🧊 Hidden Firefox AI process consuming CPU resources?
Firefox browser users have encountered serious performance issues after the release of version 141. Initially, suspicion fell on the new "Smart Tab Grouping" feature using AI, but an official Mozilla investigation (Bug 1982278) showed that the abnormally high CPU load is caused by another component, namely the hidden pilot experiment "Semantic Search in History" (places.semanticHistory). The "Smart Tab Grouping" has nothing to do with this.
Everything was fine just yesterday. Today I opened Firefox, and as a result, there were sharp spikes in CPU load and power consumption. My fans shouldn't be this loud if I don't have more than 15 tabs open.
After unsuccessfully restarting Firefox, I opened the task manager and found that a process called "Inference" fluctuates from 0.05% to 130% CPU usage, which explains the spikes in CPU load and power consumption.
Killing the process solves the fluctuation problem but causes Firefox to crash, requiring a restart.
What is going on? This problem never existed until today.
— users complain on Reddit.
😱 Official Mozilla representatives have acknowledged the issue. The fix will be included in Firefox 143 (ctodea writes Target Milestone: → 143 Branch).
💡For full control and disabling of all local AI services, advanced users should experiment with some settings:
In about:config the parameter browser.ml.enable is set to false.
*The browser.ml.enable parameter is the main, kind of master key to all under-the-hood machine learning in Firefox. Setting this value to false completely deactivates the local AI engine (Inference process), making it impossible for any dependent features to work, including smart tab groups and the chatbot.
In about:config the parameter browser.tabs.groups.smart.enabled is set to false.
*Disables only the smart tab grouping feature. This step is not a guaranteed solution to the CPU overload problem, as the main source of the error lies in another component. Meanwhile, the AI engine itself (Inference process) remains active for other potential tasks.
In about:config the parameter browser.ml.chat.enabled is set to false.
*The browser.ml.chat.enabled parameter is a direct system switch that controls the activation and visibility of the AI chat integrated into Firefox.
Source: Telegram | Russian OSINT

Many people have heard of onion routing in Tor and have a rough idea of how it works. However, fewer people know about garlic routing.
That's why I decided to write a short note about what it is and how it works in I2P🚥
How is a message sent? ✉️
In I2P, your message travels through a tunnel—a chain of randomly picked computers (nodes) on the network. Each node only knows where to send the data next, not the message content, thanks to garlic encryption🧄.
Your message is first encrypted for the recipient using end-to-end encryption. Asymmetric encryption🔐 uses a public key to encrypt and a private key to decrypt.
How are encryption layers created?🔒
Now the process of wrapping the message in layers begins.
Imagine that you have a tunnel with three nodes: A, B, C.
The encrypted message (already protected for the recipient) must be passed through these nodes so that each one knows only the next step. To do this, I2P creates encryption layers one for each node.
Each layer is additional encryption with instructions for a specific node, such as “forward to node B” or “send to recipient.”
It works like this: you encrypt the message with the public key of node C, adding the instruction “forward to node B.” You encrypt this packet again with the public key of node B with the instruction “forward to node A.” Then the entire packet is encrypted with the public key of node A with the instruction “send to recipient.”
When you send the packet, it goes to node A. Node A opens its layer with its secret key, sees the instruction “forward to node B” and forwards the data. The data remains encrypted for other nodes. Node B opens its layer, sees the instruction “forward to node C” and forwards it. Node C opens the last layer, sees that it needs to be sent to the recipient, and does so.
Each node only knows its own step and does not see the content of the message, its sender, or its recipient.
Why is encryption called garlic?🧄
Now, let's talk about “garlic” encryption in detail. In I2P, your message is packed with others into one encrypted packet🗂, called garlic. This packet may include your message, others’ messages, and network data like tunnel commands⚙️
All these messages are encrypted together, and each layer of encryption (for nodes A, B, C) covers the entire large packet, not each message individually.
When node A opens its layer, it sees the instruction for the entire packet, such as “forward to node B,” and sends it on. It does not know how many messages are inside, whose they are, or where they are going. Node B does the same, opening its layer and forwarding the packet to node C. Node C, opening the last layer, can send the entire packet or parts of it (depending on the instruction) to the recipients, but it does not know how many messages are inside and to whom they are addressed. This makes it impossible to determine whose message is where, even when observing the network.
Each message in the packet is protected by individual encryption for its recipient🔑 so that no one but the intended person can open it.
The messages inside the packet are not explicitly separated they are sort of stuck together into one continuous encrypted piece of data. I2P can also add “garbage” data🗑 fake messages that masquerade as real ones but mean nothing.
In addition, I2P mixes♻️ your packet with other data on the network and can add random delays during transmission. This makes it difficult to analyze traffic. Tunnels change every 10 minutes, and the nodes in them are selected again, so it is impossible to track the path.
How does garlic encryption differ onion encryption?🧅
In onion encryption, each message is encrypted separately and transmitted through its own chain of nodes. Garlic encryption not only wraps your message in layers of encryption, but also combines it with other messages and fake data into a single encrypted packet.
Did you ever wonder how QR codes work?
Reading QR codes without a computer:
Reading QR codes without a computer!
EU age verification app to ban any Android system not licensed by Google
Reddit:
https://www.reddit.com/r/BuyFromEU/comments/1mah79o/eu_age_verification_app_to_ban_any_android_system/
The EU is currently developing a whitelabel app to perform privacy-preserving (at least in theory) age verification to be adopted and personalized in the coming months by member states. The app is open source and available here:
https://github.com/eu-digital-identity-wallet/av-app-android-wallet-ui.
Problem is, the app is planning to include remote attestation feature to verify the integrity of the app:

GitHub
GitHub - eu-digital-identity-wallet/av-app-android-wallet-ui
Contribute to eu-digital-identity-wallet/av-app-android-wallet-ui development by creating an account on GitHub.
This is supposed to provide assurance to the age verification service that the app being used is authentic and running on a genuine operating system. Genuine in the case of Android means:
• The operating system was licensed by Google
• The app was downloaded from the Play Store (thus requiring a Google account)
• Device security checks have passed
While there is value to verify device security, this strongly ties the app to many Google properties and services, because those checks won't pass on an aftermarket Android OS, even those which increase security significantly like GrapheneOS, because the app plans to use Google "Play Integrity", which only allows Google licensed systems instead of the standard Android attestation feature to verify systems.
This also means that even though you can compile the app, you won't be able to use it, because it won't come from the Play Store and thus the age verification service will reject it.
The issue has been raised here

GitHub
Do not add Google Play Integrity integration · Issue #18 · eu-digital-identity-wallet/av-doc-technical-specification
In the README, the following is listed: App and device verification based on Google Play Integrity API and Apple App Attestation I would like to st...
but no response from team members as of now.
In short: You can only be a full citizen of the EU if you accept the ToS from Google.
Hal Finney sent this email days after Bitcoin was created.
When he wrote this, #Bitcoin cost $0

Pomozen ⏳
A modern, open-source Pomodoro timer designed to transform the way you work and study. Say goodbye to mental fatigue and hello to peak concentration with structured work intervals and smart breaks.
Why choose Pomozen?
• Track your progress with detailed statistics and custom labels for tasks.
• Gentle reminders ensure you never miss a focus or break period.
• Integrated hydration reminders keep you feeling your best.
• Fully customize your Pomodoro cycles—from focus duration to break times—to fit your unique rhythm.
Download Pomozen from IzzyOnDroid:

IzzyOnDroid Repo Browser
„Pomozen“ – IzzyOnDroid F-Droid Repository
Pomodoro timer to boost productivity and focus
Source code: Github -

GitHub
GitHub - TheGandabherunda/Pomozen: Pomozen is a modern, open-source Pomodoro timer app designed to boost productivity and focus. It applies the Pomodoro Technique, structuring work into focused intervals (typically 25 minutes) followed by short breaks.
Pomozen is a modern, open-source Pomodoro timer app designed to boost productivity and focus. It applies the Pomodoro Technique, structuring work i...
Enchat is a tool for private communication with encryption.
Its key features include no accounts, strong AES-256 encryption, and the creation of unique temporary keys for each session.
Once a session ends, messages are no longer accessible, and usernames and timestamps are also encrypted.
The tool offers secure file sharing up to 5 MB, anonymity via Tor and cross-platform compatibility.
Encryption occurs on users' devices, ensuring the security of the content.
Enchat is compatible with Python 3.6 and above and runs on Linux, macOS, and Windows, though it is recommended to use strong passphrases and set up your own servers for added security.

GitHub
GitHub - sudodevdante/enchat: End-to-end encrypted, ephemeral, self-hosted terminal chat — no accounts, no history, no cloud.
End-to-end encrypted, ephemeral, self-hosted terminal chat — no accounts, no history, no cloud. - sudodevdante/enchat
The Nine Principles of Propaganda

GM #Nostr
Once you carry your own water, you will learn the value of every drop.
- African Proverb
Value the simple things anon.
Bitcoin demand is real and persistent.
"War does not determine who is right, only who is left."
- Bertrand Russell
The Banana Zone ⬆️
Another Linux Smartphone Enters The Market. Meet Liberux NEXX
Liberux NEXX is a phone built on LiberuxOS, based on Debian 13 Linux Distro. Liberux NEXX will never track your activity, collect your data or compromise your privacy. All source code will be available for you to further customize your system or even build alternative versions. NEXX grants you a full ARM Linux system, including Android OS, which would allow you to install applications for this environment without compromising your privacy.
CPU: Rockchip RK3588S
• 8-cores, 64-bit
• 4×Cortex-A76 (upto 2.4GHz)
• 4×Cortex-A55
Manufactured by TSMC on 8nm process
GPU: ARM Mali-G610
• 4-cores MP4 (450 GFLOPS)
Modem: Snapdragon X62 5G
RAM: upto 32GB LPDDR4X
ROM: upto 512GB emmC
upto 2TB SD Card support
• 6.34-inch (2400x1080 px) FHD+ OLED Display
• Gorilla Glass protection
• 32MP Single rear camera
• 13MP Front camera
• 5300mAh battery
• Rear fingerprint sensor
• 3.5mm headphone jack
• 2x USB-C 3.1 port
Audio Codec: ALC5640-VB-CG
Amplifier: AW8737SCSR
Wi-Fi/BT: AW-CM256SM (BT 5.0)
5 years of Upgrades
NEXX also supports GNOME Shell Mobile and contains 3 KILL SWITCHES — for Microphone/ camera, Wi-Fi/BT and Signal. When all 3 switches are flipped down, they also disable additional components like the GNSS unit (GPS + satellite systems), the IMU (accelerometer, gyroscope, magnetometer), and ambient & proximity sensors.
Liberux Team is also developing a gadget that, when connected to a monitor, keyboard, and mouse, will enable "wireless" connectivity to them. The smartphone is still under crowdfunding and will start shipping worldwide in July 2026.

Liberux NEXX by Liberux Labs S.L. - Indiegogo
THE LINUX PHONE YOU’VE BEEN WAITING FOR.
The base model comes with 8GB+128GB+LTE and costs 790€. Since Liberux NEXX has been designed with a modular architecture, you can upgrade the RAM, storage & modem.
Storage: 256 GB (+45 €); 512 GB (+150 €)
RAM: 16 GB (+100 €); 32 GB (+250 €)
5G Modem: +120 €
Liberux 2TB MicroSD Card: +250€
OSINT via Bluetooth: how Android devices give away the owner
For reasons unknown to me, Bluetooth is still considered a purely local protocol: file transfer, connection to headsets, operation of a fitness bracelet. In practice, it gives a lot more. With proper processing of advertising packages and service information of Bluetooth devices, it is possible to determine the approximate location, type and model of the device, restore movement routes, and in some cases, identify the owner. All this happens without physical access to a smartphone or wearable devices.
Bluetooth-OSINT is used at the information collection stage, during technical support of events, during investigations and during movement monitoring. It is effective both in urban environments and in confined spaces: at train stations, business centers, hotels, and conference halls.
Android devices remain particularly vulnerable. Even with an inactive connection, they continue to send advertising packets.
Advertising packets in the context of Bluetooth, especially Bluetooth Low Energy (BLE), are special short packets of data that a device periodically transmits over the air to inform other devices about its presence.
These packets do not require a connection — they are transmitted "blindly" and are received by all devices within range. It is thanks to these advertising packages, for example, that headphones appear in the list of available Bluetooth devices on your phone.
Many models transmit the device name in clear text — for example, Pixel 8a Alex or Galaxy S22 Masha. This field often contains the user's name or nickname. Such data can be compared with search results in social networks, leaks, and databases.
Even if the name is hidden, there are still values in the packages that can be used to set the model, chip type, and manufacturer's version. If you collect data about such devices from different points, you can build a graph of movements and identify whether the devices belong to the same user.
What is visible via Bluetooth
– Device name
– Signal strength (RSSI) — allows you to estimate the distance to the source
– Manufacturer-specific data — additional fields specified by the manufacturer
– Advertising UUID — often static for specific models
– Frequency of broadcasting and interaction with services
The combination of smartphone, watch and headset is already a unique set. It is easily tracked by its characteristic behavior on the air.
Why Android makes more noise than other OS
– The MAC address may not be randomized until Bluetooth is manually rebooted
- Built–in BLE Privacy protection is either missing or partially implemented
– Device names are often transmitted in clear text
– System services are running in the background: Nearby, Fast Pair, geolocation, Smart Lock
This creates a permanent presence of the device on the radio. Even without connecting to other devices, the smartphone remains visible.
How to reduce visibility
1. Disable Bluetooth if it is not necessary to operate it
2. Disable background scanning:
Settings → Geolocation → Scan → Bluetooth Scan → Off
3. Change the device name:
Settings → About the phone → Device Name
4. Disable Nearby Share, Fast Pair, Smart Lock and other Bluetooth-enabled services
5. If root access is available, use additional utilities:
– Magisk BLE Privacy Module
– XPrivacyLua
– Bluetooth MAC Spoofer
Tools for analysis
– nRF Connect — displays BLE packets transmitted over the air
- Beacon Scanner / BLE Hero – detection and tracking of surrounding devices
— btmon with ADB – allows you to view HCI logs, including BLE, without root access
- Kismet is a powerful framework for monitoring wireless interfaces (Wi-Fi, BLE)
Even if the device is not connected to anything and is in your pocket, it can transmit this data, depending on the firmware, settings, and model. This creates a digital "fingerprint" on the airwaves.
GM
Your art needs to come from your soul before it pierces through others.
Be fearless.
Fear will defeat you before AI
Android was once a haven for tech-savvy users, but now it's overly restrictive.
When you unlock the bootloader, apps malfunction, features disappear, and you're regarded as if you're engaging with malware.
This isn't improving security; it's poor engineering and unfriendly user policies.
The user experience deteriorates annually, plagued by bloatware, ads, faulty updates, with no solution in sight.
If you attempt rooting or unlocking the bootloader, you're penalized.
We aren't treated as users, but rather as sources of income confined within locked hardware.
Manufacturers are unable to deliver functional software and they’ve stopped pretending to care