Avatar
William K⚡Santiago🔑☢️
bc52210b20d3fb89326463a3518674c7edde65794a7765c7f3a9119b20bfc6de
CEO, C4 CCSSA at PrivKey LLC, Blockchain strategist, cybersecurity. The Mission: The Separation of Money and State.

Domains hijacked for multiple crypto project websites

Researchers: Weak Security Defaults Enabled Squarespace Domains Hijacks

https://krebsonsecurity.com/2024/07/researchers-weak-security-defaults-enabled-squarespace-domains-hijacks/

Domain hijacking, a cybersecurity threat where malicious actors take control of legitimate domain names, can have significant implications for internet users, particularly through potential phishing attacks.

In such cases, the attackers use the hijacked domain to obtain login credentials by creating a fraudulent version of a trusted website.

The urgency to act upon receiving unsolicited communications, often sent via email, increases the likelihood of falling victim to these attacks.

Users must exercise caution and remain vigilant when receiving emails, even from reputable sources, to protect their personal information and prevent unauthorized access to their accounts.

Leaked Cellebrite Tool Docs Reveal List of Phones That Can Be Unlocked

https://cybersecuritynews.com/phones-cellebrite-tool-can-unlock/

Documents leaked from Cellebrite, a digital forensic solution provider created in Israel, have revealed a list of smartphones that can be unlocked using their tools.

The leaked document, obtained by Cybersecurity News, includes models from various manufacturers such as Apple, Samsung, and Google, as well as devices running on different operating systems.

Cellebrite's tools are widely used by law enforcement agencies and governments worldwide, raising concerns about the potential impact on user privacy and security, especially given Israel's reputation for producing surveillance technology.

The leak highlights the importance of addressing the security and privacy implications of these technologies and ensuring that user data is protected from unauthorized access, particularly when used by governments with a history of surveillance.

BREEZ LIGHTNING SDK INTEGRATING SUPPORT FOR LIQUID NETWORK

A new option for using Bitcoin is coming to the Breez SDK.

https://bitcoinmagazine.com/technical/breez-lightning-sdk-integrating-support-for-liquid-network

The Breez Lightning SDK, a popular open-source platform for integrating the Lightning Network into Bitcoin applications, is set to introduce support for the Liquid Network.

This development, as reported by Bitcoin Magazine, will provide users with an alternative Bitcoin option through the Breez SDK.

The Liquid Network, a federated sidechain built on Bitcoin's blockchain, enables faster and more confidential transactions.

The integration aims to enhance the functionality and flexibility of the Breez SDK, catering to the diverse needs of developers and users within the cryptocurrency ecosystem.

“If the American people ever allow private banks to control the issue of their money, first by inflation and then by deflation, the banks and corporations that will grow up around them (around the banks), will deprive the people of their property until their children will wake up homeless on the continent their fathers conquered.” --Thomas Jefferson

“If the American people ever allow private banks to control the issue of their money, first by inflation and then by deflation, the banks and corporations that will grow up around them (around the banks), will deprive the people of their property until their children will wake up homeless on the continent their fathers conquered.” --Thomas Jefferson

High bandwidth Tor network. Incentivized by the Bitcoin Lightning Network.

More decentralized. More Secure. Relays earn sats. Powered by Bolt12 offers.

https://devpost.com/software/el-tor?ref_content=my-projects-tab&ref_feature=my_projects

The inspiration behind building El Tor was to create a high bandwidth Tor network incentivized by the Bitcoin lightning network. We need a more private internet and a fast way for our Lightning nodes to communicate with each other. We also need to “Make Hidden Services Great Again”.

Can't wait for the Umbrel or Start9 app

"We shouldn’t count on hearing the truth about the attempted assassination from the mainstream media. No wonder the elites remain determined to censor social media sites like Twitter/X and TikTok. We live in an empire of lies, propped up by the mainstream media. And seeking the truth in this empire of lies is the greatest challenge for us in the moral bankruptcy in which we live."

Why We’ll Never Know What Really Happened in Butler, PA

by Ron Paul

https://ronpaulinstitute.org/why-well-never-know-what-really-happened-in-butler-pa/

High bandwidth Tor network. Incentivized by the Bitcoin Lightning Network.

More decentralized. More Secure. Relays earn sats. Powered by Bolt12 offers.

https://devpost.com/software/el-tor?ref_content=my-projects-tab&ref_feature=my_projects

The inspiration behind building El Tor was to create a high bandwidth Tor network incentivized by the Bitcoin lightning network. We need a more private internet and a fast way for our Lightning nodes to communicate with each other. We also need to “Make Hidden Services Great Again”.

High bandwidth Tor network. Incentivized by the Bitcoin Lightning Network.

More decentralized. More Secure. Relays earn sats. Powered by Bolt12 offers.

https://devpost.com/software/el-tor?ref_content=my-projects-tab&ref_feature=my_projects

The inspiration behind building El Tor was to create a high bandwidth Tor network incentivized by the Bitcoin lightning network. We need a more private internet and a fast way for our Lightning nodes to communicate with each other. We also need to “Make Hidden Services Great Again”.

The Petrodollar will become the Bitcoindollar.

You have been warned.

Wake-up, read or listen.

“Much like the World Economic Forum’s Young Global Leaders program has facilitated the placement of its trained, ideological allies in positions of top political power around the world, groups like Endeavor and their equivalents help ensure that similarly controlled business leaders dominate the private sector and become the public face of emerging market monopolies that are, ultimately, part of a broader network.” -- Mark Goodwin & Whitney Webb

The article discusses a network of powerful governments and billionaires potentially influencing emerging markets globally through public-private partnerships, impacting policies and governance in developing countries.

It highlights connections between tech giants, philanthropists, intelligence agencies, and other institutions vying for control over these markets and political systems, as well as their involvement in the Bitcoin world.

The article is an insightful investigation by Mark Goodwin and Whitney Webb that should not be missed.

The Chain of Custody: The “Mafia” Holding The Elite's Bitcoin

https://unlimitedhangout.com/2024/07/investigative-reports/the-chain-of-custody-the-mafia-holding-the-elites-bitcoin/

The companies poised to dominate the digital financial infrastructure of Latin America have arisen courtesy of the self-described “mafia” multiplier, Endeavor.

Flush with funds from billionaires linked to the US intelligence and organized crime, Endeavor’s influence over the CEOs it has championed promises that, with the ushering in of a new financial system, a wave of covert dollarization will shortly follow.

There is Bitcoin for digital value transfer.

For everything else there is Nostr.

https://nostr.com

My address:

npub1h3fzzzeq60acjvnyvw34rpn5clkaueteffmkt3ln4ygekg9lcm0qhw96sj

Proton launches Docs for private collaborative document editing

Introducing Docs in Proton Drive – collaborative document editing that’s actually private

https://proton.me/blog/docs-proton-drive

The increasing use of personal data for surveillance and AI training is concerning.

It's refreshing, therefore, to see productivity tools like Venice.ai that prioritize user privacy and empower individuals with control over their data.

it's great to see productivity tools emerge that keep the power in your hands.

Proton launches Docs for private collaborative document editing

Introducing Docs in Proton Drive – collaborative document editing that’s actually private

https://proton.me/blog/docs-proton-drive

The increasing use of personal data for surveillance and AI training is concerning.

It's refreshing, therefore, to see productivity tools like Venice.ai that prioritize user privacy and empower individuals with control over their data.

AT&T says criminals stole phone records of ‘nearly all’ customers in new data breach

Stolen data includes millions of AT&T customer phone numbers, calling and text records, and location-related data.

https://techcrunch.com/2024/07/12/att-phone-records-stolen-data-breach/

Still Use AT&T?

Decentralized systems take power away from control freaks.

These freaks are now mostly in power and started by infiltrating the education system to remove decentralization concepts.

We have to do the same teach decentralized concepts and sovereign individuals we regain power.

The future is bright.

Hackers accessed cell phone numbers of 2FA app Authy users

Twilio says hackers identified cell phone numbers of two-factor app Authy users

https://techcrunch.com/2024/07/03/twilio-says-hackers-identified-cell-phone-numbers-of-two-factor-app-authy-users/?utm_source=hs_email&guccounter=2

A phone number in the hands of a hacker poses significant security risks. Hackers can exploit this information through social engineering tactics or by colluding with unethical carrier employees to execute a SIM swap attack. This allows them to hijack your phone number, potentially bypassing two-factor authentication (2FA) systems that rely on text messages. Such breaches can lead to unauthorized access to various accounts and sensitive information. To mitigate these risks, it's advisable to take proactive measures to secure your phone number. One recommended approach is to use a secure provider like Efani or Cloaked Wireless, which offer enhanced protection against SIM swapping and other phone-based security threats.