Tarabys

3.7K posts

Tarabys banner
Tarabys

Tarabys

@tarabys

bitcoin edu • privacy • video • vectors • graphics ⚡️LN ₿ tips → [email protected] Nostr → npub1tyu5g3frwch2505d7x2y9nt2h5ztt335dtxht9gn6zsr5ftgnglsvqqyut

kontakty a projekty → Katılım Mayıs 2010
173 Takip Edilen887 Takipçiler
Sabitlenmiş Tweet
Tarabys
Tarabys@tarabys·
@Trezor Safe 7 aktuálně válcuje trh s HW peněženkami. Ale jsou tu i jejich předchozí 4 modely a ve videu níže vysvětluji proč ani 11 let starý Trezor One nemusí patřit do starého železa... 💪😎 A znáte vůbec všechny možnosti, které Trezory nabízí? HW @konfacz - jaro 2025 👇
Bitperia.cz | bitcoinový průvodce@Bitperia

Trezor vydal novou peněženku Safe 7, čímž rozšířil modelovou řadu o další krásný kousek. Jak se ale v jednotlivých modelech vyznat? Měli byste zvážit upgrade? 🤔 Tarabys na jarní přednášce od Konfy odpověděl na všechny zásadní otázky a šlo se i do hloubky. Link 🧵👇

Čeština
2
1
23
2.6K
Tarabys
Tarabys@tarabys·
hele @mapy_comcz sem se chtěl zeptat: když budu mít to vaše Premium, tak dostanu i správné umístění Ostravy v rámci ČR? 🧐 Nebo ty popisky píše nějaká levná halucinující AI? Samé ocásky... 🤷‍♂️
Tarabys tweet media
Čeština
8
0
27
10.3K
Tarabys
Tarabys@tarabys·
aspoň že tu pořádáme nejlepší Bitcoin konferenci v češtině: @ChainCampCZ
Čeština
0
0
2
267
Vojta
Vojta@Vachidloo·
@Kicom21 Roadster tady bude do měsíce 👍🚀
Čeština
7
0
0
663
Kicom
Kicom@Kicom21·
Updated version. For all the $TSLA fanboys.
Kicom tweet media
English
20
4
238
12.3K
Tarabys
Tarabys@tarabys·
@Bitcoinvkapse 😂 ted jsem si v Perplexity Clauda oblíbil. Připadá mi o řád lepší než ostatní modely…
Čeština
0
0
4
208
Bitcoin v kapse
Bitcoin v kapse@Bitcoinvkapse·
Claude analyzuje log 😅
Bitcoin v kapse tweet media
Čeština
1
0
7
1.6K
Tarabys retweetledi
Bitrefill
Bitrefill@bitrefill·
March 1st incident report On March 1, 2026, Bitrefill was the target of a cyberattack. Based on indicators observed during the investigation - including the modus operandi, the malware used, on-chain tracing and reused IP + email addresses (!) - we find many similarities between this attack and past cyberattacks by the DPRK Lazarus / Bluenoroff group against other companies in the crypto industries. The initial access originated through a compromised employee laptop, from which a legacy credential was exfiltrated. That credential provided access to a snapshot containing production secrets. From there, the attackers were able to escalate their access to our broader infrastructure, including parts of our database and certain cryptocurrency wallets. We first detected the incident after noticing suspicious purchasing patterns with certain suppliers. We realized that our gift card stock and supply lines were being exploited. At the same time we found some of our hot wallets being drained and funds transferred to attacker-controlled wallets. The moment we identified the breach, we took all of our systems offline as part of our containment response. Bitrefill operates a global e-commerce business with dozens of suppliers, thousands of products, and multiple payment methods across many countries. Safely switching all these things off and bringing them back online is not trivial. Since the incident, our team has been working closely with top industry security researchers, incident response specialists, on-chain analysts and law enforcement to understand what happened and how we can prevent it from happening again. A sincere thank you to @zeroshadow_io, @SEAL_Org, @RecoverisTeam and @fearsoff for their rapid response and support throughout this ordeal. What about your data Based on our investigation and our logs we don’t have reason to think that customer data was the target of this breach. There is no evidence that they extracted our entire database, only that the attackers ran a limited number of queries consistent with probing to understand what there was to steal, including cryptocurrency and Bitrefill gift card inventory. Bitrefill was designed to store very little personal data. We are a store, not a crypto service provider. We don’t require mandatory KYC. When a customer chooses to verify their account - e.g. to access higher purchasing tiers or certain products - that data is kept exclusively with our external KYC provider, with no backups in our system. Still, based on database logs, we know that a subset of purchase records was accessed and we want to be transparent about that. Around 18,500 purchase records were accessed by the attackers. Those records contained limited customer information, such as email addresses, crypto payment address, and metadata including IP address. For approximately 1,000 purchases, specific products required customers to provide a name. That information is encrypted in our database. However, since the attackers may have gotten access to the encryption keys, we are treating this data as potentially accessed. Customers in this category have already been notified directly by email. At this time, based on the information currently available, we do not believe customers need to take specific action. As a precaution, we recommend remaining cautious of any unexpected communications related to Bitrefill or crypto. If this assessment changes, we will of course immediately inform those affected. What we are doing We have already significantly improved our cybersecurity practices, but vow to continue to draw learnings from this experience to make sure user and company balances and data remain maximally safe. Specifically we’re: -Continuing thorough cybersecurity reviews and pentests with multiple external experts and implementing recommendations; -Further tightening internal access controls; -Further improving logging and monitoring for faster detection and more effective response; and -Continuing to refine and test our incident response procedures and automated shutdown procedures. The bottom line Getting hit by a sophisticated attack sucks (a lot). We’ve been in business for over 10 years and it’s the first time we’ve been hit this hard. But we survived. Bitrefill was designed to limit the impact if something like this ever happened. Bitrefill remains well funded, has been profitable for several years and will absorb these losses from our operational capital. Almost everything is back to normal: payments, stock, accounts. Sales volumes are also back to normal, and we are eternally thankful to our customers for your continued confidence in us. We will continue to do our best to continue deserving your trust. Thank you!
English
115
145
980
174.7K
Tarabys
Tarabys@tarabys·
@Metateron3 @jednadvacetorg taky ne, Globus mám trochu z ruky. Ale jako obchod ho mám rád. A tohle mě vyloženě láká...😅
Čeština
0
0
0
34
Tarabys
Tarabys@tarabys·
Já tu @jednadvacetorg prostě žeru... . . Měly by být v Globusu... ;) . (foto: člen ostravské Jednadvacet)
Tarabys tweet media
Čeština
2
0
11
963
Tarabys
Tarabys@tarabys·
@Bitcoinvkapse myslím, že posměváčci se budou divit až uvidí prodeje. Já sice taky nejsem koncovka, ale možná jen "těsně". Myslím, že bych ho málokdy dokázal zadýchat... ;)
Čeština
0
0
2
412
Bitcoin v kapse
Bitcoin v kapse@Bitcoinvkapse·
Občas někomu přijde cool hejtit Apple, ale Macbook Neo je pro běžného uživatele super uživatelsky, cenově a i bezpečnostně. Koupit za stejné peníze nějaký čínský šunt s Windows nedává vůbec smysl👇
Sooraj@iAnonymous3000

From a security standpoint, this is the most interesting thing @Apple has done in years at this price point. The MacBook Neo runs the A18 Pro with a full Secure Enclave. Same tier as M series chips. Hardware isolated key storage, DPA protection, second gen Secure Storage Components, and FileVault encryption where the SSD is cryptographically bound to the device via a hardware UID that cannot be read by software. On macOS Tahoe - FileVault is enabled by default during setup. Every Neo ships encrypted out of the box. Apple Intelligence runs simpler tasks locally on the 16 core Neural Engine. More complex requests route to Private Cloud Compute - Apple's server infrastructure running on Apple Silicon with end to end encryption, cryptographic attestation, and NO data retention. The processing is ephemeral and independently auditable. Neither Copilot on Windows nor Gemini on ChromeOS offers anything comparable to this architecture. macOS Tahoe also introduces passkey portability -letting users securely export credentials to third party password managers. [And underneath all of this, macOS layers Gatekeeper, XProtect, and System Integrity Protection.] The base $599 model ships WITHOUT Touch ID. You need the $699 variant for biometric auth. Without it, users default to weaker passwords and longer screen timeouts. If you already own an Apple Watch, macOS lets you authenticate via your wrist, which largely neutralizes this gap. To be fair to the competition, Windows 11 Home now enables Device Encryption by default on modern hardware with TPM 2.0, so the encryption gap has narrowed. But budget PCs still ship with pre installed bloatware that expands the attack surface, and recovery keys are tied to a personal Microsoft account with no enterprise key management. Chromebooks ship with Google's Titan C2 security chip - which provides a hardware root of trust and verified boot. But Titan C2 does NOT match the Secure Enclave's breadth for encryption key management and biometric data isolation. One underrated advantage. Because the Neo uses a current generation chip -- it will receive macOS security patches for years. Budget Windows laptops frequently lose driver and OS support much sooner. The $699 MacBook Neo with Touch ID is the most secure budget laptop you can buy right now.

Čeština
12
1
77
13.8K
Tarabys
Tarabys@tarabys·
@chvajaa @jurbed ano, vynikající článek. Bohužel taky docela depresivní… 😢 Snad to ještě půjde zvrátit… 💪
Čeština
0
0
1
20
Adam Chvaja
Adam Chvaja@chvajaa·
@jurbed zasvěceně píše o tom, jak dva velcí hráči (Google a Apple) drží v kleštích celosvětový aplikační ekosystém. Naši svobodu udržuje při životě už jen to, dokud většina aplikací má i webovou verzi. Ta je zatím pořád volně dostupá. juraj.bednar.io/blog/2025/12/0…
Čeština
1
2
9
775
Tarabys
Tarabys@tarabys·
👀👇
Jednadvacet@jednadvacetorg

MEDOJEDÍCI TOUR 2026 !!! I letos přichází limitovaná edice MEDOJEDÍCI 2026 - sběratelská sada placek, kterou můžete ulovit jen na pěti vybraných akcích během roku. 📍 Začínáme už tuto sobotu v Žilině: 🔵 @CryptoVestibull – 14. 3. ⚪️ @CByte_Lbc – 16. 5. 🟠 @BTCPrague – 11. – 13. 6. 🟡 Otevřené sklepy Bavory – 29. 8. 🟣 @ChainCampCZ 11. – 12. 9. Každá placka je označená ročníkem 2026 a bude dostupná pouze na konkrétní akci v omezeném množství. 😎 Kolik jich letos nasbíráte? A kdo z vás uloví celou sadu Medojedíků 2026? 🦡

ART
0
0
3
361