Pal Sundara (@palsun1) 's Twitter Profile
Pal Sundara

@palsun1

My name is Pal as in PayPal and I work with Steven Musielski @StevenMusielski: We are focused on FAMILY OFFICES and business collaborations.

ID: 1170790275809234945

calendar_today08-09-2019 20:06:12

13,13K Tweet

1,1K Followers

867 Following

Steven Musielski (@stevenmusielski) 's Twitter Profile Photo

Josh Olin Karl Sigerist ICD.D Mr Family Office Mr Family Office is well versed in this area Josh. I left a congratulations for your y combinator deal on Linkedin. (I need to get some of my friends to move from there to here). Maybe you can help? Opinion Mr. Family offices knows the Family Office area like Garry Tan

Sekur Private (OTCQB:SWISF) (@sekurprivate) 's Twitter Profile Photo

A new class-action lawsuit claims Meta misled users about WhatsApp’s privacy—alleging Meta’s internal systems could access supposedly “private” messages. Source: ln.run/OZjOY The real story isn’t what platforms say about privacy, but what they actually control behind

A new class-action lawsuit claims Meta misled users about WhatsApp’s privacy—alleging Meta’s internal systems could access supposedly “private” messages.

Source: ln.run/OZjOY

The real story isn’t what platforms say about privacy, but what they actually control behind
Sekur Private (OTCQB:SWISF) (@sekurprivate) 's Twitter Profile Photo

Private chats should start with an invite. Not an address book. SekurMessenger only connects conversations when both sides explicitly accept. No shared address books. No contact harvesting. No silent exposure. sekur.com/en/messenger $SWISF #Chat

Private chats should start with an invite.
Not an address book.

SekurMessenger only connects conversations when both sides explicitly accept.
No shared address books. No contact harvesting. No silent exposure.

sekur.com/en/messenger

$SWISF #Chat
Sekur Private (OTCQB:SWISF) (@sekurprivate) 's Twitter Profile Photo

Sekur isn’t about paranoid privacy. It’s about quiet confidence—knowing your data, brand, and client trust are under your control. Privacy is a mindset, not a hiding place. Discover sekur.com $SWISF #Cybersecurity

Steven Musielski (@stevenmusielski) 's Twitter Profile Photo

Gary Brode Robb Fahrion || Flying V Group I am a "first who" than what based thinking person. Gary: I find bitcoin maximalists fascinating. Not just Michael Saylor. Thank you for your reply, Gary: VERY comprehensive. What is your take on this video? It would be great seeing you and Robb Fahrion || Flying V Group having a

Sekur Private (OTCQB:SWISF) (@sekurprivate) 's Twitter Profile Photo

Most organizations don’t choose systems to be better. They choose them to avoid surprises later. Someone signs. Someone approves. Someone explains. Someone gets called when it breaks. That’s not fear. That’s experience.

Sekur Private (OTCQB:SWISF) (@sekurprivate) 's Twitter Profile Photo

Safer Internet Day highlights the value of systems designed with clear ownership, limited exposure, and auditable lifecycles. Sound architecture reduces risk through structure, not reaction. Design choices like these are intentional, not incidental.

Safer Internet Day highlights the value of systems designed with clear ownership, limited exposure, and auditable lifecycles. Sound architecture reduces risk through structure, not reaction.
Design choices like these are intentional, not incidental.
Sekur Private (OTCQB:SWISF) (@sekurprivate) 's Twitter Profile Photo

Sekur CEO Update: Product Expansion and Path to Profitability Sekur Private Data (OTCQB: $SWISF | CSE: $SKUR.CN | FRA: $GDT0.GR) outlined execution across product, government sales, and global expansion. Material developments: •⁠ ⁠Sekur Platinum launches May 2026 Bundled

Sekur Private (OTCQB:SWISF) (@sekurprivate) 's Twitter Profile Photo

Every organization feels pressure to move fast because technology is moving fast. Institutions don’t adopt speed the same way startups do. They don’t get credit for moving first. They get punished for moving wrong. That changes how “moving fast” actually works.

Steven Musielski (@stevenmusielski) 's Twitter Profile Photo

César Penna Have you considered starting this way? First who - then what? What type of people do you work with the best? These are 4 people worth following and commenting on and engaging with. Across the major platforms. Darren Marble Vivek Sharma, PhD, CFA®, CFP® Robb Fahrion || Flying V Group Christopher Salem

Steven Musielski (@stevenmusielski) 's Twitter Profile Photo

Trae Stephens "He taught me how to manage my time, track action items, and organize/prioritize (actually kind of crazy that no one taught me how to do that until he did when I was 25 yo)." What were your top 4 to 10 takeaways from what he taught you that you found the most value in?

Sekur Private (OTCQB:SWISF) (@sekurprivate) 's Twitter Profile Photo

Shared infrastructure creates shared assumptions. When systems rely on the same underlying layers, they inherit the same constraints, dependencies, and exposures. Resilience begins with understanding where those assumptions live and deciding which ones you are willing to share.

Shared infrastructure creates shared assumptions.

When systems rely on the same underlying layers, they inherit the same constraints, dependencies, and exposures.

Resilience begins with understanding where those assumptions live and deciding which ones you are willing to share.
Sekur Private (OTCQB:SWISF) (@sekurprivate) 's Twitter Profile Photo

Sekur Now Available for U.S. Government Procurement via GSA MAS Sekur Private Data ((OTCQB: $SWISF | CSE: $SKUR.CN | FRA: $GDT0.GR) announced that its secure communications software portfolio is now available for purchase under GSA Multiple Award Schedule Contract 47QTCA18D0089

Sekur Private (OTCQB:SWISF) (@sekurprivate) 's Twitter Profile Photo

Most email risk begins with context, not force. It rarely starts with a technical failure. It starts with familiarity, timing, and expectation. Effective communication design considers how identity, intent, and boundaries are established before a message is ever opened. Design

Most email risk begins with context, not force.

It rarely starts with a technical failure. It starts with familiarity, timing, and expectation.

Effective communication design considers how identity, intent, and boundaries are established before a message is ever opened.

Design