Posts by 4eb88310d6b4ed95c6d66a395b3d3cf559b85faec8f7691dafd405a92e055d6d@mostr.pub
(DIR) Post #AohDEJlVu9MPk290i0 by 4eb88310d6b4ed95c6d66a395b3d3cf559b85faec8f7691dafd405a92e055d6d@mostr.pub
2024-12-04T07:39:47.000Z
0 likes, 0 repeats
Yes, and all the other holidays celebrated as well in a gesture of unity, as in India.
(DIR) Post #AohDELax6O6JPrDbWa by 4eb88310d6b4ed95c6d66a395b3d3cf559b85faec8f7691dafd405a92e055d6d@mostr.pub
2024-12-04T08:05:28.000Z
0 likes, 0 repeats
India celebrates Diwali and Christmas. It's a beautiful thing.
(DIR) Post #Aol7KscPPbzcTuTHJg by 4eb88310d6b4ed95c6d66a395b3d3cf559b85faec8f7691dafd405a92e055d6d@mostr.pub
2024-12-06T04:44:06.000Z
0 likes, 0 repeats
Gn TD
(DIR) Post #ApE3FQJkDV7WgJusd6 by 4eb88310d6b4ed95c6d66a395b3d3cf559b85faec8f7691dafd405a92e055d6d@mostr.pub
2024-12-20T01:52:26.000Z
0 likes, 0 repeats
Sepultura - Ratamahatta 🔊💜https://file.nostrmedia.com/p/4eb88310d6b4ed95c6d66a395b3d3cf559b85faec8f7691dafd405a92e055d6d/56db4ed055894443555d1b5b9958d0dafabc2429eee33f7f7ca23e84b956d0af.mp4YT https://youtu.be/NiwqRSCWw2g#Sepultura #Music
(DIR) Post #AqWN3PuiDfP1HvxPcG by 4eb88310d6b4ed95c6d66a395b3d3cf559b85faec8f7691dafd405a92e055d6d@mostr.pub
2025-01-27T22:19:42.000Z
0 likes, 0 repeats
Jai Uttal - Nataraj 🔊💜https://file.nostrmedia.com/p/4eb88310d6b4ed95c6d66a395b3d3cf559b85faec8f7691dafd405a92e055d6d/be56b4e61c8f92e9e5d9b5133e046f0967aa1173f4f9e3cb60ffc74d30a15328.mp4Sanskrit:नटराज् नटराज जय शिव शंकर नटराजशिवराज् शिवराज शम्भो शंकर शिवराजTransliteration:Naṭarāj Naṭarāja Jaya Śiva Śaṅkara NaṭarājaŚivarāj Śivarāja Śambho Śaṅkara ŚivarājaThis is an epithet of Shiva, referring to his "tandava," his ferocious dance of fury which causes the entire world to crumble into dust. This is the auspicious and sometimes frightening clearing away of the old, leaving way for the creation of the new.Shankara = an epithet of Shiva, meaning the "annihilator."Shambho = an epithet of Shiva.Approximate translation:Lord of the dance, Lord of the dance, glory to Shiva, glory to the annihilator, the Lord of the dance, lord Shiva, lord Shiva, Shambhu, Shankara. Lord Shiva please perform your Tandava dance of annihilation upon the demons of ignorance and ego within me! Please grant me liberation.YThttps://youtu.be/sZTU5SXo7Ic#IKITAO #JaiUttal #Bhakti #Shiva #Kirtan #Music
(DIR) Post #AqdBx79FKzZzxeGcXA by 4eb88310d6b4ed95c6d66a395b3d3cf559b85faec8f7691dafd405a92e055d6d@mostr.pub
2025-01-25T23:37:59.000Z
0 likes, 0 repeats
Yes. I'm in Bitcoin for the original cypherpunk ethos (personal freedom, privacy, and decentralization) outlined in the white paper—which is why I also use Monero. There is a large sell-out, highly-regulated price to pay for government adoption and "money go up." If Bitcoin is not used as a currency, and only as an historically well-performing, highly-volatile asset/commodity, it will still likely be a good investment, but it will have been neutered as a global cryptoCURRENCY, and have failed in its original vision.Snowden has been warning the Bitcoin devs for years to bake in privacy on the protocol level, and the clock is ticking. Cash can be used privately. Everything will be tracked when we go full digital on a public blockchain. When AI is put to the task of on-chain analysis, all the hoops Bitcoiners have been jumping through for years to try and use Bitcoin privately will have been of little use.There is a reason Bitcoin is being co-opted by the powers that be, while Monero is being delisted from the CEXs.
(DIR) Post #AqdBx8aZyr2OQi3xmC by 4eb88310d6b4ed95c6d66a395b3d3cf559b85faec8f7691dafd405a92e055d6d@mostr.pub
2025-01-27T20:30:56.000Z
1 likes, 0 repeats
Given your infosec background, I'm sure what I am about to say is nothing new for you, so I am mostly speaking to "the room" here.Yes, Lightning offers better privacy than Bitcoin when set up properly, but it also has a more complex system, equating to a larger attack surface. LN's privacy features are not automatic; users must understand and manage their privacy settings actively, which can lead to unintentional exposure of transaction details.A fundamental privacy weakness persists in the asymmetric nature of Lightning transactions—the sender learns extensive details about the receiver's node, channels, and liquidity, while the receiver learns nothing about the sender. Plus, there's the persistent hassle of maintaining channel liquidity.Even with proper setup, Lightning faces critical privacy vulnerabilities against global adversaries who can monitor network traffic—while individual participants can't see payment details, entities capable of monitoring internet connections can track payment flows by observing message patterns between nodes, making its privacy guarantees fundamentally weak against sophisticated surveillance.Lightning falls well short of the anonymity provided by Monero with its stealth addresses, ring signatures, and RingCT—and soon, Full-chain Membership Proofs (FCMPs) will fix current vulnerabilities like the Exchange Attack Everywhere (EAE) attack. With FCMPs, every input will have a 100-million anonymity set, up from the current 16 Ring Signatures.Where privacy is a concern, I still recommend Monero over Lightning for most people, as Monero's privacy features are built-in on the base layer and work by default.
(DIR) Post #ArS8THQb8T3AkIsWeW by 4eb88310d6b4ed95c6d66a395b3d3cf559b85faec8f7691dafd405a92e055d6d@mostr.pub
2025-02-24T03:56:22.000Z
0 likes, 0 repeats
Every time I see the "alpha" power pose:https://file.nostrmedia.com/p/4eb88310d6b4ed95c6d66a395b3d3cf559b85faec8f7691dafd405a92e055d6d/6dc5baa386c8c66f8b9d06cc6e2bc992a4c69077aca2abf93dc215a0b7d0cf91.jpg
(DIR) Post #AsMuUCdZ4iNyXg0fgm by 4eb88310d6b4ed95c6d66a395b3d3cf559b85faec8f7691dafd405a92e055d6d@mostr.pub
2025-03-24T03:25:26.000Z
0 likes, 0 repeats
Prepping my old Pixel 6 Pro for selling, so I needed to remove GrapheneOS and re-flash it with Google Android OS (getting my data off Graphene was an unnecessarily cumbersome chore, but that's a story for another time).I spent two days messing around trying to get flash.android.com to work on Linux, and nothing worked. Every time it rebooted into fastboot, it would disconnect.I tried to do it in a VM running Windows, then from a live OS, and got nothing but connection errors.Finally, I just used android-tools and downloaded the OS from Google's dev page and flashed it through the terminal with only a few commands.I should have done this to begin with—so much wasted time trying to get the browser flasher to work.Flashing via terminal literally took 3 minutes.Oh well. It was a learning experience. Hopefully this will help out other Linux users who find themselves in the same boat.#IKITAO #Tech
(DIR) Post #AsQP3ELGJCPu41wmnY by 4eb88310d6b4ed95c6d66a395b3d3cf559b85faec8f7691dafd405a92e055d6d@mostr.pub
2025-03-25T20:57:34.000Z
0 likes, 0 repeats
Know your threat model and act accordinglyThe more privacy you want/need, and in which areas, will determine how far down the rabbit hole you need to go. Not everyone has to act like Edward Snowden when he was on the lam with gov secrets. Even he says he's not as hardcore as he used to be because he's in a different place in his life.If you try to be the most hardcore in areas where it's not really necessary or needed, it is not only an unnecessary burden of time and convenience, but it is common for people to burn out.Do you know the difference between privacy, security, and anonymity?Here is an excellent short introductory video from Henry at TechLore to help you better understand threat models, the difference between privacy, security, and anonymity, how they impact time and convenience, and hopefully help you to identify yours.https://file.nostrmedia.com/p/4eb88310d6b4ed95c6d66a395b3d3cf559b85faec8f7691dafd405a92e055d6d/6fc69ad67dac731d4f03541a100c54fe291692ca6333478c70ea798095a990f6.mp4YT https://youtu.be/DHZRhboZhfIHere is the full free version of the course. It's a few years old and so are some of the app/service recommendations. There are also some sections I would recommend going about differently, but overall the basics are solid and it will help you identify areas of import and make better informed decisions based on your unique threat model.I highly recommend checking it out for a deeper dive into the basics of good OPSEC practice.Go Incognito: A Guide to Security, Privacy & Anonymity | Front to Backhttps://youtu.be/Y19RFmOxfVM#IKITAO #Privacy #Tech
(DIR) Post #AuNMVeOQcMho3V4kBk by 4eb88310d6b4ed95c6d66a395b3d3cf559b85faec8f7691dafd405a92e055d6d@mostr.pub
2025-05-23T04:54:32.000Z
0 likes, 0 repeats
Calling out Dave Ramsey
(DIR) Post #AuNMVgHla6Z5vPyS5A by 4eb88310d6b4ed95c6d66a395b3d3cf559b85faec8f7691dafd405a92e055d6d@mostr.pub
2025-05-23T05:09:08.000Z
0 likes, 0 repeats
No doubt. He's old-school on it. He sees the value, but it's not his thing. I respect it.
(DIR) Post #Ax3otp1KWcANu7bcUS by 4eb88310d6b4ed95c6d66a395b3d3cf559b85faec8f7691dafd405a92e055d6d@mostr.pub
2025-08-11T12:39:17.000Z
1 likes, 0 repeats
Glue traps are a horrific invention that causes immense suffering to animals who are just trying to survive. There are humane methods to manage situations with unwanted animal visitors without harming them. Our convenience should never come at the cost of putting intelligent, feeling creatures through monstrously cruel torture and death.Discover compassionate solutions:👉 TAKE ACTION Against Glue Traps! drove.com/.2IsIhttps://file.nostrmedia.com/p/4eb88310d6b4ed95c6d66a395b3d3cf559b85faec8f7691dafd405a92e055d6d/2a824a4d7a6a07ccdc4c4b67f04a4125c4c19094b6de653353a9e593ce205bd7.jpg#gluetraps #rats #animalrights #ratlover #bekindtoanimals
(DIR) Post #AyslB87rFcXclwbpuC by 4eb88310d6b4ed95c6d66a395b3d3cf559b85faec8f7691dafd405a92e055d6d@mostr.pub
2025-10-01T02:55:56.000Z
0 likes, 0 repeats
The snake was the one in the garden of Eden who told the truth. Sit with that for a minute. Interesting, isn't it? The serpent was right. They didn't die, and their eyes were opened. Knowing oneself in one's own experience... life in the Realm of the Relative would not have existed otherwise.
(DIR) Post #B2E9WJ39YumelGa9K4 by 4eb88310d6b4ed95c6d66a395b3d3cf559b85faec8f7691dafd405a92e055d6d@mostr.pub
2026-01-12T22:02:18.000Z
0 likes, 0 repeats
Pokémon Go is fundamentally hostile to privacy. It's a real-time location game built on movement data. There's no configuration that makes it "safe." If that's a hard line, the answer is simply no.If someone still chooses to play, the only defensible approach is containment. Threat model matters here. If your primary phone is your public-facing presence and your threat model allows for that, Pokémon Go can live there. The principle is isolation and compartmentalization. You can have a surface-level digital presence that looks unremarkable while keeping anything that actually matters in completely separate, hardened environments.For most people, that means a secondary device or at minimum a separate Android user profile with actual OS-level isolation. If you're on GrapheneOS, use a dedicated profile with contact and storage scopes disabled. The profile gets a burner Google account solely for Play Store access, completely disconnected from your real identity. No personal data crosses that boundary.But if your primary device is already your public persona and you keep sensitive work isolated elsewhere, then Pokémon Go just becomes part of that calculated exposure. The issue isn't that it exists in your life. It's whether it touches anything you actually need to protect.Permissions stay locked to location only while the app is open. VPNs don't meaningfully help. Niantic already has the signal it cares about, and VPN use often just degrades gameplay or flags the account. DNS filtering can reduce some analytics noise, but it doesn't change the core surveillance model.The real exposure isn't a single GPS point. It's correlation. Regular play near home, consistent schedules, repeated routes, and cross-account identifiers are what turn game data into behavioral profiles. That's where most people leak far more than they realize. And even with perfect device hygiene, if you're coordinating raids or playing with people who know you IRL, friend lists and social gameplay become correlation points. Solo play reduces this; group coordination amplifies it.If you just miss the AR collection and walking gameplay loop rather than Pokémon specifically, there are alternatives worth considering, though most location-based games have similar issues. Single-player options or geocaching apps can sometimes be locked down more effectively.Treated as an occasional, deliberately isolated activity with clear boundaries, Pokémon Go can be a conscious tradeoff. Treated as a casual app on a daily-driver phone that also handles sensitive communications or operational security, it's incompatible with any serious privacy or threat-model awareness.
(DIR) Post #B2E9WKEBBPCKPkkT9E by 4eb88310d6b4ed95c6d66a395b3d3cf559b85faec8f7691dafd405a92e055d6d@mostr.pub
2026-01-12T22:23:07.000Z
1 likes, 0 repeats
That said, there is the reality of radio signals.Even with perfect app isolation, a smartphone is still a radio device. It continuously negotiates with cell towers, and those signals alone allow coarse location and movement inference via triangulation. No phone number is required for this—an active cellular modem is enough.Cell tower data sits with carriers, and accessing it typically requires law enforcement involvement—warrants, subpoenas, or lawful requests depending on jurisdiction. That's a different threat model than app-level surveillance, which operates without legal process. But the data exists, and it's accessible to anyone with the legal authority to obtain it.Wi-Fi and Bluetooth expand that surface further. Probe requests, MAC behavior, and proximity signals can be used to infer presence and movement relative to known access points or other devices, even when not actively connected. Modern OS randomization helps, but it doesn't eliminate correlation, especially over time.A dedicated device without a SIM reduces exposure, but it doesn't make the device invisible. A cellular-capable phone still participates in radio ecosystems unless radios are disabled entirely. Airplane mode with selective re-enablement, Wi-Fi-only play, or a data-only SIM with no voice number can reduce linkage, but none of these defeat physics.The takeaway is the same principle as before: this isn’t about achieving invisibility. It’s about bounding risk—using isolation and compartmentalization to limit how radio-derived location signals can be tied back to you and what else they can touch.For higher-sensitivity threat models, that can even include keeping the device powered off in a Faraday bag and only removing and turning it on once you’re already in a location that’s acceptable for exposure. It doesn’t defeat physics, but it prevents transitional movement data from ever being generated.
(DIR) Post #B2EAa3GuGbfmwGMgeO by 4eb88310d6b4ed95c6d66a395b3d3cf559b85faec8f7691dafd405a92e055d6d@mostr.pub
2025-10-27T02:03:00.000Z
1 likes, 0 repeats
The Four Rules of Gun Safety:1. Treat every weapon as if it is loaded.2. Never point a gun at anything you are not willing to destroy.3. Keep your finger off the trigger until you are ready to fire.4. Know your target and what is beyond it.#IKITAO #GunSafety
(DIR) Post #B2IKbQM5hj0czjvGim by 4eb88310d6b4ed95c6d66a395b3d3cf559b85faec8f7691dafd405a92e055d6d@mostr.pub
2026-01-15T01:20:02.000Z
1 likes, 0 repeats
You guys post memes. I post music. Either you already know the message, or you have to listen for it.#IKITAO
(DIR) Post #B2MeycGsLJKYKLevjc by 4eb88310d6b4ed95c6d66a395b3d3cf559b85faec8f7691dafd405a92e055d6d@mostr.pub
2025-12-02T00:29:30.000Z
1 likes, 0 repeats
A joke for today...https://file.nostrmedia.com/p/4eb88310d6b4ed95c6d66a395b3d3cf559b85faec8f7691dafd405a92e055d6d/b4497829dae160ff25363573534db36230c744cac04a9be4f0c7b535bccba0ec.jpg#IKITAO
(DIR) Post #B2kOPkLSprNQoUI5ei by 4eb88310d6b4ed95c6d66a395b3d3cf559b85faec8f7691dafd405a92e055d6d@mostr.pub
2025-05-27T00:53:33.000Z
0 likes, 0 repeats
Nothingface - Murder Is Masturbationhttps://file.nostrmedia.com/p/4eb88310d6b4ed95c6d66a395b3d3cf559b85faec8f7691dafd405a92e055d6d/e4514dadb3af8ce8948f195e746d13a9f371bb9b36537aec31f5430f020c7378.mp4YThttps://youtu.be/n6tIz2wp8mU#Nothingface #Music