BitcoinIsFuture's avatar
BitcoinIsFuture
npub1wl6k...caw8
#Bitcoin #LightningNetwork #Freedom #Peace #Truth #Love Bitcoin, NOT cryptoshit! Not your keys, not your Bitcoin! CBDC is slavery! Bitcoin is Freedom Money! Nostr Public Key: Public Key (Hex): 77f56243a824d22573fb755dd52c73c14986d15c0c98512d45f4deb08e9f879a Public Key (bech32): npub1wl6kysagynfz2ulmw4wa2trnc9ycd52upjv9zt297n0tpr5ls7dqk5caw8
Fuck CBDC Slavery Centralized Created Out Of Thin Air Scam coin. Got #Bitcoin? image
Priority number one for Bitcoin is to fix spam, fix the compromised Core devs and entities and rug the spammers and scammers. BIP110 to reduce arbitrary data and Cat the spam dust for the win ✌️ View quoted note →
Of course that Jameson Slopp who is a bad actor, evil shitcoiner and manipulator is trying to manipulate you again by saying he presents both cases but he clearly is in favor of stealing / freezing the coins. image View quoted note →
Bitcoin is THE Global Most Secure Decentralized Unconfiscatable Peer-to-Peer Scarce Hard Sovereign Freedom Money, The Greatest Store of Value and The Strongest Hope for Humanity. View quoted note →
Huge OP_RETURNS reduce nothing, they just add more spam to Bitcoin. They don't solve inscriptions or fake pubkeys spam because those are still available and used. The Cat and the BIP110 help to reduce spam. But Jameson Slopp is a disgusting shitcoiner and manipulator so that is why he is dishonest and is against fixing the spam issue. He abuses spam on Bitcoin because he is investor in Citrea and profits from that abuse. View quoted note → View quoted note → View quoted note →
Majority of Core devs are compromised. Fuck Citrea shitcoiners and Jameson Slopp too who are trying to turn Bitcoin into Ethereum like shitcoin. image View quoted note →
"Jade devices running firmware version 1.0.24 to 1.0.36 can be crashed by a malformed RPC request, leading to a device reboot. Jade devices contain stack protection code that attempts to prevent overwriting of the stack, and triggering this code will cause the device to reboot. On firmware versions 1.0.24 to 1.0.35, a sophisticated attacker can potentially construct an RPC request that bypasses Jade's stack protection, leading to limited code execution. Version 1.0.36 is not yet known to be vulnerable, but this cannot be ruled out. If an attacker is able to execute a malicious request, they may change the running software until device reboot. Additionally, they may potentially read and write the device's internal storage and send RPC messages to the host device. This means that the severity of any future exploit based on this vulnerability ranges from griefing the user by destroying stored data, to potentially extracting the user's secret key and returning it via RPC reply message in the worst case scenario."