Mudge⚡️

37.1K posts

Mudge⚡️ banner
Mudge⚡️

Mudge⚡️

@NWQLD

₿itcoin 𝕏 aficionado | ₿itcoin Node Runner | Lifetime control group member |

Happily caught in the ₿ 🐇🕳 Katılım Şubat 2018
1.7K Takip Edilen2.3K Takipçiler
AA ⚡️
AA ⚡️@AAStack·
When you get “Exceed Expectations” on your performance review but your raise is still just 2%
GIF
English
19
2
44
759
Mudge⚡️ retweetledi
Marty Bent
Marty Bent@MartyBent·
Everyone is doom scrolling the war today. Meanwhile 5 massive wins just happened: 1️⃣ Square is auto-enabling bitcoin payments for millions of sellers on March 30th 2️⃣ CFTC told self-custody wallet devs they don't need to register as brokers 3️⃣ Oklo got dual nuclear approvals from DOE and NRC 4️⃣ El Salvador quietly became the Dubai of the Western Hemisphere 5️⃣ SAVE Act advanced in the Senate 51-48 Never doom. We're going to win. tftc.io/square-bitcoin…
English
22
63
586
35.8K
Mudge⚡️ retweetledi
Dave Feldman
Dave Feldman@realDaveFeldman·
🚨🚨🚨It's Official🚨🚨🚨 Mark your calendars! The Cholesterol Code documentary drops April 17th, 2026 on Amazon
English
29
485
1.9K
93.5K
Mudge⚡️ retweetledi
TFTC
TFTC@TFTC21·
The CFTC just told self-custodial wallet developers they don't need to register as brokers. Phantom Wallet received a no-action letter stating the CFTC will not pursue enforcement against self-custodial wallet developers who connect users to regulated trading venues, as long as they don't custody user funds. First time the agency has formally drawn that line. Here's why this is massive: Under existing U.S. law, any entity that solicits or facilitates derivatives trading typically must register as an introducing broker with the CFTC. That rule was written for traditional finance intermediaries. But as self-custodial wallets started integrating access to derivatives markets, developers faced a legal gray area that could have classified them as unregistered brokers simply for writing software. The CFTC's position was, if your wallet software connects users to properly registered futures commission merchants, introducing brokers, or designated contract markets, and you don't custody user funds, you are not a broker. You're a software provider. The timing is not coincidental. One week ago, CFTC Chairman Mike Selig said at FIA's Boca Raton conference, "For too long, there has been an open question as to whether software providers trigger the CFTC's registration requirements. We intend to address this question head-on." Seven days later, they did. This matters far beyond Phantom. Every self-custodial wallet developer and every open-source protocol interface that connects users to regulated markets now has a reference point. Write software, don't custody funds, route through registered intermediaries, and the CFTC will not come after you. For context, the previous administration used ambiguous intermediary rules as a weapon against developers. Tornado Cash developers were prosecuted. Frontends shut down preemptively. The chilling effect pushed builders offshore. This no-action letter, combined with Selig ending "the days of CFTC-SEC infighting" through Project Crypto, signals a complete reversal. The U.S. is actively trying to bring developers back.
TFTC tweet media
English
20
114
492
39.4K
Quinn Thompson
Quinn Thompson@qthomp·
It should be taken with a grain of salt when you hear European and Asian countries saying they won’t help to open the Strait. Majority of these countries are short oil and will face severe crises if they don’t act. There are definitely closed door conversations in the US being had around testing these partners’ resolve. The problem is that although it’s not *as* big of a problem for the US, it’s still bad. It could get a bit weird. Trump may threaten US export restrictions on oil and gas if they don’t assist which would decrease price pressures domestically but worsen the situation for our allies. On the other hand, they could counter with threats of Treasury and US asset sales to raise dollars to fund higher energy costs at the expense of financial market stability.
The Kobeissi Letter@KobeissiLetter

BREAKING: Germany, Japan, and Australia say they will not be joining US efforts to militarily reopen the Strait of Hormuz while the UK and France say they are willing to discuss options, per WSJ.

English
29
2
123
39.1K
Mudge⚡️ retweetledi
Bitrefill
Bitrefill@bitrefill·
March 1st incident report On March 1, 2026, Bitrefill was the target of a cyberattack. Based on indicators observed during the investigation - including the modus operandi, the malware used, on-chain tracing and reused IP + email addresses (!) - we find many similarities between this attack and past cyberattacks by the DPRK Lazarus / Bluenoroff group against other companies in the crypto industries. The initial access originated through a compromised employee laptop, from which a legacy credential was exfiltrated. That credential provided access to a snapshot containing production secrets. From there, the attackers were able to escalate their access to our broader infrastructure, including parts of our database and certain cryptocurrency wallets. We first detected the incident after noticing suspicious purchasing patterns with certain suppliers. We realized that our gift card stock and supply lines were being exploited. At the same time we found some of our hot wallets being drained and funds transferred to attacker-controlled wallets. The moment we identified the breach, we took all of our systems offline as part of our containment response. Bitrefill operates a global e-commerce business with dozens of suppliers, thousands of products, and multiple payment methods across many countries. Safely switching all these things off and bringing them back online is not trivial. Since the incident, our team has been working closely with top industry security researchers, incident response specialists, on-chain analysts and law enforcement to understand what happened and how we can prevent it from happening again. A sincere thank you to @zeroshadow_io, @SEAL_Org, @RecoverisTeam and @fearsoff for their rapid response and support throughout this ordeal. What about your data Based on our investigation and our logs we don’t have reason to think that customer data was the target of this breach. There is no evidence that they extracted our entire database, only that the attackers ran a limited number of queries consistent with probing to understand what there was to steal, including cryptocurrency and Bitrefill gift card inventory. Bitrefill was designed to store very little personal data. We are a store, not a crypto service provider. We don’t require mandatory KYC. When a customer chooses to verify their account - e.g. to access higher purchasing tiers or certain products - that data is kept exclusively with our external KYC provider, with no backups in our system. Still, based on database logs, we know that a subset of purchase records was accessed and we want to be transparent about that. Around 18,500 purchase records were accessed by the attackers. Those records contained limited customer information, such as email addresses, crypto payment address, and metadata including IP address. For approximately 1,000 purchases, specific products required customers to provide a name. That information is encrypted in our database. However, since the attackers may have gotten access to the encryption keys, we are treating this data as potentially accessed. Customers in this category have already been notified directly by email. At this time, based on the information currently available, we do not believe customers need to take specific action. As a precaution, we recommend remaining cautious of any unexpected communications related to Bitrefill or crypto. If this assessment changes, we will of course immediately inform those affected. What we are doing We have already significantly improved our cybersecurity practices, but vow to continue to draw learnings from this experience to make sure user and company balances and data remain maximally safe. Specifically we’re: -Continuing thorough cybersecurity reviews and pentests with multiple external experts and implementing recommendations; -Further tightening internal access controls; -Further improving logging and monitoring for faster detection and more effective response; and -Continuing to refine and test our incident response procedures and automated shutdown procedures. The bottom line Getting hit by a sophisticated attack sucks (a lot). We’ve been in business for over 10 years and it’s the first time we’ve been hit this hard. But we survived. Bitrefill was designed to limit the impact if something like this ever happened. Bitrefill remains well funded, has been profitable for several years and will absorb these losses from our operational capital. Almost everything is back to normal: payments, stock, accounts. Sales volumes are also back to normal, and we are eternally thankful to our customers for your continued confidence in us. We will continue to do our best to continue deserving your trust. Thank you!
English
112
140
961
163.8K
Mudge⚡️
Mudge⚡️@NWQLD·
@parman_the Good to see you here… the algo must be doing its thing… or you’ve been off for a bit? 🙏
English
1
0
1
42
Mudge⚡️
Mudge⚡️@NWQLD·
Well, at least the Epstein stuff has been finalised! 🙄
GIF
English
0
0
0
22
CARLA⚡️
CARLA⚡️@carlabitcoin·
I’m building again 🥰
CARLA⚡️ tweet media
English
186
15
1.4K
68.8K
Mudge⚡️ retweetledi
Club Orange
Club Orange@cluborange·
This is what ignoring Bitcoin is like
Club Orange tweet media
English
12
20
251
8.6K