AI Cheat Sheet :
• Vibe Coding – programming using natural language.
• CoT (Chain of Thought) – when AI thinks in stages.
• Jailbreak – a way to force AI to break restrictions.
• AI agents are programs that work autonomously.
• AI Alignment – adjusting AI so that it does not harm people.
• AGI – AI that thinks like a human.
• Fine-tuning – further training of AI on specific tasks.
• Hallucinations – when AI makes up facts.
• AI model – a trained system for tasks.
• Chatbot – AI for communicating with people.
• Computer vision – when AI understands images and videos.
• Context is the information that AI remembers to provide accurate answers.
• Embeddings are a numerical representation of words for AI.
• Explainability – explanation of how AI makes decisions.
• Fundamental model – universal AI for different tasks.
• Generative AI (GenAI) – AI that creates texts, images, etc.
• GPU – a video card for accelerating AI work.
• Ground Truth – trusted data for training AI.
• Inference – AI uses its knowledge to analyze new data and produce a result.
• LLM (Large Language Model) – AI trained on huge volumes of text.
• Machine learning – when AI improves based on data.
• MCP (Model Context Protocol) is a standard for AI access to external data.
• NLP (Natural Language Processing) – natural language processing.
• Prompt Engineering is the art of correctly formulating requests to AI.
• Reasoning Model – AI that reasons logically.
• RAG (Retrieval-Augmented Generation) – AI that searches for information before responding.
• TPU – Google’s special processor for working with AI.
• Tokenization – breaking down text into small parts (words, symbols).
• Transformers – AI architecture for text processing.
• Weights – values that determine how the AI learns.
• Diffusion models – models that create images from noise (used in Midjourney, Stable Diffusion).
• Multimodal AI – AI that works with text, images, video and sound simultaneously.
• Generation – the process of creating text, images and other AI content.
• API – a way to interact with AI through code.
Kazani
kazani@primal.net
npub1vm68...srrc
Beloved Bitcoin.
Promo code: KAZANI ➡️ https://foundation.xyz/passport-prime
💻 Linux Terminal on Android
That's right, Google has officially launched the "Linux Terminal for Android" app.
This tool allows users to run Linux commands and scripts directly on Android devices, without the need for third-party tools.
It offers native integration with the operating system and greater security as it is an official solution.
You only need:
· Have a Google Pixel (Yes, GrapheneOS works).
· Activate developer mode.
· Enable it in developer mode.
Android is based on Linux, and having a native terminal is a great tool for anyone who knows how to take advantage of it.
Obtainium: Get App Updates Directly From the Source.
Tired of waiting for updates in the Play Store? Obtainium lets you install and update Android apps directly from their source (like GitHub release pages) and notifies you about new releases. Cut out the middleman and stay up-to-date!
Key Features:
* Direct Updates: Install and update apps directly from release pages.
* Notifications: Get notified when new versions of your apps are available.
* Open Source: Built by the community, for the community.
Learn More:
* Video Tutorial: Obtainium 101 -
* README: GitHub -
* Wiki: obtainium.imranr.dev -
Recommended Tools:
* AppVerifier: GitHub - Verify app authenticity. -
Community Resources:
* Crowdsourced App Configs:
Why Use Obtainium?
See the original motivation: Side Of Burritos - You should use this instead of F-Droid | How to use app RSS feed -
Project Links:
* Website:
* Source Code: GitHub - 
GitHub
Obtainium/README.md at main · ImranR98/Obtainium
Get Android app updates straight from the source. Contribute to ImranR98/Obtainium development by creating an account on GitHub.
Home - Obtainium Wiki
Help page for Obtainium
GitHub
GitHub - soupslurpr/AppVerifier: Verify apps easily.
Verify apps easily. Contribute to soupslurpr/AppVerifier development by creating an account on GitHub.
Complex Obtainium Apps
Crowdsourced "Hard to Add" App Configurations for Obtainium.
Obtainium
Obtainium allows you to install and update apps directly from their release pages, and receive notifications when new releases are made available.
GitHub
GitHub - ImranR98/Obtainium: Get Android app updates straight from the source.
Get Android app updates straight from the source. Contribute to ImranR98/Obtainium development by creating an account on GitHub.
👩💻 Test drive Linux distros online!
Resource where you can test the operation of different Linux distributions directly in your browser:
➡️ 

DistroSea
Test Linux distros online - DistroSea
Instantly test run Linux distros online in the cloud for free, right from your web browser. No installation or live boot required.
Ego is not always about being bad or arrogant; even forced goodness and compassion stem from ego. Anything done from a fragmented identity is ego, where the “I” becomes the most important entity.
Another free method of finding information by nickname or last name. urlscan.io page.url advanced search operator:
page.url:"/targetusername/"
Works the same as inurl: in Google, but the results are very different.
💻 Another reason why Linux is superior to Windows


WARNING - Etcher Sends private information to third parties
Etcher is recommend by many people for burning image files to USB drives for distro testing, but TAILS just removed their recommendation for Etcher based on sharing information with third parties.
https://tails.net/news/rufus/index.en.html
Good Morning #Nostr 💜⚡🫂
What if you are trying to win the wrong race?
Android System SafetyCore (com.google.android.safetycore) provides common infrastructure that apps can use to protect users from unwanted content. The classification of content runs exclusively on your device and the results aren’t shared with Google.
As a system service, SafetyCore is only active when an application integrates with SafetyCore and specifically requests content to be classified. SafetyCore performs the classification on the device itself and doesn’t send identifiable data or any of the classified content or results to Google servers
For now there is no app that uses it. In future any app can use it to avoid setting up his system not on device.
Sensitive Content Warnings is an optional feature that blurs images that may contain nudity before viewing, and then prompts with a “speed bump” that contains help-finding resources and options, including to view the content.
Also only if you have play store it get installed automatically so is only for people that already trust google and have no problem using it. So far only know use will be an option to keep NSFW images distorted instead of automatically being displayed in messages app, if if the user don't want it can disable the option or change message app.
There is similar feat on TG too, some images are blurred before being manually shown.
GOS team stated they analized it and found out it does nothing more than what is described, for now (local scan, no data sent...).
Also on their sandboxes play services the auto-installation is blocked so is up to the user to choose what to do with it.
Another solution:
Uninstall the app and then install this placeholder app

Understanding Android System SafetyCore - Help
What is SafetyCore? Android System SafetyCore is a Google system service for Android 9+ devices. You may have noticed it in the list of services in...

Google Online Security Blog
5 new protections on Google Messages to help keep you safe
Posted by Jan Jedrzejowicz, Director of Product, Android and Business Communications; Alberto Pastor Nieto, Sr. Product Manager Google Messa...
GitHub
GitHub - daboynb/Safetycore-placeholder: Placeholder APK to permanently block Google SafetyCore installation and updates
Placeholder APK to permanently block Google SafetyCore installation and updates - daboynb/Safetycore-placeholder
🇦🇺 Australian Government vs Kaspersky
The Australian government has banned the use of Kaspersky Lab's web products and services (yes, the antivirus ones) on all government systems and devices, citing national security risks.
The move was justified following a risk analysis that identified "threats of foreign interference, espionage and sabotage", particularly due to Kaspersky's extensive collection of user data and its potential exposure to extrajudicial orders from a foreign government (referring to Russia) that contradict Australian law.
Kaspersky argues that the decision lacks specific technical evidence and is influenced by geopolitical factors, without giving them any prior opportunity to respond.
This ban follows similar measures in countries such as the United States, the United Kingdom and Canada.
Keyloggers in electric typewriters: how Soviet intelligence agents monitored US diplomats.
• Did you know that the world's first keylogger appeared in the 1970s ? It all started with Soviet intelligence agents who placed bugs in the IBM Selectric typewriters of American diplomats to monitor their business correspondence.
• Such implants (bugs) were a real engineering marvel. Portable devices were sewn into a metal plate running the entire length of the machine, which allowed the bug to be hidden from prying eyes. Such a device could only be detected using X-ray equipment, and the location of the bug had to be known exactly. Interestingly, the bug could record all letters and numbers, but did not record spaces, indents, or hyphens. The transmission of information received by the bug was carried out in real time!
• The bugs were discovered after more than 10 tons of equipment seized from the U.S. embassies in Moscow and the U.S. consulates in Leningrad were dismantled and analyzed and returned to the United States. The implants were found in only 16 typewriters from 1976-1984 . The search for the bugs began only after the U.S. received information about similar devices from "partners" who had been subjected to the same type of "attack" by the USSR. For eight years, the bugs remained undetected and transmitted information to Soviet intelligence.
• The operating principle of the bugs was not entirely clear. Some experts believed that it determined the difference in time for printing each symbol. In Selectric -type machines, to print each specific letter, the ball with symbols had to make a revolution. And printing each symbol takes a certain amount of time, different from the time required to print any other symbol. According to experts, the device transmitted the sounds of printing, and Soviet specialists identified them, deciphering the document printed by the Americans.
• In fact, the device installed by the USSR intelligence officers was more advanced and independently determined the printing symbols. The bug determined some features of the movement of the typewriter mechanism, and the magnetic energy received by the device's sensors was converted into a digital electrical signal. The signals were compressed into a four-bit sequence. The bug could store up to 8 four-bit symbols. When the buffer overflowed, the bug's transmitter transmitted the information to the intelligence officers' receiving device.
• There were some peculiarities in the operation of the device. For example, the bug could not record pressing keys that did not rotate the ball with symbols. That is, the space, indent and some other text editing keys were not recorded.
• There were 5 variants of bug models. Three types worked with direct current and contained up to 10 batteries. The other two types worked with alternating current and reported whether the machine was on or not. Some elements of the machine were used as an antenna. The first three models of bugs were autonomous.
• Each device had a magnetometer that converted the mechanical energy of keystrokes into magnetic perturbations. The electronics in the device responded to these perturbations, analyzed the data received, and transmitted the data to the nearest receiver. The data was transmitted via a radio channel. The implant could be controlled remotely. The installation of the bug by a qualified mechanic took only about half an hour. The bugs were equipped with a microcircuit that was very advanced for that period.
• Remote control was needed to turn off the bugs when inspection commissions arrived at US embassies and consulates. Over time, the US developed devices that could detect such bugs, but the problem was that to detect a spy device, the machine had to be turned on, the bug turned on, and the detector tuned to a specific radio frequency. Soviet engineers tuned the bugs to frequencies used by local TV stations.
➡️ https://arstechnica.com/how-soviets-used-ibm-selectric-keyloggers-to-spy-on-us-diplomats
Found a really cool resource on Linux basics for beginners. The whole point is that the material is presented in the form of mini-courses, which contain lessons with tasks. If you start solving problems, the service will check your answers automatically. Many topics are available for study:
➡ Command line;
➡ Working with text;
➡ User management;
➡ Process management;
➡ File system;
➡ Linux kernel;
➡ Logging;
➡ Networks and more...
➡️ 

LabEx
Linux Journey: Learn Linux with Free Linux Tutorial & Course
Learn Linux with free tutorial and beginner-friendly courses. Explore Linux basics, essential Linux commands, and practical skills for mastering Li...
🤖 Android with 8 years of updates
Qualcomm and Google have announced a collaboration to offer up to 8 years of software and security updates from their new Snapdragon 8 Elite processor
This will not only affect Google pixels, which will see their lifespan extended, but also other manufacturers if the manufacturer so chooses, making more Android phones have a longer lifespan.
This initiative will also extend to future Snapdragon 8 and 7 chips over the next five generations, making Androids with these processors much more attractive.
It will also benefit future Pixels that will come with these processors , forgetting about Google's "tensor" processors and gaining in power.
Everything points to the fact that with the next Pixel 10 we will have 8 years of updates for GrapheneOS.
Why Google funds Firefox
Alternatives to Firefox:
(I'm using this)
(and of course, this one as well)


LibreWolf Browser
A custom version of Firefox, focused on privacy, security and freedom.

Waterfox
Waterfox - Open source web browser
The web browser that respects your privacy
Zen Browser
Beautifully designed, privacy-focused, and packed with features.
Web – Apps for GNOME
GitHub
GitHub - ungoogled-software/ungoogled-chromium: Google Chromium, sans integration with Google
Google Chromium, sans integration with Google. Contribute to ungoogled-software/ungoogled-chromium development by creating an account on GitHub.
GNUzilla and IceCat - GNU Project - Free Software Foundation
Pale Moon | Custom, Private, Open-Source Web Browsing.
Pale Moon is an Open Source web browser available for Microsoft Windows, Mac OS and Linux, focusing on efficiency and ease of use.

Brave
The browser that puts you first | Brave
The Brave browser is a fast, private and secure web browser for PC, Mac and mobile. Download now to enjoy a faster ad-free browsing experience that...

Ladybird
Ladybird is a truly independent web browser, backed by a non-profit.
🇫🇷 France goes for VPNs
Companies like Canal+ and LFP (Ligue de Football Professionnel) claim that VPN providers are contributing to illegal broadcasts of sports broadcasts. (Yes, they want to go after that again, just like in Spain.)
This is why, according to a journalist from "Línforme", Canal+ and LFP have different VPNs in mind.
Faced with this situation, VPN companies are considering leaving France, arguing that such measures are a threat.
Even ProtonVPN is willing to take the case to the EU Court of Justice .
There is no obligation to block VPNs for now, but we will be watching to see if such a measure is finally implemented.
ProtonVPN: Site Blocking Is an Attack on Users' Online Freedom * TorrentFreak
ProtonVPN says efforts to include VPNs in France's piracy blocking scheme is 'a dangerous attack on Internet freedom on the altar of corp...
I found an interesting resource that contains information about the main web vulnerabilities. The peculiarity of this platform is that each of the listed methods can be performed independently, following the tips and examples. And each example is interactive, so it will be easier for you to perceive the material and practice. The content is as follows:
➡ SQL Injection;
➡ Cross-Site Scripting;
➡ Command Execution;
➡ Clickjacking;
➡ Cross-Site Request Forgery;
➡ Directory Traversal;
➡ Reflected XSS;
➡ DOM-based XSS;
➡ File Upload Vulnerabilities;
➡ Broken Access Control;
➡ Open Redirects;
➡ Unencrypted Communication;
➡ User Enumeration;
➡ Information Leakage;
➡ Password Mismanagement;
➡ Privilege Escalation;
➡ Session Fixation;
➡ Weak Session IDs;
➡ XML Bombs;
➡ XML External Entities;
➡ Denial of Service Attacks;
➡ Email Spoofing;
➡ Malvertising;
➡ Lax Security Settings;
➡ Toxic Dependencies;
➡ Logging and Monitoring;
➡ Buffer Overflows;
➡ Server-Side Request Forgery;
➡ Host Header Poisoning;
➡ Insecure Design;
➡ Mass Assignment;
➡ Prototype Pollution;
➡ Regex Injection;
➡ Remote Code Execution;
➡ Cross-Site Script Inclusion;
➡ Downgrade Attacks;
➡ DNS Poisoning;
➡ SSL Stripping;
➡ Subdomain Squatting.
➡️ https://www.hacksplaining.com/lessons
Being sovereign of your resources is not an easy task and the custody of own funds in Bitcoin, or any other crypto, is a burden that we are not used to. Here is an awesome solution! Make your cold wallet with washers ⬇️
Link: 

Blockmit.com
Make your cold wallet with washers | Blockmit.com
Sovereignty with Bitcoin involves storing private keys securely. Here is a simple, cheap and effective method.
