The Ministry of Finance of the Russian Federation plans to let any industry in the country to accept bitcoin and cryptocurrencies for international trade without restriction, per a report from local media outlet [TASS](https://tass.ru/ekonomika/15943173?). Ivan Chebeskov, director of the Financial Policy Department for the ministry, explained in a recent interview. > "We are going to allow international settlements in cryptocurrencies for any industries without restrictions." However, though the ministry intends to offer a non-restrictive flow for the acceptance of bitcoin and cryptocurrencies, there seems to be a difference of opinion coming from the Bank of Russia. >“[The central bank] is in favor of creating a full-fledged infrastructure for the circulation of digital currencies in Russia,” said Chebeskov. Thus, while the Ministry of Finance prefers a local approach to the regulation of digital assets, the central bank is pursuing a broader range of regulatory action. Chebeskov detailed that the Ministry of Finance has two primary functions as it relates to the regulation of digital assets for international payments. >"We believe that we need local crypto infrastructure,” said Chebeskov. >“First of all, to protect the interests of citizens.” >“Because now those who trade their digital currencies on crypto exchanges are limited,” Chebeskov continued. >“Secondly, to control when digital currency is used legally and when not.”
Harmful forever chemicals like PFAS are found in high levels in children’s school uniforms, according to a [new study](https://pubs.acs.org/doi/10.1021/acs.est.2c02111) which is only likely to increase alarm about these worrying substances. The study, carried out at the University of Notre Dame, found high levels of PFAS on school uniforms sold in North America. PFAS are referred to as “forever chemicals” because they’re basically impossible to break down. Accumulating PFAS chemicals are toxic. The chemicals have been linked to reduced immunity, asthma, obesity, and neurodevelopmental or behavioral issues. National surveys in the US have regularly reported PFAS in blood samples of children between three and 11 years-old. The Environmental Protection Agency recently classified PFAS as hazardous, and this new study is an uncomfortable reminder that they continue to linger everywhere, including in places we might never suppose. In the US, around 20% of public schools have uniform requirements, which means that millions of children are at risk from these toxic compounds. The researchers looked at 72 textile samples used in children’s school uniforms. They also tested outerwear incuding rain suits, snowsuits, mittens, and accessories such as sweatshirts and hats. “What was surprising about this group of samples was the high detection frequency of PFAS in the garments required for children to wear,” says Graham Peaslee, a professor of physics at Notre Dame, in a university release. “Children are a vulnerable population when it comes to chemicals of concern, and nobody knows these textiles are being treated with PFAS and other toxic chemicals.” Researchers tested the garments with a special technique called particle-induced gamma ray emission (PIGE) spectroscopy, which tests for the presence of fluorine. This technique has helped detect PFAS in cosmetics, fast food wrappers, face masks, firefighting gear, and drinking water. The analysis found fluorine in 65 percent of tested samples. Interestingly, school uniforms had a higher amount of chemicals lingering on the fabric when they were made out of 100-percent cotton rather than synthetics.
Brazenly exploiting a loophole in anti-gun logic, a man who only identified himself as “Kem” to WKTV said he made the “firearms” out of parts he printed on a $200 3D printer he received for Christmas. “I 3D-printed a bunch of lower receivers and frames for different kinds of firearms,” he said. Kem then drove six hours to Utica, New York, where the state’s attorney general’s office was holding a no-questions-asked gun buyback event. “They buy from you as many guns as you want to surrender,” WKTV reports. A man took home $21,000 in gift cards after bringing more than 100 3D-printed guns to the state attorney general’s buyback event in Utica last month. “Nobody thought this through,” the man said. “When you look at the flyer, it is just the gravest thing Letitia James could have done. She literally put a bounty on 3D-printed guns… She said, ‘I will give you extra money if it doesn’t have a serial number on it.'”
The former US Ambassador to Russia has claimed that deepfakes are being used to impersonate him in a bid to “undermine” Ukrainian war efforts.Michael McFaul, a vocal critic of Vladimir Putin who served as US ambassador to Russia from 2012 to 2014, claims that an “AI-generated deep fake that looks and talks like me” is being circulated as a “new Russian weapon of war” He wrote on Twitter: “WARNING. Someone using the phone number +1 (202) 7549885 is impersonating me. If you connect on a video platform with this number, you will see an AI-generated "deep fake" that looks and talks like me.
Earlier today, Oct. 2, Kyiv Post was contacted by hackers who identified themselves as part of the National Republican Army (NRA). As Kyiv Post has reported before, the NRA is an organization of Russian citizens seeking the overthrow of the Putin Government. The NRA hackers explained to Kyiv Post that they had executed an advanced ransomware attack on the network of Unisoftware, a Russian software development company known for the development and implementation of web applications, desktop systems, cloud, and API solutions. While communicating with Kyiv Post, the NRA member stated that their primary motivation was “Putin needlessly sending our young men to die in an unjust war waged against Ukraine that has resulted in the slaughter of innocent civilians, including women and children.” Corroborating what the NRA member told Kyiv Post, proof provided by the hackers of their work, including screenshots of the ransomware attack, identified clearly by the extension .t73 on several of the files as well as the standard decryption instructions file produced on the machines. The NRA hackers claimed to have stolen copies of all of Unisoftware’s data, including but not limited to: credentials for bank accounts and personal accounts, sensitive employee information, phone numbers, addresses, contracts, and proprietary code for Unisoftware’s clients and software. The group has threatened to release the data and all obtained information if not paid promptly by Unisoftware
### Key Takeaways - Mexican digital rights organization R3D (Red en los Defensa de los Derechos Digitales) has identified Pegasus infections against journalists and a human rights defender taking place between 2019-2021. - The Citizen Lab provided technical support for R3D’s analysis and validated the infections. - Victims include two journalists that report on issues related to official corruption and a prominent human rights defender. - The infections occurred years after the first revelations of Pegasus abuses in Mexico. - They also occurred after Mexico’s current President, Andrés Manuel López Obrador, assured the public that the government no longer used the spyware and that there would be no further abuses.
A lawsuit that was filed after FBI agents raided a vault company, seizing more than $86 million in cash as well as jewelry and gold from 1,400 safe-deposit boxes, says the owners' items have still not been returned and that agents misled a judge to get the warrant. Agents raided the Beverly Hills, California, branch of US Private Vaults in March 2021 and seized assets from boxes held by hundreds of people who were not suspected in any crimes, court papers reported on by the Los Angeles Times say. The lawsuit alleges the FBI and the US attorney's office in Los Angeles obtained search-and-seizure warrants against US Private Vaults by concealing critical details from the judge who approved them. Robert Frommer, a lawyer with the Institute for Justice, which filed the lawsuit, said in the court papers: "The government did not know what was in those boxes, who owned them, or what, if anything, those people had done."
Just over a week ago, we announced that Iranian censors had started blocking all Signal traffic in the country. As an interim solution to help people in Iran get connected again, we’ve added support in Signal for a simple TLS proxy that is easy to set up, can be used to bypass the network block, and will securely route traffic to the Signal service.
>I tried to include primarily articles and readable guides, such as those published by madaidan. Also, I mostly tried to include some lesser-known articles. There are tons of security guides online and I do not want to simply recycle one of those. Some of the content, such as the articles about VPNs, are perhaps not going to be of interest to most of the readers of this site. Most of the older content is still relevant.
According to a message on the tor-relays mailing list, a Tor exit node operator in Germany was raided by the police. Volker wrote that law enforcement officers raided him because “some Nazis used TOR to send nazi-emails to several schools in Germany.” Authorities accused him of Volksverhetzung, which is “incitement to hatred” (which in Germany means “insulting… segments of the population”).
Judging from screenshots leaked onto Twitter, though, an intruder has compromised Uber's AWS cloud account and its resources at the administrative level; gained admin control over the corporate Slack workspace as well as its Google G Suite account that has over 1PB of storage in use; has control over Uber's VMware vSphere deployment and virtual machines; access to internal finance data, such as corporate expenses; and more. Infosec watcher Corben Leo, meanwhile, said he spoke to the miscreant responsible for this mess, and was told an employee was socially engineered to gain access to Uber's VPN, through which the intruder scanned the network, found a PowerShell script containing the hardcoded credentials for an administrator user, which were then used to unlock access to all of Uber's internal cloud and software-as-a-service resources, among other things. After that, everything was at the intruder's fingertips, allegedly. From an Uber employee: >Feel free to share but please don’t credit me: at Uber, we got an “URGENT” email from IT security saying to stop using Slack. Now anytime I request a website, I am taken to a REDACTED page with a pornographic image and the message “F*** you wankers.”
Predictive Programming is theory that the government or other higher-ups are using fictional movies or books as a mass mind control tool to make the population more accepting of planned future events. This was first described and proposed by researcher Alan Watt who defines Predictive programming as: >“Predictive programming is a subtle form of psychological conditioning provided by the media to acquaint the public with planned societal changes to be implemented by our leaders. If and when these changes are put through, the public will already be familiarized with them and will accept them as natural progressions, thus lessening possible public resistance and commotion.”
Many well known and respected senior U.S. military officers, intelligence services and law enforcement veterans, and government officials have expressed significant criticism of the 9/11 Commission Report or have made public statements that contradict the Report. Several even allege government complicity in the terrible acts of 9/11.
This film, unfortunately, was shunned from all 9/11 Truth festivals this month. The organizers, I have been told, "decided not to muddy the waters with a film about Israel's involvement in 9/11." This must be ironic, for evidence of Israel's involvement brings clarity, while muddy waters are what Israel needs. However, the film will be streamed on noliesradio.org on October 9th, followed by a debate between Alan Sabrosky, Kevin Barrett, and myself. In the film, I introduce the hypothetical scenario of the "nested conspiracies" — perhaps better named the "hijacked" or "double-crossed conspiracy" — which is an attempt to distinguish the part played by the U.S. military and the part played by Israel. In this article, I will expound on that theory by arguing that the attack on the Pentagon and the attacks of the Twin Towers were prepared by two distinct groups, with two distinct aims: regime change in Afghanistan on the one hand, total war against Israel's enemies on the other. The Pentagon attack was a Northwoods-type inside job, but the Twin Towers' demolition — the big event, that defines 9/11 it in world consciousness — was an Israeli job in the spirit of the Liberty attack, only a thousand times bigger (Israel had learned from the Liberty fiasco that there would be no penalty for failure, so why not think big). What happened, I suggest, is that a group of high-positioned sayanim in Washington and New York double-crossed the U.S. strategists and turned their rather modest false-flag operation into a "cataclysmic" one, leaving them with no other choice but to cover up the whole thing, since exposing Israel's operation would inevitably expose their own.
Donald Trump wrote about a large-scale terror attack in the U.S. in his 2000 book 'The America We Deserve.'
>"Wireless communications networks weren't designed for ground-to-air communication. Cellular experts privately admit that they're surprised the calls were able to be placed from the hijacked planes, and that they lasted as long as they did. They speculate that the only reason that the calls went through in the first place is that the aircraft were flying so close to the ground" >According to the American Airline / Qualcomm announcement, the technology for cell phone transmission at high altitude will only be available aboard commercial aircraft in 2006. This is an inescapable fact.