Fun episode!
nostr:note1a3plpwe7e2qddwaln4rtdhzzsf0u3fdlgs4qlyvrujysywp38vqsys2phj
🚀 BR075 - Bitcoin Core, COLDCARD, BitKit, RAMBO Attack, Chinese Hardware Backdoors, Nostr Censorship?! + MORE ft. nostr:npub1p4kg8zxukpym3h20erfa3samj00rm2gt4q5wfuyu3tg0x3jg3gesvncxf8, nostr:npub1mxrssnzg8y9zjr6a9g6xqwhxfa23xlvmftluakxqatsrp6ez9gjssu0htc & nostr:npub1az9xj85cmxv8e9j9y80lvqp97crsqdu2fpu3srwthd99qfu9qsgstam8y8
Listen to the episode:
➡️ Fountain: https://fountain.fm/episode/iUJfWvpxPGjm6Z7AUsy0
➡️ Spotify: https://tinyurl.com/2fmcw2ak
➡️ Amazon: https://tinyurl.com/5yzjc8yt
➡️ Apple: https://tinyurl.com/yz6fc9tf
➡️ YouTube: https://youtu.be/xl-hyGGaLmM
Shownotes:
➡️ Website: https://bitcoin.review/podcast/episode-75
➡️ Substack: https://open.substack.com/pub/bitcoinreview/p/bitcoin-review-podcast-br075-bitcoin
Is the dawn of nostr censorship here?! NVK and guess discuss the recent development of nostr:npub1rtlqca8r6auyaw5n5h3l5422dm4sry5dzfee4696fqe8s6qgudks7djtfs being tagged for hate speech on nos social. And ask the important question... when Commie Meter™? 👇
Fun episode!
nostr:note1a3plpwe7e2qddwaln4rtdhzzsf0u3fdlgs4qlyvrujysywp38vqsys2phj
Best part is the Clearpill about Pegasus / Celebrite / Zerodays
What is the clear pill on Pegasus? Could you summarize it for me?
The clearpill I took away is:
Most 'highly sophisticated and unrealistic' attack vectors will be weaponized by companies & made usable to highly incompetent government employees with the click of a button. No computer is absolutely secure, especially not complex ones, as zero-days are found, exploited & sold to private firms or stockpiled by 3-letter agencies without you nor the manufacturer ever learning about them.
Anything to add? nostr:npub1az9xj85cmxv8e9j9y80lvqp97crsqdu2fpu3srwthd99qfu9qsgstam8y8
The State is commoditizing exploits and has been for a long time. They have special contract vehicles for buying the tech from private sector to be tailor made for specific use cases. The State will also purchase entire "companies" to be honeypots for bad actors to target. Or to obfuscate their involvement.
The clearpill I took away is:
Most 'highly sophisticated and unrealistic' attack vectors will be weaponized by companies & made usable to highly incompetent government employees with the click of a button. No computer is absolutely secure, especially not complex ones, as zero-days are found, exploited & sold to private firms or stockpiled by 3-letter agencies without you nor the manufacturer ever learning about them.
Anything to add? nostr:npub1az9xj85cmxv8e9j9y80lvqp97crsqdu2fpu3srwthd99qfu9qsgstam8y8
Perfect. Bed time