Streamr Network

13.2K posts

Streamr Network banner
Streamr Network

Streamr Network

@Streamr

Real-time data & media broadcasting. Global, peer-to-peer, serverless. $DATA. Powered by @0xPolygon. Powering @Streamr_app → https://t.co/0j9kNBgu5O

Decentralized 🌐 가입일 Ekim 2014
740 팔로잉155.8K 팔로워
고정된 트윗
Streamr Network
Streamr Network@Streamr·
The @Streamr_App alpha version is live. Encrypted, peer-to-peer video calls — built for a more secure internet. Try it today ↓ streamr.com
Streamr Network tweet media
English
16
13
51
11.3K
Streamr Network
Streamr Network@Streamr·
@Whonix That’s a strong point, better to rely on system design than long checklists about vendors.
English
0
0
0
95
Whonix
Whonix@Whonix·
Before using a VPN you have to research: Place of incorporation Corporation verifiable Third party audited Popularity in VPN reviews Long term track record No log policy Own infrastructure Accepts private payments Client APP is FOSS Whonix lets you skip that research.
English
5
25
190
6.8K
Mark_Streamr
Mark_Streamr@Mark_Streamr·
OpenAI's GPT-5.3-Codex system card states that its safety training uses "production data, which reflects realistic user behaviour." Production data means real conversations from real ChatGPT users. The model that helped build itself was trained on what people actually said to it. They're not hiding it. They're marketing it. Your data isn't private...
English
1
3
9
80
Streamr Network
Streamr Network@Streamr·
@BitcoinNewsCom If a third party can reset your keys, it is not self-custody, it is custodial with extra steps
English
0
0
1
102
Bitcoin News
Bitcoin News@BitcoinNewsCom·
NEW: The Blockchain Policy Institute is urging Kentucky lawmakers to remove a last-minute amendment in House Bill 380 that would force hardware wallet providers to reset user credentials, calling it technologically impossible and harmful to self-custody. 🐎🏇
Bitcoin News tweet media
English
10
15
80
6.1K
Streamr Network
Streamr Network@Streamr·
@ReclaimTheNetHQ This is why critical identity infrastructure should be minimized, decentralized, and never treated like a universal login layer
English
1
1
12
1.7K
Streamr Network
Streamr Network@Streamr·
@heygurisingh Open tooling lowers cost, but centralized security stacks still concentrate risk in one place
English
0
0
1
160
Guri Singh
Guri Singh@heygurisingh·
🚨 BREAKING: The cybersecurity industry is about to get completely disrupted. Someone just open-sourced a fully autonomous AI Red Team. It's called PentAGI. 8,200+ stars on GitHub. Not one AI agent. An entire simulated security firm. Researchers, developers, pentesters, and risk analysts. All AI. All coordinating with each other before launching a single attack. No Cobalt Strike. No $100K/year pentest retainers. No OSCP required. Here's what's inside this thing: → An Orchestrator agent that plans the full attack chain → A Researcher agent that gathers intel from the web, search engines, and vulnerability databases → A Developer agent that writes custom exploit code on the fly → An Executor agent that runs 20+ pro security tools (nmap, metasploit, sqlmap, and more) → A memory system that learns from every engagement and gets smarter over time Here's the wildest part: It runs everything inside sandboxed Docker containers. Full isolation. It picks the right container image for each task automatically. It has a knowledge graph powered by Neo4j that tracks relationships between targets, vulnerabilities, tools, and techniques across every single test. Cybersecurity firms charge $25K-$150K per engagement for this exact workflow. This is free. 100% Open Source. MIT License.
Guri Singh tweet media
English
220
867
4.4K
600.5K
Streamr Network
Streamr Network@Streamr·
@BLkhoih96132 Age verification keeps getting sold as safety while building identity gates the internet was never supposed to need
English
0
6
22
378
Streamr Network
Streamr Network@Streamr·
@iAnonymous3000 Reproducible builds help, but local-first peer-to-peer systems reduce the trust surface even further
English
1
0
4
274
Sooraj
Sooraj@iAnonymous3000·
You don’t need to trust Signal. That’s the whole point. The protocol is open source. The clients are open source. The server is open source. Independent cryptographers have audited the Signal Protocol repeatedly, and it remains the gold standard for end-to-end encryption. Signal also supports reproducible builds - meaning you can compile the source code yourself and verify it produces the exact same binary distributed on app stores. Trust is for closed systems.
English
105
252
4.1K
228.7K
Streamr Network
Streamr Network@Streamr·
@Parodyjeffx This is what happens when data lives on servers you don’t control instead of staying local-first by design
English
0
0
4
117
Parody Jeff
Parody Jeff@Parodyjeffx·
🚨SHOCKING🚨 ADL CEO just admitted they use AI to scan social media and forward anything they flag to law enforcement and policymakers. We are cooked.
English
1.5K
3.7K
11.3K
440.2K
Streamr Network
Streamr Network@Streamr·
@AutismCapital This is what rent-seeking infrastructure looks like when surveillance gets packaged as safety
English
0
0
6
247
Streamr Network
Streamr Network@Streamr·
@DBCrypt0 Any system that needs your iris to function is optimizing for control, not user sovereignty
English
0
0
4
109
DBCrypto
DBCrypto@DBCrypt0·
Worldcoin just said iris scans are the ONLY way to link human identity to AI agents. Let that sink in Their solution to AI trust? Hand over your biometric data to a centralized database run by Sam Altman's side project. Absolutely insane 🤯 Hard pass.
English
9
5
63
3.4K
Streamr Network
Streamr Network@Streamr·
@juliecbarrett If the solution starts with more tracking, more data retention, and more gatekeeping, it is not a privacy win for children or anyone else.
English
0
0
7
133
Julie Barrett
Julie Barrett@juliecbarrett·
I’m not sure if these supporters simply don’t understand what these policies like KOSA do or they just don’t care. KOSA is NOT “the gold standard for protecting kids online.” It is, in fact, giving Big Tech and the government permission to collect massive data and monitor your children online…not just kids, ALL of us. Digital ID and massive surveillance is being ushered in under the guise of “protecting the children.”
Parents for Safe Online Spaces@parents4sos

The Senate's Kids Online Safety Act is the gold standard for protecting kids online. ✅ 76 bipartisan cosponsors ✅ Includes a duty of care ✅ Passed the Senate 91–3 in 2024 @LeaderJohnThune: Families cannot wait. It's time for the Senate to #PassKOSA without delay.

English
19
271
576
8.1K
Streamr Network
Streamr Network@Streamr·
@LundukeJournal This is what building for user sovereignty looks like: no account, no ID, no centralized permission layer
English
1
4
170
5.7K
The Lunduke Journal
The Lunduke Journal@LundukeJournal·
GrapheneOS, an open source Android-based OS, has declared that they will not adhere to age verification laws. “GrapheneOS will remain usable by anyone around the world without requiring personal information, identification or an account. GrapheneOS and our services will remain available internationally. If GrapheneOS devices can't be sold in a region due to their regulations, so be it.”
The Lunduke Journal tweet media
English
75
524
3.9K
84.9K
Streamr Network
Streamr Network@Streamr·
@ChibiReviews Age-gating the internet is just another way to normalize centralized identity checks as default infrastructure
English
1
1
12
521
Streamr Network
Streamr Network@Streamr·
@nym You don’t patch surveillance with laws when the architecture is centralized
English
1
0
2
92
CoinMarketCap
CoinMarketCap@CoinMarketCap·
LATEST: 🚨 Google researchers are warning iPhone users to update to the latest iOS version after identifying an exploit that can install crypto-stealing malware.
CoinMarketCap tweet mediaCoinMarketCap tweet media
English
112
163
960
194K
Streamr Network
Streamr Network@Streamr·
@ErikVoorhees Centralizing epistemology in AI is the same old surveillance-state instinct with a cleaner interface
English
0
0
4
108
The Graph
The Graph@graphprotocol·
DeFi has always had a data fragmentation problem: 40 protocols, 40 different schemas, 40 custom adapters. @MessariCrypto 's standardized Subgraphs solved the fragmentation. MCP connected it to AI. This is what it looks like when those two things meet. Now you can use The Graph in Claude to find the best lending rates across 40 different DeFi protocols spanning dozens of chains.
Graphtronauts@graphtronauts_c

x.com/i/article/2034…

English
8
18
124
8.4K
Streamr Network
Streamr Network@Streamr·
@nym Surveillance gets easier when centralized data exhaust is for sale to whoever can pay
English
0
0
3
69