Avatar
Unbank The Bank
5a81655d2a07064fbba5b63c6a47c266d81c020ca884671f56d86311e10fb07e

Bitcoin siempre fue para mi un acto de desobediencia civil. Resistencia pacífica. Hoy, creo que miles de ciudadanos lo holdean por pura desconfianza hacia el sistema. La protesta contra el fraude de la política monetaria.

Qué bien se está en Nostr con todos los que os habéis unido. No lo dejéis, hablad de lo que os interese, leed a otros y contestad. Nostr va de interacción humana de calidad. Sin postureo. Sin polarizar. Aquí construimos

Avancemos juntos

“Politics is the way for men without principles to lead men without memory."

Voltaire

Cell Towers vs WiFi.

In this wicked useful and brand spanking new post, I'm going to teach you what data is being shared from cell towers vs WiFi, and what your options to reduce that are. The end has 3 example cellphone setups for the average person, somewhat savvy, and tinfoil hat.

~~~

When you connect to cellphone towers:

You're using the modem which has an IMEI identification number. Using a DeGoogled phone and a VPN does NOT change this from revealing info about the hardware TO the TOWER, such as where it was bought. And who bought it.

There's a couple ways to deal with this. One way is to buy it in cryptocurrency, from a company like mine. This is the easiest method for most people.

A second way is to use external hotspots for service, and buy those locally in cash. For example GLinet travel routers:

https://simplifiedprivacy.com/glinet/index.html

(or crypto like Calyx/Tmobile depending on your country.) Some prefer this because then they can put it in a faraday bag to hide their location at home. And only take it out of the faraday bag outside their house.

A third way is to change the IMEI. This method is controversial, as some say it's stealth. Others say you're drawing attention to yourself by giving them bullshit or previous numbers.

Some devices are easier to change then others. And some countries have made it illegal to change the IMEI. Of course, I can not recommend anything illegal. But if it is legal in your country, then generally older things such as Nokias are the easiest. LunarDAO has a guide on this:

https://wiki.lunardao.net/imei.html

A combination of the 2nd and 3rd way can be done by using something like Blue Merle. This is software for GLiNET travel routers that changes the IMEI of the router. Then you could in theory swap different SIM cards. However, this has a high risk of potential error for a new user, and it's unclear who's audited it:

https://github.com/srlabs/blue-merle

~~~

When you connect to WiFi:

You're NOT using the IMEI. Instead, you're getting a MAC address assigned to you by the router. This is a local area network. Android randomly generates MAC addresses for each connection, and you can actually see these in the settings of the WiFi connection.

In general, Android security is pretty good for WiFi. However, the CIA loves to hack routers. From the Wikileaks documents, we know they prefer to tunnel traffic from home routers directly to the CIA to see the traffic.

There's two main ways to avoid this. First, you could always use a VPN, which then bypasses the router's DNS.

Second, you could always be behind a firewall or travel router. The router's WAN port is the one communicating with a modem (public internet). While the router's LAN or (local area network) is the one giving you a MAC address.

~~~

What are some example setups?

average person:

Phone (bought with Crypto)

\/

SIM (bought with cash)

\/

VPN

\/

JMP Chat (VoIP)

(using public xmpp servers)

\/

Cell numbers

~~~~~

Savvy dude:

Phone (bought with Crypto)

\/

Silent Link (Crypto eSIM)

\/

VPN

\/

VPS you control

self-host xmpp

\/

JMP Chat (VoIP)

\/

Cell numbers

~~~~~

Tinfoil hat:

Phone (bought with Crypto)

No SIM. Using Tor

\/

GLiNET router w/ SIM (Using VPN)

maybe faraday bags or IMEI changes

\/

VPS you control

self-host xmpp

\/

JMP Chat (VoIP)

\/

Cell numbers

~~~~~

And of course, regular SMS is horrible. Go with a real messenger if the other person will allow it, (which one is actually not that critical): Signal, XMPP, Matrix, Session, SimpleX.

Self-hosting the VPS just provides another layer of protection that you control between the hostile adversary and you.

So our team can help you get a Phone, or setup a VPS:

https://simplifiedprivacy.com/they-see-everything/index.html

But even if you go with another option, I hope you digest my core message:

you've got way more control than you think.

Cell Towers vs WiFi.

In this wicked useful and brand spanking new post, I'm going to teach you what data is being shared from cell towers vs WiFi, and what your options to reduce that are. The end has 3 example cellphone setups for the average person, somewhat savvy, and tinfoil hat.

~~~

When you connect to cellphone towers:

You're using the modem which has an IMEI identification number. Using a DeGoogled phone and a VPN does NOT change this from revealing info about the hardware TO the TOWER, such as where it was bought. And who bought it.

There's a couple ways to deal with this. One way is to buy it in cryptocurrency, from a company like mine. This is the easiest method for most people.

A second way is to use external hotspots for service, and buy those locally in cash. For example GLinet travel routers:

https://simplifiedprivacy.com/glinet/index.html

(or crypto like Calyx/Tmobile depending on your country.) Some prefer this because then they can put it in a faraday bag to hide their location at home. And only take it out of the faraday bag outside their house.

A third way is to change the IMEI. This method is controversial, as some say it's stealth. Others say you're drawing attention to yourself by giving them bullshit or previous numbers.

Some devices are easier to change then others. And some countries have made it illegal to change the IMEI. Of course, I can not recommend anything illegal. But if it is legal in your country, then generally older things such as Nokias are the easiest. LunarDAO has a guide on this:

https://wiki.lunardao.net/imei.html

A combination of the 2nd and 3rd way can be done by using something like Blue Merle. This is software for GLiNET travel routers that changes the IMEI of the router. Then you could in theory swap different SIM cards. However, this has a high risk of potential error for a new user, and it's unclear who's audited it:

https://github.com/srlabs/blue-merle

~~~

When you connect to WiFi:

You're NOT using the IMEI. Instead, you're getting a MAC address assigned to you by the router. This is a local area network. Android randomly generates MAC addresses for each connection, and you can actually see these in the settings of the WiFi connection.

In general, Android security is pretty good for WiFi. However, the CIA loves to hack routers. From the Wikileaks documents, we know they prefer to tunnel traffic from home routers directly to the CIA to see the traffic.

There's two main ways to avoid this. First, you could always use a VPN, which then bypasses the router's DNS.

Second, you could always be behind a firewall or travel router. The router's WAN port is the one communicating with a modem (public internet). While the router's LAN or (local area network) is the one giving you a MAC address.

~~~

What are some example setups?

average person:

Phone (bought with Crypto)

\/

SIM (bought with cash)

\/

VPN

\/

JMP Chat (VoIP)

(using public xmpp servers)

\/

Cell numbers

~~~~~

Savvy dude:

Phone (bought with Crypto)

\/

Silent Link (Crypto eSIM)

\/

VPN

\/

VPS you control

self-host xmpp

\/

JMP Chat (VoIP)

\/

Cell numbers

~~~~~

Tinfoil hat:

Phone (bought with Crypto)

No SIM. Using Tor

\/

GLiNET router w/ SIM (Using VPN)

maybe faraday bags or IMEI changes

\/

VPS you control

self-host xmpp

\/

JMP Chat (VoIP)

\/

Cell numbers

~~~~~

And of course, regular SMS is horrible. Go with a real messenger if the other person will allow it, (which one is actually not that critical): Signal, XMPP, Matrix, Session, SimpleX.

Self-hosting the VPS just provides another layer of protection that you control between the hostile adversary and you.

So our team can help you get a Phone, or setup a VPS:

https://simplifiedprivacy.com/they-see-everything/index.html

But even if you go with another option, I hope you digest my core message:

you've got way more control than you think.

Cypherpunks write code.

Capitalists create products from code.

Crypto anarchists use products to defend themselves and their families against theft and tyranny.

Tradfi bros borrow money they didn't earn to acquire property they didn't develop - and like a fat, entitled leech, gorge on the economic value created by others.

Are you aware that the US and many other governments are storing absolutely all the data you leave on the internet?

From your history of websites visited, your comments on social networks, your photos, your bank details, your tax data, the calls you make, absolutely everything.

All that is stored until they need to accuse you of something or spy on you for some reason.

Besides, now, with the fake artificial intelligence, it is very easy to analyze this data and correlate them.

Humans have become very predictable thanks to all the data they have on us, the riots are over, the government has perfected the boiled frog syndrome to the extreme.

It's a bit hopeless, I think we will eventually end up agreeing with the unabomber.

Technology is making us more and more slaves. We need cryptography to protect us from the government, but maybe we should involute in some aspects, especially social ones. Return to the countryside and create a more atomized society with circular economies and cryptography.

GM Barcelona ☀️ Nuevo meetup

CARTERAS CON FUNCIONALIDADES AVANZADAS (MINISCRIPT) 👛🔐

🗓 7 de Noviembre - 19:00h

📍 Coworking Transforma BCN - c/ Consell de Cent, 394. Barcelona

Jose Luis Landabaso miembro de la comunidad de Barcelona, que ya nos presentó el lenguaje miniscript en septiembre de 2023, viene esta ocasión a explicarnos su proyecto de cartera que incorpora algunas capacidades en este lenguaje.

Jose Luis presentará la wallet en la que está trabajando, que cuenta con funcionalidades avanzadas ya que incorpora el uso de timelocks. El caso de uso que está trabajando es un sistema que permite bloquear la cartera por un tiempo determinado para prevenir posibles wrench attacks.

Rewind Bitcoin, a Wallet that lets you Reverse Theft

Podéis encontrar más sobre el ponente en sus redes sociales, o sitio web:

https://twitter.com/landabaso

https://github.com/landabaso

https://bitcoinerlab.com

Inscripciones y toda la infomación en la página de meetup: https://www.meetup.com/bitcoin-barcelona/events/304123190

———

V4V⚡️

Si no puedes asistir, pero te gustaría aportar a la comunidad, puedes dejarnos una donación para apoyar nuestro trabajo y ayudarnos a seguir ofreciendo contenido de calidad🫡🤝

Bitcoin On-chain ⛓ // Lightning ⚡️

Clearnet 🚾 https://btcpay.bitcoinbarcelona.xyz

Tor 🧅 http://yys2j4k6rvtcp7mvpriunsp7cmkr7vvmxktle4l2qjqzto4w7n2mamid.onion

Are bitcoiners afraid of veiled threats from the European Central Bank? No, the ECB is actually afraid of #Bitcoin

I'm a Digital Agora

My core positions:

1. Don't waste time with politics. Vote with your actions.

2. Don't buy crypto, Earn it. Start accepting it.

3. Transcend locations with Encryption as identity, over protocols with redundancy

4. Physical locations are bad, because they are censored and controlled by a political thugs.

5. If you CAN'T transcend locations, such as Email, then self-host it, to a VPS you control. Everyone should have a little digital home. You can team up with 2-3 friends to get a VPS for 2-3 bucks a month. Are you trying to bullshit me that you don't know two people who want email?

7. Centralization is harmful. Beware of systems that promise privacy, but encourage centralized authority, such as Protonmail and Custodial Lightning.

8. Anything can stop inflation, even tuna fish cans. The real purpose of cryptocurrency is peer-to-peer cash. If you're only saving in Bitcoin, you've lost the plot.

9. It's okay to be pessimistic about society, but you've got to stay optimistic about your own life.

8. Big Banks and Big Tech need you to culturally accept their authority. Anything outside of voluntary cultural obedience is violence. But pure violence is not effective to hold power, over vast amounts of the population, over long periods of time...

So: reject it until they point gun

And then: it strips them of their power

Replying to Avatar Arkad

https://x.com/TuurDemeester/status/1847512241173582058

"Este nuevo artículo es una verdadera declaración de guerra: el BCE afirma que los primeros en adoptar las políticas #bitcoin roban valor económico a los que las adoptan más tarde. Creo firmemente que las autoridades utilizarán este argumento ludita para promulgar impuestos o prohibiciones.

En lugar de elogiar a Bitcoin como un cambio de paradigma tecnológico al estilo del petróleo e Internet, los autores introducen el argumento descaradamente ludita de que los "primeros usuarios" ... "aumentan su riqueza real y su consumo" ... "a expensas de [los rezagados]".

Continúan abogando descaradamente por una legislación... "para evitar que los precios de Bitcoin suban o para ver a Bitcoin desaparecer por completo" con el fin de evitar "la división de la sociedad".

En todos los años que he estado siguiendo el espacio de Bitcoin, este es, de lejos, el artículo más agresivo que han escrito las autoridades. No se muestran demasiado agresivos. Está claro que estos economistas de los bancos centrales ahora ven a Bitcoin como una amenaza existencial, que debe ser atacada por todos los medios posibles."

Esto potencia:

- Adquirir Bitcoin sin asociarlo con tu identidad

- Uso de Bitcoin P2P

- Revalorización de Bitcoin en mercados P2P.

nostr:nevent1qqszjqdd6yycu5k28empsne93ark547y7hu2nd0d2peay8h9p9aqygqppemhxue69uhkummn9ekx7mp0qgs9wsye59c9rv838e6l0jyn8csns3m32mqvvl4za7ty8zxu7w47hqqrqsqqqqqpd24ela