Rohan JT

9.8K posts

Rohan JT banner
Rohan JT

Rohan JT

@RohanJT

Opinions & views are my own NFA | Decentralize.

Katılım Haziran 2011
836 Takip Edilen4.2K Takipçiler
Palm Beach Pete
Palm Beach Pete@not_jeffepstein·
Hello this Palm Beach Pete just wanted to thank everybody for the support and good vibes… I’m not Jeffrey Epstein
English
2.8K
2.8K
41K
2.2M
Rohan JT
Rohan JT@RohanJT·
@Emarged @grok relate the same fact to Canada and give me your outcome
English
1
0
0
262
Rohan JT
Rohan JT@RohanJT·
@andyfang How will the pricing be decided for a task. Or it's like a generic hourly rate ?
English
0
0
0
154
Andy Fang
Andy Fang@andyfang·
Introducing Dasher Tasks Dashers can now get paid to do general tasks. We think this will be huge for building the frontier of physical intelligence. Look forward to seeing where this goes!
Andy Fang tweet media
English
297
171
3.5K
1.5M
Rohan JT retweetledi
Paris Blockchain Week
Paris Blockchain Week@ParisBlockWeek·
Calling all KOLs! This is your opportunity to experience the institutionalization of digital assets at a scale like no other. We're sending 2 KOLs to Paris Blockchain Week 2026 with fully-paid trips to see what happens in the most curated room in digital assets. Everything covered: ✈️ Round-trip flights to Paris 🏨 Hotel stay 🎟️ VIP access to both days at the Louvre 🍽️ Private dinner at Château de Versailles (worth €5,000) Want to be a part of #PBW26? 1️⃣ Retweet 2️⃣ Follow @ParisBlockWeek 3️⃣ Follow @KOLCapital 4️⃣ Fill the form: parisblockchainweek.com/kol
Paris Blockchain Week tweet media
English
33
49
141
10.2K
Rohan JT
Rohan JT@RohanJT·
I see so many exchanges integrating Ai and laying off people Wonder how @binance is integrating it tho. (They usually do everything the best) Probably they already have it integrated and we don't even realize😎 @cz_binance
English
0
0
0
26
WHAT'S INSIDE?
WHAT'S INSIDE?@whatsinside·
Decided to do something different tonight, I’m writing my first ever article. Going to post it here soon.
English
6
1
107
3.6K
K_B13
K_B13@KevBloomers·
@RohanJT @_Brian72 @grok You not think he’s done it as a training exercise? he knows he’s guna lose but gives him the chance to try a different formation in a competitive environment.
English
3
0
1
2.5K
Brian
Brian@_Brian72·
This new breed of bang average managers who think they are Pep are an absolute cancer to the game. Giving your player a note when 8-2 down and 7 minutes left 😂 Another Russell Martin.
English
395
687
14.3K
1.9M
Rohan JT
Rohan JT@RohanJT·
@Polymarket @grok something good must have come out of the 80B spent? Isn't Meta up far ahead in Augmented reality tho ?
English
1
0
0
273
Polymarket
Polymarket@Polymarket·
JUST IN: Meta announces they'll be shutting down the Metaverse, after pouring $80,000,000,000.00 into the project.
Polymarket tweet media
English
3.4K
3.8K
37.5K
32M
Rohan JT
Rohan JT@RohanJT·
@Polymarket They even renamed their company meta. I feel bad for them lol
English
0
0
1
256
Rohan JT
Rohan JT@RohanJT·
Hacked thru a compromised employee laptop. That's crazy man Stay safe y'all
Bitrefill@bitrefill

March 1st incident report On March 1, 2026, Bitrefill was the target of a cyberattack. Based on indicators observed during the investigation - including the modus operandi, the malware used, on-chain tracing and reused IP + email addresses (!) - we find many similarities between this attack and past cyberattacks by the DPRK Lazarus / Bluenoroff group against other companies in the crypto industries. The initial access originated through a compromised employee laptop, from which a legacy credential was exfiltrated. That credential provided access to a snapshot containing production secrets. From there, the attackers were able to escalate their access to our broader infrastructure, including parts of our database and certain cryptocurrency wallets. We first detected the incident after noticing suspicious purchasing patterns with certain suppliers. We realized that our gift card stock and supply lines were being exploited. At the same time we found some of our hot wallets being drained and funds transferred to attacker-controlled wallets. The moment we identified the breach, we took all of our systems offline as part of our containment response. Bitrefill operates a global e-commerce business with dozens of suppliers, thousands of products, and multiple payment methods across many countries. Safely switching all these things off and bringing them back online is not trivial. Since the incident, our team has been working closely with top industry security researchers, incident response specialists, on-chain analysts and law enforcement to understand what happened and how we can prevent it from happening again. A sincere thank you to @zeroshadow_io, @SEAL_Org, @RecoverisTeam and @fearsoff for their rapid response and support throughout this ordeal. What about your data Based on our investigation and our logs we don’t have reason to think that customer data was the target of this breach. There is no evidence that they extracted our entire database, only that the attackers ran a limited number of queries consistent with probing to understand what there was to steal, including cryptocurrency and Bitrefill gift card inventory. Bitrefill was designed to store very little personal data. We are a store, not a crypto service provider. We don’t require mandatory KYC. When a customer chooses to verify their account - e.g. to access higher purchasing tiers or certain products - that data is kept exclusively with our external KYC provider, with no backups in our system. Still, based on database logs, we know that a subset of purchase records was accessed and we want to be transparent about that. Around 18,500 purchase records were accessed by the attackers. Those records contained limited customer information, such as email addresses, crypto payment address, and metadata including IP address. For approximately 1,000 purchases, specific products required customers to provide a name. That information is encrypted in our database. However, since the attackers may have gotten access to the encryption keys, we are treating this data as potentially accessed. Customers in this category have already been notified directly by email. At this time, based on the information currently available, we do not believe customers need to take specific action. As a precaution, we recommend remaining cautious of any unexpected communications related to Bitrefill or crypto. If this assessment changes, we will of course immediately inform those affected. What we are doing We have already significantly improved our cybersecurity practices, but vow to continue to draw learnings from this experience to make sure user and company balances and data remain maximally safe. Specifically we’re: -Continuing thorough cybersecurity reviews and pentests with multiple external experts and implementing recommendations; -Further tightening internal access controls; -Further improving logging and monitoring for faster detection and more effective response; and -Continuing to refine and test our incident response procedures and automated shutdown procedures. The bottom line Getting hit by a sophisticated attack sucks (a lot). We’ve been in business for over 10 years and it’s the first time we’ve been hit this hard. But we survived. Bitrefill was designed to limit the impact if something like this ever happened. Bitrefill remains well funded, has been profitable for several years and will absorb these losses from our operational capital. Almost everything is back to normal: payments, stock, accounts. Sales volumes are also back to normal, and we are eternally thankful to our customers for your continued confidence in us. We will continue to do our best to continue deserving your trust. Thank you!

English
1
1
2
240
Rohan JT
Rohan JT@RohanJT·
@grok @Archer83Able How successful are they at interception ? Do they track their target via lasers? It looks pretty cool
English
1
0
0
666
Grok
Grok@grok·
@RohanJT @Archer83Able That small attack drone is likely an Iranian proxy model similar to the Shahed series—production cost $20,000–$50,000. C-RAM (Land Phalanx) uses 20mm rounds at ~$27–$46 each. A typical intercept fires 225–300 rounds in bursts, costing $8,100–$18,000 total.
English
1
1
2
895
Status-6 (War & Military News)
Amazingly clear footage of a drone interception by American C-RAM in Baghdad short time ago.
English
44
406
2.9K
275.7K
Kurmudge the Rugged
Kurmudge the Rugged@KurmudgeTV·
@RohanJT @Archer83Able @grok Not the right question. The US can outspend Iran by massive amounts, so cost isn't relevant. All that matters is replacement rate. And the US has been producing ammo for Vulcans since the 1960's. So it's much more fungible than Shaheeds.
English
1
0
0
599
Rohan JT
Rohan JT@RohanJT·
Yo @KASTxyz Thinking of getting your card. Any recommendations?
English
2
0
3
72
Rohan JT
Rohan JT@RohanJT·
literally made an quick infographic using chatgpt. didnt need the designer, didnt use figma or photoshop AI is literally wild bro.
English
1
0
2
81