Here it was!
But can't figure out how to implement this with cloudflare tunnel.
I've read somewhere (can't find it again) that you could direct that specific traffic through reverse proxy to fix it.
And if you check relays running strfry some do have custom icons.
To issue for me right now is that I'm running it through cloudron tunnel and no reverse proxy like nginx / Caddy or similar.
Anyone know how to change the icon of my relay when running Strfry relay with cloudflare tunnel?
#nostr #strfry
Spot on! 
THAT would give me a chance to stack cheap sats!
Let it get to 100k first, then huge drop to say 20k!
- Knock knock...
- Who's there?
- Daisy
- Daisy who?
- Daisy'me rollin
There was a glitch yesterday and the meme is accurate but because of glitch.
What was THE key fact that made you realize the superiority of #bitcoin ?
For me it started with getting pissed off of the current rigged system and I was looking for alternatives.
I'm really glad u got introduced to bitcoin by a friend. I couldn't imagine the rabbit hole was this deep!
And on top of that, #nostr , damn! Impressive stuff!

... enough said! Worth repeat! 
I built a console application for it but that involved writing the seed phrase in the app.
But it took forever.
I tested it with a 4 digit password and that was pretty fast.
But as soon as capital / non capital letters was introduced with numbers and symbols it never finished.
So I don't know, there might be someone else that made an effort for this.
I call that a regular day...
Then I realize, it's people outside bitcoin that should walk around with that feeling.
Glitch clown world!
Tick tock, next block. Only thing that works proper!
Damn nice pins at https://btcpins.com
Thanks for that nostr:npub12z5nym0qkxhdrvmyhup2llzp98lryr38gw8ywxktkps9eqdts7asjj9k9c !
I would love that to be true...
But unfortunately not..
nostr:npub18kpw3akvdsyk239lx0jgwksr74sq4nlha3r8u9g2rnrhztfpfhysy469c4

#bitcoin #btc
Drop those bitcoin stickers
Stay humble!

Morning walkstr around the park
GM
Inflation steals your savings
Stay humble stack sats
Happy weekend
#nostr #walkstr #inflation #bitcoin.rocks nostr:npub18kpw3akvdsyk239lx0jgwksr74sq4nlha3r8u9g2rnrhztfpfhysy469c4 #bitcoin #grownostr


GM
What about ETH ETF?
Why extend the scams by giving the mother of all scams legitimacy?
Could anyone try to zap me from nostr client (native zap)...
Trying to figure out some issue with my setup!
1 sat is more than enough for catching logs!
#GrapheneOS uncovers leaked documentation for smartphone exploits by Cellebrite.
XRY and Cellebrite say they can do consent-based full filesystem extraction with iOS, Android and #GrapheneOS. It means they can extract data from the device once the user provides the lock method, which should always be expected. They unlock, enable developer options and use ADB.
Cellebrite's list of capabilities provided to customers in April 2024 shows they can successfully exploit every non-GrapheneOS Android device brand both BFU and AFU, but not GrapheneOS if patch level is past late 2022. It shows only Pixels stop brute force via the secure element.


Cellebrite has similar capabilities for iOS devices. This is also from April 2024. We can get the same information from newer months. In the future, we'll avoid sharing screenshots and will simply communicate it via text since to prevent easily tracking down the ongoing leaks.


Pixel 6 and later or the latest iPhones are the only devices where a random 6 digit PIN can't be brute forced in practice due to the secure element. Use a strong passphrase such as 6-8 diceware words for a user profile with data you need secured forever regardless of exploits.
Pixels are doing a bit better on the secure element front and iPhones are doing a bit better against OS exploitation, but not by much.
As always, this shows the importance of our auto-reboot feature which gets the data back at rest after a timer since the device was locked.
Our focus in this area is defending against exploitation long enough for auto-reboot to work. It's set to 18 hours since the device was locked by default, but users can set it as low as 10 minutes. Since around January, we massively improved security against these attacks.
By default, our recently added USB-C port control feature disallows new USB connections in AFU mode after the device is locked and fully disables USB data at a hardware level once there aren't active USB connections. Users can set it to also do this in BFU or even when unlocked.
Users with a high threat model can fully disable USB including USB-PD/charging while the OS is booted to only allow charging while powered off or booted into the fastboot/fastbootd/recovery/charging modes.
GrapheneOS on 8th gen Pixels is ideal due to hardware memory tagging.
Consent-based data extraction (FFS) is not in the scope of what we're trying to defend against beyond shipping our secure duress PIN/password implementation to replace insecure approaches via apps. Data users can backup is inherently obtainable with consent, which is nearly all.
Within the past 24 hours, there has been an attack on GrapheneOS across social media platforms misrepresenting consent-based data extraction as GrapheneOS being compromised/penetrated. The person doing it is pretending to be multiple people and falsely claiming we covered it up.
GrapheneOS is the only OS having success defending against these attacks. We could do more with a successful hardware partnership such as having encrypted memory with a per-boot key instead of relying on our kernel memory zeroing combined with auto-reboot and fastbootd zeroing.
New versions of iOS and Pixel OS often invalidate their existing exploits, but devices in AFU are stuck in AFU mode waiting for new exploits.
Random 6 digit PIN is only secure on a Pixel/iPhone and only due to secure element throttling. Use a strong passphrase to avoid this.
If you wonder why duress PIN/password is taking so long, it's because we aren't doing it for show like existing implementations. It needs to work properly and guarantee data will be unrecoverable with no way to interrupt it. Slowly rebooting to recovery to wipe isn't acceptable.
See https://x.com/GrapheneOS/status/1775305179581018286 for our thread covering the firmware improvements we helped get implemented in the April 2024 release for Pixels. It doesn't currently really help the stock Pixel OS because they haven't blocked the OS exploits that are being used yet but it helps us.
Our hope is that our upcoming 2-factor fingerprint unlock feature combined with a UI for random passphrase and PIN generation will encourage most users to use a 6-8 diceware word passphrase for primary unlock and fingerprint + random 6-digit PIN for convenient secondary unlock.
Cellebrite documentation and has stated they'll upload future versions of it if you want to look at the rest of it:
We have info on XRY, Graykey and others but not the same level of reliable details as this.
Make sure these guys identities is kept a secret!
GM
This question is already old but I go anyways!
What's the best Android Nostr app?
I'm at Amethyst right now, is there anything better?
#nostr #bitcoin
Merry Christmas




