DOI
- **Title:** Launch of Minuteman III Demonstrates the Readiness and Reliability of U.S. Nuclear Deterrence
Text (with 10 hashtags integrated): On November 5, 2024, at 11:01 p.m. PT, a U.S. military team launched an unarmed #MinutemanIII intercontinental ballistic missile (#ICBM) from #VandenbergSpaceForceBase, California. This test, involving the U.S. Air Force’s Global Strike Command and the U.S. Navy, highlighted the #USANuclearDeterrence capability. The #ALCS (Airborne Launch Control System) aboard a Navy E-6B Mercury demonstrated flexibility and readiness. The #strategic deterrent has reassured U.S. allies and partners while advancing #nationalsecurity interests. This routine test strengthens #globalstability, reflecting the #reliability of U.S. defense systems.
Additional Hashtags (13 total): #USMilitary #MilitaryTesting #SpaceForce #GlobalDeterrence #NuclearSecurity #MissileTesting #StrategicDefense #USNationalSecurity #ICBMTesting #USMilitaryReadiness #MissileDefense #USAllies #DefenseTechnology
Назва
Запуск Minuteman III демонструє готовність та надійність ядерного стримування США
Ключові слова
ядерне стримування, Minuteman III, міжконтинентальна балістична ракета, США, тестовий запуск, національна безпека
Вступ
5 листопада 2024 року США провели тестовий запуск міжконтинентальної балістичної ракети (МБР) Minuteman III з бази Ванденберг. Ця подія стала важливою демонстрацією надійності ядерного арсеналу США та здатності відреагувати на загрози сучасності.
Бібліографія
- Пресслужба Космічної дельти 30. "Запуск Minuteman III демонструє готовність..." (2024)
- США в глобальній оборонній стратегії. Навчання, які зміцнюють ядерне стримування.
- Американські військові технології XXI століття. Огляд безпеки та стримування.
Висновок
Тестовий запуск Minuteman III підтвердив ефективність стратегічної зброї США, показавши силу та готовність до захисту союзників. Це забезпечує стабільність і запевняє у надійності ядерного стримування до повного впровадження нової ракети LG-35A Sentinel.
Гештеги
#USANuclearDeterrence #MinutemanIII #NationalSecurity #MilitaryTesting #GlobalStability
---
English Translation
Title: Launch of Minuteman III Demonstrates the Readiness and Reliability of U.S. Nuclear Deterrence
Keywords: nuclear deterrence, Minuteman III, intercontinental ballistic missile, USA, test launch, national security
Introduction: On November 5, 2024, the U.S. conducted a test launch of the Minuteman III intercontinental ballistic missile from Vandenberg Base. This event demonstrated the reliability of the U.S. nuclear arsenal and its ability to respond to modern threats.
Bibliography:
- 30th Space Delta Press Office. "Minuteman III Launch Demonstrates Readiness..." (2024)
- The U.S. in Global Defense Strategy. Training that strengthens nuclear deterrence.
- American Military Technologies of the 21st Century. Overview of security and deterrence.
Conclusion: The Minuteman III test launch confirmed the effectiveness of the U.S. strategic arsenal, showcasing the strength and readiness to protect allies. This supports stability and reassures the reliability of nuclear deterrence until the full implementation of the LG-35A Sentinel missile.
Hashtags: #USANuclearDeterrence #MinutemanIII #NationalSecurity #MilitaryTesting #GlobalStability
- В настоящее время #Tapioca #Foundation уведомляет пользователей о взломе пула #ARB, что указывает на серьезные уязвимости безопасности.
В настоящее время #Tapioca #Foundation уведомляет пользователей о взломе пула #ARB, что указывает на серьезные #уязвимости безопасности.
Платформа настоятельно советует пользователям немедленно отозвать разрешения на токены $TAP и $TapUSD во всех контрактах, связанных с #Tapioca, до устранения #проблемы.
Такой экстренный призыв свидетельствует о возможных рисках утечки или потери средств, что подчеркивает критическую важность быстрого реагирования для предотвращения потенциальных финансовых потерь. Это также указывает на необходимость повышенного внимания к безопасности контрактов, особенно на фоне участившихся #атак в DeFi-секторе.
Пользователи могут воспользоваться предоставленной ссылкой для безопасного отзыва разрешений и предотвращения дальнейших #угроз.
- Should C++ Developers Broaden Their Skills in Trending Areas to Stay Relevant?
Title:
Introduction: C++ is a powerful and versatile programming language that has been a cornerstone of modern software development for decades. Known for its high performance and control over system resources, C++ is used in areas like operating system development, gaming, high-performance computing, and more. However, with the rapid evolution of technology, a crucial question arises for C++ developers: should they expand their expertise in trending fields like artificial intelligence, blockchain, and privacy-focused technologies to stay competitive and effective in the future?
This article explores the evolving role of C++ developers in an era of modern technological trends and emphasizes the importance of adapting to new paradigms while retaining the fundamentals of the language. It also examines the broader impact of C++ development on the progression of programming as a whole.
Why This Article Is Important
As technology advances at an unprecedented rate, developers in all fields are faced with the challenge of adapting to new trends to remain valuable in the industry. For C++ developers, this challenge is particularly relevant as new fields like AI, blockchain, and privacy technologies demand a combination of high performance and robust security, areas where C++ excels. This analysis will shed light on how C++ developers can leverage their language expertise to excel in these emerging domains and keep pace with industry needs.
Keywords
#C++ #SoftwareDevelopment #ArtificialIntelligence #MachineLearning #Blockchain #PrivacyTechnology #CloudComputing #OpenSourceProjects #CPlusPlus #DeveloperSkills #TechTrends #Innovation #PrivacyTech #TechnicalCommunity #FutureOfProgramming
- "Zelensky’s Diplomatic Balancing Act: Navigating U.S. Political Shifts to Secure Ukraine's Future"
Title:
Translation:
Andrey Nikulin:
The logic of Zelensky's actions is understandable—he simply has no choice. He has to flatter, just as other world leaders do. And to ingratiate himself with a simple calculation in mind—what if it works?
It is fairly obvious that Kyiv was betting on the Democrats and the continuation of the current cooperation, which, despite some grievances, still existed, and no other country has provided, nor could provide, more support to Ukraine than the United States. The Democrats did at least something. The Republicans, especially the Trump-aligned generation, represented by the former/new president himself, Vance, and Speaker Johnson, have clearly demonstrated that Ukraine and its issues do not interest them.
So now Zelensky has a double strategy: to extract maximum resources and weaponry from the Democrats during Biden's remaining time in office and to try to build relations with Trump. For Trump, the Ukraine issue will become one of the first tests of his promises to "solve it in a day."
Although he has often made promises and failed to fulfill them regularly, resolving the conflict could simply mean eliminating one side of it. What's the big deal? Fighting? Not anymore. No one left to fight. And applause ensues, turning into ovations.
In general, we are left to observe the unfolding events—with predictable skepticism. However, there is also a sizable group of experts and politicians who have consistently criticized the current Washington authorities for "not resolving things quickly and efficiently." Now, we will see what "quickly" looks like.
And the Ukrainian president’s message to Trump:
"Congratulations @realDonaldTrump on the impressive election victory!
I remember our wonderful meeting with President Trump in September, where we discussed the strategic partnership between Ukraine and the U.S., the Victory Plan, and ways to end Russian aggression against Ukraine.
I appreciate President Trump’s commitment to a ‘peace through strength’ approach in global affairs. This is precisely the principle that can, in practice, bring about a just peace in Ukraine. I hope we will bring this to life together.
We eagerly await the era of a strong United States under the decisive leadership of President Trump. We count on the continuous strong bipartisan support for Ukraine in the United States.
We are interested in developing mutually beneficial political and economic cooperation that will benefit both our countries. Ukraine, as one of Europe's strongest military powers, strives to ensure long-term peace and security in Europe and the Transatlantic community with the support of our allies.
I look forward to personally congratulating President Trump and discussing ways to strengthen the strategic partnership between Ukraine and the United States."
---
Hashtags: #Zelensky #UkraineUSRelations #USForeignPolicy #TrumpEra #USUkraineAlliance #PeaceThroughStrength #USPolitics #BipartisanSupport #StrategicPartnership #UkraineConflict
---
Editor's Conclusion:
In this commentary, Andrey Nikulin captures the delicate balancing act that Zelensky faces amid shifting political landscapes in the United States. With the Democrats winding down their term and the potential return of Trump, Zelensky’s strategies reflect both pragmatic foresight and a calculated approach to ensure Ukraine's continued support. His message of congratulations to Trump underscores the necessity for diplomatic tact and adaptability, signaling Ukraine's willingness to collaborate across political divides.
Zelensky's dual strategy mirrors the high stakes for Ukraine, as it seeks to maintain and strengthen its alliance with the U.S., regardless of domestic American political changes. This nuanced diplomatic approach highlights Kyiv's reliance on American backing and its resilience in navigating complex geopolitical dynamics.
---
Keywords: Zelensky, Ukraine, U.S.-Ukraine relations, Trump administration, Biden administration, bipartisan support, strategic partnership, Ukrainian diplomacy, U.S. foreign policy, peace through strength
---
Introduction: As the U.S. political stage undergoes seismic shifts, Ukrainian President Volodymyr Zelensky finds himself adapting his diplomatic strategy to secure critical support for Ukraine’s defense and stability. With the Biden administration nearing its term's end and Donald Trump’s potential re-entry into power, Zelensky’s approach has become a fine balance of extracting remaining support from the Democrats while cautiously extending a hand toward Trump and his allies. Amid ongoing Russian aggression, Ukraine’s leader aims to safeguard his nation’s strategic interests by appealing to both sides of the American political divide, prioritizing Ukraine's need for resources and sustained partnerships. This dual-front strategy highlights the stakes for Ukraine, relying heavily on U.S. aid to secure a just peace and long-term stability.
- Пиратский набор для геймеров и не только
-
Hydra Launcher (https://t.me/KladovkaPavlu/2005) — самый продвинутый около-Steam клиент для настоящих пиратов;
-
Jackett (https://github.com/Jackett/Jackett) — поисковик торрент файлов, поддерживающий порядка 150 трекеров;
-
iMSteam (https://github.com/iMAboud/iMSteam/tree/main) — еще один игровой лаунчер с различными репаками игр из Steam;
-
Torrentz2 (https://torrentz2eu.org/) — еще один поисковик торрент файлов, объединяющий в себе результаты поиска со многих поисковиков и сайтов;
-
Rezi (https://rezi.one/) — мощный поисковик по надёжным игровым репакам и софту;
-
Zap Search (https://zap-search.onrender.com/)— аналог Rezi c кучей фильтров для поиска, умеет искать и пиратский софт на MacOS;
-
Tribler (https://www.tribler.org/download.html) — торрент-клиент, который позволяет скачивать файлы через цепочку серверов-посредников, подобно тому, как это происходит в сети Tor;
-
qBitTorrent (https://www.qbittorrent.org/)— никакой рекламы, есть поисковая система, поддержка magnet ссылок, DHT, PEX, возможность шифрования соединения и не только.
-
Webtor (https://t.me/KladovkaPavlu/340) — сервис для онлайн доступа к содержимому любого торрент-файла, у которого есть пиры. Контент можно не только скачать, его также можно и просмотреть. Всё работает через обычный браузер без каких-либо расширений.
-
NonSteamLaunchers (https://github.com/moraroy/NonSteamLaunchers-On-Steam-Deck) — скрипт, который устанавливает всевозможные магазины приложений на Steam Deck, кроме самого Steam.
Обмен (https://t.me/onion_market_bot)| VPN (https://t.me/vpn_onion_bot) | Аккаунты (https://t.me/GraverKladovkaBot)| Домены (https://t.me/OnionLuxHostBot)
-
- OpenWrt, now 20 years old, is crafting its own future-proof reference hardwarearstechnica.com OpenWrt, now 20 years old, is crafting its own future-proof reference hardware
There are, as you might expect, a few disagreements about what’s most important.
📹 ТОП РОУТЕР GL.INET FLINT 2 GL-MT6000 НА OPENWRT С НЕВЕРОЯТНОЙ ПЛОЩАДЬЮ ПОКРЫТИЯ → (https://www.youtube.com/watch?v=tKqL6sbPTxQ) 👤 #TECHNOZON → (https://www.youtube.com/@Zorronder)
@youtubabot: 📹720p
- **The Security Problem of Messengers and Communication Control**
Here’s a revised translation of your text tailored for a U.S. audience:
---
Most messaging apps, even those marketed as secure, can track or store user data. They often rely on centralized servers for chat storage, which poses risks of information leaks, hacking, and even data sharing with third parties at the request of governments or other organizations. Simply controlling encryption keys is insufficient for complete privacy, especially concerning the confidentiality and security of sensitive conversations.
SimpleX Chat as an Alternative
SimpleX Chat addresses this issue by offering a decentralized communication model that eliminates centralized servers and facilitates peer-to-peer messaging. This approach maximizes privacy and minimizes the risks of personal information leaks.
---
The Security Problem of Messengers and Communication Control
#Ukrainian / #English / #Russian
- #Security / #Security / #Безопасность
- #Privacy / #Privacy / #Конфиденциальность
- #DigitalSovereignty / #DigitalSovereignty / #ЦифровойСуверенитет
- #Decentralization / #Decentralization / #Децентрализация
- #SimpleXChat / #SimpleXChat / #SimpleXChat
- #Messenger / #Messenger / #Мессенджер
- #PrivateChat / #PrivateChat / #ПриватныйЧат
- #DataProtection / #DataProtection / #ЗащитаДанных
- #Censorship / #Censorship / #Цензура
- #Alternative / #Alternative / #Альтернатива
- #Cybersecurity / #Cybersecurity / #КиберБезопасность
- #PeerToPeer / #PeerToPeer / #ПиринговыйОбмен
- #EncryptedCommunication / #EncryptedCommunication / #ЗашифрованноеОбщение
- #OnlineSecurity / #OnlineSecurity / #ОнлайнБезопасность
- #PrivacyProtection / #PrivacyProtection / #ЗащитаКонфиденциальности
- #FutureOfCommunication / #FutureOfCommunication / #БудущееКоммуникаций
- #DataControl / #DataControl / #КонтрольНадДанными
- #DigitalFreedom / #DigitalFreedom / #ЦифроваяСвобода
- #Anonymity / #Anonymity / #Анонимность
- #AntiSurveillance / #AntiSurveillance / #АнтиСлежка
- #SecureChats / #SecureChats / #ЗащищённыеЧаты
- #CryptoMessenger / #CryptoMessenger / #КриптоМессенджер
- #NoCentralPlatform / #NoCentralPlatform / #БезЦентрализации
The disclosure of activities involving public figures and the investigation of their connections significantly impact both the politicians themselves and the public. Such cases often reveal how actions that appeared "private" actually influence public interests and political processes. Here are a few examples of such cases and their consequences:
1. Offshore Accounts of Politicians
- Example: The revelations about the offshore accounts of many world leaders from the Pandora Papers and Panama Papers investigations exposed the scale of tax evasion among the political elite.
- Consequences: These disclosures led to serious reputational damage, protests, and in some cases, resignations and legal investigations. Society began to view the elite with distrust, and activists increased pressure on governments for transparency.
2. Political Corruption
- Example: The exposure of bribery within the Brazilian government during the "Operation Car Wash" investigation highlighted the extent of corruption within state structures.
- Consequences: The investigation resulted in numerous arrests and sparked a public movement against corruption. It led to reforms in anti-corruption measures and changes in political financing rules.
3. Media Manipulation
- Example: The disclosure of the involvement of some American politicians in manipulating media or funding specific channels to achieve political goals.
- Consequences: This raised discussions about the influence of money in media, leading to calls for regulating the media landscape and limiting its influence on journalism.
4. Conflict of Interest
- Example: The exposure of business ties among politicians' family members, who blend public duties with private interests, such as companies affiliated with high-ranking officials that receive government contracts.
- Consequences: Such revelations often result in decreased trust in political leaders, changes in legislation concerning conflicts of interest, and stricter measures for transparency among officials.
5. Moral-Ethical Issues
- Example: Sexual scandals or the misuse of power for personal gain (e.g., well-known #MeToo cases).
- Consequences: Such scandals led to resignations and discrediting of entire institutions, fostering new ethical standards and laws to protect victims.
6. Abuse of Power
- Example: The exposure of politicians using government resources for personal purposes, such as state funds for travel or personal expenses.
- Consequences: This led to high-profile firings, changes in government budget spending rules, and the establishment of clear limits on the use of state resources.
Conclusion
Disclosures of misconduct among public figures often significantly influence political systems, altering both legislative initiatives and public opinion. These cases also signal to the political elite that transparency and accountability are critical in modern society.
Such cases create widespread resonance, and there is an increasing demand for transparency in global politics.
Keywords:
- Public Figures
- Disclosure of Information
- Corruption
- Offshore Accounts
- Conflict of Interest
- Political Ethics
- Media Influence
- Investigations
- Pandora Papers
- Panama Papers
- Operation Car Wash
- Political Transparency
Hashtags:
- #Investigations
- #PublicFigures
- #PoliticalEthics
- #Corruption
- #OffshoreAccounts
- #ConflictOfInterest
- #MediaInfluence
- #Scandals
- #PandoraPapers
- #PanamaPapers
- #Transparency
- #OperationCarWash
- #PoliticalScandals
- #EthicsInPower
- #TrustInGovernment
- #Reforms
- #AntiCorruption
- #MoralityAndPolitics
- #JournalisticInvestigations
- #RightToTransparency
- #PublicOpinion
- #AgainstCorruption
- #GlobalScandals
Bibliography:
- Panama Papers: Breaking the Story of How the Rich and Powerful Hide Their Money – Süddeutsche Zeitung
- Pandora Papers: Secrets of the Wealthiest 1% – International Consortium of Investigative Journalists (ICIJ)
- Operation Car Wash (Lava Jato) – Federal Police of Brazil, research on corruption in Brazil
- The Panama Papers: Exposing the Rogue Offshore Finance Industry – Luke Harding
- Public Corruption and the Law – Transparency International, research and legal reviews
---
Feel free to adjust any part of the text further to meet your specific audience needs!
https://bastyon.com/index?v=77379856930fd083f462ea620c61bbe727f941fcbab4e46aa9cbbf4f9615d927&video=1&ref=PDQmXtWJfd8f6fMtwaxzCuqvLpoN3KbS4o
- **Bound by a Single Foundation**
Vitaly Ginzburg: Did FBK Provide Political "Cover" for Zheleznyak and Leontyev?
Update: 02-11-2024 (14:02)
Mutual complicity stains like soot. I reach for a hand, but feel an elbow. I search for eyes, but feel only a gaze, Where behind heads, the rear is raised.
The Venediktov-Katz investigation exposed a serious issue within FBK, though it seems eager to "take on healthy forms." At least, this is evident from the statements made by FBK leadership and the declarations of A. Zheleznyak and S. Leontyev.
Clearly, FBK could have avoided this situation.
-
If they genuinely valued their reputation, which they frequently reference. If they hadn’t substituted the concept of REPUTATION with the pursuit of BEING RIGHT, they likely wouldn’t have accepted funds from bankers, wouldn’t have questioned basic standards of banking practices, and wouldn’t have tried to establish new moral categories around this, like "good" and "neutrality"—as Professor M. Mironov does.
-
If there were an independent media institution within the Russian opposition that stands against Putin's regime. However, as O. Kashin vividly demonstrated, the media in this matter proved not to be independent, but rather partisan, as Lenin taught us nearly 120 years ago. Fishman apologizes to Pevchikh, while Plyushchev struggles to admit that M. Katz’s investigation was right. Instead of treating the issue, they choose either silence, distraction, or shifting the agenda. Since silence didn’t work, they’re forced to redirect focus to the Berlin Russian march, the book Patriot, and even a €50 hoodie with a note from Navalny declaring that "Russia will be happy."
But none of this quells the scandal; on the contrary, it raises three critical questions.
First. How can this be resolved within the legal framework?
FBK, trying to downplay the issue, refers to the lack of court rulings against the bankers, claiming that this precludes calling them thieves. However, this is false. There are court rulings in Russia, and neither Zheleznyak nor Leontyev has contested them at the ECHR. Therefore, they are legally valid and carry prejudicial weight in any court, including Western ones, if not for FBK’s and Navalny's protection.
Since this has already occurred, there are two paths out of this INTERNATIONAL PUBLIC HOUSE called FBK.
-
The first path is to a Polish court, where, based on new evidence, they could challenge the affidavit as false testimony and proceed with civil litigation on behalf of the defrauded depositors.
-
The second path leads to American and Latvian authorities, who, based on the newly revealed data, are compelled to open criminal cases for money laundering and pursue civil claims for the victims.
As for the bankers' threats to defend their honor and dignity in court, these claims are actionable, either at the end of these proceedings or—as in The Golden Calf.
"I’ll file a complaint against you." — "You'll never complain about me," Ostap said meaningfully. "I could leave, but before I set foot on your Maly Kasatelny Street, you’ll be running after me in tears, begging me to return."
Second. Did FBK actually provide political "cover" for Zheleznyak and Leontyev?
When it comes to cover, it’s clear enough. Protecting allies is common practice for FBK, so this is hardly news. Letters of support for M. Friedman and company, signed even in a personal capacity by Volkov and Ashurkov, are indeed a "cover." Refusing to engage with Czech journalists regarding the confiscation of Czech properties owned by Resin and Yevstifeev is another example of "cover." Letters of recommendation to avoid sanctions, signed by M. Pevchikh, are yet another instance of "cover."
Therefore, V. Ashurkov’s testimony and S. Leontyev’s use of the title "Navalny’s banker"—uncontested by either FBK or Navalny—serve as a form of protection, especially as it appears to have been paid for.
If this topic has been suppressed, it would be reasonable to bring it to light.
So, what is this about?
Many would like to present it as if the "cover" of Navalny or FBK protects them from Russian authorities. But this is not quite the case. If it were, A. Zheleznyak and S. Leontyev would have handled it differently.
They could have appealed to the ECHR, citing violations of their rights under Article 6 of the European Convention, invoking FBK and Navalny. If this were true, they would have received a ruling that would protect them EVERYWHERE. However, this would have long been public knowledge, and FBK—or perhaps Navalny—would have had to acknowledge it publicly. Hopefully, there’s no need to elaborate. Their activity in Polish or American courts has been much less public.
Given Russia’s limited involvement in this matter, it seems Moscow is not keen on bringing the bankers back to serve sentences or even to seize their assets. Otherwise, sanctioned individuals wouldn’t be involved as parties, procedural deadlines wouldn’t be missed, and so on. The fact that they are in the U.S. rather than Europe also doesn’t indicate any threat from Russia.
Meanwhile, S. Leontyev, facing no real threat from Russia, obtains a lobbying license in the U.S. (something M. Friedman failed to do and for which his former FBI agent was convicted), gains access to Congress, and uses it to protect laundered funds and his own money-laundering scheme. And this operates under FBK’s cover and the name of the "patriot" A. Navalny. This is an entirely different kind of cover, with different intentions and much more reliable "materials."
Lastly, the third question. Is there too much FSB and SVR influence surrounding and within FBK?
Combining the fragments reveals an intriguing picture. A. Zheleznyak, who headed the ARB, served as a "cover" for the FSB and the Ministry of Internal Affairs for Russian banks. He’s the only banker awarded by Putin, likely not for laundering money for prosecutors and intelligence. Naturally, he had clearance, probably top-level, and quietly left for the U.S. He now has access to all FBK data.
His partner, S. Leontyev, has a lobbying license.
Among them is a certain lawyer, D. Dubograev, who, apart from his work for FBK, helps the FSB and Belarus’s KGB monitor the Russian and Belarusian opposition.
Finally, in 2012, A. Navalny served on Aeroflot’s board, representing the former KGB foreign intelligence officer in London, banker A. Lebedev, alongside Putin’s Dresden colleague, S. Chemezov. And that was with Aeroflot's foreign network serving as an SVR arm.
Not to mention last year’s FBK campaign with the same people targeting Kaja Kallas just when the Kremlin needed it, and the dissemination of KGB forgeries against L. Nevzlin and M. Khodorkovsky that no other structure managed to pull off.
Someone could piece together these fragments into a single puzzle and understand the result. What binds these people together. And draw the appropriate conclusions.
Vitaly Ginzburg
Original text :: Скованные одним фондом Виталий Гинзбург: Предоставлял ли ФБК политическую "крышу" Железняку и Леонтьеву или нет? update: 02-11-2024 (14:02) Круговая порука мажет, как копоть. Я беру чью-то руку, а чувствую локоть. Я ищу глаза, а чувствую взгляд, Где выше голов находится зад.
Расследование Венедиктова — Каца вскрыло серьезную болезнь в ФБК, но она, похоже, "хочет принять здоровые формы". Во всяком случае это следует как из позиции руководства ФБК, так и из заявления А. Железняка и С. Леонтьева.
Разумеется, ФБК мог бы этого избежать.
-
Если бы они реально дорожили своей репутацией, о которой они так много говорят. Если бы институт РЕПУТАЦИИ они не подменили институтом ПРАВОТЫ, то вряд ли позволили бы себе принимать деньги у банкстеров, не ставили бы под сомнение очевидные стандарты банковской деятельности и не пытались сформировать под это новые моральные категории. Например, добро и нейтралитет. Как это делает профессор М. Миронов.
-
Если бы в российской оппозиции, противопоставляющей себя путинской власти, функционировал бы институт независимых СМИ. Однако, как блестяще показал О. Кашин, СМИ в этом вопросе оказались не независимыми, а партийными, как учил нас Ильич почти 120 лет тому назад. Фишман извиняется перед Певчих, а Плющев с большим трудом выговаривает, что М. Кац в своем расследованием прав. Далее по законам жанра болезнь предпочитают не лечить, а либо замолчать, либо заговорить, либо сместить повестку. Поскольку замолчать не удалось, то приходится заговаривать и переместить внимание на берлинский русский марш, книгу "Патриот" и даже на худи за 50 евро с запиской Навального о том, что Россия будет счастливой.
Но все это не только не способствует угасанию скандала, но, наоборот, актуализирует три важных вопроса.
Первый.
Как разрешить это в правовом поле?
ФБК, пытаясь заговорить проблему, ссылается на отсутствие судебных решений в отношении банкстеров, что якобы не дает никому права назвать их ворами. Авторитет и разумные доводы С. Алексашенко, В. Иноземцева, О. Тинькова и др. на них не действуют.
Но это ложь. Имеются решения судов в России, и они ни Железняком, ни Леонтьевым в ЕСПЧ не оспорены. Следовательно, они законны и в любом суде они обладают преюдиционной силой, что, в общем-то, и произошло бы во всех западных судах, если бы не крыша ФБК и Навального.
Но раз это уже произошло, то из этого МЕЖДУНАРОДНОГО ПУБЛИЧНОГО ДОМА под названием ФБК есть два пути.
Первый — это путь в польский суд, в котором в связи с новыми обстоятельствами оспорить аффидевит как заведомо ложные показания и дальше реализовать права обворованных вкладчиков в рамках гражданского судопроизводства.
Второй путь — это к американским и латвийским властям, которые на основании ставших известными данных просто обязаны возбудить уголовные дела по признакам отмывания денег и их легализации с последующим удовлетворением гражданских исков пострадавших.
Что же касается угроз банкстеров о защите чести и достоинства в судах, то они вполне реализуемы либо по итогам этих судопроизводств, либо как в "Золотом теленке".
"Я на вас буду жаловаться. — Жаловаться на меня вы никогда не будете, — значительно сказал Остап, — а уйти я могу, но не успею я выйти на вашу Малую Касательную улицу, как вы с плачем побежите за мной и будете лизать мои янычарские пятки, умоляя меня вернуться".
Второй вопрос несколько сложнее.
Предоставлял ли ФБК политическую "крышу" Железняку и Леонтьеву или нет?
Если рассуждать о крыше, то здесь все ясно. Крышевание — это обычная практика ФБК, и здесь нет ничего нового. Письма в поддержку М. Фридмана и Ко, представленные даже в личном качестве Волковым и Ашурковым, — это и есть "крыша". Отказ даже контактировать с чешскими журналистами по поводу чешской недвижимости Ресина и Евстифеева на предмет ее конфискации — это и есть "крыша". Письма в поддержку для непопадание под санкции, подписанное М. Певчих, — это и есть "крыша".
А сколько подобного рода манипуляций со списками Навального, которые тоже можно назвать "крышей".
Поэтому показания В. Ашуркова и использование С. Леонтьевым статуса "банкир Навального" — что не было опровергнуто ни ФБК, ни Навальным — это не что иное, как "крыша", тем более предоставленная на возмездной основе.
Но раз предпринята попытка это заговорить, то вполне разумно было бы разговорить эту тему.
О чем в данном случае идет речь?
Многим хочется представить дело таким образом, что "крыша" типа Навального или ФБК предоставлены в защиту от преследования российских властей. Но ведь это не совсем так. Если бы дело обстояло таким образом, то А. Железняк и С. Леонтьев выстроили бы ее по-другому.
Они бы обратились в ЕСПЧ с жалобой на нарушение своих прав, предусмотренных ст. 6 Европейской Конвенции, сослались бы на ФБК и Навального, и если бы это было правдой, то получили бы решение суда, которое и стало бы им средством защиты от ВСЕГО и ВЕЗДЕ. Но в таком случае это давно бы стало достоянием гласности. И ФБК, а может и Навальному, пришлось бы это публично подтвердить. Надеюсь, развивать эту мысль не имеет смысла. Активность в польском или в американском судах оказалась менее публична.
Судя по активности российской стороны в этом деле, она не горит желанием ни вернуть банкстеров в Россию для отбытия наказания, ни даже конфисковать их деньги. В противном случае в дело не вовлекались бы подсанкционные люди в качестве процессуальных лиц, не пропускались бы процессуальные сроки и т.д. Да и само пребывание их в США, а не в Европе также не свидетельствует об угрозе со стороны России.
В то же время С. Леонтьев, не имея реальной угрозы со стороны России, приобретает лицензию на лоббистскую деятельность в США (то, что не получилось у М. Фридмана и за что был осужден работавший на него отставной агент ФБР), получает доступ в Конгресс и использует это для защиты краденых и отмытых средств, а также и защиты своей схемы по отмыванию денег (надо ли напоминать, чьих?) через американскую финансовую систему. И это осуществляется под крышей ФБК и под именем "патриота" А. Навального. А это уже совсем другая крыша. Другой тип, другое предназначение и другие, куда более надежные "стройматериалы".
И, наконец, третий вопрос.
Не слишком ли много ФСБ и СВР вокруг и внутри ФБК?
Если собрать все фрагменты, то получается интересная картина. А. Железняк в АРБ собственно и был крышей ФСБ и МВД для российских банков. Единственный из банкиров, награжден В. Путиным орденом. Надеюсь, что не за схему отмывания денег для прокурорских и чекистских. Естественно, имел допуск, скорее всего по первой форме, и спокойно уехал в США. Сейчас имеет доступ ко всем данным ФБК.
Его партнер С. Леонтьев с лицензией на лоббирование.
Там же между внешним и внутренним контурами ФБК вращается некий адвокат Д. Дубограев, который в свободное от ФБКшных забот время помогает ФСБ и КГБ Беларуси следить за российской и белорусской оппозицией.
И, наконец, в 2012 г. А. Навальный состоял в Совете директоров "Аэрофлота", представляя там бывшего сотрудника ПГУ КГБ СССР в Лондоне, а тогда банкира А. Лебедева в компании с коллегой В. Путина по Дрездену С. Чемезовым. И это при том, что сеть зарубежных представителей "Аэрофлота" — это элемент сети СВР.
Я уже не говорю про прошлогоднюю кампанию ФБК с теми же действующими лицами по дискредитации Каи Каллас именно в тот момент, когда это было необходимо Кремлю. И про слив чекистских фальшивок против Л. Невзлина и М. Ходорковского, который не смогли осуществить ни через какую другую структуру.
Кто-то может собрать эти фрагменты в один пазл и понять, что в итоге получается. Чем все эти люди скованы. И сделать соответствующие выводы.
Виталий Гинзбург
Ось добірка з 23 хештегів на трьох мовах:
Українською:
- #СкованіФондом
- #РозслідуванняФБК
- #Гінзбург
- #Корупція
- #Кришування
- #ПолітичнаПідтримка
- #РосійськаОпозиція
- #Банкстери
- #Венедиктов
- #Желєзняк
- #Леонтьєв
- #Навальний
- #ЄСПЛ
- #Санкції
- #Легалізація
- #ФінансоваЗлочинність
- #ГромадськіІнтереси
- #Законність
- #Росія
- #Латвія
- #США
- #ФСБ
- #ВпливЗМІ
English:
- #BoundByAFund
- #FBKInvestigation
- #Ginzburg
- #Corruption
- #PoliticalShield
- #RussianOpposition
- #Banksters
- #Venediktov
- #Zheleznyak
- #Leontyev
- #Navalny
- #ECHR
- #Sanctions
- #Legalization
- #FinancialCrime
- #PublicInterest
- #Legitimacy
- #Russia
- #Latvia
- #USA
- #FSB
- #MediaInfluence
- #Transparency
Російською:
- #СкованныеФондом
- #РасследованиеФБК
- #Гинзбург
- #Коррупция
- #ПолитическаяКрыша
- #РоссийскаяОппозиция
- #Банкстеры
- #Венедиктов
- #Железняк
- #Леонтьев
- #Навальный
- #ЕСПЧ
- #Санкции
- #Легализация
- #ФинансовоеПреступление
- #ОбщественныеИнтересы
- #Законность
- #Россия
- #Латвия
- #США
- #ФСБ
- #ВлияниеСМИ
- #Прозрачность
Ці хештеги допоможуть підвищити охоплення та залучити різну аудиторію на трьох мовах.
-
- No Way to Hide: Uncovering New Campaigns from Daily Tunneling Detectionunit42.paloaltonetworks.com No Way to Hide: Uncovering New Campaigns from Daily Tunneling Detection
Four DNS tunneling campaigns identified through a new machine learning tool expose intricate tactics when targeting vital sectors like finance, healthcare and more. Four DNS tunneling campaigns identified through a new machine learning tool expose intricate tactics when targeting vital sectors like ...
- Comment on a YT video about Windows on ARM
cross-posted from: https://lemmy.world/post/17478803
> Installing OS, 10 years ago: > > Windows: click a couple of buttons > enter username and password > > Linux: Terminal hacking, downloading > shell scripts from github > > Installing OS today: > > Linux: click a couple of buttons, enter > username and password > > Windows: Terminal hacking, > downloading shell scripts from > github. > > Link to video: https://m.youtube.com/watch?v=qKRmYW1D0S0
- Haveno is ready for mainnet!
haveno-dex/haveno: Decentralized P2P exchange platform built on Monero and Tor https://github.com/haveno-dex/haveno
Haveno, децентралізована біржа для Monero, оголосила про готовність запуску на основній мережі (mainnet). Після понад чотирьох років розробки, платформа дозволяє користувачам Monero здійснювати анонімні та безпечні транзакції. Інсталяція доступна для Linux, macOS і Windows, а також є опція тестових угод. Платформа продовжує вдосконалюватися, і розробники запрошують користувачів повідомляти про знайдені помилки.
Докладніше тут: Haveno Mainnet Announcement
- Ахах это лютая дичь, кто в теме тот сейчас порвется :)
"Болгенос выходит на государственный уровень"
В ответ на увольнение из майнтайнеров некоторых российских программистов власти рф предложили создать свое Linux-сообщество. Это уже такой конкретный, уверенный маразм.
Свои форки ядра - это совершенно повсеместное явление. Одна из сильных сторон открытого программного обеспечения как раз в том, что каждый может скопировать, вносить изменения и публиковать их. А быть майтайнером линукса означает пушить свои правки в официальные ветки разработки ядра.
В итоге выходит, что власти рф предложили этим кодерам свои ветки считать официальными. А пыню, наверное, предлагается считать Линусом Торвальдсом !
- Haveno is ready for mainnet!haveno.exchange Haveno | Haveno is ready for mainnet!
Haveno is ready to be used on Monero's main network by using third party installers and networks
- New Bounty: Monerujo: add full ipv6 supportbounties.monero.social 1.700ɱ | Monerujo: add full ipv6 support +0.25ɱ · Monero Bounties
Ipv6 is the future and we must be prepared Monerujo already has some limited ipv6 support and will: However it will not * save an ipv6 node using a G
- Monero, Haveno and Russian sanctions
cross-posted from: https://monero.town/post/4816529
> The ongoing Russian conflict has caused Euro Union and other political powers to heavily sanction Russia. Some of these sanctions involve blocking bank transfers between the eurozone and Russia. > > Now I do not want to enter a political discussion here, but I think most of these sanctions are actually hurting the individual citizens more than the government to whom they should be targeted. > > This has caused that a lot of people that live abroad cannot for instance send money to their loved ones in the country, spend money whenever they go there for a visit, or for people who live and earn money in Russia to spend that money abroad. > > Additionally, many banks have seized Russian-owned bank accounts in Europe, essentially stealing their money without them being able to do anything to prevent this. > > Of course we could get in the argument here that you do not really own your hard-earned fiat money. After all, if I cannot spend my fiat money in a bakery in Russia, do I really own my money? > > This is where Monero shines (or should be shining) in my opinion. Monero should give Russians the ability to break free from these sanctions and actually spend their money however they want. > > However, looking into Haveno, there are 0 offers in Russian Rubles (RUB), and historically there have been zero trades with RUB. Also trying to find information on Russian forums about Haveno, no one seems to talk about it at all. > > However, before Haveno came out officially, I used another centralized P2P exchange called bitpapa, which I do not promote or recommend, as even though I used it without problems on some occasions, I do not know if it can be fully trusted. > > My experience is that (maybe just a coincidence) all trades I did there were done with Russians. So it seems that that platform might be the one preferred by them. > > And here is where I want to open a discussion: > > Why do you guys think is the reason that there are so little trades in a currency so heavily sanctioned, when Monero is supposed to fight exactly against this kind of issue? > > Perhaps there is some failure in our communication methods, and the information about Haveno is not reaching the relevant forums or circles?
- В Перми две девушки подожгли офис «Единой России». Z-канал объявил вознаграждение за сведения о поджигательницах, пригрозив им физической расправой
Примерно около полуночи по местному времени в спасательные службы поступила информация о пожаре на улице Плеханова, 12 в Перми. «Пермь Онлайн» пишет (https://59.ru/text/incidents/2024/10/24/74247740/), что поджигательниц было две. Они заготовили семь бутылок с зажигательной смесью, но успели бросить всего две.
Все происходящее девушки снимали на телефон. У одной из них загорелась куртка, после чего обе скрылись. Спасатели потушили возгорание. Общая площадь пожара составила 40 квадратных метров.
Представитель пермской «Единой России» Вячеслав Григорьев заявил, что в тот день из офиса партии отправляли гуманитарный груз весом три тонны на войну в Украине. «Мы два дня назад отправляли гуманитарный груз, информация об этом была на федеральном канале. И если сложить два и два, то это месть», — сообщил «единоросс».
Z-канал «Прикамские витязи» объявил вознаграждение за информацию о поджигательницах. Какое именно не называется. В канале опубликовали (https://t.me/prikamskie/5938) ориентировки на девушек, а также угрозы физической расправой.
- Беспорядки в Коркино Челябинской области. Что известно?
▪️Жители города устроили сход после убийства 40-летней женщины-таксистки. Она везла домой двух молодых людей, произошла ссора. Один из парней несколько раз ударил ее ножом в грудь. Было возбуждено уголовное дело по ч. 1 ст. 105 УК РФ (убийство). У женщины осталось двое несовершеннолетних детей.
▪️Полиция задержала 17-летнего подозреваемого в убийстве. По утверждениям местных жителей, пассажирами убитой были: два брата из «цыганского дома», куда ранее часто вызывали такси.
▪️Когда люди собрались около цыганского дома, послышались выстрелы в сторону толпы. После этого окна дома стали закидывать камнями, а на место прибыл СОБР, который оцепил здание и оттеснил людей. Есть раненые.
▪️После этого люди, пришедшие на сход, начали (https://t.me/ostorozhno_novosti/30682) переворачивать и поджигать "цыганские автомобили", также была информация о двух подожженных домах. Из Челябинска было вызвано подкрепление Росгвардии. Были задержаны несколько десятков человек, как из протестующих, так и из представителей диаспоры.
▪️Представители цыганской диаспоры, опасаясь самосуда и расправ, пытались покинуть город на машинах.
▪️При этом, госСМИ РИА Новости сообщало в момент столкновений, что в Коркино ситуация под контролем, а никаких скоплений людей – нет.
▪️Сейчас в городе очень много силовиков, беспорядки закончены.
▪️Пресс-служба губернатора Челябинской области Алексея Текслера сообщила, что он отправил на место происшествия своих заместителей.
- Linus Torvalds affirms expulsion of Russian maintainerswww.theregister.com Linus Torvalds affirms expulsion of Russian maintainers
Removal of kernel maintainers linked to Russia attributed to sanctions
- Три мови світу з найбільшою кількістю букв в алфавіті:
Annotation:
This summary provides a comparison of Cambodia, Sri Lanka, and Thailand based on their positions in global GDP rankings and the Democracy Index. Cambodia, ranked 103rd in GDP in 2023, has a small but growing economy, largely driven by tourism and textiles, but ranks low in the Democracy Index at 133rd, classified as an authoritarian regime. Sri Lanka, with a 64th place in GDP, faces economic challenges despite its reliance on agriculture and textiles, and is ranked 93rd in the Democracy Index as a hybrid regime. Thailand, the largest economy among the three, holds the 25th position in GDP due to its diversified sectors, including tourism and electronics, but political instability places it in 55th position as a hybrid regime in the Democracy Index.
-
Кхмерська (камбоджійська мова):
- Кількість букв: 74
- Кхмерська мова має найбільший алфавіт у світі. Він включає 33 приголосні, 23 голосні та 12 незалежних голосних.
-
Сингальська (мова Шрі-Ланки):
- Кількість букв: 58
- Сингальська мова, яка використовується в Шрі-Ланці, має складну писемність з великою кількістю приголосних і голосних.
-
Тайська:
- Кількість букв: 44 приголосних і 32 голосних, всього 76 символів.
- Тайська мова також має велику кількість знаків для приголосних і голосних звуків, а також тональні знаки, що додають складності її алфавіту.
Ось інформація про місце Камбоджі, Шрі-Ланки та Таїланду в світовому ВВП і рейтингу демократії:
1. Камбоджа (кхмерська мова)
- Місце в світовому ВВП:
- У 2023 році Камбоджа займала 103-е місце за обсягом номінального ВВП у світі.
- Її економіка залишається невеликою порівняно з іншими країнами, однак вона швидко зростає, зокрема через розвиток туристичної галузі та текстильного виробництва.
- Рейтинг демократії:
- Камбоджа займає низькі позиції в Індексі демократії (Democracy Index), оскільки класифікується як авторитарний режим. У 2023 році вона посідала 133-е місце зі 167 країн.
2. Шрі-Ланка (сингальська мова)
- Місце в світовому ВВП:
- Шрі-Ланка у 2023 році займала 64-е місце за обсягом номінального ВВП у світі.
- Економіка країни базується на сільському господарстві, текстильній промисловості та туризмі, хоча країна останнім часом зіткнулася з серйозними економічними проблемами.
- Рейтинг демократії:
- В Індексі демократії Шрі-Ланка класифікується як гібридний режим, що знаходиться між демократією та авторитаризмом. У 2023 році країна займала 93-е місце в рейтингу.
3. Таїланд (тайська мова)
- Місце в світовому ВВП:
- Таїланд у 2023 році займав 25-е місце за номінальним ВВП.
- Це одна з найбільших економік у Південно-Східній Азії, з розвиненими секторами туризму, автомобілебудування, виробництва електроніки та сільського господарства.
- Рейтинг демократії:
- У рейтингу демократії Таїланд класифікується як гібридний режим через військові перевороти та політичну нестабільність. У 2023 році він займав 55-е місце.
---
Отже, Камбоджа, Шрі-Ланка і Таїланд мають різні місця як у глобальній економіці, так і в рейтингу демократії, причому найбільша економіка серед них у Таїланду, тоді як у рейтингу демократії ці країни мають значні виклики через політичну нестабільність.
-
- Кіберзлочинність є глобальною проблемою, що зачіпає багато країн світу.
Суми збитків від кіберзлочинів стрімко зростають з кожним роком. Ось деякі з провідних країн за рівнем кіберзлочинності та орієнтовними сумами збитків за останні роки:
1. США
- Збитки у 2022 році: $10.3 мільярдів
- Деталі: США є однією з найбільш атакованих країн через високий рівень розвитку інтернет-технологій і кількість бізнесів. Частими є фішингові атаки, атаки з метою вимагання, крадіжка даних.
2. Китай
- Збитки у 2022 році: Оцінки варіюються, але сума перевищує $2 мільярди
- Деталі: Хоча більшість кібератак з Китаю спрямовані назовні, внутрішній рівень кіберзлочинності також зростає. Частими є промисловий шпигунство і хакерські атаки на великі компанії.
3. Німеччина
- Збитки у 2022 році: Близько €203 мільярдів ($215 мільярдів)
- Деталі: Німеччина стала головною мішенню кіберзлочинців, зокрема для атак на бізнеси та критичну інфраструктуру. Промислові компанії потерпають від промислового шпигунства і крадіжки інтелектуальної власності.
4. Індія
- Збитки у 2022 році: $4.3 мільярди
- Деталі: Індія, з великою кількістю користувачів інтернету, стає важливою мішенню для кіберзлочинців. Основні загрози включають фінансові шахрайства, атаки на онлайн-платежі та крадіжку даних.
5. Великобританія
- Збитки у 2022 році: Близько £2.5 мільярдів ($3.1 мільярди)
- Деталі: В Великобританії зростає кількість шахрайств, пов'язаних з криптовалютами, а також кібератак на банківський сектор.
6. Бразилія
- Збитки у 2022 році: $2.1 мільярди
- Деталі: Зростання числа кібератак, пов'язаних із шахрайством в електронній комерції та банківському секторі. Бразилія також стикається з великою кількістю фішингових атак.
7. Росія
- Збитки у 2022 році: Точні суми збитків не розкриваються, але оцінки перевищують $2 мільярди
- Деталі: Росія є як жертвою, так і джерелом значної кількості кібератак. Проблеми з кібербезпекою часто пов’язані з внутрішніми атаками на критичну інфраструктуру та урядові установи.
8. Австралія
- Збитки у 2022 році: $3.5 мільярди
- Деталі: В Австралії фіксується зростання атак на сектор охорони здоров'я та державні установи, а також великі витоки персональних даних.
9. Канада
- Збитки у 2022 році: $3 мільярди
- Деталі: Основні цілі — урядові установи та банківський сектор. Також поширені атаки із застосуванням програм-вимагачів.
10. Японія
- Збитки у 2022 році: Близько $1.5 мільярдів
- Деталі: Кібератаки на фінансові установи і компанії, пов'язані з технологіями. Частими є атаки з метою крадіжки інтелектуальної власності та комерційної інформації.
---
Глобальні дані:
- Збитки від кіберзлочинності у 2022 році: $8.44 трильйони
- Прогноз на 2023 рік: $11.5 трильйонів
- Прогноз на 2025 рік: $10.5 трильйонів щорічно
Кіберзлочинність продовжує зростати, ставлячи під загрозу бізнеси, урядові установи та індивідуальних користувачів. Основними загрозами залишаються фішинг, злом даних, програми-вимагачі, кібершпигунство та криптовалютні шахрайства.
- **Post-Exploit Actions: How DAO Projects Can Recover from a Hack**
Rewritten and Translated Text:
Post-Exploit Actions: How DAO Projects Can Recover from a Hack
After an exploit like the one Tapioka DAO faced, where $1.6 million worth of TAP tokens were stolen, there are several critical steps that projects can take to mitigate the damage and regain trust within the community:
-
Immediate Suspension of Operations and Smart Contracts
- Actions: Upon discovering an exploit, the first and most important step is to freeze all operations and halt any vulnerable smart contracts. This can prevent further token drain and minimize losses.
- Goal: Preserve remaining assets and stop the exploit from escalating.
-
Thorough Smart Contract Audit
- Actions: A complete audit of the platform’s code by independent experts is crucial. This can reveal the root cause of the vulnerability and identify other potential weak points.
- Goal: Strengthen security by fixing the exploited vulnerabilities and preventing future attacks.
-
Compensation Plan for Users
- Actions: Depending on available resources, the team behind the DAO may implement a compensation plan to reimburse affected users. Options could include payouts from reserve funds, issuance of new tokens, or a structured compensation program.
- Goal: Restore confidence by showing accountability and care for community members.
-
Negotiations with Hackers
- Actions: In some cases, projects can initiate negotiations with the hackers (sometimes through white-hat hackers) to return the stolen funds, potentially offering a reward or legal amnesty.
- Goal: Recover part or all of the stolen assets and limit further damage to the platform.
-
Utilizing Insurance Solutions
- Actions: If the DAO had insurance coverage, claims should be filed to help offset the financial loss. Additionally, projects may consider setting up a reserve fund for future incidents.
- Goal: Provide financial support to absorb the impact of the attack and prevent the collapse of the project.
-
Improved Communication with the Community
- Actions: Transparency is key. The project team should publish detailed reports explaining the exploit, the steps taken to mitigate it, and future plans. Open communication fosters trust.
- Goal: Maintain community trust by being open and transparent about the situation and recovery process.
-
Revisiting Governance Mechanisms
- Actions: DAO governance can be improved by revisiting voting processes and decision-making protocols to make the system more resilient against attacks and ensure community participation in security measures.
- Goal: Strengthen internal controls and governance to prevent malicious actors from exploiting weak points.
-
Risk Awareness and Education
- Actions: Educating both developers and community members about security best practices, as well as implementing continuous monitoring for suspicious activities, is crucial.
- Goal: Build a culture of security and vigilance within the project to mitigate future risks.
By implementing these steps, projects like Tapioka DAO can mitigate the damage caused by the exploit, strengthen security, and regain the trust of the community. While recovering from a significant hack is challenging, with transparency, improved security practices, and community support, DAOs can move forward and build more resilient systems.
---
Hashtags:
- #TapiokaDAO
- #DeFiSecurity
- #CryptoHack
- #SmartContractAudit
- #BlockchainSecurity
- #TokenTheft
- #DAORecovery
- #CryptoCompensation
- #DAOGovernance
- #TransparencyInCrypto
---
Now, for the illustration:
Concept for Illustration:
The image should depict a symbolic recovery after a major exploit. The main visual could feature a DAO symbol (like Tapioka DAO's) being mended or repaired. In the foreground, there could be broken tokens scattered, while in the background, a team of figures (representing developers and community members) work to rebuild a large blockchain-like structure.
The atmosphere should convey hope and effort, showing a transition from chaos to restoration.
The illustration conveys the concept of recovery after a major exploit, with a focus on the repair of the DAO symbol and the rebuilding of the blockchain structure. The scattered tokens in the foreground symbolize the chaos that is being gradually restored through teamwork and community effort.
https://bastyon.com/nwl2024?ref=PAFScHnACz3qwomsupS7QyvAB7KifCj7gu
https://bastyon.com/nwl2024?s=28230aceedbb3c0af5c22f288c2d3113a48849c3fb4e12e668d084d4f3864031&ref=PAFScHnACz3qwomsupS7QyvAB7KifCj7gu
-
- Kazakhstan to Ban Money Transfers to Foreign Cryptocurrency Exchanges
Note: Kazakhstan to Ban Money Transfers to Foreign Cryptocurrency Exchanges
The National Bank of Kazakhstan is set to impose a ban on money transfers to foreign cryptocurrency exchanges. This decision is part of a broader initiative to enhance financial regulation and oversight within the country’s cryptocurrency sector.
The primary objective behind this measure is to mitigate risks associated with money laundering and other illicit financial activities linked to cryptocurrency trading. By restricting access to foreign exchanges, the bank aims to safeguard the financial system and protect citizens from potential scams and volatility inherent in the crypto market.
The move aligns with a growing global trend where regulatory authorities are tightening controls over cryptocurrency transactions to maintain financial stability. Kazakhstan's decision reflects increasing concerns regarding the transparency and security of digital asset transactions.
As the cryptocurrency landscape continues to evolve, this ban may prompt local investors and traders to explore alternative solutions, such as domestic exchanges or decentralized platforms. Stakeholders in the cryptocurrency space should remain vigilant and adapt to the changing regulatory environment to ensure compliance and protect their investments.
This ban could significantly impact Kazakhstan's crypto ecosystem, potentially driving innovation towards compliant solutions while simultaneously raising questions about financial freedom and individual rights in the context of digital finance.
- **The Changing Arguments of Arabs in Historical Context: From Supporting Hitler to Religious War**
Title:
Keywords:
arguments, Arabs, Hitler, Grand Mufti of Jerusalem, El Alamein, jihad, Jewish state, Islam, religious war, history of the Middle East
Introduction:
The history of the Middle East is multifaceted and complex, particularly regarding relations between Arabs and Jews. Over the decades, these relationships have undergone significant changes driven by political, social, and religious factors. This article explores how the arguments of Arabs have evolved over time, from supporting Nazi Germany during World War II to the modern-day manifestations of religious war against the Jewish state. Specifically, we will focus on the role of the Grand Mufti of Jerusalem, Al-Husseini, his contacts with Hitler, and the impact this had on shaping Arab perceptions of the Jewish population and the establishment of the state of Israel. Additionally, this article will analyze how the shift in arguments reflects the Arabs' perception of their own rights and values in the context of the struggle for land and religious identity.
It is indicative how the arguments of Muslims have changed over time. When Rommel was chasing the British through the desert, almost all Arabs supported Hitler. The Grand Mufti of Jerusalem, Al-Husseini, met with Hitler and called him "the protector of Islam," while Hitler, in turn, promised the Mufti to "eliminate Jewish elements in the Middle East."
But then came El Alamein, and the smartest Arabs began to realize they had backed the wrong horse. This realization didn't fully reach the Grand Mufti until the end of the war. In 1944, on "Radio Berlin," the Mufti called for the entire Islamic world to wage jihad against the Jews. Meanwhile, other Arabs began actively engaging with the British and Americans. A substantial correspondence between Arab leaders and Allied diplomatic missions has been preserved.
The most interesting aspect of this correspondence is the reasoning Arabs gave for being categorically opposed to a Jewish state. There was only one argument:
"We conquered this land, so it is ours forever. Wherever the foot of a Muslim horse has stepped, that land belongs to the Prophet. If we have to fight for two hundred years, we will fight for two hundred years. We won't live here ourselves, and we won't let the Jews live here either. Dar al-Harb. 'Fight those among the People of the Book who do not believe in Allah or the Last Day, who do not forbid what Allah and His Messenger have forbidden, and who do not follow the true religion, until they pay the jizya with willing submission and feel themselves subdued.' Surah At-Tawbah 9:29."
At that time, this was a strong argument. Soon, the Germans would lose the war and be driven out of East Prussia, Poland, and Czechoslovakia. The Japanese lost the war and were expelled from Korea, China, Sakhalin, and the Kuril Islands.
All the talk about the "poor Palestinian people," white oppressors, ancestral graves, the Al-Aqsa Mosque, the importance of fighting colonialism, and so on, was invented much later, when the primary argument ceased to resonate with the Western public. This is not a fight for the rights of the unfortunate Palestinians — the Arabs couldn't care less about them. This is a religious war.
Conclusion
The historical evolution of Arab arguments concerning Jews and the establishment of the Jewish state reveals a complex interplay of political, social, and religious dynamics. Initially, figures like the Grand Mufti of Jerusalem aligned themselves with oppressive regimes, believing that such alliances would bolster their cause. However, as geopolitical realities shifted, so did the arguments and strategies employed by Arab leaders and communities. Today, the discourse is heavily influenced by both historical grievances and contemporary political struggles, highlighting the ongoing conflict's religious and ideological dimensions. Understanding this evolution is crucial for addressing the challenges and potential pathways toward peace in the region.
Bibliography
- Khalidi, Rashid. The Iron Cage: The Story of the Palestinian Struggle for Statehood. Beacon Press, 2006.
- Morris, Benny. 1948: The First Arab-Israeli War. Yale University Press, 2008.
- Shlaim, Avi. The Iron Wall: Israel and the Arab World. Norton & Company, 2001.
- Pappe, Ilan. The Ethnic Cleansing of Palestine. Oneworld Publications, 2006.
- Friedman, Thomas L. From Beirut to Jerusalem. Farrar, Straus and Giroux, 1995.
Hashtags
#ArabArguments, #JewishState, #GrandMufti, #HistoricalConflict, #MiddleEastHistory, #PoliticalDynamics, #ReligiousWar, #PalestinianStruggle, #PeaceProcess, #Geopolitics, #CulturalIdentity, #HistoricalNarrative, #IslamicHistory, #WorldWarII, #NaziGermany, #Colonialism, #Jihad, #PublicOpinion, #ModernConflict, #EthnicRelations, #HistoricalEvolution, #CulturalStudies, #ConflictResolution
- ### Title: The Bastion Blockchain Platform: Issues and Future Steps
Extended Title: Examining the Key Challenges of Bastion and the Solutions Needed for its Growth
Introduction:
If you're looking for anonymous communication, Bastion is ideal. However, the platform heavily relies on node operators who are driven by the need to make money. Without financial incentive, these operators might not support Bastion long-term. Here's a breakdown of the main problems and possible solutions.
Core Issues:
-
Node Costs: Operating a node is expensive. It requires investing in dedicated IP addresses, reliable internet connections, and additional hardware. Furthermore, operators must spend money to stake initial tokens, aiming at least to break even, if not make a profit.
-
Staking and Revenue: Many operators stake Pitcoins (Bastion's token), hoping to cover their costs and earn additional revenue. But, in reality, monetizing these rewards is challenging.
-
Token Conversion & Anonymity: To maintain privacy, some operators avoid converting Pitcoins via platforms that require identity verification, which diminishes Bastion’s value as a truly anonymous system. They face challenges in converting tokens into real money, making it hard to remain anonymous while interacting with crypto exchanges.
Competitor Challenges:
Many of Bastion's competitors face similar issues—high operational costs and difficulties maintaining anonymity when converting tokens. For example, operating nodes in other decentralized systems also involves significant investment in infrastructure and lacks seamless solutions for monetization.
Solutions:
-
Token Conversion Improvements: Bastion could integrate a secure, anonymous solution for converting Pitcoins into real currency without exposing user identities.
-
Reward Programs for Node Operators: Bastion could introduce a more attractive rewards system to encourage node participation, ensuring the network remains robust.
-
Efficient Cost Management: Operators could benefit from subsidies or reduced operational costs through partnerships or grants to maintain their nodes without losing money.
Who Will Lead the Change?
For change to happen, Bastion’s development team must prioritize solving these challenges. Node operators, developers, and the wider crypto community will need to collaborate, while the first step will likely come from Bastion itself, with support from early adopters and crypto enthusiasts.
Conclusion:
In conclusion, while Bastion offers great potential as an anonymous communication platform, it faces significant challenges in maintaining long-term growth. Whether through more secure conversion methods or innovative rewards, addressing these concerns will be crucial to its future success.
Bibliography & Hashtags:
- Pitcoin & Blockchain Technology Resources
- Anonymity in Decentralized Platforms
Hashtags: #Bastion #BlockchainIssues #Pitcoin #CryptoNodes #Decentralization
---
This structure makes the article readable and engaging while addressing the main concerns for the audience interested in blockchain-based platforms like Bastion.
-
- ### The Most Horrifying Thriller About Modern Russian Reality
The harsh reality of the Yeltsin era in Russia, which divided the nation into a few wealthy elites and many impoverished citizens, inspired the creation of Outskirts by Pyotr Lutsik—a gripping, symbolic epic about a violent peasant uprising. Set in an isolated village in the Urals, men march to Moscow to restore their sense of justice through brutal means, burning the city in a symbolic act of revolt. The film’s stark, unapologetic realism makes even Hitchcock's thrillers seem lighthearted in comparison.
Outskirts was unofficially banned in Russia due to its potential to incite social unrest, reflecting the enduring tension in Russia’s post-capitalist society.
Filmography:
- Outskirts (Окраина) (1998), directed by Pyotr Lutsik
Hashtags:
#Outskirts #RussianThriller #RussianReality #PeasantRevolt #SymbolismInCinema #LutsikFilm #YeltsinEra #BannedCinema #RussianFilms #ThrillerMovie #CinematicMasterpiece #SocialCommentary #RussianHistory #PoliticalThriller #RussianCinema
- Источник ВЧК-ОГПУ сообщает, что в деле экс-замминистра обороны Тимура Иванова о миллиардных хищениях у банка «Интеркоммерц» и махинациях с покупкой кораблей
в обход санкций, может появиться новое обвинение. А фигурантов уже сейчас «пугают» возбуждением статьи об участии в ОПГ.
По данным собеседника, именно под страхом 210 статьи УК РФ ключевые соучастники Тимура Иванова и его доверенного лица, директора ООО «Оборонлогистика» Антона Филатова сдали все коррупционные и откровенно мошеннические схемы с потрохами. Ведь проворачивали такие масштабные аферы не только те, с кем сейчас работают следователи, и не только сбежавшие банкиры и номиналы.
Так, в ближайшее время для участия в следственных действиях может быть приглашена бывший зам Тимура Иванова по «Оборонстрою» экс-руководитель скандально известного «Оборонсервиса» Лариса Левина. Она была посвящена во все тонкости и лично общалась с бывшим председателем правления «Интеркоммерца» Александром Бугаевским, а также тогдашним главой латвийского банка «Rietumu» Романом Бычковичем, который подыскал гонконгскую фирму для сделки.
В компании с ней на допрос отправится Евгений Гудзенчук из ОАО «Зарубежводстрой», которое получало тот самый кредит в «Интеркоммерце» на корабли. Напомним, 25 % от этих денег благополучно распилили между собой участники схемы, а долг покрывали ценными бумагами «Оборонстроя», с легкой руки Ларисы Левиной и Тимура Иванова.
Со стороны банка по-настоящему (председатель правления «Интеркоммерца» Александр Бугаевский и глава кредитного департамента Алексей Резван покинули РФ) в «зоне риска» завсегдатая постов ВЧК-ОГПУ экс-советница сбежавшего главы банка Елена Клишина. Она не только лично участвовала во всех схемах, но и осталась прикрывать опальных коллег и партнёров, подчистив в банке всю историю сделок. Речь, в том числе, о данных на номинала по фамилии Мамонтов, через которого которого Антон Филатов (по сути, Тимур Иванов) получил флешку удаленного доступа фирмой, через которую «растворили» миллиарды рублей.
https://t.me/vchkogpu/47835
- The exchange triangle method (or arbitrage triangle) is a strategy for making profits due to temporary differences in cryptocurrency rates on different trading pairs.
This strategy is based on the idea of buying and selling three different cryptocurrencies within the same market or exchange to return to the original currency, but with more coins due to the difference in rates.
How the arbitrage triangle works:
- Purchase of cryptocurrency A for the base currency (for example, buying BTC for USDT).
- Exchange cryptocurrency A for cryptocurrency B** (for example, BTC for ETH).
- exchange cryptocurrency B back to the base currency** (for example, ETH for USDT).
If the prices of different pairs are set in such a way that the amount of the base currency increases after the cycle is completed, the trader makes a profit. The main risk lies in the rapid change in rates, which can “destroy” the arbitrage window before all transactions are completed.
This method requires quick action, as arbitrage opportunities can disappear in seconds due to the high level of market automation.
- Monero Project admits thieves stole 6-figure sum from a wallet in mystery breachwww.theregister.com Monero Project admits thieves stole $437k in mystery breach
It's the latest in a string of unusual wallet-draining attacks that began in April
- Launch of two AGM-88 HARM anti-radar missiles from a Ukrainian MiG-29 fighter.
cross-posted from: https://sopuli.xyz/post/13661974
> https://t.me/ukrbavovna/15275 > >
- ### Media Landscape Transformation in Russia: YouTube Decline and Local Platforms Rise
The digital space in Russia is undergoing rapid changes, especially after YouTube's audience dropped by 5 million users over the past year. The shift from global video hosting platforms like YouTube to local alternatives such as Telegram, VK Video, and Rutube signals significant structural changes in user behavior.
Main Reasons for YouTube’s Decline
Key factors include:
- YouTube restrictions and performance issues in Russia.
- Growing popularity of local video platforms with better content adaptation.
Emergence of Local Leaders
Telegram, VK, and Rutube have taken advantage of YouTube's challenges and emerged as dominant players. Their recommendation systems and localized content have significantly improved user experiences.
Forecast
Further decline in YouTube’s popularity is expected, with local platforms solidifying their presence amidst political and economic pressures.
---
Bibliography:
- Mediascope Report: “Аудитория YouTube снизилась на 5 млн человек за год” - Mediascope, 2024.
- Telegram Growth Analysis: Comparative Analysis of Social Media Usage in Russia, 2023.
- VK Video and Rutube Developments: The rise of local media platforms in Russia, 2024.
---
Hashtags:
#YouTubeDecline #MediaAnalysis #VKVideo #Rutube #TelegramGrowth #RussiaMedia #DigitalTransformation #ContentPlatforms
The article on Habr discusses the decline in YouTube's audience in Russia, which decreased by 5 million users in one year, dropping to 47 million. In contrast, platforms like Telegram and VK saw significant growth, largely due to improved content delivery and recommendation systems. The shift away from YouTube is attributed to performance issues in Russia, leading users to alternatives like VK Video and Rutube. Experts predict that YouTube's popularity in Russia will continue to decline.
For more details, you can view the full article here.
Support for Media Industry Analytical Forecasting Project
We invite you to support our independent, volunteer-driven research project focused on analytical forecasting in the media industry. Contributions can be made through donations or by sharing this initiative to inform interested parties. Your support will help us maintain the private and unbiased nature of our study, ensuring it serves the community effectively. Thank you for your interest and support!
XMR Donate!
89CeaYmwx19GLyxzAYrCprBS5sFBfejHF696UK42RC7XYffdBqN8VTUQr9PkWbGYLLNTnZCEGwsjcaXgeEfY8YkN7FvEuQa
https://matrix.to/#/!sXgHSctyNiDduGJcMi:matrix.org/$ICOT9SN8JO-kmsghnOouS9hl5j7bl3KBlG_1IcczqrA?via=matrix.org
- The complete guide to building your personal self hosted server for streaming and ad-blocking powered by Plex, Jellyfin, Adguard Home and Docker.
cross-posted from: https://lemmy.dbzer0.com/post/5911320
> # The complete guide to building your personal self hosted server for streaming and ad-blocking. > > Captain's note: This
OC
was originally posted in reddit but its quality makes me wants to ensure a copy survices in lemmy as well. > > --- > > We will setup the following applications in this guide: > > * Docker > * AdguardHome \- Adblocker for all your devices > * Jellyfin/Plex \- For watching the content you download > * Qbittorrent \- Torrent downloader > * Jackett \- Torrent indexers provider > * Flaresolverr \- For auto solving captcha in some of the indexers > * Sonarr \- \*arr service for automatically downloading TV shows > * Radarr \- \*arr service for movies > * Readarr \- \*arr service for (audio)books > * lidarr \- \*arr service for music > * Bazarr \- Automatically downloads subtitles for Sonarr and Radarr > * Ombi/Overseer \- For requesting movies and tv shows through Sonarr and Radarr > * Heimdall \- Dashboard for all the services so you don't need to remember all the ports > > Once you are done, your dashboard will look something like this. > > > > Heimdall Dashboard > > I started building my setup after reading this guide https://www.reddit.com/r/Piracy/comments/ma1hlm/the\_complete\_guide\_to\_building\_your\_own\_personal/. > > ## Hardware > > You don't need powerful hardware to set this up. I use a decade old computer, with the following hardware. Raspberry pi works fine. > > > > Hardware > > ## Operating system > > I will be using Ubuntu server in this guide. You can select whatever linux distro you prefer. > > Download ubuntu server from https://ubuntu.com/download/server. Create a bootable USB drive using rufus or any other software(I prefer ventoy). Plug the usb on your computer, and select the usb drive from the boot menu and install ubuntu server. Follow the steps to install and configure ubuntu, and make sure to check "Install OpenSSH server". Don't install docker during the setup as the snap version is installed. > > Once installation finishes you can now reboot and connect to your machine remotely using ssh. > > ssh username@server-ip > # username you selected during installation > # Type ip a to find out the ip address of your server. Will be present against device like enp4s0 prefixed with 192.168. > > ## Create the directories for audiobooks, books, movies, music and tv. > > I keep all my media at \~/server/media. If you will be using multiple drives you can look up how to mount drives. > > We will be using hardlinks so once the torrents are downloaded they are linked to media directory as well as torrents directory without using double storage space. Read up the trash-guides to have a better understanding. > > mkdir ~/server > mkdir ~/server/media # Media directory > mkdir ~/server/torrents # Torrents > > # Creating the directories for torrents > cd ~/server/torrents > mkdir audiobooks books incomplete movies music tv > > cd ~/server/media > mkdir audiobooks books movies music tv > > ## Installing docker and docker-compose > > Docker https://docs.docker.com/engine/install/ubuntu/ > > # install packages to allow apt to use a repository over HTTPS > sudo apt-get update > sudo apt-get install \ > apt-transport-https \ > ca-certificates \ > curl \ > gnupg \ > lsb-release > # Add Docker’s official GPG key: > curl -fsSL https://download.docker.com/linux/ubuntu/gpg | sudo gpg --dearmor -o /usr/share/keyrings/docker-archive-keyring.gpg > # Setup the repository > echo \ > "deb [arch=amd64 signed-by=/usr/share/keyrings/docker-archive-keyring.gpg] https://download.docker.com/linux/ubuntu \ > $(lsb_release -cs) stable" | sudo tee /etc/apt/sources.list.d/docker.list > /dev/null > # Install Docker Engine > sudo apt-get update > sudo apt-get install docker-ce docker-ce-cli containerd.io > # Add user to the docker group to run docker commands without requiring root > sudo usermod -aG docker $(whoami) > > >Sign out by typing exit in the console and then ssh back in > > Docker compose https://docs.docker.com/compose/install/ > > # Download the current stable release of Docker Compose > sudo curl -L "https://github.com/docker/compose/releases/download/1.29.2/docker-compose-$(uname -s)-$(uname -m)" -o /usr/local/bin/docker-compose > # Apply executable permissions to the binary > sudo chmod +x /usr/local/bin/docker-compose > > ## Creating the compose file for Adguard home > > First setup Adguard home in a new compose file. > > Docker compose uses a yml file. All of the files contain version and services object. > > Create a directory for keeping the compose files. > > mkdir ~/server/compose > mkdir ~/server/compose/adguard-home > vi ~/server/compose/adguard-home/docker-compose.yml > > Save the following content to the docker-compose.yml file. You can see here what each port does. > > version: '3.3' > services: > run: > container_name: adguardhome > restart: unless-stopped > volumes: > - '/home/${USER}/server/configs/adguardhome/workdir:/opt/adguardhome/work' > - '/home/${USER}/server/configs/adguardhome/confdir:/opt/adguardhome/conf' > ports: > - '53:53/tcp' > - '53:53/udp' > - '67:67/udp' > - '68:68/udp' > - '68:68/tcp' > - '80:80/tcp' > - '443:443/tcp' > - '443:443/udp' > - '3000:3000/tcp' > image: adguard/adguardhome > > Save the file and start the container using the following command. > > docker-compose up -d > > Open up the Adguard home setup onYOUR_SERVER_IP:3000
. > > Enable the default filter list from filters→DNS blocklist. You can then add custom filters. > > Filters > > ## Creating the compose file for media-server > > ## Jackett > > Jackett is where you define all your torrent indexers. All the \arr apps use the tornzab feed provided by jackett to search torrents. > > There is now an \arr app called prowlarr that is meant to be the replacement for jackett. But the flaresolverr(used for auto solving captchas) support was added very recently and doesn't work that well as compared to jackett, so I am still sticking with jackett for meantime. You can instead use prowlarr if none of your indexers use captcha. > > jackett: > container_name: jackett > image: linuxserver/jackett > environment: > - PUID=1000 > - PGID=1000 > - TZ=Asia/Kolkata > volumes: > - '/home/${USER}/server/configs/jackett:/config' > - '/home/${USER}/server/torrents:/downloads' > ports: > - '9117:9117' > restart: unless-stopped > prowlarr: > container_name: prowlarr > image: 'hotio/prowlarr:testing' > ports: > - '9696:9696' > environment: > - PUID=1000 > - PGID=1000 > - TZ=Asia/Kolkata > volumes: > - '/home/${USER}/server/configs/prowlarr:/config' > restart: unless-stopped > > ## Sonarr - TV > > Sonarr is a TV show scheduling and searching download program. It will take a list of shows you enjoy, search via Jackett, and add them to the qbittorrent downloads queue. > > sonarr: > container_name: sonarr > image: linuxserver/sonarr > environment: > - PUID=1000 > - PGID=1000 > - TZ=Asia/Kolkata > ports: > - '8989:8989' > volumes: > - '/home/${USER}/server/configs/sonarr:/config' > - '/home/${USER}/server:/data' > restart: unless-stopped > > ## Radarr - Movies > > Sonarr but for movies. > > radarr: > container_name: radarr > image: linuxserver/radarr > environment: > - PUID=1000 > - PGID=1000 > - TZ=Asia/Kolkata > ports: > - '7878:7878' > volumes: > - '/home/${USER}/server/configs/radarr:/config' > - '/home/${USER}/server:/data' > restart: unless-stopped > > ## Lidarr - Music > > lidarr: > container_name: lidarr > image: ghcr.io/linuxserver/lidarr > environment: > - PUID=1000 > - PGID=1000 > - TZ=Asia/Kolkata > volumes: > - '/home/${USER}/server/configs/liadarr:/config' > - '/home/${USER}/server:/data' > ports: > - '8686:8686' > restart: unless-stopped > > ## Readarr - Books and AudioBooks > > # Notice the different port for the audiobook container > readarr: > container_name: readarr > image: 'hotio/readarr:nightly' > ports: > - '8787:8787' > environment: > - PUID=1000 > - PGID=1000 > - TZ=Asia/Kolkata > volumes: > - '/home/${USER}/server/configs/readarr:/config' > - '/home/${USER}/server:/data' > restart: unless-stopped > > readarr-audio-books: > container_name: readarr-audio-books > image: 'hotio/readarr:nightly' > ports: > - '8786:8787' > environment: > - PUID=1000 > - PGID=1000 > - TZ=Asia/Kolkata > volumes: > - '/home/${USER}/server/configs/readarr-audio-books:/config' > - '/home/${USER}/server:/data' > restart: unless-stopped > > ## Bazarr - Subtitles > > bazarr: > container_name: bazarr > image: ghcr.io/linuxserver/bazarr > environment: > - PUID=1000 > - PGID=1000 > - TZ=Asia/Kolkata > volumes: > - '/home/${USER}/server/configs/bazarr:/config' > - '/home/${USER}/server:/data' > ports: > - '6767:6767' > restart: unless-stopped > > ## Jellyfin > > I personally only use jellyfin because it's completely free. I still have plex installed because overseerr which is used to request movies and tv shows require plex. But that's the only role plex has in my setup. > > I will talk about the devices section later on. > > For the media volume you only need to provide access to the/data/media
directory instead of/data
as jellyfin doesn't need to know about the torrents. > > jellyfin: > container_name: jellyfin > image: ghcr.io/linuxserver/jellyfin > environment: > - PUID=1000 > - PGID=1000 > - TZ=Asia/Kolkata > ports: > - '8096:8096' > devices: > - '/dev/dri/renderD128:/dev/dri/renderD128' > - '/dev/dri/card0:/dev/dri/card0' > volumes: > - '/home/${USER}/server/configs/jellyfin:/config' > - '/home/${USER}/server/media:/data/media' > restart: unless-stopped > > plex: > container_name: plex > image: ghcr.io/linuxserver/plex > ports: > - '32400:32400' > environment: > - PUID=1000 > - PGID=1000 > - TZ=Asia/Kolkata > - VERSION=docker > volumes: > - '/home/${USER}/server/configs/plex:/config' > - '/home/${USER}/server/media:/data/media' > devices: > - '/dev/dri/renderD128:/dev/dri/renderD128' > - '/dev/dri/card0:/dev/dri/card0' > restart: unless-stopped > > ## Overseer/Ombi - Requesting Movies and TV shows > > I use both. You can use ombi only if you don't plan to install plex. > > ombi: > container_name: ombi > image: ghcr.io/linuxserver/ombi > environment: > - PUID=1000 > - PGID=1000 > - TZ=Asia/Kolkata > volumes: > - '/home/${USER}/server/configs/ombi:/config' > ports: > - '3579:3579' > restart: unless-stopped > > overseerr: > container_name: overseerr > image: ghcr.io/linuxserver/overseerr > environment: > - PUID=1000 > - PGID=1000 > - TZ=Asia/Kolkata > volumes: > - '/home/${USER}/server/configs/overseerr:/config' > ports: > - '5055:5055' > restart: unless-stopped > > ## Qbittorrent - Torrent downloader > > I use qflood container. Flood provides a nice UI and this image automatically manages the connection between qbittorrent and flood. > > Qbittorrent only needs access to torrent directory, and not the complete data directory. > > qflood: > container_name: qflood > image: hotio/qflood > ports: > - "8080:8080" > - "3005:3000" > environment: > - PUID=1000 > - PGID=1000 > - UMASK=002 > - TZ=Asia/Kolkata > - FLOOD_AUTH=false > volumes: > - '/home/${USER}/server/configs/qflood:/config' > - '/home/${USER}/server/torrents:/data/torrents' > restart: unless-stopped > > ## Heimdall - Dashboard > > There are multiple dashboard applications but I use Heimdall. > > heimdall: > container_name: heimdall > image: ghcr.io/linuxserver/heimdall > environment: > - PUID=1000 > - PGID=1000 > - TZ=Asia/Kolkata > volumes: > - '/home/${USER}/server/configs/heimdall:/config' > ports: > - 8090:80 > restart: unless-stopped > > ## Flaresolverr - Solves cloudflare captcha > > If your indexers use captcha, you will need flaresolverr for them. > > flaresolverr: > container_name: flaresolverr > image: 'ghcr.io/flaresolverr/flaresolverr:latest' > ports: > - '8191:8191' > environment: > - PUID=1000 > - PGID=1000 > - TZ=Asia/Kolkata > restart: unless-stopped > > ## Transcoding > > As I mentioned in the jellyfin section there is a section in the conmpose file as "devices". It is used for transcoding. If you don't include that section, whenever transcoding happens it will only use CPU. In order to utilise your gpu the devices must be passed on to the container. > > https://jellyfin.org/docs/general/administration/hardware-acceleration.html Read up this guide to setup hardware acceleration for your gpu. > > Generally, the devices are same for intel gpu transcoding. > > devices: > - '/dev/dri/renderD128:/dev/dri/renderD128' > - '/dev/dri/card0:/dev/dri/card0' > > To monitor the gpu usage installintel-gpu-tools
> > sudo apt install intel-gpu-tools > > Now, create a compose file for media server. > > mkdir ~/server/compose/media-server > vi ~/server/compose/media-server/docker-compose.yml > > And copy all the containers you want to use under services. Remember to add the version string just like adguard home compose file. > > ## Configuring the docker stack > > Start the containers using the same command we used to start the adguard home container. > > docker-compose up -d > > ## Jackett > > Navigate toYOUR_SERVER_IP:9117
> > Add a few indexers to jackett using the "add indexer" button. You can see the indexers I use in the image below. > > > > Indexers > > ## Qbittorrent > > Navigate toYOUR_SERVER_IP:8080
> > The default username isadmin
and passwordadminadmin
. You can change the user and password by going toTools → Options → WebUI
> > Change "Default Save Path" in WebUI section to/data/torrents/
and "Keep incomplete torrents in" to/data/torrents/incomplete/
> > Create categories by right clicking on sidebar under category. Type category asTV
and path astv
. Path needs to be same as the folder you created to store your media. Similarly for movies typeMovies
as category and path asmovies
. This will enable to automatically move the media to its correct folder. > > ## Sonarr > > Navigate toYOUR_SERVER_IP:8989
> > * Under "Download Clients" add qbittorrent. Enter the host asYOUR_SERVER_IP
port as**8080
,\\ and the username and password you used for qbittorrent. In category typeTV
(or whatever you selected as category name(not path) on qbittorent). Test the connection and then save. > * Under indexers, for each indexer you added in Jackett > * Click on add button > * Select Torzab > * Copy the tornzab feed for the indexer from jackett > * Copy the api key from jackett > * Select the categories you want > * Test and save > * Under general, define the root folder as/data/media/tv
> > >Repeat this process for Radarr, Lidarr and readarr. > > Use/data/media/movies
as root for Radarr and so on. > > >The setup for ombi/overseerr is super simple. Just hit the url and follow the on screen instructions. > > ## Bazarr > > Navigate toYOUR_SERVER_IP:6767
> > Go to settings and then sonarr. Enter the host asYOUR_SERVER_IP
port as8989
. Copy the api key from sonarr settings→general. > > Similarly for radarr, enter the host asYOUR_SERVER_IP
port as7878
. Copy the api key from radarr settings→general. > > ## Jellyfin > > Go toYOUR_SERVER_IP:8096
> > * Add all the libraries by selecting content type and then giving a name for that library. Select the particular library location from/data/media
. Repeat this for movies, tv, music, books and audiobooks. > * Go to dashboard→playback, and enable transcoding by selecting asVAAPI
and enter the device as/dev/dri/renderD128
> > Monitor GPU usage while playing content using > > sudo intel_gpu_top > > ## Heimdall > > Navigate toYOUR_SERVER_IP:8090
> > Setup all the services you use so you don't need to remember the ports like I showed in the first screenshot. > > ## Updating docker images > > With docker compose updates are very easy. > > * Navigate to the compose file directory~/server/compose/media-server
. > * Thendocker-compose pull
to download the latest images. > * And finallydocker-compose up -d
to use the latest images. > * Remove old images bydocker system prune -a
> > ## What's next > > * You can setup VPN if torrents are blocked by your ISP/Country. I wanted to keep this guide simple and I don't use VPN for my server, so I have left out the VPN part. > * You can read about port forwarding to access your server over the internet. > - Пейджеры, использованные для атаки на членов движения «Хезболла», были сконструированы израильской разведкой «Моссад» таким образом, что при нажатии кнопок сразу двумя руками происходил взрыв, пишет W
Пейджеры, использованные для атаки на членов движения «Хезболла», были сконструированы израильской разведкой «Моссад» таким образом, что при нажатии кнопок сразу двумя руками происходил взрыв, пишет Washington Post.
Операцию по внедрению заминированных пейджеров израильская разведка вела с 2015 года. В состав конструкции входил крупный аккумулятор, замаскированное взрывчатое вещество, а также устройство контроля сообщений. Подробнее: Пейджеры, поступившие «Хезболле» под брендом Apollo, были устроены так, что взрывчатое вещество невозможно было найти даже при полной разборке устройства. Как уточняют источники, тайваньский бренд Apollo нужен был для прикрытия, а в самой компании не знали, что от их лица отправляли предложения «Хезболле». Взрывчатое вещество было еще более мощным, а конструкция была устроена таким образом, что для чтения защищенных сообщений нужно было взять пейджер обеими руками, так что после взрыва владелец устройства получал максимальный урон.
- Proton Wallet Review: Is Proton Losing Touch? - Privacy Guides
cross-posted from: https://lemmy.world/post/19578789
> >Proton, the Swiss creators of privacy-focused products like Proton Mail and ProtonVPN, recently released the latest product in their ever-growing lineup: Proton Wallet. Announced at the end of July 2024, it promotes itself as "an easy-to-use, self-custodial" Bitcoin wallet that will ostensibly make financial freedom more attainable for everyone. > > >It may well be that Proton Wallet is the easiest way to start using Bitcoin, but is a Bitcoin wallet the solution people need to improve their financial privacy? > > >Contrary to popular belief, cryptocurrency is not an inherently private transactional system. > > >Had Proton Wallet added support for Monero or a similarly private cryptocurrency, they could have single-handedly boosted a financial system that is actually private by default by a significant degree. In my eyes, failing to do so in favor of the market leader is an unfortunate step back from their "privacy by default" mantra. > > >Proton Wallet seems like a product that doesn't know its own place in the world. > > >Is it meant to save us from the tyranny of payment processors like PayPal who can freeze your funds at a whim? > > >Or, was Bitcoin chosen to give us independence from fiat currency, including stablecoins, entirely? > > >However, if Proton Wallet wasn't meant for all that, if it was simply meant to bring privacy to Bitcoin, then it's certainly a failure. > > >Proton hasn't taken any risks with this product, meaning it's really only good for satisfying a singular belief: That Bitcoin is just inherently good, and anything to promote Bitcoin is inherently good as well. I don't share these fanatical beliefs of Bitcoin maximalists, however, when Bitcoin is demonstrably lacking in a wide variety of ways. > > >Personally, I'm a bit of a cryptocurrency pessimist in general, but I can see some appeal for the technology in very specific areas. Unfortunately, Proton Wallet doesn't seem to fit in to a useful niche in any meaningful way. The functionality it does support is extremely basic, even by Bitcoin standards, and it simply doesn't provide enough value over the existing marketplace. > > >If you're an existing Proton user simply looking for a place to store some Bitcoin you already have sitting around, Proton Wallet might be perfectly adequate. For everyone else, I don't see this product being too useful. Bitcoin is still far too volatile to be a solid investment or used as a safe store of value if you crave financial independence and sovereignty, and Proton Wallet simply isn't adequate for paying for things privately online.
- **Anonymity in the Tor Network Under Threat: German Police Use Ricochet Vulnerability to Unmask Users**
The anonymity of users in the Tor network, long considered one of the most reliable tools for confidential communication and data transmission, is now under threat. Recently, the German police found a way to bypass the network's protective mechanisms, raising serious concerns within the community. The primary method employed by law enforcement is called “timing analyses”—the analysis of traffic timing characteristics that allows the identification of users through their entry points in the Tor network. The key factor in this breakthrough was the exploitation of vulnerabilities in the outdated Ricochet messenger, which has not been updated or supported for a long time.
The Incident's Background
According to a report by NDR, the German police successfully conducted an operation that uncovered the identities of Tor network users by leveraging outdated and unsupported software. Ricochet is a messenger initially designed to work within the anonymous Tor network, allowing users to securely exchange messages without relying on centralized servers. It was conceived as an ideal tool for confidential communication since users could communicate through Tor without revealing their IP addresses.
However, over time, the development of Ricochet ceased, and it stopped receiving updates. This opened the door to potential vulnerabilities that law enforcement exploited. The police applied the "timing analyses" method, which tracks users by analyzing the timing characteristics of their connections to the Tor network and their activity in Ricochet. While the Tor administration denies that this method could be used to directly unmask users, the Ricochet incident demonstrated that it is possible in vulnerable applications.
The Technical Side
"Timing analyses" is a technique where the intervals between user activity and the network's response are analyzed. It allows correlating time stamps of data transmission through certain nodes in the network with user activity. Even in the Tor network, where data is passed through multiple nodes, timing patterns can leave traces that may be used to identify individuals.
In this case, the entry points were outdated versions of Ricochet, which had not received security updates and were thus vulnerable. It is important to note that the Tor network itself remains reliable if used without vulnerable third-party applications. However, the Ricochet incident highlighted the importance of updating software and patching vulnerabilities that can be exploited for de-anonymization.
Community Reaction
After the news broke about German police bypassing Tor's protections, the Tor user community engaged in lively discussions. Many began to question the security of their communications through Tor, especially if they were using outdated or unsupported applications. The Ricochet issue forced many to reassess their approaches to security within anonymous networks.
Technical experts emphasize the importance of using up-to-date software versions and regular updates. They also advise users to be cautious when choosing tools for working with anonymous networks, paying attention not only to the network itself but also to the applications that may be vulnerable.
What’s Next?
In light of these events, serious questions arise for Tor users and the anonymous internet as a whole. The key takeaway from the Ricochet incident is that while the Tor network itself remains reliable, third-party applications such as messengers and other tools can become weak links in the security chain. This once again proves that any system can be vulnerable if its components are not kept up to date.
Users who prioritize confidentiality should take additional precautionary measures. Some possible steps include:
- Regularly updating software and transitioning to the latest versions of tools for working with anonymous networks.
- Avoiding the use of old and unsupported applications, such as Ricochet, which may contain vulnerabilities.
- Employing additional data encryption before transmitting through Tor, making traffic analysis attempts more difficult.
- Using multi-layered protection methods, such as combining VPNs with Tor, to enhance anonymity.
Conclusion
The Ricochet incident is a wake-up call for all anonymous network users. Despite Tor itself remaining relatively secure, old and vulnerable applications can lead to the de-anonymization of users. This further highlights the importance of keeping software up to date and exercising caution when navigating the internet. Users who value their privacy must stay vigilant about emerging threats and continually improve their protective measures.
#Tor #anonymity #security #Ricochet #internet #privacy #hack
retroshare://chat_room?name=Amogus%20leaks&id=LC9B12929BE11F6B4
- В промышленных условиях для замораживания мяса и других продуктов используются различные температурные режимы в зависимости от технологии и целей замораживания.
Самая низкая температура, которая может быть применена в пищевой промышленности, достигает -40°C и ниже.
Основные температурные режимы:
-
Обычное замораживание — происходит при температуре около -18°C. Это стандартная температура хранения в большинстве морозильников, и она достаточно эффективна для долгосрочного хранения мяса.
-
Шоковая заморозка (глубокое замораживание) — применяется для быстрого замораживания мяса и других продуктов при температурах от -30°C до -40°C и даже ниже. Шоковая заморозка предотвращает образование крупных кристаллов льда, что сохраняет текстуру продукта. Это распространенная практика в промышленности для минимизации ущерба структуре мяса.
-
Криогенное замораживание — может использоваться для очень быстрого замораживания продуктов, достигает температур ниже -70°C, используя газы, такие как жидкий азот. Однако этот метод применяют реже из-за его дороговизны.
Влияние низких температур на мясо:
- При температурах до -40°C и ниже структура мяса не страдает, если замораживание происходит быстро (шоковое или криогенное замораживание). Это позволяет предотвратить потерю влаги и сохранить качество продукта при разморозке.
- Температуры ниже -40°C могут использоваться, но это не дает значительных преимуществ в плане хранения обычного мяса, так как оно уже достаточно хорошо защищено при более умеренных температурах.
Таким образом, в промышленности мясо и другие продукты могут выдерживать температуры вплоть до -70°C при криогенном замораживании, и такие методы сохраняют качество продукта без значительных изменений.
-
- Мордор увеличит расходы на армию до нового рекорда: война обойдется в $142 миллиарда в 2025 году.
Правительство России готовится снова резко увеличить расходы бюджета на армию, чтобы оплатить счет за войну в Украине, которая уже обошлась российским налогоплательщикам в 22 триллиона рублей.
В 2025 году федеральная казна потратит по статье «национальная оборона» рекордные 13,2 триллиона рублей, или $142 млрд, сообщает Bloomberg со ссылкой на проект на закона о бюджете, который готовится к внесению в Госдуму.
По сравнению с 2024 годом (10,8 трлн рублей) военные расходы увеличатся еще на 22%, относительно 2023 года (6,8 трлн. рублей) — вдвое, а если сравнивать с довоенным 2021-м (3,5 трлн.) — станут больше практически в 4 раза. Военный бюджет достигнет 6,2% национального ВВП — уровня военных диктатур Африки (6,3% ВВП в Южном Судане), а доля расходов на армию в казне — около 30% — останется на беспрецедентных отметках со времен СССР.
Практически каждый третий рубль в бюджете — 12,9 трлн. рублей в сумме — будет потрачен по засекреченным статьям. Общий объем таких расходов вырастет на 16% по сравнению с текущим годом, или 1,8 трлн рублей.
Еще 3,5 трлн рублей правительство потратит по статье «национальная безопасность», в которую зашиты бюджеты полиции, Росгвардии, Следственного комитета, спецслужб и других силовых структур. В сумме армия и силовики «съедят» 40% федерального бюджета, или 16,7 триллиона рублей.
Расходы бюджета на здравоохранение правительство планирует заморозить на уровне текущего года 1,6 трлн рублей, а на социальную поддержку населения, включая выплаты пенсий и пособий, — заметно сократить. В 2025 году на эти цели будет выделено 6,8 трлн рублей — на 700 млрд меньше, чем в 2024-м.
Расходы на образование, согласно проекту бюджета, незначительно увеличатся — с 1,5 до 1,6 трлн рублей. Заметный рост — на 10%, или 400 млрд рублей, — правительство закладывает по статье «национальная экономика», куда включены ассигнования на мегапроекты и помощь госкорпорациям.
Сбалансировать военный бюджет правительству поможет увеличение налогов: с 2025 года в России начнет действовать прогрессивная шкала налога на доходы физических лиц (НДФЛ), а также вырастет повышен налог на прибыль бизнеса. Это, по расчетам Минфина, принесет в казну дополнительно 2,6 трлн рублей.
- **Bitcoin – A Path to Honest Money and the Ethical OSINT Mission of CASBT INFERNUM1488**
Article Title:
---
Introduction:
In today's digital landscape, where financial transactions are often scrutinized and manipulated by governments, Bitcoin offers a transparent and decentralized alternative. The idea behind Bitcoin as "honest money" has resonated with independent investigators, including OSINT (Open Source Intelligence) analysts such as CASBT INFERNUM1488, whose work delves into the intersection of financial transparency and global intelligence. The ethical application of OSINT aligns seamlessly with Bitcoin's foundational ethos, offering a way to challenge centralized power structures.
Main Body:
Bitcoin's decentralized structure is one of its most compelling attributes. Unlike fiat currencies, it is immune to government manipulation, and transactions cannot be censored. Bitcoin is built on blockchain technology, a public ledger maintained by a network of computers (or nodes) that independently verify transactions. This system fosters transparency, which is crucial for independent investigations into global financial systems.
CASBT INFERNUM1488, a notable figure in OSINT, applies these principles to unravel complex political and financial machinations. By leveraging open-source information, CASBT provides unique insights into hidden or misreported activities by analyzing publicly available data from multiple sources. Just as Bitcoin provides a transparent ledger of transactions, OSINT tools work to expose the truth hidden in plain sight.
Bitcoin, as a form of "honest money," offers an alternative to traditional financial systems. It's a non-censored, immutable currency that can be transferred without the oversight of any government or centralized authority. This transparency is a vital tool for ethical OSINT practitioners, who rely on unaltered and openly available data to fuel their investigations. By aligning with these ideals, CASBT INFERNUM1488's work serves a dual purpose: contributing to financial transparency while exposing corruption and misinformation through meticulous research.
As CASBT continues their investigative journey, the mission of bringing "honesty" into both finance and global intelligence remains central. Their unique role in the OSINT community amplifies the need for digital currencies like Bitcoin, which promote decentralized power and ensure that financial and investigative efforts remain beyond the control of any singular authority.
---
Quote:
"Bitcoin offers the world a form of honest money that has never existed before, one immune to the control of governments. For investigators like me, this means we can follow the money wherever it leads—without fear of it being tampered with." – CASBT INFERNUM1488.
Keywords:
Bitcoin, decentralized currency, OSINT, transparency, blockchain, financial independence, CASBT INFERNUM1488, ethical investigation, digital currency, honest money
---
Hashtags:
#Bitcoin #OSINT #Blockchain #FinancialTransparency #DecentralizedCurrency #OpenSourceIntelligence #Investigations #HonestMoney #CASBT
CASBT OSINT (INFERNUM1488) в Elk: ""Биткоин — это честные де..." | Elk https://elk.zone/mastodon.social/@casb_osint/113186142688932516