6b
Bitcoin
6bb28e797d075bd0a822769b0173f8d0fc876fedeba4168f238709631be41273

Wow, AI generated videos

nostr:note1pv38hqmhkmeny9dhhsef5jpssymcz95lek0y5vyresnz03jn9kcqxr4td5

Neat project!

nostr:note1rjg2gg4s85l3nten2j3mz6n5hfc7garpk97yvft6rvugtgcwttmq2s20vn

French Judge's Digital Exclusion Reveals US Influence

Judge Nicolas Guillou of the International Criminal Court faces significant digital exclusion due to US sanctions over arrest warrants for Israeli leaders. The sanctions mean his accounts with US firms like Amazon and PayPal are closed, and he struggles with basic transactions as US companies dominate global finance and tech sectors. Guillou suggests the EU should block such sanctions to ensure digital sovereignty and protect the rule of law. He advocates for stronger EU regulations to prevent the enforcement of US-imposed sanctions within Europe.

- US tech dominance complicates Guillou’s daily functions, highlighting Europe's vulnerability.

https://www.heise.de/en/news/How-a-French-judge-was-digitally-cut-off-by-the-USA-11087561.html

Beginning to think that more conflicts in Bitcoin will center around the perceived control over Bitcoin.

nostr:note14jrzeqsgm5qt4fjgjkeachfka0vhhppectu5ll6j7lu4e8vddpdsqmzdew

Fucking weird like 😳

nostr:note12v0v7x0rt23klqax7lt7qcxu6erqqwe5ktxygntw64h09umt654sezzld3

Censorship Systems Spread Globally

A document leak reveals that Geedge Networks sells advanced censorship and surveillance systems akin to China's Great Firewall globally. Operating since 2018, the company provides governments in countries like Kazakhstan, Ethiopia, Pakistan, and Myanmar with tools to monitor and block internet activity. Its systems can intercept unencrypted data and target individuals. Despite claims of focusing on cybersecurity, Geedge's technology enhances government power over online information. This raises concerns about digital authoritarianism worldwide.

- Geedge's technology has been installed across 26 data centers in Myanmar, affecting millions of internet connections.

- The company's systems can block VPNs, forcing users to go without encryption, increasing vulnerability to surveillance.

https://www.wired.com/story/geedge-networks-mass-censorship-leak/

Supply Chain Attack Compromises JavaScript Packages

A major supply chain attack breached the NPM account of developer qix, resulting in malicious versions of key JavaScript packages like chalk and strip-ansi. The malware, a crypto-clipper, swaps wallet addresses to hijack crypto transactions. Though efforts are underway to resolve this issue, it's crucial to audit project dependencies to ensure safety.

- Affected packages have over one billion weekly downloads.

- Immediate action required: update package dependencies to known-safe versions in package.json.

https://jdstaerk.substack.com/p/we-just-found-malicious-code-in-the

New Epstein Footage Discredits Initial FBI Claim

Previously missing footage from Jeffrey Epstein's prison cell has emerged, contradicting initial FBI statements about its inaccessibility due to a midnight reset. Newly released files from the House Oversight Committee reveal previously unseen surveillance footage, including the so-called “missing minute,” justifying conspiracy theories that questioned Epstein's official suicide. This footage also shows Epstein being escorted for a phone call—a detail not publicly mentioned before. The Trump administration has yet to respond to these revelations or the inaccuracies in their earlier assertions.

- The footage gap was supposed to be a technical reset error, but that explanation is now debunked.

https://newrepublic.com/maz/post/199920/missing-minute-epstein-files-prison-video

eSIM Security Concerns Unveiled

A Northeastern University study revealed that eSIM providers often route user data through foreign networks, notably Chinese infrastructure, without disclosure, raising privacy concerns. The team tested various eSIM services, finding that user IP addresses frequently corresponded to third-party countries, not the user’s actual location. Surprisingly, creating an eSIM resale service required minimal effort, granting resellers extensive access to sensitive data. Researchers recommend increased transparency and regulatory measures to address these vulnerabilities.

- eSIM profiles were seen to silently communicate with servers and retrieve SMS, often without user knowledge.

- A full dataset and methodology will be available on GitHub for further research.

https://www.itnews.com.au/news/travel-esims-secretly-route-traffic-over-chinese-and-undisclosed-networks-study-619659

Replying to Avatar TKay

Build approved. 🫡 🚀

https://testflight.apple.com/join/98Rjzc6u

nostr:note1h0m3kspdtfxrdy2te67sg77yvu6p8623d7ew5uxqynlglng090wslj2l7g

Dope! Using it right now to listen to some tune 🎶

Google is just mad that Bitcoin has a better market cap 🧢

Bitcoin Sidelined by U.S. Crypto Milestone

The GENIUS Act, the first U.S. law focused solely on cryptocurrency, establishes federal regulations for stablecoins, marking crypto's legal debut without mentioning Bitcoin. This shift in focus highlights Bitcoin's diminishing relevance in Washington as stablecoins, linked to the U.S. dollar, gain favor for their practicality and regulation. While Wall Street continues to embrace Bitcoin as an investment asset, its omission from the legislation signals a pivot towards stablecoins at the political level, questioning Bitcoin's role in the evolving crypto landscape.

- The GENIUS Act underscores a shift in crypto power dynamics, spotlighting stablecoins over Bitcoin.

- Bitcoin’s absence from new legislation may impact its future significance in a regulated crypto environment.

https://apple.news/Ax4MNhxYhQKu_mT-3gU4o0Q

Jeffrey Epstein Case Documents Unsealed

Recently, unsealed court documents on Jeffrey Epstein provided limited new insights into his high-profile connections, though many notable names were already known. The Miami Herald's Julie Brown emphasizes the broader narrative of legal manipulation by the wealthy. Among the revelations are testimonies from victims and witnesses, spotlighting Epstein's misconduct beyond just Palm Beach. Despite portrayals of salacious connections, these documents primarily reflect Epstein's and Ghislaine Maxwell's crimes. Brown criticizes the fading governmental and media interest post Epstein's death and Maxwell's imprisonment, urging focus on systemic trafficking issues.

- The Miami Herald's legal efforts have led to thousands of pages of documents being unsealed.

- Victims emphasize the importance of revealing the truth hidden within these documents.

https://www.vanityfair.com/news/epstein-documents-miami-herald

Appreciate the passion, but this doesn’t actually answer questions like: “Do you agree or disagree that spam filters contribute to mining centralization or not?”

Would love a clear take that doesn’t shift focus from the effect of spam filters on centralization to attacking others’ perceived inconsistency or bad faith in discussing these topics.

Blaming devs for every decision is peak NPC energy. Touch grass.

nostr:note10sapy9w0n5mxuytwl53gkznn8frp4drqgc9tu7sqrqqqxz5dl48suxs9fq

I’m all for paying for value but it would be a banger to engineer native Nostr ads without the possibility of surveillance.

Coinbase finally acknowledges Bitcoin’s store of value https://youtube.com/watch?v=oO7WYrekjKk

The core issue isn’t the technical efficacy of filters but the precedent they set for censorship within the Bitcoin network. When nodes or miners begin filtering transactions—be it JPEGs, Ordinals, or others—they’re making subjective decisions about what constitutes “spam.” This subjectivity opens the door to broader censorship, as evidenced by instances where mining pools like F2Pool filtered transactions linked to OFAC-sanctioned addresses .

These actions undermine Bitcoin’s foundational principle of neutrality. If certain transactions can be excluded based on content or origin, it challenges the idea of a permissionless and decentralized network. Moreover, these filters can be circumvented through backchannel deals with miners, leading to a less transparent and more centralized system.

In essence, censorship by another name is still censorship. While filters may reduce unwanted data, they also pave the way for discretionary censorship, threatening the very ethos of Bitcoin’s open and decentralized nature.

Bitcoin is for protecting things you might hate. No exceptions.

Moral Ambition: Harnessing Talent for Meaningful Change

The concept of "moral ambition," as discussed by Rutger Bregman, emphasizes the importance of utilizing one's talents to tackle significant global challenges rather than pursuing conventional success or idle comforts. Bregman categorizes jobs by ambition and idealism, advocating for a combination that drives individuals to impact meaningful change in the world.

- The article challenges readers to reconsider their career choices, encouraging engagement with societal issues, from climate change to inequality, rather than settling for roles that offer little societal value.

- Highlighting the legacy of abolitionist Thomas Clarkson, Bregman calls for a reflection on what constitutes honorable achievement, urging people to pursue lives worthy of respect by utilizing their skills and opportunities for the greater good.

https://www.theguardian.com/lifeandstyle/2025/apr/19/no-youre-not-fine-just-the-way-you-are-time-to-quit-your-pointless-job-become-morally-ambitious-and-change-the-world