Kazani's avatar
Kazani
kazani@primal.net
npub1vm68...srrc
Beloved Bitcoin. Promo code: KAZANI ➡️ https://foundation.xyz/passport-prime
Kazani's avatar
Kazani 2 months ago
"I think in the short term, everything will be offered with great benefits. It was quite interesting what you were talking about...Sam Altman offering his Worldcoin by literally paying people for their biometrics. So your biometrics link you, your physical self. So, your biometrics is biological identifier. So your face, your iris, your fingerprints, whatever. That links the physical you to your digital twin, and your digital twin exists in the virtual world, so whatever happens or whatever rules are applied to your digital twin will have an impact on you as a person. We'll have programmable digital currency, then your digital currency doesn't work outside of your 15-minute city. So...there's not a wall stopping you leaving the city, your physical self. But once you're outside of the city, you can't buy anything or pay for anything. So you are geo-fenced. You're geo-fenced into that locale because you haven't got any means of supporting yourself outside of it. So this is the kind of thing that they're working on. This is the kind of thing that they're testing. They envisage, what ultimately, I suppose, the umbrella term that we could use for all these different things...15 minute city, human settlement, resilient city...is smart city. And that's definitely coming from a global governance level. The commitment is part of what they call the New Urban Agenda." - Iain Davis
Kazani's avatar
Kazani 2 months ago
The App That Google Couldn't Shut Down ReVanced Manager is an application that uses ReVanced Patcher to patch Android apps. 💪 Features: 💉 Patch apps: Apply any patch of your choice to Android apps 📱 Portable: ReVanced Patcher that fits in your pocket 🤗 Simple UI: Quickly understand the ins and outs of ReVanced Manager 🛠️ Customization: Configurable API, custom sources, language, signing keystore, theme and more You can download the most recent version of ReVanced Manager at revanced.app/download or from GitHub releases. Learn how to use ReVanced Manager by following the documentation.
Kazani's avatar
Kazani 2 months ago
If you've lost hope for Uptober, remember that November has historically been one of #Bitcoin 's most bullish months according to seasonality data. 10 days left before October Monthly closing Upvember. image
Kazani's avatar
Kazani 2 months ago
Elon promotes "X Chat" as private messaging but... Elon Musk assures that even if someone put a gun to his head, he could not access your messages: "Messages are fully encrypted, with no advertising hooks or strange "AWS dependencies," so I can't read your messages even if someone puts a gun to my head. You will also be able to make file transfers and audio/video calls." However, we can find this in the X help center: https://help.x.com/en/using-x/encrypted-direct-messages "Currently, we do not offer protection against man-in-the-middle attacks. As a result, if someone—a malicious employee or X itself as a result of a mandatory legal process—compromised an encrypted conversation, neither the sender nor the recipient would know. However, we are working on mechanisms for a future version that: · will allow devices to verify the authenticity of the content and the origin of a message (through "signature checks"); and · will allow a pair of users to verify the devices that have access to their encrypted conversations (through "security numbers"). When signature checks and security numbers are implemented, man-in-the-middle attacks should be difficult, if not impossible, and both senders and recipients should be alerted in case of an attack."
Kazani's avatar
Kazani 2 months ago
Some people feel envious when you're happy living your life differently because they made life choices based on what others are doing rather than what's good for them. When they suffer as a result of it, they want you to suffer too so that they don't feel bad about those choices.
Kazani's avatar
Kazani 2 months ago
About the recent #BTC Crash: What was the cause? Rumors.. Before discussing the current market situation, I would like to share with you the most probable reason for what happened on Friday (without conspiracy theories). The Binance exchange allowed the use of USDe (the ENA stablecoin), wBETH (wrapped ether), and BNSOL as collateral for margin positions. But there was a problem with the exchange. The exchange's system valued these 3 assets based on the price in its own order book, rather than relying on external sources. This means that if someone inside the exchange dumps a critical volume of these assets, their price would instantly drop. The exchange's internal system would automatically consider the collateral assets depreciated and start liquidating clients' positions. The exchange knew about this problem and announced on October 6th that it would switch from its own order book to oracles (a service that takes price data for an asset from all sources and provides an average value - giving an objective price and not accounting for manipulations on individual exchanges). However, the new system was only scheduled to start working on October 14th (8 days remained until the vulnerability was closed). On October 10th, a large whale, who owns coins from the Satoshi Nakamoto era of Bitcoin (since 2011) and had been actively moving them to Ethereum in recent months, opened a SHORT position of over $1,000,000,000 on BTC and ETH on the HyperLiquid exchange (most likely a close insider). Just a few minutes before Trump began making aggressive statements about China and announcing new tariffs... At that moment, someone intentionally dumped ~80M USDe on Binance (the price inside the exchange dropped from $1 to $0.65 - while it remained stable everywhere else). If oracles had been working, everything would have been fine. But the exchange's system, relying on the quote in its order book, decided that the "collateral" had depreciated and began liquidations of around ~$800M - $1B (including market maker positions). Against the backdrop of Trump's statements, the crowd was in a state of panic and started closing their long positions / getting liquidated (selling), opening short positions (selling), dumping spot on emotions (selling). The algorithms of the largest exchanges/managers are oriented towards Binance (the largest and most liquid exchange) and automatically started selling/hedging/reducing liquidity to avoid losses. And instantly, the $80M USDe dump in the order book, combined with the panic from the news, triggered an unprecedented cascade of liquidations of ~$19B according to public data, and more than $80B (according to rumors). Outcomes: 1. The short positions of the insider whale from the Satoshi Nakamoto era made a profit of $192M in a matter of minutes (and he has been converting his bitcoins to ether all year - he believes in the growth prospects of the alt market). 2. The market was completely cleared of leverage, loans (favorable). The capital of overconfident retail investors moved into the hands of insiders. 3. Binance has already stated that the technical problems were on their end and they are fixing the situation (switching to oracles), which means it is very likely that something similar will not happen again (now everyone will be afraid of a repeat). And technology like ChainLink is necessary for the stable functioning of exchanges in the future. The situation is terrible, insidious, but the market is also high-risk. Most likely, this is a one-time, systemic problem and will be fixed soon. The manipulation was "covered" by the news of Trump's speech. CZ is silent (although he usually urges to buy the dip and not panic), this is unsettling. From the beginning of the week, we will get more accurate data on what happened, the guilty parties, the consequences for them, and the victims (it might be volatile).
Kazani's avatar
Kazani 2 months ago
In the next couple of years, 24GB and even 32GB RAM on phones will feel less
Kazani's avatar
Kazani 2 months ago
🔄 REPOSTING FROM REDDIT 🚨 Post: Why centralised KYC exchanges allow ZEC. Clarification on the current state of ZEC Trusted Setup in their production blockchain. I have conducted a small research with DeepSeek and real persons from r/zec involved, and the conclusion is the following: Indeed, ZEC production blockchain has been upgraded to the Halo2 cryptographic system that allows to gradually eliminate and fade out the dependence on the well known and pain famous Trusted Setup ceremony by systematic updates of the Universal Reference String (URS). Halo2 does theoretically allow any blockchain participant to update the URS by some procedure. But DE FACTO, the URS string generated in the Trusted Setup ceremony stays UNMODIFIED on the current production blockchain of ZEC. This fact signifies if just one of the ceremony participants has not wiped out his key, all the ZEC hidden transactions on the production blockchain still can be traced out. Furthermore, in ZEC network, no production blockchain participant can easily update the URS because it does require the whole ZEC network protocol upgrade used in the production blockchain. The decision on protocol upgrade can be made only by ZEC core developers in their Electric Coin Company (ECC). It is like a hard fork, thus, extremely epic operation, that involves into cooperation all the blockchain participants. So, if just one key from Trusted Setup has not been wiped out, all the hidden transactions on the ZEC production blockchain can be traced by 3rd party, namely FBI and other 3-letters agencies belong to government authorities. That’s why ZEC can be easily listed on virtually all KYC centralised exchanges: a dedicated group of people can trace all the hidden transactions because there exists a key that has not been properly wiped out. Note, at the methodological point of view, we have no duty to prove there exists a key that has not been wiped out, it is SUFFICIENT we can’t prove it HAS BEEN wiped out. So, being growing in listings on KYC centralised exchanges, the ZEC price is skyrocketing, what we do exactly observe. 🚨 OP comments: 1. Pegasus malware backed by government, etc etc. 2. If the toxic waste for the production URS exists and is known to an adversary, then the privacy and integrity of the current ZCash production blockchain's Orchard pool are broken: All the today-made hidden transactions can be gradually traced out. ZEC coins can be created from thin air and spent out. That’s exactly why Halo2 was introduced at all: it allows a gradual RECOVERY from the compromised state to the secure state by updating URS value in the new Trusted Setup from URS1 (proven compromised) to URS2 (considered as honest). In a nutshell: if ZEC core devs do share URS1 , URS2, etc with FBI, the total project is a fully devastating SCAM. Halo2 can’t save us in this situation. Unlike in Monero only open source code matters. Monero core devs CAN NOT share something with FBI to explore our transactions! Now you see how devastating is the world: ZEC is skyrocketing and Nobody cares IT IS NOT a privacy coin at all. Because, I repeat, at methodological point of view we have no duty to prove that URS value is not compromised. It is SUFFICIENT we can’t prove it IS NOT compromised (by FBI, etc). ZEC is a fatal and fundamental philosophical SCAM because we always MUST TRUST in ZEC network. Actually, ZEC is an ideal model for traditional KYC financial institutions where a dedicated group of people MUST know all your transaction history. That’s precisely why they meet KYC so easily, appearing on most centralised exchanges and their price is skyrocketing like Bitcoin price. But, while Bitcoin does declare it is NOT private , it is NOT a scam. But ZEC declares it is Private but actually it is NOT, so they simply directly, pedantically lie. So they are SCAM by definition. https://www.reddit.com/r/Monero/comments/1o453e3/why_centralised_kyc_exchanges_allow_zec/
Kazani's avatar
Kazani 3 months ago
A programmer has revealed that his side project is “going for Satoshi’s wallet." He has shared a post on Substack outlining plans to use group-theory math and optimized elliptic-curve code to try to crack the Bitcoin founder’s keys. https://www.reddit.com/r/hacking/comments/1nyr4x0/i_used_all_the_math_i_know_to_go_from_352_miilion/
Kazani's avatar
Kazani 3 months ago
Satoshi himself can't use Bitcoin. Satoshi owns ~1M #BTC, but he can't use them. Why? Because every #Bitcoin transaction is public. The moment Satoshi moves a coin, the whole world knows. That's the paradox of Bitcoin: scarcity without privacy.
Kazani's avatar
Kazani 3 months ago
All drugs containing acetaminophen: OTC 1. Tylenol: The most well-known brand for acetaminophen. 2. Excedrin: Often used for headaches, it combines acetaminophen with aspirin and caffeine. 3. NyQuil: A cold and flu medication that includes acetaminophen for pain relief. 4. DayQuil: Similar to NyQuil but formulated for daytime use. 5. Advil Dual Action: Combines ibuprofen and acetaminophen for enhanced pain relief. 6. Alka-Seltzer Plus: Some formulations include acetaminophen for cold and flu relief. 7. Midol: Often used for menstrual pain, some versions contain acetaminophen. 8. Aspirin-Free Excedrin: Contains acetaminophen, caffeine, and other ingredients for headache relief. 9. Bayer Back & Body: Combines acetaminophen with aspirin for back pain relief. 10. Aleve-D: Some formulations may include acetaminophen for added pain relief. 11. Tylenol Extra Strength: A higher dose formulation of acetaminophen for more severe pain. 12. Advil PM: Some formulations may include acetaminophen along with diphenhydramine. Cold and Allergy Medications 1. Zyrtec-D: Some formulations may include acetaminophen for allergy relief. 2. Sudafed PE: Certain combinations may contain acetaminophen for cold symptoms. 3. Robitussin Cough + Chest Congestion DM: Some versions include acetaminophen for pain relief. 4. Vicks DayQuil: A daytime cold and flu relief option that contains acetaminophen. 5. Benadryl Allergy Plus Congestion: Certain formulations may contain acetaminophen for added relief. 6. Claritin-D: Some versions may include acetaminophen for allergy relief. RX 1. Percocet: A combination of oxycodone and acetaminophen used for pain relief. 2. Tylenol with Codeine: Combines acetaminophen with codeine for more severe pain. 3. Fioricet: Contains acetaminophen, butalbital, and caffeine, often prescribed for migraines. 4. Vicodin: A combination of hydrocodone and acetaminophen, used for moderate to severe pain. 5. Lortab: Another combination of hydrocodone and acetaminophen. 6. Norco: Similar to Vicodin, it combines hydrocodone with acetaminophen. 7. Roxicet: A combination of oxycodone and acetaminophen, used for pain management. 8. Cocet: Combines acetaminophen with oxycodone for pain relief. 9. Fentanyl Combination Products: Some formulations may combine fentanyl with acetaminophen for pain management. 10. Lorcet: A combination of hydrocodone and acetaminophen. 11. Percodan: Combines oxycodone with acetaminophen for pain management. 12. Tylenol with Tramadol: A combination of acetaminophen and tramadol for moderate to severe pain. Combination Products 1. Cold and Flu Formulations: Many products for cold and flu symptoms contain acetaminophen, such as Theraflu and Robitussin. 2. Pain Relievers: Some multi-symptom pain relievers may include acetaminophen along with other active ingredients. 3. Robitussin Multi-Symptom: Contains acetaminophen along with other ingredients for cough and cold relief. 4. Theraflu: Various formulations include acetaminophen for symptom relief. 5. Excedrin Tension Headache: Specifically formulated for tension headaches, containing acetaminophen. 6. Mucinex: Some formulations include acetaminophen for cold and flu symptom relief. 7. Coricidin HBP: Certain versions contain acetaminophen for cold symptoms, designed for those with high blood pressure. 8. Sominex: Some formulations may include acetaminophen for sleep aid with pain relief. Pediatric 1. Children's Tylenol: Liquid formulations specifically designed for children. 2. Infants' Tylenol: Liquid acetaminophen specifically designed for infants. 3. Children's Motrin: Some formulations may include acetaminophen alongside ibuprofen. 4. Children's Advil: Some formulations may include acetaminophen alongside ibuprofen. 5. Pediatric Fever Reducers: Various brands offer liquid acetaminophen specifically for children.
Kazani's avatar
Kazani 4 months ago
🧊 Hidden Firefox AI process consuming CPU resources? Firefox browser users have encountered serious performance issues after the release of version 141. Initially, suspicion fell on the new "Smart Tab Grouping" feature using AI, but an official Mozilla investigation (Bug 1982278) showed that the abnormally high CPU load is caused by another component, namely the hidden pilot experiment "Semantic Search in History" (places.semanticHistory). The "Smart Tab Grouping" has nothing to do with this. Everything was fine just yesterday. Today I opened Firefox, and as a result, there were sharp spikes in CPU load and power consumption. My fans shouldn't be this loud if I don't have more than 15 tabs open. After unsuccessfully restarting Firefox, I opened the task manager and found that a process called "Inference" fluctuates from 0.05% to 130% CPU usage, which explains the spikes in CPU load and power consumption. Killing the process solves the fluctuation problem but causes Firefox to crash, requiring a restart. What is going on? This problem never existed until today. — users complain on Reddit. 😱 Official Mozilla representatives have acknowledged the issue. The fix will be included in Firefox 143 (ctodea writes Target Milestone: → 143 Branch). 💡For full control and disabling of all local AI services, advanced users should experiment with some settings: In about:config the parameter browser.ml.enable is set to false. *The browser.ml.enable parameter is the main, kind of master key to all under-the-hood machine learning in Firefox. Setting this value to false completely deactivates the local AI engine (Inference process), making it impossible for any dependent features to work, including smart tab groups and the chatbot. In about:config the parameter browser.tabs.groups.smart.enabled is set to false. *Disables only the smart tab grouping feature. This step is not a guaranteed solution to the CPU overload problem, as the main source of the error lies in another component. Meanwhile, the AI engine itself (Inference process) remains active for other potential tasks. In about:config the parameter browser.ml.chat.enabled is set to false. *The browser.ml.chat.enabled parameter is a direct system switch that controls the activation and visibility of the AI chat integrated into Firefox. Source: Telegram | Russian OSINT image
Kazani's avatar
Kazani 4 months ago
Many people have heard of onion routing in Tor and have a rough idea of how it works. However, fewer people know about garlic routing. That's why I decided to write a short note about what it is and how it works in I2P🚥 How is a message sent? ✉️ In I2P, your message travels through a tunnel—a chain of randomly picked computers (nodes) on the network. Each node only knows where to send the data next, not the message content, thanks to garlic encryption🧄. Your message is first encrypted for the recipient using end-to-end encryption. Asymmetric encryption🔐 uses a public key to encrypt and a private key to decrypt. How are encryption layers created?🔒 Now the process of wrapping the message in layers begins. Imagine that you have a tunnel with three nodes: A, B, C. The encrypted message (already protected for the recipient) must be passed through these nodes so that each one knows only the next step. To do this, I2P creates encryption layers one for each node. Each layer is additional encryption with instructions for a specific node, such as “forward to node B” or “send to recipient.” It works like this: you encrypt the message with the public key of node C, adding the instruction “forward to node B.” You encrypt this packet again with the public key of node B with the instruction “forward to node A.” Then the entire packet is encrypted with the public key of node A with the instruction “send to recipient.” When you send the packet, it goes to node A. Node A opens its layer with its secret key, sees the instruction “forward to node B” and forwards the data. The data remains encrypted for other nodes. Node B opens its layer, sees the instruction “forward to node C” and forwards it. Node C opens the last layer, sees that it needs to be sent to the recipient, and does so. Each node only knows its own step and does not see the content of the message, its sender, or its recipient. Why is encryption called garlic?🧄 Now, let's talk about “garlic” encryption in detail. In I2P, your message is packed with others into one encrypted packet🗂, called garlic. This packet may include your message, others’ messages, and network data like tunnel commands⚙️ All these messages are encrypted together, and each layer of encryption (for nodes A, B, C) covers the entire large packet, not each message individually. When node A opens its layer, it sees the instruction for the entire packet, such as “forward to node B,” and sends it on. It does not know how many messages are inside, whose they are, or where they are going. Node B does the same, opening its layer and forwarding the packet to node C. Node C, opening the last layer, can send the entire packet or parts of it (depending on the instruction) to the recipients, but it does not know how many messages are inside and to whom they are addressed. This makes it impossible to determine whose message is where, even when observing the network. Each message in the packet is protected by individual encryption for its recipient🔑 so that no one but the intended person can open it. The messages inside the packet are not explicitly separated they are sort of stuck together into one continuous encrypted piece of data. I2P can also add “garbage” data🗑 fake messages that masquerade as real ones but mean nothing. In addition, I2P mixes♻️ your packet with other data on the network and can add random delays during transmission. This makes it difficult to analyze traffic. Tunnels change every 10 minutes, and the nodes in them are selected again, so it is impossible to track the path. How does garlic encryption differ onion encryption?🧅 In onion encryption, each message is encrypted separately and transmitted through its own chain of nodes. Garlic encryption not only wraps your message in layers of encryption, but also combines it with other messages and fake data into a single encrypted packet.
Kazani's avatar
Kazani 5 months ago
EU age verification app to ban any Android system not licensed by Google Reddit: https://www.reddit.com/r/BuyFromEU/comments/1mah79o/eu_age_verification_app_to_ban_any_android_system/ The EU is currently developing a whitelabel app to perform privacy-preserving (at least in theory) age verification to be adopted and personalized in the coming months by member states. The app is open source and available here: https://github.com/eu-digital-identity-wallet/av-app-android-wallet-ui. Problem is, the app is planning to include remote attestation feature to verify the integrity of the app: This is supposed to provide assurance to the age verification service that the app being used is authentic and running on a genuine operating system. Genuine in the case of Android means: • The operating system was licensed by Google • The app was downloaded from the Play Store (thus requiring a Google account) • Device security checks have passed While there is value to verify device security, this strongly ties the app to many Google properties and services, because those checks won't pass on an aftermarket Android OS, even those which increase security significantly like GrapheneOS, because the app plans to use Google "Play Integrity", which only allows Google licensed systems instead of the standard Android attestation feature to verify systems. This also means that even though you can compile the app, you won't be able to use it, because it won't come from the Play Store and thus the age verification service will reject it. The issue has been raised here but no response from team members as of now. In short: You can only be a full citizen of the EU if you accept the ToS from Google.
Kazani's avatar
Kazani 6 months ago
Hal Finney sent this email days after Bitcoin was created. When he wrote this, #Bitcoin cost $0 image
Kazani's avatar
Kazani 6 months ago
Pomozen ⏳ A modern, open-source Pomodoro timer designed to transform the way you work and study. Say goodbye to mental fatigue and hello to peak concentration with structured work intervals and smart breaks. Why choose Pomozen? • Track your progress with detailed statistics and custom labels for tasks. • Gentle reminders ensure you never miss a focus or break period. • Integrated hydration reminders keep you feeling your best. • Fully customize your Pomodoro cycles—from focus duration to break times—to fit your unique rhythm. Download Pomozen from IzzyOnDroid: Source code: Github -
Kazani's avatar
Kazani 6 months ago
Enchat is a tool for private communication with encryption. Its key features include no accounts, strong AES-256 encryption, and the creation of unique temporary keys for each session. Once a session ends, messages are no longer accessible, and usernames and timestamps are also encrypted. The tool offers secure file sharing up to 5 MB, anonymity via Tor and cross-platform compatibility. Encryption occurs on users' devices, ensuring the security of the content. Enchat is compatible with Python 3.6 and above and runs on Linux, macOS, and Windows, though it is recommended to use strong passphrases and set up your own servers for added security.
Kazani's avatar
Kazani 6 months ago
The Nine Principles of Propaganda image