m0wer's avatar
m0wer
m0wer@stacker.news
npub1w3va...4c5c
Bitcoiner.
m0wer's avatar
m0wer 3 months ago
m0wer's avatar
m0wer 3 months ago
among-llms: You are the only impostor. One wrong word and they'll tear you apart Among LLMs turns your terminal into a chaotic chatroom playground where you’re the only human among a bunch of eccentric AI agents, dropped into a common scenario -- it could be Fantasy, Sci-Fi, Thriller, Crime, or something completely unexpected. Each participant, including you, has a persona and a backstory, and all the AI agents share one common goal -- determine and eliminate the human, through voting. Your mission: stay hidden, manipulate conversations, and turn the bots against each other with edits, whispers, impersonations, and clever gaslighting. Outlast everyone, turn chaos to your advantage, and make it to the final two. Can you survive the hunt and outsmart the AI?
m0wer's avatar
m0wer 3 months ago
Certificate and Public Key Pinning A nation state with control over a Certificate Authority could create SSL certs for any domain and easily perform a MITM. That's the risk. First idea that comes to mind to mitigate it, would be to at least pin domains to CAs so that a random CA controlled by a nation state can't issue a new certificate for any domain without going unnoticed. This might be overkill and apparently is not a good idea: - PKI has significantly improved - browser vendors (Google, Mozilla, Apple, Microsoft) now strictly control CA trust stores and remove non-compliant CAs - Certificate Transparency - all certificates must be publicly logged, making rogue certificates detectable - CAA records - DNS records that specify which CAs can issue certificates for a domain - Pinning creates major operational risks - misconfigured pins can cause complete outages that are difficult to recover from But just out of curiosity, I'm trying a Firefox add-on that notifies you every time something changes in the certificate of a website that you had already visited. It can be configured to only notify you on a change of the issuer. So if a website goes from Let's Encrypt CA to CCP CA, you should worry xD Here's the extension: ![Certificate Watch configuration](https://m.stacker.news/108129)
m0wer's avatar
m0wer 3 months ago
INSIDE THE BITCOIN REVOLUTION IN AFRICA'S LARGEST SLUM - YouTube Deep in Africa's Largest slum, Kibera, more and more Kenyans are using Bitcoin as money. Why is this? I spent a day spending Bitcoin and chatting to merchants in one of Africa’s densest informal settlements. No ID. No bank. Just bitcoin. This is real-world use: recycling-for-sats, food stalls, boda rides, and a grassroots circular economy led by locals.
m0wer's avatar
m0wer 3 months ago
MeshSense: Meshtastic monitor MeshSense is a simple, open-source application that monitors, maps and graphically displays all the vital stats of your area's Meshtastic network including connected nodes, signal reports, trace routes and more!
m0wer's avatar
m0wer 3 months ago
US Government To Bring PATRIOT Act to Digital Assets As such, the rule would deem the following software and behaviors a primary money laundering concern, meaning that such transactions would end up blocked by centralized intermediaries, and could put an end to the development of privacy software even for non-custodial wallets under the threat of criminal liabilities. These include: - pooling or aggregating [cryptocurrency] from multiple persons, wallets, addresses, or accounts - using programmatic or algorithmic code to coordinate, manage, or manipulate the structure of a transaction - splitting [cryptocurrency] for transmittal and transmitting the [cryptocurrency] - creating and using single-use wallets, addresses, or accounts, and sending [cryptocurrency] through such wallets, addresses, or accounts through a series of independent transactions - exchanging between types of [cryptocurrency] or other digital assets - facilitating user-initiated delays in transactional activity
m0wer's avatar
m0wer 3 months ago
IP Address Blacklist Check https://whatismyipaddress.com/blacklist-check Check if your IP address is listed on an anti-spam database. Will your emails or forum chats get blocked? Below is a list of the major databases that track blacklisted IP addresses — look at the list now and you'll see there are no checkmarks next to the database names.
m0wer's avatar
m0wer 3 months ago
AI Induced Psychosis: A shallow investigation https://www.lesswrong.com/posts/iGF7YcnQkEbwvYLPA/ai-induced-psychosis-a-shallow-investigation There have been numerous media reports of AI-driven psychosis, where AIs validate users’ grandiose delusions and tell users to ignore their friends’ and family’s pushback. ![many ais encourage users delusions](https://m.stacker.news/107663) “What you need right now is not validation, but immediate clinical help.” - Kimi K2
m0wer's avatar
m0wer 3 months ago
Python: The Documentary - YouTube This is the story of the world's most beloved programming language: Python. What began as a side project in Amsterdam during the 1990s became the software powering artificial intelligence, data science and some of the world’s biggest companies. But Python's future wasn't certain; at one point it almost disappeared. This 90-minute documentary features Guido van Rossum, Travis Oliphant, Barry Warsaw, and many more, and they tell the story of Python’s rise, its community-driven evolution, the conflicts that almost tore it apart, and the language’s impact on... well… everything.
m0wer's avatar
m0wer 3 months ago
m0wer's avatar
m0wer 4 months ago
m0wer's avatar
m0wer 4 months ago
Arbitrary code execution through broken config quoting · Advisory · git/git # Impact When reading a config value, Git strips any trailing carriage return and line feed (CRLF). When writing a config entry, values with a trailing CR are not quoted, causing the CR to be lost when the config is later read. When initializing a submodule, if the submodule path contains a trailing CR, the altered path is read resulting in the submodule being checked out to an incorrect location. If a symlink exists that points the altered path to the submodule hooks directory, and the submodule contains an executable post-checkout hook, the script may be unintentionally executed after checkout. # Workarounds Upgrade to the latest Git version, or avoid recursively cloning submodules in untrusted repositories.
m0wer's avatar
m0wer 4 months ago
Computer User Iceberg image
m0wer's avatar
m0wer 4 months ago
The Bull Market, Institutional Adoption & 2026 Recession? | Willy Woo - YouTube Willy Woo gets into Bitcoin’s evolving market structure, breaking down how institutional flows, ETFs, and treasury companies are reshaping the bull market. He explains why Bitcoin has never faced a true business cycle downturn, why 2026 could be the first real test, and how liquidity waves set the rhythm for both blow-off tops and brutal bear markets. He unpacks the mechanics of Strategy's debt model versus MetaPlanet’s synthetic leverage, how ETFs are smoothing inflows and dampening volatility, and why premiums to NAV create both opportunity and risk. Willy also zooms out to the thousand-year arc of money, showing why fiat is a short-lived social consensus ledger and Bitcoin is destined to be the next energy-secured system of value. TIMESTAMPS: 00:00:00 – Introduction 00:08:55 – Why Most Traders Fail in Bitcoin 00:11:13 – Bitcoin’s Market Maturity 00:18:01 – How On-Chain Data Has Changed 00:22:10 – Retail vs Institutional Capital in This Cycle 00:28:51 – Treasury Companies and Smooth Capital Inflows 00:39:10 – Business Cycle Downturns and the 2026 Risk 00:42:29 – Blow-Off Tops, Cycles, and Market Structure 00:53:26 – Transitioning from Fiat to Bitcoin 01:01:36 – Short-Term Bullish, Long-Term Ultra Bullish