&lt;br/&gt;&lt;br/&gt;The application works in offline mode and does not collect personal data or information about the user&amp;#39;s geolocation, ensuring privacy and security.&lt;br/&gt;&lt;br/&gt;The tool can also be useful for detecting surveillance of you&lt;br/&gt;&lt;br/&gt;Lang: Kotlin&lt;br/&gt;&lt;br/&gt;&lt;a href=&#34;https://github.com/BLE-Research-Group/MetaRadar&#34;&gt;https://github.com/BLE-Research-Group/MetaRadar&lt;/a&gt;&lt;br/&gt; &lt;br/&gt;&lt;br/&gt;
    </content>
    <updated>2026-02-06T10:31:48&#43;01:00</updated>
  </entry>

  <entry>
    <id>https://nostr.ae/nevent1qqs8tzx5wnh6h5284y3qnh8pphsf6k8fd9kqhhqdqcgnuj8lu25yndqzypn0gl3aeljuj2qmgd4lftjy83yf857pk97w2qez87qy85alhhaj7wjyltl</id>
    
      <title>Nostr event nevent1qqs8tzx5wnh6h5284y3qnh8pphsf6k8fd9kqhhqdqcgnuj8lu25yndqzypn0gl3aeljuj2qmgd4lftjy83yf857pk97w2qez87qy85alhhaj7wjyltl</title>
    
    <link rel="alternate" href="https://nostr.ae/nevent1qqs8tzx5wnh6h5284y3qnh8pphsf6k8fd9kqhhqdqcgnuj8lu25yndqzypn0gl3aeljuj2qmgd4lftjy83yf857pk97w2qez87qy85alhhaj7wjyltl" />
    <content type="html">
       &lt;br/&gt;&lt;blockquote class=&#34;border-l-05rem border-l-strongpink border-solid&#34;&gt;&lt;div class=&#34;-ml-4 bg-gradient-to-r from-gray-100 dark:from-zinc-800 to-transparent mr-0 mt-0 mb-4 pl-4 pr-2 py-2&#34;&gt;quoting &lt;br/&gt;&lt;span itemprop=&#34;mentions&#34; itemscope itemtype=&#34;https://schema.org/Article&#34;&gt;&lt;a itemprop=&#34;url&#34; href=&#34;/nevent1qqszuwn634q3tavfmv6ud0wmsyn8jmfv7g2s8cjaewmqk6cw9n0y9sgzypn0gl3aeljuj2qmgd4lftjy83yf857pk97w2qez87qy85alhhaj7qcyqqqqqqgjykjl8&#34; class=&#34;bg-lavender dark:prose:text-neutral-50 dark:text-neutral-50 dark:bg-garnet px-1&#34;&gt;nevent1q…kjl8&lt;/a&gt;&lt;/span&gt;&lt;br/&gt; &lt;/div&gt; Epstein, Western Decline, &amp; The Moral Collapse Of The Elites&lt;br/&gt;&lt;br/&gt;&#34;What is at stake is no longer who “visited the island” or who “caught a ride on Epstein’s plane.” What is at stake is the fact that networks of this kind only exist when they are backed by deep institutional protection. There is no ritual pedophilia, no human trafficking on a transnational scale, no systematic production of extreme material without political, police, judicial, and media cover. This is not conspiracy: it is the logic of power.&lt;br/&gt;&lt;br/&gt;From this point on, the West can no longer hide behind the idea of gradual decline. It is not merely cultural degeneration or a loss of values.&lt;br/&gt;&lt;br/&gt;It is something darker: an elite that operates outside any recognizable moral limits and yet continues to govern. People directly or indirectly involved with this world continue to decide elections, wars, economic policies, and the fate of entire societies.&lt;br/&gt;&lt;br/&gt;If there is anything positive in this moment, it is the end of naivety.&lt;br/&gt;&lt;br/&gt;It is no longer possible to pretend that the system is “sick but recoverable.” What remained of the Western (anti-)civilizational project has been corroded from within. What comes next is still uncertain – and will be contested by all possible and necessary means.&lt;br/&gt;&lt;br/&gt;But one thing is clear: &lt;br/&gt;&lt;br/&gt;After Epstein, nothing can continue as before. Anyone who acts as if nothing has changed either does not understand the gravity of what has come to light or is pretending not to understand.&#34;&lt;br/&gt;&lt;br/&gt;Lucas Leiroz&lt;br/&gt;&lt;br/&gt;&lt;a href=&#34;https://www.zerohedge.com/geopolitical/epstein-western-decline-moral-collapse-elites&#34;&gt;https://www.zerohedge.com/geopolitical/epstein-western-decline-moral-collapse-elites&lt;/a&gt; &lt;br/&gt;&lt;br/&gt; &lt;/blockquote&gt;&lt;br/&gt; &lt;img src=&#34;https://blossom.primal.net/98d04e548e1d69207cc0dbc859668a99f672723149cbd543e053df687796adba.jpg&#34;&gt; 
    </content>
    <updated>2026-02-05T10:15:17&#43;01:00</updated>
  </entry>

  <entry>
    <id>https://nostr.ae/nevent1qqszuwn634q3tavfmv6ud0wmsyn8jmfv7g2s8cjaewmqk6cw9n0y9sgzypn0gl3aeljuj2qmgd4lftjy83yf857pk97w2qez87qy85alhhaj77lynmq</id>
    
      <title type="html">Epstein, Western Decline, &amp;amp; The Moral Collapse Of The Elites ...</title>
    
    <link rel="alternate" href="https://nostr.ae/nevent1qqszuwn634q3tavfmv6ud0wmsyn8jmfv7g2s8cjaewmqk6cw9n0y9sgzypn0gl3aeljuj2qmgd4lftjy83yf857pk97w2qez87qy85alhhaj77lynmq" />
    <content type="html">
      Epstein, Western Decline, &amp;amp; The Moral Collapse Of The Elites&lt;br/&gt;&lt;br/&gt;&amp;#34;What is at stake is no longer who “visited the island” or who “caught a ride on Epstein’s plane.” What is at stake is the fact that networks of this kind only exist when they are backed by deep institutional protection. There is no ritual pedophilia, no human trafficking on a transnational scale, no systematic production of extreme material without political, police, judicial, and media cover. This is not conspiracy: it is the logic of power.&lt;br/&gt;&lt;br/&gt;From this point on, the West can no longer hide behind the idea of gradual decline. It is not merely cultural degeneration or a loss of values.&lt;br/&gt;&lt;br/&gt;It is something darker: an elite that operates outside any recognizable moral limits and yet continues to govern. People directly or indirectly involved with this world continue to decide elections, wars, economic policies, and the fate of entire societies.&lt;br/&gt;&lt;br/&gt;If there is anything positive in this moment, it is the end of naivety.&lt;br/&gt;&lt;br/&gt;It is no longer possible to pretend that the system is “sick but recoverable.” What remained of the Western (anti-)civilizational project has been corroded from within. What comes next is still uncertain – and will be contested by all possible and necessary means.&lt;br/&gt;&lt;br/&gt;But one thing is clear: &lt;br/&gt;&lt;br/&gt;After Epstein, nothing can continue as before. Anyone who acts as if nothing has changed either does not understand the gravity of what has come to light or is pretending not to understand.&amp;#34;&lt;br/&gt;&lt;br/&gt;Lucas Leiroz&lt;br/&gt;&lt;br/&gt;&lt;a href=&#34;https://www.zerohedge.com/geopolitical/epstein-western-decline-moral-collapse-elites&#34;&gt;https://www.zerohedge.com/geopolitical/epstein-western-decline-moral-collapse-elites&lt;/a&gt; &lt;br/&gt;&lt;br/&gt;
    </content>
    <updated>2026-02-05T10:12:41&#43;01:00</updated>
  </entry>

  <entry>
    <id>https://nostr.ae/nevent1qqspug6ss76nuvhcnfeqkeghsjhvz3743hp49s0wxtjx68me4e70grgzypn0gl3aeljuj2qmgd4lftjy83yf857pk97w2qez87qy85alhhaj7lltk2n</id>
    
      <title type="html">LastSignal is a New Open-Source Dead Man&amp;#39;s Switch You Can ...</title>
    
    <link rel="alternate" href="https://nostr.ae/nevent1qqspug6ss76nuvhcnfeqkeghsjhvz3743hp49s0wxtjx68me4e70grgzypn0gl3aeljuj2qmgd4lftjy83yf857pk97w2qez87qy85alhhaj7lltk2n" />
    <content type="html">
      LastSignal is a New Open-Source Dead Man&amp;#39;s Switch You Can Self-Host&lt;br/&gt;&lt;br/&gt;&lt;a href=&#34;https://linuxiac.com/lastsignal-is-a-new-open-source-dead-mans-switch-you-can-self-host/&#34;&gt;https://linuxiac.com/lastsignal-is-a-new-open-source-dead-mans-switch-you-can-self-host/&lt;/a&gt;&lt;br/&gt;&lt;br/&gt;&lt;a href=&#34;https://lastsignal.app&#34;&gt;https://lastsignal.app&lt;/a&gt;&lt;br/&gt;&lt;br/&gt;&lt;a href=&#34;https://github.com/giovantenne/lastsignal&#34;&gt;https://github.com/giovantenne/lastsignal&lt;/a&gt; &lt;br/&gt;&lt;br/&gt;
    </content>
    <updated>2026-02-02T10:29:39&#43;01:00</updated>
  </entry>

  <entry>
    <id>https://nostr.ae/nevent1qqs0g97qjq3uazthpf3hxgsvjzpnjwffecywmhach69hcjuhw63yysgzypn0gl3aeljuj2qmgd4lftjy83yf857pk97w2qez87qy85alhhaj7wxhv7v</id>
    
      <title type="html">🇬🇧 A &amp;#34;new&amp;#34; British police tool is capable of ...</title>
    
    <link rel="alternate" href="https://nostr.ae/nevent1qqs0g97qjq3uazthpf3hxgsvjzpnjwffecywmhach69hcjuhw63yysgzypn0gl3aeljuj2qmgd4lftjy83yf857pk97w2qez87qy85alhhaj7wxhv7v" />
    <content type="html">
      🇬🇧 A &amp;#34;new&amp;#34; British police tool is capable of downloading all information from your smartphone, including deleted messages, deleted browsing history &amp;amp; private conversations&lt;br/&gt;&lt;br/&gt;- BBC &lt;br/&gt;&lt;br/&gt;The device is capable of downloading: &lt;br/&gt;&lt;br/&gt;- call logs, &lt;br/&gt;- chats, &lt;br/&gt;- cookies, &lt;br/&gt;- device notifications, &lt;br/&gt;- emails, &lt;br/&gt;- instant messages, &lt;br/&gt;- passwords, &lt;br/&gt;- browsing history, &lt;br/&gt;- deleted conversations in encrypted applications&lt;br/&gt;&lt;br/&gt;It can be deployed at airports and scan smartphones of everyone who enters the UK legally in the future &lt;br/&gt;&lt;br/&gt;Let&amp;#39;s say goodbye to &amp;#34;privacy&amp;#34; &lt;br/&gt;&lt;br/&gt;&lt;br/&gt;&lt;br/&gt;&lt;video controls width=&#34;100%&#34; class=&#34;max-h-[90vh] bg-neutral-300 dark:bg-zinc-700&#34;&gt;&lt;source src=&#34;https://blossom.primal.net/671e3f886f3915e1cdb41a4283a1ba0b846684e35c0bd6393af40f5b51e8a72d.mp4&#34;&gt;&lt;/video&gt;
    </content>
    <updated>2026-01-31T10:25:03&#43;01:00</updated>
  </entry>

  <entry>
    <id>https://nostr.ae/nevent1qqsfv2jevk09tyuhhgylkl90ah2muuc5lw76r4f57xn849x4nn5xqqqzypn0gl3aeljuj2qmgd4lftjy83yf857pk97w2qez87qy85alhhaj7ry0gpn</id>
    
      <title type="html">Mullvad continues to pass audits ...</title>
    
    <link rel="alternate" href="https://nostr.ae/nevent1qqsfv2jevk09tyuhhgylkl90ah2muuc5lw76r4f57xn849x4nn5xqqqzypn0gl3aeljuj2qmgd4lftjy83yf857pk97w2qez87qy85alhhaj7ry0gpn" />
    <content type="html">
      Mullvad continues to pass audits&lt;br/&gt;&lt;br/&gt;&lt;a href=&#34;https://mullvad.net/en/blog/new-security-audit-of-account-and-payment-services&#34;&gt;https://mullvad.net/en/blog/new-security-audit-of-account-and-payment-services&lt;/a&gt;&lt;br/&gt;&lt;br/&gt;A new security audit report conducted by the German firm X41 D-Sec on Mullvad VPN concludes that no critical flaws or risks to user&amp;#39;s privacy were found.&lt;br/&gt;&lt;br/&gt;The white-box audit focused on the backend services of accounts and payments, including the public API, authentication, device registration, payment processing, and WireGuard key distribution.&lt;br/&gt;&lt;br/&gt;While 3 medium-severity issues were found, Mullvad responded quickly by fixing the vulnerabilities during the audit and considering recommendations to strengthen aspects such as mutual TLS configuration, cryptographic signatures in VPN relays, and concurrency management in multithreaded environments.&lt;br/&gt;&lt;br/&gt;The audit positively highlights Mullvad&amp;#39;s minimalist approach to data management, with strict compartmentalization separating user identities from VPN keys, and regular key rotation.&lt;br/&gt;&lt;br/&gt;Rightly so, Mullvad is one of the best VPN you can have today. &lt;br/&gt;&lt;br/&gt;
    </content>
    <updated>2026-01-24T10:32:41&#43;01:00</updated>
  </entry>

  <entry>
    <id>https://nostr.ae/nevent1qqs2669cyz56azhp4s6hpxwqlj208tvw44acjrgck6e7lhacydjmtfszypn0gl3aeljuj2qmgd4lftjy83yf857pk97w2qez87qy85alhhaj7qe04at</id>
    
      <title type="html">Polymarket spreads neocon disinformation to manufacture consent ...</title>
    
    <link rel="alternate" href="https://nostr.ae/nevent1qqs2669cyz56azhp4s6hpxwqlj208tvw44acjrgck6e7lhacydjmtfszypn0gl3aeljuj2qmgd4lftjy83yf857pk97w2qez87qy85alhhaj7qe04at" />
    <content type="html">
      Polymarket spreads neocon disinformation to manufacture consent for bombing Iran&lt;br/&gt;&lt;br/&gt;It is also paying influencers all across this site to popularize its brand&lt;br/&gt;&lt;br/&gt;The &amp;#34;world&amp;#39;s largest prediction market&amp;#34; relies on psychological warfare to manipulate betting markets&lt;br/&gt;&lt;br/&gt;&lt;a href=&#34;https://x.com/i/status/2010724680349659631&#34;&gt;https://x.com/i/status/2010724680349659631&lt;/a&gt;&lt;br/&gt;&lt;br/&gt;How many of you are aware prediction markets were a former DARPA project like Facebook (LifeLog) was? &lt;br/&gt;&lt;br/&gt;Per the CIA website, “In 2001, the Defense Advanced Research Project Agency (DARPA) started experimenting with methods for applying DARPA’s Future Markets Applied to Prediction (FutureMAP) program tested whether prediction markets, markets in which people bet on the likelihood of future events, could be used to improve upon existing approaches to preparing strategic intelligence. The program was cancelled in the summer of 2003 under a barrage of congressional criticism.”&lt;br/&gt;&lt;br/&gt;&lt;a href=&#34;https://x.com/i/status/2010798242209153378&#34;&gt;https://x.com/i/status/2010798242209153378&lt;/a&gt;&lt;br/&gt;&lt;br/&gt;&lt;a href=&#34;https://www.cia.gov/resources/csi/static/Prediction-Markets-Enhance-Intel.pdf&#34;&gt;https://www.cia.gov/resources/csi/static/Prediction-Markets-Enhance-Intel.pdf&lt;/a&gt;  &lt;br/&gt;&lt;br/&gt;
    </content>
    <updated>2026-01-14T10:18:44&#43;01:00</updated>
  </entry>

  <entry>
    <id>https://nostr.ae/nevent1qqs8hj83ylt37zusws07xgw57fr558ur0qfvu2sey3w8wlmhgh4hjlqzypn0gl3aeljuj2qmgd4lftjy83yf857pk97w2qez87qy85alhhaj7v8yhqs</id>
    
      <title type="html">To all Vapers out there. A groundbreaking study from researchers ...</title>
    
    <link rel="alternate" href="https://nostr.ae/nevent1qqs8hj83ylt37zusws07xgw57fr558ur0qfvu2sey3w8wlmhgh4hjlqzypn0gl3aeljuj2qmgd4lftjy83yf857pk97w2qez87qy85alhhaj7v8yhqs" />
    <content type="html">
      To all Vapers out there. &lt;br/&gt;&lt;br/&gt;A groundbreaking study from researchers at UC Davis, published in ACS Central Science, analyzed aerosols from popular disposable e-cigarettes. They found that certain devices emitted lead, nickel, and chromium at concentrations higher than traditional tobacco smoke. Shockingly, one device released more lead in a single day of use than 20 packs of cigarettes.&lt;br/&gt;&lt;br/&gt;Lead exposure, even at low levels, can impair neurological development, especially in adolescents. Nickel and chromium are known carcinogens linked to respiratory ailments and allergic reactions. The culprit? The degradation of metal coils and the use of lead-containing alloys in internal components. The lack of standardized quality control in these disposable products makes their toxicity not just likely but inevitable.&lt;br/&gt;&lt;br/&gt;But the danger doesn&amp;#39;t end there. Many of these metals also fall into a category called &amp;#34;metalloestrogens&amp;#34; metallic compounds that can mimic estrogen in the body and bind to hormone receptors. According to GreenMedInfo&amp;#39;s previous coverage, these metalloestrogens may fuel estrogen-sensitive cancers such as breast, ovarian, and prostate cancer.&lt;br/&gt;&lt;br/&gt;&lt;a href=&#34;https://greenmedinfo.com/blog/metalloestrogens-new-class-cancer-causing-estrogens&#34;&gt;https://greenmedinfo.com/blog/metalloestrogens-new-class-cancer-causing-estrogens&lt;/a&gt; &lt;br/&gt;&lt;br/&gt;This hormonal mimicry is especially concerning given the already endocrine-disrupting properties of other vape constituents&lt;br/&gt;&lt;br/&gt;&lt;a href=&#34;https://sayerji.substack.com/p/puffing-poison-is-vaping-the-new&#34;&gt;https://sayerji.substack.com/p/puffing-poison-is-vaping-the-new&lt;/a&gt;  &lt;br/&gt;&lt;br/&gt;
    </content>
    <updated>2026-01-12T10:25:54&#43;01:00</updated>
  </entry>

  <entry>
    <id>https://nostr.ae/nevent1qqs8easxwpkjat8d5vjvzhkf7detpmgfca4jtgwz3pa4ehth8yhev8szypn0gl3aeljuj2qmgd4lftjy83yf857pk97w2qez87qy85alhhaj7h6df3v</id>
    
      <title type="html">Multiple Zero-Days are required to get in GrapheneOS. There are ...</title>
    
    <link rel="alternate" href="https://nostr.ae/nevent1qqs8easxwpkjat8d5vjvzhkf7detpmgfca4jtgwz3pa4ehth8yhev8szypn0gl3aeljuj2qmgd4lftjy83yf857pk97w2qez87qy85alhhaj7h6df3v" />
    <content type="html">
      Multiple Zero-Days are required to get in GrapheneOS.&lt;br/&gt;&lt;br/&gt;There are still corelation and meta data based attacks possible. But if a techie wants to evade. They can. It will still require user interaction. 0 clicks are very difficult.&lt;br/&gt;&lt;br/&gt;&lt;a href=&#34;https://youtu.be/a6DTKze5S50&#34;&gt;https://youtu.be/a6DTKze5S50&lt;/a&gt; &lt;br/&gt;&lt;br/&gt;
    </content>
    <updated>2026-01-09T11:07:37&#43;01:00</updated>
  </entry>

  <entry>
    <id>https://nostr.ae/nevent1qqs20gu3dpzxmdt3zp0qgqkdadfw2eakeqsgrku993puwlssp9ycfgszypn0gl3aeljuj2qmgd4lftjy83yf857pk97w2qez87qy85alhhaj7akvrr5</id>
    
      <title type="html">The Social Blood Highly recommended A short, critical read, ...</title>
    
    <link rel="alternate" href="https://nostr.ae/nevent1qqs20gu3dpzxmdt3zp0qgqkdadfw2eakeqsgrku993puwlssp9ycfgszypn0gl3aeljuj2qmgd4lftjy83yf857pk97w2qez87qy85alhhaj7akvrr5" />
    <content type="html">
      The Social Blood&lt;br/&gt;&lt;br/&gt;&lt;br/&gt;Highly recommended&lt;br/&gt;&lt;br/&gt;A short, critical read, explains &amp;#39;why&amp;#39; central bankers are obsessed with &amp;#34;programmable money&amp;#34;&lt;br/&gt;&lt;br/&gt;The Moses Hess realisation yesterday slotted right into the picture&lt;br/&gt;&lt;br/&gt;&lt;br/&gt;➡️ Summary:&lt;br/&gt;&lt;br/&gt;&amp;#34;Moses Hess, inspired by Hegel, proposed that money acts as the &amp;#39;social blood,&amp;#39; integrating society like a circulatory system.&lt;br/&gt;&lt;br/&gt;Hegel envisioned history moving towards organic unity, but lacked a mechanism to explain how millions of people could function as a coherent whole.&lt;br/&gt;&lt;br/&gt;Hess inverted Hegel&amp;#39;s ideas, arguing that money, not the state, is the primary force for social integration, making individuals interdependent.&lt;br/&gt;&lt;br/&gt;Hess&amp;#39;s critique of money as a tool of &amp;#39;slavery&amp;#39; inadvertently provided a blueprint for how to control social circulation.&lt;br/&gt;&lt;br/&gt;Marx extended Hess&amp;#39;s ideas by identifying the &amp;#39;centralization of credit&amp;#39; as a key lever for controlling the social organism.&lt;br/&gt;&lt;br/&gt;Lenin operationalized this control through &amp;#39;universal accounting and control,&amp;#39; aiming for total surveillance of production and distribution.&lt;br/&gt;&lt;br/&gt;Bogdanov developed tektology, a universal science of organization, viewing society as a system to be optimized through information processing.&lt;br/&gt;&lt;br/&gt;Leontief&amp;#39;s input-output analysis made economic flows calculable, rendering the social organism&amp;#39;s metabolism visible.&lt;br/&gt;&lt;br/&gt;The modern concept of the Circular Economy and the Bank for International Settlements&amp;#39; &amp;#39;Unified Ledger&amp;#39; represent the completion of this integrated, controlled social system.&lt;br/&gt;&lt;br/&gt;The core insight is that social integration occurs through circulation, and control over this circulation grants control over the entire social organism.&amp;#34;&lt;br/&gt;&lt;br/&gt;&lt;a href=&#34;https://escapekey.substack.com/p/the-social-blood&#34;&gt;https://escapekey.substack.com/p/the-social-blood&lt;/a&gt;&lt;br/&gt;&lt;br/&gt;&lt;br/&gt;➡️ My Opinion:&lt;br/&gt;&lt;br/&gt;This article is diagnostically brilliant and strategically incomplete.&lt;br/&gt;&lt;br/&gt;- It explains: how control could work, why elites pursue it&lt;br/&gt;&lt;br/&gt;- It does not explain: why it will eventually fail or what replaces it&lt;br/&gt;&lt;br/&gt;The next phase is not total control, nor total collapse. &lt;br/&gt;&lt;br/&gt;
    </content>
    <updated>2026-01-09T10:25:29&#43;01:00</updated>
  </entry>

  <entry>
    <id>https://nostr.ae/nevent1qqs9pn0l5dh4yw69lqe4r4rtu5nnwep5kscw64ra24qed5ltjca23tczypn0gl3aeljuj2qmgd4lftjy83yf857pk97w2qez87qy85alhhaj7k22mv9</id>
    
      <title type="html">Buy a GPU</title>
    
    <link rel="alternate" href="https://nostr.ae/nevent1qqs9pn0l5dh4yw69lqe4r4rtu5nnwep5kscw64ra24qed5ltjca23tczypn0gl3aeljuj2qmgd4lftjy83yf857pk97w2qez87qy85alhhaj7k22mv9" />
    <content type="html">
      Buy a GPU &lt;br/&gt;&lt;br/&gt;
    </content>
    <updated>2026-01-09T07:15:09&#43;01:00</updated>
  </entry>

  <entry>
    <id>https://nostr.ae/nevent1qqs8d4tpcvpd4zng9latmwterhndvayl2cpskx2yg9vssk0d5yt45dqzypn0gl3aeljuj2qmgd4lftjy83yf857pk97w2qez87qy85alhhaj72p8z2z</id>
    
      <title type="html">Interesting post on 2026 trends: ...</title>
    
    <link rel="alternate" href="https://nostr.ae/nevent1qqs8d4tpcvpd4zng9latmwterhndvayl2cpskx2yg9vssk0d5yt45dqzypn0gl3aeljuj2qmgd4lftjy83yf857pk97w2qez87qy85alhhaj72p8z2z" />
    <content type="html">
      Interesting post on 2026 trends:&lt;br/&gt;&lt;br/&gt;&lt;a href=&#34;https://www.derekthompson.org/p/the-26-most-important-ideas-for-2026&#34;&gt;https://www.derekthompson.org/p/the-26-most-important-ideas-for-2026&lt;/a&gt; &lt;br/&gt;&lt;br/&gt;
    </content>
    <updated>2025-12-29T11:02:08&#43;01:00</updated>
  </entry>

  <entry>
    <id>https://nostr.ae/nevent1qqsgrntfulrz7up35az77kh7d4uxsa05ltg8p43q4ktpf58249ty8uszypn0gl3aeljuj2qmgd4lftjy83yf857pk97w2qez87qy85alhhaj7yydhrg</id>
    
      <title type="html">Do not use Proton mail service. Seems they deliver all customers ...</title>
    
    <link rel="alternate" href="https://nostr.ae/nevent1qqsgrntfulrz7up35az77kh7d4uxsa05ltg8p43q4ktpf58249ty8uszypn0gl3aeljuj2qmgd4lftjy83yf857pk97w2qez87qy85alhhaj7yydhrg" />
    <content type="html">
      Do not use Proton mail service. Seems they deliver all customers data to government&lt;br/&gt;&lt;br/&gt;Here are some detailed sources describing the Proton Mail vs. Phrack controversy from September 2025:&lt;br/&gt;&lt;br/&gt;- The Intercept&amp;#39;s investigative article (one of the most comprehensive journalistic accounts):  &lt;br/&gt;  &lt;a href=&#34;https://theintercept.com/2025/09/12/proton-mail-journalist-accounts-suspended/&#34;&gt;https://theintercept.com/2025/09/12/proton-mail-journalist-accounts-suspended/&lt;/a&gt;&lt;br/&gt;&lt;br/&gt;- Phrack&amp;#39;s own article (Issue 72, which includes the original exposé on North Korean cyber-espionage and a timeline of the Proton account suspensions at the top):  &lt;br/&gt;  &lt;a href=&#34;https://phrack.org/issues/72/7.html&#34;&gt;https://phrack.org/issues/72/7.html&lt;/a&gt; (or the Markdown version: &lt;a href=&#34;https://phrack.org/issues/72/7_md&#34;&gt;https://phrack.org/issues/72/7_md&lt;/a&gt;)&lt;br/&gt;&lt;br/&gt;- A blog post analyzing the incident from redact.dev:  &lt;br/&gt;  &lt;a href=&#34;https://redact.dev/blog/proton-mail-journalist-suspensions-cert-alert&#34;&gt;https://redact.dev/blog/proton-mail-journalist-suspensions-cert-alert&lt;/a&gt;&lt;br/&gt;&lt;br/&gt;- Another blog-style breakdown on Substack (The Lunduke Journal):  &lt;br/&gt;  &lt;a href=&#34;https://lunduke.substack.com/p/the-phrack-north-korea-and-proton&#34;&gt;https://lunduke.substack.com/p/the-phrack-north-korea-and-proton&lt;/a&gt; &lt;br/&gt;&lt;br/&gt;
    </content>
    <updated>2025-12-29T10:56:53&#43;01:00</updated>
  </entry>

  <entry>
    <id>https://nostr.ae/nevent1qqs9kv2gcxlygqdhy9zeeua9u835taglpcjqfnh4n7m6d2acje4td2szypn0gl3aeljuj2qmgd4lftjy83yf857pk97w2qez87qy85alhhaj7zc2uuq</id>
    
      <title type="html">Skills &amp;gt; Prompts</title>
    
    <link rel="alternate" href="https://nostr.ae/nevent1qqs9kv2gcxlygqdhy9zeeua9u835taglpcjqfnh4n7m6d2acje4td2szypn0gl3aeljuj2qmgd4lftjy83yf857pk97w2qez87qy85alhhaj7zc2uuq" />
    <content type="html">
      Skills &amp;gt; Prompts &lt;br/&gt;&lt;br/&gt;
    </content>
    <updated>2025-12-27T07:12:07&#43;01:00</updated>
  </entry>

  <entry>
    <id>https://nostr.ae/nevent1qqsf2gnc9m34re9vk384g3kmnrjpqf0ek9rj4kr8sg8lzaqjdpueflqzypn0gl3aeljuj2qmgd4lftjy83yf857pk97w2qez87qy85alhhaj7etx6s0</id>
    
      <title type="html">⬇️ One tool to download videos from almost anywhere A new ...</title>
    
    <link rel="alternate" href="https://nostr.ae/nevent1qqsf2gnc9m34re9vk384g3kmnrjpqf0ek9rj4kr8sg8lzaqjdpueflqzypn0gl3aeljuj2qmgd4lftjy83yf857pk97w2qez87qy85alhhaj7etx6s0" />
    <content type="html">
      ⬇️ One tool to download videos from almost anywhere&lt;br/&gt;&lt;br/&gt;A new free utility makes it possible to download videos from nearly the entire internet locally, fast, and without relying on cloud services.&lt;br/&gt;&lt;br/&gt;&lt;a href=&#34;https://github.com/nexmoe/VidBee&#34;&gt;https://github.com/nexmoe/VidBee&lt;/a&gt;&lt;br/&gt;&lt;br/&gt;🔸 Supports 1,000&#43; platforms, including YouTube, TikTok, Twitch, Vimeo, Kick, and more.&lt;br/&gt;&lt;br/&gt;🔸 Lets you download only specific segments, not the full video.&lt;br/&gt;&lt;br/&gt;🔸 Handles multiple downloads at once, no need to queue manually.&lt;br/&gt;&lt;br/&gt;🔸 Includes quality selection, from low-res to the original source.&lt;br/&gt;&lt;br/&gt;🔸 Can download subtitles alongside the video.&lt;br/&gt;&lt;br/&gt;🔸 Supports auto-downloading new videos from a feed or channel.&lt;br/&gt;&lt;br/&gt;🔸 Runs entirely locally, no accounts or cloud processing.&lt;br/&gt;&lt;br/&gt;🔸 Has a browser extension, one click and the video is saved.&lt;br/&gt;&lt;br/&gt;This feels like a “Swiss army knife” for video downloading: simple on the surface, but surprisingly powerful under the hood. &lt;br/&gt;&lt;br/&gt;
    </content>
    <updated>2025-12-26T10:23:16&#43;01:00</updated>
  </entry>

  <entry>
    <id>https://nostr.ae/nevent1qqsdcdcdfrgdq5fh9yqh50v9v9x4kta3078wfqkfth96uurp2vstemszypn0gl3aeljuj2qmgd4lftjy83yf857pk97w2qez87qy85alhhaj7fkfk3w</id>
    
      <title type="html">#Bitcoin developers are sleepwalking towards collapse ...</title>
    
    <link rel="alternate" href="https://nostr.ae/nevent1qqsdcdcdfrgdq5fh9yqh50v9v9x4kta3078wfqkfth96uurp2vstemszypn0gl3aeljuj2qmgd4lftjy83yf857pk97w2qez87qy85alhhaj7fkfk3w" />
    <content type="html">
      #Bitcoin developers are sleepwalking towards collapse&lt;br/&gt;&lt;br/&gt;&lt;a href=&#34;https://murmurationstwo.substack.com/p/bitcoin-developers-are-sleepwalking&#34;&gt;https://murmurationstwo.substack.com/p/bitcoin-developers-are-sleepwalking&lt;/a&gt; &lt;br/&gt;&lt;br/&gt;
    </content>
    <updated>2025-12-20T10:50:43&#43;01:00</updated>
  </entry>

  <entry>
    <id>https://nostr.ae/nevent1qqs2cew9750mnrflka3qc23uqpm00jra64udt7xxse6f3nsxekp65cczypn0gl3aeljuj2qmgd4lftjy83yf857pk97w2qez87qy85alhhaj7te5urg</id>
    
      <title type="html">The Tor Project is switching to Rust ...</title>
    
    <link rel="alternate" href="https://nostr.ae/nevent1qqs2cew9750mnrflka3qc23uqpm00jra64udt7xxse6f3nsxekp65cczypn0gl3aeljuj2qmgd4lftjy83yf857pk97w2qez87qy85alhhaj7te5urg" />
    <content type="html">
      The Tor Project is switching to Rust&lt;br/&gt;&lt;br/&gt;&lt;a href=&#34;https://itsfoss.com/news/tor-rust-rewrite-progress/&#34;&gt;https://itsfoss.com/news/tor-rust-rewrite-progress/&lt;/a&gt; &lt;br/&gt;&lt;br/&gt;
    </content>
    <updated>2025-12-12T16:48:23&#43;01:00</updated>
  </entry>

  <entry>
    <id>https://nostr.ae/nevent1qqsfnrknsw4jr7af344lx3y6c8vu9mdpyyyvg3779zem7wvjy4c393qzypn0gl3aeljuj2qmgd4lftjy83yf857pk97w2qez87qy85alhhaj74j0h34</id>
    
      <title type="html">GM #Nostr 💜 #Bitcoin isn&amp;#39;t just money; it&amp;#39;s a ...</title>
    
    <link rel="alternate" href="https://nostr.ae/nevent1qqsfnrknsw4jr7af344lx3y6c8vu9mdpyyyvg3779zem7wvjy4c393qzypn0gl3aeljuj2qmgd4lftjy83yf857pk97w2qez87qy85alhhaj74j0h34" />
    <content type="html">
      GM #Nostr 💜&lt;br/&gt;&lt;br/&gt;#Bitcoin isn&amp;#39;t just money; it&amp;#39;s a decentralized network.&lt;br/&gt;&lt;br/&gt;No CEO, no headquarters, just code and consensus. &lt;br/&gt;&lt;br/&gt;It’s financial power returned to the people. ✊🌐 &lt;br/&gt;&lt;br/&gt;
    </content>
    <updated>2025-12-12T11:45:36&#43;01:00</updated>
  </entry>

  <entry>
    <id>https://nostr.ae/nevent1qqsvh65uvek430sd5rstdpddy5m9l29k0djrlcv7qagk04hghmuyx9qzypn0gl3aeljuj2qmgd4lftjy83yf857pk97w2qez87qy85alhhaj7w95a53</id>
    
      <title type="html">The Agent Smith Effect In the movie, The Matrix, Agent Smith has ...</title>
    
    <link rel="alternate" href="https://nostr.ae/nevent1qqsvh65uvek430sd5rstdpddy5m9l29k0djrlcv7qagk04hghmuyx9qzypn0gl3aeljuj2qmgd4lftjy83yf857pk97w2qez87qy85alhhaj7w95a53" />
    <content type="html">
      The Agent Smith Effect&lt;br/&gt;&lt;br/&gt;In the movie, The Matrix, Agent Smith has the ability to enter any body, at any time, and that often happens when the Matrix is threatened by Neo. &lt;br/&gt;&lt;br/&gt;This senario is a reflection of our real world. &lt;br/&gt;&lt;br/&gt;For example, you&amp;#39;re having a conversation with a friend and everything is fine until you mention something like, &amp;#34;vaccines are poison&amp;#34;, &amp;#34;earth is flat&amp;#34;, &amp;#34;9/11 was an inside job&amp;#34;&lt;br/&gt;&lt;br/&gt;Now watch what happens, up pops Agent Smith, to replace the person you were just having a conversation with to attack you because all truths threaten the Matrix.&lt;br/&gt;&lt;br/&gt;Most people have had the Agent Smith Matrix programming since birth. These programmed people become the guardians of the economic Matrix that keeps them slave&amp;#39;s, protectors of the code. The police of mind control and enforcers of the indoctrination which holds together our false concept of reality like super glue. &lt;br/&gt;&lt;br/&gt;&lt;br/&gt;&lt;br/&gt;&lt;video controls width=&#34;100%&#34; class=&#34;max-h-[90vh] bg-neutral-300 dark:bg-zinc-700&#34;&gt;&lt;source src=&#34;https://blossom.primal.net/48488f222dba43021916df184ac6f9d0c987317654853652b3f85fd264536571.mp4&#34;&gt;&lt;/video&gt;
    </content>
    <updated>2025-12-01T11:01:33&#43;01:00</updated>
  </entry>

  <entry>
    <id>https://nostr.ae/nevent1qqspadzgkujjkxf3xz6ensraw2k3kxzqwf7xc54k2m0gq5wtu9w405szypn0gl3aeljuj2qmgd4lftjy83yf857pk97w2qez87qy85alhhaj7eucye0</id>
    
      <title type="html">Explore what the browser exposes about you ...</title>
    
    <link rel="alternate" href="https://nostr.ae/nevent1qqspadzgkujjkxf3xz6ensraw2k3kxzqwf7xc54k2m0gq5wtu9w405szypn0gl3aeljuj2qmgd4lftjy83yf857pk97w2qez87qy85alhhaj7eucye0" />
    <content type="html">
      Explore what the browser exposes about you&lt;br/&gt;&lt;br/&gt;&lt;a href=&#34;https://neberej.github.io/exposedbydefault/&#34;&gt;https://neberej.github.io/exposedbydefault/&lt;/a&gt;  &lt;br/&gt;&lt;br/&gt;
    </content>
    <updated>2025-12-01T10:19:36&#43;01:00</updated>
  </entry>

  <entry>
    <id>https://nostr.ae/nevent1qqs9wlt0azwm96aj9h83lg3mc58dyx4tart530c2gf0rzkuul8cs9uqzypn0gl3aeljuj2qmgd4lftjy83yf857pk97w2qez87qy85alhhaj78preh5</id>
    
      <title type="html">#Bitcon and the Quantum problem - Part 2 The Quantum Supremacy ...</title>
    
    <link rel="alternate" href="https://nostr.ae/nevent1qqs9wlt0azwm96aj9h83lg3mc58dyx4tart530c2gf0rzkuul8cs9uqzypn0gl3aeljuj2qmgd4lftjy83yf857pk97w2qez87qy85alhhaj78preh5" />
    <content type="html">
      #Bitcon and the Quantum problem - Part 2 &lt;br/&gt;&lt;br/&gt;The Quantum Supremacy&lt;br/&gt;&lt;br/&gt;&lt;a href=&#34;https://murmurationstwo.substack.com/p/bitcoin-and-the-quantum-problem-part-47f?triedRedirect=true&#34;&gt;https://murmurationstwo.substack.com/p/bitcoin-and-the-quantum-problem-part-47f?triedRedirect=true&lt;/a&gt; &lt;br/&gt;&lt;br/&gt;
    </content>
    <updated>2025-11-27T10:48:49&#43;01:00</updated>
  </entry>

  <entry>
    <id>https://nostr.ae/nevent1qqsrxdjnmc5s9htpetvn63hv4erwwuqqmc8as89puu55rj3ncmrj3yczypn0gl3aeljuj2qmgd4lftjy83yf857pk97w2qez87qy85alhhaj7se37u0</id>
    
      <title type="html">ControlD Full Control 💪🏻</title>
    
    <link rel="alternate" href="https://nostr.ae/nevent1qqsrxdjnmc5s9htpetvn63hv4erwwuqqmc8as89puu55rj3ncmrj3yczypn0gl3aeljuj2qmgd4lftjy83yf857pk97w2qez87qy85alhhaj7se37u0" />
    <content type="html">
      In reply to &lt;a href=&#39;/nevent1qqsx7u2lpjqjpv5c9m6kf3gfsezmslg2sfwgcgfdarzankpjzfer2fqh3dahz&#39;&gt;nevent1q…dahz&lt;/a&gt;&lt;br/&gt;_________________________&lt;br/&gt;&lt;br/&gt;ControlD Full Control 💪🏻 &lt;br/&gt;&lt;br/&gt;
    </content>
    <updated>2025-11-26T17:39:58&#43;01:00</updated>
  </entry>

  <entry>
    <id>https://nostr.ae/nevent1qqs8uapjh8vzt4t3y0ax3xf7nvmfy8qnm9fwy8e0t3y8xua06x5vvtczypn0gl3aeljuj2qmgd4lftjy83yf857pk97w2qez87qy85alhhaj7ja4ee6</id>
    
      <title type="html">Rob Braxman, &amp;#39;The Internet Privacy Guy&amp;#39; or serial ...</title>
    
    <link rel="alternate" href="https://nostr.ae/nevent1qqs8uapjh8vzt4t3y0ax3xf7nvmfy8qnm9fwy8e0t3y8xua06x5vvtczypn0gl3aeljuj2qmgd4lftjy83yf857pk97w2qez87qy85alhhaj7ja4ee6" />
    <content type="html">
      Rob Braxman, &amp;#39;The Internet Privacy Guy&amp;#39; or serial scammer?&lt;br/&gt;&lt;br/&gt;&lt;a href=&#34;https://12bytes.org/rob-braxman-the-internet-privacy-guy-or-serial-scammer/&#34;&gt;https://12bytes.org/rob-braxman-the-internet-privacy-guy-or-serial-scammer/&lt;/a&gt; &lt;br/&gt;&lt;br/&gt;
    </content>
    <updated>2025-11-22T10:47:50&#43;01:00</updated>
  </entry>

  <entry>
    <id>https://nostr.ae/nevent1qqs8jr4z6qf3zzpskpydatvykun20dgtme3ww44edvfkwvy700mawgczypn0gl3aeljuj2qmgd4lftjy83yf857pk97w2qez87qy85alhhaj7zlpr86</id>
    
      <title type="html">The CloudFlare outage was a good thing ...</title>
    
    <link rel="alternate" href="https://nostr.ae/nevent1qqs8jr4z6qf3zzpskpydatvykun20dgtme3ww44edvfkwvy700mawgczypn0gl3aeljuj2qmgd4lftjy83yf857pk97w2qez87qy85alhhaj7zlpr86" />
    <content type="html">
      The CloudFlare outage was a good thing&lt;br/&gt;&lt;br/&gt;&lt;a href=&#34;https://gist.github.com/jbreckmckye/32587f2907e473dd06d68b0362fb0048&#34;&gt;https://gist.github.com/jbreckmckye/32587f2907e473dd06d68b0362fb0048&lt;/a&gt;&lt;br/&gt;&lt;br/&gt;Cloudflare, the CDN provider, suffered a massive outage today. Some of the world&amp;#39;s most popular apps and web services were left inaccessible for serveral hours whilst the Cloudflare team scrambled to fix a whole swathe of the internet.&lt;br/&gt;&lt;br/&gt;And that might be a good thing.&lt;br/&gt;The proximate cause of the outage was pretty mundane: a bad config file triggered a latent bug in one of Cloudflare&amp;#39;s services. &lt;br/&gt;&lt;br/&gt;&lt;a href=&#34;https://x.com/dok2001/status/1990791419653484646&#34;&gt;https://x.com/dok2001/status/1990791419653484646&lt;/a&gt;&lt;br/&gt;&lt;br/&gt;The file was too large (details still hazy) and this led to a cascading failure across Cloudflare operations. Probably there is some useful post-morteming about canary releases and staged rollouts.&lt;br/&gt;But the bigger problem, the ultimate cause, behind today&amp;#39;s chaos is the creeping centralisation of the internet and a society that is sleepwalking into assuming the net is always on and always working.&lt;br/&gt;&lt;br/&gt;It&amp;#39;s not just &amp;#34;trivial&amp;#34; stuff like Twitter and League of Legends that were affected, either. A friend of mine remarked caustically about his experience this morning&lt;br/&gt;&lt;br/&gt;&amp;#34;I couldn&amp;#39;t get air for my tyres at two garages because of cloudflare going down. Bloody love the lack of resilience that goes into the design when the machine says &amp;#34;cash only&amp;#34; and there&amp;#39;s no cash slot. So flat tires for everyone! Brilliant.&amp;#34;&lt;br/&gt;&lt;br/&gt;We are living in a society where every part of our lives is increasingly mediated through the internet: work, banking, retail, education, entertainment, dating, family, government ID and credit checks. And the internet is increasingly tied up in fewer and fewer points of failure.&lt;br/&gt;&lt;br/&gt;&lt;a href=&#34;https://arstechnica.com/gadgets/2025/10/a-single-point-of-failure-triggered-the-amazon-outage-affecting-millions/&#34;&gt;https://arstechnica.com/gadgets/2025/10/a-single-point-of-failure-triggered-the-amazon-outage-affecting-millions/&lt;/a&gt;&lt;br/&gt;&lt;br/&gt;It&amp;#39;s ironic because the internet was actually designed for decentralisation, a system that governments could use to coordinate their response in the event of nuclear war. But due to the economics of the internet, the challenges of things like bots and scrapers, more of more web services are holed up in citadels like AWS or behind content distribution networks like Cloudflare.&lt;br/&gt;&lt;br/&gt;Outages like today&amp;#39;s are a good thing because they&amp;#39;re a warning. They can force redundancy and resilience into systems. They can make the pillars of our society - governments, businesses, banks - provide reliable alternatives when things go wrong.&lt;br/&gt;(Ideally ones that are completely offline)&lt;br/&gt;&lt;br/&gt;You can draw a parallel to how COVID-19 shook up global supply chains: the logic up until 2020 was that you wanted your system to be as lean and efficient as possible, even if it meant relying totally on international supplies or keeping as little spare inventory as possible. After 2020 businesses realised they needed to diversify and build slack in the system to tolerate shocks.&lt;br/&gt;&lt;br/&gt;In the same way that growing one kind of banana, &lt;a href=&#34;https://www.treehugger.com/extinct-banana-5201723&#34;&gt;https://www.treehugger.com/extinct-banana-5201723&lt;/a&gt;&lt;br/&gt;&lt;br/&gt;nearly resulted in bananas going extinct, we&amp;#39;re drifing towards a society that can&amp;#39;t survive without digital infrastructure; and a digital infrastructure that can&amp;#39;t operate without two or three key players. One day there&amp;#39;s going to be an outage, a bug, or cyberattack from a hostile state, that demonstrates how fragile that system is.&lt;br/&gt;&lt;br/&gt;Embrace outages, and build redundancy. &lt;br/&gt;&lt;br/&gt;
    </content>
    <updated>2025-11-22T10:45:07&#43;01:00</updated>
  </entry>

  <entry>
    <id>https://nostr.ae/nevent1qqs8qdnt27kktfdfyudgv254vah8epyeq4u3l28clt3lmdtvdgxqmnqzypn0gl3aeljuj2qmgd4lftjy83yf857pk97w2qez87qy85alhhaj7prt35n</id>
    
      <title type="html">XDA Developers just covered rns-vpn-rs, Beechat&amp;#39;s open-source ...</title>
    
    <link rel="alternate" href="https://nostr.ae/nevent1qqs8qdnt27kktfdfyudgv254vah8epyeq4u3l28clt3lmdtvdgxqmnqzypn0gl3aeljuj2qmgd4lftjy83yf857pk97w2qez87qy85alhhaj7prt35n" />
    <content type="html">
      XDA Developers just covered rns-vpn-rs, Beechat&amp;#39;s open-source project that brings full VPN functionality to the Reticulum cryptographic mesh.&lt;br/&gt;&lt;br/&gt;rns-vpn-rs bridges the gap between conventional networking and trustless mesh systems. It assigns static IPs to cryptographic nodes, letting any IP-based app run securely over Reticulum, even without Internet or infrastructure.&lt;br/&gt;&lt;br/&gt;Underneath, Reticulum provides asynchronous, store and forward routing, up to 128 mesh hops, and end-to-end encryption, forming a self-healing, delay tolerant transport layer.&lt;br/&gt;&lt;br/&gt;As XDA&amp;#39;s Joe Rice-Jones points out, this has major potential for field operations, disaster zones, and decentralised systems that must keep working when everything else fails.&lt;br/&gt;&lt;br/&gt;Full article here: &lt;a href=&#34;https://www.xda-developers.com/amazing-off-grid-open-source-vpn/&#34;&gt;https://www.xda-developers.com/amazing-off-grid-open-source-vpn/&lt;/a&gt; &lt;br/&gt;&lt;br/&gt;
    </content>
    <updated>2025-11-16T14:06:16&#43;01:00</updated>
  </entry>

  <entry>
    <id>https://nostr.ae/nevent1qqsrwgn38dzsr74vz0r834cqt6tzc573v5mrzlvfkzzjzmr2hjc63xczypn0gl3aeljuj2qmgd4lftjy83yf857pk97w2qez87qy85alhhaj7l4jaqm</id>
    
      <title type="html">Satoshi Nakamoto Explains ‘Difficulty Adjustment’ “As ...</title>
    
    <link rel="alternate" href="https://nostr.ae/nevent1qqsrwgn38dzsr74vz0r834cqt6tzc573v5mrzlvfkzzjzmr2hjc63xczypn0gl3aeljuj2qmgd4lftjy83yf857pk97w2qez87qy85alhhaj7l4jaqm" />
    <content type="html">
      Satoshi Nakamoto Explains ‘Difficulty Adjustment’&lt;br/&gt;&lt;br/&gt;“As computers get faster and the total computing power applied to creating bitcoins increases, the difficulty increases proportionally to keep the total new production constant. Thus, it is known in advance how many new bitcoin,”&lt;br/&gt;&lt;br/&gt;This is the part people still underestimate.&lt;br/&gt;&lt;br/&gt;#Bitcoin doesn’t just have a fixed supply; it has a self-balancing system that keeps issuance predictable no matter how much power is thrown at it. You can’t inflate it, you can’t speed it up, you can’t change it. &lt;br/&gt;&lt;br/&gt;&lt;br/&gt;&lt;br/&gt; &lt;img src=&#34;https://blossom.primal.net/9a519475c3f73d9ce4f175888e6a5fae73898420063e8a3f758b5af6a775a6b0.jpg&#34;&gt; 
    </content>
    <updated>2025-11-09T11:55:41&#43;01:00</updated>
  </entry>

  <entry>
    <id>https://nostr.ae/nevent1qqsv09676e7dhddhwlly8pa3x9vaq2z5c9l8hx46hqrek4c3nae7nfqzypn0gl3aeljuj2qmgd4lftjy83yf857pk97w2qez87qy85alhhaj7ftds9n</id>
    
      <title type="html">Mullvad will shut down its privacy-focused search proxy, Leta, on ...</title>
    
    <link rel="alternate" href="https://nostr.ae/nevent1qqsv09676e7dhddhwlly8pa3x9vaq2z5c9l8hx46hqrek4c3nae7nfqzypn0gl3aeljuj2qmgd4lftjy83yf857pk97w2qez87qy85alhhaj7ftds9n" />
    <content type="html">
      Mullvad will shut down its privacy-focused search proxy, Leta, on November 27, 2025 &lt;br/&gt;&lt;br/&gt;
    </content>
    <updated>2025-11-07T11:39:53&#43;01:00</updated>
  </entry>

  <entry>
    <id>https://nostr.ae/nevent1qqszgk4l096xzle4cclnuuekjwn6vwytenm2udlnkwcqy0830ez8hyqzypn0gl3aeljuj2qmgd4lftjy83yf857pk97w2qez87qy85alhhaj7887hkp</id>
    
      <title type="html">Samourai Wallet dev gets max sentence in a case closely watched ...</title>
    
    <link rel="alternate" href="https://nostr.ae/nevent1qqszgk4l096xzle4cclnuuekjwn6vwytenm2udlnkwcqy0830ez8hyqzypn0gl3aeljuj2qmgd4lftjy83yf857pk97w2qez87qy85alhhaj7887hkp" />
    <content type="html">
      Samourai Wallet dev gets max sentence in a case closely watched by privacy advocates&lt;br/&gt;&lt;br/&gt;&lt;br/&gt;Samourai Wallet developer Keonne Rodriguez was sentenced to five years in prison.&lt;br/&gt;&lt;br/&gt;In a letter to the judge, his attorneys had requested a sentence of one year and one day.&lt;br/&gt;&lt;br/&gt;His co-founder will be sentenced later this month.&lt;br/&gt;&lt;br/&gt;&lt;a href=&#34;https://www.dlnews.com/articles/defi/samourai-dev-gets-max-sentence-for-money-transmission-charge/&#34;&gt;https://www.dlnews.com/articles/defi/samourai-dev-gets-max-sentence-for-money-transmission-charge/&lt;/a&gt;  &lt;br/&gt;&lt;br/&gt;
    </content>
    <updated>2025-11-07T10:59:05&#43;01:00</updated>
  </entry>

  <entry>
    <id>https://nostr.ae/nevent1qqsr2p4swsq54sczu2xnx0k6ppua3e2z3x3lteafa3h0sg3pll44c3czypn0gl3aeljuj2qmgd4lftjy83yf857pk97w2qez87qy85alhhaj7s5ahey</id>
    
      <title type="html">My X account has been suspended due to inauthentic behaviors. ...</title>
    
    <link rel="alternate" href="https://nostr.ae/nevent1qqsr2p4swsq54sczu2xnx0k6ppua3e2z3x3lteafa3h0sg3pll44c3czypn0gl3aeljuj2qmgd4lftjy83yf857pk97w2qez87qy85alhhaj7s5ahey" />
    <content type="html">
      My X account has been suspended due to inauthentic behaviors. &lt;br/&gt;&lt;br/&gt;This has never happened to me before; has anyone else experienced this, and will I be able to recover my account? &lt;br/&gt;&lt;br/&gt;
    </content>
    <updated>2025-11-06T07:06:36&#43;01:00</updated>
  </entry>

  <entry>
    <id>https://nostr.ae/nevent1qqs06mv69aq557zs3p63va9tfrtfsj8mteh5q0sq2rrghtwt9dzzvvgzypn0gl3aeljuj2qmgd4lftjy83yf857pk97w2qez87qy85alhhaj725l4as</id>
    
      <title type="html">Leaked documents reveal that Amazon and Google, under Israel’s ...</title>
    
    <link rel="alternate" href="https://nostr.ae/nevent1qqs06mv69aq557zs3p63va9tfrtfsj8mteh5q0sq2rrghtwt9dzzvvgzypn0gl3aeljuj2qmgd4lftjy83yf857pk97w2qez87qy85alhhaj725l4as" />
    <content type="html">
      Leaked documents reveal that Amazon and Google, under Israel’s Nimbus cloud contract, agreed to secretly notify Israel whenever they hand over data to foreign governments — even when gag orders prevent disclosure.&lt;br/&gt;&lt;br/&gt;They use a coded “winking mechanism”: each request triggers a symbolic payment to Israel matching the foreign country’s dialing code (e.g. ₦IS 1,000 for the U.S., ₦IS 3,900 for Italy). &lt;br/&gt;&lt;br/&gt;If disclosure is legally forbidden, the firms must pay ₦IS 100,000 within 24 hours.&lt;br/&gt;&lt;br/&gt;The Guardian and &#43;972 Magazine say this arrangement bypasses U.S. and EU laws that forbid third-party notification. &lt;br/&gt;&lt;br/&gt;Unlike Microsoft— which ended a contract with Israel’s Unit 8200 over surveillance concerns — Amazon and Google agreed not to suspend Israel’s access even if terms are breached.&lt;br/&gt;&lt;br/&gt;Both companies also reportedly fired employees who opposed their Israel work.&lt;br/&gt;&lt;br/&gt;&lt;a href=&#34;https://x.com/clashreport/status/1983851276640157917&#34;&gt;https://x.com/clashreport/status/1983851276640157917&lt;/a&gt;&lt;br/&gt;&lt;br/&gt;&lt;a href=&#34;https://www.disclose.tv/id/6nz9boi6hq/&#34;&gt;https://www.disclose.tv/id/6nz9boi6hq/&lt;/a&gt; &lt;br/&gt;&lt;br/&gt;
    </content>
    <updated>2025-10-31T10:45:18&#43;01:00</updated>
  </entry>

  <entry>
    <id>https://nostr.ae/nevent1qqstjz0qtue5s9n4jl09dfsnmznzhgk40rsg2f3cxqccqgta38ld0zgzypn0gl3aeljuj2qmgd4lftjy83yf857pk97w2qez87qy85alhhaj7hgxur0</id>
    
      <title type="html">How to run ADB and fastboot in Termux without root to unlock ...</title>
    
    <link rel="alternate" href="https://nostr.ae/nevent1qqstjz0qtue5s9n4jl09dfsnmznzhgk40rsg2f3cxqccqgta38ld0zgzypn0gl3aeljuj2qmgd4lftjy83yf857pk97w2qez87qy85alhhaj7hgxur0" />
    <content type="html">
      How to run ADB and fastboot in Termux without root to unlock bootloader, run ADB commands, remove bloatware, flash ROM, or even root another Android&lt;br/&gt;&lt;br/&gt;&lt;a href=&#34;https://www.mobile-hacker.com/2025/06/16/how-to-run-adb-and-fastboot-on-a-non-rooted-android-smartphone-using-termux/&#34;&gt;https://www.mobile-hacker.com/2025/06/16/how-to-run-adb-and-fastboot-on-a-non-rooted-android-smartphone-using-termux/&lt;/a&gt;:&lt;br/&gt;&lt;br/&gt;1. It supports debloating of various manufacturers and mobile carriers such as LG, Samsung, Xiaomi, Huawei, Oppo, Realme, Vivo, ZTE, OnePlus, Nokia, Sony, Asus, Google, Fairphone, Motorola, Tecno, Unihertz.&lt;br/&gt;&lt;br/&gt;2. Full access to the app’s private storage — including databases, tokens, cached credentials, config files, or even offline user data.&lt;br/&gt;&lt;br/&gt;3. Another common issue in AndroidManifest.xml is this flag: When enabled (which it is by default unless explicitly disabled), Android allows the app’s private data to be backed up via ADB — again, even on non-rooted devices.&lt;br/&gt;&lt;br/&gt;Android, use termux-adb command instead of adb&lt;br/&gt;&lt;br/&gt;&lt;a href=&#34;https://github.com/nohajc/termux-adb&#34;&gt;https://github.com/nohajc/termux-adb&lt;/a&gt;&lt;br/&gt;&lt;br/&gt;Android debloater for PC and Debloat lists&lt;br/&gt;&lt;br/&gt;&lt;a href=&#34;https://github.com/Universal-Debloater-Alliance/universal-android-debloater-next-generation&#34;&gt;https://github.com/Universal-Debloater-Alliance/universal-android-debloater-next-generation&lt;/a&gt; &lt;br/&gt;&lt;br/&gt;
    </content>
    <updated>2025-10-31T10:35:52&#43;01:00</updated>
  </entry>

  <entry>
    <id>https://nostr.ae/nevent1qqsdpgwwmcezgrz2arzfyp9psklusq78cymhphf7y0agl9rsle5vt9qzypn0gl3aeljuj2qmgd4lftjy83yf857pk97w2qez87qy85alhhaj7k3rl28</id>
    
      <title type="html">Obtainium</title>
    
    <link rel="alternate" href="https://nostr.ae/nevent1qqsdpgwwmcezgrz2arzfyp9psklusq78cymhphf7y0agl9rsle5vt9qzypn0gl3aeljuj2qmgd4lftjy83yf857pk97w2qez87qy85alhhaj7k3rl28" />
    <content type="html">
      Obtainium &lt;br/&gt;&lt;br/&gt;
    </content>
    <updated>2025-10-31T07:13:13&#43;01:00</updated>
  </entry>

  <entry>
    <id>https://nostr.ae/nevent1qqsxfysw80wdy354fs26cy33r4jclnly4rx24s8jf6kw56s978mu0vqzypn0gl3aeljuj2qmgd4lftjy83yf857pk97w2qez87qy85alhhaj7jnvh7m</id>
    
      <title type="html">&amp;#34;I think in the short term, everything will be offered with ...</title>
    
    <link rel="alternate" href="https://nostr.ae/nevent1qqsxfysw80wdy354fs26cy33r4jclnly4rx24s8jf6kw56s978mu0vqzypn0gl3aeljuj2qmgd4lftjy83yf857pk97w2qez87qy85alhhaj7jnvh7m" />
    <content type="html">
      &amp;#34;I think in the short term, everything will be offered with great benefits. It was quite interesting what you were talking about...Sam Altman offering his Worldcoin by literally paying people for their biometrics. &lt;br/&gt;&lt;br/&gt;So your biometrics link you, your physical self. So, your biometrics is biological identifier. So your face, your iris, your fingerprints, whatever. That links the physical you to your digital twin, and your digital twin exists in the virtual world, so whatever happens or whatever rules are applied to your digital twin will have an impact on you as a person.&lt;br/&gt;&lt;br/&gt;We&amp;#39;ll have programmable digital currency, then your digital currency doesn&amp;#39;t work outside of your 15-minute city. So...there&amp;#39;s not a wall stopping you leaving the city, your physical self. But once you&amp;#39;re outside of the city, you can&amp;#39;t buy anything or pay for anything. So you are geo-fenced. You&amp;#39;re geo-fenced into that locale because you haven&amp;#39;t got any means of supporting yourself outside of it. So this is the kind of thing that they&amp;#39;re working on. This is the kind of thing that they&amp;#39;re testing.&lt;br/&gt;&lt;br/&gt;They envisage, what ultimately, I suppose, the umbrella term that we could use for all these different things...15 minute city, human settlement, resilient city...is smart city. And that&amp;#39;s definitely coming from a global governance level. The commitment is part of what they call the New Urban Agenda.&amp;#34; &lt;br/&gt;&lt;br/&gt;- Iain Davis&lt;br/&gt;&lt;br/&gt;&lt;a href=&#34;https://iaindavis.com/the-technocratic-dark-state/&#34;&gt;https://iaindavis.com/the-technocratic-dark-state/&lt;/a&gt; &lt;br/&gt;&lt;br/&gt;&lt;br/&gt;&lt;br/&gt;&lt;video controls width=&#34;100%&#34; class=&#34;max-h-[90vh] bg-neutral-300 dark:bg-zinc-700&#34;&gt;&lt;source src=&#34;https://blossom.primal.net/b8b755ca38961c55441cb6e35e953c52e0a5162de67b8034d2b03ae38fb132d1.mp4&#34;&gt;&lt;/video&gt;
    </content>
    <updated>2025-10-30T11:39:25&#43;01:00</updated>
  </entry>

  <entry>
    <id>https://nostr.ae/nevent1qqsds9lgapjnp6e727j4p86dgyjc63xy7ez3ak65zyw5s6vtsxfw5eqzypn0gl3aeljuj2qmgd4lftjy83yf857pk97w2qez87qy85alhhaj753kywg</id>
    
      <title type="html">The App That Google Couldn&amp;#39;t Shut Down ...</title>
    
    <link rel="alternate" href="https://nostr.ae/nevent1qqsds9lgapjnp6e727j4p86dgyjc63xy7ez3ak65zyw5s6vtsxfw5eqzypn0gl3aeljuj2qmgd4lftjy83yf857pk97w2qez87qy85alhhaj753kywg" />
    <content type="html">
      The App That Google Couldn&amp;#39;t Shut Down&lt;br/&gt;&lt;br/&gt;&lt;a href=&#34;https://www.youtube.com/watch?v=Vlc255SwBXw&#34;&gt;https://www.youtube.com/watch?v=Vlc255SwBXw&lt;/a&gt;&lt;br/&gt;&lt;br/&gt;ReVanced Manager is an application that uses ReVanced Patcher to patch Android apps.&lt;br/&gt;&lt;br/&gt;&lt;a href=&#34;https://github.com/revanced/revanced-patcher&#34;&gt;https://github.com/revanced/revanced-patcher&lt;/a&gt;&lt;br/&gt;&lt;br/&gt;💪 Features:&lt;br/&gt;&lt;br/&gt;💉 Patch apps: Apply any patch of your choice to Android apps&lt;br/&gt;&lt;br/&gt;📱 Portable: ReVanced Patcher that fits in your pocket&lt;br/&gt;&lt;br/&gt;🤗 Simple UI: Quickly understand the ins and outs of ReVanced Manager&lt;br/&gt;&lt;br/&gt;🛠️ Customization: Configurable API, custom sources, language, signing keystore, theme and more&lt;br/&gt;&lt;br/&gt;You can download the most recent version of ReVanced Manager at revanced.app/download or from GitHub releases.&lt;br/&gt;&lt;br/&gt;Learn how to use ReVanced Manager by following the documentation.&lt;br/&gt;&lt;br/&gt;&lt;a href=&#34;https://github.com/ReVanced/revanced-manager/blob/main/docs&#34;&gt;https://github.com/ReVanced/revanced-manager/blob/main/docs&lt;/a&gt; &lt;br/&gt;&lt;br/&gt;
    </content>
    <updated>2025-10-24T12:09:44&#43;02:00</updated>
  </entry>

  <entry>
    <id>https://nostr.ae/nevent1qqsyyw9a5u4uccgwmxz7zcls77z9edjzr3k2s8ucw4q3ex2y5nc4hwqzypn0gl3aeljuj2qmgd4lftjy83yf857pk97w2qez87qy85alhhaj7t99amn</id>
    
      <title type="html">If you&amp;#39;ve lost hope for Uptober, remember that November has ...</title>
    
    <link rel="alternate" href="https://nostr.ae/nevent1qqsyyw9a5u4uccgwmxz7zcls77z9edjzr3k2s8ucw4q3ex2y5nc4hwqzypn0gl3aeljuj2qmgd4lftjy83yf857pk97w2qez87qy85alhhaj7t99amn" />
    <content type="html">
      If you&amp;#39;ve lost hope for Uptober, remember that November has historically been one of #Bitcoin &amp;#39;s most bullish months according to seasonality data.&lt;br/&gt;&lt;br/&gt;10 days left before October Monthly closing&lt;br/&gt;&lt;br/&gt;&lt;br/&gt;Upvember. &lt;br/&gt;&lt;br/&gt;&lt;br/&gt;&lt;br/&gt; &lt;img src=&#34;https://blossom.primal.net/65201d4189a0b5b2f8ec939840db52418eea9f2040e98e42cc78981d7173947c.jpg&#34;&gt; 
    </content>
    <updated>2025-10-21T12:22:10&#43;02:00</updated>
  </entry>

  <entry>
    <id>https://nostr.ae/nevent1qqsv4vxnnxlz7rjqdfvgfg35eu4a7nqgnmjjzfu2e075zhfm9vvgmtczypn0gl3aeljuj2qmgd4lftjy83yf857pk97w2qez87qy85alhhaj7hpsqdj</id>
    
      <title type="html">Elon promotes &amp;#34;X Chat&amp;#34; as private messaging but... Elon ...</title>
    
    <link rel="alternate" href="https://nostr.ae/nevent1qqsv4vxnnxlz7rjqdfvgfg35eu4a7nqgnmjjzfu2e075zhfm9vvgmtczypn0gl3aeljuj2qmgd4lftjy83yf857pk97w2qez87qy85alhhaj7hpsqdj" />
    <content type="html">
      Elon promotes &amp;#34;X Chat&amp;#34; as private messaging but...&lt;br/&gt;&lt;br/&gt;Elon Musk assures that even if someone put a gun to his head, he could not access your messages:&lt;br/&gt;&lt;br/&gt;&amp;#34;Messages are fully encrypted, with no advertising hooks or strange &amp;#34;AWS dependencies,&amp;#34; so I can&amp;#39;t read your messages even if someone puts a gun to my head.&lt;br/&gt;&lt;br/&gt;You will also be able to make file transfers and audio/video calls.&amp;#34;&lt;br/&gt;&lt;br/&gt;&lt;br/&gt;&lt;br/&gt;However, we can find this in the X help center:&lt;br/&gt;&lt;br/&gt;&lt;a href=&#34;https://help.x.com/en/using-x/encrypted-direct-messages&#34;&gt;https://help.x.com/en/using-x/encrypted-direct-messages&lt;/a&gt; &lt;br/&gt;&lt;br/&gt;&amp;#34;Currently, we do not offer protection against man-in-the-middle attacks. As a result, if someone—a malicious employee or X itself as a result of a mandatory legal process—compromised an encrypted conversation, neither the sender nor the recipient would know. However, we are working on mechanisms for a future version that:&lt;br/&gt;&lt;br/&gt;· will allow devices to verify the authenticity of the content and the origin of a message (through &amp;#34;signature checks&amp;#34;); and&lt;br/&gt;&lt;br/&gt;· will allow a pair of users to verify the devices that have access to their encrypted conversations (through &amp;#34;security numbers&amp;#34;).&lt;br/&gt;&lt;br/&gt;When signature checks and security numbers are implemented, man-in-the-middle attacks should be difficult, if not impossible, and both senders and recipients should be alerted in case of an attack.&amp;#34; &lt;br/&gt;&lt;br/&gt;
    </content>
    <updated>2025-10-21T12:18:18&#43;02:00</updated>
  </entry>

  <entry>
    <id>https://nostr.ae/nevent1qqs99yd8vxqapu6ku2yf3xqr39el0t8g0acvn0y282hdxv4h8kr6fpszypn0gl3aeljuj2qmgd4lftjy83yf857pk97w2qez87qy85alhhaj7muyvra</id>
    
      <title type="html">#Bitcoin for Signal - Private Messaging Needs Private Money. ...</title>
    
    <link rel="alternate" href="https://nostr.ae/nevent1qqs99yd8vxqapu6ku2yf3xqr39el0t8g0acvn0y282hdxv4h8kr6fpszypn0gl3aeljuj2qmgd4lftjy83yf857pk97w2qez87qy85alhhaj7muyvra" />
    <content type="html">
      #Bitcoin for Signal - Private Messaging Needs Private Money.&lt;br/&gt;&lt;br/&gt;Signal is a trusted messenger that enables private communication and aims to extend this privacy to financial transactions.&lt;br/&gt;&lt;br/&gt;Signal initially integrated MobileCoin for payments, but it failed to gain significant adoption.&lt;br/&gt;&lt;br/&gt;The proposed solution involves integrating Bitcoin with the Cashu protocol to enable private, peer-to-peer payments within Signal.&lt;br/&gt;&lt;br/&gt;Cashu is a Chaumian ecash system that provides strong privacy and allows for instant, cheap payments, even for tiny amounts.&lt;br/&gt;&lt;br/&gt;The Cashu protocol is open-source and not controlled by a single entity, allowing for community-driven development and implementation.&lt;br/&gt;&lt;br/&gt;The Signal Cashu integration embeds a lightweight Cashu wallet directly into Signal, making Bitcoin payments as natural as sending a message.&lt;br/&gt;&lt;br/&gt;Cashu uses blind signatures and other cryptographic techniques to ensure user privacy and unlinkability of transactions.&lt;br/&gt;&lt;br/&gt;The Cashu protocol is defined by a set of open specifications called NUTs (Notation, Usage, and Terminology).&lt;br/&gt;&lt;br/&gt;The proof-of-concept demonstrates that Bitcoin in Signal is technically feasible with Cashu, and the team seeks support and collaboration from the community and Signal itself.&lt;br/&gt;&lt;br/&gt;Cashu aligns with Signal&amp;#39;s privacy-first mission and could bring millions of potential new users, enhancing privacy for everyone.&lt;br/&gt;&lt;br/&gt;&lt;a href=&#34;https://bitcoinforsignal.org/&#34;&gt;https://bitcoinforsignal.org/&lt;/a&gt; &lt;br/&gt;&lt;br/&gt;
    </content>
    <updated>2025-10-16T18:15:53&#43;02:00</updated>
  </entry>

  <entry>
    <id>https://nostr.ae/nevent1qqsdxpmkdcsek0zvwekj0uwrnmg7292lc8puudwlete46fw43hgw9qszypn0gl3aeljuj2qmgd4lftjy83yf857pk97w2qez87qy85alhhaj7emncld</id>
    
      <title type="html">Some people feel envious when you&amp;#39;re happy living your life ...</title>
    
    <link rel="alternate" href="https://nostr.ae/nevent1qqsdxpmkdcsek0zvwekj0uwrnmg7292lc8puudwlete46fw43hgw9qszypn0gl3aeljuj2qmgd4lftjy83yf857pk97w2qez87qy85alhhaj7emncld" />
    <content type="html">
      Some people feel envious when you&amp;#39;re happy living your life differently because they made life choices based on what others are doing rather than what&amp;#39;s good for them. When they suffer as a result of it, they want you to suffer too so that they don&amp;#39;t feel bad about those choices. &lt;br/&gt;&lt;br/&gt;
    </content>
    <updated>2025-10-14T07:57:26&#43;02:00</updated>
  </entry>

  <entry>
    <id>https://nostr.ae/nevent1qqstlde8xljypr4snmgskd8djh52sfcc8j8qqw4kv9js6f49jlyswugzypn0gl3aeljuj2qmgd4lftjy83yf857pk97w2qez87qy85alhhaj7ys2lry</id>
    
      <title type="html">About the recent #BTC Crash: What was the cause? Rumors.. Before ...</title>
    
    <link rel="alternate" href="https://nostr.ae/nevent1qqstlde8xljypr4snmgskd8djh52sfcc8j8qqw4kv9js6f49jlyswugzypn0gl3aeljuj2qmgd4lftjy83yf857pk97w2qez87qy85alhhaj7ys2lry" />
    <content type="html">
      About the recent #BTC Crash:&lt;br/&gt;&lt;br/&gt;What was the cause? Rumors..&lt;br/&gt;&lt;br/&gt;Before discussing the current market situation, I would like to share with you the most probable reason for what happened on Friday (without conspiracy theories).&lt;br/&gt;&lt;br/&gt;The Binance exchange allowed the use of USDe (the ENA stablecoin), wBETH (wrapped ether), and BNSOL as collateral for margin positions.&lt;br/&gt;&lt;br/&gt;But there was a problem with the exchange. The exchange&amp;#39;s system valued these 3 assets based on the price in its own order book, rather than relying on external sources. This means that if someone inside the exchange dumps a critical volume of these assets, their price would instantly drop. The exchange&amp;#39;s internal system would automatically consider the collateral assets depreciated and start liquidating clients&amp;#39; positions.&lt;br/&gt;&lt;br/&gt;The exchange knew about this problem and announced on October 6th that it would switch from its own order book to oracles (a service that takes price data for an asset from all sources and provides an average value - giving an objective price and not accounting for manipulations on individual exchanges). However, the new system was only scheduled to start working on October 14th (8 days remained until the vulnerability was closed).&lt;br/&gt;&lt;br/&gt;On October 10th, a large whale, who owns coins from the Satoshi Nakamoto era of Bitcoin (since 2011) and had been actively moving them to Ethereum in recent months, opened a SHORT position of over $1,000,000,000 on BTC and ETH on the HyperLiquid exchange (most likely a close insider).&lt;br/&gt;&lt;br/&gt;Just a few minutes before Trump began making aggressive statements about China and announcing new tariffs...&lt;br/&gt;&lt;br/&gt;At that moment, someone intentionally dumped ~80M USDe on Binance (the price inside the exchange dropped from $1 to $0.65 - while it remained stable everywhere else). If oracles had been working, everything would have been fine. But the exchange&amp;#39;s system, relying on the quote in its order book, decided that the &amp;#34;collateral&amp;#34; had depreciated and began liquidations of around ~$800M - $1B (including market maker positions).&lt;br/&gt;&lt;br/&gt;Against the backdrop of Trump&amp;#39;s statements, the crowd was in a state of panic and started closing their long positions / getting liquidated (selling), opening short positions (selling), dumping spot on emotions (selling). The algorithms of the largest exchanges/managers are oriented towards Binance (the largest and most liquid exchange) and automatically started selling/hedging/reducing liquidity to avoid losses.&lt;br/&gt;&lt;br/&gt;And instantly, the $80M USDe dump in the order book, combined with the panic from the news, triggered an unprecedented cascade of liquidations of ~$19B according to public data, and more than $80B (according to rumors).&lt;br/&gt;&lt;br/&gt;Outcomes:&lt;br/&gt;&lt;br/&gt;1.  The short positions of the insider whale from the Satoshi Nakamoto era made a profit of $192M in a matter of minutes (and he has been converting his bitcoins to ether all year - he believes in the growth prospects of the alt market).&lt;br/&gt;2.  The market was completely cleared of leverage, loans (favorable). The capital of overconfident retail investors moved into the hands of insiders.&lt;br/&gt;3.  Binance has already stated that the technical problems were on their end and they are fixing the situation (switching to oracles), which means it is very likely that something similar will not happen again (now everyone will be afraid of a repeat). And technology like ChainLink is necessary for the stable functioning of exchanges in the future.&lt;br/&gt;&lt;br/&gt;The situation is terrible, insidious, but the market is also high-risk. Most likely, this is a one-time, systemic problem and will be fixed soon. The manipulation was &amp;#34;covered&amp;#34; by the news of Trump&amp;#39;s speech. CZ is silent (although he usually urges to buy the dip and not panic), this is unsettling. From the beginning of the week, we will get more accurate data on what happened, the guilty parties, the consequences for them, and the victims (it might be volatile). &lt;br/&gt;&lt;br/&gt;
    </content>
    <updated>2025-10-13T11:40:48&#43;02:00</updated>
  </entry>

  <entry>
    <id>https://nostr.ae/nevent1qqsxqut3cl8rkktg42pqgky2wkvru7fj0wkx04jlrt866pmtxm6qttszypn0gl3aeljuj2qmgd4lftjy83yf857pk97w2qez87qy85alhhaj7rqgvdl</id>
    
      <title type="html">In the next couple of years, 24GB and even 32GB RAM on phones ...</title>
    
    <link rel="alternate" href="https://nostr.ae/nevent1qqsxqut3cl8rkktg42pqgky2wkvru7fj0wkx04jlrt866pmtxm6qttszypn0gl3aeljuj2qmgd4lftjy83yf857pk97w2qez87qy85alhhaj7rqgvdl" />
    <content type="html">
      In the next couple of years, 24GB and even 32GB RAM on phones will feel less &lt;br/&gt;&lt;br/&gt;
    </content>
    <updated>2025-10-13T08:00:51&#43;02:00</updated>
  </entry>

  <entry>
    <id>https://nostr.ae/nevent1qqszpvr3ss6y9guwaqnseqlhhv2rjn57adddvpz9uc3qg439pyzhanqzypn0gl3aeljuj2qmgd4lftjy83yf857pk97w2qez87qy85alhhaj7hzsglg</id>
    
      <title type="html">I use ControlD - Full Control</title>
    
    <link rel="alternate" href="https://nostr.ae/nevent1qqszpvr3ss6y9guwaqnseqlhhv2rjn57adddvpz9uc3qg439pyzhanqzypn0gl3aeljuj2qmgd4lftjy83yf857pk97w2qez87qy85alhhaj7hzsglg" />
    <content type="html">
      In reply to &lt;a href=&#39;/nevent1qqs0a33vsr5rxf0sf43kg248gzqj9q988v3w7meq0p6mq3v8dslfhxspr9mhxue69uhkummnw3exx6r9vd4jumt99aex2mrp0y8jhke9&#39;&gt;nevent1q…hke9&lt;/a&gt;&lt;br/&gt;_________________________&lt;br/&gt;&lt;br/&gt;I use ControlD - Full Control  &lt;br/&gt;&lt;br/&gt;
    </content>
    <updated>2025-10-12T15:30:13&#43;02:00</updated>
  </entry>

  <entry>
    <id>https://nostr.ae/nevent1qqswuuz5p6pzazzwey6hyesyq8s6xjajq23mlt3c37usl7lg6hryh6gzypn0gl3aeljuj2qmgd4lftjy83yf857pk97w2qez87qy85alhhaj7gqz8tl</id>
    
      <title type="html">🔄 REPOSTING FROM REDDIT 🚨 Post: Why centralised KYC ...</title>
    
    <link rel="alternate" href="https://nostr.ae/nevent1qqswuuz5p6pzazzwey6hyesyq8s6xjajq23mlt3c37usl7lg6hryh6gzypn0gl3aeljuj2qmgd4lftjy83yf857pk97w2qez87qy85alhhaj7gqz8tl" />
    <content type="html">
      🔄 REPOSTING FROM REDDIT&lt;br/&gt;&lt;br/&gt;&lt;br/&gt;🚨 Post:&lt;br/&gt;&lt;br/&gt;Why centralised KYC exchanges allow ZEC. Clarification on the current state of ZEC Trusted Setup in their production blockchain.&lt;br/&gt;&lt;br/&gt;&lt;br/&gt;I have conducted a small research with DeepSeek and real persons from r/zec involved, and the conclusion is the following:&lt;br/&gt;&lt;br/&gt;Indeed, ZEC production blockchain has been upgraded to the Halo2 cryptographic system that allows to gradually eliminate and fade out the dependence on the well known and pain famous Trusted Setup ceremony by systematic updates of the Universal Reference String (URS). Halo2 does theoretically allow any blockchain participant to update the URS by some procedure.&lt;br/&gt;&lt;br/&gt;But DE FACTO, the URS string generated in the Trusted Setup ceremony stays UNMODIFIED on the current production blockchain of ZEC.&lt;br/&gt;&lt;br/&gt;This fact signifies if just one of the ceremony participants has not wiped out his key, all the ZEC hidden transactions on the production blockchain still can be traced out.&lt;br/&gt;&lt;br/&gt;Furthermore, in ZEC network, no production blockchain participant can easily update the URS because it does require the whole ZEC network protocol upgrade used in the production blockchain.&lt;br/&gt;&lt;br/&gt;The decision on protocol upgrade can be made only by ZEC core developers in their Electric Coin Company (ECC). It is like a hard fork, thus, extremely epic operation, that involves into cooperation all the blockchain participants.&lt;br/&gt;&lt;br/&gt;So, if just one key from Trusted Setup has not been wiped out, all the hidden transactions on the ZEC production blockchain can be traced by 3rd party, namely FBI and other 3-letters agencies belong to government authorities.&lt;br/&gt;&lt;br/&gt;That’s why ZEC can be easily listed on virtually all KYC centralised exchanges: a dedicated group of people can trace all the hidden transactions because there exists a key that has not been properly wiped out.&lt;br/&gt;&lt;br/&gt;Note, at the methodological point of view, we have no duty to prove there exists a key that has not been wiped out, it is SUFFICIENT we can’t prove it HAS BEEN wiped out.&lt;br/&gt;&lt;br/&gt;So, being growing in listings on KYC centralised exchanges, the ZEC price is skyrocketing, what we do exactly observe.&lt;br/&gt;&lt;br/&gt;&lt;br/&gt;🚨 OP comments:&lt;br/&gt;&lt;br/&gt;1. Pegasus malware backed by government, etc etc.&lt;br/&gt;&lt;br/&gt;2. If the toxic waste for the production URS exists and is known to an adversary, then the privacy and integrity of the current ZCash production blockchain&amp;#39;s Orchard pool are broken:&lt;br/&gt;&lt;br/&gt;All the today-made hidden transactions can be gradually traced out.&lt;br/&gt;&lt;br/&gt;ZEC coins can be created from thin air and spent out.&lt;br/&gt;&lt;br/&gt;That’s exactly why Halo2 was introduced at all: it allows a gradual RECOVERY from the compromised state to the secure state by updating URS value in the new Trusted Setup from URS1 (proven compromised) to URS2 (considered as honest).&lt;br/&gt;&lt;br/&gt;In a nutshell: if ZEC core devs do share URS1 , URS2, etc with FBI, the total project is a fully devastating SCAM. Halo2 can’t save us in this situation.&lt;br/&gt;&lt;br/&gt;Unlike in Monero only open source code matters. Monero core devs CAN NOT share something with FBI to explore our transactions!&lt;br/&gt;&lt;br/&gt;Now you see how devastating is the world: ZEC is skyrocketing and Nobody cares IT IS NOT a privacy coin at all.&lt;br/&gt;&lt;br/&gt;Because, I repeat, at methodological point of view we have no duty to prove that URS value is not compromised.&lt;br/&gt;&lt;br/&gt;It is SUFFICIENT we can’t prove it IS NOT compromised (by FBI, etc).&lt;br/&gt;&lt;br/&gt;ZEC is a fatal and fundamental philosophical SCAM because we always MUST TRUST in ZEC network.&lt;br/&gt;&lt;br/&gt;Actually, ZEC is an ideal model for traditional KYC financial institutions where a dedicated group of people MUST know all your transaction history.&lt;br/&gt;&lt;br/&gt;That’s precisely why they meet KYC so easily, appearing on most centralised exchanges and their price is skyrocketing like Bitcoin price.&lt;br/&gt;&lt;br/&gt;But, while Bitcoin does declare it is NOT private , it is NOT a scam.&lt;br/&gt;&lt;br/&gt;But ZEC declares it is Private but actually it is NOT, so they simply directly, pedantically lie. So they are SCAM by definition.&lt;br/&gt;&lt;br/&gt;&lt;a href=&#34;https://www.reddit.com/r/Monero/comments/1o453e3/why_centralised_kyc_exchanges_allow_zec/&#34;&gt;https://www.reddit.com/r/Monero/comments/1o453e3/why_centralised_kyc_exchanges_allow_zec/&lt;/a&gt;  &lt;br/&gt;&lt;br/&gt;
    </content>
    <updated>2025-10-12T13:50:40&#43;02:00</updated>
  </entry>

  <entry>
    <id>https://nostr.ae/nevent1qqsqp7cqx5g5lr4vsl44hnxq67kg6nkefdcktgtrpdq47xxxarpg4pczypn0gl3aeljuj2qmgd4lftjy83yf857pk97w2qez87qy85alhhaj7azswa5</id>
    
      <title type="html">A programmer has revealed that his side project is “going for ...</title>
    
    <link rel="alternate" href="https://nostr.ae/nevent1qqsqp7cqx5g5lr4vsl44hnxq67kg6nkefdcktgtrpdq47xxxarpg4pczypn0gl3aeljuj2qmgd4lftjy83yf857pk97w2qez87qy85alhhaj7azswa5" />
    <content type="html">
      A programmer has revealed that his side project is “going for Satoshi’s wallet.&amp;#34; &lt;br/&gt;&lt;br/&gt;He has shared a post on Substack outlining plans to use group-theory math and optimized elliptic-curve code to try to crack the Bitcoin founder’s keys.&lt;br/&gt;&lt;br/&gt;&lt;a href=&#34;https://leetarxiv.substack.com/p/if-youre-smart-why-are-you-poor-elliptic&#34;&gt;https://leetarxiv.substack.com/p/if-youre-smart-why-are-you-poor-elliptic&lt;/a&gt;&lt;br/&gt;&lt;br/&gt;&lt;a href=&#34;https://www.reddit.com/r/hacking/comments/1nyr4x0/i_used_all_the_math_i_know_to_go_from_352_miilion/&#34;&gt;https://www.reddit.com/r/hacking/comments/1nyr4x0/i_used_all_the_math_i_know_to_go_from_352_miilion/&lt;/a&gt; &lt;br/&gt;&lt;br/&gt;
    </content>
    <updated>2025-10-06T15:41:52&#43;02:00</updated>
  </entry>

  <entry>
    <id>https://nostr.ae/nevent1qqsw0s7qzwjynh7frzn7pcrfw7ugndkmjyhcu0rtgwqcym62d4k7zlszypn0gl3aeljuj2qmgd4lftjy83yf857pk97w2qez87qy85alhhaj75xdxfq</id>
    
      <title type="html">The way to live is to create. Die empty. Get every idea out of ...</title>
    
    <link rel="alternate" href="https://nostr.ae/nevent1qqsw0s7qzwjynh7frzn7pcrfw7ugndkmjyhcu0rtgwqcym62d4k7zlszypn0gl3aeljuj2qmgd4lftjy83yf857pk97w2qez87qy85alhhaj75xdxfq" />
    <content type="html">
      The way to live is to create.&lt;br/&gt;Die empty.&lt;br/&gt;Get every idea out of your head and into reality.&lt;br/&gt;&lt;br/&gt;&lt;a href=&#34;https://sive.rs/htl23&#34;&gt;https://sive.rs/htl23&lt;/a&gt; &lt;br/&gt;&lt;br/&gt;
    </content>
    <updated>2025-10-06T12:14:03&#43;02:00</updated>
  </entry>

  <entry>
    <id>https://nostr.ae/nevent1qqszzsmjsjqv6rgjsvm2pqdluargkatfkct4ll209x7t6frt0cetpjszypn0gl3aeljuj2qmgd4lftjy83yf857pk97w2qez87qy85alhhaj7v42qa7</id>
    
      <title type="html">An important study on the effects of smartphones on our cognitive ...</title>
    
    <link rel="alternate" href="https://nostr.ae/nevent1qqszzsmjsjqv6rgjsvm2pqdluargkatfkct4ll209x7t6frt0cetpjszypn0gl3aeljuj2qmgd4lftjy83yf857pk97w2qez87qy85alhhaj7v42qa7" />
    <content type="html">
      An important study on the effects of smartphones on our cognitive ability.&lt;br/&gt;&lt;br/&gt;Brain Drain: The Mere Presence of One’s Own Smartphone Reduces Available Cognitive Capacity&lt;br/&gt;&lt;br/&gt;&amp;#34;The proliferation of smartphones represents a profound shift in the relationship between consumers and technology. Across human history, the vast majority of innovations have occupied a defined space in consumers’ lives; they have been constrained by the functions they perform and the locations they inhabit. Smartphones transcend these limitations. They are consumers’ constant companions, offering unprecedented connection to information, entertainment, and each other. They play an integral role in the lives of billions of consumers worldwide and, as a result, have vast potential to influence consumer welfare—both for better and for worse.&lt;br/&gt;&lt;br/&gt;The present research identifies a potentially costly side effect of the integration of smartphones into daily life: smartphone-induced “brain drain.” We provide evidence that the mere presence of consumers’ smartphones can adversely affect two measures of cognitive capacity—available working memory capacity and functional fluid intelligence—without interrupting sustained attention or increasing the frequency of phone-related thoughts. Consumers who were engaged with ongoing cognitive tasks were able to keep their phones not just out of their hands, but also out of their (conscious) minds; however, the mere presence of these devices left fewer attentional resources available for engaging with the task at hand.&lt;br/&gt;&lt;br/&gt;Further, we find that the effects of smartphone salience on available cognitive capacity are moderated by individual differences in the personal relevance of these devices (operationalized in terms of smartphone dependence); those who depend most on their devices suffer the most from their salience, and benefit the most from their absence. The role of dependence in determining mere presence effects suggests that similar cognitive costs would not be incurred by the presence of just any product, device, or even phone. We submit that few, if any, stimuli are both so personally relevant and so perpetually present as consumers’ own smartphones. However, we leave open the door for our insights to apply more broadly to future connective technologies that may become equally central to consumers’ lives as technology continues to advance.&amp;#34;&lt;br/&gt;&lt;br/&gt;&lt;a href=&#34;https://www.journals.uchicago.edu/doi/full/10.1086/691462&#34;&gt;https://www.journals.uchicago.edu/doi/full/10.1086/691462&lt;/a&gt;  &lt;br/&gt;&lt;br/&gt;
    </content>
    <updated>2025-10-06T11:56:21&#43;02:00</updated>
  </entry>

  <entry>
    <id>https://nostr.ae/nevent1qqs04td6qwxrkt4f7xaqushf90exrvn23umrq37j6u27etwqa0jjyzszypn0gl3aeljuj2qmgd4lftjy83yf857pk97w2qez87qy85alhhaj70vsadw</id>
    
      <title type="html">Satoshi himself can&amp;#39;t use Bitcoin. ...</title>
    
    <link rel="alternate" href="https://nostr.ae/nevent1qqs04td6qwxrkt4f7xaqushf90exrvn23umrq37j6u27etwqa0jjyzszypn0gl3aeljuj2qmgd4lftjy83yf857pk97w2qez87qy85alhhaj70vsadw" />
    <content type="html">
      Satoshi himself can&amp;#39;t use Bitcoin.&lt;br/&gt;&lt;br/&gt;&lt;a href=&#34;https://x.com/naval/status/1973630261876367364&#34;&gt;https://x.com/naval/status/1973630261876367364&lt;/a&gt;&lt;br/&gt;&lt;br/&gt;Satoshi owns ~1M #BTC, but he can&amp;#39;t use them.&lt;br/&gt;&lt;br/&gt;Why? Because every #Bitcoin transaction is public. The moment Satoshi moves a coin, the whole world knows.&lt;br/&gt;&lt;br/&gt;That&amp;#39;s the paradox of Bitcoin: scarcity without privacy.&lt;br/&gt;&lt;br/&gt;&lt;a href=&#34;https://x.com/yoshi_v1/status/1973643095418827061&#34;&gt;https://x.com/yoshi_v1/status/1973643095418827061&lt;/a&gt; &lt;br/&gt;&lt;br/&gt;
    </content>
    <updated>2025-10-02T09:04:52&#43;02:00</updated>
  </entry>

  <entry>
    <id>https://nostr.ae/nevent1qqspuwvrfzkr630k45fzw5yl9jxw8ac55sunr4h5hwvwrgl4m735u5gzypn0gl3aeljuj2qmgd4lftjy83yf857pk97w2qez87qy85alhhaj7t7jpr2</id>
    
      <title type="html">All drugs containing acetaminophen: OTC 1. Tylenol: The most ...</title>
    
    <link rel="alternate" href="https://nostr.ae/nevent1qqspuwvrfzkr630k45fzw5yl9jxw8ac55sunr4h5hwvwrgl4m735u5gzypn0gl3aeljuj2qmgd4lftjy83yf857pk97w2qez87qy85alhhaj7t7jpr2" />
    <content type="html">
      All drugs containing acetaminophen:&lt;br/&gt;&lt;br/&gt;OTC&lt;br/&gt;&lt;br/&gt;1. Tylenol: The most well-known brand for acetaminophen.&lt;br/&gt;&lt;br/&gt;2. Excedrin: Often used for headaches, it combines acetaminophen with aspirin and caffeine.&lt;br/&gt;&lt;br/&gt;3. NyQuil: A cold and flu medication that includes acetaminophen for pain relief.&lt;br/&gt;&lt;br/&gt;4. DayQuil: Similar to NyQuil but formulated for daytime use.&lt;br/&gt;&lt;br/&gt;5. Advil Dual Action: Combines ibuprofen and acetaminophen for enhanced pain relief.&lt;br/&gt;&lt;br/&gt;6. Alka-Seltzer Plus: Some formulations include acetaminophen for cold and flu relief.&lt;br/&gt;&lt;br/&gt;7. Midol: Often used for menstrual pain, some versions contain acetaminophen.&lt;br/&gt;&lt;br/&gt;8. Aspirin-Free Excedrin: Contains acetaminophen, caffeine, and other ingredients for headache relief.&lt;br/&gt;&lt;br/&gt;9. Bayer Back &amp;amp; Body: Combines acetaminophen with aspirin for back pain relief.&lt;br/&gt;&lt;br/&gt;10. Aleve-D: Some formulations may include acetaminophen for added pain relief.&lt;br/&gt;&lt;br/&gt;11. Tylenol Extra Strength: A higher dose formulation of acetaminophen for more severe pain.&lt;br/&gt;&lt;br/&gt;12. Advil PM: Some formulations may include acetaminophen along with diphenhydramine.&lt;br/&gt;&lt;br/&gt;Cold and Allergy Medications&lt;br/&gt;&lt;br/&gt;1. Zyrtec-D: Some formulations may include acetaminophen for allergy relief.&lt;br/&gt;&lt;br/&gt;2. Sudafed PE: Certain combinations may contain acetaminophen for cold symptoms.&lt;br/&gt;&lt;br/&gt;3. Robitussin Cough &#43; Chest Congestion DM: Some versions include acetaminophen for pain relief.&lt;br/&gt;&lt;br/&gt;4. Vicks DayQuil: A daytime cold and flu relief option that contains acetaminophen.&lt;br/&gt;&lt;br/&gt;5. Benadryl Allergy Plus Congestion: Certain formulations may contain acetaminophen for added relief.&lt;br/&gt;&lt;br/&gt;6. Claritin-D: Some versions may include acetaminophen for allergy relief.&lt;br/&gt;&lt;br/&gt;RX&lt;br/&gt;&lt;br/&gt;1. Percocet: A combination of oxycodone and acetaminophen used for pain relief.&lt;br/&gt;&lt;br/&gt;2. Tylenol with Codeine: Combines acetaminophen with codeine for more severe pain.&lt;br/&gt;&lt;br/&gt;3. Fioricet: Contains acetaminophen, butalbital, and caffeine, often prescribed for migraines.&lt;br/&gt;&lt;br/&gt;4. Vicodin: A combination of hydrocodone and acetaminophen, used for moderate to severe pain.&lt;br/&gt;&lt;br/&gt;5. Lortab: Another combination of hydrocodone and acetaminophen.&lt;br/&gt;&lt;br/&gt;6. Norco: Similar to Vicodin, it combines hydrocodone with acetaminophen.&lt;br/&gt;&lt;br/&gt;7. Roxicet: A combination of oxycodone and acetaminophen, used for pain management.&lt;br/&gt;&lt;br/&gt;8. Cocet: Combines acetaminophen with oxycodone for pain relief.&lt;br/&gt;&lt;br/&gt;9. Fentanyl Combination Products: Some formulations may combine fentanyl with acetaminophen for pain management.&lt;br/&gt;&lt;br/&gt;10. Lorcet: A combination of hydrocodone and acetaminophen.&lt;br/&gt;&lt;br/&gt;11. Percodan: Combines oxycodone with acetaminophen for pain management.&lt;br/&gt;&lt;br/&gt;12. Tylenol with Tramadol: A combination of acetaminophen and tramadol for moderate to severe pain.&lt;br/&gt;&lt;br/&gt;Combination Products&lt;br/&gt;&lt;br/&gt;1. Cold and Flu Formulations: Many products for cold and flu symptoms contain acetaminophen, such as Theraflu and Robitussin.&lt;br/&gt;&lt;br/&gt;2. Pain Relievers: Some multi-symptom pain relievers may include acetaminophen along with other active ingredients.&lt;br/&gt;&lt;br/&gt;3. Robitussin Multi-Symptom: Contains acetaminophen along with other ingredients for cough and cold relief.&lt;br/&gt;&lt;br/&gt;4. Theraflu: Various formulations include acetaminophen for symptom relief.&lt;br/&gt;&lt;br/&gt;5. Excedrin Tension Headache: Specifically formulated for tension headaches, containing acetaminophen.&lt;br/&gt;&lt;br/&gt;6. Mucinex: Some formulations include acetaminophen for cold and flu symptom relief.&lt;br/&gt;&lt;br/&gt;7. Coricidin HBP: Certain versions contain acetaminophen for cold symptoms, designed for those with high blood pressure.&lt;br/&gt;&lt;br/&gt;8. Sominex: Some formulations may include acetaminophen for sleep aid with pain relief.&lt;br/&gt;&lt;br/&gt;Pediatric&lt;br/&gt;&lt;br/&gt;1. Children&amp;#39;s Tylenol: Liquid formulations specifically designed for children.&lt;br/&gt;&lt;br/&gt;2. Infants&amp;#39; Tylenol: Liquid acetaminophen specifically designed for infants.&lt;br/&gt;&lt;br/&gt;3. Children&amp;#39;s Motrin: Some formulations may include acetaminophen alongside ibuprofen.&lt;br/&gt;&lt;br/&gt;4. Children&amp;#39;s Advil: Some formulations may include acetaminophen alongside ibuprofen.&lt;br/&gt;&lt;br/&gt;5. Pediatric Fever Reducers: Various brands offer liquid acetaminophen specifically for children. &lt;br/&gt;&lt;br/&gt;
    </content>
    <updated>2025-09-29T12:01:25&#43;02:00</updated>
  </entry>

  <entry>
    <id>https://nostr.ae/nevent1qqsq6x3gxr2rlrl227x06htq37ww7aw22l0kww22cnmu7xlnuruk40qzypn0gl3aeljuj2qmgd4lftjy83yf857pk97w2qez87qy85alhhaj7d22sv7</id>
    
      <title type="html">How to Track the People Tracking YOU ...</title>
    
    <link rel="alternate" href="https://nostr.ae/nevent1qqsq6x3gxr2rlrl227x06htq37ww7aw22l0kww22cnmu7xlnuruk40qzypn0gl3aeljuj2qmgd4lftjy83yf857pk97w2qez87qy85alhhaj7d22sv7" />
    <content type="html">
      How to Track the People Tracking YOU&lt;br/&gt;&lt;br/&gt;&lt;a href=&#34;https://www.youtube.com/watch?v=cjXp3bBd2h8&#34;&gt;https://www.youtube.com/watch?v=cjXp3bBd2h8&lt;/a&gt;&lt;br/&gt;&lt;br/&gt;Discover “Chasing Your Tail,” an open-source surveillance detection tool you can build with a Raspberry Pi. In this exclusive Black Hat interview, creator Matt explains how it tracks Wi-Fi, Bluetooth, and even tire sensors to spot if you’re being followed, then flips the script to map where your followers spend time. Learn the origins of this tool, from avoiding surprise visits to protecting informants and aiding search &amp;amp; rescue. We cover the tech stack (Kismet, Python, GPS integration), real-world success stories, and how you can set it up yourself for under $100. Perfect for security pros, privacy&lt;br/&gt;advocates, and tech enthusiasts.&lt;br/&gt;&lt;br/&gt;Chasing Your Tail (CYT)&lt;br/&gt;&lt;br/&gt;&lt;a href=&#34;https://github.com/ArgeliusLabs/Chasing-Your-Tail-NG&#34;&gt;https://github.com/ArgeliusLabs/Chasing-Your-Tail-NG&lt;/a&gt;&lt;br/&gt;&lt;br/&gt;A comprehensive WiFi probe request analyzer that monitors and tracks wireless devices by analyzing their probe requests. The system integrates with Kismet for packet capture and WiGLE API for SSID geolocation analysis, featuring advanced surveillance detection capabilities.&lt;br/&gt;&lt;br/&gt;&lt;br/&gt;Features:&lt;br/&gt;&lt;br/&gt;    Real-time Wi-Fi monitoring with Kismet integration&lt;br/&gt;    Advanced surveillance detection with persistence scoring&lt;br/&gt;    Automatic GPS integration - extracts coordinates from Bluetooth GPS via Kismet&lt;br/&gt;    GPS correlation and location clustering (100m threshold)&lt;br/&gt;    Spectacular KML visualization for Google Earth with professional styling and interactive content&lt;br/&gt;    Multi-format reporting - Markdown, HTML (with pandoc), and KML outputs&lt;br/&gt;    Time-window tracking (5, 10, 15, 20 minute windows)&lt;br/&gt;    WiGLE API integration for SSID geolocation&lt;br/&gt;    Multi-location tracking algorithms for detecting following behavior&lt;br/&gt;    Enhanced GUI interface with surveillance analysis button&lt;br/&gt;    Organized file structure with dedicated output directories&lt;br/&gt;    Comprehensive logging and analysis tools&lt;br/&gt;&lt;br/&gt;Requirements: &lt;br/&gt;&lt;br/&gt;    Python 3.6&#43;&lt;br/&gt;    Kismet wireless packet capture&lt;br/&gt;    Wi-Fi adapter supporting monitor mode&lt;br/&gt;    Linux-based system&lt;br/&gt;    WiGLE API key (optional) &lt;br/&gt;&lt;br/&gt;
    </content>
    <updated>2025-09-29T11:56:56&#43;02:00</updated>
  </entry>

  <entry>
    <id>https://nostr.ae/nevent1qqsyfs5jvtpuue25j2k6wju85faa54gfntz2as385dzn05nkm8c5yvszypn0gl3aeljuj2qmgd4lftjy83yf857pk97w2qez87qy85alhhaj79uxeac</id>
    
      <title type="html">Lifting the veil - how to test browsers for spyware ...</title>
    
    <link rel="alternate" href="https://nostr.ae/nevent1qqsyfs5jvtpuue25j2k6wju85faa54gfntz2as385dzn05nkm8c5yvszypn0gl3aeljuj2qmgd4lftjy83yf857pk97w2qez87qy85alhhaj79uxeac" />
    <content type="html">
      Lifting the veil - how to test browsers for spyware&lt;br/&gt;&lt;br/&gt;&lt;a href=&#34;https://digdeeper.club/articles/liftingtheveil.xhtml&#34;&gt;https://digdeeper.club/articles/liftingtheveil.xhtml&lt;/a&gt;&lt;br/&gt;&lt;br/&gt;Privacy is a key factor when choosing a web browser, but users often rely on assumptions or marketing claims. &lt;br/&gt;&lt;br/&gt;Mitmproxy offers a way to test a browser&amp;#39;s privacy by monitoring its connections. This tool acts as a local proxy server, allowing users to see all the connections a browser makes, including those made without user input. &lt;br/&gt;&lt;br/&gt;Mitmproxy can decrypt SSL traffic by adding a root certificate to the browser, enabling users to inspect all requests and responses. This process involves setting up mitmproxy, configuring the browser to use the proxy, and adding the certificate. Users can then observe the browser&amp;#39;s behavior, including unsolicited requests, to assess its privacy practices. &lt;br/&gt;&lt;br/&gt;Mitmproxy is particularly useful for identifying spyware in browsers, as it provides a clear view of all outgoing and incoming data. While it has limitations, such as not capturing initial requests made before the proxy is set up, it remains a powerful tool for privacy-conscious users. &lt;br/&gt;&lt;br/&gt;For a comprehensive spyware investigation, mitmproxy is recommended over Wireshark due to its simplicity and ability to isolate application traffic.&lt;br/&gt;&lt;br/&gt;&lt;a href=&#34;https://sizeof.cat/post/web-browser-telemetry-2025-edition/&#34;&gt;https://sizeof.cat/post/web-browser-telemetry-2025-edition/&lt;/a&gt; &lt;br/&gt;&lt;br/&gt;
    </content>
    <updated>2025-09-17T18:37:42&#43;02:00</updated>
  </entry>

  <entry>
    <id>https://nostr.ae/nevent1qqsp40cleuadpju45rwffdqu2sju5n9tvlnm5jxwxx8p0j65mf58djgzypn0gl3aeljuj2qmgd4lftjy83yf857pk97w2qez87qy85alhhaj7rl7m5f</id>
    
      <title type="html">https://altcha.org/ Free, open-source Captcha alternative ALTCHA ...</title>
    
    <link rel="alternate" href="https://nostr.ae/nevent1qqsp40cleuadpju45rwffdqu2sju5n9tvlnm5jxwxx8p0j65mf58djgzypn0gl3aeljuj2qmgd4lftjy83yf857pk97w2qez87qy85alhhaj7rl7m5f" />
    <content type="html">
      &lt;a href=&#34;https://altcha.org/&#34;&gt;https://altcha.org/&lt;/a&gt;&lt;br/&gt;&lt;br/&gt;Free, open-source Captcha alternative&lt;br/&gt;&lt;br/&gt;ALTCHA uses a proof-of-work mechanism to protect your website, APIs, and online services from spam and unwanted content.&lt;br/&gt;&lt;br/&gt;Unlike other solutions, ALTCHA is free, open-source and self-hosted, does not use cookies nor fingerprinting, does not track users, and is compliant with data-privacy regulations and accessible. &lt;br/&gt;&lt;br/&gt;
    </content>
    <updated>2025-09-16T08:15:44&#43;02:00</updated>
  </entry>

  <entry>
    <id>https://nostr.ae/nevent1qqsq7tcmktxl5qnmng2shxwz3qaj6z4agl9j40vkf6rr5w2hhxqsv0czypn0gl3aeljuj2qmgd4lftjy83yf857pk97w2qez87qy85alhhaj7p6xvfr</id>
    
      <title type="html">By the time most Indian investors realize the value of #BTC, ...</title>
    
    <link rel="alternate" href="https://nostr.ae/nevent1qqsq7tcmktxl5qnmng2shxwz3qaj6z4agl9j40vkf6rr5w2hhxqsv0czypn0gl3aeljuj2qmgd4lftjy83yf857pk97w2qez87qy85alhhaj7p6xvfr" />
    <content type="html">
      By the time most Indian investors realize the value of #BTC, #Bitcoin will be 1mn USD. &lt;br/&gt;&lt;br/&gt;There is comfort in the crowd. But, money is never made by following sheep mentality.  &lt;br/&gt;&lt;br/&gt;Not saying you should put you entire net worth into $BTC. &lt;br/&gt;&lt;br/&gt;But, maybe the naysayers should at least be open to studying the asset. &lt;br/&gt;&lt;br/&gt;
    </content>
    <updated>2025-09-15T14:15:52&#43;02:00</updated>
  </entry>

  <entry>
    <id>https://nostr.ae/nevent1qqsqpcvwfwwrsusr9xfw28ehr7murwns63u05tjmxts2nyr5zje7nwqzypn0gl3aeljuj2qmgd4lftjy83yf857pk97w2qez87qy85alhhaj7gfv3q5</id>
    
      <title type="html">🧫 PARASITE CLEANSE PROTOCOL (30–90 Days) A full-body ...</title>
    
    <link rel="alternate" href="https://nostr.ae/nevent1qqsqpcvwfwwrsusr9xfw28ehr7murwns63u05tjmxts2nyr5zje7nwqzypn0gl3aeljuj2qmgd4lftjy83yf857pk97w2qez87qy85alhhaj7gfv3q5" />
    <content type="html">
      🧫 PARASITE CLEANSE PROTOCOL (30–90 Days)&lt;br/&gt;&lt;br/&gt;A full-body strategy to eliminate parasites, break biofilms, support detox pathways, and heal the gut for long-term health. You will find a simplified version of this protocol in the comments. There is also a heavy metal detox guide on this page which is recommended to do first.&lt;br/&gt;&lt;br/&gt;✅ Step 1: PREP PHASE (7–10 Days)&lt;br/&gt;&lt;br/&gt;🎯 Goal: Prepare your body by opening detox and drainage pathways — like the liver, lymphatic system, and bowels.&lt;br/&gt;Why it matters: If you jump straight into killing parasites, your body may struggle to eliminate the toxins they release. This leads to &amp;#34;die-off&amp;#34; symptoms (see below).&lt;br/&gt;*Think of this like unclogging a sink before pouring anything else down the drain.&lt;br/&gt;&lt;br/&gt;🔓 Open Detox Pathways:&lt;br/&gt;- Castor Oil Packs (3–4x/week)&lt;br/&gt;Apply a warm castor oil-soaked cloth over your liver (upper right abdomen).&lt;br/&gt;Cover with plastic wrap and a heating pad for 30–60 minutes.&lt;br/&gt;This gently stimulates liver drainage, bile flow, and lymph movement.&lt;br/&gt;Great for constipation and hormonal balance, too.&lt;br/&gt;- Magnesium Citrate or Oxy-Magnesium (like Oxy-Powder)&lt;br/&gt;Helps you poop daily — non-negotiable during detox.&lt;br/&gt;If you’re constipated, waste and toxins get reabsorbed.&lt;br/&gt;Start low (200–300 mg) and increase to achieve 1–2 daily bowel movements.&lt;br/&gt;- Liver-Supportive Herbs&lt;br/&gt;Milk Thistle: Regenerates liver cells.&lt;br/&gt;Dandelion Root: Stimulates bile flow.&lt;br/&gt;Burdock: Gentle blood cleanser.&lt;br/&gt;You can also use a liver detox tincture (like Gaia Liver Cleanse or Herb Pharm Liver).&lt;br/&gt;- Lymphatic Movement&lt;br/&gt;Dry brushing: Use a soft brush on dry skin before showering — always brush toward the heart.&lt;br/&gt;Rebounding: Jumping on a mini trampoline moves lymph.&lt;br/&gt;Infrared sauna or red light therapy: Help sweat out toxins and boost circulation.&lt;br/&gt;💧 Daily Add-ons:&lt;br/&gt;- Apple Cider Vinegar (1–2 tsp in warm water before meals)&lt;br/&gt;Stimulates stomach acid and digestive enzymes.&lt;br/&gt;Aids in breaking down food and creating a hostile environment for parasites.&lt;br/&gt;- Herbal teas (1–2 cups/day):&lt;br/&gt;Dandelion root: Liver detox&lt;br/&gt;Nettle: Nourishing &#43; mineralizing&lt;br/&gt;Lemon-ginger: Gut soothing and cleansing&lt;br/&gt;- Water: 2–3 liters/day of clean, filtered water&lt;br/&gt;Add electrolytes or trace minerals to support cellular detox.&lt;br/&gt;⚔️ Step 2: ACTIVE PARASITE CLEANSE (30–60 Days)&lt;br/&gt;&lt;br/&gt;🎯 Goal: Kill parasites, break down their protective biofilms, flush out eggs, and mop up released toxins.&lt;br/&gt;&lt;br/&gt;⚠️ Warning: Don’t start killing before Step 1! You must prepare the body or risk overwhelming detox reactions.&lt;br/&gt;🧪 Choose 2–4 Core Anti-Parasitics&lt;br/&gt;Rotate them every 2–3 weeks to prevent adaptation. Many parasites develop resistance when exposed to the same herb for too long.&lt;br/&gt;&lt;br/&gt;🌿 Common anti-parasitics:&lt;br/&gt;&lt;br/&gt;- Mimosa Pudica Seed&lt;br/&gt;A sticky, fibrous seed that grabs parasites and biofilms in your intestines like a sponge.&lt;br/&gt;Take 2 capsules on an empty stomach in the morning.&lt;br/&gt;Expect to see stringy, rope-like material in your stool (often biofilms &#43; worms).&lt;br/&gt;- Black Walnut Hull&lt;br/&gt;Powerful against adult parasites, fungi, and bacteria.&lt;br/&gt;Use tincture or capsule.&lt;br/&gt;- Wormwood (Artemisia)&lt;br/&gt;Excellent for roundworms and threadworms.&lt;br/&gt;Often used in combination formulas (e.g., with black walnut and clove).&lt;br/&gt;- Clove&lt;br/&gt;Kills parasite eggs — crucial so the life cycle doesn’t restart.&lt;br/&gt;Use daily during cleanse.&lt;br/&gt;- Neem&lt;br/&gt;Multipurpose: antifungal, anti-worm, antibacterial.&lt;br/&gt;- Berberine, Olive Leaf, or Oregano Oil&lt;br/&gt;Target bacterial imbalances, yeast, and parasites.&lt;br/&gt;Berberine also supports gut repair and blood sugar regulation.&lt;br/&gt;- Diatomaceous Earth (Food Grade Only!)&lt;br/&gt;Fine silica powder that physically shreds parasites in the gut.&lt;br/&gt;Take 1 tsp in water on an empty stomach.&lt;br/&gt;Avoid inhaling powder — use caution.&lt;br/&gt;🔓 Biofilm Disruptors&lt;br/&gt;Parasites hide in protective “slime layers” (biofilms) in the gut and organs. Break these open to expose them.&lt;br/&gt;&lt;br/&gt;- NAC (N-Acetylcysteine): 600–1200 mg/day&lt;br/&gt;&lt;br/&gt;Powerful antioxidant &#43; biofilm disruptor.&lt;br/&gt;Supports liver by increasing glutathione.&lt;br/&gt;- Enzymes&lt;br/&gt;Use proteolytic enzyme blends that digest proteins:&lt;br/&gt;InterFase Plus, Biofilm Defense, SerraFlora, Lumbrokinase&lt;br/&gt;Best taken away from food, 1–2x/day&lt;br/&gt;- Optional: EDTA&lt;br/&gt;Chelator that pulls metals (often embedded in biofilms).&lt;br/&gt;Advanced; best with practitioner guidance.&lt;br/&gt;🧲 Don’t Skip the BINDERS&lt;br/&gt;When parasites die, they release ammonia, mold, heavy metals, and endotoxins. Binders catch them so your body can safely eliminate them through stool.&lt;br/&gt;&lt;br/&gt;Activated Charcoal, Bentonite Clay, or Chlorella&lt;br/&gt;Take 1–2x daily, away from food/supplements/meds by at least 1–2 hours.&lt;br/&gt;Charcoal = general toxin binder&lt;br/&gt;Clay = binds positively charged toxins&lt;br/&gt;Chlorella = heavy metals &#43; mold&lt;br/&gt;Gentler options: Pectin, fulvic/humic acids, ZeoBind (zeolite)&lt;br/&gt;🧬 Step 3: GUT REPAIR &amp;amp; IMMUNE REBALANCE (30&#43; Days)&lt;br/&gt;&lt;br/&gt;🎯 Goal: Once the parasites are gone, rebuild your gut lining and microbiome. Otherwise, new ones can take hold again.&lt;br/&gt;&lt;br/&gt;🛠 Heal the Gut Lining:&lt;br/&gt;- L-Glutamine: 5–10g/day — strengthens intestinal walls&lt;br/&gt;- Aloe Vera Juice: Soothes inflammation, supports healing&lt;br/&gt;- Collagen or Bone Broth: Rich in amino acids like glycine&lt;br/&gt;- Soothing Herbs:&lt;br/&gt;Slippery elm, marshmallow root, DGL licorice&lt;br/&gt;- Zinc carnosine, quercetin – reduce gut inflammation&lt;br/&gt;🌱 Rebuild Microbiome:&lt;br/&gt;- Spore-based probiotics (e.g. Just Thrive, MegaSporeBiotic)&lt;br/&gt;More stable than regular probiotics; survive stomach acid.&lt;br/&gt;- Saccharomyces boulardii&lt;br/&gt;Probiotic yeast that helps crowd out bad bugs.&lt;br/&gt;- Prebiotic fibers (start slow):&lt;br/&gt;PHGG, acacia fiber, green banana flour — feed the good bugs.&lt;br/&gt;🔁 CYCLIC DOSING: 4 DAYS ON / 3 DAYS OFF&lt;br/&gt;&lt;br/&gt;Why it works: Parasites have life cycles. Pulsing disrupts those cycles and allows your organs to catch up on detox.&lt;br/&gt;&lt;br/&gt;4 Days ON: Take your antiparasitics, enzymes, and biofilm disruptors&lt;br/&gt;3 Days OFF: Take only binders and drainage support — give your system a break&lt;br/&gt;Repeat for 4–6 weeks minimum (up to 90 days for chronic cases)&lt;br/&gt;🌕 FULL MOON INTENSIFICATION&lt;br/&gt;&lt;br/&gt;Why? Parasites become more active during the full moon — possibly due to lower melatonin and higher serotonin.&lt;br/&gt;&lt;br/&gt;From 3 days before to 3 days after full moon:&lt;br/&gt;- Increase antiparasitics by 25–50%&lt;br/&gt;- Increase binders, water, and electrolytes&lt;br/&gt;You may notice more symptoms — this is when many people pass the most.&lt;br/&gt;⚠️ DIE-OFF SYMPTOMS (Herxheimer Reactions)&lt;br/&gt;&lt;br/&gt;Common reactions as parasites and pathogens die off:&lt;br/&gt;&lt;br/&gt;- Headaches, fatigue, joint pain&lt;br/&gt;- Skin rashes, brain fog&lt;br/&gt;- Nausea, mood swings, worsened old symptoms&lt;br/&gt;How to reduce it:&lt;br/&gt;- Drink more water &#43; add minerals (sea salt, trace minerals)&lt;br/&gt;- Take binders religiously&lt;br/&gt;- Use detox tools:&lt;br/&gt;Epsom salt baths (draw out toxins via skin)&lt;br/&gt;Infrared sauna&lt;br/&gt;Dry brushing or rebounding&lt;br/&gt;Coffee enemas (for advanced users: clears bile &#43; toxins from liver/gut)&lt;br/&gt;If you feel awful, lower dosage or take a break. The goal is sustainable, steady progress — not suffering.&lt;br/&gt;&lt;br/&gt;🧪 OPTIONAL TESTING&lt;br/&gt;&lt;br/&gt;To confirm parasites or monitor healing:&lt;br/&gt;&lt;br/&gt;- GI-MAP or GI Effects: Advanced stool testing&lt;br/&gt;- OAT (Organic Acids Test): Shows fungal &#43; bacterial metabolites&lt;br/&gt;- Stool microscopy &#43; PCR (Doctor’s Data, Genova)&lt;br/&gt;- Blood tests:&lt;br/&gt;Eosinophils or Total IgE may rise during parasitic infections&lt;br/&gt;🧠 LIFESTYLE ADD-ONS&lt;br/&gt;&lt;br/&gt;Create an inner terrain where parasites can’t thrive:&lt;br/&gt;&lt;br/&gt;- Eliminate their food supply:&lt;br/&gt;Sugar, gluten, processed carbs, seed oils, dairy&lt;br/&gt;- Eat anti-parasitic foods daily:&lt;br/&gt;Raw garlic, pumpkin seeds, papaya seeds, raw carrots, beets, cilantro&lt;br/&gt;- Get sunlight and sleep (7–9 hours)&lt;br/&gt;- Reduce chronic stress – stress suppresses immune defense&lt;br/&gt;📦 RECOMMENDED CLEANSE KITS&lt;br/&gt;&lt;br/&gt;Save time and confusion with these well-designed, practitioner kits:&lt;br/&gt;&lt;br/&gt;CellCore Para Kit – Strong for chronic illness, mold, Lyme&lt;br/&gt;Microbe Formulas Protocol – Multi-phase system with drainage &#43; gut repair&lt;br/&gt;Dr. Clark Store Cleanse – Simple and affordable&lt;br/&gt;Mimosa Pudica &#43; Para 1/2/3 – For deeper parasite and toxin cleansing                                                                                &lt;br/&gt;&lt;br/&gt;
    </content>
    <updated>2025-09-11T08:18:30&#43;02:00</updated>
  </entry>

  <entry>
    <id>https://nostr.ae/nevent1qqsgwv5ej5665f2t79qhfcky4c7kzysmpphjsa8p7q62vm4vuqa92nqzypn0gl3aeljuj2qmgd4lftjy83yf857pk97w2qez87qy85alhhaj700xaze</id>
    
      <title type="html">ChatterUI - A simple app for LLMs ...</title>
    
    <link rel="alternate" href="https://nostr.ae/nevent1qqsgwv5ej5665f2t79qhfcky4c7kzysmpphjsa8p7q62vm4vuqa92nqzypn0gl3aeljuj2qmgd4lftjy83yf857pk97w2qez87qy85alhhaj700xaze" />
    <content type="html">
      ChatterUI - A simple app for LLMs&lt;br/&gt;&lt;br/&gt;&lt;a href=&#34;https://github.com/Vali-98/ChatterUI&#34;&gt;https://github.com/Vali-98/ChatterUI&lt;/a&gt;&lt;br/&gt;&lt;br/&gt;&lt;a href=&#34;https://t.me/chatterui&#34;&gt;https://t.me/chatterui&lt;/a&gt;&lt;br/&gt;&lt;br/&gt;ChatterUI is a native mobile frontend for LLMs.&lt;br/&gt;Run LLMs on device or connect to various commercial or open source APIs. ChatterUI aims to provide a mobile-friendly interface with fine-grained control over chat structuring.&lt;br/&gt;&lt;br/&gt;Features:&lt;br/&gt;&lt;br/&gt;Run LLMs on-device in Local Mode&lt;br/&gt;Connect to various APIs in Remote Mode&lt;br/&gt;Chat with characters. (Supports the Character Card v2 specification.)&lt;br/&gt;Create and manage multiple chats per character.&lt;br/&gt;Customize Sampler fields and Instruct formatting&lt;br/&gt;Integrates with your device’s text-to-speech (TTS) engine&lt;br/&gt;&lt;br/&gt;Usage:&lt;br/&gt;&lt;br/&gt;Download and install latest APK from the releases page.&lt;br/&gt;&lt;br/&gt;&lt;a href=&#34;https://github.com/Vali-98/ChatterUI/releases/latest&#34;&gt;https://github.com/Vali-98/ChatterUI/releases/latest&lt;/a&gt;&lt;br/&gt;&lt;br/&gt;iOS is Currently unavailable due to lacking iOS hardware for development&lt;br/&gt;&lt;br/&gt;Local Mode: &lt;br/&gt;&lt;br/&gt;ChatterUI uses a llama.cpp under the hood to run gguf files on device.&lt;br/&gt;&lt;br/&gt;&lt;a href=&#34;https://github.com/ggerganov/llama.cpp&#34;&gt;https://github.com/ggerganov/llama.cpp&lt;/a&gt;&lt;br/&gt;&lt;br/&gt;A custom adapter is used to integrate with react-native: cui-llama.rn&lt;br/&gt;&lt;br/&gt;&lt;a href=&#34;https://github.com/Vali-98/cui-llama.rn&#34;&gt;https://github.com/Vali-98/cui-llama.rn&lt;/a&gt;&lt;br/&gt;&lt;br/&gt;To use on-device inferencing, first enable Local Mode, then go to Models &amp;gt; Import Model / Use External Model and choose a gguf model that can fit on your device&amp;#39;s memory. The importing functions are as follows:&lt;br/&gt;Import Model: Copies the model file into ChatterUI, potentially speeding up startup time.&lt;br/&gt;Use External Model: Uses a model from your device storage directly, removing the need to copy large files into ChatterUI but with a slight delay in load times.&lt;br/&gt;After that, you can load the model and begin chatting!&lt;br/&gt;Note: For devices with Snapdragon 8 Gen 1 and above or Exynos 2200&#43;, it is recommended to use the Q4_0 quantization for optimized performance.&lt;br/&gt;&lt;br/&gt;Remote Mode:&lt;br/&gt;&lt;br/&gt;Remote Mode allows you to connect to a few common APIs from both commercial and open source projects.&lt;br/&gt;&lt;br/&gt;Open Source Backends:&lt;br/&gt;&lt;br/&gt;koboldcpp&lt;br/&gt;text-generation-webui&lt;br/&gt;Ollama&lt;br/&gt;&lt;br/&gt;Dedicated API:&lt;br/&gt;&lt;br/&gt;OpenAI&lt;br/&gt;Claude (with ability to use a proxy)&lt;br/&gt;Cohere&lt;br/&gt;Open Router&lt;br/&gt;Mancer&lt;br/&gt;AI Horde&lt;br/&gt;&lt;br/&gt;Generic backends:&lt;br/&gt;&lt;br/&gt;Generic Text Completions&lt;br/&gt;Generic Chat Completions&lt;br/&gt;These should be compliant with any Text Completion/Chat Completion backends such as Groq or Infermatic.&lt;br/&gt;&lt;br/&gt;Custom APIs:&lt;br/&gt;&lt;br/&gt;Is your API provider missing? ChatterUI allows you to define APIs using its template system.&lt;br/&gt;Read more about it here!&lt;br/&gt;&lt;br/&gt;&lt;a href=&#34;https://github.com/Vali-98/ChatterUI/discussions/126&#34;&gt;https://github.com/Vali-98/ChatterUI/discussions/126&lt;/a&gt; &lt;br/&gt;&lt;br/&gt;
    </content>
    <updated>2025-09-06T08:47:03&#43;02:00</updated>
  </entry>

  <entry>
    <id>https://nostr.ae/nevent1qqs9y3d00ez36jmmtz3y075prtw040fz8u6g83r27hfdvu9tdv8t2zgzypn0gl3aeljuj2qmgd4lftjy83yf857pk97w2qez87qy85alhhaj7jy8u7n</id>
    
      <title type="html">Maid - Mobile Artificial Intelligence Distribution Maid is a ...</title>
    
    <link rel="alternate" href="https://nostr.ae/nevent1qqs9y3d00ez36jmmtz3y075prtw040fz8u6g83r27hfdvu9tdv8t2zgzypn0gl3aeljuj2qmgd4lftjy83yf857pk97w2qez87qy85alhhaj7jy8u7n" />
    <content type="html">
      Maid - Mobile Artificial Intelligence Distribution&lt;br/&gt;&lt;br/&gt;Maid is a cross-platform free and an open-source application for interfacing with llama.cpp models locally, and remotely with Ollama, Mistral, Google Gemini and OpenAI models remotely. &lt;br/&gt;&lt;br/&gt;-Choose from A wide range of models that runs LOCALLY and access remote models via api key!&lt;br/&gt;-Text based output&lt;br/&gt;-Image Generation (Selected Models only)&lt;br/&gt;-No video or short clips generation yet&lt;br/&gt;-Voice generation on selected models (Not tested)&lt;br/&gt;-Setting model parameters&lt;br/&gt;-Setting system prompt (Making the model behave/generate output in a certain way).&lt;br/&gt;-And more.&lt;br/&gt;&lt;br/&gt;Get it on &lt;br/&gt;&lt;br/&gt;Github - &lt;a href=&#34;https://github.com/Mobile-Artificial-Intelligence/maid/releases/latest&#34;&gt;https://github.com/Mobile-Artificial-Intelligence/maid/releases/latest&lt;/a&gt;&lt;br/&gt;&lt;br/&gt;Fdroid - &lt;a href=&#34;https://f-droid.org/packages/com.danemadsen.maid/&#34;&gt;https://f-droid.org/packages/com.danemadsen.maid/&lt;/a&gt;&lt;br/&gt;&lt;br/&gt;Spystore - &lt;a href=&#34;https://play.google.com/store/apps/details?id=com.danemadsen.maid&#34;&gt;https://play.google.com/store/apps/details?id=com.danemadsen.maid&lt;/a&gt;&lt;br/&gt;&lt;br/&gt;*Don&amp;#39;t clear CACHE OF THE APP AND EXCLUDE IT FROM SYSTEM&amp;#39;S AUTO CACHE CLEANING as app stores everything in device cache* &lt;br/&gt;&lt;br/&gt;
    </content>
    <updated>2025-09-06T08:43:23&#43;02:00</updated>
  </entry>

  <entry>
    <id>https://nostr.ae/nevent1qqs9vs983nucyl94kg6gt3w3h3lkz74zrmszs0f9rg786kk4msle3mgzypn0gl3aeljuj2qmgd4lftjy83yf857pk97w2qez87qy85alhhaj7y3w4ac</id>
    
      <title type="html">WiFi signals can measure heart rate, no wearables needed The ...</title>
    
    <link rel="alternate" href="https://nostr.ae/nevent1qqs9vs983nucyl94kg6gt3w3h3lkz74zrmszs0f9rg786kk4msle3mgzypn0gl3aeljuj2qmgd4lftjy83yf857pk97w2qez87qy85alhhaj7y3w4ac" />
    <content type="html">
      WiFi signals can measure heart rate, no wearables needed&lt;br/&gt;&lt;br/&gt;The Pulse-F system enables highly accurate, clinical-level heart rate monitoring using ultra-low-cost WiFi devices, making it useful for low-resource settings.The system works with the person in various positions and from up to 10 feet away, demonstrating its versatility and robustness.Heart rate is a crucial health indicator, providing insights into physical activity, stress, anxiety, hydration levels, and more.Traditional heart rate measurement requires wearables, but the Pulse-F system offers a non-intrusive alternative using household WiFi devices.The technology was developed by engineers at the University of California, Santa Cruz, and demonstrated using low-cost WiFi devices like ESP32 chips ($5-$10) and Raspberry Pi chips ($30).The system combines WiFi devices with a machine learning algorithm to distinguish even the faintest signal variations caused by a human heartbeat.Experiments with 118 participants showed that after only five seconds of signal processing, heart rate could be measured with clinical-level accuracy.The Pulse-F system performed accurately regardless of the equipment&amp;#39;s position in the room or the participant&amp;#39;s posture, including sitting, standing, lying down, or walking.The researchers created their own dataset to train the machine learning algorithm, as no existing data for these patterns using an ESP32 device was available.Future research aims to extend the technology to detect breathing rate in addition to heart rate, which can be useful for detecting conditions like sleep apnea.&lt;br/&gt;&lt;br/&gt;&lt;a href=&#34;https://news.ucsc.edu/2025/09/pulse-fi-wifi-heart-rate/&#34;&gt;https://news.ucsc.edu/2025/09/pulse-fi-wifi-heart-rate/&lt;/a&gt;  &lt;br/&gt;&lt;br/&gt;
    </content>
    <updated>2025-09-06T08:41:44&#43;02:00</updated>
  </entry>

  <entry>
    <id>https://nostr.ae/nevent1qqstms6x2xcdlqx4l2rs5tje6e49l5y2rv3wylp0ukdnypyyehshhpszypn0gl3aeljuj2qmgd4lftjy83yf857pk97w2qez87qy85alhhaj7d9dw22</id>
    
      <title type="html">How to cleanse the body after vaccination. ...</title>
    
    <link rel="alternate" href="https://nostr.ae/nevent1qqstms6x2xcdlqx4l2rs5tje6e49l5y2rv3wylp0ukdnypyyehshhpszypn0gl3aeljuj2qmgd4lftjy83yf857pk97w2qez87qy85alhhaj7d9dw22" />
    <content type="html">
      How to cleanse the body after vaccination. &lt;br/&gt;&lt;br/&gt;&lt;br/&gt;&lt;br/&gt;&lt;video controls width=&#34;100%&#34; class=&#34;max-h-[90vh] bg-neutral-300 dark:bg-zinc-700&#34;&gt;&lt;source src=&#34;https://blossom.primal.net/b4e95fe36afd2ef643e944fa7424ca27e4f74aeaeae2e6590de817ad1d6d98dc.mp4&#34;&gt;&lt;/video&gt;
    </content>
    <updated>2025-09-06T08:28:28&#43;02:00</updated>
  </entry>

  <entry>
    <id>https://nostr.ae/nevent1qqst5dapfcqfjdmj7npcfjvva8thp9felxyme48ue7huyyud7f6c6lgzypn0gl3aeljuj2qmgd4lftjy83yf857pk97w2qez87qy85alhhaj7yv9wqh</id>
    
      <title type="html">Bootloader unlock wall of shame ...</title>
    
    <link rel="alternate" href="https://nostr.ae/nevent1qqst5dapfcqfjdmj7npcfjvva8thp9felxyme48ue7huyyud7f6c6lgzypn0gl3aeljuj2qmgd4lftjy83yf857pk97w2qez87qy85alhhaj7yv9wqh" />
    <content type="html">
      Bootloader unlock wall of shame&lt;br/&gt;&lt;br/&gt;&lt;a href=&#34;https://github.com/melontini/bootloader-unlock-wall-of-shame&#34;&gt;https://github.com/melontini/bootloader-unlock-wall-of-shame&lt;/a&gt;&lt;br/&gt;&lt;br/&gt;Updated guide, check it before buying a phone&lt;br/&gt;&lt;br/&gt;Over the past few years, a suspicious number of companies have started to &amp;#34;take care of your data&amp;#34;, aka block/strictly limit your ability to unlock the bootloader on your own devices.&lt;br/&gt;&lt;br/&gt;While this may not affect you directly, it sets a bad precedent. You never know what will get the axe next: Shizuku? ADB? Sideloading? &lt;br/&gt;&lt;br/&gt;I thought it might be a good idea to keep track of bad companies and workarounds. &lt;br/&gt;&lt;br/&gt;
    </content>
    <updated>2025-09-04T08:24:06&#43;02:00</updated>
  </entry>

  <entry>
    <id>https://nostr.ae/nevent1qqsd69rh5wrh43f0864ruxtealvnfl3wr5tk5ncxly88gvvrquq9ufgzypn0gl3aeljuj2qmgd4lftjy83yf857pk97w2qez87qy85alhhaj75g9ehx</id>
    
      <title type="html">All users who have Shizuku Detections or will install Shizuku in ...</title>
    
    <link rel="alternate" href="https://nostr.ae/nevent1qqsd69rh5wrh43f0864ruxtealvnfl3wr5tk5ncxly88gvvrquq9ufgzypn0gl3aeljuj2qmgd4lftjy83yf857pk97w2qez87qy85alhhaj75g9ehx" />
    <content type="html">
      All users who have Shizuku Detections or will install Shizuku in future!&lt;br/&gt;&lt;br/&gt;Use Shizuku from GitHub and not from Playstore! ⚠️&lt;br/&gt;&lt;br/&gt;People who have already installed:&lt;br/&gt;1. Goto /data/local/tmp&lt;br/&gt;2. Delete shizuku folder and shizuku_starter file.&lt;br/&gt;3. Uninstall Shizuku.&lt;br/&gt;4. Install from GitHub and grant root permission and provide shizuku perms for apps from Shizuku.&lt;br/&gt;&lt;br/&gt;Install latest from here: &lt;a href=&#34;https://github.com/RikkaApps/Shizuku/releases&#34;&gt;https://github.com/RikkaApps/Shizuku/releases&lt;/a&gt;   &lt;br/&gt;&lt;br/&gt;
    </content>
    <updated>2025-09-01T08:36:11&#43;02:00</updated>
  </entry>

  <entry>
    <id>https://nostr.ae/nevent1qqsgvxw256wtc3zw9cnvwthh3wc0sa0e9nsggf8q4l6lh68t60zz0jczypn0gl3aeljuj2qmgd4lftjy83yf857pk97w2qez87qy85alhhaj7ysp73a</id>
    
      <title type="html">Read 👇🏻 ...</title>
    
    <link rel="alternate" href="https://nostr.ae/nevent1qqsgvxw256wtc3zw9cnvwthh3wc0sa0e9nsggf8q4l6lh68t60zz0jczypn0gl3aeljuj2qmgd4lftjy83yf857pk97w2qez87qy85alhhaj7ysp73a" />
    <content type="html">
      Read 👇🏻 &lt;br/&gt;&lt;br/&gt;&lt;br/&gt;&lt;br/&gt; &lt;img src=&#34;https://blossom.primal.net/3f712aa380673a226a42bb8d97afbe1a569f7d5914e76e81bce2da86392938c3.jpg&#34;&gt; 
    </content>
    <updated>2025-09-01T08:25:46&#43;02:00</updated>
  </entry>

  <entry>
    <id>https://nostr.ae/nevent1qqs2l6590ptmunn6nm8s5vu6ssws5w4kfky69suhtnsw76agltknjdgzypn0gl3aeljuj2qmgd4lftjy83yf857pk97w2qez87qy85alhhaj7r4cqrj</id>
    
      <title type="html">If you ever see someone fudding about Wall Street taking over ...</title>
    
    <link rel="alternate" href="https://nostr.ae/nevent1qqs2l6590ptmunn6nm8s5vu6ssws5w4kfky69suhtnsw76agltknjdgzypn0gl3aeljuj2qmgd4lftjy83yf857pk97w2qez87qy85alhhaj7r4cqrj" />
    <content type="html">
      If you ever see someone fudding about Wall Street taking over #Bitcoin, always remember to refer to the distribution.&lt;br/&gt;&lt;br/&gt;&lt;a href=&#34;https://bitcointreasuries.net&#34;&gt;https://bitcointreasuries.net&lt;/a&gt; &lt;br/&gt;&lt;br/&gt;
    </content>
    <updated>2025-08-26T18:46:12&#43;02:00</updated>
  </entry>

  <entry>
    <id>https://nostr.ae/nevent1qqsderd5qe3sxh86uejmqks9wp7zgv9jyxsx3gchfa9a3e62nn2wklqzypn0gl3aeljuj2qmgd4lftjy83yf857pk97w2qez87qy85alhhaj70l9a73</id>
    
      <title type="html">📨 Thunderbird will have its own email Yes, the popular email ...</title>
    
    <link rel="alternate" href="https://nostr.ae/nevent1qqsderd5qe3sxh86uejmqks9wp7zgv9jyxsx3gchfa9a3e62nn2wklqzypn0gl3aeljuj2qmgd4lftjy83yf857pk97w2qez87qy85alhhaj70l9a73" />
    <content type="html">
      📨 Thunderbird will have its own email&lt;br/&gt;&lt;br/&gt;Yes, the popular email client has expansion plans and not a few, several things have been confirmed to be coming&lt;br/&gt;&lt;br/&gt;ThunderMail: Email service confirmed to have German infrastructure. It will also have custom domains: @thundermail.com and @tb.pro&lt;br/&gt;&lt;br/&gt;ThunderBird Appointment: Scheduling tool that will be integrated to insert appointment links directly into email, to support different meeting formats.&lt;br/&gt;&lt;br/&gt;Thunderbird Send: File storage and transfer service, encrypted and up to 500GB of storage.&lt;br/&gt;&lt;br/&gt;All this would be part of its &amp;#34;Thunderbird Pro&amp;#34; package and it is confirmed that its services are open source and self-hostable.&lt;br/&gt;&lt;br/&gt;The services are optional and do not affect the free functions of its Thunderbird client.&lt;br/&gt;&lt;br/&gt;&lt;a href=&#34;https://blog.thunderbird.net/2025/08/tbpro-august-2025-update/&#34;&gt;https://blog.thunderbird.net/2025/08/tbpro-august-2025-update/&lt;/a&gt;   &lt;br/&gt;&lt;br/&gt;
    </content>
    <updated>2025-08-22T19:04:56&#43;02:00</updated>
  </entry>

  <entry>
    <id>https://nostr.ae/nevent1qqsr3vyefmzfpzfgqqpnztq5dq20cqqknaafd6u9rcxa9phyn0n64pszypn0gl3aeljuj2qmgd4lftjy83yf857pk97w2qez87qy85alhhaj7x0mgxq</id>
    
      <title type="html">🧊 Hidden Firefox AI process consuming CPU resources? Firefox ...</title>
    
    <link rel="alternate" href="https://nostr.ae/nevent1qqsr3vyefmzfpzfgqqpnztq5dq20cqqknaafd6u9rcxa9phyn0n64pszypn0gl3aeljuj2qmgd4lftjy83yf857pk97w2qez87qy85alhhaj7x0mgxq" />
    <content type="html">
      🧊 Hidden Firefox AI process consuming CPU resources?&lt;br/&gt;&lt;br/&gt;Firefox browser users have encountered serious performance issues after the release of version 141. Initially, suspicion fell on the new &amp;#34;Smart Tab Grouping&amp;#34; feature using AI, but an official Mozilla investigation (Bug 1982278) showed that the abnormally high CPU load is caused by another component, namely the hidden pilot experiment &amp;#34;Semantic Search in History&amp;#34; (places.semanticHistory). The &amp;#34;Smart Tab Grouping&amp;#34; has nothing to do with this.&lt;br/&gt;&lt;br/&gt;Everything was fine just yesterday. Today I opened Firefox, and as a result, there were sharp spikes in CPU load and power consumption. My fans shouldn&amp;#39;t be this loud if I don&amp;#39;t have more than 15 tabs open.&lt;br/&gt;&lt;br/&gt;After unsuccessfully restarting Firefox, I opened the task manager and found that a process called &amp;#34;Inference&amp;#34; fluctuates from 0.05% to 130% CPU usage, which explains the spikes in CPU load and power consumption.&lt;br/&gt;&lt;br/&gt;Killing the process solves the fluctuation problem but causes Firefox to crash, requiring a restart.&lt;br/&gt;&lt;br/&gt;What is going on? This problem never existed until today.&lt;br/&gt;— users complain on Reddit.&lt;br/&gt;&lt;br/&gt;😱 Official Mozilla representatives have acknowledged the issue. The fix will be included in Firefox 143 (ctodea writes Target Milestone: → 143 Branch).&lt;br/&gt;&lt;br/&gt;💡For full control and disabling of all local AI services, advanced users should experiment with some settings:&lt;br/&gt;&lt;br/&gt;In about:config the parameter browser.ml.enable is set to false.&lt;br/&gt;*The browser.ml.enable parameter is the main, kind of master key to all under-the-hood machine learning in Firefox. Setting this value to false completely deactivates the local AI engine (Inference process), making it impossible for any dependent features to work, including smart tab groups and the chatbot.&lt;br/&gt;In about:config the parameter browser.tabs.groups.smart.enabled is set to false.&lt;br/&gt;*Disables only the smart tab grouping feature. This step is not a guaranteed solution to the CPU overload problem, as the main source of the error lies in another component. Meanwhile, the AI engine itself (Inference process) remains active for other potential tasks.&lt;br/&gt;In about:config the parameter browser.ml.chat.enabled is set to false.&lt;br/&gt;*The browser.ml.chat.enabled parameter is a direct system switch that controls the activation and visibility of the AI chat integrated into Firefox.&lt;br/&gt;&lt;br/&gt;Source: Telegram | Russian OSINT &lt;br/&gt;&lt;br/&gt;&lt;br/&gt;&lt;br/&gt; &lt;img src=&#34;https://blossom.primal.net/8f5110cf94692da92a234cd0a7cf0137b8da6633f21ecc66b2fec9b4f043e2db.jpg&#34;&gt; 
    </content>
    <updated>2025-08-18T08:35:42&#43;02:00</updated>
  </entry>

  <entry>
    <id>https://nostr.ae/nevent1qqsrppw7x8v8k0ykygkuve7dp7306p8543l2n9g5ddezxvcmatnns7gzypn0gl3aeljuj2qmgd4lftjy83yf857pk97w2qez87qy85alhhaj755lles</id>
    
      <title type="html">Many people have heard of onion routing in Tor and have a rough ...</title>
    
    <link rel="alternate" href="https://nostr.ae/nevent1qqsrppw7x8v8k0ykygkuve7dp7306p8543l2n9g5ddezxvcmatnns7gzypn0gl3aeljuj2qmgd4lftjy83yf857pk97w2qez87qy85alhhaj755lles" />
    <content type="html">
      Many people have heard of onion routing in Tor and have a rough idea of how it works. However, fewer people know about garlic routing.&lt;br/&gt;&lt;br/&gt;That&amp;#39;s why I decided to write a short note about what it is and how it works in I2P🚥&lt;br/&gt;&lt;br/&gt;&lt;br/&gt;How is a message sent? ✉️&lt;br/&gt;&lt;br/&gt;In I2P, your message travels through a tunnel—a chain of randomly picked computers (nodes) on the network. Each node only knows where to send the data next, not the message content, thanks to garlic encryption🧄.&lt;br/&gt;&lt;br/&gt;Your message is first encrypted for the recipient using end-to-end encryption. Asymmetric encryption🔐 uses a public key to encrypt and a private key to decrypt.&lt;br/&gt;&lt;br/&gt;How are encryption layers created?🔒&lt;br/&gt;&lt;br/&gt;Now the process of wrapping the message in layers begins. &lt;br/&gt;&lt;br/&gt;Imagine that you have a tunnel with three nodes: A, B, C. &lt;br/&gt;&lt;br/&gt;The encrypted message (already protected for the recipient) must be passed through these nodes so that each one knows only the next step. To do this, I2P creates encryption layers one for each node.&lt;br/&gt;Each layer is additional encryption with instructions for a specific node, such as “forward to node B” or “send to recipient.” &lt;br/&gt;&lt;br/&gt;It works like this: you encrypt the message with the public key of node C, adding the instruction “forward to node B.” You encrypt this packet again with the public key of node B with the instruction “forward to node A.” Then the entire packet is encrypted with the public key of node A with the instruction “send to recipient.”&lt;br/&gt;&lt;br/&gt;When you send the packet, it goes to node A. Node A opens its layer with its secret key, sees the instruction “forward to node B” and forwards the data. The data remains encrypted for other nodes. Node B opens its layer, sees the instruction “forward to node C” and forwards it. Node C opens the last layer, sees that it needs to be sent to the recipient, and does so. &lt;br/&gt;&lt;br/&gt;Each node only knows its own step and does not see the content of the message, its sender, or its recipient.&lt;br/&gt;&lt;br/&gt;Why is encryption called garlic?🧄&lt;br/&gt;&lt;br/&gt;Now, let&amp;#39;s talk about “garlic” encryption in detail. In I2P, your message is packed with others into one encrypted packet🗂, called garlic. This packet may include your message, others’ messages, and network data like tunnel commands⚙️&lt;br/&gt;&lt;br/&gt;All these messages are encrypted together, and each layer of encryption (for nodes A, B, C) covers the entire large packet, not each message individually.&lt;br/&gt;When node A opens its layer, it sees the instruction for the entire packet, such as “forward to node B,” and sends it on. It does not know how many messages are inside, whose they are, or where they are going. Node B does the same, opening its layer and forwarding the packet to node C. Node C, opening the last layer, can send the entire packet or parts of it (depending on the instruction) to the recipients, but it does not know how many messages are inside and to whom they are addressed. This makes it impossible to determine whose message is where, even when observing the network.&lt;br/&gt;&lt;br/&gt;Each message in the packet is protected by individual encryption for its recipient🔑 so that no one but the intended person can open it. &lt;br/&gt;&lt;br/&gt;The messages inside the packet are not explicitly separated they are sort of stuck together into one continuous encrypted piece of data. I2P can also add “garbage” data🗑 fake messages that masquerade as real ones but mean nothing.&lt;br/&gt;&lt;br/&gt;In addition, I2P mixes♻️ your packet with other data on the network and can add random delays during transmission. This makes it difficult to analyze traffic. Tunnels change every 10 minutes, and the nodes in them are selected again, so it is impossible to track the path.&lt;br/&gt;&lt;br/&gt;How does garlic encryption differ onion encryption?🧅&lt;br/&gt;&lt;br/&gt;In onion encryption, each message is encrypted separately and transmitted through its own chain of nodes. Garlic encryption not only wraps your message in layers of encryption, but also combines it with other messages and fake data into a single encrypted packet. &lt;br/&gt;&lt;br/&gt;
    </content>
    <updated>2025-08-12T08:22:44&#43;02:00</updated>
  </entry>

  <entry>
    <id>https://nostr.ae/nevent1qqsy070a4jq6herhf06q5dsjy0p5cunc6aavw2kg5xm6rwj48sscmrqzypn0gl3aeljuj2qmgd4lftjy83yf857pk97w2qez87qy85alhhaj70s0nzq</id>
    
      <title type="html">Link?</title>
    
    <link rel="alternate" href="https://nostr.ae/nevent1qqsy070a4jq6herhf06q5dsjy0p5cunc6aavw2kg5xm6rwj48sscmrqzypn0gl3aeljuj2qmgd4lftjy83yf857pk97w2qez87qy85alhhaj70s0nzq" />
    <content type="html">
      In reply to &lt;a href=&#39;/nevent1qqstje60nuvjqxnrcwey8w0wtgkts9ded4c2qf0gvzy64rfcvl609qg0kf5ch&#39;&gt;nevent1q…f5ch&lt;/a&gt;&lt;br/&gt;_________________________&lt;br/&gt;&lt;br/&gt;Link?  &lt;br/&gt;&lt;br/&gt;
    </content>
    <updated>2025-08-08T08:07:54&#43;02:00</updated>
  </entry>

  <entry>
    <id>https://nostr.ae/nevent1qqsg58a8y6y4ktk6xyw36fjsgmaw5vcuvl4e84ma5sms5l9g76yjy3qzypn0gl3aeljuj2qmgd4lftjy83yf857pk97w2qez87qy85alhhaj7a0sgqr</id>
    
      <title type="html">Nextcloud vs. CryptPad Which Privacy-First Collaboration Tool is ...</title>
    
    <link rel="alternate" href="https://nostr.ae/nevent1qqsg58a8y6y4ktk6xyw36fjsgmaw5vcuvl4e84ma5sms5l9g76yjy3qzypn0gl3aeljuj2qmgd4lftjy83yf857pk97w2qez87qy85alhhaj7a0sgqr" />
    <content type="html">
      Nextcloud vs. CryptPad&lt;br/&gt;&lt;br/&gt;Which Privacy-First Collaboration Tool is Right for You?&lt;br/&gt;&lt;br/&gt;&lt;a href=&#34;https://itsfoss.com/nextcloud-vs-cryptpad/&#34;&gt;https://itsfoss.com/nextcloud-vs-cryptpad/&lt;/a&gt;  &lt;br/&gt;&lt;br/&gt;
    </content>
    <updated>2025-08-05T17:54:35&#43;02:00</updated>
  </entry>

  <entry>
    <id>https://nostr.ae/nevent1qqs9luavcm747y56nelss8jq5uk3dva9zkxwmkufjzlxkmt9r8n8jrczypn0gl3aeljuj2qmgd4lftjy83yf857pk97w2qez87qy85alhhaj77x64qu</id>
    
      <title type="html">Trust Score: 87 ...</title>
    
    <link rel="alternate" href="https://nostr.ae/nevent1qqs9luavcm747y56nelss8jq5uk3dva9zkxwmkufjzlxkmt9r8n8jrczypn0gl3aeljuj2qmgd4lftjy83yf857pk97w2qez87qy85alhhaj77x64qu" />
    <content type="html">
      Trust Score: 87&lt;br/&gt;&lt;br/&gt;&lt;a href=&#34;https://profilestr.com/profile/npub1vm68u0w0uhyjsx6rd062u3pufzfa8sd30njsxg3lsppa80aalvhs8gsrrc&#34;&gt;https://profilestr.com/profile/npub1vm68u0w0uhyjsx6rd062u3pufzfa8sd30njsxg3lsppa80aalvhs8gsrrc&lt;/a&gt;  &lt;br/&gt;&lt;br/&gt;
    </content>
    <updated>2025-08-04T08:15:43&#43;02:00</updated>
  </entry>

  <entry>
    <id>https://nostr.ae/nevent1qqs0cjy0wd9g8mu6020f396rdzc3gqzwaya553z0a4zauz8m4550wwgzypn0gl3aeljuj2qmgd4lftjy83yf857pk97w2qez87qy85alhhaj7h2sy22</id>
    
      <title type="html">Interesting thread! ChatGPT quietly scrubbed today nearly 50,000 ...</title>
    
    <link rel="alternate" href="https://nostr.ae/nevent1qqs0cjy0wd9g8mu6020f396rdzc3gqzwaya553z0a4zauz8m4550wwgzypn0gl3aeljuj2qmgd4lftjy83yf857pk97w2qez87qy85alhhaj7h2sy22" />
    <content type="html">
      Interesting thread! &lt;br/&gt;&lt;br/&gt;ChatGPT quietly scrubbed today nearly 50,000 shared conversations from Google&amp;#39;s index.&lt;br/&gt;&lt;br/&gt;&lt;a href=&#34;https://fixupx.com/henkvaness/status/1951252284953763844&#34;&gt;https://fixupx.com/henkvaness/status/1951252284953763844&lt;/a&gt;&lt;br/&gt;&lt;br/&gt;&lt;a href=&#34;https://nitter.poast.org/henkvaness/status/1951252284953763844&#34;&gt;https://nitter.poast.org/henkvaness/status/1951252284953763844&lt;/a&gt;&lt;br/&gt;&lt;br/&gt;ChatGPT quietly scrubbed today nearly 50,000 shared conversations from Google&amp;#39;s index after our investigation. They thought they&amp;#39;d solved the problem. They were wrong. (1/5)&lt;br/&gt;&lt;br/&gt;A new Digital Digging investigation, conducted with @ osint77760, has uncovered 110,000 ChatGPT conversations preserved in &lt;a href=&#34;http://Archive.org&amp;#39;s&#34;&gt;http://Archive.org&amp;#39;s&lt;/a&gt; Wayback Machine—a digital time capsule OpenAI can&amp;#39;t touch. (2/5)&lt;br/&gt;&lt;br/&gt;@ osint77760 While OpenAI scrambled to de-index conversations from Google, they forgot the internet&amp;#39;s most basic rule—nothing truly disappears. &lt;a href=&#34;http://Archive.org&#34;&gt;http://Archive.org&lt;/a&gt; had already captured everything. (3/5)&lt;br/&gt;&lt;br/&gt;@ osint77760 In one particularly damning conversation, an Italian-speaking lawyer for a multinational energy corporation laid bare their strategy to displace indigenous Amazonian communities. (4/5)&lt;br/&gt;&lt;br/&gt;@ osint77760 Read the full story here &lt;br/&gt;&lt;br/&gt;&lt;a href=&#34;https://www.digitaldigging.org/p/chatgpt-confessions-gone-they-are&#34;&gt;https://www.digitaldigging.org/p/chatgpt-confessions-gone-they-are&lt;/a&gt;  &lt;br/&gt;&lt;br/&gt;
    </content>
    <updated>2025-08-02T08:29:31&#43;02:00</updated>
  </entry>

  <entry>
    <id>https://nostr.ae/nevent1qqsygt0msygkm8l0nxkh5th5ufk82ukamdag20y42p375gv6ygr4emgzypn0gl3aeljuj2qmgd4lftjy83yf857pk97w2qez87qy85alhhaj7jvr698</id>
    
      <title type="html">Proton Mail https://www.cnbcevents.com/wef2024/ ...</title>
    
    <link rel="alternate" href="https://nostr.ae/nevent1qqsygt0msygkm8l0nxkh5th5ufk82ukamdag20y42p375gv6ygr4emgzypn0gl3aeljuj2qmgd4lftjy83yf857pk97w2qez87qy85alhhaj7jvr698" />
    <content type="html">
      Proton Mail&lt;br/&gt;&lt;br/&gt;&lt;a href=&#34;https://www.cnbcevents.com/wef2024/&#34;&gt;https://www.cnbcevents.com/wef2024/&lt;/a&gt;&lt;br/&gt;&lt;br/&gt;&lt;a href=&#34;https://intelod.net/reports/proton-mail/&#34;&gt;https://intelod.net/reports/proton-mail/&lt;/a&gt;&lt;br/&gt;&lt;br/&gt;&lt;a href=&#34;https://digdeeper.love/articles/email.xhtml#protonmail&#34;&gt;https://digdeeper.love/articles/email.xhtml#protonmail&lt;/a&gt;  &lt;br/&gt;&lt;br/&gt;
    </content>
    <updated>2025-08-01T09:21:38&#43;02:00</updated>
  </entry>

  <entry>
    <id>https://nostr.ae/nevent1qqs09snwckv39uejmqh2aj9a8sst6p7wmm0plckum20zw66zpmqlkcqzypn0gl3aeljuj2qmgd4lftjy83yf857pk97w2qez87qy85alhhaj7exsy85</id>
    
      <title type="html">If anyone is looking for a new search engine with good privacy, ...</title>
    
    <link rel="alternate" href="https://nostr.ae/nevent1qqs09snwckv39uejmqh2aj9a8sst6p7wmm0plckum20zw66zpmqlkcqzypn0gl3aeljuj2qmgd4lftjy83yf857pk97w2qez87qy85alhhaj7exsy85" />
    <content type="html">
      If anyone is looking for a new search engine with good privacy, have a look here and find one of your choice. (I&amp;#39;m using Disroot BTW)&lt;br/&gt;&lt;br/&gt;And have a look in the settings (wheel, upper right side). There are nice options.&lt;br/&gt;&lt;br/&gt;&lt;a href=&#34;https://searx.space/&#34;&gt;https://searx.space/&lt;/a&gt;  &lt;br/&gt;&lt;br/&gt;
    </content>
    <updated>2025-07-31T08:21:42&#43;02:00</updated>
  </entry>

  <entry>
    <id>https://nostr.ae/nevent1qqs83f76pdw0vje0xg2n3jdzn07lz3df0vp8y7l7vmf2nf43v7333kgzypn0gl3aeljuj2qmgd4lftjy83yf857pk97w2qez87qy85alhhaj75k63q3</id>
    
      <title type="html">The intuitive introvert sees too much. This archetype is so rare, ...</title>
    
    <link rel="alternate" href="https://nostr.ae/nevent1qqs83f76pdw0vje0xg2n3jdzn07lz3df0vp8y7l7vmf2nf43v7333kgzypn0gl3aeljuj2qmgd4lftjy83yf857pk97w2qez87qy85alhhaj75k63q3" />
    <content type="html">
      The intuitive introvert sees too much.&lt;br/&gt;This archetype is so rare, even Jung found it challenging to define. In his words:&lt;br/&gt;&lt;br/&gt;“Lives in a world that is only indirectly accessible to others… immersed in symbolic content, archetypes, and images which may seem foreign or irrational to most.”&lt;br/&gt;&lt;br/&gt;They don’t just observe life, they decode it.&lt;br/&gt;While others look at what is, they feel what’s becoming.&lt;br/&gt;This depth is a gift, but it often feels like a burden, because when you see beyond the veil, it’s hard to unsee. &lt;br/&gt;&lt;br/&gt;
    </content>
    <updated>2025-07-31T07:49:52&#43;02:00</updated>
  </entry>

  <entry>
    <id>https://nostr.ae/nevent1qqsysv23eceaa3dtk30xav74j48vztju7klkv50w75zw85yv0ctx4kqzypn0gl3aeljuj2qmgd4lftjy83yf857pk97w2qez87qy85alhhaj7jd3jy0</id>
    
      <title type="html">Weekly feed of 140&#43; Security Blogs https://securityblogs.xyz/</title>
    
    <link rel="alternate" href="https://nostr.ae/nevent1qqsysv23eceaa3dtk30xav74j48vztju7klkv50w75zw85yv0ctx4kqzypn0gl3aeljuj2qmgd4lftjy83yf857pk97w2qez87qy85alhhaj7jd3jy0" />
    <content type="html">
      Weekly feed of 140&#43; Security Blogs&lt;br/&gt;&lt;br/&gt;&lt;a href=&#34;https://securityblogs.xyz/&#34;&gt;https://securityblogs.xyz/&lt;/a&gt; &lt;br/&gt;&lt;br/&gt;
    </content>
    <updated>2025-07-29T18:31:09&#43;02:00</updated>
  </entry>

  <entry>
    <id>https://nostr.ae/nevent1qqstrhm5ka4265aa9herkhj0sg3fmclvsfpyfajfgj3eq544296xtmczypn0gl3aeljuj2qmgd4lftjy83yf857pk97w2qez87qy85alhhaj7jnzf4r</id>
    
      <title type="html">Did you ever wonder how QR codes work? Reading QR codes without a ...</title>
    
    <link rel="alternate" href="https://nostr.ae/nevent1qqstrhm5ka4265aa9herkhj0sg3fmclvsfpyfajfgj3eq544296xtmczypn0gl3aeljuj2qmgd4lftjy83yf857pk97w2qez87qy85alhhaj7jnzf4r" />
    <content type="html">
      Did you ever wonder how QR codes work?&lt;br/&gt;&lt;br/&gt;Reading QR codes without a computer: &lt;a href=&#34;https://qr.blinry.org/&#34;&gt;https://qr.blinry.org/&lt;/a&gt; &lt;br/&gt;&lt;br/&gt;
    </content>
    <updated>2025-07-28T08:25:10&#43;02:00</updated>
  </entry>

  <entry>
    <id>https://nostr.ae/nevent1qqspva3llwzj6nnaecnu9jqkp8dypndra7xqnvldjludquwu486gklczypn0gl3aeljuj2qmgd4lftjy83yf857pk97w2qez87qy85alhhaj7aarlyc</id>
    
      <title type="html">Investigate phishing emails ...</title>
    
    <link rel="alternate" href="https://nostr.ae/nevent1qqspva3llwzj6nnaecnu9jqkp8dypndra7xqnvldjludquwu486gklczypn0gl3aeljuj2qmgd4lftjy83yf857pk97w2qez87qy85alhhaj7aarlyc" />
    <content type="html">
      Investigate phishing emails&lt;br/&gt;&lt;br/&gt;&lt;a href=&#34;https://chatgpt.com/share/6884ea26-4e8c-8000-bd78-3b9d9b75be83&#34;&gt;https://chatgpt.com/share/6884ea26-4e8c-8000-bd78-3b9d9b75be83&lt;/a&gt; &lt;br/&gt;&lt;br/&gt;
    </content>
    <updated>2025-07-27T18:11:01&#43;02:00</updated>
  </entry>

  <entry>
    <id>https://nostr.ae/nevent1qqszq8kxkhwnl0nn8rjzz09y9lvyyh6jtvhajyvt480xjlrd3zs7k2qzypn0gl3aeljuj2qmgd4lftjy83yf857pk97w2qez87qy85alhhaj79t677q</id>
    
      <title type="html">EU age verification app to ban any Android system not licensed by ...</title>
    
    <link rel="alternate" href="https://nostr.ae/nevent1qqszq8kxkhwnl0nn8rjzz09y9lvyyh6jtvhajyvt480xjlrd3zs7k2qzypn0gl3aeljuj2qmgd4lftjy83yf857pk97w2qez87qy85alhhaj79t677q" />
    <content type="html">
      EU age verification app to ban any Android system not licensed by Google&lt;br/&gt;&lt;br/&gt;Reddit: &lt;a href=&#34;https://www.reddit.com/r/BuyFromEU/comments/1mah79o/eu_age_verification_app_to_ban_any_android_system/&#34;&gt;https://www.reddit.com/r/BuyFromEU/comments/1mah79o/eu_age_verification_app_to_ban_any_android_system/&lt;/a&gt; &lt;br/&gt;&lt;br/&gt;The EU is currently developing a whitelabel app to perform privacy-preserving (at least in theory) age verification to be adopted and personalized in the coming months by member states. The app is open source and available here: &lt;a href=&#34;https://github.com/eu-digital-identity-wallet/av-app-android-wallet-ui&#34;&gt;https://github.com/eu-digital-identity-wallet/av-app-android-wallet-ui&lt;/a&gt;.&lt;br/&gt;&lt;br/&gt;Problem is, the app is planning to include remote attestation feature to verify the integrity of the app: &lt;a href=&#34;https://github.com/eu-digital-identity-wallet/av-app-android-wallet-ui?tab=readme-ov-file#disclaimer&#34;&gt;https://github.com/eu-digital-identity-wallet/av-app-android-wallet-ui?tab=readme-ov-file#disclaimer&lt;/a&gt;. This is supposed to provide assurance to the age verification service that the app being used is authentic and running on a genuine operating system. Genuine in the case of Android means:&lt;br/&gt;&lt;br/&gt;• The operating system was licensed by Google&lt;br/&gt;• The app was downloaded from the Play Store (thus requiring a Google account)&lt;br/&gt;• Device security checks have passed&lt;br/&gt;&lt;br/&gt;While there is value to verify device security, this strongly ties the app to many Google properties and services, because those checks won&amp;#39;t pass on an aftermarket Android OS, even those which increase security significantly like GrapheneOS, because the app plans to use Google &amp;#34;Play Integrity&amp;#34;, which only allows Google licensed systems instead of the standard Android attestation feature to verify systems.&lt;br/&gt;&lt;br/&gt;This also means that even though you can compile the app, you won&amp;#39;t be able to use it, because it won&amp;#39;t come from the Play Store and thus the age verification service will reject it.&lt;br/&gt;&lt;br/&gt;The issue has been raised here &lt;a href=&#34;https://github.com/eu-digital-identity-wallet/av-app-android-wallet-ui/issues/10&#34;&gt;https://github.com/eu-digital-identity-wallet/av-app-android-wallet-ui/issues/10&lt;/a&gt; but no response from team members as of now.&lt;br/&gt;&lt;br/&gt;In short: You can only be a full citizen of the EU if you accept the ToS from Google. &lt;br/&gt;&lt;br/&gt;
    </content>
    <updated>2025-07-27T18:07:00&#43;02:00</updated>
  </entry>

  <entry>
    <id>https://nostr.ae/nevent1qqsgjrj4wy2qqhdfmgfkfy8s8m7749cwx7qsp558zrxx2w958z7uxnqzypn0gl3aeljuj2qmgd4lftjy83yf857pk97w2qez87qy85alhhaj7c5v9uk</id>
    
      <title type="html">Do not download the app, use the website What is it that the ...</title>
    
    <link rel="alternate" href="https://nostr.ae/nevent1qqsgjrj4wy2qqhdfmgfkfy8s8m7749cwx7qsp558zrxx2w958z7uxnqzypn0gl3aeljuj2qmgd4lftjy83yf857pk97w2qez87qy85alhhaj7c5v9uk" />
    <content type="html">
      Do not download the app, use the website&lt;br/&gt;&lt;br/&gt;What is it that the browser can&amp;#39;t do?&lt;br/&gt;&lt;br/&gt;The 2010s was the Wild West of the mobile world. &amp;#34;Mobile-first&amp;#34; was the buzzword, much like &amp;#34;AI-first&amp;#34; is today. Every company, from the biggest social media giants to your local pizza parlor, seemed to be pestering you to download their app. There was a genuine hype train, and everyone was on board. The apps, frankly, were always mediocre, and a far cry from the full functionality of their website counterparts. But the message was clear. If you weren&amp;#39;t on mobile, you were falling behind.&lt;br/&gt;&lt;br/&gt;Fast forward to 2025, and that hype hasn&amp;#39;t entirely faded. In fact, it&amp;#39;s evolved into something a little more… persistent. If you&amp;#39;ve ever opened Reddit, LinkedIn, Pinterest, or practically any popular service on your phone&amp;#39;s web browser, you&amp;#39;ve likely encountered it. A relentless push to download their app. They use every dark pattern in the book, subtly nudging you, sometimes even tricking you, into clicking that &amp;#34;Get the App&amp;#34; button. It feels inevitable, doesn&amp;#39;t it? Like you&amp;#39;re constantly fighting against the current.&lt;br/&gt;&lt;br/&gt;But if you&amp;#39;re already a regular user, happily browsing their service through your phone&amp;#39;s web browser, why are they still so desperate for you to switch to the app?&lt;br/&gt;&lt;br/&gt;• Beyond the Hype: The Real Reasons Companies Want You on Their App&lt;br/&gt;&lt;br/&gt;The answer, in short, is data. A lot of it. And access. A whole lot more of that too.&lt;br/&gt;&lt;br/&gt;Think about it this way. What can a website on your browser really get from you? Unless you manually upload your contact information, or there&amp;#39;s a serious security vulnerability, a website&amp;#39;s access to your phone&amp;#39;s deeper functions is quite limited.&lt;br/&gt;&lt;br/&gt;Apps, on the other hand, are a different beast entirely. They are designed to integrate much more deeply with your device. When you download an app and want to use a particular feature, you&amp;#39;re often prompted to grant various permissions. And let&amp;#39;s be honest, how many of us meticulously read through every single permission pop-up? Most of the time, we just tap &amp;#34;Allow&amp;#34; to get to what we want to do.&lt;br/&gt;&lt;br/&gt;This seemingly small action can grant companies a treasure trove of information and control:&lt;br/&gt;&lt;br/&gt;&lt;br/&gt;- Your Contacts: Want to find friends on the app? Grant access to your contacts. Just like that, your entire network might be uploaded.&lt;br/&gt;&lt;br/&gt;- Location Tracking: GPS and even your phone&amp;#39;s accelerometer can be used to track your precise movements and identify patterns in your behavior. Websites can try to estimate your location, but it&amp;#39;s far less precise and requires explicit permission each time.&lt;br/&gt;&lt;br/&gt;- Microphone Access: Some apps can even record audio.&lt;br/&gt;&lt;br/&gt;- Installed Apps: Yes, apps can often detect what other applications you have installed on your phone. This information can be used to build a more comprehensive profile of you and your interests.&lt;br/&gt;&lt;br/&gt;All of this data extraction and deeper device interaction is significantly more difficult, if not outright impossible, for a website running in your browser. The web browser, in its own right, is a powerful and increasingly capable operating system. It can play video and audio, support WebGL for advanced graphics, and even has USB support. Most companies aren&amp;#39;t even scratching the surface of what&amp;#39;s possible with a modern web browser. Their primary motivation for pushing the app, more often than not, seems to boil down to gaining more access to your personal data and behavior.&lt;br/&gt;&lt;br/&gt;• The Unseen Cost of Convenience&lt;br/&gt;&lt;br/&gt;Even if you&amp;#39;re not particularly &amp;#34;paranoid&amp;#34; about your data, it&amp;#39;s worth asking: what can they possibly want to do in their app that they can&amp;#39;t already do in the browser? Often, the answer is nothing that truly benefits you more. The perceived &amp;#34;convenience&amp;#34; of an app often comes at the cost of your privacy and control.&lt;br/&gt;&lt;br/&gt;It&amp;#39;s incredibly easy to give information away. But once that data is out there, it&amp;#39;s nearly impossible to take back. While regulations like GDPR can ensure that data is deleted from a company&amp;#39;s database, they can&amp;#39;t guarantee that data which has already been sold or shared with third parties will also be erased.&lt;br/&gt;&lt;br/&gt;So, the next time you&amp;#39;re met with that insistent prompt to download an app, take a moment to consider what you might be giving up. For me, I&amp;#39;m sticking to the website. My browser offers all the functionality I need, without inviting a constant digital spy into my pocket. And that, in my book, is a win for privacy and control. &lt;br/&gt;&lt;br/&gt;&lt;a href=&#34;https://idiallo.com/blog/dont-download-apps&#34;&gt;https://idiallo.com/blog/dont-download-apps&lt;/a&gt;  &lt;br/&gt;&lt;br/&gt;
    </content>
    <updated>2025-07-26T08:25:23&#43;02:00</updated>
  </entry>

  <entry>
    <id>https://nostr.ae/nevent1qqszcgcxshp5q72fhdkwy6dtn5t6emy6tvvdmgax4cyntf7930f8rvgzypn0gl3aeljuj2qmgd4lftjy83yf857pk97w2qez87qy85alhhaj7xuhyln</id>
    
      <title>Nostr event nevent1qqszcgcxshp5q72fhdkwy6dtn5t6emy6tvvdmgax4cyntf7930f8rvgzypn0gl3aeljuj2qmgd4lftjy83yf857pk97w2qez87qy85alhhaj7xuhyln</title>
    
    <link rel="alternate" href="https://nostr.ae/nevent1qqszcgcxshp5q72fhdkwy6dtn5t6emy6tvvdmgax4cyntf7930f8rvgzypn0gl3aeljuj2qmgd4lftjy83yf857pk97w2qez87qy85alhhaj7xuhyln" />
    <content type="html">
       &lt;br/&gt;&lt;br/&gt;&lt;br/&gt;&lt;br/&gt; &lt;img src=&#34;https://blossom.primal.net/184f2632c0732302300c5f9d987f7569b6950d6106fbdb3e852b18c903a51b01.jpg&#34;&gt; 
    </content>
    <updated>2025-07-18T08:25:40&#43;02:00</updated>
  </entry>

  <entry>
    <id>https://nostr.ae/nevent1qqsd3m9tncewdhuear2tgy8rnc52j2lux8ltq265ru886rytm2fghcczypn0gl3aeljuj2qmgd4lftjy83yf857pk97w2qez87qy85alhhaj73y0sfj</id>
    
      <title type="html">FMD Android: secure open source alternative to Google&amp;#39;s Find ...</title>
    
    <link rel="alternate" href="https://nostr.ae/nevent1qqsd3m9tncewdhuear2tgy8rnc52j2lux8ltq265ru886rytm2fghcczypn0gl3aeljuj2qmgd4lftjy83yf857pk97w2qez87qy85alhhaj73y0sfj" />
    <content type="html">
      FMD Android: secure open source alternative to Google&amp;#39;s Find My Device&lt;br/&gt;&lt;br/&gt;&lt;a href=&#34;https://gitlab.com/fmd-foss/fmd-android&#34;&gt;https://gitlab.com/fmd-foss/fmd-android&lt;/a&gt; &lt;br/&gt;&lt;br/&gt;
    </content>
    <updated>2025-07-15T08:11:08&#43;02:00</updated>
  </entry>

  <entry>
    <id>https://nostr.ae/nevent1qqst5lk8t97hx6598cytxal7c5q3e0z2x7t86lcezuw3u3c3mtvwmfszypn0gl3aeljuj2qmgd4lftjy83yf857pk97w2qez87qy85alhhaj7mz97z0</id>
    
      <title type="html">💙</title>
    
    <link rel="alternate" href="https://nostr.ae/nevent1qqst5lk8t97hx6598cytxal7c5q3e0z2x7t86lcezuw3u3c3mtvwmfszypn0gl3aeljuj2qmgd4lftjy83yf857pk97w2qez87qy85alhhaj7mz97z0" />
    <content type="html">
      In reply to &lt;a href=&#39;/nevent1qqsp88n094c08mh0ektlnw8ekq7j54u4ny5kz96z0m22rfztvhvswfqpp4mhxue69uhkummn9ekx7mqjxg9gj&#39;&gt;nevent1q…g9gj&lt;/a&gt;&lt;br/&gt;_________________________&lt;br/&gt;&lt;br/&gt;💙 &lt;br/&gt;&lt;br/&gt;
    </content>
    <updated>2025-07-14T15:20:28&#43;02:00</updated>
  </entry>

</feed>