Avatar
Nour
02a11d1545114ab63c29958093c91b9f88618e56fee037b9d2fabcff32f62ea9
N in Bᴺ 𝕊pace

I always live on the edge and sendstr.com these between devices

They are not good for anything xD

Such news make me think the ETF is priced in due to the amount of inside traders who know what's coming and almost when.

They might be trying not to draw attention by slowly draining exchanges. One reason why the orange has been relentlessly going up.

GM fren. I'll be honest you gave me the idea 😜

I didn't roast them. I should try that :D

I usually add coriander in the last stage to keep them green. If you like chicken liver, this would be a great addition. Both partially cooked with the meat and fresh for seasoning.

4 Tips for 2FA

2FA or 2-Factor Authentication is a great security tool if done correctly. Here’s 4 tips.

1) SMS 2FA Sucks

Ethereum developer Vitalik Buterin mouths off about decentralization, but got his Twitter account hacked by linking it to a government phone number. SMS texts are the easiest 2FA method for random hackers to compromise. There’s a technique known as SIM swapping which allows a hacker to switch SIM cards, so his or her device can receive your SMS texts. This can then be used to compromise your 2FA.

Also, SMS SIM cards leak your real exact physical location when it connects to a cellphone tower. In addition, you’ve given the mobile service provider the information to know what services or websites you’re using.

Another reason SMS 2FA is horrible is that the SIM card is often tied to your identity.

________________

2) KYC is less secure

Often out of ignorance, people associate real identity verification as being more secure. But in reality this is untrue because once you associate an account with a real person, then social engineering, SIM card swapping, and identity-based password guessing become possible. In addition, the physical location of password databases can become known to violent actors.

________________

3) Reject large proprietary companies

Also many people, out of ignorance, favor technology services from large corporations because they assume them to be more secure. They presume that the large company can be trusted with their identity information.

In reality, large companies may be bureaucratic, enabling hackers to prey on their inefficiencies. For example, recently Uber and Rockstar Games were hacked with social engineering. The Uber hack released not only the financial information of customers but also to where the customers had traveled.

Microsoft’s Password database manager for government accounts was hacked by Iranians. The local governments had to pay Bitcoin as ransom to get control back. This further demonstrates that large companies like Microsoft and Google can not be trusted to safely store your data or identity.

We do NOT recommend the use of omnipotent Google Authenticator for numerous reasons. First it’s not open source, so who knows what malicious tracking Google is doing. Google’s track record regarding privacy is piss poor, so why should you trust these malicious clowns?

Second, Google Authenticator will prevent you from getting the backup phrase which can be used to transfer the 2FA account to either a different authenticator phone app or a desktop client. The only thing that Google’s app will let you do is transfer the app to a different Google Authenticator account. So essentially Google has locked you into the Google ecosystem, and once you are dumb enough to use Google Authenticator, you can’t switch to an open source one without the website giving you a brand new backup phrase.

________________

4) Avoid Phones

You want to avoid doing 2FA on a phone that you carry around. A phone is real easy to accidentally lose or be stolen; you might leave it in an unsafe place. Additionally, phones have unsafe hardware. Phones have 2 “brains”, one with the CPU/RAM and another called the baseband modem that connects to cellphone towers. Numerous studies have demonstrated that hackers can remotely access bandband modems by pretending to be the cellphone tower.

When you put a phone in airplane mode, this is just an API REQUEST from the CPU/RAM brain to the baseband modem asking it to please stop. The baseband modem does not have to honor this request and won’t if corrupt government thugs are illegally hacking you in violation of their own constitutions.

________________

Conclusion:

2FA should be done on a Linux computer using KeePass XC with TOTP. This avoids connecting to the internet with open source software you control. Google Auth is just one client for TOTP, but KeePass XC will work.

Good read on MFA / 2FA

nostr:note1y53s6p48n0wajp4gdxkwtjfsddr433m2l02xj3uvn4r5mfuj46jq8f8x4q

For those locked in with Google Authenticator, this tool might be helpful to extract the TOTP secrets in different formats for other apps.

https://github.com/scito/extract_otp_secrets

Thanks, nostr:npub14slk4lshtylkrqg9z0dvng09gn58h88frvnax7uga3v0h25szj4qzjt5d6!

Replying to Avatar franny

Black pepper and coriander make smell wonders

This song is crazy good. nostr:npub1e2wk36e9vg8uw40phrrkkhc4tax8a9ken3fjcyy63vmdyz9aee2sk9el27 is a next level artist.

https://www.youtube.com/watch?v=XcdQG43Ee2I

And the Elliptic Curve in the end... is just too much for my brain to handle haha.

Game idea: everytime you read something you don't like or don't care about on social media go buy some sats

Today's keywords: Sam Altman, Javier Milei

All of a sudden my entire feed took a political turn.

Argentina, Palastine, ...

I thought I opened Twitter by mistake 🤔

Bitcoin doesn't need any country or politician, they need it to fix their mess. Just like a knife it doesn't need us, we need it to cut shit.

I used to think this, also heard it from new coiners recently:

What if Bitcoin, the network and the currency, for whatever reason failed in the coming years?

Now I know the answer; It is okay, this community won't stop giving and it will keep going places.

Replying to Avatar Nunya Bidness

What is this, some WIP fiction? I love it already 😍