Chris L. Sabella
571 posts



The data is in. On a 12-month rolling basis, corroborated by multiple miners, OCEAN earns you more. +3.6% more Bitcoin earned on TIDES vs. FPPS Meaning every 1 Eh/s on OCEAN earned +6.27 BTC more than FPPS. Real numbers. Real value delivered. More for the miners. 💪🌊

More than 10 of my bitcoin friends got hacked in the past month. All had 2FA enabled. It didn’t help. Here’s how they almost got me too 👇 HOW THEY FOOL YOU 1️⃣ Someone from your contacts messages you to schedule a call. This is already a stolen account. A friend who got scammed before you. 2️⃣ They send you a calendar invite first. Then, right before the call, they send a Zoom link. At a quick glance it looks legit. The preview looks identical to real Zoom. The trick is subtle: the hostname and subdomain are swapped. This is the fake Zoom link they sent me. A real Zoom link would have those two words around the dot swapped. 👀 https:// zoom (DOT) webus05. us/j/47369507762?pwd=7kiAzRm6PNBvNFdBBEY04cr6LLzHPk.1 Easy to miss, even if you know what to look for. Especially when it comes from someone you trust. 3️⃣ The fake Zoom app looks flawless. Perfect copy of the real Zoom UI. No red flags. 4️⃣ You immediately see your friend on video. This is NOT A DEEPFAKE. It’s a recording of your friend from seconds before they got scammed in the previous session. That’s why it looks perfect and trustworthy. HOW THEY GAIN CONTROL 5️⃣ The fake Zoom app says your audio is broken and asks you to update. 6️⃣ The update “fails” and you’re shown a command line troubleshooting guide. ⚠️7️⃣ If you paste that command into your terminal, it’s over. You just gave the attacker remote access to your computer. HOW THEY ROB YOU 8️⃣ The malware they install remotely is simple and runs fast. It takes one or two seconds. It usually does two things: A) Scans your computer for bitcoin wallets and steals access. ⚠️B) Steals session cookies from chat apps. This is how they bypass your 2FA later. ELI5 SESSION COOKIES When you log into Telegram on your laptop, you enter your password and 2FA once. Telegram then saves a session token on your computer so you don’t have to do it every time. That token is basically: “Yes, this is the same person who gave you the password and 2FA earlier.” When attackers steal it, they present it to Telegram, which sees it as a valid session and lets them in. So they don’t need your password or your 2FA code. THEY ARE YOU. If someone gets access to your computer, you’re done. At that point, it’s just damage control. MY GOLDEN RULE Life is short and beautiful. No client call is important enough to mess with command line troubleshooting. Be lazy. Be safe. PS: unrelated, but we just launched Braiins Hashpower. On-demand bitcoin hashrate. Try it. It’s awesome. Like ice cream when you’re 12 😁




GPT-5 is here. Rolling out to everyone starting today. openai.com/gpt-5/


Beautiful @GrassFedBitcoin 🙏














