Kazani
kazani@primal.net
npub1vm68...srrc
Beloved Bitcoin.
Promo code: KAZANI ➡️ https://foundation.xyz/passport-prime
Transfer Funds to New p2pkh Addresses: #Bitcoin in unused p2pkh addresses remain quantum-safe because their public keys are not exposed. Transferring funds to such addresses can prevent immediate risks.
An address that starts with "bc1q" not "p"
Avoid address with “04” or “bc1p”
Use new addresses for each transaction.
- Don’t store large amounts in hot wallets.
Stay informed—quantum threats aren’t hype. They’re real.
https://x.com/paoloardoino/status/1888259298641191049
StegCloak is a JavaScript steganography module that allows you to hide secrets in text using compression and encryption with invisible Unicode characters.
It is designed for use in confidential communications, supports password and HMAC data protection, and provides cryptographic security with AES-256-CTR.
Users can hide and reveal messages using commands available through npm, and work with the API, CLI, and web interface with support for Web Workers.

GitHub
GitHub - KuroLabs/stegcloak: Hide secrets with invisible characters in plain text securely using passwords 🧙🏻♂️⭐
Hide secrets with invisible characters in plain text securely using passwords 🧙🏻♂️⭐ - KuroLabs/stegcloak
XMPP IM criticisms:
You can follow any advise on the client XMPP setup but the main issue with the protocol is not your endpoint. The issue is the is the XMPP protocol and related infrastructure.
There are two things you wana do
1. content of the message (privacy setup),
2. identity (anonymity setup)
Don't mistake those two things!!
1. Privacy
is ensured on XMPP with the OTR or OMEMO encryption. The issue is that the key exchange in between the communication parties is not foolproof. You both *MUST* check the fingerprints through a separate secure channel. This is in large scale not practiced. If you don't check it right, the underlying infrastructure of the XMPP allows the adversary to MITM you and read your messages.
2 Anonymity
is ensured with Tor here. Tor tries to conceal you IP only and nothing more. But Tor, as a low latency network, cannot protect you from revealing your behavioral patterns, your social graph, your login and log out time, the number of messages sent and received at any time, the sender and receiver of the messages, their precise volume and so on *from the XMPP server* and any adversary that can monitor that server.
My advice is - don't use XMPP! if possible at all and use something more resistant like SimpleX, Briar, CWTCH... and similar solutions that mitigate those leaks and diminish or even make impossible those related attacks from the active as well as passive adversaries.
📱 Always update
A vulnerability has recently been found in Android (CVE-2024-53104) that affects the Linux kernel and could have been exploited by forensic data extraction tools, according to GrapheneOS.
The flaw, which was being exploited in a limited and targeted manner, required physical access to the device, so is likely exploited through the phone's USB port.
GrapheneOS message on this matter:
Source PCMag:
With this I want to remember one thing:
It is ESSENTIAL that your devices and applications are always updated
Without security your privacy is an illusion

X (formerly Twitter)
GrapheneOS (@GrapheneOS) on X
February 2025 Android Security Bulletin includes a heap buffer overflow in a Linux kernel USB peripheral driver (CVE-2024-53104) marked exploited i...

PCMAG
Google Fixes Android Bug Potentially Exploited by Law Enforcement
Privacy-focused GrapheneOS says it's likely that one of the bugs was 'exploited by forensic data extraction tools' frequently used b...
If anyone hasn't checked out the new app release, there's a blog post released about the DrakFi app release:
- ditches the browser completely.
- a single, unified super-app.
- SAME app across ALL platforms.
- The design is highly extensible with user-customizable UI and themes.
- Uses pluggable app-on's, apps can be distributed in a fully p2p manner without hosting centralized website frontends.
- Devs do not host anything. They just write code but the add-on is hosted fully p2p and anonymously.
- Devs do not have to sign up to Google or Apple app stores either for browser or phone builds.
- Nobody is required to host an RPC just so users can access their app.
- no privacy violations (no add-on store, no browser plugin, no RPC or dev hosting the frontend). Software runs locally on your device.
- One single consistent experience. Write once, deploy everywhere.
- Full support for third party ecosystem of devs through APIs and CLI.
- App is fully customizable with themes and plugins to suit your desired look and feel. Users have full power over the software they run.

DarkFi – Insights
Insights from DarkFi.
America feels threatened by #Bitcoin.
For 15 years it tried everything to eliminate it.
Now it figured out that something that cannot be destroyed is the most powerful thing in the world.
Now it wants to use Bitcoin to dominate the world.
The world is sleeping 😴.
FIU stands for **Financial Intelligence Unit**, which is a government agency responsible for receiving, analyzing, and disseminating financial information to combat money laundering, terrorism financing, and other financial crimes. When an entity is "FIU registered," it means that the entity has officially registered with the Financial Intelligence Unit in its jurisdiction, typically to comply with anti-money laundering (AML) and counter-terrorism financing (CTF) regulations.
Here’s a breakdown of what FIU registration typically involves:
1. **Legal Requirement**: In many countries, businesses in certain sectors (e.g., banks, financial institutions, casinos, real estate, and even some non-financial businesses) are legally required to register with the FIU.
2. **Reporting Obligations**: Once registered, the entity is often required to report suspicious transactions, large cash transactions, or other activities that might indicate money laundering or financial crime. These reports are typically submitted through systems like **Suspicious Activity Reports (SARs)** or **Currency Transaction Reports (CTRs)**.
3. **Compliance Monitoring**: FIU registration often means the entity must implement and maintain robust AML/CTF compliance programs, including employee training, internal controls, and regular audits.
4. **Data Sharing**: The FIU uses the information provided by registered entities to analyze patterns of financial crime and share intelligence with law enforcement or other regulatory bodies.
5. **Penalties for Non-Compliance**: Failure to register with the FIU or comply with its requirements can result in significant penalties, including fines, sanctions, or even criminal charges.
In summary, being "FIU registered" signifies that an entity is part of a regulated framework designed to monitor and prevent financial crimes, ensuring transparency and accountability in financial transactions.
OpenNHP: Cryptography-driven zero trust protocol
OpenNHP is the open-source implementation of NHP (Network-resource Hiding Protocol), a cryptography-based zero trust protocol for safeguarding servers and data.

GitHub
GitHub - OpenNHP/opennhp: A lightweight, cryptography-powered, open-source toolkit built to enforce Zero Trust security for infrastructure, applications, and data in the AI-driven world.
A lightweight, cryptography-powered, open-source toolkit built to enforce Zero Trust security for infrastructure, applications, and data in the AI-...
Net Switch: Isolate Apps from Internet Access
Net Switch is a Magisk module to isolate apps from accessing the internet on your Android device. This tool gives you complete control over which apps can send or receive data, improving security, privacy, and saving bandwidth.
Fully standalone, Operates fully on iptables.

GitHub
GitHub - Rem01Gaming/net-switch: Magisk Module to isolate any app from Internet access
Magisk Module to isolate any app from Internet access - Rem01Gaming/net-switch
He can launch his Memcoin
His family can launch Memecoin
His son can pump & dump altcoins.
He can name the government department as DOGE.
However, Donald Trump cannot sign an executive order on Bitcoin Strategic Reserve.
Never Trust Politicians on #Bitcoin.
Jan 2025 #ProofOfWalk


Cherry Studio is a desktop client for Windows, Mac and Linux, which supports many LLM providers, including large cloud services and local models.
Among its main functions is the ability to work with more than 300 pre -designed AI assistants, the creation of custom assistants, as well as support for various formats of documents, including text, images and office files.
The application offers tools for global search, top management and translating, which significantly improves interaction with the user thanks to the cross -platform and many settings options.

GitHub
GitHub - CherryHQ/cherry-studio: AI Agent + Coding Agent + 300+ assistants: agentic AI desktop with autonomous coding, intelligent automation, and unified access to frontier LLMs.
AI Agent + Coding Agent + 300+ assistants: agentic AI desktop with autonomous coding, intelligent automation, and unified access to frontier LLMs. ...
🌐 Share files between devices
I share with you this tool to share files between devices: Windows, Mac, Linux, Android, iOS.
Without relying on a central server, end-to-end encryption...
The application is LocalSend
OpenSource, free and easy to use What else do you need to share a file?
LocalSend: Share files to nearby devices
Young people of this generation are so proud that they are young.
Venice - Private and Uncensored AI
With Venice, you harness the power of advanced AI models for text and image generation with top-tier privacy and performance.
> DeepSeek R1 70B now live for Pro users


Venice.ai
Venice Chat - Venice Uncensored AI
Venice is the easy app for private, uncensored AI conversations and image generation. Try for free with no log-in needed.
🌍 They think they own the world
Klaus Schwab, President of the World Economic Forum (WEF):
"The future does not develop on its own. We shape it, and in particular we shape it here in this room. If we embrace constructive optimism and believe in our collective ability and commitment to improve the state of the world, we can shape the intelligent era as one in which every human being can realize his or her full potential."
They like to believe they control the future, but ultimately we are the ones who own it.
Don't accept their delusions of control and power, they just want you to be submissive and to think that you are not really the owner of your present and future.
The "blackpill" smear is the new "conspiracy theorist" smear for when someone wants to dimiss inconvenient facts without engaging with them.
Touché


X (formerly Twitter)
Whitney Webb (@_whitneywebb) on X
The "blackpill" smear is the new "conspiracy theorist" smear for when someone wants to dimiss inconvenient facts without engaging with them.

