ʇɹɥɐW uıɯƎ ⚡Emin Mahrt

19.8K posts

ʇɹɥɐW uıɯƎ ⚡Emin Mahrt banner
ʇɹɥɐW uıɯƎ ⚡Emin Mahrt

ʇɹɥɐW uıɯƎ ⚡Emin Mahrt

@em

https://t.co/b7xdkTcC0D Bitcoin & Non-Custodial Banking

Bitcoin Katılım Ocak 2009
7.5K Takip Edilen2.8K Takipçiler
ZachXBT
ZachXBT@zachxbt·
@evilcos @coinbase @im23pds So basically Coinbase has an official page live threat actors can use to target Coinbase users via seed phrase social engineering if they wanted?
ZachXBT tweet media
English
54
50
569
56.9K
ʇɹɥɐW uıɯƎ ⚡Emin Mahrt retweetledi
Arkad
Arkad@Multicripto·
Do you know what your Bitcoin transactions reveal about you? am-i.exposed shows you. It's an on-chain privacy scanner that analyzes addresses and transactions. 🧵
Arkad tweet media
English
36
130
531
109.4K
ʇɹɥɐW uıɯƎ ⚡Emin Mahrt retweetledi
Blockonomics
Blockonomics@blockonomics_co·
When your business is built on privacy, your payments can’t be the weak link. That’s where we stand.
English
0
1
1
28
ʇɹɥɐW uıɯƎ ⚡Emin Mahrt
Wondering if VERDI is aware that tomorrow is the end of ramadan and they are grounding thousands of mainly Turkish people in Berlin that wanted to visit their families in Turkey. I hope they just didn't know. But if they did, its a real shitty move... rbb24.de/wirtschaft/bei…
English
0
0
0
66
ʇɹɥɐW uıɯƎ ⚡Emin Mahrt retweetledi
Brett Winton
Brett Winton@wintonARK·
a barrel of oil can provide as much electricity as a 400W solar panel does annually. a barrel of oil runs $92 and comes with a few minor logistical complications. this year the solar panel should run less than $90; you can order online, ships in a week.
Brett Winton tweet media
English
685
443
5.4K
493.1K
Haytham Kaafarani
Haytham Kaafarani@hayfarani·
I am a US citizen & Surgeon who took care of the Boston Maraton Bombing victims in 2013. I paid for 7 years to own a small apartment in downtown #Beirut for my 3 kids to enjoy summers there. Today, #Israel reduced my dream home to rubble, with american weapons, paid by my taxes.
English
9K
46.3K
197.9K
9M
ʇɹɥɐW uıɯƎ ⚡Emin Mahrt retweetledi
Brian Roemmele
Brian Roemmele@BrianRoemmele·
When robots make this, how much less will it cost? The age of abundance ahead.
English
295
273
2.5K
825.7K
ʇɹɥɐW uıɯƎ ⚡Emin Mahrt
prince michael, spare us the doom and gloom. baden-württemberg didn't pick decline, they picked @cem_oezdemir , son of turkish guest workers, as ministerpräsident. that's germany right there. a kid from migrant workers beating conservatives in one of the strongest states in europe. if that's not integration working then what is. talent has no passport and that's our real strength. your list of crumbling roads, energy prices, uncontrolled immigration. that's fear porn. these problems were there way before anyone started blaming diversity. blaming migrants while afd keeps growing is exactly why we gotta stay open and fight that crap. merz getting wins abroad doesn't cover up your merkel era frustration. özdemir winning proves germany stronger because they give people a real shot. this isn't going backwards, it's a country where people can still make it. your pessimism is the real problem.
English
0
0
0
9
MvLiechtenstein
MvLiechtenstein@MvLiechtenstein·
Confirming the #Green party, the people of Hashtag#BadenWurttemberg voted for an illusion of political stability, but accepting further decline and stagnation. It is a mirror of Germany’s malaise. ☝️There was a great deal of hope placed in Chancellor #Merz. While he excels in foreign and security policies, he finds himself hamstrung in addressing internal, social and economic issues due to his coalition. The decline continues. Well-protected by the “#Brandmauer”, the right #AfD is likely to continue growing and might even emerge as the strongest party. Gerany is grappling with crumbling infrastructure, skyrocketing energy costs, excessive regulation, unresolved healthcare and retirement obligations, rising debt, uncontrolled migration, weak internal security, neglected defense and rapid deindustrialization. Progress seems unlikely under the woke ideology promoted by the SPD through its dominant influence in government. 👉Only a robust, responsible, decent and pragmatic rethinking can clear the murky waters left by the Merkel era and give Germany a fresh start. gisreportsonline.com/r/germany-poli…
English
1
0
0
37
MvLiechtenstein
MvLiechtenstein@MvLiechtenstein·
The United States and Israel have eliminated radical ideologue Ayatollah #Khamenei, creating an opportunity for a new day to dawn in #Iran. Tha job - well done - has to be completed. It is the wrong moment to de-escalate. ☝️The time for diplomats might only come later. In the case of Afghanistan, international diplomacy squandered the achievements local groups had made in toppling the Taliban. 👉Hopefully, this time the creation of a new system of governance and reconciliation will be left to the brave Iranians according to their necessities. gisreportsonline.com/r/epic-fury/ #epicfury
English
1
0
1
108
ʇɹɥɐW uıɯƎ ⚡Emin Mahrt
Bitrefill is one of the pioneers and most important companies in the Bitcoin space. I'm happy they also share this with us.
Bitrefill@bitrefill

March 1st incident report On March 1, 2026, Bitrefill was the target of a cyberattack. Based on indicators observed during the investigation - including the modus operandi, the malware used, on-chain tracing and reused IP + email addresses (!) - we find many similarities between this attack and past cyberattacks by the DPRK Lazarus / Bluenoroff group against other companies in the crypto industries. The initial access originated through a compromised employee laptop, from which a legacy credential was exfiltrated. That credential provided access to a snapshot containing production secrets. From there, the attackers were able to escalate their access to our broader infrastructure, including parts of our database and certain cryptocurrency wallets. We first detected the incident after noticing suspicious purchasing patterns with certain suppliers. We realized that our gift card stock and supply lines were being exploited. At the same time we found some of our hot wallets being drained and funds transferred to attacker-controlled wallets. The moment we identified the breach, we took all of our systems offline as part of our containment response. Bitrefill operates a global e-commerce business with dozens of suppliers, thousands of products, and multiple payment methods across many countries. Safely switching all these things off and bringing them back online is not trivial. Since the incident, our team has been working closely with top industry security researchers, incident response specialists, on-chain analysts and law enforcement to understand what happened and how we can prevent it from happening again. A sincere thank you to @zeroshadow_io, @SEAL_Org, @RecoverisTeam and @fearsoff for their rapid response and support throughout this ordeal. What about your data Based on our investigation and our logs we don’t have reason to think that customer data was the target of this breach. There is no evidence that they extracted our entire database, only that the attackers ran a limited number of queries consistent with probing to understand what there was to steal, including cryptocurrency and Bitrefill gift card inventory. Bitrefill was designed to store very little personal data. We are a store, not a crypto service provider. We don’t require mandatory KYC. When a customer chooses to verify their account - e.g. to access higher purchasing tiers or certain products - that data is kept exclusively with our external KYC provider, with no backups in our system. Still, based on database logs, we know that a subset of purchase records was accessed and we want to be transparent about that. Around 18,500 purchase records were accessed by the attackers. Those records contained limited customer information, such as email addresses, crypto payment address, and metadata including IP address. For approximately 1,000 purchases, specific products required customers to provide a name. That information is encrypted in our database. However, since the attackers may have gotten access to the encryption keys, we are treating this data as potentially accessed. Customers in this category have already been notified directly by email. At this time, based on the information currently available, we do not believe customers need to take specific action. As a precaution, we recommend remaining cautious of any unexpected communications related to Bitrefill or crypto. If this assessment changes, we will of course immediately inform those affected. What we are doing We have already significantly improved our cybersecurity practices, but vow to continue to draw learnings from this experience to make sure user and company balances and data remain maximally safe. Specifically we’re: -Continuing thorough cybersecurity reviews and pentests with multiple external experts and implementing recommendations; -Further tightening internal access controls; -Further improving logging and monitoring for faster detection and more effective response; and -Continuing to refine and test our incident response procedures and automated shutdown procedures. The bottom line Getting hit by a sophisticated attack sucks (a lot). We’ve been in business for over 10 years and it’s the first time we’ve been hit this hard. But we survived. Bitrefill was designed to limit the impact if something like this ever happened. Bitrefill remains well funded, has been profitable for several years and will absorb these losses from our operational capital. Almost everything is back to normal: payments, stock, accounts. Sales volumes are also back to normal, and we are eternally thankful to our customers for your continued confidence in us. We will continue to do our best to continue deserving your trust. Thank you!

English
0
0
0
33
ʇɹɥɐW uıɯƎ ⚡Emin Mahrt retweetledi
Bitrefill
Bitrefill@bitrefill·
March 1st incident report On March 1, 2026, Bitrefill was the target of a cyberattack. Based on indicators observed during the investigation - including the modus operandi, the malware used, on-chain tracing and reused IP + email addresses (!) - we find many similarities between this attack and past cyberattacks by the DPRK Lazarus / Bluenoroff group against other companies in the crypto industries. The initial access originated through a compromised employee laptop, from which a legacy credential was exfiltrated. That credential provided access to a snapshot containing production secrets. From there, the attackers were able to escalate their access to our broader infrastructure, including parts of our database and certain cryptocurrency wallets. We first detected the incident after noticing suspicious purchasing patterns with certain suppliers. We realized that our gift card stock and supply lines were being exploited. At the same time we found some of our hot wallets being drained and funds transferred to attacker-controlled wallets. The moment we identified the breach, we took all of our systems offline as part of our containment response. Bitrefill operates a global e-commerce business with dozens of suppliers, thousands of products, and multiple payment methods across many countries. Safely switching all these things off and bringing them back online is not trivial. Since the incident, our team has been working closely with top industry security researchers, incident response specialists, on-chain analysts and law enforcement to understand what happened and how we can prevent it from happening again. A sincere thank you to @zeroshadow_io, @SEAL_Org, @RecoverisTeam and @fearsoff for their rapid response and support throughout this ordeal. What about your data Based on our investigation and our logs we don’t have reason to think that customer data was the target of this breach. There is no evidence that they extracted our entire database, only that the attackers ran a limited number of queries consistent with probing to understand what there was to steal, including cryptocurrency and Bitrefill gift card inventory. Bitrefill was designed to store very little personal data. We are a store, not a crypto service provider. We don’t require mandatory KYC. When a customer chooses to verify their account - e.g. to access higher purchasing tiers or certain products - that data is kept exclusively with our external KYC provider, with no backups in our system. Still, based on database logs, we know that a subset of purchase records was accessed and we want to be transparent about that. Around 18,500 purchase records were accessed by the attackers. Those records contained limited customer information, such as email addresses, crypto payment address, and metadata including IP address. For approximately 1,000 purchases, specific products required customers to provide a name. That information is encrypted in our database. However, since the attackers may have gotten access to the encryption keys, we are treating this data as potentially accessed. Customers in this category have already been notified directly by email. At this time, based on the information currently available, we do not believe customers need to take specific action. As a precaution, we recommend remaining cautious of any unexpected communications related to Bitrefill or crypto. If this assessment changes, we will of course immediately inform those affected. What we are doing We have already significantly improved our cybersecurity practices, but vow to continue to draw learnings from this experience to make sure user and company balances and data remain maximally safe. Specifically we’re: -Continuing thorough cybersecurity reviews and pentests with multiple external experts and implementing recommendations; -Further tightening internal access controls; -Further improving logging and monitoring for faster detection and more effective response; and -Continuing to refine and test our incident response procedures and automated shutdown procedures. The bottom line Getting hit by a sophisticated attack sucks (a lot). We’ve been in business for over 10 years and it’s the first time we’ve been hit this hard. But we survived. Bitrefill was designed to limit the impact if something like this ever happened. Bitrefill remains well funded, has been profitable for several years and will absorb these losses from our operational capital. Almost everything is back to normal: payments, stock, accounts. Sales volumes are also back to normal, and we are eternally thankful to our customers for your continued confidence in us. We will continue to do our best to continue deserving your trust. Thank you!
English
112
140
961
163.2K
Ihtesham Ali
Ihtesham Ali@ihtesham2005·
This is wild 🤯 Someone built a tool that automatically removes safety alignment from ANY AI model. It's called Heretic. → Works on Llama, Qwen, Gemma, Mistral and most major models → Runs on a consumer RTX 3090 in ~45 minutes → Achieves same refusal suppression as manually tuned abliterations → Preserves model intelligence better than existing methods The scary part isn't the tool itself. It's that every AI lab spending billions on safety alignment is now in a race against a 14-contributor open source repo. Every safety update shipped → community figures out how to abliterate it → repeat. This is what the AI safety debate actually looks like in 2026. 100% Opensource. Link in the comments 👇
Ihtesham Ali tweet media
English
35
68
507
31.9K
Mouin Rabbani
Mouin Rabbani@MouinRabbani·
Why won’t Trump call upon the Israeli navy to open the Strait of Hormuz?
English
370
3.3K
31.8K
899.9K