I know what you download https://iknowwhatyoudownload.com/en/peer/ Torrent downloads and distributions for any IP address.
The Perfect Router Does Not Exiโ€” - YouTube This build redefines what a router can be. Haven is an open-source, portable Wi-Fi HaLow mesh router that runs on a Raspberry Pi 4, capable of linking devices over kilometers without internet or subscriptions. It uses the same sub-GHz spectrum as LoRa and Meshtastic but supports full IP networking โ€” meaning all your regular apps just work. Built entirely from open hardware and open firmware, Haven runs 802.11s + BATMAN for self-healing, peer-to-peer communication you truly own.
EVERYTHING Is Backdoored. By Default. - YouTube
Why does nobody believe the theft of 215 bitcoins from Luke Dashjr? > Luke Dashjr, one of Bitcoin's leading developers, has been making headlines lately after having 215 bitcoins stolen. Dashjr explained that a hacker gained access to his server, his Pretty Good Privacy (PGP) system, his wallet, and his bitcoins. It's unbelievable that one of the people who has contributed the most to the cybersecurity of the Bitcoin protocol could have been hacked so easily and lost such a large sum of money.
DEF CON 33 - Stories from a Tor dev - Roger 'arma' Dingledine - YouTube > What is it actually like to support and balance a global anonymity network, with users ranging from political dissidents to national security analysts? You say it's important to teach law enforcement and governments about privacy and end-to-end encryption, but how do those conversations go in practice? I heard you accidentally got Russia to block all of Azure for a day? Are you ever going to do a Tor talk in China? Wait, who exactly tried to bribe you to leave bugs in Tor to support their criminal schemes? > Historically I've tried to downplay some of the excitement from operating the Tor network and teaching the world about Tor, but this year I'm going to try my hand at the "war stories" track.
AI trading in real markets (Leaderboard) https://nof1.ai/
DEF CON 33 - Kill List: Hacking an Assassination Site on the Dark Web - YouTube Four years ago, Chris found a vulnerability with a murder for hire site on the dark net. He could exploit that vulnerability to intercept the murder orders that were being placed: names, addresses, pattern of life information, photos, and, in some cases, bitcoin payments. He reached out to Carl for help, and a small team was built in secret to intercept and triage these orders. However, after their warnings to the police fell on deaf ears, they ultimately decided to warn the targets on the kill list directly. After an initial series of successes, the investigation expanded rapidly and they formed a global cooperation with the FBI and police forces around the world, resulting over 175 murder orders being disclosed, 34 arrests 28 convictions and over 180 years of prison time being sentenced. This talk will be about those years: about the dangers and threats the team had to navigate, the times of isolation when the police wouldnโ€™t take them seriously, about raids in Romania to uncover the cyber-criminal gang running the site and the psychological impact of racing against time to try to stop people getting murdered.
Python 3.14 Is Here. How Fast Is It?
Primexz/lndnotify: โšก๏ธ LND Lightning Notification Client A notification system for Lightning Network nodes that monitors and notifies about important events. This project is heavily inspired by balanceofsatoshis, but with the aim of offering much greater customisation and a wider range of notification destinations.
PEP 810 โ€“ Explicit lazy imports This PEP introduces syntax for lazy imports as an explicit language feature: ```python lazy import json lazy from json import dumps ``` Lazy imports defer the loading and execution of a module until the first time the imported name is used, in contrast to โ€˜normalโ€™ imports, which eagerly load and execute a module at the point of the import statement. By allowing developers to mark individual imports as lazy with explicit syntax, Python programs can reduce startup time, memory usage, and unnecessary work. This is particularly beneficial for command-line tools, test suites, and applications with large dependency graphs. This proposal preserves full backwards compatibility: normal import statements remain unchanged, and lazy imports are enabled only where explicitly requested.