Forwarded from Insider Paper
This media is not supported in your browser
VIEW IN TELEGRAM
BREAKING: Massive winds tear the roofs off multiple houses and school in the Usme region of Bogota, Colombia, amidst flooding and intense rainfall
Follow @insiderpaper
Follow @insiderpaper
https://www.dailymail.co.uk/news/article-13220733/Taiwan-troops-stationed-islands-coast-China.html
Please open Telegram to view this post
VIEW IN TELEGRAM
Mail Online
Taiwan admits US troops are stationed on islands off coast of China
If US troops are stationed on Kinmen, it would mark a dramatic increase in America's presence in the region.
Forwarded from NetBlocks
⚠️ Update: Real-time metrics show further declines to connectivity in #Ukraine after a coordinated missile attack by Russian forces; infrastructural impacts are most evident in Dnipropetrovsk, Kharkiv, Vinnytsia and Khmelnytskyi, while Kyiv and others have also been targeted 📉
Forwarded from /CIG/ Telegram | Counter Intelligence Global (ȚepeȘ)
Media is too big
VIEW IN TELEGRAM
🔗 Furkan Gozukara
Please open Telegram to view this post
VIEW IN TELEGRAM
🤡1
Forwarded from Rerum Novarum // Intel, Breaking News, and Alerts 🇺🇸
🇷🇺⚡- "We are at war. Yes, it began as a special military operation, but as soon as the collective West became a participant in this on the side of Ukraine, for us it became a war." – Kremlin Spokesman, Dmitry Peskov.
This is the first time the wording of war has been used over operation by such a high level diplomat.
This is the first time the wording of war has been used over operation by such a high level diplomat.
⚡1
Forwarded from Rerum Novarum // Intel, Breaking News, and Alerts 🇺🇸
🇺🇦🇺🇸⚡️- US tells Ukraine to stop attacks on Russia’s energy infrastructure to avoid driving up oil prices amid election year.
😎1
Forwarded from Insider Paper
🗿2
Forwarded from Bitcoin.com News
“Mining for Power,” an anti-Bitcoin report by Greenpeace USA that explains the links between the bitcoin mining industry and fossil fuel companies, has faced a backlash in social media due to its inaccurate portraits of the mining activity. Using community notes, social network users detailed the report contained “many factual errors,” including outdated information. Greenpeace […]
https://news.bitcoin.com/greenpeaces-anti-bitcoin-mining-for-power-report-receives-fierce-backlash-on-x/
https://news.bitcoin.com/greenpeaces-anti-bitcoin-mining-for-power-report-receives-fierce-backlash-on-x/
Bitcoin News
Greenpeace's Anti-Bitcoin "Mining for Power" Report Receives Fierce Backlash on X – Mining Bitcoin News
"Mining for Power," an anti-Bitcoin report by Greenpeace USA, faced a backlash in social media due to its portrait of the mining industry.
Forwarded from Multipolar Market
In the history of modern finance, no indicator has better predicted when the next global recession will begin than the moment the Bank of Japan starts raising rates.
Follow us on Telegram
Please open Telegram to view this post
VIEW IN TELEGRAM
⚡1
Forwarded from Hacker News
FDA says marijuana has a legitimate medicinal purpose (Score: 150+ in 14 hours)
Link: https://readhacker.news/s/64yLe
Comments: https://readhacker.news/c/64yLe
Link: https://readhacker.news/s/64yLe
Comments: https://readhacker.news/c/64yLe
ABC Action News - WFTS - Tampa Bay
FDA says marijuana has a legitimate medicinal purpose
The FDA released a report saying that marijuana does have a legitimate use for medical purposes and recommended the drug’s classification change from Schedule 1 to Schedule 3.
Forwarded from QVINTA ÆTAS
"The Yemen-based Houthis have told China and Russia their ships can sail through the Red Sea and Gulf of Aden without being attacked, according to several people with knowledge of the militant group’s discussions.
China and Russia reached an understanding following talks between their diplomats in Oman and Mohammed Abdel Salam, one of the Houthis’ top political figures, said the people, who asked not to be named discussing private matters.
In exchange, the two countries may provide political support to the Houthis in bodies such as the United Nations Security Council, according to the people. It’s not entirely clear how that support would be manifested, but it could include blocking more resolutions against the group."
🗄 Archive
🔗 Source:
Please open Telegram to view this post
VIEW IN TELEGRAM
Bloomberg.com
Yemen’s Houthis Tell China, Russia Their Ships Won’t Be Targeted
The Yemen-based Houthis have told China and Russia their ships can sail through the Red Sea and Gulf of Aden without being attacked, according to several people with knowledge of the militant group’s discussions.
💊1
Forwarded from Disclose.tv
JUST IN - Islamic State (ISIS) claims responsibility for the deadly terror attack in Moscow, Russia.
@disclosetv
@disclosetv
The heads of the Ministry of National Defence, the Ministry of Interior and Administration and the coordinator of the secret services keep me updated on the circumstances of the attack in Moscow and the possible consequences for the situation in the region and the security of the country.
🔗 Donald Tusk (@donaldtusk)
Please open Telegram to view this post
VIEW IN TELEGRAM
💊1
Forwarded from /CIG/ Telegram | Counter Intelligence Global (ȚepeȘ)
🔗 https://informer.rs/vesti/politika/888209/vucic-o-teroristickom-napadu-u-moskvi-nadam-se-da-se-ovo-nikada-vise-nece-ponoviti
📎 Faytuks
Please open Telegram to view this post
VIEW IN TELEGRAM
💊1
Spain's High Court has ordered the suspension of messaging app Telegram's services in the country after media companies complained it was allowing users to upload their content without permission, according to a court source.
https://neuters.de/world/europe/high-court-orders-temporary-suspension-telegrams-services-spain-2024-03-23/
Please open Telegram to view this post
VIEW IN TELEGRAM
neuters.de
High Court orders temporary suspension of Telegram's services in Spain
Spain's High Court has ordered the suspension of messaging app Telegram's services in the country after media companies complained it was allowing users to upload their content without permission, according to a court source.
Forwarded from Blood Meridian
🇻🇪🇬🇾 Venezuela creates new state in territory under dispute with Guyana
Lawmakers in Venezuela on Thursday approved the creation of a new state in a territory that is the subject of a long dispute with neighboring Guyana.
The law approving the new state, called Guayana Esequiba, will come into force as soon as it is published in the official gazette.
The state's borders would be the Atlantic Ocean to the north, Brazil to the south, Guyana to the east and the Venezuelan states of Delta Amacuro and Bolivar to the west, according to the law.
The city of Tumeremo, in Bolivar, will serve as a capital "until a practical and mutually acceptable solution to the territorial controversy is reached with the Cooperative Republic of Guyana," the law said.
🔎 Source
#Venezuela #Guyana
☠️ Blood Meridian
Lawmakers in Venezuela on Thursday approved the creation of a new state in a territory that is the subject of a long dispute with neighboring Guyana.
The law approving the new state, called Guayana Esequiba, will come into force as soon as it is published in the official gazette.
The state's borders would be the Atlantic Ocean to the north, Brazil to the south, Guyana to the east and the Venezuelan states of Delta Amacuro and Bolivar to the west, according to the law.
The city of Tumeremo, in Bolivar, will serve as a capital "until a practical and mutually acceptable solution to the territorial controversy is reached with the Cooperative Republic of Guyana," the law said.
🔎 Source
#Venezuela #Guyana
☠️ Blood Meridian
👍1🎉1
Forwarded from infinityhedge
Anyone with a lot of money in a crypto wallet on their Apple device should probably remove it for the time being, to be on the safe side, according to Robert Graham, CEO of security consultancy Errata Security: link ⚠️ 🚨
A group of researchers has found a serious security vulnerability in Apple’s M-series of chips that would allow attackers to steal secret keys from Mac and iPad devices. The problem affects Apple M1, M2 and M3 chips
Solution:
Because this is not a flaw in the Apple operating system but instead is a hardware issue in the chip, Apple can’t just release a patch the way it would for software flaws. It could, however, address the problem in subsequent chip designs.
*Their is a fix for M3 chips by implementing DIT but it will not work for M2 and M1 chips. Matthew Green, a cryptographer says they’re not clean fixes to address the problem in M1 and M2 chips.
Attack vector:
How does an attacker trick the processor? They can do this by slipping malicious code into an application that a user downloads to their computer. The GoFetch attack code they created doesn’t require root access on a machine to work; it can trick the processor into doing this with just the same level of access that any third-party application has on a machine.
**It’s also theoretically possible for an attacker to pull this off by embedding malicious code into Javanoscript on a web site. ⚠️
Everything about gofetch vulnerability: https://gofetch.fail/
A group of researchers has found a serious security vulnerability in Apple’s M-series of chips that would allow attackers to steal secret keys from Mac and iPad devices. The problem affects Apple M1, M2 and M3 chips
Solution:
Because this is not a flaw in the Apple operating system but instead is a hardware issue in the chip, Apple can’t just release a patch the way it would for software flaws. It could, however, address the problem in subsequent chip designs.
*Their is a fix for M3 chips by implementing DIT but it will not work for M2 and M1 chips. Matthew Green, a cryptographer says they’re not clean fixes to address the problem in M1 and M2 chips.
Attack vector:
How does an attacker trick the processor? They can do this by slipping malicious code into an application that a user downloads to their computer. The GoFetch attack code they created doesn’t require root access on a machine to work; it can trick the processor into doing this with just the same level of access that any third-party application has on a machine.
**It’s also theoretically possible for an attacker to pull this off by embedding malicious code into Javanoscript on a web site. ⚠️
Everything about gofetch vulnerability: https://gofetch.fail/