No Bullshit Bitcoin's avatar
No Bullshit Bitcoin
news@primal.net
npub1hxjn...agw3
A news desk for bitcoiners by bitcoiners without ads, paywalls, or clickbait.
Blockstream Greenlight v0.2: New Credentials API, Enhancements & Improvements "The Blockstream Greenlight team has just dropped it’s first major update moving from version v0.0.1 to v0.2! This milestone brings a host of enhancements and new features to make Lightning integration even more seamless for developers."
Ditto: A Nostr Community Server Ditto is a Nostr server for building resilient communities online. With Ditto, you can create your own social network that is decentralized, customizable, and free from ads and tracking. It has a built-in Nostr relay, a web UI, and it implements Mastodon's REST API.
RoboSats v0.6.3-alpha: Add New Coordinators Manually RoboSats is a simple and private way to exchange bitcoin. It simplifies the peer-to-peer user experience and uses lightning hold invoices to minimize custody and trust requirements while helping users stick to best privacy practices.
Satoshi Nakamoto Institute, Mi Primer Bitcoin & Summer of Bitcoin Granted Support from Newly Launched OpenSats Education Initiative - "A core principle of OpenSats is that all supported projects must be open-source and freely accessible. Consequently, all educational materials funded through our grants must be published under a free and open license, making them available to everyone." - Educators, developers, and advocates are welcome to apply for grants under the OpenSats Education Initiative. For more information and to apply, see www.opensats.org/apply.
X, Coinbase User Data Potentially Exposed As KYC Provider AU10TIX Left Admin Credentials Open for 18 Months - The leak occurred in December 2022, and it is believed that malware accessed the admin account. The account details have been shared in Telegram hacker communities since March 2023. - The exposed admin credentials provided access to a logging platform containing links to identity documents, including user names, dates of birth, nationalities, ID numbers, and images of uploaded documents.
☕ Good Morning Bitcoin - Friday, July 5, 2024 It’s July 5, and while fireworks may have lit up the sky last night, today we're here to light up your feed with the latest in Bitcoin and freedom tech. These include some notable market moves, interesting project developments, and a long-awaited milestone for some very patient Mt. Gox creditors. Onward 🫡
Mt. Gox Starts Bitcoin Repayments After Decade-Long Wait "On July 5,2024, the Rehabilitation Trustee made repayments in Bitcoin and Bitcoin Cash to some of the rehabilitation creditors through a part of the Designated Cryptocurrency Exchanges etc. in accordance with the Rehabilitation Plan."
Bitcoin Core Introduces New Security Disclosure Policy - A new Security Advisories page has been added to the Bitcoin Core website. It currently documents disclosures for versions of Bitcoin Core prior to v0.21.0. All of these versions are End of Life (EOL) and no-longer receive any maintenance updates. The latest release of Bitcoin Core is v27.1. The 26.x and 25.x branches also both continue to receive maintenance updates. - Later in July we will disclose all vulnerabilities fixed in Bitcoin Core version 22.0. In August, all vulnerabilities fixed in Bitcoin Core version 23.0. And so on until we run out of EOL versions to disclose vulnerabilities for."
Phoenix Wallet v2.3.1 & Phoenixd v0.2.0: BOLT12 Offers "This marks a new step forward in Lightning UX. No need to generate a new QR code for every payment. No need for payer/receiver to interact. Phoenix Android (soon iOS) also supports contacts. Send money with a click, and associate payments to your known contacts."
'RegreSSHion' Vulnerability in OpenSSH Potentially Puts 700K Linux Boxes at Risk If exploited, the vulnerability allows attackers to fully compromise a system. They can execute arbitrary code with the highest privileges, leading to complete system control, malware installation, data manipulation, and creation of backdoors for persistent access. It also enables network propagation, letting attackers use the compromised system to exploit other vulnerable systems within the organization.