Kazani's avatar
Kazani
kazani@primal.net
npub1vm68...srrc
Beloved Bitcoin. Promo code: KAZANI ➡️ https://foundation.xyz/passport-prime
Kazani's avatar
Kazani 10 months ago
PeerTube 7.1 brings Podcast 2.0 support, enhanced identification and Mastodon verification https://alternativeto.net/news/2025/3/peertube-7-1-brings-podcast-2-0-support-enhanced-identification-and-mastodon-verification/ PeerTubePeerTube has launched version 7.1 of its open-source, decentralized video-sharing platform, introducing a range of new features and improvements. A key update is enhanced platform identification, which now highlights the hosting platform's address for each video. Users can click on this address to learn more about the video's origin and explore all videos hosted on the remote instance. Version 7.1 also advances its support for Podcast 2.0, enabling users to subscribe to channels and play video audio streams through traditional podcast applications like AntennaPod and Podverse. Additionally, the podcast feed is now compatible with Apple Podcast, broadening accessibility PeerTube v7.1 is out!
Kazani's avatar
Kazani 10 months ago
You don’t just change. You reprogram. Your habits come from emotions. Your emotions come from subconscious patterns. Study the code running your life or you”ll stay stuck. What you don’t rewrite, you relive. Your mind is running on old code. You were programmed before you had a choice. 1) Watch Your Patterns. • What cycles keep repeating? • What triggers you? Pay attention your reactions This will reveal your programming. 2) Trace It Back Who taught you how to think? Were these beliefs yours, or did they come from family, school, culture? 3) Audit Your Inputs Your mind reflects what you consume: - Music - Media - People - Conversations If the input is trash, the output will be too. 4) Reprogram Through Action Thinking different isn’t enough. You got to move different. Start making choices that break old patterns. 5) Rewrite the Narrative When did you first start believing that doubt, fear, or limitation? Who benefits from you staying stuck? Replace it with a new belief that aligns with where you want to go. 6) Build the New Until It Replaces the Old. The mind learns by repetition. What you repeat becomes the new normal. You’re not just breaking habits. You’re breaking generational curses. Most are ignorant to these facts. If you came across this post you now have awareness. If you have the awareness and still take no action. You’re now being stubborn and that becomes the real problem.
Kazani's avatar
Kazani 10 months ago
Just watched Adolescence on Netflix—a disturbing look at how social media influences can shape young teens. The fact that every episode was shot in one take, with no cuts or pauses, is seriously impressive.
Kazani's avatar
Kazani 10 months ago
AI Cheat Sheet : • Vibe Coding – programming using natural language. • CoT (Chain of Thought) – when AI thinks in stages. • Jailbreak – a way to force AI to break restrictions. • AI agents are programs that work autonomously. • AI Alignment – ​​adjusting AI so that it does not harm people. • AGI – AI that thinks like a human. • Fine-tuning – further training of AI on specific tasks. • Hallucinations – when AI makes up facts. • AI model – a trained system for tasks. • Chatbot – AI for communicating with people. • Computer vision – when AI understands images and videos. • Context is the information that AI remembers to provide accurate answers. • Embeddings are a numerical representation of words for AI. • Explainability – explanation of how AI makes decisions. • Fundamental model – universal AI for different tasks. • Generative AI (GenAI) – AI that creates texts, images, etc. • GPU – a video card for accelerating AI work. • Ground Truth – trusted data for training AI. • Inference – AI uses its knowledge to analyze new data and produce a result. • LLM (Large Language Model) – AI trained on huge volumes of text. • Machine learning – when AI improves based on data. • MCP (Model Context Protocol) is a standard for AI access to external data. • NLP (Natural Language Processing) – natural language processing. • Prompt Engineering is the art of correctly formulating requests to AI. • Reasoning Model – AI that reasons logically. • RAG (Retrieval-Augmented Generation) – AI that searches for information before responding. • TPU – Google’s special processor for working with AI. • Tokenization – breaking down text into small parts (words, symbols). • Transformers – AI architecture for text processing. • Weights – values ​​that determine how the AI ​​learns. • Diffusion models – models that create images from noise (used in Midjourney, Stable Diffusion). • Multimodal AI – AI that works with text, images, video and sound simultaneously. • Generation – the process of creating text, images and other AI content. • API – a way to interact with AI through code.
Kazani's avatar
Kazani 10 months ago
💻 Linux Terminal on Android That's right, Google has officially launched the "Linux Terminal for Android" app. This tool allows users to run Linux commands and scripts directly on Android devices, without the need for third-party tools. It offers native integration with the operating system and greater security as it is an official solution. You only need: · Have a Google Pixel (Yes, GrapheneOS works). · Activate developer mode. · Enable it in developer mode. Android is based on Linux, and having a native terminal is a great tool for anyone who knows how to take advantage of it.
Kazani's avatar
Kazani 11 months ago
Obtainium: Get App Updates Directly From the Source. Tired of waiting for updates in the Play Store? Obtainium lets you install and update Android apps directly from their source (like GitHub release pages) and notifies you about new releases. Cut out the middleman and stay up-to-date! Key Features: *   Direct Updates: Install and update apps directly from release pages. *   Notifications: Get notified when new versions of your apps are available. *   Open Source: Built by the community, for the community. Learn More: *   Video Tutorial: Obtainium 101 - *   README: GitHub - *   Wiki: obtainium.imranr.dev - Recommended Tools: *   AppVerifier: GitHub - Verify app authenticity. - Community Resources: *   Crowdsourced App Configs: Why Use Obtainium? See the original motivation: Side Of Burritos - You should use this instead of F-Droid | How to use app RSS feed - Project Links: *   Website: *   Source Code: GitHub -
Kazani's avatar
Kazani 11 months ago
Ego is not always about being bad or arrogant; even forced goodness and compassion stem from ego. Anything done from a fragmented identity is ego, where the “I” becomes the most important entity.
Kazani's avatar
Kazani 11 months ago
Another free method of finding information by nickname or last name. urlscan.io page.url advanced search operator: page.url:"/targetusername/" Works the same as inurl: in Google, but the results are very different.
Kazani's avatar
Kazani 11 months ago
💻 Another reason why Linux is superior to Windows image
Kazani's avatar
Kazani 11 months ago
WARNING - Etcher Sends private information to third parties Etcher is recommend by many people for burning image files to USB drives for distro testing, but TAILS just removed their recommendation for Etcher based on sharing information with third parties. https://tails.net/news/rufus/index.en.html
Kazani's avatar
Kazani 11 months ago
Good Morning #Nostr 💜⚡🫂 What if you are trying to win the wrong race?
Kazani's avatar
Kazani 11 months ago
 Android System SafetyCore (com.google.android.safetycore) provides common infrastructure that apps can use to protect users from unwanted content. The classification of content runs exclusively on your device and the results aren’t shared with Google. As a system service, SafetyCore is only active when an application integrates with SafetyCore and specifically requests content to be classified. SafetyCore performs the classification on the device itself and doesn’t send identifiable data or any of the classified content or results to Google servers For now there is no app that uses it. In future any app can use it to avoid setting up his system not on device. Sensitive Content Warnings is an optional feature that blurs images that may contain nudity before viewing, and then prompts with a “speed bump” that contains help-finding resources and options, including to view the content. Also only if you have play store it get installed automatically so is only for people that already trust google and have no problem using it. So far only know use will be an option to keep NSFW images distorted instead of automatically being displayed in messages app, if if the user don't want it can disable the option or change message app. There is similar feat on TG too, some images are blurred before being manually shown. GOS team stated they analized it and found out it does nothing more than what is described, for now (local scan, no data sent...). Also on their sandboxes play services the auto-installation is blocked so is up to the user to choose what to do with it. Another solution: Uninstall the app and then install this placeholder app
Kazani's avatar
Kazani 11 months ago
🇦🇺 Australian Government vs Kaspersky The Australian government has banned the use of Kaspersky Lab's web products and services (yes, the antivirus ones) on all government systems and devices, citing national security risks. The move was justified following a risk analysis that identified "threats of foreign interference, espionage and sabotage", particularly due to Kaspersky's extensive collection of user data and its potential exposure to extrajudicial orders from a foreign government (referring to Russia) that contradict Australian law. Kaspersky argues that the decision lacks specific technical evidence and is influenced by geopolitical factors, without giving them any prior opportunity to respond. This ban follows similar measures in countries such as the United States, the United Kingdom and Canada.
Kazani's avatar
Kazani 11 months ago
Keyloggers in electric typewriters: how Soviet intelligence agents monitored US diplomats. • Did you know that the world's first keylogger appeared in the 1970s ? It all started with Soviet intelligence agents who placed bugs in the IBM Selectric typewriters of American diplomats to monitor their business correspondence. • Such implants (bugs) were a real engineering marvel. Portable devices were sewn into a metal plate running the entire length of the machine, which allowed the bug to be hidden from prying eyes. Such a device could only be detected using X-ray equipment, and the location of the bug had to be known exactly. Interestingly, the bug could record all letters and numbers, but did not record spaces, indents, or hyphens. The transmission of information received by the bug was carried out in real time! • The bugs were discovered after more than 10 tons of equipment seized from the U.S. embassies in Moscow and the U.S. consulates in Leningrad were dismantled and analyzed and returned to the United States. The implants were found in only 16 typewriters from 1976-1984 . The search for the bugs began only after the U.S. received information about similar devices from "partners" who had been subjected to the same type of "attack" by the USSR. For eight years, the bugs remained undetected and transmitted information to Soviet intelligence. • The operating principle of the bugs was not entirely clear. Some experts believed that it determined the difference in time for printing each symbol. In Selectric -type machines, to print each specific letter, the ball with symbols had to make a revolution. And printing each symbol takes a certain amount of time, different from the time required to print any other symbol. According to experts, the device transmitted the sounds of printing, and Soviet specialists identified them, deciphering the document printed by the Americans. • In fact, the device installed by the USSR intelligence officers was more advanced and independently determined the printing symbols. The bug determined some features of the movement of the typewriter mechanism, and the magnetic energy received by the device's sensors was converted into a digital electrical signal. The signals were compressed into a four-bit sequence. The bug could store up to 8 four-bit symbols. When the buffer overflowed, the bug's transmitter transmitted the information to the intelligence officers' receiving device. • There were some peculiarities in the operation of the device. For example, the bug could not record pressing keys that did not rotate the ball with symbols. That is, the space, indent and some other text editing keys were not recorded. • There were 5 variants of bug models. Three types worked with direct current and contained up to 10 batteries. The other two types worked with alternating current and reported whether the machine was on or not. Some elements of the machine were used as an antenna. The first three models of bugs were autonomous. • Each device had a magnetometer that converted the mechanical energy of keystrokes into magnetic perturbations. The electronics in the device responded to these perturbations, analyzed the data received, and transmitted the data to the nearest receiver. The data was transmitted via a radio channel. The implant could be controlled remotely. The installation of the bug by a qualified mechanic took only about half an hour. The bugs were equipped with a microcircuit that was very advanced for that period. • Remote control was needed to turn off the bugs when inspection commissions arrived at US embassies and consulates. Over time, the US developed devices that could detect such bugs, but the problem was that to detect a spy device, the machine had to be turned on, the bug turned on, and the detector tuned to a specific radio frequency. Soviet engineers tuned the bugs to frequencies used by local TV stations. ➡️ https://arstechnica.com/how-soviets-used-ibm-selectric-keyloggers-to-spy-on-us-diplomats
Kazani's avatar
Kazani 11 months ago
Found a really cool resource on Linux basics for beginners. The whole point is that the material is presented in the form of mini-courses, which contain lessons with tasks. If you start solving problems, the service will check your answers automatically. Many topics are available for study: ➡ Command line; ➡ Working with text; ➡ User management; ➡ Process management; ➡ File system; ➡ Linux kernel; ➡ Logging; ➡ Networks and more... ➡️
Kazani's avatar
Kazani 11 months ago
🤖 Android with 8 years of updates Qualcomm and Google have announced a collaboration to offer up to 8 years of software and security updates from their new Snapdragon 8 Elite processor This will not only affect Google pixels, which will see their lifespan extended, but also other manufacturers if the manufacturer so chooses, making more Android phones have a longer lifespan. This initiative will also extend to future Snapdragon 8 and 7 chips over the next five generations, making Androids with these processors much more attractive. It will also benefit future Pixels that will come with these processors , forgetting about Google's "tensor" processors and gaining in power. Everything points to the fact that with the next Pixel 10 we will have 8 years of updates for GrapheneOS.
Kazani's avatar
Kazani 11 months ago
Why Google funds Firefox
Kazani's avatar
Kazani 11 months ago