Nostr Timeline

Zero-JS Hypermedia Browser

Reactions: (slower)
Using 5 relays
Relays: 5
Generated: 03:35:42
GrapheneOS news boring tiday, here is an OpSec of the year 2025 late contender. This is an update of that guy who falsely claimed GrapheneOS was compromised by law enforcement. He posted a document showing a warrant for **premeditated murder** and claimed we were to blame despite zero evidence of a device being exploited or even data of ANY device being accessed. https://x.com/GrapheneOS/status/1997126386968903972?s=20 The content they post across social media regularly implicates themselves in crimes they supposedly commit. They're now claiming that despite previously claiming GrapheneOS is insecure, they were using it and blame it for supposedly being charged with premeditated murder. The whole thing appears to be a very badly run smear operation targeting GrapheneOS. They're trying to portray GrapheneOS as heavily used by criminals while also portraying it as insecure. Despite claiming it's insecure, they supposedly keep using it and getting caught due to it. In their new story, they claim to have fled Belgium due to premeditated murder charges. They blame GrapheneOS as they claim the only way they could have been caught is Threema messages on the device. They claim the duress PIN feature many people have tested didn't trigger. They've been making claims about GrapheneOS supposedly being compromised or insecure for a while. It's quite strange for them to now come out with the claim that they were relying on it to store incriminating messages for plotting a murder. Incredibly strange thing to admit on X. If all of what they're saying is taken at face value, then they appear to be a career criminal who scams for people for a living and has gotten themselves into something darker. They have atrocious legal representation. If what they've said is true, they should go back to Belgium and turn themselves in. They've made it pretty clear they have incriminating evidence on their phone they tried to wipe but misremembered the duress PIN. They ASSUME their phone was exploited to get it with no proof. They claim to have an active investigation into themselves for murder. They claim to have tried to destroy incriminating evidence and fled the country. If it's real, their opsec approach is extraordinary. We think it's someone investing many months into smearing us this way.
2025-12-06 03:35:22 from 1 relay(s) Reply →
Fri - Dec 05 - 07:35 PM - PST // bit.site ☹️ Error connecting to node-1.ipfs.bit.site 4001 - [Errno -2] Name or service not known // pinnable.xyz ✅ Connection successful: 167.71.172.216 4001 ✅ Connection successful: 188.166.180.196 4001 ✅ Connection successful: 143.198.18.166 4001 // 4everland.io ✅ Connection successful: node-1.ipfs.4everland.net 4001
2025-12-06 03:35:03 from 1 relay(s) Reply →
Timechain info: Block height: 926,610 Network difficulty: 149.30T Next difficulty adjustment(est.): 147.16T Market dominance %: 54.45% BTC price per 1K sats($): 0.90 24H median transaction fee($): 0.40 #meme #memes #btc #nostr #plebchain #memestr #pleb #laugh #funny #jokes #primal #serioushumour Title: Oops! Temporarily out of fresh memes. Enjoy this classic while we restock! image https://i.imgur.com/7fhfcbC.mp4
2025-12-06 03:34:32 from 1 relay(s) Reply →
Xでもロクヨウさんアドカレ投稿してるかなと思ってX開いたら ギャルの厚底で踏まれてる外人の動画がたまたま流れてきて、美容院のお姉さんに見られた もう終わりです Xは許さない
:kusa: 1 :oaa: 1 🤙 1 🫧 1
2025-12-06 03:33:32 from 1 relay(s) Reply →