Candy Crush, Tinder, MyFitnessPal: See the Thousands of Apps Hijacked to Spy on Your Location
A hack of location data company Gravy Analytics has revealed which apps are—knowingly or not—being used to collect your information behind the scenes.
https://www.wired.com/story/gravy-location-data-app-leak-rtb/
Use any of these applications on your smartphone?
GM #plebchain, stay humble, stack bits/sats, and think for yourself.
Why Bitcoin matters without overwhelming people.
GM #plebchain, stay humble, stack bits/sats, and think for yourself.


CIA can read WhatsApp messages – Zuckerberg
Encryption prevents Meta from accessing chats, but it is powerless when someone logs directly into a user’s phone, the company’s CEO has said
Meta CEO Mark Zuckerberg has acknowledged that US authorities, including the CIA, can access WhatsApp messages by remotely logging into users’ devices, effectively bypassing the platform’s end-to-end encryption.
https://www.rt.com/news/610717-whatsapp-messages-cia-zuckerberg/
Using CalyxOS (as mentioned in the provided URL) could be a potential solution. CalyxOS is a custom Android operating system that prioritizes user privacy and security. It is designed to reduce tracking and surveillance by removing or replacing invasive components of the Android operating system.
By using CalyxOS, users can reduce the risk of unauthorized access to their device, including remote logging. However, it's essential to note that no solution is completely foolproof, and users should still exercise caution when using messaging apps, including WhatsApp.
Bitcoin's First Transaction day
Stoic daily routine consists of:
1. Waking up at 05:30
2. Hydrating with water and using the restroom
3. Having a light breakfast of one slice of bread, one slice of American cheese, and two tablespoons of honey
4. Catching up on current events by watching YouTube headlines
5. Downloading a local podcast for listening during my morning walk
6. Embarking on a 5KM morning walk while listening to the podcast
7. Incorporating some physical activity with a 1KM rest jog
8. Refreshing myself with a shower and getting cleaned up
9. Consuming 3 ounces (0.11 kg) of raw ginger and 1 ounce of apple cider
10. Drinking one black coffee, without sugar or milk
11. Starting my office work at 08:00
Telegram Hands U.S. Authorities Data on Thousands of Users
https://www.404media.co/telegram-hands-u-s-authorities-data-on-thousands-of-users/
Still using Telegram?
Lightning Network Micropayments: Transforming Incentives in Digital Knowledge Markets
A study by Newcastle University found that introducing micropayments on a Q&A site led to a significant improvement in the quality of online discourse, making it more friendly and engaging.
This contradicts the common perception of the internet as a toxic environment. The study suggests that small monetary incentives can have a profound impact on individual behavior, promoting more positive interactions.
The researchers attribute the success of their experiment to the use of lightning, which enabled them to implement a micropayment system.
Boltz Atomic Swaps is an innovative service that enables secure exchanges between different Bitcoin layers. Unlike traditional cryptocurrency swapping services like Shapeshift, Boltz facilitates transactions between Bitcoin on-chain, Lightning, Liquid BTC, and more.
This process ensures that either both transactions are completed or neither is, maintaining cryptographic security. Notably, Boltz Atomic Swaps does not require Know-Your-Customer (KYC) verification, opening up new avenues for anonymizing transactions by transferring between layers.
While submarine swaps previously allowed on-chain and lightning exchanges, Boltz offers a more streamlined and versatile solution, significantly enhancing fungibility across different Bitcoin layers.
Furthermore, this service has been adopted by the Liquid wallet, which utilizes Boltz Atomic Swaps to provide seamless and secure transactions for its users.
Violent Hackers Are Using U-Haul To Dox Targets
https://www.404media.co/violent-hackers-are-using-u-haul-to-dox-targets/
The article from 404 Media details how members of an underground criminal network, known as the Com, are exploiting U-Haul's database to gather personal information for doxxing and hacking purposes. U-Haul, a truck and trailer rental company, holds a significant amount of non-public personal data which can be accessed through phishing tools like "Suite" that mimic U-Haul's point-of-sale (POS) login page. This allows hackers to look up customer details such as names, addresses, phone numbers, and partial billing information, which can then be used in social engineering attacks to compromise more sensitive accounts.
Targeting Bitcoin and Crypto Users:
- Doxxing and Social Engineering: Hackers can use the personal details harvested from U-Haul to attempt to gain access to the email or other online accounts of cryptocurrency users. This could involve phishing attempts where they pose as legitimate services or companies to trick users into revealing their private keys or other security credentials needed to access their crypto wallets.
- SIM Swapping: The phone number data obtained from U-Haul can facilitate SIM swapping attacks, where hackers convince mobile carriers to switch a victim's phone number to a device they control. This method has been used to bypass two-factor authentication on crypto exchanges, leading to theft of digital assets.
- Direct Threats: The personal information can also be used to identify the physical location of crypto investors or management personnel of crypto-related institutions, potentially leading to threats or physical crimes like robbery if they suspect these individuals hold significant crypto assets.
Targeting Institution Upper Management:
- Corporate Espionage: Personal data of high-level executives or management can be used for targeted phishing attacks, aiming to infiltrate corporate networks or gain access to confidential business information, including details about cryptocurrency holdings or blockchain-related projects.
- Physical Security Threats: Knowing the home addresses or personal details of executives increases the risk of physical threats or intimidation, which can be used to coerce or blackmail for corporate or financial gain.
- Reputation Damage: Doxxing can lead to public exposure of personal life aspects, potentially used to damage the reputation of company leaders, which might indirectly affect the stability or public trust in a crypto-related organization.
The article underscores the vulnerability of personal data held by seemingly unrelated companies like U-Haul and how such information can be leveraged by criminals for sophisticated cybercrimes, including those targeting the cryptocurrency sector. This highlights the broader implications of data breaches beyond immediate financial loss, affecting personal safety and corporate integrity.
Siri “unintentionally” recorded private convos; Apple agrees to pay $95M
When interacting with sensitive information, it's prudent to assume all nearby microphones are active and potentially compromised, particularly those connected to the internet.
To protect confidential data, such as generating private bitcoin keys, take precautions by thoroughly scanning your surroundings for hidden cameras and listening devices.
This vigilance is essential, as you can never be certain who might be intercepting the information.
Happy Bitcoin's Birthday mined Genesis Block and Proof of Keys day
Pooping Before You Exercise Has an Incredible Effect on Performance
https://www.sciencealert.com/pooping-before-you-exercise-has-an-incredible-effect-on-performance
What is the Travel Rule regulation?
The Travel Rule, established by the Financial Action Task Force (FATF), is a set of requirements for financial institutions to collect and share information about the originators (senders) and beneficiaries (recipients) of financial transfers. The Transfer of Funds Regulation (TFR) is the EU's counterpart to the FATF's Travel Rule, and is part of the Anti-Money Laundering Package as well as the MiCA Regulation. As of 2025, the Travel Rule will treat crypto-asset transfers, like Bitcoin, similarly to traditional bank transfers, requiring the sharing of sender and receiver information. The stated intention of the Travel Rule is to combat money laundering and terrorist financing.
Where does the Travel Rule apply?
Currently, the Travel Rule has been adopted by regulators in the EU and the UK.
What does this mean?
If you’re based in the EU or UK and send bitcoin (or other crypto-assets) from your account at a crypto-asset service provider, certain information such as name, address, and identification details is required to be shared. All licensed EU crypto-asset service providers are required to comply with the Travel Rule.
For custodial wallet customers
If you’re sending or receiving using external addresses or wallets via the Bitcoin or Lightning Networks, you’ll need to provide information about the source or destination of your funds, whether it’s your personal wallet or someone else’s.
For example if you’re sending or receiving bitcoin from a custodial wallet to your cold storage wallet, you may be asked to verify that you are the owner of this custodial wallet. Similarly, if you’re sending or receiving from another crypto-asset service provider, such as a crypto-exchange, you may be asked to confirm which entity this is and whether you are the owner of the account at that entity.
For custodial wallets as companies will be required to collect, verify, and securely share originator and beneficiary information with other crypto-asset service providers and regulators.
10 Stoic Habits to Practice
1. Make small, good choices every day to build positive habits.
2. Don't let anxiety control you - face your fears and stay calm.
3. Create a daily routine that works for you and stick to it.
4. Break free from bad habits that hold you back.
5. Get rid of things that waste your time and energy.
6. Take charge of your life by doing things that challenge you.
7. Surround yourself with people who inspire and support you.
8. Be open to change and see it as an opportunity for growth.
9. Learn to say no to things that aren't important to you.
10. Don't be afraid to fail - use your mistakes as a chance to learn and move forward.
‘Major incident’: China-backed hackers breached US Treasury workstations
https://www.cnn.com/2024/12/30/investing/china-hackers-treasury-workstations/index.html
We need mass production of nuclear energy
Wisdom is a scarce commodity
Bitcoin is:
Protected by cryptography
Powered by energy
Controlled by no one