Kazani's avatar
Kazani
kazani@primal.net
npub1vm68...srrc
Beloved Bitcoin. Promo code: KAZANI ➡️ https://foundation.xyz/passport-prime
Kazani's avatar
Kazani 8 months ago
James Wynn is now long 9,188 #BTC, making it the first-ever on-chain leveraged long position to exceed $1 billion
Kazani's avatar
Kazani 8 months ago
In today’ world if you want to grow exponentially you can’t rely on Influencers you met on social media. Because they are diplomatic, they have to maintain their good will to stay relevant to mass. Either find your niche guru who doesn’t serve the mass or take the charge of knowledge in your hand.
Kazani's avatar
Kazani 8 months ago
Crypto Sovereignty is a project by Erik Cason He dives deep into the weird, wild mix of philosophy, politics, and cryptography behind Bitcoin Instead of charts or trading tips, he explores how Bitcoin flips the script on authority, truth, and power It’s kind of like if Nietzsche, Foucault, and a cypherpunk walked into a bar and started talking about blockchains Erik argues that Bitcoin isn’t just money but it’s a tool for self-sovereignty and resistance It challenges the state, questions who gets to decide what’s “true,” and imagines a world where people verify, not trust “Bitcoin is a weapon for the defense of life, liberty, and property in cyberspace.” Can definitely recommend his book as well cryptosovereignty.org
Kazani's avatar
Kazani 8 months ago
Ethereum researcher Justin Drake stated in an interview that a 51% attack on Bitcoin would be much cheaper than on Ethereum, estimating the cost to attack Bitcoin at around $10 billion. In contrast, attacking Ethereum, due to its PoS mechanism, would require controlling over 50% of staked ETH (currently valued at approximately $44.8 billion), with price volatility potentially driving the cost even higher. Is these people stupid? To do a 51% attack you require to be 51% of all nodes! To become 51% of all nodes you need a source of electricity. Lets just pretend you will use Iran as the 51% attack In Iran , you must buy a plot of land then must buy around 10-15 billion usd worth of miners You’re electricity cost will be like probably maybe 250k in total So you do all of this, and you get nothing at the end of it. Or Wipe out the internet for every country around the world including satellites ( but then again you cant do anything! ) The theory of a 51% attack is long outdated and is used by morons who want to cause fear in the system Hacking the FIAT system is alot easier than Bitcoin. Why hack bitcoin when you can hack and print and copy infinite cash
Kazani's avatar
Kazani 8 months ago
📱 Apple Clipboard Protection MacOS 16 will implement a new feature that will alert users when a Mac app accesses the clipboard without direct user interaction, preventing apps from unknowingly reading (copying) clipboard data. We already found something similar in iOS and Android, however, this doesn't happen in Windows and any running application can access the clipboard without restrictions, making it less secure by design. In Linux it will depend on the desktop environment used but there are no "default" warnings.
Kazani's avatar
Kazani 8 months ago
🌐 Kernel-level Tor isolation for any Linux application. • The Tor Project team has released an open source solution called oniux for isolating Tor at the kernel level for any Linux application. The project's source code is written in Rust and published under the MIT license. "When running privacy-critical applications and services, developers want to be sure that every packet truly only goes through Tor. One mistyped proxy setting or one system call outside of a SOCKS shell, and suddenly your data is at risk. That’s why today we’re excited to introduce oniux: a small command-line utility that provides Tor network isolation for third-party applications using Linux namespaces. — The Tor Project explains." • It's worth noting that there is already a tool with a similar purpose, known as torsocks, which works by rewriting all libc networking functions to route traffic through the SOCKS proxy offered by Tor. This project has the notable drawback that applications making system calls not through the dynamically linked libc , whether malicious or not, can leak data. It also excludes support for purely static binaries and applications from the Zig ecosystem. • Oniux can be useful for running privacy-critical applications and services. Usage is as simple as adding a call to the "oniux" utility before running the desired program. For example, to send a request via curl over Tor, you can run " oniux curl URL ", and to route any requests within a shell session through Tor, you can run " oniux bash ". Isolation of graphical applications is supported.
Kazani's avatar
Kazani 9 months ago
Kazani's avatar
Kazani 9 months ago
We live in a time of comfort and abundance, but many people feel empty, anxious, and depressed. Modern life is easy compared to the past, yet people struggle with finding meaning and purpose. Too much comfort and lack of real challenges make us restless and unhappy. Social isolation, too much screen time, and fast-paced living increase feelings of loneliness and stress. Humans are built for close communities and overcoming hardship, but today we feel lost in big, impersonal societies. Real growth and happiness come from facing challenges, taking risks, and pushing ourselves out of our comfort zones. To feel truly alive, we must embrace uncertainty and struggle, not hide from it.
Kazani's avatar
Kazani 9 months ago
📱 Meta's most privacy-intrusive glasses Meta is developing facial recognition technology for its smart glasses and future camera-equipped headsets. This feature, part of "super sensing" mode, would allow nearby faces to be identified by name, but only with voluntary activation by the user. But there's something even worse: people wouldn't be notified or have to give consent to be scanned. Although the current Ray-Ban Meta glasses turn on a light when recording, Meta is considering removing this signal in future versions. Additionally, the company has adjusted its privacy policies, enabling AI by default and removing the option to opt out of storing voice recordings.
Kazani's avatar
Kazani 9 months ago
Kazani's avatar
Kazani 9 months ago
War is when the government tells you who your enemy is. Revolution is when you figure it out for yourself.
Kazani's avatar
Kazani 9 months ago
Just watched The Whale movie and I'm already a huge fan of The Whale, but I’m surprised by how many people misinterpret Charlie’s character. (I utilized AI assistance to enhance my writing process.) Critics often call him selfish for overeating despite reconnecting with his daughter, arguing that true love would push him to recover. However, the film isn’t about Charlie’s redemption. His binge eating stems from deep guilt and self-hatred after abandoning his family and failing his lover. Living with that shame, he feels unworthy of life or his daughter’s love, believing he deserves death. Saving money for her is his way of justifying his existence while keeping her at a distance, as he doesn’t think he merits a place in her life. When Charlie finally reaches out to his daughter, it’s not a calculated choice. Dying and desperate to leave something positive, he cautiously tries to rebuild a connection, not to seek forgiveness but to ensure she doesn’t hate him entirely. His actions reflect the messy emotions of a flawed person who no longer wants to live but still hopes to do something right. Those who say Charlie should “just stop eating” miss the point. His overeating isn’t about loving food—it’s self-punishment driven by depression. Severe depression makes it hard to fight for survival when you feel worthless and believe others are better off without you. Even his instinct to live clings on, making his self-destruction a painful compromise. Hiding his savings from his caretaker wasn’t malice; he felt unworthy of recovery and knew she’d try to save him. The frustration others feel toward Charlie is realistic, but it’s frustrating that no one grasps why a mentally ill person acts irrationally. Charlie isn’t a hero or villain—just a broken man who made terrible choices, suffered for them, and is now a shadow of himself. The Whale doesn’t excuse his past but portrays a tragic, real-world scenario where happy endings or clear lessons are rare. image
Kazani's avatar
Kazani 9 months ago
Snap Safe The camera that doesn’t rat you out.    Snap Safe is an Android camera app that keeps every pixel—and every byte of data—exactly where it belongs: on YOUR device. Key Features: • Zero‑Leak Design – The manifest skips android.permission.INTERNET; nothing leaves your device. • Fully Encrypted – Shots are written to encrypted, app‑private storage. • Metadata Scrub‑A‑Dub – EXIF and other identifiers are wiped the instant you hit Share. • PIN‑Locked Gallery – A separate PIN stands between curious thumbs and your photos. • Secure Sharing – When you do share, we hand the file off via Android's native share sheet—no detours. • Granular Location – Add coarse, fine, or zero location data—your call. • 100% Open Source – Auditable code in plain sight. • Poison Pill – Set a special PIN, that when entered, appears to work normally but actually deletes your existing photos. • Decoy Photos – Select innocuous decoy photos, these will be preserved when your Poison Pill is activated. That way your Gallery is not suspiciously empty. Why Snap Safe? We capture photos locally, encrypt everything in private storage, let YOU decide if GPS tags are added (precision optional), and strip out tell‑tale metadata automatically. We NEVER phone home or talk to servers, slurp analytics or usage stats, sprinkle ads or trackers in the code, or read files outside our sandbox. Privacy Policy: We collect nothing. Photos posted on F-droid page. Newest version on github
Kazani's avatar
Kazani 9 months ago
Kazani's avatar
Kazani 9 months ago
📱 Xiaomi, Oppo, Vivo, and OnePlus are reportedly creating an alternative to Google. These companies are reportedly working on versions of Android without Google services , including the Play Store, as a backup plan to ensure they remain operational in the event of any future issues that may arise with the US. It already happened with Huawei, and it wouldn't be surprising to see it happen with other giants. Xiaomi, for example, has a large product ecosystem and a highly mature operating system. While it is initially a "plan B" they are developing, it could cease to be so if they consider that, in their dominant position, they could stop depending on third parties.