Good Morning #Nostr πŸ«‚πŸ’œβš‘ Society is like a fire: a wise man warms himself from a safe distance, while fools come too close, get burned, and later complain about the fire. image
Wallet, a third-party cryptocurrency wallet mini app on Telegram messenger, is undergoing significant changes, such as imposing stricter Know Your Customer (KYC) rules and changing its service provider. On May 29, Telegram's Wallet informed users about several updates to its KYC system, requiring additional personal information to conduct certain transactions. According to an update seen by Cointelegraph, Wallet users will have to disclose their name, phone number and date of birth to use all of the wallet's default features, except for withdrawals. β€œStarting June 3, all features except withdrawals will require updated account details,” Wallet’s announcement notes.
Cool
sp1qqwmxcltc2dwp6ncn8wem6my3urpt9g6nepl55agj5zxa6ktrz75twquwxegvzhjjgcjqc9w6uhaqxg92a8nqu4emagzpqt85w8heynq7dvrxl8zs
Finally deactivated Instagram & Facebook
There are now 48 public listed companies in US who collectively own 3,07,795 #Bitcoin.
GM #Nostr πŸ’œβš‘πŸ«‚ My assumption is nothing in life happens randomly; everything is interconnected. There is a world before and after our birth. Our every action is monitored by our collective unconscious and reflects back to us at the right time, even beyond our current life. This assumption makes me feel responsible and enthusiastic about life, regardless of the situation. Find your assumption which gives you a reason to live your life beautifully and joyfully.
From time to time we see news items about people's conversations being listened to when they are not using the phone. This is less of a threat on degoogled phones, but not a zero threat. We have recently seen a case where even the supposedly secure Signal app left a hot mic on in the receiving device even after ending the call. For these reasons I run the PilferShush Jammer app on all of my Android phones. It offers a choice of two methods to prevent your microphone from being used without your knowledge. The app description in the F-Droid store provides a good introduction to the kinds of things other apps may do to hijack your microphone. The passive option is to simply lock the microphone as "in use" when you are not using it yourself, such as on a phone call. The active method actually generates tones to jam the audio signal when you are not using it. I prefer not to use this method because it is not 100% certain that an eavesdropping party will not be able to detect your audio sources over the jamming background noise, and also because the active method uses battery where the passive method does not. I should also mention that there has been a lot of discussion about the fact that when your phone is off, it is not completely off. I have not seen any consensus as to what extent the microphone could be accessed on a powered off phone, so you might actually be more secure with the phone powered on and using PilferShush Jammer than when powered off. Also be sure to allow PilferShush Jammer to send notifications. That way you can see at a glance whether it is still running or not. Random events can cause it to shut off. I've personally seen OS updates do that as well, not always, but sometimes. The app also has a nice App Inspector feature that informs you what apps you have installed that could potentially take over your microphone. Here is a direct link to the app description at F-Droid, but of course, you would install it directly from your F-Droid app store or favorite alternative F-Droid client.
LAZYEGG Tool for extracting different data from web pages: - cookies - leaked credentials - domains - ips - images - links and more.
Maturity is when you realize there is something beyond what you can not comprehend with your mind, which can only be felt by the heart and not be spoken into words but heard in silence.