NoGoolag
4.64K subscribers
19.6K photos
10.9K videos
752 files
19.7K links
Live free!

📡 @NoGoolag

FAQ:
http://t.me/NoGoolag/169

★Group:
https://t.me/joinchat/nMOOE4YJPDFhZjZk

📡 @Libreware

📚 @SaveAlexandria

📡 @BallMemes

FORWARDS ARE NOT ENDORSEMENTS

💯 % satire OSINT
Download Telegram
Forwarded from cRyPtHoN INFOSEC (EN)
Alleged Telegram Token Video Leaked as Ton Blockchain Prepares Testnet Launch

A video of the most secretive blockchain project ever has seemingly been leaked with it showing how Gram, the Telegram token, is meant to work from a user’s perspective.

The new Telegram app version will allow users to scan with a QR code. The usual functionalities are then available, in addition to the incorporation of the gram token.
https://www.trustnodes.com/2019/03/09/alleged-telegram-token-video-leaked-as-ton-blockchain-prepares-testnet-launch

Read Via Telegram

#blockchain #telegram #gram
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_ES
🇰🇷 South Korea To Use Blockchain Based Digital ID by 2024

The South Korean government stated that with the expansion of the digital economy, the ID embedded in the smartphone is an indispensable emerging technology to support the development of data.

Through digital identities on the blockchain, the network verification process will be simplified, and users can log in without taking a certificate or a verification code sent by text.

🔗 South Korea to Launch Digital ID

#SouthKorea #Korea #DigitalID #biometrics #blockchain
Media is too big
VIEW IN TELEGRAM
#Stablecoins Are WORSE Than #CBDC! with Mark Goodwin

CONVERSATION RECORDED JULY 17, 2025. House Republicans just celebrated their “Crypto Week” with the passage of an Anti-CBDC #Surveillance State Act and the passage of a stablecoin-promoting #GENIUS Act. And, whether you know it or not, this new stablecoin regulatory regime is going to transform your life and the entire global monetary order. Here today to fill us in on all the details is Mark Goodwin, co-author with Whitney Webb on a series of articles about this new #blockchain regime and the powers-that-shouldn’t-be who are behind it.
#btc

https://corbettreport.com/interview-1964-stablecoins-are-worse-than-cbdcs-with-mark-goodwin/
Forwarded from 0•Bytes•1
Hello, my Sonys and Cheshire Cats! 🐭🐈‍⬛

Today we're going to talk about 6G📶
6G, or the sixth generation of mobile networks. If 5G gave us fast internet and myths about killer towers, then 6G will raise the bar📡

Imagine data transfer speeds of up to 100 Gbps — that's hundreds of times faster than 5G! 6G will integrate AI, terahertz waves, and satellites. Standards are already being developed (thanks, 3GPP!), and the first commercial networks are expected by 2030. Europe, with its telecom giants Nokia and Ericsson, is actively participating in the race, but the US (with FutureG and DARPA projects) and China (with Huawei) are not far behind🧩

6G operates on terahertz waves — frequencies ranging from 100 GHz to 10 THz, which transmit data so fast that 5G nervously smokes on the sidelines.
But there is one small nuance: it doesn't work well in practice, as these waves don't pass through walls very well😓, so dense networks with lots of small antennas (massive MIMO) are needed. Traffic and security management is handled by AI, which distributes the data. Quantum encryption is also used to protect communications. 6G also has blockchain, which is needed for transparency: blockchain records who uses the network and how. Satellites are connected to provide coverage in remote areas, and RIS (smart reflective surfaces) technology helps direct signals where walls interfere.

But, as you can imagine, it's not all sunshine and rainbows, and 6G has a huge attack surface that is currently being actively studied🔓

For example, there are current threats related to the growing number of connected devices. 6G promises to connect a multitude of IoT devices. Each such device is a potential entry point for attackers. Hack one sensor in the power grid and the city is without power. Add to this the use of terahertz frequencies, which transmit data quickly but are vulnerable to local interception or jamming due to their limited range. Another headache is artificial intelligence: attackers can feed it fake data, and it will start directing traffic to nowhere. Quantum computers (still a long way off) could destroy cryptography, such as RSA, to smithereens. Don't forget the risks associated with decentralization. Processing data at the edge of the network, close to devices, reduces latency but makes these nodes an easy target for attacks, especially if they are not sufficiently protected. Attacks on the supply chain, such as the introduction of hardware Trojans, also pose a serious threat, given the complexity of manufacturing 6G equipment. Finally, scenarios such as digital twin spoofing or interference with robots can have certain consequences.

But there is no shortage of protection — developers are already coming up with ways to deal with threats🛡

They are creating cryptography that can withstand quantum attacks. Post-quantum cryptography uses complex mathematical problems to keep data secure (although some algorithms could use some refinement against conventional threats). Quantum key distribution makes encryption unbreakable; any attempt at interception is immediately noticeable. For devices such as IoT sensors, encryption algorithms are being developed that do not require powerful hardware.
AI also helps: it searches for suspicious behavior in real time, checks data, and blocks attacks. Blockchain removes weak links, and smart contracts automatically control access, reducing the risk of errors. For terahertz waves, jamming technologies are used to prevent signal interception. Devices receive unique “fingerprints” so that they cannot be counterfeited.

Personally, I am still a little skeptical about 6G: it seems to me that they want to cram a bunch of hyped technologies into it that may not work as intended in practice. But it seems that this technology is being actively developed, so let's see what happens next🔑

If you want to learn more about 6G architecture, its security, check the archive, which contains articles that will help you learn more❤️🛠

#6g #attacks #Blockchain #network #neural_networks #quantum_computer #security
Please open Telegram to view this post
VIEW IN TELEGRAM
Forwarded from 0•Bytes•1
6g.zip
10.7 MB
В архиве есть статьи про архктикуру 6g, про возможные атаки на него, а так же про меры защиты. Надеюсь вам будет полезно 📶❤️‍🔥

In the archive there are articles about the 6g archktikuru, about possible attacks on it, as well as defense measures. I hope you will find it useful 📶❤️‍🔥

#6g #attacks #Blockchain #network #neural_networks #quantum_computer #security #phishing #protection #post_quantum
0•Bytes•1
monero_en.pdf
Hello, my Mad Hatter friends! 🎩

Let me ask you a question: have you ever wondered how Monero's security works and whether it is as reliable as they say?🪙

In my new article, I figured this out and also explained how to further protect yourself so that your transactions remain invisible even to the most curious eyes.🛡

I describe in detail how Monero works, how resistant it is to attacks, and what measures will help you maintain your anonymity. 🔑

The article covers attacks ranging from Black Marble Flooding to Eclipse Attacks, and I also share practical tips on how to run your own node and configure Tor to increase your privacy.

I hope you will find it interesting to delve into this topic. 🧩 At the end of the article, there are links to additional materials so that you can explore this topic in more depth if you wish. ⚙️

Enjoy your tea! ☕️🩷

English version:

#Monero #XMR #cryptography #privacy #blockchain #ring_signatures #stealth_addresses #RingCT #Tor #I2P #crypto_wallet #security #anonymity #decentralization #Kovri #FCMP #crypto_protection
NoGoolag
Photo
"Child abuse imagery found within bitcoin's blockchain" - Samuel Gibbs, Guardian, 20MAR2018

>Researchers from the RWTH Aachen University, Germany found that around 1,600 files were currently stored in bitcoin’s blockchain. Of the files least eight were of sexual content, including one thought to be an image of child abuse and two that contain 274 links to child abuse content, 142 of which link to dark web services.

>“Our analysis shows that certain content, eg, illegal pornography, can render the mere possession of a blockchain illegal,” . “Although court rulings do not yet exist, legislative texts from countries such as Germany, the UK, or the USA suggest that illegal content such as CSAM can make the blockchain illegal to possess for all users.”

>While the spending of #bitcoin does not necessarily require a copy of the #blockchain to facilitate, some processes, such as some mining techniques, require the downloading of the full blockchain or chunks of it.

https://archive.ph/P3NJG

#Crypto #btc
@sciencecringe