nym's avatar
nym
nym@primal.net
npub1hn4z...htl5
nym's avatar
nym 1 year ago
End-to-end encrypted, peer-to-peer VPN tunnels for hackers We are a community driven service for the hackers and the truely paranoid that want to establish multiple peer-to-peer and end-to-end encrypted VPN tunnels between their devices to faciliate secure communication between these, no matter where they are located. We only provide the encrypted transport between your devices, you bring everything else yourself. originally posted at
nym's avatar
nym 1 year ago
Why I'm quitting the Washington Post I’ve worked for the Washington Post since 2008 as an editorial cartoonist. I have had editorial feedback and productive conversations—and some differences—about cartoons I have submitted for publication, but in all that time I’ve never had a cartoon killed because of who or what I chose to aim my pen at. Until now. The cartoon that was killed criticizes the billionaire tech and media chief executives who have been doing their best to curry favor with incoming President-elect Trump. There have been multiple articles recently about these men with lucrative government contracts and an interest in eliminating regulations making their way to Mar-a-lago. The group in the cartoon included Mark Zuckerberg/Facebook & Meta founder and CEO, Sam Altman/AI CEO, Patrick Soon-Shiong/LA Times publisher, the Walt Disney Company/ABC News, and Jeff Bezos/Washington Post owner. While it isn’t uncommon for editorial page editors to object to visual metaphors within a cartoon if it strikes that editor as unclear or isn’t correctly conveying the message intended by the cartoonist, such editorial criticism was not the case regarding this cartoon. To be clear, there have been instances where sketches have been rejected or revisions requested, but never because of the point of view inherent in the cartoon’s commentary. That’s a game changer…and dangerous for a free press. Over the years I have watched my overseas colleagues risk their livelihoods and sometimes even their lives to expose injustices and hold their countries’ leaders accountable. As a member of the Advisory board for the Geneva based Freedom Cartoonists Foundation and a former board member of Cartoonists Rights, I believe that editorial cartoonists are vital for civic debate and have an essential role in journalism. There will be people who say, “Hey, you work for a company and that company has the right to expect employees to adhere to what’s good for the company”. That’s true except we’re talking about news organizations that have public obligations and who are obliged to nurture a free press in a democracy. Owners of such press organizations are responsible for safeguarding that free press— and trying to get in the good graces of an autocrat-in-waiting will only result in undermining that free press. As an editorial cartoonist, my job is to hold powerful people and institutions accountable. For the first time, my editor prevented me from doing that critical job. So I have decided to leave the Post. I doubt my decision will cause much of a stir and that it will be dismissed because I’m just a cartoonist. But I will not stop holding truth to power through my cartooning, because as they say, “Democracy dies in darkness”. originally posted at
nym's avatar
nym 1 year ago
Linux Context Switching Internals: Part 1 - Process State and Memory Context switching is necessary for a high-throughput and responsive system where all processes make progress despite limited execution resources. But, as we discussed in the previous article, it also has performance costs which cascade through various indirect mechanisms, such as cache and TLB eviction. When building performance-critical systems or debugging performance issues due to context switching, it becomes important to understand the internal implementation details to be able to reason through the performance issues and possibly mitigate them. Not only that, it leads you to learn many low-level details about the hardware architecture, and makes you realize why the kernel is so special. At first glance, context switching seems straightforward—save the current process's registers, switch page tables and stacks, and restore the new process's registers. However, the reality is much more complex, involving multiple data structures, hardware state management, and memory organization. To fully grasp context switching, we need to understand few key foundational concepts about the Linux kernel and X86-64 architecture. originally posted at
nym's avatar
nym 1 year ago
Let's Encrypt to end OCSP support in 2025 Well, the writing has been on the wall for some years now, arguably over a decade, but the time has finally come where the largest CA in the World is going to drop support for the Online Certificate Status Protocol. originally posted at
nym's avatar
nym 1 year ago
Rules for Writing Software Tutorials Most software tutorials are tragically flawed. Tutorials often forget to mention some key detail, preventing readers from replicating the author’s process. Other times, the author brings in hidden assumptions that don’t match their readers’ expectations. The good news is that it’s easier than you think to write an exceptional software tutorial. You can stand out in a sea of mediocre guides by following a few simple rules. originally posted at
nym's avatar
nym 1 year ago
Practical Byzantine fault tolerance algorithm for aggregating node preferences https://www.nature.com/articles/s41598-024-82579-1.pdf Consensus algorithms play a critical role in maintaining the consistency of blockchain data, directly affecting the system’s security and stability, and are used to determine the binary consensus of whether proposals are correct. With the development of blockchain-related technologies, social choice issues such as Bitcoin scaling and main chain forks, as well as the proliferation of decentralized autonomous organization (DAO) applications based on blockchain technology, require consensus algorithms to reach consensus on a specific proposal among multiple proposals based on node preferences, thereby addressing the multi-value consensus problem. However, existing consensus algorithms, including Practical Byzantine Fault Tolerance (PBFT), do not support nodes expressing preferences. Instead, the proposal to reach consensus is directly decided by specific nodes, with other nodes merely verifying the proposal’s validity, which can easily result in monopolistic or dictatorial outcomes. In response, we proposed the Aggregating Preferences with Practical Byzantine Fault Tolerance (AP-PBFT) consensus algorithm, which allows nodes to express preferences for multiple proposals. AP-PBFT ensures the validity of consensus results through a consensus output protocol and incentivizes nodes to act honestly during the consensus process through an incentive mechanism. First, AP-PBFT leverages Verifiable Random Function to select both consensus nodes and a primary node from the candidates. The primary node gathers proposals, assembles them into a proposal package, and broadcasts it to other consensus nodes. The consensus nodes independently vote to express their preferences for different proposals in the package, execute the consensus output protocol to reach local consensus, and the primary node aggregates these results to form the global consensus. Once the global consensus is finalized, AP-PBFT evaluates node behavior based on the consensus output protocol, penalizes nodes that acted maliciously, and rewards those that adhered to the protocol. Additionally, nodes can interact and adopt different strategies while executing the consensus output protocol, which can influence the consensus outcome. Therefore, we established an evolutionary game model based on hypergraph to analyze these interactions. Theoretical analysis shows that the incentive mechanism in AP-PBFT effectively encourages nodes to honestly follow the consensus output protocol, ensuring that AP-PBFT satisfies the properties of consistency, validity, and termination. Finally, the simulation results demonstrate that the AP-PBFT algorithm possesses good scalability and the capability to handle dynamic changes in nodes, surpassing some mainstream consensus algorithms in terms of transaction throughput and consensus achievement time. Moreover, AP-PBFT can incentivize honest behavior among consensus nodes, thereby enhancing the reliability of consensus and strengthening the security of the network. originally posted at
nym's avatar
nym 1 year ago
Bitcoin's Sharia Legitimacy: Strength and Implications as a Financial Tool https://journal.iain-manado.ac.id/index.php/TJEBI/article/view/3232/1731 Abstract This study reconciles conflicting viewpoints on Bitcoin by offering a Shariah-based perspective. It utilizes contemporary interpretations of Quranic verses, fiqh principles, and hadith to demonstrate Bitcoin's potential as a currency. A qualitative approach, combined with normative analysis, interdisciplinary perspectives (economics and Islamic law), and a descriptive-comparative method based on David Ricardo's theory of comparative advantage, was employed to assess Bitcoin's legitimacy as a medium of exchange in Islamic economic contexts. The findings indicate that Bitcoin shares attributes with gold, such as scarcity, divisibility, mobility, and durability, making it a suitable store of value. While institutions like MUI and LBM NU East Java classify Bitcoin as haram due to ambiguity, harm, and speculation, this study contends that a correct understanding reveals Bitcoin's compliance with fiqh principles. Blockchain transparency reduces dharar (harm) and manipulation, offering an ethical alternative to fiat currency. Bitcoin's intrinsic worth aligns with Islamic financial principles, unlike fiat currency, which is prone to inflation and value depreciation. By understanding Bitcoin's foundations, consumers can minimize gharar (uncertainty), dharar, and speculation. Blockchain technology ensures transparency, prevents manipulation and abuse, and allows for price formation based on supply and demand, akin to traditional currencies. These attributes highlight Bitcoin's potential as a Sharia-compliant medium of exchange that addresses the limitations of fiat currency while providing inflation protection. Introduction In the age of globalization and digitalization, the need for efficient payment systems has spurred financial innovations, including credit cards and cashless societies. The emergence of cryptocurrency, particularly Bitcoin, represents a significant advancement in financial technology. Bitcoin stands out for its ease of use, decentralized system, and independence from intermediaries like banks. Powered by blockchain technology, Bitcoin is a digital currency without a physical form, relying on hashed data blocks for secure and transparent transaction validation. Since its inception in 2009, Bitcoin has experienced remarkable growth, attracting attention from investors, economists, and policymakers. By 2024, Bitcoin ranks ninth among the top ten global financial assets, trailing only gold in market capitalization. Its deflationary tendencies, divisibility, and resistance to centralized control position it as a potential alternative to fiat currencies. However, its adoption remains challenging, particularly in Islamic finance contexts. In Indonesia, the world's most populous Muslim-majority country, concerns about Bitcoin's Sharia legitimacy are especially significant. Divergent legal interpretations, including fatwas from the Indonesian Ulema Council (MUI) and LBM NU East Java, raise concerns about gharar (uncertainty), dharar (damage), and speculative elements in Bitcoin transactions. These issues have created uncertainty among Indonesian Muslims regarding Bitcoin's permissibility as a financial tool. The development of Bitcoin has provoked significant debates within the Indonesian Muslim community, influencing economic, ethical, and religious perspectives. Economically, Bitcoin attracts younger investors and promotes financial inclusion for the unbanked, though its volatility raises concerns about risk-sharing in Islam. Religiously, fatwas declaring Bitcoin haram emphasize issues of gharar, dharar, and speculation, while proponents highlight blockchain's transparency and alignment with Islamic principles. Ethically, Bitcoin challenges perceptions of gambling-like activities while offering opportunities to promote riba-free and inclusive financial practices. Despite being recognized as a commodity in Indonesia, the lack of Islamic banking norms limits its adoption. Bitcoin's impact underscores the need for clear guidance that integrates Islamic principles with modern financial innovations. This study addresses these dissenting views by providing a Sharia-based perspective, utilizing interpretations of Quranic verses, fiqh principles, and hadith. It also examines Bitcoin’s comparative advantages over fiat currencies through David Ricardo’s theory of comparative advantage, which emphasizes economic superiority through unique, hard-to-imitate attributes like innovation and efficiency. Bitcoin's decentralized structure, resistance to inflation, and potential to enhance financial inclusivity exemplify these attributes, making it a subject of significant interest. This study's novelty lies in its focus and interdisciplinary methodology. Previous research often concentrated on Bitcoin's technical aspects, risks, and market volatility, or critiqued its compliance with Sharia principles without offering practical solutions. In contrast, this research combines Islamic jurisprudence, economics, and blockchain technology to evaluate Bitcoin’s legitimacy. Focusing on Indonesia, it analyzes cultural, legal, and religious factors influencing Bitcoin adoption. It explores how blockchain technology can address Islamic finance challenges such as gharar and dharar while assessing Bitcoin’s potential as a Sharia-compliant, inflation-resistant medium of exchange. This study provides a practical Sharia framework for cryptocurrencies in the Indonesian context, contributing uniquely to the fields of Islamic and digital finance. originally posted at
nym's avatar
nym 1 year ago
Influence of US Inflation Rate, Interest Rate, and Bitcoin Towards Gold Price Abstract The purpose of this paper is to investigate the influence of inflation rate and interest rate of The United States towards the gold’s price. Besides that, the movement of Bitcoin and gold has also been examined in this paper. The past 30 years of historical data of the inflation rate, interest rate and the gold’s price has been applied in this study to examine the effect of inflation and interest rate towards the gold price. Other than that, the past 30 months of the Bitcoin’s price has also been applied in the research. Through the research, it has found that the inflation rate and the interest rate have a negative relationship with the gold’s price. In addition, this paper has also shown that the movement of Bitcoin’s price and gold’s price is in a same direction. In other words, the movement of these assets is positively correlated in which when the Bitcoin price’s increase, the price of gold is also increase. Introduction Gold has been one of the best instruments to hedge against inflation. Besides that, the gold is considered as one of the most liquid assets. This is because people are believing that the price of the gold is relatively stable as compared to other assets such as the stocks and cryptocurrency. Back in the days, the United States had adopted a concept in which the United State Dollar (USD) is pegged with the gold. This concept is also known as the Gold Standard. The concept behind is assume that the value of a currency is fixed relatively to gold. However, this concept was abandoned by the U.S. in 1971 due to the U.S would like to control inflation and avoid foreign countries overloading the system by exchanging their dollars for gold. Today, there are many investors still choose gold as the preferable assets to invest because there confident on the dollar is not as high as before when the States is still adopting the gold standard. According to Winters (2022), he had shared the words from Jim Cramer the host for CNBC’s Mad Money and Investing Club. As outlined by Jim Cramer, due to its uniqueness as a commodity and its long history as a reliable medium of exchange, gold has a stable value. Hence, the gold market would also considered as one of the high volatile markets. From the aspect of the foreign currency (FOREX) market, gold is denoted as XAU in the FOREX market, and it is paired with the USD become the pairing called XAU/USD. The XAU/USD is represented the spot gold price in troy ounce digitally because any positionin the market is not trading the physical gold. In the trading of XAU/USD, it usually influenced by the inflation and interest rate in the U.S. Other than that, the relationship between the Bitcoin and XAU/USD is also compared in this research. Bitcoin isone of the largest market caps as compared to the others cryptocurrency. It usually been called as the digital gold due to its scarcity and the difficulties to obtain it is high. The study of the XAU/USD has remained relatively unpopular studied topics as compared to the stock market. This is due to the exposure of the XAU/USD as well as the FOREX market in Malaysia is relatively unpopular among the people. Other than that, there are restrictions for the Malaysians to trade in the FOREX market unless with the authorised dealers such as banks and licensed money changer. However, gold was one of the assets in which people prefer to purchase due to stability of price. Hence, studying the effect of the inflation rate and interest rate towards the XAU/USD is important so that it may reflects the effect caused to the overall gold market. Due to the pandemic of COVID-19, the Fed of the United States had announced the unlimited quantitative easing (QE) in order to stimulate the economics of the U.S. The QE is a monetary policy that lowering down the interest rate on the savings and loans to increase the economics activities in the nation. Hence, it has driven the price of the gold as well as the XAU/USD hikes. This is because the willingness of the people to take money to invest is relatively high as compared to save it in normal saving accounts. Recently, due to the unlimited QE and the conflict between the Russia and Ukraine, it has cause severe inflation in the U.S. Hence, the Fed has started to conduct a move called tapering to control the nation’s inflation. Tapering can be known as the action of contractionary monetary policy in which started to withdraw the monetary stimulus plan that been used to stimulate the economics. Therefore, the Fed has started to hike the interest in the country and causing most of the assets’ price such as stocks and gold as well as the rate of XAU/USD to fall. Up to November, the Fed has hiked the interest rate sixth times consecutively and it has hiked up to 75 basis point for the latest announcement. On the other hand, the so-called digital gold, Bitcoin has also gone to the same direction as the XAU/USD in this event. However, as compared to the XAU/USD, there are other factors that may also affect the price of Bitcoin such as the regulatory problems that has been unsolved until now. Other than that, the collapse of the exchange has also created panic sell on the digital assets. Hence, this study may also study the relationship of Bitcoin with the XAU/USD. In this research, the affection of the changes of the inflation rate and interest rate as well as the movement of Bitcoin towards the XAU/USD will be studied. However, the studied on the relationship between the chosen variables and the XAU/USD are limited. This is due to the data obtained might not provide an accurate result. originally posted at
nym's avatar
nym 1 year ago
6 AI-Related Security Trends to Watch in 2025 # Generative Artificial Intelligence and Security: Key Trends and Concerns Most industry analysts expect organizations will accelerate efforts to harness generative artificial intelligence (GenAI) and large language models (LLMs) in a variety of use cases over the next year. Typical examples include customer support, fraud detection, content creation, data analytics, knowledge management, and, increasingly, software development. A recent survey of 1,700 IT professionals conducted by Centient on behalf of OutSystems had 81% of respondents describing their organizations as currently using GenAI to assist with coding and software development. Nearly three-quarters (74%) plan on building 10 or more apps over the next 12 months using AI-powered development approaches. While such use cases promise to deliver significant efficiency and productivity gains for organizations, they also introduce new privacy, governance, and security risks. Here are six AI-related security issues that industry experts say IT and security leaders should pay attention to in the next 12 months. ## AI Coding Assistants Will Go Mainstream — and So Will Risks Use of AI-based coding assistants, such as GitHub Copilot, Amazon CodeWhisperer, and OpenAI Codex, will go from experimental and early adopter status to mainstream, especially among startup organizations. The touted upsides of such tools include improved developer productivity, automation of repetitive tasks, error reduction, and faster development times. However, as with all new technologies, there are some downsides as well. From a security standpoint these include auto-coding responses like vulnerable code, data exposure, and propagation of insecure coding practices. > "While AI-based code assistants undoubtedly offer strong benefits when it comes to auto-complete, code generation, re-use, and making coding more accessible to a non-engineering audience, it is not without risks," says Derek Holt, CEO of Digital.ai. The biggest is the fact that the AI models are only as good as the code they are trained on. Early users saw coding errors, security anti-patterns, and code sprawl while using AI coding assistants for development, Holt says. > "Enterprises users will continue to be required to scan for known vulnerabilities with [Dynamic Application Security Testing, or DAST; and Static Application Security Testing, or SAST] and harden code against reverse-engineering attempts to ensure negative impacts are limited and productivity gains are driving expect benefits." ## AI to Accelerate Adoption of xOps Practices As more organizations work to embed AI capabilities into their software, expect to see DevSecOps, DataOps, and ModelOps — or the practice of managing and monitoring AI models in production — converge into a broader, all-encompassing xOps management approach, Holt says. The push to AI-enabled software is increasingly blurring the lines between traditional declarative apps that follow predefined rules to achieve specific outcomes, and LLMs and GenAI apps that dynamically generate responses based on patterns learned from training data sets, Holt says. The trend will put new pressures on operations, support, and QA teams, and drive adoption of xOps, he notes. > "xOps is an emerging term that outlines the DevOps requirements when creating applications that leverage in-house or open source models trained on enterprise proprietary data," he says. > "This new approach recognizes that when delivering mobile or web applications that leverage AI models, there is a requirement to integrate and synchronize traditional DevSecOps processes with that of DataOps, MLOps, and ModelOps into an integrated end-to-end life cycle." Holt perceives this emerging set of best practices will become hyper-critical for companies to ensure quality, secure, and supportable AI-enhanced applications. ## Shadow AI: A Bigger Security Headache The easy availability of a wide and rapidly growing range of GenAI tools has fueled unauthorized use of the technologies at many organizations and spawned a new set of challenges for already overburdened security teams. One example is the rapidly proliferating — and often unmanaged — use of AI chatbots among workers for a variety of purposes. The trend has heightened concerns about the inadvertent exposure of sensitive data at many organizations. Security teams can expect to see a spike in the unsanctioned use of such tools in the coming year, predicts Nicole Carignan, vice president of strategic cyber AI at Darktrace. > "We will see an explosion of tools that use AI and generative AI within enterprises and on devices used by employees," leading to a rise in shadow AI, Carignan says. > "If unchecked, this raises serious questions and concerns about data loss prevention as well as compliance concerns as new regulations like the EU AI Act start to take effect," she says. Carignan expects that chief information officers (CIOs) and chief information security officers (CISOs) will come under increasing pressure to implement capabilities for detecting, tracking, and rooting out unsanctioned use of AI tools in their environment. ## AI Will Augment, Not Replace, Human Skills AI excels at processing massive volumes of threat data and identifying patterns in that data. But for some time at least, it remains at best an augmentation tool that is adept at handling repetitive tasks and enabling automation of basic threat detection functions. The most successful security programs over the next year will continue to be ones that combine AI's processing power with human creativity, according to Stephen Kowski, field CTO at SlashNext Email Security+. > "The key is achieving the right balance where AI handles high-volume routine detection while skilled analysts investigate novel attack patterns and determine strategic responses." ## Attackers Will Leverage AI to Exploit Open Source Vulns Venky Raju, field CTO at ColorTokens, expects threat actors will leverage AI tools to exploit vulnerabilities and automatically generate exploit code in open source software. > "Even closed source software is not immune, as AI-based fuzzing tools can identify vulnerabilities without access to the original source code. Such zero-day attacks are a significant concern for the cybersecurity community," Raju says. ## Verification, Human Oversight Will Be Critical Organizations will continue to find it hard to fully and implicitly trust AI to do the right thing. > "Trust in AI will remain a complex balance of benefits versus risks, as current research shows that eliminating bias and hallucinations may be counterproductive and impossible," SlashNext's Kowski says. The practical approach is to implement robust verification systems and maintain human oversight rather than seeking perfect trustworthiness, he says. originally posted at
nym's avatar
nym 1 year ago
Hacking campaign compromised at least 16 Chrome browser extensions Threat actors compromised at least 16 Chrome browser extensions leading to the exposure of data from over 600,000 users. A supply chain attack compromised 16 Chrome browser extensions, exposing over 600,000 users. Threat actors targeted the publishers of the extensions on the Chrome Web Store via phishing messages, then once obtained access to their account inserted a malicious code into the code of the extensions. The malicious code allowed attackers to steal cookies and access tokens. One of the victims of this campaign is the cybersecurity firm Cyberhaven, on December 24 attackers published a malware-laced version of their Chrome extension. “On December 24, a phishing attack compromised a Cyberhaven employee’s credentials to the Google Chrome Web Store. The attacker used these credentials to publish a malicious version of our Chrome extension (version 24.10.4).” reads a post on the incident published by Cyberhaven. “Our security team detected this compromise at 11:54 PM UTC on December 25 and removed the malicious package within 60 minutes.” The phishing email, posing as Google Chrome Web Store Developer Support, warns the employee of the extension removal for policy violations. The message urges the recipient to accept the publishing policy. Once the recipient clicked on the email, the employee unknowingly authorized a malicious OAuth app via Google’s standard authorization flow, despite using MFA and Google Advanced Protection. “The attacker gained requisite permissions via the malicious application (“Privacy Policy Extension”) and uploaded a malicious Chrome extension to the Chrome Web Store. After the customary Chrome Web Store Security review process, the malicious extension was approved for publication.” reads the report published by Cyberhaven. “This malicious extension (24.10.4) was essentially based on a clean prior version of the official Cyberhaven Chrome extension. The attacker made a copy of the clean extension and added some malicious code to create a new malicious extension. This extension was uploaded to the Chrome webstore and replaced the clean official Cyberhaven Chrome extension. The malicious Chrome extension was now available and distributed to a portion of our customer base.” The attackers only compromised version 24.10.4 of the Cyberhaven Chrome extension. Only Chrome-based browsers that auto-updated between 1:32 AM UTC on December 25 and 2:50 AM UTC on December 26 were impacted. The malicious extension used two files: worker.js contacted a hardcoded C&C server to download configuration and executed HTTP calls, and content.js that collected user data from targeted websites and exfiltrated it to a malicious domain specified in the C&C payload. “Based on our initial research so far, this was a non-targeted attack, and part of a wider campaign, aimed at Facebook Ads users. We are working with our customers and an external third-party security response team to help us analyze and investigate further. We will post more updates as we have more findings.” concludes the report published by Cyberhaven. Researchers at security firm Secure Annex further investigated the attack and discovered that other Chrome browser extensions were compromised: - AI Assistant – ChatGPT and Gemini for Chrome - Bard AI Chat - GPT 4 Summary with OpenAI - Search Copilot AI Assistant for Chrome - TinaMInd AI Assistant - Wayin AI - VPNCity - Internxt VPN - Vindoz Flex Video Recorder - VidHelper Video Downloader - Bookmark Favicon Changer - Castorus - Uvoice - Reader Mode - Parrot Talks - Primus - Tackker – online keylogger tool - AI Shop Buddy - Sort by Oldest - Rewards Search Automator - ChatGPT Assistant – Smart Search - Keyboard History Recorder - Email Hunter - Visual Effects for Google Meet - Earny – Up to 20% Cash Back The researchers noticed that the extension “Earny” was last updated on April 5th, 2023 and has been compromised since then. originally posted at
nym's avatar
nym 1 year ago
Here's Your Guide to The Must-See Astronomy Events of 2025 | Date(s) | Event | Description | |-------------------|-------------------------------------------|---------------------------------------------------------------------------------------------------------------------------------------------------------------| | January 3 | **Quadrantid Meteor Shower** | Peaks with up to 120 meteors per hour; favorable viewing conditions expected. | | January 13-14 | **Total Lunar Eclipse (Blood Moon)** | Earth's shadow causes the Moon to appear reddish; visible from various regions. | | February 28 | **Planetary Parade** | All seven other planets align in Earth's sky; a rare visual spectacle. | | March | **Saturn's Rings Disappear** | Saturn's rings appear edge-on from Earth, making them seem to vanish; occurs every 13-16 years. | | March 13-14 | **Total Lunar Eclipse (Blood Moon)** | Second total lunar eclipse of the year; Moon appears reddish due to Earth's shadow. | | July | **Solar Maximum Peak** | Increased solar activity leads to more intense Northern Lights, potentially visible at lower latitudes. | | August 11-12 | **Venus and Jupiter Conjunction** | Venus and Jupiter appear very close in the night sky; visible to the naked eye. | | September 7-8 | **Total Lunar Eclipse (Blood Moon)** | Another opportunity to witness the Moon's reddish hue during Earth's shadow. | | October 7 | **Supermoon** | Full Moon appears larger and brighter; first of three supermoons in 2025. | | November 5 | **Supermoon** | Second supermoon; largest and brightest since 2019. | | December 4 | **Supermoon** | Final supermoon of the year; offers spectacular lunar views. | | December 14 | **Geminids Meteor Shower** | Annual meteor shower peaking with up to 160 meteors per hour; clear skies enhance viewing. | originally posted at