Bitcoin P2P - How it was intended by Satoshi.
Fantastic event with @npub1yn3h...mzt0 @npub1llkv...ftee and @Jan Kotas
under the umbrella of @Bitcoin Paraguay . Great meetup
👇
Stallion
Stallion
npub187yg...4sdn
👉🌎Flag Theory|OPSEC|PLAN B https://www.hackinglives.com
👉Bitcoin community ▶︎ https://www.bitcoinparaguay.org & https://www.jednadvacet.org
👉 Projects ▶︎ https://linktr.ee/hackinglives
👉Don’t half ass it!
🇺🇸 Trump card visa is live.
Let’s see how this will play out in long term. 👀
The Trump Gold Card
The Trump Gold Card application
Argentina 🇦🇷 citizenship = Hotel California
I don’t make the rules. Just truth.
🚨How to exploit delivery acknowledgments (even without victim participation) for behavioral surveillance / profiling in WhatsApp and Signal.
Tip: Turn off messages from unknown sources.

CyberInsider
Tool allows stealthy tracking of Signal and WhatsApp users through delivery receipts
A new tool named Device Activity Tracker exposes a privacy flaw in WhatsApp and Signal that lets attackers covertly monitor user activity.
This article is an introduction to practical, real-world privacy and security, digital, physical, and social, without theatrics or over-engineering. Nothing here is exotic, advanced, or meant only for experts. The tools and approaches discussed are not overkill; they are a deliberate mix designed to preserve productivity while significantly improving how much of your life leaks into the open. Some of the services mentioned don’t just improve privacy, they also strengthen your overall security posture.
A key idea running through the article is that privacy and security are not the same thing. A system can be secure while offering very little privacy. Google is the textbook example: when configured correctly, it can protect your accounts quite well, yet your personal data remains the product. High security does not automatically mean high privacy. Understanding this distinction is foundational before making any meaningful changes.
Privacy is also not a binary choice. It exists on a spectrum. The more private you aim to be, the more trade-offs you’ll encounter, less convenience, more friction, and a higher need to understand what you’re doing. Total privacy quickly becomes impractical for everyday life. This article deliberately avoids that extreme. Instead, it focuses on reasonable steps that deliver clear benefits without turning daily life into a constant struggle.
The steps outlined are beginner-friendly. You don’t need deep technical knowledge, special hardware, or a radical lifestyle shift. With a small number of intentional changes and a handful of carefully chosen tools, you can dramatically reduce unnecessary data exposure, strengthen both your privacy and security. The goal is not perfection, but control, and keeping your life your own.
⚡Zap 9999 sats to unlock this note on

⚡Zap 9999 sats to unlock this note on

Fanfares
This article is an introduction to practical, real-world privacy and security...
9,999 sats - This article is an introduction to practical, real-world privacy and security, digital, physical, and social, without theatrics or ove...
🇦🇷 ARGENTINA CBI NEWS 🚨
1⃣ Milei’s government has launched a global tender for one firm to design Argentina’s entire new citizenship by investment program from scratch, including investment routes, amounts, due-diligence rules, and processing times.
2⃣ The program will be capped at 5,000 CBIs in the initial phase with 4 year contract. Firm selection will be based on technical quality and economic appeal. Submission deadline is by end of January for companies that want to sign up for tender.
3⃣ This could be the world’s only CBI fully designed by the private sector and then approved by the government. Let’s watch how it evolves.
4⃣ Expectation to start CBI might be end of 2026/beginning 2027. Program should be crafted by H2/2026.
To win, a firm must prove strong technical, financial, and operational capacity, present all required documents, and meet detailed milestones.
The selected firm becomes deeply responsible: full confidentiality, liability for damages, labor obligations, adequate insurance, strictly controlled subcontracting, and all IP created goes to the State.
Payments are made in USD (or pesos for local entities) after milestone verification, and the State may even revoke the contract early if the program underperforms.
Failure to meet key milestones triggers penalties and repeated failures allow the State to terminate the contract with no compensation.

