Polycarp Nakamoto priv/acc

4.6K posts

Polycarp Nakamoto priv/acc banner
Polycarp Nakamoto priv/acc

Polycarp Nakamoto priv/acc

@polycarpweb5

#Web5 is more open and decentralized. Where you own the hardware, software and data, with no user agreements or contracts. It is a layer 3 built on #bitcoin.

شامل ہوئے Nisan 2022
2.9K فالونگ1.8K فالوورز
Polycarp Nakamoto priv/acc ری ٹویٹ کیا
International Cyber Digest
International Cyber Digest@IntCyberDigest·
‼️🚨 The official JDownloader website was breached, attackers swapped the Windows and Linux installers with malware for over a day before anyone noticed. JDownloader is a popular download manager with millions of users on Windows, macOS, and Linux. Timeline: ▪️ May 5, 23:55 UTC: attacker tests the method on a dummy page. ▪️ May 6, 00:01 UTC: real attack goes live. Alternative download links for Windows and Linux are replaced with malicious installers. ▪️ May 7: a Reddit user notices Windows SmartScreen flagging the installer with a strange publisher ("Zipline LLC", "The Water Team", "Peace Team") instead of "AppWork GmbH". ▪️ Hours later, the JDownloader dev team confirms the breach and takes the site offline. How they got in: an unpatched vulnerability let attackers modify the website's access control list (ACL), give themselves edit rights, and swap the download links. No further details on the bug have been shared. What's compromised: ▪️ Windows installer (alternative download links). ▪️ Linux shell installer (alternative download links). What's safe: ▪️ macOS installers (still validly signed). ▪️ The core JDownloader.jar file. ▪️ Flatpak, Winget, and Snap packages (separate infra, sha256 checksums unchanged). ▪️ In-app auto-updates (separate servers, end-to-end signed). If you downloaded JDownloader from the website between May 6 and May 7, treat your machine as compromised. This is the third trusted-software website breach in recent weeks, after Daemon Tools and CPU-Z / HWMonitor.
International Cyber Digest tweet mediaInternational Cyber Digest tweet media
English
24
205
844
69.2K
Polycarp Nakamoto priv/acc
@pastorcoin Centralization literally made God show up. Its happening again with Web5. The internet is the new tower of babel. One language of 1s and 0s to enslave all.
English
0
0
1
129
Polycarp Nakamoto priv/acc ری ٹویٹ کیا
Wall Street Apes
Wall Street Apes@WallStreetApes·
American bought a brand new printer. She bought the ink for the printer, she bought the paper for the printer, now she’s at home and is ready to print She can’t print “They remotely shut off my printer until I paid $7.50 cents to print in my own home, to print on my printer, that I own in my home” This is the new $7.50 subscription plan by HP Printers Here’s how the plans work HP’s Instant Ink and newer All-in Plan programs are subscription services options: - You pay a monthly fee based on pages printed (not ink used). - Plans start low, from $1.79–$7.99 per month for 10–100 pages - $7–$8 per month plans are for around 100 pages If your payment fails. HP will remotely shutoff your printer
English
6.7K
14.9K
45.5K
4M
Polycarp Nakamoto priv/acc ری ٹویٹ کیا
TheSoloMiningCo (I Am GPIO)
TheSoloMiningCo (I Am GPIO)@TheSoloMiningCo·
🚨 GIVEAWAY 🚨 We’re giving away a BitForge Nano Ghost Edition — a home-worthy Bitcoin miner designed to be seen, not hidden in a shed. To enter: Follow @TheSoloMiningCo Repost this post Reply with where you’d put it and why. Winner announced 1st June 2026 The Solo Mining Co: Your Rigs, Your Rewards. ⚡
TheSoloMiningCo (I Am GPIO) tweet media
English
715
739
797
37.6K
Polycarp Nakamoto priv/acc ری ٹویٹ کیا
nicktee
nicktee@nickteecee·
1984
International Cyber Digest@IntCyberDigest

‼️🇺🇸 Utah is about to become the first US state to legally target VPN use as part of online age verification. The law goes into effect Wednesday, May 6, 2026. 🔴 If you are physically located in Utah, you count as a Utah user, regardless of whether you use a VPN, proxy, or any other tool to disguise your location. Websites are now legally responsible for age-verifying you anyway. 🔴 Sites that handle "material harmful to minors" are banned from sharing instructions on how to use a VPN, or from offering any means to bypass geofencing. The EFF calls this a "liability trap." Websites cannot reliably tell where a VPN user actually is, so the safest legal move is either to block every known VPN IP outright, or to force ID-based age verification on every visitor worldwide. Either path subjects millions of users to invasive identity checks, regardless of where they actually live. The Cato Institute put it bluntly. When a policy can be defeated by a privacy tool millions of people legitimately use, the policy is the problem. The collateral damage is, as always, the people who actually need VPNs: 🔴 Journalists protecting sources 🔴 Domestic abuse survivors hiding from stalkers 🔴 Activists in hostile environments 🔴 Remote workers tunneling into corporate networks 🔴 Travelers banking from abroad 🔴 Anyone who simply does not want their ISP, employer, or data brokers reading their traffic This is not staying in Utah. The UK's Children's Commissioner has called VPNs a "loophole that needs closing." France's Minister Delegate for AI and Digital Affairs has named VPNs as "the next topic on my list." The EU is rolling out age verification across all 27 member states by end of 2026, with EVP Henna Virkkunen openly admitting they have no plan for VPN bypass yet. Utah is leading by example. EFF: "Attacks on VPNs are, at their core, attacks on the tools that enable digital privacy."

QST
0
1
1
146
Polycarp Nakamoto priv/acc ری ٹویٹ کیا
Bearly AI
Bearly AI@bearlyai·
The Son of Anton scene will almost certainly be the most referenced Silicon Valley scene in age of AI: “It’s possible that…the most efficient way to get rid of all the bugs, was to get rid of all the software.”
Insider Paper@TheInsiderPaper

NEW: Claude-powered AI coding agent deletes entire company database in 9 seconds — backups zapped, after Cursor tool powered by Anthropic's Claude goes rogue — Tom's Hardware

English
49
1K
13.5K
1.6M
Polycarp Nakamoto priv/acc ری ٹویٹ کیا
TheChatMan
TheChatMan@The_ChatMan·
Localized compute will be the new buzz word after Ai. Well, at least it should be...
Nav Toor@heynavtoor

Your smart home is not yours. Amazon hired thousands of contractors to listen to Echo recordings from people's living rooms. Bloomberg broke the story. Amazon never asked. Ring handed doorbell footage to police 11 times in a single year without a warrant and without telling the owner. In March 2025, Amazon killed local voice processing on Echo. Every word you say to Alexa now goes to Amazon's cloud. By default. Forever. Your Samsung TV watches what you watch. Your Roomba maps every room. Your thermostat knows when you leave home. And now they want you to pay for it. Alexa+: $19.99/month. Ring Protect Plus: $20/month. Nest Aware Plus: $20/month, up 33% in 2025. You pay them to spy on you. Monthly. Forever. In 2022, Insteon shut down without warning. Lights, switches, thermostats, all bricked overnight. Ten years of hardware, dead. There is one app that controls every smart device on the planet. Locally. On your hardware. Without a single byte sent to Amazon, Google, or Ring. It is called Home Assistant. 86,200+ stars on GitHub. 2,000+ built-in integrations. Lights, locks, cameras, thermostats, vacuums, blinds, EV chargers, solar inverters, doorbells, sprinklers. If a smart device exists, Home Assistant probably controls it. Here's what it does: → Works with Alexa, Google Home, Apple HomeKit, SmartThings, Matter, Thread, Zigbee, Z-Wave. → Voice control with your own local assistant. Wake word detection on your own hardware. Nothing sent to any cloud. → Build automations in 30 seconds. "When I leave home, lock the doors and turn off the lights." → Real-time energy dashboard. Spot the vampire devices. → Local AI cameras. Detect people, cars, animals. Footage stays on your drive. → Custom dashboards on any phone, tablet, or wall display. Here's the wildest part: When AWS goes down, Alexa stops working. When Google has an outage, Nest cameras go dark. When Ring servers throttle, your doorbell freezes. Home Assistant runs on your hardware. The internet can be down. Your house still listens. Your lights still respond. Your locks still work. The day Insteon shut down, Home Assistant users kept their lights on. Owned by the Open Home Foundation. A Swiss non-profit. It cannot be sold. It cannot go subscription. It cannot paywall a feature. Ever. Alexa+ + Ring + Nest: $720/year in subscriptions. Home Assistant: $0. Forever. Every integration. Every automation. Every device. Runs on a $50 Raspberry Pi. Runs on an old laptop. Runs in Docker on your NAS. The Home Assistant Green box is $99 once and never charges again. 86,200+ stars. 37,300+ forks. 425+ contributors. Apache-2.0 license. Active since 2013. Your home. Your data. Your rules. 100% Open Source. (Link in the comments)

English
0
1
1
107
Polycarp Nakamoto priv/acc ری ٹویٹ کیا
The ₿itcoin Artist
The ₿itcoin Artist@worshipbitcoin·
Node runners have never mattered more.
The ₿itcoin Artist tweet media
English
9
42
245
4.8K
Polycarp Nakamoto priv/acc ری ٹویٹ کیا
CR1337
CR1337@CR1337·
CR1337 tweet media
ZXX
18
452
1.6K
18.2K
Polycarp Nakamoto priv/acc ری ٹویٹ کیا
MetaLawMan
MetaLawMan@MetaLawMan·
Warning: AI is NOT your Lawyer Your chats with AI are (probably) subject to discovery in civil & criminal cases. According to a federal judge in New York, you don’t have attorney-client privilege or work product protection for your chats with AI tools. Lesson: Don’t type or say anything to AI that you wouldn’t be comfortable seeing used against you in court. Details.👇
Bill Hughes 🦊@BillHughesDC

Judge Rakoff of the SDNY in US v. Heppner just warned everyone from vibe lawyering because anything they vibe lawyer can be discoverable, whereas actually consulting with a lawyer is generally protected from disclosure. Bradley Heppner was charged with securities fraud, wire fraud, conspiracy, false statements to auditors, and falsifying corporate records, all tied to an alleged scheme to defraud investors to the tune of more than $150 million. After Heppner’s arrest, the FBI seized devices and documents, including about thirty one documents memorializing his exchanges with @AnthropicAI @claudeai . The question before the court was whether those @claudeai communications were shielded from Government review by attorney client privilege or the work product doctrine. The court treated the case as a question of first impression about public AI tools in criminal investigations, but said ordinary privilege rules still controlled and required disclosure here. J. Rakoff held that they were not. Heppner’s Claude chats were discoverable because Claude was not his lawyer, the communications were not confidential, they were not made to obtain legal advice from counsel, and they were not prepared by or at the direction of counsel so as to qualify as work product. The attorney client privilege did not apply because the Claude exchanges lacked at least two, and likely all three, of the doctrine’s basic elements. First, they were not communications between client and attorney. Claude was not a lawyer, and the court rejected the idea that a public AI platform should be treated like ordinary neutral software in a way that would preserve privilege, emphasizing that recognized privileges rest on protected human relationships involving fiduciary duties and professional discipline. Second, the court found the communications were not confidential. Anthropic’s privacy policy says Anthropic collected user inputs and outputs, could use them to train Claude, and could disclose data to third parties, including regulators and parties involved in claims or litigation. Heppner could not reasonably expect confidentiality. Third, the court found that Heppner was not communicating with Claude to obtain legal advice in the legally relevant sense - i.e. in order to facilitate discussions with his actual lawyers. Because Heppner used Claude on his own, the key question was whether he sought legal advice from Claude itself, not whether he later intended to discuss the subject with lawyers. Claude expressly disclaimed that it was a lawyer (because obviously its not a lawyer) and said it could not provide formal legal advice (because, again, its obviously not a lawyer), which reinforced the court’s conclusion that the communications were not privileged when made. Moreover, sharing the Claude materials with defense counsel did not change their status. Nonprivileged communications do not become privileged simply because they are later transferred to a lawyer - this is nothing new. The work product claim failed for similar reasons. These documents were not prepared by counsel or at counsel’s direction. Defense counsel had admitted that Heppner created them on his own. The court also found that, although the documents may later have affected defense strategy, they did not reflect counsel’s strategy at the time they were created. That was enough for the court to conclude they were not protected work product. In short, this case covered a novel area but predictably applied very old, ordinary rules when concluding that Heppner’s use of Claude satisfied neither attorney client privilege nor work product protection, so the Government was entitled to inspect the documents.

English
9
7
47
10.9K
Polycarp Nakamoto priv/acc ری ٹویٹ کیا
Preston Byrne
Preston Byrne@prestonjbyrne·
Option A: censor the Internet for all adults Option B: censor no-one, and adults who want their kids not to access this stuff give them this phone
Preston Byrne tweet media
LBC@LBC

"It's an absolute joke." Tory MP @LauraTrottMP demands a ban on social media for under 16s to protect children from 'the nastiest bits of the internet'.

English
97
847
5.5K
95.8K
Polycarp Nakamoto priv/acc ری ٹویٹ کیا
Unstoppable | Private Wallet
Unstoppable | Private Wallet@unstoppablebyhs·
PLAY STUPID : The next wave of crypto security will look “stupid” Everyone is chasing perfect security setup. Faraday cages, hardware wallets, cold storage... - that’s not where the real threat is. At Unstoppable, we’ve always focused on practical security. - Open source - Clean engineering - Adherence to standards However today’s biggest risks don’t break your code. Instead, they’re engineered to break or trick you. - Wrench attacks - Social engineering - Address phishing None of that cares how clean your codebase is. That’s why the next frontier isn’t more math. It’s obscurity! Blending in. Not looking like a target. Not even looking like a crypto user. That’s where things are going. And it’s already shaping how we build: → duress mode → random app icons → phishing protection These aren’t “nice to have” features. They’re responses to how attacks actually happen. The shift is already in progress.
Documenting ₿itcoin 📄@DocumentingBTC

This new open-source bitcoin wallet called ‘Cryobrick’, invented by a team of developers in India, can be hidden on old cellphones and disguised as any app.

English
1
4
38
2.9K
Polycarp Nakamoto priv/acc ری ٹویٹ کیا
Reclaim The Net
Reclaim The Net@ReclaimTheNetHQ·
These days, every internet-connected device you own can be bricked by the company that made it. Amazon is killing working Kindles on May 20. Google did it to Nest thermostats. Sonos did it to speakers. The hardware works fine. They just stop giving it permission to function.
Reclaim The Net@ReclaimTheNetHQ

Your Old Kindle Still Works Perfectly. Amazon Is Killing It Anyway reclaimthenet.org/your-old-kindl…

English
46
613
1.8K
32.8K
Polycarp Nakamoto priv/acc ری ٹویٹ کیا
Liquidity Goblin
Liquidity Goblin@liquiditygoblin·
firmly believe signal is a long running NSA honeypot wdym your privacy driven app necessitates having a phone number? it’s not optional? all the messages route through American data centres????
Liquidity Goblin tweet media
English
92
48
867
52.5K
Polycarp Nakamoto priv/acc ری ٹویٹ کیا
Elizabeth Holmes
Elizabeth Holmes@ElizabethHolmes·
Delete your search history, delete your bookmarks, delete your reddit, medical records, 12 yr old tumblr, delete everything. Every photo on the cloud, every message on every platform. None of it is safe. It will all become public in the next year Local storage and compute 📈
Mckay Wrigley@mckaywrigley

society needs to grapple with the reality of a mythos-level model being open source in <12 months. i’m not sure we are prepared.

English
653
1.2K
12.4K
8M
Polycarp Nakamoto priv/acc ری ٹویٹ کیا
Bitshala
Bitshala@bitshala_org·
No internet? No problem. Bala just dropped the ultimate cypherpunk demo at the BOSS Summit: From Off-Grid to On-Chain He literally broadcasted a live Bitcoin transaction using Mesh Radio. No ISPs, no Wi-Fi, no cellular data. Just pure radio waves bypassing the traditional internet layer to hit the mempool. When we say we are building unconfiscatable money for uncertain times, this is exactly what we mean. Mind blown. Here is the repo used to connect meshtastic to bitcoin core:github.com/BTCtoolshed/Me…
Bitshala tweet mediaBitshala tweet media
English
181
1K
4.6K
244.3K