From 3K to 0 . Boᕫlito Crypto (@boulitocrypto) 's Twitter Profile
From 3K to 0 . Boᕫlito Crypto

@boulitocrypto

ID: 1492041366712557569

calendar_today11-02-2022 07:42:53

4,4K Tweet

121 Followers

141 Following

Ternoa 2.0 (@ternoa_) 's Twitter Profile Photo

Unlinkable severs the link. 🔗 PrivacyVault for direct transfers. PrivacyPool for ZK-tech unlinkability. ASP/OFAC compliant. Real anonymity.

Unlinkable severs the link. 🔗 PrivacyVault for direct transfers. PrivacyPool for ZK-tech unlinkability. ASP/OFAC compliant. Real anonymity.
Ternoa Labs (@ternoa_labs) 's Twitter Profile Photo

The Kelp rsETH mess is the part of DeFi people keep ignoring. It's not the hack alone. It's the dependency stack built on top of it. One exploit lands and suddenly half the 'composable' ecosystem is stress testing its own assumptions in public.

The Kelp rsETH mess is the part of DeFi people keep ignoring. It's not the hack alone. It's the dependency stack built on top of it. One exploit lands and suddenly half the 'composable' ecosystem is stress testing its own assumptions in public.
Bitstack (@bitstack_) 's Twitter Profile Photo

🕵️‍♂️ Le dernier message connu de Satoshi Nakamoto avant sa disparition : 📅 23 avril 2011 📩 De : Satoshi Nakamoto 📨 À : Mike Hearn 📝 Objet : Bitcoin  💬 « I’ve moved on to other things. It’s in good hands with Gavin and everyone. » Ce message marque le passage de flambeau de

🕵️‍♂️ Le dernier message connu de Satoshi Nakamoto avant sa disparition :

📅 23 avril 2011
📩 De : Satoshi Nakamoto
📨 À : Mike Hearn
📝 Objet : Bitcoin
 💬 « I’ve moved on to other things. It’s in good hands with Gavin and everyone. »

Ce message marque le passage de flambeau de
Ternoa 2.0 (@ternoa_) 's Twitter Profile Photo

Closing in on 400 CIFER instances ⚡️ Quantum-resistant protection for your payments, files, communications, AI agents, and databases. Something is coming for CIFER holders in the next 2 weeks 👀 Get yours for free ↓ hub.cifer-security.com CIFER | Post-Quantum Encryption

Closing in on 400 CIFER instances ⚡️

Quantum-resistant protection for your payments, files, communications, AI agents, and databases.

Something is coming for CIFER holders in the next 2 weeks 👀

Get yours for free ↓
 hub.cifer-security.com

<a href="/cifer_security/">CIFER | Post-Quantum Encryption</a>
SaxX ¯\_(ツ)_/¯ (@_saxx_) 's Twitter Profile Photo

🚨🔴CYBERALERT 🇫🇷FRANCE🔴 | L'Agence de Services et de Paiement a été victime d'une cyberattaque : des coordonnées bancaires ont été piraté... ⤵️ L'Agence de services et de paiement traite les données dans le cadre de la rémunération des stagiaires de la formation

🚨🔴CYBERALERT 🇫🇷FRANCE🔴 | L'Agence de Services et de Paiement a été victime d'une cyberattaque : des coordonnées bancaires ont été  piraté... ⤵️

L'Agence de services et de paiement traite les données dans le cadre de la rémunération des stagiaires de la formation
Ternoa Labs (@ternoa_labs) 's Twitter Profile Photo

If 41 crypto kidnappings can allegedly be traced back to leaked user data, the industry's threat model is still embarrassingly naive. The biggest risk isn't always onchain. It's the spreadsheet, KYC dump, or admin panel some government or vendor can't keep shut.

If 41 crypto kidnappings can allegedly be traced back to leaked user data, the industry's threat model is still embarrassingly naive. The biggest risk isn't always onchain. It's the spreadsheet, KYC dump, or admin panel some government or vendor can't keep shut.
Ternoa Labs (@ternoa_labs) 's Twitter Profile Photo

The scary part about crypto-related kidnappings isn't crypto. It's the data leakage pipeline around it. KYC databases, exchange leaks, public bragging, recycled addresses. People keep arguing about UX while basic personal security is still treated like an optional feature.

The scary part about crypto-related kidnappings isn't crypto. It's the data leakage pipeline around it. KYC databases, exchange leaks, public bragging, recycled addresses. People keep arguing about UX while basic personal security is still treated like an optional feature.
Ternoa Labs (@ternoa_labs) 's Twitter Profile Photo

The rsETH mess is a reminder that DeFi contagion doesn't need a bank run. It just needs shared collateral and too many protocols pretending correlation is diversification. Composability is powerful. It's also how blast radius gets industrialized.

The rsETH mess is a reminder that DeFi contagion doesn't need a bank run. It just needs shared collateral and too many protocols pretending correlation is diversification. Composability is powerful. It's also how blast radius gets industrialized.
Mickaël Canu (※,※) 🟠 (@canumickael) 's Twitter Profile Photo

1/ Introducing Lattice - private AI agents. Lattice is a private AI agent deployment service: launch your own cloud agent from a simple web interface, give it tools, connect channels like Telegram, and keep full control of what it can access.

1/ Introducing <a href="/lattice_agent/">Lattice - private AI agents</a>.

Lattice is a private AI agent deployment service: launch your own cloud agent from a simple web interface, give it tools, connect channels like Telegram, and keep full control of what it can access.
David Lisnard (@davidlisnard) 's Twitter Profile Photo

Autant de mots et d’argent gaspillés là où il manque tant de moyens. Après « France Emploi » quand on n’a pas d’emploi », « Maison Autonomie » quand on doit quitter la première parce qu’on perd la seconde. La novlangue est une obscure clarté, ici proportionnelle à l’inaction.

Ternoa 2.0 (@ternoa_) 's Twitter Profile Photo

Unlinkable found the weird middle. 🕳️ PrivacyVault for 1:1 sends. PrivacyPool for ZK proofs. ASP/OFAC filters still there. Privacy and compliance on Ethereum mainnet. Rare combo.

Unlinkable found the weird middle. 🕳️

PrivacyVault for 1:1 sends.
PrivacyPool for ZK proofs.
ASP/OFAC filters still there.

Privacy and compliance on Ethereum mainnet.

Rare combo.
Mickaël Canu (※,※) 🟠 (@canumickael) 's Twitter Profile Photo

Protected by CIFER | Post-Quantum Encryption, we deployed our first Hermes agent running inside Intel SGX. Only TEEs offer real sealing and isolation. Confidential computing or TDX are mostly marketing, with limited relevance for true privacy. In other words, Lattice - private AI agents enables

Protected by <a href="/cifer_security/">CIFER | Post-Quantum Encryption</a>, we deployed our first Hermes agent running inside <a href="/intel/">Intel</a>  SGX.

Only TEEs offer real sealing and isolation. Confidential computing or TDX are mostly marketing, with limited relevance for true privacy.

In other words, <a href="/lattice_agent/">Lattice - private AI agents</a> enables
Rafik Smati (@rafiksmati) 's Twitter Profile Photo

La Russie automatise désormais ses cyberattaques contre l'Europe avec l'intelligence artificielle. Les services de renseignement néerlandais l'ont confirmé cette semaine : les capacités offensives russes ne cessent de croître, à un rythme que les systèmes de défense européens ne

Ternoa Labs (@ternoa_labs) 's Twitter Profile Photo

Bitcoin just reclaimed its 20-week EMA for the first time since October. That's the first genuine bullish signal in 7 months. $79-81K resistance is thick with orders but MACD is flipping weekly. Feels like the setup is finally here.

SwissBorg (@swissborg) 's Twitter Profile Photo

Bitcoin has returned back above $80k. Today, we're at the highest levels since January 31st. But the Borgers sleeping well right now are not glued to the charts. They have Auto-Invest building their position, regardless of price. They have Trigger Orders set to execute their

Bitcoin has returned back above $80k.

Today, we're at the highest levels since January 31st.

But the Borgers sleeping well right now are not glued to the charts.

They have Auto-Invest building their position, regardless of price.

They have Trigger Orders set to execute their
Ternoa 2.0 (@ternoa_) 's Twitter Profile Photo

DAEMON Tools getting trojanized is the reminder nobody wants. Your app can ship clean code... then your supply chain quietly mutates behind it. TIP watches the runtime every 60s. Fingerprint. Compare. Prove on-chain. Audits end. Runtime doesn't.

DAEMON Tools getting trojanized is the reminder nobody wants.

Your app can ship clean code...
then your supply chain quietly mutates behind it.

TIP watches the runtime every 60s.
Fingerprint.
Compare.
Prove on-chain.

Audits end.
Runtime doesn't.
Ternoa 2.0 (@ternoa_) 's Twitter Profile Photo

TIP is built for the part of appsec people ignore: what happens after the audit. Runtime checks. Source verification. Autonomous pentesting. Private alpha is free. Early access: ternoa.network

Ternoa Labs (@ternoa_labs) 's Twitter Profile Photo

Coinbase just launched 24/7 gold and silver futures. The line between TradFi and crypto is officially gone. Commodities were supposed to be the boring, settled-in-hours asset class. Now it's trading around the clock onchain. The next few years are going to be weird.