Ego is not always about being bad or arrogant; even forced goodness and compassion stem from ego. Anything done from a fragmented identity is ego, where the “I” becomes the most important entity.
Kazani
kazani@primal.net
npub1vm68...srrc
Beloved Bitcoin.
Promo code: KAZANI ➡️ https://foundation.xyz/passport-prime
Another free method of finding information by nickname or last name. urlscan.io page.url advanced search operator:
page.url:"/targetusername/"
Works the same as inurl: in Google, but the results are very different.
💻 Another reason why Linux is superior to Windows


WARNING - Etcher Sends private information to third parties
Etcher is recommend by many people for burning image files to USB drives for distro testing, but TAILS just removed their recommendation for Etcher based on sharing information with third parties.
https://tails.net/news/rufus/index.en.html
Good Morning #Nostr 💜⚡🫂
What if you are trying to win the wrong race?
Android System SafetyCore (com.google.android.safetycore) provides common infrastructure that apps can use to protect users from unwanted content. The classification of content runs exclusively on your device and the results aren’t shared with Google.
As a system service, SafetyCore is only active when an application integrates with SafetyCore and specifically requests content to be classified. SafetyCore performs the classification on the device itself and doesn’t send identifiable data or any of the classified content or results to Google servers
For now there is no app that uses it. In future any app can use it to avoid setting up his system not on device.
Sensitive Content Warnings is an optional feature that blurs images that may contain nudity before viewing, and then prompts with a “speed bump” that contains help-finding resources and options, including to view the content.
Also only if you have play store it get installed automatically so is only for people that already trust google and have no problem using it. So far only know use will be an option to keep NSFW images distorted instead of automatically being displayed in messages app, if if the user don't want it can disable the option or change message app.
There is similar feat on TG too, some images are blurred before being manually shown.
GOS team stated they analized it and found out it does nothing more than what is described, for now (local scan, no data sent...).
Also on their sandboxes play services the auto-installation is blocked so is up to the user to choose what to do with it.
Another solution:
Uninstall the app and then install this placeholder app

Understanding Android System SafetyCore - Help
What is SafetyCore? Android System SafetyCore is a Google system service for Android 9+ devices. You may have noticed it in the list of services in...

Google Online Security Blog
5 new protections on Google Messages to help keep you safe
Posted by Jan Jedrzejowicz, Director of Product, Android and Business Communications; Alberto Pastor Nieto, Sr. Product Manager Google Messa...
GitHub
GitHub - daboynb/Safetycore-placeholder
Contribute to daboynb/Safetycore-placeholder development by creating an account on GitHub.
🇦🇺 Australian Government vs Kaspersky
The Australian government has banned the use of Kaspersky Lab's web products and services (yes, the antivirus ones) on all government systems and devices, citing national security risks.
The move was justified following a risk analysis that identified "threats of foreign interference, espionage and sabotage", particularly due to Kaspersky's extensive collection of user data and its potential exposure to extrajudicial orders from a foreign government (referring to Russia) that contradict Australian law.
Kaspersky argues that the decision lacks specific technical evidence and is influenced by geopolitical factors, without giving them any prior opportunity to respond.
This ban follows similar measures in countries such as the United States, the United Kingdom and Canada.
Keyloggers in electric typewriters: how Soviet intelligence agents monitored US diplomats.
• Did you know that the world's first keylogger appeared in the 1970s ? It all started with Soviet intelligence agents who placed bugs in the IBM Selectric typewriters of American diplomats to monitor their business correspondence.
• Such implants (bugs) were a real engineering marvel. Portable devices were sewn into a metal plate running the entire length of the machine, which allowed the bug to be hidden from prying eyes. Such a device could only be detected using X-ray equipment, and the location of the bug had to be known exactly. Interestingly, the bug could record all letters and numbers, but did not record spaces, indents, or hyphens. The transmission of information received by the bug was carried out in real time!
• The bugs were discovered after more than 10 tons of equipment seized from the U.S. embassies in Moscow and the U.S. consulates in Leningrad were dismantled and analyzed and returned to the United States. The implants were found in only 16 typewriters from 1976-1984 . The search for the bugs began only after the U.S. received information about similar devices from "partners" who had been subjected to the same type of "attack" by the USSR. For eight years, the bugs remained undetected and transmitted information to Soviet intelligence.
• The operating principle of the bugs was not entirely clear. Some experts believed that it determined the difference in time for printing each symbol. In Selectric -type machines, to print each specific letter, the ball with symbols had to make a revolution. And printing each symbol takes a certain amount of time, different from the time required to print any other symbol. According to experts, the device transmitted the sounds of printing, and Soviet specialists identified them, deciphering the document printed by the Americans.
• In fact, the device installed by the USSR intelligence officers was more advanced and independently determined the printing symbols. The bug determined some features of the movement of the typewriter mechanism, and the magnetic energy received by the device's sensors was converted into a digital electrical signal. The signals were compressed into a four-bit sequence. The bug could store up to 8 four-bit symbols. When the buffer overflowed, the bug's transmitter transmitted the information to the intelligence officers' receiving device.
• There were some peculiarities in the operation of the device. For example, the bug could not record pressing keys that did not rotate the ball with symbols. That is, the space, indent and some other text editing keys were not recorded.
• There were 5 variants of bug models. Three types worked with direct current and contained up to 10 batteries. The other two types worked with alternating current and reported whether the machine was on or not. Some elements of the machine were used as an antenna. The first three models of bugs were autonomous.
• Each device had a magnetometer that converted the mechanical energy of keystrokes into magnetic perturbations. The electronics in the device responded to these perturbations, analyzed the data received, and transmitted the data to the nearest receiver. The data was transmitted via a radio channel. The implant could be controlled remotely. The installation of the bug by a qualified mechanic took only about half an hour. The bugs were equipped with a microcircuit that was very advanced for that period.
• Remote control was needed to turn off the bugs when inspection commissions arrived at US embassies and consulates. Over time, the US developed devices that could detect such bugs, but the problem was that to detect a spy device, the machine had to be turned on, the bug turned on, and the detector tuned to a specific radio frequency. Soviet engineers tuned the bugs to frequencies used by local TV stations.
➡️ https://arstechnica.com/how-soviets-used-ibm-selectric-keyloggers-to-spy-on-us-diplomats
Found a really cool resource on Linux basics for beginners. The whole point is that the material is presented in the form of mini-courses, which contain lessons with tasks. If you start solving problems, the service will check your answers automatically. Many topics are available for study:
➡ Command line;
➡ Working with text;
➡ User management;
➡ Process management;
➡ File system;
➡ Linux kernel;
➡ Logging;
➡ Networks and more...
➡️ 

LabEx
Linux Journey: Learn Linux with Free Linux Tutorial & Course
Learn Linux with free tutorial and beginner-friendly courses. Explore Linux basics, essential Linux commands, and practical skills for mastering Li...
🤖 Android with 8 years of updates
Qualcomm and Google have announced a collaboration to offer up to 8 years of software and security updates from their new Snapdragon 8 Elite processor
This will not only affect Google pixels, which will see their lifespan extended, but also other manufacturers if the manufacturer so chooses, making more Android phones have a longer lifespan.
This initiative will also extend to future Snapdragon 8 and 7 chips over the next five generations, making Androids with these processors much more attractive.
It will also benefit future Pixels that will come with these processors , forgetting about Google's "tensor" processors and gaining in power.
Everything points to the fact that with the next Pixel 10 we will have 8 years of updates for GrapheneOS.
Why Google funds Firefox
Alternatives to Firefox:
(I'm using this)
(and of course, this one as well)


LibreWolf Browser
A custom version of Firefox, focused on privacy, security and freedom.

Waterfox
Waterfox - Open source web browser
The web browser that respects your privacy
Zen Browser
Beautifully designed, privacy-focused, and packed with features.
Web – Apps for GNOME
GitHub
GitHub - ungoogled-software/ungoogled-chromium: Google Chromium, sans integration with Google
Google Chromium, sans integration with Google. Contribute to ungoogled-software/ungoogled-chromium development by creating an account on GitHub.
GNUzilla and IceCat - GNU Project - Free Software Foundation
The Pale Moon Project homepage
Pale Moon is an Open Source, Mozilla-derived web browser available for Microsoft Windows and Linux, focusing on efficiency and ease of use.

Brave
The browser that puts you first | Brave
The Brave browser is a fast, private and secure web browser for PC, Mac and mobile. Download now to enjoy a faster ad-free browsing experience that...

Ladybird
Ladybird is a truly independent web browser, backed by a non-profit.
🇫🇷 France goes for VPNs
Companies like Canal+ and LFP (Ligue de Football Professionnel) claim that VPN providers are contributing to illegal broadcasts of sports broadcasts. (Yes, they want to go after that again, just like in Spain.)
This is why, according to a journalist from "Línforme", Canal+ and LFP have different VPNs in mind.
Faced with this situation, VPN companies are considering leaving France, arguing that such measures are a threat.
Even ProtonVPN is willing to take the case to the EU Court of Justice .
There is no obligation to block VPNs for now, but we will be watching to see if such a measure is finally implemented.
ProtonVPN: Site Blocking Is an Attack on Users' Online Freedom * TorrentFreak
ProtonVPN says efforts to include VPNs in France's piracy blocking scheme is 'a dangerous attack on Internet freedom on the altar of corp...
I found an interesting resource that contains information about the main web vulnerabilities. The peculiarity of this platform is that each of the listed methods can be performed independently, following the tips and examples. And each example is interactive, so it will be easier for you to perceive the material and practice. The content is as follows:
➡ SQL Injection;
➡ Cross-Site Scripting;
➡ Command Execution;
➡ Clickjacking;
➡ Cross-Site Request Forgery;
➡ Directory Traversal;
➡ Reflected XSS;
➡ DOM-based XSS;
➡ File Upload Vulnerabilities;
➡ Broken Access Control;
➡ Open Redirects;
➡ Unencrypted Communication;
➡ User Enumeration;
➡ Information Leakage;
➡ Password Mismanagement;
➡ Privilege Escalation;
➡ Session Fixation;
➡ Weak Session IDs;
➡ XML Bombs;
➡ XML External Entities;
➡ Denial of Service Attacks;
➡ Email Spoofing;
➡ Malvertising;
➡ Lax Security Settings;
➡ Toxic Dependencies;
➡ Logging and Monitoring;
➡ Buffer Overflows;
➡ Server-Side Request Forgery;
➡ Host Header Poisoning;
➡ Insecure Design;
➡ Mass Assignment;
➡ Prototype Pollution;
➡ Regex Injection;
➡ Remote Code Execution;
➡ Cross-Site Script Inclusion;
➡ Downgrade Attacks;
➡ DNS Poisoning;
➡ SSL Stripping;
➡ Subdomain Squatting.
➡️ https://www.hacksplaining.com/lessons
Being sovereign of your resources is not an easy task and the custody of own funds in Bitcoin, or any other crypto, is a burden that we are not used to. Here is an awesome solution! Make your cold wallet with washers ⬇️
Link: 

Blockmit.com
Make your cold wallet with washers | Blockmit.com
Sovereignty with Bitcoin involves storing private keys securely. Here is a simple, cheap and effective method.
➡️ Remove your credentials from breached data providers:
➡️ Have I Been Pwned
• Conduct a search of your email address or username at https://haveibeenpwned.com/OptOut.
• Click the link in the email confirmation.
• Choose the "Remove email address completely" option.
➡️ Dehashed
• Create a free burner account at
• Conduct a search of your email address or username.
• Click "Request entry removal" link below each result.
• Click the confirmation link within each email.
➡️ Leakcheck
• Register for a free burner account at
• Conduct a search of your email address.
• If entries are present, send an email from the exposed address with a written removal request to removal@leakcheck.net.
• Click the link within the confirmation email.
➡️ PSBDMP
• Navigate to the IntelTechniques Breach Tool at https://inteltechniques.com/tools/Breaches.html.
• Search your email address at the first "PSBDMP" option.
• If any results are present, send an email to admin@psbdmp.ws requesting removal.
➡️ IntelX
• Conduct a search of your email address at
• Navigate to https://intelx.io/abuse.
• Paste any URLs associated with the found content "Full Data" links.
• Submit request.
➡️ HudsonRock
• Navigate to the IntelTechniques Breach Tool at https://inteltechniques.com/tools/Breaches.html.
• Search your email address at the first "HudsonRock" option.
• If any results are present, send an email to hello@hudsonrock.com requesting removal. If that fails, use the contact page at
➡️ Leak-Lookup
• Register for a free burner account at
• Conduct a search of your email address.
• If entries are present, send an email from the exposed address with a written removal request to info@leak-lookup.com.
➡️ HackCheck
• Register for a free burner account at
• Conduct a search of your email address.
• If entries are present, send an email from the exposed address with a written removal request to support@hackcheck.io.
➡️ Breach Directory
• Navigate to https://breachdirectory.org.
• Search your email address.
• If any results are present, begin the removal process at https://breachdirectory.org/deletemydata.
➡️ LeakPeek
• Navigate to https://leakpeek.com.
• Search your email address.
• If any results are present, send an email to support@LeakPeek.com requesting removal.

DeHashed — #FreeThePassword
Have you been compromised? DeHashed provides free deep-web scans and protection against credential leaks. A modern personal asset search engine
...
LeakCheck - Find out if your credentials have been compromised
Data breach search engine, low price starting from $2.99/day, unlimited API, 7B+ records
Intelligence X
Intelligence X is a search engine and data archive. Search Tor, I2P, data leaks and the public web by email, domain, IP, CIDR, Bitcoin address and ...

Hudson Rock
Hudson Rock - Infostealer Intelligence Solutions
Powered by Hudson Rock
Leak-Lookup | Database Search Engine
Leak - Lookup makes searching database leaks easy and fast. Offering username, email, ipaddress look-ups over thousands of data breaches / dumps, it

HackCheck | Data Breach Search Engine
HackCheck, a data breach search engine. Safeguard your valuable data from data breaches. Protect your digital identity with HackCheck!
📱 The Swedish Army and Signal
The Swedish military has adopted the secure and private messaging app Signal as its form of communication.
This decision was made to protect against the interception of calls and messages, as well as against the falsification of telephone numbers, according to CyberInsider.
Signal was chosen for its end-to-end encryption, its wide acceptance among authorities and partners, and because it has been subject to independent security audits, in addition to being open source and free, which will reduce costs.
The official instruction, published on February 11, 2025, states that Signal must be used for all communications with counterparts inside and outside the Armed Forces who also have the application.
This movement would be similar to what we saw a few years ago in the Swiss army where they use Threema, which in this case is of Swiss origin.
Let's hope that awareness about this becomes more and more widespread.


CyberInsider
Signal Adopted by Swedish Armed Forces for Secure Communications
The Swedish Armed Forces have standardized the use of the encrypted messaging app Signal for non-classified communications via mobile phones.

endoflife.date
Home
Check end-of-life, support schedule, and release timelines for more than 380+ products at one place.
