Ghost

346 posts

Ghost banner
Ghost

Ghost

@fantasma0x

$SOL

Unknown Katılım Eylül 2023
693 Takip Edilen88 Takipçiler
Ghost retweetledi
How To AI
How To AI@HowToAI_·
This is 100% illegal. A Chinese developer open-sourced a system that turns any Android phone into a wireless CarPlay device. You just flash it onto a phone, plug it into your car, and your car's head unit thinks it's talking to an iPhone over CarPlay. except the phone is running Android. → Connects in 4-10 seconds → 60fps video at 25mb bitrate → Lossless PCM audio (48kHz 16-bit stereo) → 1:1 resolution match with your car display 100% Open Source.
How To AI tweet media
English
32
118
2.3K
352.2K
Ghost retweetledi
Cointelegraph
Cointelegraph@Cointelegraph·
🚨 ALERT: Casa co-founder Jameson Lopp warned about a new phishing technique that abuses legitimate Google recovery forms to hide malicious links inside long messages filled with blank space.
Cointelegraph tweet mediaCointelegraph tweet media
English
21
22
120
24.2K
Ghost retweetledi
Lookonchain
Lookonchain@lookonchain·
Three major hacks in just 4 days! On May 15, #THORChain was exploited, with stolen funds exceeding $10M. On May 18, the Verus-Ethereum Bridge (@VerusCoin) was hacked, with ~$11.5M stolen. Today, @EchoProtocol_ was exploited, the hacker minted 1,000 $eBTC ($76.64M) and has already used it to steal 385 $ETH($821K). Stay safe.
Lookonchain tweet mediaLookonchain tweet mediaLookonchain tweet media
English
48
60
377
51.9K
Ghost retweetledi
Coin Bureau
Coin Bureau@coinbureau·
⚠️ALERT: ANOTHER MAJOR HACK STRIKES CRYPTO; $76M EXPLOIT HITS MONAD Echo Protocol on Monad was reportedly exploited after an attacker minted 1,000 eBTC worth roughly $76.6M, as per Lookonchain. The hacker allegedly used part of the funds as collateral on Curvance to borrow WBTC, bridged assets to Ethereum, swapped them into ETH, and routed roughly 385 ETH through Tornado Cash. The attacker still reportedly controls around 955 eBTC worth over $73M. This now marks the THIRD major crypto exploit in just 4 days!
Coin Bureau tweet mediaCoin Bureau tweet media
English
172
161
794
154.9K
Ghost retweetledi
The White Whale
The White Whale@WhiteWhaleLabs·
I am a firm believer that everyone in crypto should be using a VPN. Not sometimes. 24/7. There is zero room for exception. We all know how "not" decentralized DeFi really is. We all know how many breaches happen in this space. You should never expose your real IP address for any reason. If a protocol automatically blocks users with VPNs, don't use that protocol. There are some things in real life that you can't get around. For example, my insurance company blocks VPN traffic. I cannot log in to pay my bill or make policy changes with a VPN turned on. While it might be tempting to simply kill your VPN for a brief moment, every browser tab you have open or any service that accesses the internet on your device can potentially see your real IP address. So for those times it's unavoidable I prefer to use a second, dedicated device that is only used for those few select things and nothing else. I'll never forget the day my concierge rep at my primary CEX called me and asked "How much longer do you plan on being in Germany?" My answer: A. That's creepy as hell that you asked that and B. I'll be using a VPN forever. If you're hardcore about your privacy, @mullvadnet is really the primary option. Numbered accounts instead of email-based, strict and historically proven no-logs policy, RAM-only infrastructure and they provide a way to pay for the service without doxing yourself. Because ironically most privacy-minded people screw everything up when they enter their billing details. Congrats, you've just created a real-life link to your identity. Mullvad allows you to pay for the service using Monero. Runner's up for alternative choices could include IVPN or Proton VPN. But for me Mullvad is the clear winner. Yeah, I'm passionate about Mullvad. No, I'm not paid for that opinion. Whatever you do, just stay safe out there.
English
74
25
482
47.1K
Ghost retweetledi
Nate | eatsleepcrypto.eth
Nate | eatsleepcrypto.eth@satorinakamoto·
industry: gets hacked “how did the devs let this happen?” the devs:
English
114
152
1.8K
153.1K
Ghost retweetledi
International Cyber Digest
International Cyber Digest@IntCyberDigest·
🔐 Proton CEO Andy Yen warns that the global push for age verification is the quiet death of online anonymity, because every passport scan, selfie, and biometric uploaded for "verification" inevitably ends up leaked, hacked, or monetized. He argues Big Tech and governments cannot be trusted to act as gatekeepers, and the only real protection for ID data is to never collect it in the first place.
International Cyber Digest tweet mediaInternational Cyber Digest tweet media
English
77
721
2.6K
105.5K
Ghost retweetledi
Kruptos
Kruptos@KuptoKosmos·
⚠️🪪 Ta photo sur tes réseaux sociaux, tes infos perso dans les bases de l’ANTS, sans compter les outils comme JinkusuCam et CNI-404 (voir commentaires) En 2026, un hacker peut passer un #KYC biométrique vidéo tranquillement, avec un double réaliste de toi et ta CNI en main 🫠
Kruptos tweet media
Français
18
193
775
282.2K
Ghost retweetledi
Ash Crypto
Ash Crypto@AshCrypto·
🚨THIS IS VERY SUSPICIOUS Energy facilities around the world are getting blown up, and no one knows the exact reason. Here's a list of major oil refineries/energy facilities being blown up this month: 3rd April: Russia's Major Oil Export Terminal 4th April: Russia's Crude Distillation Unit 7th April: India's Power Plant 9th April: Mexico's Refinery 14th April: India's Power Plant 15th April: Australia's Energy Refinery 20th April: Russia's Oil Refinery 21st April: India's Oil Refinery 21st April: Romania's Power Plant 21st April: Texas Oil Rig A few of them have been blown up by drones, but most of them mysteriously caught fire. And this is happening when the world is already going through its biggest energy crisis in decades. Is someone deliberating trying to push the world economy in Lockdown 2.0 by choking up global energy?
English
428
2.3K
5.6K
362.5K
Ghost retweetledi
Concerned Citizen
Concerned Citizen@BGatesIsaPyscho·
🚨🇺🇸 Oil Rig Explosion in Texas reported just hours ago That’s number 6 in 6 different Countries in just 24 hours. These aren’t all coincidences - a global energy crisis is being deliberately manufactured‼️
Concerned Citizen tweet media
English
451
9.2K
16.8K
307K
Ghost retweetledi
Ghost retweetledi
Brave
Brave@brave·
Hi, clearing cache may help but another thing worth trying is manually updating the browser's ad blocker: Desktop: Go to Settings > Shields > Content filtering and click the “Update lists” button iOS: Go to Settings > Shields & Privacy > Content Filtering and click the “Update Lists” button Android: Go to Settings > Brave Shields & privacy > Content filtering and click the “UPDATE” button After that, reload your YT tabs and see if the issue is fixed.
English
33
150
3.4K
181.8K
Ghost retweetledi
JackTheRippler ©️
JackTheRippler ©️@RippleXrpie·
🚨🇪🇺 URSULA VON DER LEYEN MUST RESIGN NOW! Romanian M.E.P EXPOSES Von der Leyen's criminal behavior in front of leaders: “Ursula signed a €71 BILLION contract to purchase up to 4.6 BILLION DOSES 10 per citizen.” Von der Leyen is married to the German Dr. Heiko von der Leyen, who is the Director of Orgenesis, owned by PFIZER.
JackTheRippler ©️ tweet media
English
608
11.2K
35.4K
886.3K
Ghost retweetledi
Watcher.Guru
Watcher.Guru@WatcherGuru·
JUST IN: Ship traffic resumes in the Strait of Hormuz after reopening today.
English
681
3.2K
15.5K
1.8M
Ghost retweetledi
Kalshi
Kalshi@Kalshi·
JUST IN: US-Iran deal is reportedly in "final phase"
English
133
425
4.8K
178.4K
Ghost retweetledi
International Cyber Digest
International Cyber Digest@IntCyberDigest·
🚨🇦🇪 Dubai Police are confirmed to be "conducting electronic surveillance operations capable of detecting private WhatsApp messages." It started with a message in a private group chat of airline workers. Just colleagues talking, the kind of exchange that happens in thousands of workplace WhatsApp threads every single day. An airline worker in Dubai shared images of a building damaged during the Iranian attacks... He sent them to people he knew, in a closed conversation he believed was private. He was wrong. Dubai Police were watching. They downloaded the evidence. They built their case. Then they lured the man to a meeting. He showed up. They arrested him on the spot. He now sits in custody, facing charges that include publishing information deemed harmful to state interests, which could mean up to two years behind bars. And then came the detail that should stop everyone reading this cold. In their own police report, authorities stated plainly that the clip had been detected "through electronic monitoring operations." Electronic monitoring of a private WhatsApp conversation between coworkers... Radha Stirling (a human rights activist) put it bluntly: individuals are being tracked, identified, and arrested not for public statements, but for private exchanges between colleagues. And the questions this raises don't stop at Dubai's borders. They land squarely at the feet of WhatsApp and every company that promises its users end-to-end encryption capabilities. Because if a closed chat between colleagues can be intercepted, decoded, and used as the basis for an arrest by an overreaching state, then billions of users worldwide are owed an answer to one very simple question. How private are private Whatsapp groups and messages really?
International Cyber Digest tweet mediaInternational Cyber Digest tweet media
English
133
824
2.5K
396.3K
Ghost retweetledi
Kalshi
Kalshi@Kalshi·
BREAKING: Iran officially reopens Strait of Hormuz
English
713
3.4K
22.2K
3.8M
Ghost retweetledi
International Cyber Digest
International Cyber Digest@IntCyberDigest·
‼️🇪🇺 The EU's new Age Verification app was hacked with little to no effort. When you set it up, the app asks you to create a PIN. But that PIN isn't actually tied to the identity data it's supposed to protect. An attacker can delete a couple of entries from a file on the phone, restart the app, pick a new PIN, and the app happily hands over the original user's verified identity credentials as if nothing happened. It gets worse. The app's "too many attempts" lockout is just a counter in a text file. Reset it to 0 and keep guessing. The biometric check (face/fingerprint) is a simple on/off switch in the same file. Flip it to off and the app skips it entirely.
International Cyber Digest tweet mediaInternational Cyber Digest tweet media
English
651
6.5K
23.8K
1M