Damus
Kazani profile picture
Kazani
@Kazani

Beloved Bitcoin.


Promo code: KAZANI ➡️ https://foundation.xyz/passport-prime

Relays (64)
  • wss://premium.primal.net – read & write
  • wss://astral.ninja/ – read & write
  • wss://bhagos.org/ – read & write
  • wss://bitcoiner.social/ – read & write
  • wss://brb.io/ – read & write
  • wss://creatr.nostr.wine/ – read
  • wss://eden.nostr.land/ – read & write
  • wss://expensive-relay.fiatjaf.com/ – read & write
  • wss://foolay.nostr.moe/ – read & write
  • wss://freedom-relay.herokuapp.com/ws – read & write
  • wss://lightningrelay.com/ – read & write
  • wss://no.str.watch/ – read & write
  • wss://nos.lol/ – read & write
  • wss://nostr-01.dorafactory.org/ – read & write
  • wss://nostr-2.zebedee.cloud/ – read & write
  • wss://nostr-pub.semisol.dev/ – read & write
  • wss://nostr-pub.wellorder.net/ – read & write
  • wss://nostr-relay.alekberg.net/ – read & write
  • wss://nostr-relay.freeberty.net/ – read & write
  • wss://nostr-relay.untethr.me/ – read & write
  • wss://nostr-relay.wlvs.space/ – read & write
  • wss://nostr-verified.wellorder.net/ – read & write
  • wss://nostr.bitcoiner.social/ – read & write
  • wss://nostr.cercatrova.me/ – read & write
  • wss://nostr.cheeserobot.org/ – read & write
  • wss://nostr.delo.software/ – read & write
  • wss://nostr.developer.li/ – read & write
  • wss://nostr.drss.io/ – read & write
  • wss://nostr.fractalized.ovh/ – read & write
  • wss://nostr.globals.fans/ – read & write
  • wss://nostr.mom/ – read & write
  • wss://nostr.mutinywallet.com/ – read & write
  • wss://nostr.ono.re/ – read & write
  • wss://nostr.onsats.org/ – read & write
  • wss://nostr.openchain.fr/ – read & write
  • wss://nostr.oxtr.dev/ – read & write
  • wss://nostr.rocks/ – read & write
  • wss://nostr.sandwich.farm/ – read & write
  • wss://nostr.semisol.dev/ – read & write
  • wss://nostr.swiss-enigma.ch/ – read & write
  • wss://nostr.unknown.place/ – read & write
  • wss://nostr.vpn1.codingmerc.com/ – read & write
  • wss://nostr.walletofsatoshi.com/ – read & write
  • wss://nostr.zaprite.io/ – read & write
  • wss://nostr.zebedee.cloud/ – read & write
  • wss://offchain.pub/ – read & write
  • wss://purplepag.es/ – read & write
  • wss://relay.current.fyi/ – read & write
  • wss://relay.cynsar.foundation/ – read & write
  • wss://relay.damus.io/ – read & write
  • wss://relay.grunch.dev/ – read & write
  • wss://relay.minds.com/nostr/v1/ws – read & write
  • wss://relay.nostr.band/ – read & write
  • wss://relay.nostr.band/trusted – read & write
  • wss://relay.nostr.ch/ – read & write
  • wss://relay.nostr.info/ – read & write
  • wss://relay.plebstr.com/ – read & write
  • wss://relay.snort.social/ – read & write
  • wss://relayable.org/ – read & write
  • wss://relayer.fiatjaf.com/ – read & write
  • wss://rs.nostr-x.com/ – read & write
  • wss://rsslay.fiatjaf.com/ – read & write
  • wss://rsslay.nostr.moe/ – read & write
  • wss://universe.nostrich.land/ – read & write

Recent Notes

Kazani profile picture
Tucker Carlson: "We're moving toward one of two endpoints."

"One is a totalitarian society, where... you have to obey, because you've got programmable digital currency and universal surveillance."

"Or, we're going to have a revolution."

"The current course won't work because it's a lie. If you tell people they own the government, they're in charge, they rule through the representatives in this democratic republic... and you don't deliver on it, they go crazy. They go totally crazy."

"If you tell people they can't say what they think, and their vote doesn't matter, how many options have you left for them?"

"Just one."



Kazani profile picture
The Verdict Against Meta and Google That Could End the Anonymous Internet

https://reclaimthenet.org/meta-youtube-negligence-verdict-age-verification-surveillance

A Los Angeles jury found Meta and YouTube negligent in platform design, awarding $3 million to a plaintiff who experienced mental health issues, with punitive damages totaling $6 million.

This verdict could dismantle anonymous internet access by establishing a legal precedent for holding platforms liable based on their design, bypassing Section 230 protections.

The legal argument treats social media architecture (infinite scroll, algorithmic notifications) as a defective product, similar to a car without brakes.

If this verdict survives appeal, it provides a blueprint for over 1,600 similar cases nationwide.

Classifying social media as an addictive product could lead to government regulation, requiring identity verification and access controls for users.

Mark Zuckerberg testified that age verification should occur at the operating system level, managed by Apple and Google, rather than within individual apps.

This proposal, if implemented, would require identity verification for all smartphone users across all apps and websites, effectively ending anonymous internet access.

New legislation like California's SB 976 and the federal Kids Online Safety Act are moving towards device or OS-level age verification, mirroring Zuckerberg's suggestion.

Mandatory identity verification creates a significant risk of data breaches, potentially exposing sensitive personal information.

Anonymous and pseudonymous online speech is crucial for whistleblowers, dissidents, abuse survivors, and journalists, and OS-level ID checks would eliminate this protection for all users.

1
nostrich · 1w
Let's compare smartphones with cars: Before being allowed to drive a car, you need to go to driving school and pass an exam. The car doesn't need to check the validity of the driving license nor to identify the driver. Not giving the car keys to the kids is the parents' responsibility. Any device ...
Kazani profile picture
A systemd fork has set out as a fu*k you to age verification.

Liberated systemd is a fork of mainline systemd started by Jeffrey Seathrún Sardina, a machine learning/AI researcher who apparently had enough of where things were heading.

https://github.com/Jeffrey-Sardina/systemd

The project is straightforward about its purpose; strip out what it considers surveillance-enabling code, keep everything else intact, and stay in sync with upstream as it develops.


https://itsfoss.com/news/systemd-fork-strips-out-age-verification/

1
librekitty · 1w
fantastic, this is why i love open source i'll stick on OpenRC personally, but this will be nice for all the systemd fans out there
Kazani profile picture
USA FCC bans imports of new routers made in other countries, on national security concerns

The US Federal Communications Commission has just announced a ban on imports of "all consumer-grade routers produced in foreign countries," which would be... almost all of them, except that the rule only affects new routers that haven't yet received FCC authorization.

https://www.fcc.gov/document/fcc-updates-covered-list-include-foreign-made-consumer-routers

Last year, news broke that Government officials had been considering banning sales of TP-Link routers manufactured in China, ostensibly because of concerns that they could pose risks to national security. But the FCC's announcement goes much, much further by "prohibiting approval of new models" of any router manufactured outside the United States.

https://www.washingtonpost.com/technology/2025/10/30/tp-link-proposed-ban-commerce-department/

https://liliputing.com/fcc-bans-imports-of-new-routers-made-in-other-countries-on-national-security-concerns/

2
nostrich · 1w
Time to build your own router.
Kazani profile picture
AWAKE: A Guide to Android Attacks and Exploitation

https://zahidaz.github.io/awake/

I found a really awesome resource - AWAKE: Android Wiki of Attacks, Knowledge & Exploits - essentially a one-stop shop for those involved in malware analysis, reverse engineering, and vulnerability hunting on Android.

It includes descriptions of attack techniques, exploits, and methods for analyzing APKs and the platform itself. It's aimed at analysts, reverse engineers, penetration testers, and threat intelligence researchers.

In other words, it's not just abstract theory, but a very practical reference with specific details. What I particularly liked is the "offense-first" approach. Everything is presented from the attacker's perspective, not the defender's. For those of us involved in mobile security analysis, this is exactly what we need: understanding how attacks work so we can know how to defend against them. And as a reference for our own research - it's perfect!

Kazani profile picture
It's an on-chain privacy scanner of #Bitcoin

I'd like to introduce you to a new tool called: https://am-i.exposed/

Paste an address or transaction ID and you'll get a score from 0-100 with specific findings.

Tags for 30 million addresses from over 650 entities have been included.

• It works from your computer, they don't store data
• No backend, no tracking.
• It can be used from TOR

1
DarthCoin ₿⚡️ · 2w
I don't give a shit about these "score tools". Most of them are a trap. Why? Because for the last 12 years I used the simple rule of 3 levels stash: hold - cache - spend https://image.nostr.build/48f72effbeead8347f529c3324fbd966e26763f1ca3c30258f3d0315a17d9657.jpg More than that, every year I move...
Kazani profile picture
This is a genuinely impressive piece of OSINT work. Here's what it found:

The core claim:

Meta spent a record $26.3M on federal lobbying in 2025 and secretly funded a "grassroots" child safety group called the Digital Childhood Alliance (DCA) to push the App Store Accountability Act (ASAA) legislation that forces Apple and Google to verify user ages before app downloads, while placing zero new requirements on social media platforms like Meta's own.


The five confirmed channels:


1. Direct lobbying: 86+ lobbyists across 45 states. A Meta lobbyist literally drafted Louisiana HB-570 and handed it to the bill's sponsor, Rep. Kim Carver, who confirmed this publicly. The bill passed 99-0.

2. DCA astroturf: The Digital Childhood Alliance has no EIN, no state incorporation, no 990 filings, and its domain was registered December 18, 2024 with a fully-formed advocacy site live within 24 hours. Bloomberg confirmed Meta funds it. Under oath, its executive director admitted receiving tech funding but refused to name donors. Every piece of DCA content attacks Apple and Google. Meta is never mentioned.

3. Super PACs: $70M+ across four state PACs deliberately registered at state level (not FEC) to scatter disclosure filings and avoid centralized searchability.

4. Arabella network connection: Meta's Colorado lobbyist simultaneously chairs the New Venture Fund, which funnels $121M/year into the Sixteen Thirty Fund (no donor disclosure required). The investigation analyzed $2B in grants and found zero going to any child safety org ruling out that funding pathway, but the back-channel routes (fiscal sponsorship, consulting fees) remain unproven.

5. State legislative campaigns: ASAA is now law in Utah, Louisiana, and Texas (Texas currently paused by a federal judge).


The smoking gun finding:

Meta's own LD-2 Senate lobbying filings explicitly list the App Store Accountability Act (H.R. 3149/S. 1586) as a lobbied bill, while simultaneously lobbying on KOSA/COPPA 2.0 supporting legislation that burdens Apple and Google while opposing or seeking to amend legislation that would regulate Meta directly.

https://archive.is/qP6kR

4❤️3
nostrich · 3w
The distraction is good enough nobody looks at Apple and Google and a number of other companies in the software supply chain, plus the telco / isp, spying on everyone, including children, without consent. And it eliminates independent competitors.
TheGrinder · 3w
we need more OSINT networks!
Kazani profile picture
HEALTHEX announces a partnership with Microsoft to connect consumers "digital identity, comprehensive health records, and consent infrastructure" to power Copilot Health.



Kazani profile picture
The Psychology of Tyranny


➡️ TLDR;

- Governments utilize psychological manipulation to influence thought, emotion, and behavior, often without explicit consent, by exploiting fundamental human needs like security and belonging.

- Twelve core psychological manipulation tactics identified include gaslighting, bandwagon effect, scarcity manipulation, framing and narrative control, guilt and moral shaming, FOMO, carrot and stick, othering, cognitive overload, authority bias exploitation, emotional priming, and desensitisation.

- Governments employ propaganda, fear-based messaging, nudge tactics, disinformation, censorship, and social credit systems as examples of psychological manipulation.

- The 'carrot and stick' approach combines rewards for compliance with punishments for non-compliance, seen in systems like China's social credit system and wartime rationing.

- Othering creates an 'us vs. them' dynamic by portraying a group as inferior or threatening, used in contexts like the Israel-Palestine conflict and anti-immigrant rhetoric.

- Cognitive overload overwhelms individuals with excessive or conflicting information, making them more likely to rely on authority, as seen during the Brexit referendum and COVID policy rollouts.

- Authority bias exploitation leverages trust in figures of authority to promote policies, often by suppressing dissenting experts, exemplified by tobacco regulation and climate policy endorsements.

- Emotional priming uses evocative imagery and rhetoric to trigger strong emotions, bypassing rational analysis, as seen in post-9/11 patriotism and atrocity propaganda.

- Desensitisation gradually exposes the public to controversial ideas or policies to reduce shock and resistance over time, observed in the normalization of drone strikes and surveillance expansion.

- Repeated exposure to psychological manipulation can alter brain function through neuroplasticity, potentially weakening critical thinking, increasing anxiety, and reducing autonomy, though recovery is possible through education and reflection.

https://open.substack.com/pub/clarewillsharrison/p/the-psychology-of-tyranny

❤️1
Kazani profile picture
Kazani profile picture
AI Can Now Easily Unmask Your Secret Online Life (Even If You Use a Fake Name)

https://itsfoss.com/news/ai-online-deanonymization/

Imagine this: You're on Reddit, Hacker News, or some forum, posting with a silly username like GamerCat2025 or SecretCoderX.

You think you are anonymous, and no one knows you and so you can freely express your thoughts.


Well, a brand-new research paper just blew that idea apart. It's called "Large-scale online deanonymization with LLMs" which is a fancy way of saying "figuring out the real person behind a secret online name".

Research: https://arxiv.org/abs/2602.16800


1❤️2
Leo Wandersleb · 5w
Ok, so who is Satoshi? I know, we shouldn't ask but many want to know so if it's easy now, let's not pretend Satoshi is secure. Or ... isn't it easy after all?