m0wer's avatar
m0wer
m0wer@stacker.news
npub1w3va...4c5c
Bitcoiner.
m0wer's avatar
m0wer 2 months ago
DEF CON 33 - Kill List: Hacking an Assassination Site on the Dark Web - YouTube Four years ago, Chris found a vulnerability with a murder for hire site on the dark net. He could exploit that vulnerability to intercept the murder orders that were being placed: names, addresses, pattern of life information, photos, and, in some cases, bitcoin payments. He reached out to Carl for help, and a small team was built in secret to intercept and triage these orders. However, after their warnings to the police fell on deaf ears, they ultimately decided to warn the targets on the kill list directly. After an initial series of successes, the investigation expanded rapidly and they formed a global cooperation with the FBI and police forces around the world, resulting over 175 murder orders being disclosed, 34 arrests 28 convictions and over 180 years of prison time being sentenced. This talk will be about those years: about the dangers and threats the team had to navigate, the times of isolation when the police wouldn’t take them seriously, about raids in Romania to uncover the cyber-criminal gang running the site and the psychological impact of racing against time to try to stop people getting murdered.
m0wer's avatar
m0wer 2 months ago
Primexz/lndnotify: ⚡️ LND Lightning Notification Client A notification system for Lightning Network nodes that monitors and notifies about important events. This project is heavily inspired by balanceofsatoshis, but with the aim of offering much greater customisation and a wider range of notification destinations.
m0wer's avatar
m0wer 2 months ago
PEP 810 – Explicit lazy imports This PEP introduces syntax for lazy imports as an explicit language feature: ```python lazy import json lazy from json import dumps ``` Lazy imports defer the loading and execution of a module until the first time the imported name is used, in contrast to ‘normal’ imports, which eagerly load and execute a module at the point of the import statement. By allowing developers to mark individual imports as lazy with explicit syntax, Python programs can reduce startup time, memory usage, and unnecessary work. This is particularly beneficial for command-line tools, test suites, and applications with large dependency graphs. This proposal preserves full backwards compatibility: normal import statements remain unchanged, and lazy imports are enabled only where explicitly requested.
m0wer's avatar
m0wer 3 months ago
Jammer! He Just Wanted Privacy, But This Little Device Caused Big Trouble - YT Gary Bojczak drove a truck for a construction company that was constantly tracking his vehicle. Plugging a little dongle into the cigarette lighter could block that surveillance, but ended up causing way more problems than it solved.
m0wer's avatar
m0wer 3 months ago
Lo que no veo tan claro es si es evitable la degeneración del estado. Al final, el poder atrae a quien lo ansía y está dispuesto a lo que sea por él. No veo casos en los que la concentración de poder no haya traído con sí abusos y un resultado neto negativo. Y cualquier barrera o límite que se ha intentado poner para limitar el tamaño de un estado, ha fallado. Entonces la pregunta ya no es si estado pequeño ideal o anarquía real con sus problemas. Es o estado que crecer hasta reventar o intentar otra cosa.
m0wer's avatar
m0wer 3 months ago
Small experiment: I'll give 5k sats to the first reply with torrent files/magnets or direct download links that work for the TV show “Bad Trips Abroad” (both seasons).
m0wer's avatar
m0wer 3 months ago
Privacy Is Just the Start. Now Let’s Make It Sustainable You locked down your data. Now what? Cool. You’re not leaking location to Meta. Your phone’s running Graphene. Your browser’s hardened. But here’s the part they don’t tell you: privacy alone won’t save your mind. The noise still gets in. The real enemy now isn’t just surveillance. It’s burnout. Overload. A thousand signals screaming for your attention some from Big Tech, some from your own side.
m0wer's avatar
m0wer 3 months ago
The Fourth Turning Explained: Why It Matters and How to Prepare for What’s Next https://www.resilientnotreliant.com/articles/the-fourth-turning-explained The Fourth Turning is more than just a historical theory—it’s a framework that helps us understand the cycles of history and how they shape the world we live in today. Developed by historians William Strauss and Neil Howe, this theory suggests that history moves in cycles, each lasting about 80-100 years, and broken into four distinct phases, or “turnings.” These turnings reflect patterns of social and political upheaval, growth and rebirth. Understanding them can offer valuable insight into where we are headed.
m0wer's avatar
m0wer 3 months ago
fiatjaf/nostr-web-archiver: browser extension to replace archive.org Nostr Archiver Extension is a browser extension for archiving websites and publishing them to blossom. This is a fork of ArchiveWeb.page with the goal of replacing archive.org with a decentralized, crowdsourced, and crowdfunded effort to preserve the legacy of the web, fix the problem of broken links, and harness the power of the multitude instead of delegating this important job to a single organization. The extension creates, stores, and replays high-fidelity web archives stored directly in the browser's storage (via IndexedDB). Archives can be published to Nostr relays using the Blossom protocol for decentralized storage and sharing.
m0wer's avatar
m0wer 3 months ago
SporeStack: API-driven VPS hosting pis in Bitcoin with no KYC SporeStack is a VPS (Virtualized Private Server) reseller. You can pay with Monero, Bitcoin, or Bitcoin Cash and start launching servers. There's no KYC (Know-Your-Customer) and no email required. Account funds are held on a "token." You can launch a few servers from this website or CLI, or use our API to launch and manage thousands of servers. We've been around since 2017 and we're proud of our track record.
m0wer's avatar
m0wer 3 months ago
Start, Stop, Continue Retrospectives: A Complete Guide The Start, Stop, Continue retrospective model is a simple and effective framework for personal and professional development. With a clear structure for growth, it lets you and your whole team reflect on your efforts from a project or initiative and brainstorm techniques to improve in the future. And when you’re ready to learn more about yourself outside of work, you can use it for personal reflection too.
m0wer's avatar
m0wer 3 months ago
🚨 LaLiga is Breaking Spain's Internet in the Name of "Anti-Piracy" Spanish courts gave LaLiga carte blanche to block entire IP ranges during football matches, supposedly to fight streaming piracy. The result? Massive collateral damage - legitimate businesses, government sites (including Spain's Royal Academy), research centers, and even football clubs' own websites get blocked. LaLiga blocks around 3,000 IP addresses every weekend, using a sledgehammer approach that takes down CDN nodes hosting both illegal streams AND perfectly legal content. Despite 26+ million takedown notices in H1 2025, only 11% of flagged streams actually go offline. The site **hayahora.futbol** lets you check if your domain is caught in LaLiga's overly broad net. This isn't about "four geeks" - it's about fundamental internet infrastructure being weaponized by a sports league with zero accountability. For example is currently blocked...
m0wer's avatar
m0wer 3 months ago
To vibe or not to vibe > The discourse about to what level AI-generated code should be reviewed often feels very binary. Is vibe coding (i.e. letting AI generate code without looking at the code) good or bad? The answer is of course neither, because “it depends”. So what does it depend on? When I’m using AI for coding, I find myself constantly making little risk assessments about whether to trust the AI, how much to trust it, and how much work I need to put into the verification of the results. And the more experience I get with using AI, the more honed and intuitive these assessments become. ...
m0wer's avatar
m0wer 3 months ago
Discovered a flaw in Tangem cards that makes brute force attacks possible https://xcancel.com/P3b7_/status/1968313961486614723 @DonjonLedger discovered a flaw in Tangem cards that makes brute force attacks possible. As always, the Donjon followed responsible disclosure to inform Tangem, user protection is our priority. We can now reveal our findings in full: 🧵👇
m0wer's avatar
m0wer 3 months ago