topher van helsing

3.8K posts

topher van helsing banner
topher van helsing

topher van helsing

@btctechsupport

Will banish the evil spirits haunting your unconfirmed transaction, or your money back.

Austin, TX Katılım Şubat 2022
497 Takip Edilen994 Takipçiler
topher van helsing retweetledi
John Carvalho
John Carvalho@BitcoinErrorLog·
I have a soft spot for bitcoin-miner heating appliances. I just think the idea that everyone's heaters, BitAxes, and Umbrels are powering Bitcoin is much cooler than billionaires with massive ASIC datacenter farms lobbying the government and such.
Superheat@Superheat_xyz

👀

English
21
32
492
35.8K
topher van helsing
topher van helsing@btctechsupport·
thank you bitcoin core team for this level of job security
topher van helsing tweet media
English
0
0
4
146
topher van helsing retweetledi
topher van helsing retweetledi
Bruce Fenton
Bruce Fenton@brucefenton·
Did Epstein influence Bitcoin core development? Short answer: No. This is not how Bitcoin works. Here’s what happened: Epstein donated to MIT Media Lab…who in turn supported MIT Digital Currency Initiative…which in turn funded Bitcoin developers. These devs used to be funded by The Bitcoin Foundation (which I used to run as volunteer Executive Director) there are many devs and no dev or team had power or control over Bitcoin. Under MIT’s patronage the devs had the same deal they had with us at The Bitcoin Foundation: that they could work on the code and not have direction from the org. More importantly — how Bitcoin works is that *even if* a dev was compromised then the nodes and miners would still have to run that code to make it included in Bitcoin. So for example if I had somehow asked the devs paid by Bitcoin Foundation to “add 1000 coins for Bruce” 1) they wouldn’t have done this / it would have been counter to our agreement 2) no miners would run that code & no nodes would recognize it. It would be a laughing stock and completely rejected. Does this mean code dev is not an attack vector? No. It’s still a risk. Particularly with nation state style actors and very careful efforts to co-opt which are much more sophisticated than “give Bruce coins” or something. This is one reason I’m cautious of Bitcoin core funding - especially from actors who’ve had bad judgment in the past. I think we should be cautious of who does the dev and view it as an attack vector. Bitcoin code is transparent and has lots of eyes on it. So in this case especially there isn’t even a solid accusation, let alone evidence that MIT directed nefarious code changes. If that was an allegation the first question should be: well what code specifically did MIT direct and what proof is there and how was it harmful? I think claims around this would collapse. There’s obviously plenty to criticize about Epstein and MIT working with him — and when it comes to digital assets MIT’s work with Gensler and especially its work on CBDCs is much more suspect than the chance that malicious code was pushed through on Bitcoin. Be cautious but this is a nothing burger
English
319
384
1.8K
226K
topher van helsing
topher van helsing@btctechsupport·
@Acquired_Savant @grok rewrite this post, but make it about the evolution of the bible instead of bitcoin core source code (keep the conspiracy tone)
English
0
0
0
23
Patrick L Riley
Patrick L Riley@Acquired_Savant·
At the time this letter was written, there were around 12,000 commits to Bitcoin's code. Today there are 47,583 commits to Bitcoin's code. That means that 74.79% of the Bitcoin core development and code was committed after Jeffery Epstein took over the defacto senior management role as benefactor. He may not have been 'Satoshi', but he was absolutely running the executive direction of Bitcoin on behalf of Mossad. What are the odds that there are backdoors built into Bitcoin's code at this point? Porbably about 100%. P.S. Ever wonder how the Bitcoin ransome for the 2021 Continental Pipeline hack was 'Recovered' by the FBI? I didn't.
Patrick L Riley tweet media
English
925
2.3K
10.1K
4.5M
topher van helsing retweetledi
Aaron Slodov
Aaron Slodov@aphysicist·
millennial gamers are the best prepared generation for agentic work, they've been training for 25 years
Aaron Slodov tweet mediaAaron Slodov tweet mediaAaron Slodov tweet mediaAaron Slodov tweet media
English
277
654
7.5K
1.5M
topher van helsing retweetledi
🍓🍓🍓
🍓🍓🍓@iruletheworldmo·
i never want to read any other way again.
English
1K
6.2K
62.7K
3.2M
topher van helsing retweetledi
Scott Adams
Scott Adams@ScottAdamsSays·
A Final Message From Scott Adams
Scott Adams tweet mediaScott Adams tweet media
English
13.2K
32.2K
193K
43M
topher van helsing retweetledi
plebdevs
plebdevs@pleb_devs·
The Free PlebDevs Adversarial AI Course is coming soon thanks to @HRF ! Learn build with AI: - Locally - Privately - Securely - Effectively Thank you to HRF for sponsoring PlebDevs to make this course AND build out further resources on adversarial AI usage - More info below 👇
English
3
10
20
2.1K
topher van helsing retweetledi
Sooraj
Sooraj@iAnonymous3000·
I like and respect Elon, and I'm grateful to be on this platform. But when he claims 𝕏 Chat is "much more secure than email," I feel obligated to explain the technical reality to my audience. That statement is true in the same way a screen door is more secure than no door. But that's not the comparison anyone should be making. 1. 𝕏 Can Read Your Messages 𝕏 recently added safety numbers, which is a step forward. But here's the catch: your private key backups are stored on 𝕏's servers. Safety numbers help detect external hackers, but they cannot protect you if 𝕏 itself or a rogue insider, or a government with a warrant. @signalapp's safety numbers work because your keys never leave your device. There is nothing for Signal to turn over, even if compelled. 2. No Forward Secrecy From 𝕏's own documentation: "If the private key of a registered device is compromised... an attacker would be able to decrypt all Encrypted Direct Messages." One key compromise exposes your entire message history. Signal's Double Ratchet generates new keys for every message. Compromise one key, you get one message. Past messages stay encrypted. This has been the standard in secure messaging for over a decade. 3. The "Juicebox" Vulnerability 𝕏 stores your private keys on their servers using a system called Juicebox. Cryptographer @matthew_d_green's analysis suggests this implementation is software-only, lacking Hardware Security Modules (HSMs). A 4-6 digit PIN does NOT help protect this. That is trivial to brute-force if 𝕏 (or an attacker with server access) disables the rate limiting. 4. Full Metadata Exposure 𝕏 explicitly states metadata isn't encrypted: who you message, when, and how often. As former NSA director Michael Hayden famously said: "We kill people based on metadata." Signal uses sealed sender technology to hide even this information. 5. NOT Open Source 𝕏 promised to open source XChat and publish a whitepaper in June 2025. Neither has happened. Signal has been open source and audited for over a decade. The Bottom Line: I'm not saying don't use 𝕏. I'm saying don't use 𝕏 Encrypted DMs for anything you wouldn't post publicly. For actual private communication, use @signalapp. It's free, works on all platforms, and the cryptography has withstood a decade of scrutiny from academics and nation-states alike.
Elon Musk@elonmusk

Send files via 𝕏 Chat with full encryption. Much more secure than email!

English
183
352
3.7K
1.4M
topher van helsing
topher van helsing@btctechsupport·
this is why government must be limited, transparent, marginalized, scrutinized and routinely culled our founding fathers were enlightened don't feed the beast
Gary Cardone@GaryCardone

Are US citizens required to participate in murder? Core Thesis; My taxes have been and are being used to kill, murder, oppress and maim millions, not build schools, hospitals, dams and bridges as originally intended. Once you see this you cannot unsee it and once seen, at least for me, I can no longer pretend not to be actively complicit in past and future murder, if I do nothing about it, if I say nothing, and most certainly if i conitnue to contribute financial energy to support and sustain the murder. To continue paying one penny of tax makes me OVERTLY complicit to murder and enslavement on an unprecedented scale. How can I look my children in their eyes knowing Daddy is a killer. Questions for A Jury, A Judge, The Supreme Crt: 1. If a man witnesses a great crime, the murder, rape and enslavement of innocent(s) when does he become responsible to report it and / or stop it? 2. IF that man is also found later, after he has knowledge of the crimes, continues to send funds to those very murderous people, which he knows goes to support and feed the criminals and the crime, when and at what point does that man cross the line of aiding, abetting the crime and the criminals and thus responsible for the crime? 3. As a US Citizen, do I have a constitutional obligation to be complicit with MURDER, to violate core principles of the Ten Commandments and core beliefs common to every religion on the planet? I shall be judged by God, by myself, by others, not by what I say or said, but what I DO AND DO NOT DO.

English
0
0
0
47
topher van helsing retweetledi