
frankly sunnier
473 posts




🔥 眾多的知名國際媒體見證並記錄了 #六四 大屠殺,BBC 就是其中一家,它拍下了6月3日深夜到6月4日上午天安門廣場及附近最慘烈的一幕。現場槍聲,尖叫聲,呼救聲,哀號聲不絕於耳。 🔥 場面血腥,慎入❗️




『 36年间持续隐瞒屠杀记录』 中国政府「天安门死者319人」 英国机密文件「至少1万人」。 相差30倍以上 而且英国外交电报中记载着「用装甲车碾碎尸体,用推土机收集焚烧,用水管冲进排水沟」 中共是一个以造假著称的政府,无论什么在他们眼中皆可造假! 36年后的今天,中国国内搜索「64」就会断网 14亿人连了解自己国家历史都不被允许! 这个国家,日本投入了3兆6600亿日元的ODA,然而中共政府没有一句感谢和友谊! 日本现在已经被中共塑造成为仇恨的对象,教育全体国民必须仇恨日本! 日本不能再继续向碾死自己国民的政府送钱并称之为「友好」的国家了!


🚨Reminder: XChat claim of “end-to-end encrypted” chats is misleading at best. XChat uses the Juicebox protocol to secure the encryption keys with only a 4-digit code which cannot be brute forced. While that sounds absurd, the Juicebox protocol achieves this by splitting up the encryption key and distributing it to various independent “realms”, doing it in such a way that there isn’t a single realm that has the whole encryption key and can verify the 4-digit pin independently. The whole scheme falls apart if all the realms are controlled by a single entity, which is exactly how XChat does it. As you can see in the screenshot of the traffic produced by the new XChat app when creating a new 4-digit pin: all the realms are under the x[.]com domain with an SSL certificate that belongs to X. (The XChat app does not use certificate pinning, which allowed network traffic to be intercepted and decrypted) Since X operates all the realms, that means X can quite easily recover all the keys for any “end-to-end encrypted” chats in XChat





盲猜这次Apple Pay绑万事达中国(万事网联)应该只有境外渠道,四家银行(中行、中信、农行、浦发)均只提及了「境外支付」用途 此外中行写的是「中行万事达信用卡」所以应该有且仅有信用卡可绑,估计像万事达莫奈世界卡等中行外币借记卡仍不支持绑定 与Apple Pay绑定VISA中国一样,在4月16日至6月30日单笔消费金至高返等值5美元,同一信用卡活动期间限参与3次。

























