Kazani's avatar
Kazani
kazani@primal.net
npub1vm68...srrc
Beloved Bitcoin. Promo code: KAZANI ➡️ https://foundation.xyz/passport-prime
Kazani's avatar
Kazani 11 months ago
Kazani's avatar
Kazani 11 months ago
🇫🇷 France goes for VPNs Companies like Canal+ and LFP (Ligue de Football Professionnel) claim that VPN providers are contributing to illegal broadcasts of sports broadcasts. (Yes, they want to go after that again, just like in Spain.) This is why, according to a journalist from "Línforme", Canal+ and LFP have different VPNs in mind. Faced with this situation, VPN companies are considering leaving France, arguing that such measures are a threat. Even ProtonVPN is willing to take the case to the EU Court of Justice . There is no obligation to block VPNs for now, but we will be watching to see if such a measure is finally implemented.
Kazani's avatar
Kazani 11 months ago
I found an interesting resource that contains information about the main web vulnerabilities. The peculiarity of this platform is that each of the listed methods can be performed independently, following the tips and examples. And each example is interactive, so it will be easier for you to perceive the material and practice. The content is as follows: ➡ SQL Injection; ➡ Cross-Site Scripting; ➡ Command Execution; ➡ Clickjacking; ➡ Cross-Site Request Forgery; ➡ Directory Traversal; ➡ Reflected XSS; ➡ DOM-based XSS; ➡ File Upload Vulnerabilities; ➡ Broken Access Control; ➡ Open Redirects; ➡ Unencrypted Communication; ➡ User Enumeration; ➡ Information Leakage; ➡ Password Mismanagement; ➡ Privilege Escalation; ➡ Session Fixation; ➡ Weak Session IDs; ➡ XML Bombs; ➡ XML External Entities; ➡ Denial of Service Attacks; ➡ Email Spoofing; ➡ Malvertising; ➡ Lax Security Settings; ➡ Toxic Dependencies; ➡ Logging and Monitoring; ➡ Buffer Overflows; ➡ Server-Side Request Forgery; ➡ Host Header Poisoning; ➡ Insecure Design; ➡ Mass Assignment; ➡ Prototype Pollution; ➡ Regex Injection; ➡ Remote Code Execution; ➡ Cross-Site Script Inclusion; ➡ Downgrade Attacks; ➡ DNS Poisoning; ➡ SSL Stripping; ➡ Subdomain Squatting. ➡️ https://www.hacksplaining.com/lessons
Kazani's avatar
Kazani 11 months ago
➡️ Remove your credentials from breached data providers: ➡️ Have I Been Pwned • Conduct a search of your email address or username at https://haveibeenpwned.com/OptOut. • Click the link in the email confirmation. • Choose the "Remove email address completely" option. ➡️ Dehashed • Create a free burner account at • Conduct a search of your email address or username. • Click "Request entry removal" link below each result. • Click the confirmation link within each email. ➡️ Leakcheck • Register for a free burner account at • Conduct a search of your email address. • If entries are present, send an email from the exposed address with a written removal request to removal@leakcheck.net. • Click the link within the confirmation email. ➡️ PSBDMP • Navigate to the IntelTechniques Breach Tool at https://inteltechniques.com/tools/Breaches.html. • Search your email address at the first "PSBDMP" option. • If any results are present, send an email to admin@psbdmp.ws requesting removal. ➡️ IntelX • Conduct a search of your email address at • Navigate to https://intelx.io/abuse. • Paste any URLs associated with the found content "Full Data" links. • Submit request. ➡️ HudsonRock • Navigate to the IntelTechniques Breach Tool at https://inteltechniques.com/tools/Breaches.html. • Search your email address at the first "HudsonRock" option. • If any results are present, send an email to hello@hudsonrock.com requesting removal. If that fails, use the contact page at ➡️ Leak-Lookup • Register for a free burner account at • Conduct a search of your email address. • If entries are present, send an email from the exposed address with a written removal request to info@leak-lookup.com. ➡️ HackCheck • Register for a free burner account at • Conduct a search of your email address. • If entries are present, send an email from the exposed address with a written removal request to support@hackcheck.io. ➡️ Breach Directory • Navigate to https://breachdirectory.org. • Search your email address. • If any results are present, begin the removal process at https://breachdirectory.org/deletemydata. ➡️ LeakPeek • Navigate to https://leakpeek.com. • Search your email address. • If any results are present, send an email to support@LeakPeek.com requesting removal.
Kazani's avatar
Kazani 11 months ago
📱 The Swedish Army and Signal The Swedish military has adopted the secure and private messaging app Signal as its form of communication. This decision was made to protect against the interception of calls and messages, as well as against the falsification of telephone numbers, according to CyberInsider. Signal was chosen for its end-to-end encryption, its wide acceptance among authorities and partners, and because it has been subject to independent security audits, in addition to being open source and free, which will reduce costs. The official instruction, published on February 11, 2025, states that Signal must be used for all communications with counterparts inside and outside the Armed Forces who also have the application. This movement would be similar to what we saw a few years ago in the Swiss army where they use Threema, which in this case is of Swiss origin. Let's hope that awareness about this becomes more and more widespread.
Kazani's avatar
Kazani 11 months ago
"Black Seed is a CURE for every disease except death." - Prophet Muhammad I recommend you start with 20-30 seeds every 2 days. Take it in the morning on empty stomach. Chew them and then drink with water Benefits: More energy confidence , less anxiety - better skin and hair Black seeds are a very cheap and effective way of improving your health and quality of life. One of the best things I have ever taken- highly recommend image
Kazani's avatar
Kazani 11 months ago
Human populations will start to decrease globally in a few more decades. Thereafter fewer and few humans will be alive to contribute labor and to consume what is made. However at the same historical moment as this decrease, we are creating millions of AIs and robots and agents, who could potentially not only generate new and old things, but also consume them as well, and to continue to grow the economy in a new and different way. This is a Economic Handoff, from those who are born to those who are made. It has been nearly a thousand years since we last saw the total number of humans on this planet decrease year by year. For nearly a millennium we have lived with growing populations, and faster rates of growth. But in the coming decades, for the first time in a thousand years, the number of deaths on the planet each year will exceed the number of births. This seems hard to believe at first because superficially there is no evidence for that change in direction. As this chart shows, the line wants to go up. The Handoff to Bots:
Kazani's avatar
Kazani 11 months ago
Unclear what the intersection of crypto x agriculture is but FarmOS seems to be the 'open management system' a team that would want to build a business ontop/leverage... https://farmos.org/
Kazani's avatar
Kazani 11 months ago
TLDR - Digital interaction w/o stealing attention Websites, apps, social media, and every digital platform are built around capturing and monetizing attention, yet most of these systems treat attention as a vague, immeasurable force rather than a resource that can be priced, traded, and optimized like money or time. One of the most striking experiments in the dissertation found that users needed 0.6¢ more compensation to complete tasks on an ugly CAPTCHA interface. That might sound trivial, but at scale, it translates into millions of dollars in lost productivity and engagement. 1. Bad design not only annoys the living crap out of users, it literally costs them money in cognitive effort 2. Every friction points (bad UI, slow load times, intrusive ads) is an eocnomic penalty ... think every clunky interface forces you to spend an extra 10s per tx (lol to all the bridges out there) equating to 100s of in unpaid labor hours over time It's pretty obvious by now by our tech overlords exploit this principle, but mostly in reverse. They design interfaces that make leaving harder (endless scroll, autoplay, dark patterns) rather than optimizing for efficiency. Projects/companies that start paying to attention to attention by reducing waste, streamlining experience etc outcompete those playing the endless scroll/engagement trap. A Measurable Attention Economics: https://invisible.college/attention/dissertation.html
Kazani's avatar
Kazani 11 months ago
Funny how the #AI has taken over the very jobs people once believed would always belong to humans like "arts, design, entertainment and media" while transportation and office work have for the most part remained under humans.
Kazani's avatar
Kazani 11 months ago
These lists almost never change. Unlike Windows which steadily gets worse, Linux Distros mature and get better with development. Many of our favorites still top these lists because they are a polished experience that are well maintained.
Kazani's avatar
Kazani 11 months ago
Let them call you mad, but you choose your own path.
Kazani's avatar
Kazani 11 months ago
📱 Apple is acting on UK's requirement to break encryption, this is horrendous. Apple is going to take action, I will explain what Apple says and clarify some things: "Starting February 21, 2025, Apple will no longer be able to offer Advanced Data Protection as a feature to new users in the UK " "Apple can no longer offer Advanced Data Protection (ADP) in the UK to new users, and existing UK users will eventually need to disable this security feature. ADP protects iCloud data with end-to-end encryption, meaning the data can only be decrypted by the user who owns it, and only on their trusted devices." "We are deeply disappointed that the protections provided by ADP are not available to our customers in the UK given the continued rise in data breaches and other threats to customer privacy. Improving the security of cloud storage with end-to-end encryption is more urgent than ever. Apple remains committed to providing our users with the highest level of security for their personal data and we look forward to doing so in the future in the UK. As we have said many times before, we have never built a backdoor or master key into any of our products or services and we never will." This would NOT affect (They would remain encrypted) the following: • iCloud Keychain • iMessage Encryption • FaceTime • Health Data YES it would affect : • iCloud backups • Photos That they would not be protected from end to end. It may not seem like a big deal at first, but the reality is that while your chats via iMessages, for example, may be encrypted, any backup you make may not be. Apple is forced to prevent new UK users from enabling advanced protection. However, for those who are already users, they will continue to have said protection since due to the encryption, they cannot break it. Although it seems that they intend to "offer guidance" which could mean that they will indicate how to deactivate it or lose the backup of said data in iCloud. If you're not in the UK and you have an iPhone, enable advanced protection. If you're in the UK, I hope you've already enabled it and moved your data somewhere else. Apple has reportedly not complied with the request to create a backdoor affecting all users, but has decided not to provide protection options, in this case to UK users. Will the UK or other countries continue to push?
Kazani's avatar
Kazani 11 months ago
Sometimes things don’t make sense because the mind tries to understand them through past experiences. But what’s missing is the experience itself. Once you go through it, the missing piece falls into place, and everything makes sense.