Avatar
William K⚡Santiago🔑☢️
bc52210b20d3fb89326463a3518674c7edde65794a7765c7f3a9119b20bfc6de
CEO, C4 CCSSA at PrivKey LLC, Blockchain strategist, cybersecurity. The Mission: The Separation of Money and State.

Microsoft BitLocker Bypasses are Practical

The article “Microsoft BitLocker Bypasses are Practical” discusses the practicality of bypassing Microsoft's default BitLocker implementation. The authors attended a security training that provided them with the skills and knowledge to bypass a default BitLocker configuration on a T470 ThinkPad, which can be applied to most modern business machines. The article emphasizes the potential risks and consequences associated with this attack technique, targeting businesses and individuals looking to safeguard sensitive data on their Windows devices. It also highlights the importance of understanding the limitations and operational considerations of BitLocker, as well as the potential solutions and challenges associated with bypassing or recovering the BitLocker key. The article provides technical insights, practical scenarios, and potential solutions for bypassing BitLocker, while also cautioning against the risks and ethical considerations involved in using third-party tools or bypass options without the recovery key.

For more details, you can access the full article through the following link:

https://blog.compass-security.com/2024/02/microsoft-bitlocker-bypasses-are-practical/

Another reason to minimize your attack surface specially when trusting black boxes like Microsoft.

European Court of Human Rights declares backdoored encryption is illegal

Surprising third-act twist as Russian case means more freedom for all

https://www.theregister.com/2024/02/15/echr_backdoor_encryption/

“NWC is useful for far more than simply integrating Lightning into Nostr applications as well. The entire design philosophy of Nostr itself as a protocol was centered around keeping it simple enough that the entire protocol could be easily implemented correctly by any developer with minimal time and resources. Applications that have nothing to do with Nostr can easily integrate NWC or similar protocols with almost no overhead or complexity to address the underlying issues of how to connect a Bitcoin wallet with their application without having to build it directly into the app.” --Shinobi

Imagine unlocking major advancements in security, decentralization, and the potential of Bitcoin's app ecosystem, not through a new Bitcoin feature, but with something entirely different. What if we leveraged decentralized protocols like Nostr to create a communication and coordination layer for Bitcoin apps? This would allow new applications to seamlessly connect with devices and wallets, bypassing the usual complexity and burden. That's the power of Nostr Wallet Connect.

Here is the article:

NOSTR WALLET CONNECT: A BITCOIN APPLICATION COLLABORATION LAYER

As the complexity of Bitcoin software and applications using Bitcoin grows, the need for a simple coordination mechanism for different applications to interact grows as well.

https://bitcoinmagazine.com/technical/nostr-wallet-connect-a-bitcoin-application-collaboration-layer

“For too long, the world has had to endure the fallout of subpar academic research on bitcoin mining’s energy use and environmental impact. The outcome of this bullshit research has been shocking news headlines that have turned some well-meaning people into angry politicians and deranged activists. So that you never have to endure the brutality of one of these sloppy papers, I’ve sacrificed my soul to the bitcoin mining gods and performed a full-scale analysis of a study from the United Nations University, published recently in the American Geophysical Union’s Earth’s Future. Only the bravest and hardest of all bitcoin autists may proceed to the following paragraphs, the rest of you can go back to watching the price chart.” --Margot Paez

Finding a universally accepted approach to regulating Bitcoin and fully understanding its environmental impact might be elusive. However, in the fight against flawed research, insightful and critical pieces like Margot Paez's, which dissect flawed methods, can have valuable contributions.

Here is this great read:

MINING MISINFORMATION: HOW THE UNITED NATIONS UNIVERSITY MISREPRESENTS BITCOIN’S ENERGY USE

Revealing the junk science used by the United Nations University to attack bitcoin mining. The first report from the “FUD Fighters” series.

https://bitcoinmagazine.com/sponsored/mining-misinformation-how-the-united-nations-university-misrepresented-data-to-exaggerate-bitcoins-environmental-footprint

33,000 new immersion-cooled #bitcoin mining computers connect online today. This 100 megawatt facility is now the largest electricity user in Sadersville, Georgia.

Why are we not doing this?https://m.primal.net/HcUw.mp4

Read simple pick an almost secret word that the tribe remembers and use under duress

Easy solution!

#Bitcoin surprise at the Curaçao Karnaval.

Look for @missUniCuracao Kim Rossen

https://m.primal.net/HcFQ.mp4

Encryption is a form of free speech and cannot be banned.

Apple says UK could 'secretly veto' global privacy tools

https://www.bbc.com/news/technology-68128177

The main promise of quantum computing is the ability to solve problems far faster than classical computers, but exactly how much faster varies. There are two applications where quantum algorithms appear to provide an exponential speed up, says Troyer. One is factoring large numbers, which could make it possible to break the public key encryption the internet is built on. The other is simulating quantum systems, which could have applications in chemistry and materials science." --Edd Gent

Will quantum computers shatter Bitcoin's foundations? Is the core encryption vulnerable now, in the next decade, or even in our lifetime? Separating hype from reality: What does the current state of quantum computing tell us about its ability to fulfill its promises, and its potential impact on Bitcoin's security?

Quantum Computing’s Hard, Cold Reality Check Hype is everywhere, skeptics say, and practical applications are still far away https://spectrum.ieee.org/quantum-computing-skeptics

I set my domain as my Bluesky handle @wksit.com https://bsky.app/profile/wksit.com

This is one a major difference between X and Bluesky which is more decentralized than X and harder to censor and could become a global form of DID

Good article form 2010 great read.

"One of the amazing things about the internet economy is how different the list of top internet properties today looks from the list ten years ago. It wasn’t as if those former top companies were complacent – most of them acquired and built products like crazy to avoid being displaced.

The reason big new things sneak by incumbents is that the next big thing always starts out being dismissed as a “toy.” --Chris Dixon

Why do so many miss the biggest innovations and most revolutionary technologies sitting right in front of their eyes? Sometimes, like Bitcoin, it is such a drastic change, or solves something so fundamental, that many aren't even aware of the problem.

The next big thing will start out looking like a toy

https://cdixon.org/2010/01/03/the-next-big-thing-will-start-out-looking-like-a-toy

NOSTR WALLET CONNECT: A BITCOIN APPLICATION COLLABORATION LAYER

As the complexity of Bitcoin software and applications using Bitcoin grows, the need for a simple coordination mechanism for different applications to interact grows as well.

https://bitcoinmagazine.com/technical/nostr-wallet-connect-a-bitcoin-application-collaboration-layer

Lightning Channel Service -

BitFinex now offers channel opens using Blocktank’s service.

This partnership makes intuitive sense because exchanges have lots of coin available to lock up, making lightning channel opens a way to get some relatively-riskless yield.

Getting Started With Blocktank’s Lightning Channel Service on Bitfinex

https://blog.bitfinex.com/bitfinex-lightning/getting-started-with-blocktanks-lightning-channel-service-on-bitfinex/