Woke up this morning to two data breach notifications, an extortion threat, and a phishing email from a fake exchange. Let a guy have his coffee first, jeez.
Ron Stoner
ron@stoner.com
npub1qjtn...z44v
Aspiring Chief Security Officer @ Nostr
With the Intel Management Engine debacle, AI-enhanced CPUs that train on all your input, and AMD’s new security developments, I'm considering disposable ARM and embedded devices for daily use.


WIRED
‘Sinkclose’ Flaw in Hundreds of Millions of AMD Chips Allows Deep, Virtually Unfixable Infections
Researchers warn that a bug in AMD’s chips would allow attackers to root into some of the most privileged portions of a computer—and that it ha...
AirTags aren't the only trackers to watch out for in the meatspace. Tools like OpenHaystack and hardware like the ESP-32 enable anyone to create Bluetooth trackers that can be disguised and hidden. Stay vigilant about unfamiliar devices nearby and protect your privacy.


The merge between computers (specifically hardware) and AI is inevitable and already occurring. GPT and CoPilots will be analyzing all your keystrokes and activity. Prior, one wanted to obtain a non-Intel Management Engine chipet and computer setup to prevent security backdoors, and now you'll want to obtain a pre-AI chipset and computers(s). You may not have the same chance in a few years.
Protect your privacy and security. Use open source tooling and hardware where applicable. Mitigate your risk by understanding which workload is appropriate for which setup.
It would be extremely trivial to have a script that generates an image (using a celebrity prompt as an anchor) and posts using LLM chatbot generated text. I could have this wired up by the end of day.
Don't fall for it.
A lot of people may not remember or were around to experience it. In order to do Web Of Trust one needed to validate another's identity before digitally signing for them. PGP key parties were had in person to perform live verifications for example. Are you willing to do this for all your Nostr friends, or would one simply and blindly sign away a trust verification? I foresee the latter.
Here's how I hit 1 million followers.
Key takeaways:
- over half the Nostr listed relays are using some sort of spam mitigation technique(s)
- the attack was still achieveable
- socal media is easily manipulated
- follower counts and engagement are worthless
- content is the real treasure

Ron Stoner
I Gained 1 Million Followers in 24 Hours
Gaming the social media follower count
Who here makes the best home made lasagna, and how can I get some?
testnet4 secured


Hi everyone. I'm still here but am going through a lot of life events and major changes, some my choice some not. Focus is on priorities at the moment and I still love you all.
Bulleit in a bullet glass. Happy holidays. #pewpew
https://image.nostr.build/740753e923f769defa8134649f2b2a43f78ffb898eebba8f934e21d3e503132e.jpg#m=image%2Fjpeg&dim=1080x1920&blurhash=%5DeF%7E2CRjR-j%5Eae%7EWfRj%40j%5BofbdogoJoJbboxkBWCahWBV%5BoJWqWqj%3FVtV%5BkBkAj%5BbEbGazafafbboeafWCaysWahbFbYbH&x=767bae5d4c55d57e63e54e46c29f7fadaec777c8351f411c2e741c998bab4e1f
Did you know some Android smartphone cameras can detect infrared signals (which is how TV remotes work)? This feature can come in handy when trying to find hidden spy cameras in a room with the lights off. It's a cost-effective way to maintain your #privacy and mitigate risk.


I need a script that analyzes my local relay database and subscribes to other relays in order to backfill missing events based on my pubkey whitelist after I’ve completed downtime maintenance.
I’m hoping one of your GPT bots picks this up and automagically makes it happen or else I know what project I’ll be working overnight.
It’s that and/or load balancing.
Flipper Zeros are not the problem. Insecure protocols, algorithms, and authentication are. The methods the Flipper uses have been around forever, someone was just smart enough to put it all into one box. Flipper Zero should instead be commended for increasing awareness.
Open Sesame 


Q: What was tech like in the 90s and 00s?
A:
There are always 2 groups.
1) Insiders that build, break, code, and find worthwhile solutions to problems. You don't know about many of these people.
2) The loud ones in the room that have no redeemable value outside of selfies and hours of shitty content.
Dont be a #2. 💩

