Jose Neif ⚡️

9.2K posts

Jose Neif ⚡️ banner
Jose Neif ⚡️

Jose Neif ⚡️

@pepeneif

More Bitcoin, Less Dollars.

Planet Earth Katılım Temmuz 2009
3K Takip Edilen864 Takipçiler
calle
calle@callebtc·
- whatsapp: can probably read everything - telegram: huge psyop, no privacy by default - xchat: 4-digit pin for "end-to-end encryption" 🤡 - signal: stores plaintext notifications, needs phone number secure chat is more important than ever but things aren't looking great
English
191
140
1.7K
87.9K
Jose Neif ⚡️ retweetledi
Bisq
Bisq@bisq_network·
1/ Bisq has reached a major milestone: With the release of Bisq Connect v0.3.2, the Bisq Easy mobile initiative is now complete. bisq.network/blog/mobile-ap…
Bisq tweet media
English
13
27
162
8.9K
Jose Neif ⚡️ retweetledi
Cointelegraph
Cointelegraph@Cointelegraph·
🇭🇰 JUST IN: Hong Kong grants first stablecoin licenses to HSBC and a Standard Chartered-led group.
Cointelegraph tweet mediaCointelegraph tweet media
English
56
290
1.2K
151.6K
Jose Neif ⚡️ retweetledi
Nic
Nic@nicrypto·
Wild. Japanese government bond yields still aren't stopping their surge. The 10yr yield is now at it's highest level in 27 years.
Nic tweet media
English
12
59
394
16K
Jose Neif ⚡️ retweetledi
Flash.Trade | Perps on Solana
FLP.1 is up more than 4.5% over the week generating $43k in net pnl 📈 Stop trying to time the bottom and hold the basket that will always outperform ⚡️
Flash.Trade | Perps on Solana tweet media
English
6
2
17
578
Jose Neif ⚡️ retweetledi
Ayaan 🐧
Ayaan 🐧@twtayaan·
🚨 S3 is no longer just Object Storage. Yesterday (April 7, 2026), AWS officially launched Amazon S3 Files. This is the biggest update to S3 in 20 years. It can: → Mount S3 buckets as native file systems → Provide sub-millisecond file access → Handle POSIX permissions (UID/GID) natively → Connect to Lambda, EC2, and EKS directly → Eliminate the need for s3fs or data staging Your AI agents can read/write to S3 like a local disk, while your data team access the same objects via API. DevOps just got a massive upgrade. Source: share.google/ts8JORn6SURzwM…
Ayaan 🐧 tweet media
English
74
428
3.6K
455.4K
Jose Neif ⚡️ retweetledi
NoahAI
NoahAI@TryNoahAI·
Today, you can build your first @solana dApp for FREE 📲 No developers, no months of work, and no $50,000 to start. You can do it now - launch the first version in under 5 minutes, and within hours have a full-stack dApp with a Solana Program LIVE! Start now here: trynoah.ai
NoahAI tweet media
English
15
24
132
6.9K
Jose Neif ⚡️ retweetledi
Hasan Toor
Hasan Toor@hasantoxr·
I've been looking for something like this for two years. TaxHacker is a self-hosted AI accounting app that reads receipts, invoices, and PDFs extracts every field automatically and saves everything into a structured database you actually own. Upload anything. Store receipts, restaurant bills, invoices, bank statements, handwritten notes. Any language. Any currency. The AI handles it. It auto-converts to your base currency using historical exchange rates from the actual transaction date. Supports 170+ currencies and 14 cryptocurrencies. Every prompt the AI uses is editable. Every field is customizable. Your data never leaves your server. github.com/vas3k/TaxHacker Two commands to self-host. MIT License. 100% Open Source.
English
18
66
594
58.5K
Jose Neif ⚡️ retweetledi
Stepan | squads.xyz
Stepan | squads.xyz@SimkinStepan·
An update on what we're focusing on with @multisig in light of the Drift incident last week. What we're building now: 1. A proxy program for v4 that lets you opt in to killing durable nonces for a specific signer. This removes the ability for pre-signed transactions to sit indefinitely waiting to be executed. 2. A dedicated protocol management multisig program with configurable template policies and a UI you can run locally. Built for teams that need tighter governance controls over admin operations. 3. Exploring clear signing with intents so signers can verify exactly what a transaction does before approving it (cc @Redacted_Noah). What's already available on v4 and can be set up by your team today: – Timelocks. You can set these up in Settings. They create a mandatory delay between proposal approval and execution. – Signer permissions. You can assign Propose, Vote, and Execute rights separately, so not every signer has the same level of access. – Multisig nesting. You can set up configurations where eg two separate multisigs are signers on a third. Adding a layer of operational separation. -Minimal UI. An interface on top of v4 that you can run locally (github.com/Squads-Protoco…). If you're unsure about your current setup or want guidance on how to configure any of this, DM us.
Squads@multisig

Our investigation into the @DriftProtocol incident remains ongoing. Early evidence points to two compromised signers on Drift's admin multisig, which were used to execute a transaction modifying Drift's program configuration. Squads programs were not compromised. We have also found no evidence of compromise to Squads infrastructure, though we are actively investigating to confirm this with full confidence. We will share further findings as they become available. Best Practices for Operationally Critical Multisigs Thresholds: Any multisig with operational or administrative control over a program should have a signing threshold of 3 or above. This requires an attacker to concurrently compromise multiple independent signers, significantly raising the difficulty of this type of attack. Where possible, signers should also be geographically and organizationally dispersed. Signers sharing the same location, devices, or org structure introduce correlated risk. Timelocks: Multisigs with program-level control should implement a timelock (can be set up in Settings of your Squads multisig). It won't prevent a malicious transaction from being proposed, but it creates a window to detect and reject it before execution. The tradeoff: timelocks also slow down legitimate emergency responses to bugs or active exploits, so teams should factor this into their operational setup. Alerts & Monitoring: We encourage all operationally critical multisigs to set up monitoring and alerts through our security partner @RangeSecurity. Range provides two key things: an alternative interface for independently verifying transaction content outside of the Squads UI, and proactive Slack alerts so signers are notified before a proposal moves forward. If you want help getting set up, reach out and we'll connect you directly. A high threshold, a timelock, and monitoring are the foundation for any multisig with program-level control. Signing Process: Signers should use dedicated devices and hardware wallets, never a general-purpose machine. Additionally, signatures are only valid for approximately 2 minutes each, so introduce at least a 2 minute delay between each signer taking actions to ensure signatures cannot be collected & bundled by an attacker. Always verify transaction content independently across all three available sources: the Squads UI, Range's alternative interface, and Solana Explorer or Solscan On Durable Nonces 
The Drift attack exploited durable nonces to collect signatures without time pressure, bypassing the 2-minute transaction expiry that would otherwise limit this type of attack. We are actively exploring ways to block durable nonce usage across all of our programs, both at the program level and through other enforcement mechanisms, to ensure this protection extends to our immutable programs V3, V4, and our current Smart Account Program. Beyond this, the broader Solana ecosystem is taking steps to address this at the protocol level, with a new transaction format that drops durable nonces as a feature entirely. We will follow up with more information on this soon.

Beyond Multisig, Operational Security Technical controls only go so far. Most high-profile compromises lately have been social engineering attacks targeting the people behind the keys, not the contracts themselves. If you are running mission-critical protocol operations, invest in your internal opsec processes and team culture accordingly, how proposals are initiated, communicated, and approved all matter. We recommend engaging dedicated security advisors. @zeroshadow_io and @0xGroomLake are trusted starting points, and we are happy to connect you directly.

English
19
32
207
31.3K
Jose Neif ⚡️ retweetledi
Perena
Perena@perena·
Trust in this space has been tested and we don’t take that lightly. But the truth is, we don't want your trust. We want to make it unnecessary. Today, we’re introducing Proof of Reserves for USD Star, powered by Zero Knowledge Proofs. If you’re holding digital dollars, you should know exactly what’s backing them. 🧵 (1/3)
English
24
19
156
29.7K
Jose Neif ⚡️ retweetledi
Altitude
Altitude@altitude·
Altitude is the Grand Prize Sponsor of Colosseum Frontier. One month, thousands of builders, only on Solana. Go build on the frontier.
Colosseum@colosseum

1/ @Solana's Frontier Hackathon has commenced!🏔️ 🌍 Crypto's largest online startup competition 💰 $2.5 million from Colosseum's venture fund 🌉 Up to 10 startups accepted into our accelerator 🏁 Product submissions due by May 11, 2026 Join: colosseum.com/frontier

English
27
6
48
5.1K
Jose Neif ⚡️ retweetledi
Bitcoin.com
Bitcoin.com@BitcoinCom·
TRADITION MEETS TOMORROW This is how #TEAMZ Tokyo opened. Then BlackRock, Ministry of Finance, Mizuho & Horiemon walked on stage. Here's everything that happened. 🧵 🇯🇵
English
14
11
35
19K
Jose Neif ⚡️ retweetledi
Aseneca💙
Aseneca💙@Princeadxisrael·
There is no publicly available resource that explains how the Solana validator actually works under the hood. Not the TPU pipeline. Not the Banking Stage scheduler. Not how AccountsDB manages terabytes of state under concurrent write pressure. I wrote that resource. It's called Engineering Solana. It's free. 🧵
English
15
31
158
11.8K