Resolute Rock

63 posts

Resolute Rock

Resolute Rock

@resoluterock17

Ahl al-Sunnah / Salafi I follow the Qur’an and the Sunnah upon the way of the Prophet ﷺ, his Companions رضي الله عنهم, and those who follow them.

Katılım Nisan 2026
64 Takip Edilen1 Takipçiler
Resolute Rock
Resolute Rock@resoluterock17·
"...And [due] to Allah from the people is a pilgrimage to the House - for whoever is able to find thereto a way. But whoever disbelieves - then indeed, Allah is free from need of the worlds." Surah Ali 'Imran, Ayah 97
English
0
0
0
2
Resolute Rock
Resolute Rock@resoluterock17·
It important to also understand that Scholars are not infallible. They can make mistakes unintentionally. We should be understanding and overlook their mistakes and only follow what is correct. Even then they are rewarded for their fatwa once and twice if they get it right.
English
0
0
0
5
Resolute Rock
Resolute Rock@resoluterock17·
In general, the most trusted Scholars in matters of ‘Aqeedah, Tawheed, Manhaj, and the Sunnah are Salafi Scholars, such as: ibn Baz, ibn Uthaymeen, Al Albani, Saleh al-Fawzan, Rabi al-Madkhali, Muhammad Aman al-Jami, Abdurrazzaq al Badr, Sulayman ar-Ruhayli, Saleh al-Usaymi.
Română
1
0
0
15
Resolute Rock
Resolute Rock@resoluterock17·
The most important thing for a Muslim who strives to stay on the straight path is following the right Scholars, who are upon clear Aqeedah, well-known, reputable and uncompromising on the deen. Such as ibn Baz, ibn Uthaymeen, Al Albani, Saleh al-Fawzan.
English
1
0
0
12
DogeDesigner
DogeDesigner@cb_doge·
The UK has become a prison island.
DogeDesigner tweet media
English
1.4K
3.5K
12.2K
27.3M
Phosphen
Phosphen@phosphenq·
This 1956 Bell Labs paper is the foundation of every $1B hedge fund. A blackjack player used it to make $800,000,000. Renaissance, Citadel & Jane Street still run on it. 10 pages. The single most useful research paper you can find in open access. Bookmark & read tonight.
English
27
307
3.4K
360.6K
James Lavish
James Lavish@jameslavish·
Can I say something?
James Lavish tweet media
English
355
722
4.6K
1.1M
Eric Yeung 👍🚀🌕
Eric Yeung 👍🚀🌕@KingKong9888·
My latest Substack article on Hercules Metals Corp. is some of my best work to date. Hercules Metals (BIG.V) is up nearly 10% today.
Eric Yeung 👍🚀🌕 tweet media
English
12
8
141
8.8K
Resolute Rock
Resolute Rock@resoluterock17·
@qcapital2020 The proof is in the pudding. Put aside all the looks and hype and media and look at this chart. Thats the kind of investor youre dealing with here.
English
0
0
1
4.6K
 Q-Cap 
 Q-Cap @qcapital2020·
How tf is this even possible
 Q-Cap  tweet media
English
210
51
2K
706.5K
Resolute Rock
Resolute Rock@resoluterock17·
Islam is a complete way of life that encompasses worship, fasting, charity, pilgrimage to Mecca, marriage, inheritance, hijab, governance, punishments for stealing, murder, fornication. It’s a perfect way of life revealed to humanity. Peace be upon those who follow the guidance.
English
0
0
0
23
Resolute Rock
Resolute Rock@resoluterock17·
@beaniemaxi Gambling generational wealth…and losing it all. When will people understand to never gamble their money?
English
0
0
0
131
Beanie
Beanie@beaniemaxi·
Guy loses $1.8 Million on Chimaev and gets back less than $800 in liquidity rewards, yield, and maker rebate.
Beanie tweet media
English
45
6
395
52.9K
Resolute Rock
Resolute Rock@resoluterock17·
@0xUnihax0r Sorry about that dude. Stay away from crypto so many people lost their money.
English
0
0
2
6.5K
Unihax0r
Unihax0r@0xUnihax0r·
Just got drained or hacked for more than 200k. Sick to my stomach This is the wallet where the money went: 0xF7cFFC27732a5C9c4E2D592F3E33435F8dDb019A Any help to track the money would be appreciated
English
871
351
10K
2.7M
Resolute Rock
Resolute Rock@resoluterock17·
@k1rallik There was never any privacy lol. Same they were saying about Whatsapp.
English
0
0
0
5
BuBBliK
BuBBliK@k1rallik·
INSTAGRAM CAN NOW READ YOUR DMs As of today, May 8, Meta removed end-to-end encryption from Instagram direct messages. What that means in plain English: every message, photo, and voice note you send on Instagram is now readable by Meta's servers. Before today, even Meta could not see the content - it was locked. That lock is gone. → Meta can access your private conversations → Law enforcement can request message content → There is no opt-out - the feature is simply removed → WhatsApp still has encryption. Instagram no longer does. You were never the customer. You were always the product.
Pubity@pubity

Meta is removing end-to-end encrypted messaging from Instagram starting today.

English
2
7
58
4K
Damian Player
Damian Player@damianplayer·
we ACTUALLY got the oppressor mk2 before GTA 6. Polish engineer Tomasz Patan built the Volonaut Airbike. it hits 124 mph, runs on jet propulsion, has no propellers, and weighs less than your dog. pretty fucking sick.
English
551
3.8K
48K
1.8M
TrendSpider
TrendSpider@TrendSpider·
Can we just talk about this for a second? $TSLA
TrendSpider tweet media
English
158
45
988
229.9K
Monero Research Lab (Unofficial)
Monero Research Lab (Unofficial)@MoneroResearchL·
tevador proceeds with Option A (standard CSIDH-1024 parameters) for Jamtis: 400-character addresses. All transactions embed a CSIDH-1024 public key in tx_extra; legacy wallets ignore it with no scan-time change. An optional interactive symmetric-crypto payment protocol is being developed for users wanting stronger PQ privacy. Discussion covered quantum-adversary capabilities, mobile-wallet UX, harvest-now-decrypt-later risks, address hygiene, and Tachyon-like alternatives. rucknium: 5. Post-quantum encryption ( #issuecomment-4281932714" target="_blank" rel="nofollow noopener">github.com/monero-project… ). tevador: Quick update: Based on the last meeting, I decided to go with Option A for Jamtis and use the standard CSIDH-1024 parameters. The address length will be 400 characters. I'm working on an interactive payment protocol that will be able to provide full privacy without an on-chain key exchange (it will be an appendix to the address specs). vtnerd: Not a fan of it being interactive - is that portion mandatory? The user cannot opt out of an interactive key exchange? tevador: To clarify: there will be both options. A non-interactive PQ key exchange based on CSIDH-1024 and an optional interactive one based on symmetric crypto only. vtnerd: Hmm. Symmetric crypto is a sure way to anger a QC rucknium: More noob questions from me, about scan time. What happens when an old-style (non-quantum-resistant) wallet scans a quantum-resistant output. Any slowdown? And the reverse: Any speedup when a new-style wallet scans a non-quantum-resistant output? jberman: I don't really see another feasible route on the table here tbh. If we want mobile wallets to be able to restore a wallet from seed, then the more secure PQ key exchange algos don't seem practical by the figures here articmine: A related question is how effective is parallel processing here? tevador: The goal is for all transactions to have a CSIDH-1024 public key in tx extra. Legacy wallets will simply ignore the key. Scan times will be about the same as now for both legacy and Jamtis. tevador: enote scanning is obviously parallelizable, but the amount of computation required makes CSIDH view tags infeasible rucknium: jberman: Do you mean the interactive protocol or Option A for non-interactive? jberman: That comment applies to both. I don't see another route on the table aside from those 2 routes: Option A for non-interactive, or the interactive protocol rucknium: What if we wait until better PQ algorithms are discovered? tevador: I also think that option A and an additional interactive protocol is the best compromise. Addresses will remain usable and the interactive protocol can be used by users who want more PQ privacy than Jamtis will offer. rucknium: Hard to know what the future may hold, of course. tevador: Waiting is not an option due to "harvest now, decrypt later". rbrunner: At least with A we don't get astronomical scan times, with mobile wallets completely unable to scan themselves jberman: It could theoretically be implemented and not deployed until the QC threat passes some threshold, and in that time if some better algo arises, perhaps we could swap it in rucknium: With Option A, a quantum adversary cannot identify all the outputs sent to an address that it does not know, correct? There would be limited ability to try to cluster the behavioral information. gingeropolous: but then there's n years of data to decrypt jpk68: As rbrunner mentioned last week (I think), making scan times infeasible for mobile wallets (basically, anything that would force you to self-host something like LWS) would eliminate a huge amount of people from being able to use Monero jpk68: In my opinion this is infinitely more of a UX burden than long addresses, for example rucknium: I think people could still use Monero. But would not be protected from a quantum adversary. jeffro256: rucknium: With option A, a QA can identify all outputs sent to any address sharing that one's view key. And it can identify spends in most cases rucknium: But not any outputs of a view key that it does not know any addresses of? endogenic: all ecdh and signing is broken by qc guys rucknium: It would ID spends because of change outputs sent to own addresses, I assume endogenic: you can't still use monero jeffro256: rucknium: Yes. but that is true of CARROT and legacy addresses too tevador: rucknium : With option A, if the QA knows one of your addresses, they can calculate primary and secondary view tags, but can only probabilistically identify enotes to unknown addresses unless the address is reused. tevador: jeffro256 : No, it cannot identify spends. rucknium: If the adversary had the addresses of the sender and recipient, that would reveal the spending behavior fully. Not the amount. Correct? tevador: Internal enotes use a symmetric key for view tags. jeffro256: tevador: I mean that it can sometimes identify the spend location of external enotes, not internal enotes luke: I agree with Rucknium's comment of potentially waiting for more PQ options. Isogeny based scheme make me nervous. tevador: If the adversary has Alice's and Bob's addresses, they can see enotes (without amounts) coming to Alice's and Bob's wallet, but can't infer they are transacting with each other. endogenic: if mallory has a and b addrs then mallory can get a and b sec keys no ? tevador: jeffro256 : It cannot, at least not for Jamtis enotes. rucknium: lu: Thank you for your comment. Could you elaborate? rucknium: (Luke S is with Cypher Stack cypherstack.com/about.html ) endogenic: I guess he's talking about lattice etc problems tevador: luke : I'm actually quite confident about CSIDH. tevador: The original idea behind CSIDH is from 1996 IIRC, so fairly old. luke: Sure. Me and the other mathematicians have spent a great deal of time talking about PQ security stuff, both at CS and in our academic careers and it is the loose consensus that isogeny based problems are the least favorite of the potential PQ primitives. jeffro256: tevador: Maybe I'm remembering an attack which works on Seraphis, but not FCMP++ because of the key image composition. I'll look at it again. At least with Jamtis previously, if two enotes were spent from the same address, even if a QA didn't know the spend key extensions, they could tell that they were the same between 2 (one-time address, key image) pair, thus allowing them to correlate where external enotes were spent jeffro256: It's been a while since I looked at that particular attack luke: Lattice based problems are fine but I personally am a big proponent of Code based cryptography. I think it is probably the most likely to retain its PQ status in the time to come. tevador: jeffro256 : IIRC that was a Seraphis-only attack, FCMP++ has perfectly hiding linking tags. jeffro256: Seraphis also had perfectly hiding linking tags, though. The foil might be the hash-to-point in FCMP++ luke: I agree, but it is entirely possible that we might see some sort of improvement in the near future. tevador: luke : Yes, McEliece would have been great if it wasn't for the 250 KB public keys :) tevador: A bit impractical for an address. tevador: Yes, but waiting means more exposed legacy addresses that will be broken and deanonymized. jberman: tevador: for the non key exchange route, Tachyon may have a better set of tradeoffs worth considering as well I think tevador: I'm not familiar with Tachyon jberman: seanbowe.com/blog/tachyon-s… jberman: As I understand it, there's an always-on server that scans state without leaking privacy, and there's no key exchange protocol tevador: jberman : I checked the Tachyon blog post. It seems that Zcash wants to eliminate non-interactive transfers, which is probably not what we want? tevador: quote : "As a start, we'll be assuming that Zcash's future payment flows involve out-of-band payments where the sender and the recipient use a separate channel for secret distribution." jberman: tevador: I agree. In any case, their intent seems to be to roll it out in phases, which implies a period of time where they'd support both. Considering how they've done things in the past, I'd assume the "tachyon" pool is incompatible with the existing anonymity pools though. And ya I would agree distinct anon pool is not what we'd want jberman: But perhaps there could be some tweak that enables a compatible anon set with an interactive protocol jberman: non-interactive* jberman: I would be surprised if that design isn't achievable jberman: tevador: I agree and am not raising it to shift UX to interactive payments jberman: You mentioned exploring an optional interactive route that would require out of band communication, I'm mentioning a Tachyon-like design as worth considering for that optional component alongside the non interactive jberman: Also it doesn't seem like the protocol requires a single centralized server, and a user could spin up their own instance. I imagine the UX would include some payment request that points to their own instance of choice jberman: That design obviously seems worth considering if we're discussing interactive payments jberman: A 3-round protocol is hard to see gaining traction without a server in between helping automate the flow jberman: I would guess that wallet apps may implement a communication protocol with their own infra (or maybe work something out with some service provider) jberman: And so long as a server would be involved, then it's worth thinking on further and weighing expected UX ixr3: I hope Jeffro implements the carrot key hierarchy soon after the HF, or earlier if the HF is significantly delayed. Internal forward secrecy will help in the meantime until better PQ solutions are available. Churning will become increasingly important for anyone concerned with post‑quantum security. ixr3: "harvest now, decrypt later" is bad and the Jamtis-PQ release will probably take longer than expected tevador: jberman : it's not about the anon pool. It's the UX shift to interactive transactions that we don't want. Zcash is a for profit company, they can afford to run infrastructure to help users interact during payments, but it's not a viable solution for Monero. jberman: I agree and am not raising it to shift UX to interactive payments You mentioned exploring an optional interactive route that would require out of band communication, I'm mentioning a Tachyon-like design as worth considering for that optional component alongside the non interactive Also it doesn't seem like the protocol requires a single centralized server, and a user could spin up their own instance. I imagine the UX would include some payment request that points to their own instance of choice That design obviously seems worth considering if we're discussing interactive payments tevador: I'm not going to place any infrastructure requirements in my proposal. The interactive payment protocol will be executed by passing 3 alphanumeric strings between the recipient and the sender over any communication channel of their choice. sgp_: some wallets already do this for payjoin. I hate implementations where this would be expected, but wallets often use stuff like this today for helper functions. The fewer that are needed, the better. #L33" target="_blank" rel="nofollow noopener">github.com/cake-tech/cake… tevador: The flow in my sketch protocol is: Receipient -> Sender -> Recipient -> Sender, where each arrow is a ~400 character string. jberman: A 3-round protocol is hard to see gaining traction without a server in between helping automate the flow I would guess that wallet apps may implement a communication protocol with their own infra (or maybe work something out with some service provider) And so long as a server would be involved, then it's worth thinking on further and weighing expected UX sgp_: I think that an interactive payment protocol would be a huge loss :( if the requirement of max address length of 420 was dropped, would BC1024 be the most appealing? or would you still prefer A?I admit to being tempted by BC512. Yes, the security guarantees are smaller with CSIDH-512 than CSIDH-1024. But the privacy gains with option B over A are considerable to me. If we consider a "collect now and decrypt later" scenario as the most dangerous at the moment, it seems to suggest that we should prefer greater privacy (1/256 enote narrowing down vs knowing all received enotes) to the security margin. If it would take "65 thousand quantum computers running for 5 years" to break the security of a single key with CSIDH-512, we at least would have ample (in relative terms, it would still suck!) time to implement a migration strategy to more secure wallets. Am I misinterpreting something? tevador: sgp_ : Why would and additional interactive protocol be a loss? If it's optional for people who want to use it. IMO it's a net gain. sgp_: I mean requiring it for PQ privacy of received enotes (even in the 1/256 form) would be unfortunate If options A or B are selected, I'm not against an optional interactive thingy for even better post quantum privacy tevador: Option B is kinda suboptimal, that's why I preferred A or C. B adds: some (but not a lot) of enote privacy, but the costs are: much larger addresses, a much larger pruned transactions (up to 2-3 KB for 16-out transactions) and awkward filter assist (light wallets are supposed to run the heavy CSIDH instead of the filter server). tevador: And B still lacks PQ unlinkability, so if you have 2 online identities and use the same wallet, they can be linked in a PQ scenario. tevador: Only option C gives full PQ privacy. sgp_: I definitely wasn't factoring in the filter assist, but I do think 1/256 is hugely better than nothing (it's like ring sigs, but better) linkability is unfortunate but we deal with janus now, so advanced users should be aware of potential limitations, and they can be informed that limitations would persist I suppose one argument for Option A is that senders already know what enotes they send to addresses they are aware of, so this could be a user education problem, where recipients are told to always use fresh addresses per sender. Address hygiene becomes more of a requirement. Basically, we try to UX our way out of most limitations (leaving some footguns), and for everything else, there's an interactive protocol tevador: For maximum privacy, you should use a fresh wallet per sender, unless we go with Option C. #c672772" target="_blank" rel="nofollow noopener">libera.monerologs.net/monero-researc…
Monero Research Lab (Unofficial)@MoneroResearchL

Post-quantum encryption. #issuecomment-4281932714" target="_blank" rel="nofollow noopener">github.com/monero-project… x.com/MoneroResearch…

English
3
6
43
28.2K