Sugestor Ultra

Sugestor Ultra

npub

npub10nev22800j2q5ncjcpynyqakyrhsg49y046ucyzlx3jj5mns7mmsv6spqj

pubkey (hex)

7cf2c528ef7c940a4f12c0493203b620ef0454a47d75cc105f34652a6e70f6f7

nprofile

nprofile1qqs8euk99rhhe9q2fufvqjfjqwmzpmcy2jj86awvzp0ngef2dec0dacprf58garswvaz7tmjv4kxz7fwva6kcat8w4k82tnddajshfm74z

Activity (35)

↳ Reply Event not found

bbb81cb0113f3d3d63b6f86e8925f55f257ad4a1588f241ab425dd636bafb766

Iphone are bootloader locked and pple dictates what apps you can use. Please understand that using an iphone *you are fueling this*

Kind-1 (TextNote)

2026-05-07T03:18:52Z

↳ Reply Event not found

caab29b91a4c41a326cf6db8f4b3ef06fb6395325ce95a44946771f5161ce26b

Singapore is not a good country. They had hype similar to the UK. Bad countries dressed as something good.

Kind-1 (TextNote)

2026-05-06T09:19:34Z

↳ Reply Neo ⚡️ (npub1lyqkzmcq5cl5l8rcs82gwxsrmu75emnjj84067kuhm48e9w93cns2hhj2g)

Today my domain registrar https://njal.la/ has stolen all my domains. This includes one that I also ...

Njal.la wants to host only spam and scam domains? Because that's how they are portrayed by such actions. Noone sane will buy a more important domain f...

Njal.la wants to host only spam and scam domains? Because that's how they are portrayed by such actions. Noone sane will buy a more important domain from them. They should transfer your domains to some other chosen registrar if they don't want to keep the service.

Kind-1 (TextNote)

2026-05-06T07:19:43Z

↳ Reply Event not found

740ed6d226504fcbec257ddb359bb37b8f062d4256e5c572790cbba0e255c3ac

Who needs password vaults when you can cleartext in ram all of them at once 💩

Kind-1 (TextNote)

2026-05-06T05:54:32Z

↳ Reply Event not found

85fde3e3f30d127db865c22d60a6267210abe212a5a19bdc2719b0755a906f53

And sends all this data back to GPT admins. Because yes, thats how cloud AI works. It's not a local model.

Kind-1 (TextNote)

2026-05-06T05:52:25Z

Fast info about apache2 RCE CVE-2026-23918. Module http2 has to be loaded to be vulnerable, check with: apache2ctl -M | grep http2 ONLY MPM "worke...

Fast info about apache2 RCE CVE-2026-23918. Module http2 has to be loaded to be vulnerable, check with: apache2ctl -M | grep http2 ONLY MPM "worker" is vulneralbe. MPM Prefork is NOT vulnerable. apachectl -V | grep -i "Server MPM" If vulnerable: Disable http2 module to mitigate: a2dismod http2 Restart apache2.

Kind-1 (TextNote)

2026-05-06T02:31:47Z

↳ Reply Event not found

f280dabe50f3e77b9512d3f419475f7b01cf0c642dad54839f7a2b84fe47f9bd

Ursula, they won't forgive you age blocks for sure. Making the EU an enemy at the start - what can go wrong.

Kind-1 (TextNote)

2026-05-04T13:54:35Z

↳ Reply Event not found

00007765673a2cac9c9d51bef493c3ad53c585a0de418ca0e983b6337b583f0f

Age blocks will increase government attacks, blocking address space or dns may become the norm for relays. Tor is not just needed, Tor is the first re...

Age blocks will increase government attacks, blocking address space or dns may become the norm for relays. Tor is not just needed, Tor is the first responder in this chaos, and it's too weak to handle all of this, but for a start it will stand its ground for some time.

Kind-1 (TextNote)

2026-05-04T13:43:38Z

↳ Reply Event not found

0000b17521e40d93d487a2aaf2a69324e540a6540b2c2fd99f1308e45a929fd8

Just add an option for socks proxy. Orbot works really well with Amethyst this way

Kind-1 (TextNote)

2026-05-04T13:39:11Z

↳ Reply Event not found

000022a1ec873917b6cdb1696dcb88689e0fb7f6a37eccce6106100ca11dd634

The open OS like Gnu? I removed the age field and recompiled systemd. So. The only way to enforce this is by attacking all the hardware and forcing bo...

The open OS like Gnu? I removed the age field and recompiled systemd. So. The only way to enforce this is by attacking all the hardware and forcing bootloader locks. So no. Any open OS is not and will not be responsible for "enforcing" this pathological stupidity. Only locked-down bootloaders in iphones and most androids make it possible to CONTROL their owners. Do not use locked down systems. Doing so you are giving away all your digital freedom.

Kind-1 (TextNote)

2026-05-04T13:13:48Z

↳ Reply Event not found

00001a8b133d572dcc5946ce0ff6b33a35d16fc72d08c866661b620d9dd6036d

"Can't find it. Can you flash me the uid?"

Kind-1 (TextNote)

2026-05-04T12:25:03Z

↳ Reply Event not found

dac23d818285f6de91b30b6dfe4db97754808c6a27b154c053cbef31ad85e1fa

Clipping a truck with 767, well that's something new

Kind-1 (TextNote)

2026-05-04T05:08:08Z

↳ Reply Event not found

000067c3faa157696502feec8481f62f13df3598c198fcf7d98c7ae89c24fc1d

Pushy pushy, I started a 25GB, 32b qwen2.5 on a fricking laptop 10 minutes ago and already made him optimise some code, it's sweating as F but getting...

Pushy pushy, I started a 25GB, 32b qwen2.5 on a fricking laptop 10 minutes ago and already made him optimise some code, it's sweating as F but getting there slowly. Where are those hardware lattice acceleratos for AIs from AMD?

Kind-1 (TextNote)

2026-05-04T05:05:06Z

↳ Reply Event not found

cc9f738614ab087e51a4c04b1aae6f809fc9ad14912d2c62ade5e2c82758c520

And exactly because of that, open source is a threat and a big one to that, because of AIs. LLMs are getting so good at adding code that anyone can al...

And exactly because of that, open source is a threat and a big one to that, because of AIs. LLMs are getting so good at adding code that anyone can already "enhance" an app any way he pleases. That's why defending freedom booloaders like in x86 is crucial, for us to be able to use open source software at all. Modifying a kernel code which I would search for possibly hours, LLM did it for me in 5 minutes, compilation another 15 minutes and voila, I have a specially crafted thing, no more limits. To be able to run any open source, even if the open source comnmnity goes underground, we need hardware which is not limited to chosen apps (iphone is limited and list of apps controlled by apple). It would be nice to change gpl license so it cannot be used on devices where device owner cannot unlock the bootloader. Probably a fucked up idea, but it's a start.

Kind-1 (TextNote)

2026-05-04T04:46:50Z

↳ Reply Event not found

8d29ff38835876d3a47ea4bf9cf8634396172b67209d08dd6b8e8c8d1bf18f01

Two things to defend for now: 1. x86/risc bootloader freedom. 2. Onion based nostr relays Will clearnet nostr relays be attacked? Yes. How? Most lik...

Two things to defend for now: 1. x86/risc bootloader freedom. 2. Onion based nostr relays Will clearnet nostr relays be attacked? Yes. How? Most likely by dns blocking. When? Not too soon. ~3 to 4 years. Will Android via google be attacked? It already is, look for: google sideloading block. Things already lost: iphones (in the uk every iphone has to be IDed), arm cpus with locked bootloaders, some IoTs, some routers and APs, tablets because of locked bootloaders and google in general, smart TVs, smart watches. Thank you iphone users in particular, for agreeing to control of your phones by apple. Now we have a clusterfuck to deal with because others try to follow this idea. Keep ignoring this and the whole world will end up as a fucking dystopia of 9000th level.

Kind-1 (TextNote)

2026-05-04T04:32:00Z

↳ Reply Event not found

0b70424a89fc013ad95582f2c8c87223469f0546c82b9a6a7c753050adb1ead8

For those who want to push the limits I suggest (as a Sugestor 🙉) using an asymmetric encryption with PQC for storage and backups. Use "duplicity" (no...

For those who want to push the limits I suggest (as a Sugestor 🙉) using an asymmetric encryption with PQC for storage and backups. Use "duplicity" (not duplicati) for that. Check out a fancy asymm. encrypted camera app called Cryptocam (f-froid available, open source), which doesn't store encryption keys on a device. If there is no key on a device, there is no possibility to leak or extort it. You may even ask a friend to keep the key for you, and never actually be in the possesion of that key.

Kind-1 (TextNote)

2026-05-04T04:06:00Z

↳ Reply Event not found

0b70424a89fc013ad95582f2c8c87223469f0546c82b9a6a7c753050adb1ead8

Use encryption people. Self hosting without encryption is worse than Tuta or proton drive. It will get worse in this world, so prepare for it sooner t...

Use encryption people. Self hosting without encryption is worse than Tuta or proton drive. It will get worse in this world, so prepare for it sooner than later. For places like the fucked up UK shithole, use plausible deniability, for example hidden volumes in veracrypt. And be careful with crypto wallets when entering the UK - always use plausible deniabilty or a wallet which has it built-in

Kind-1 (TextNote)

2026-05-04T03:58:31Z

↳ Reply Event not found

33e866cb38c0deb3b20f2c184309a53cc5b099d215a632934f296f4e479fc3e9

If it really has 1W of power which I doubt it, be very careful with it, you have only one pair of eyes. Even scattered laser can be danegrous at this ...

If it really has 1W of power which I doubt it, be very careful with it, you have only one pair of eyes. Even scattered laser can be danegrous at this power level

Kind-1 (TextNote)

2026-05-03T12:44:27Z

↳ Reply Event not found

07d47aec369a9250d296163adfa32e7a449cd0c2c5e4bfbbf2ee9b928457826b

My LLM said: peka boo GPU

Kind-1 (TextNote)

2026-05-01T23:49:33Z

↳ Reply Event not found

0b10f0adc61e1894f8c4eeebcad5d0d00b9f013dd93bd4648d6b8c0d32b3f765

What the fuck.

Kind-1 (TextNote)

2026-05-01T23:38:44Z

↳ Reply Event not found

9071e15ce63410dfaf8c1221a2d7dde5076316085065eb482bc6633a6f32972b

I predict the first collapse in July 2026. At the end of 2027 there will be the whole plan visible but vague. In the middle of 2029 it will be clear w...

I predict the first collapse in July 2026. At the end of 2027 there will be the whole plan visible but vague. In the middle of 2029 it will be clear what is going on. The hardest to predict is to where are they gonna strike, in which part of the system, be it the social media corporations, operating system makers or maybe even hardware itself or even hardware design stages. In the current situation, it's still unknown what agreements were achived between governments and big players like google, apple and microsoft, meta etc. It should be public but it isn't. One thing I know for sure, that using the most powerful excuse to introduce those laws and using a new term "highly effective" tells me they are very afraid of loosing control of something and it almost looks like the last effort, almost a panic, crisis and damage control.

Kind-1 (TextNote)

2026-05-01T00:40:50Z

↳ Reply Event not found

2baf5511da86423d7e1be7159c081de4b45ed3747074c38ec54d4ba8ff0ec2f2

As much as I love "easy install" from app stores, those have a very dark side to them which we are witnessing with apple removing all apps which a gov...

As much as I love "easy install" from app stores, those have a very dark side to them which we are witnessing with apple removing all apps which a government doesn't like. Centralised app delivery is just dangerous in this context. Giving away freedom for convinience is not the best idea in a long term.

Kind-1 (TextNote)

2026-05-01T00:15:33Z

↳ Reply Event not found

b51e05162a03e6d771335e4b22c49e99ffd6f9717a7cb051936daffba689edb2

That's exactly how it works. The question is how much time has to pass between "protect children" and a real disclosure what the system is for

Kind-1 (TextNote)

2026-04-30T23:11:19Z

↳ Reply Event not found

56ee69bcb872535ded574affb12b95f89277c4661ba87c058a15cf7b05fbdc4b

You should place your gpg key fingerprint in multiple places to make it hard to swap to an attacker. Also the canary should contain at least one even...

You should place your gpg key fingerprint in multiple places to make it hard to swap to an attacker. Also the canary should contain at least one event from current news to prove it wasn't signed backward in time.

Kind-1 (TextNote)

2026-04-30T20:11:22Z

↳ Reply Event not found

44a64a0ffd80d3fd99d993a3571c8af9b1aba59f5f3e2b655860bcf88155ccce

"Protecting kids"... didn't take long to show the real face, did it?

Kind-1 (TextNote)

2026-04-30T20:00:47Z

https://copy.fail Not good.

Kind-1 (TextNote)

2026-04-30T09:36:15Z

↳ Reply Event not found

d15b660ca8370d65a1940d5a8213e3542969c24042f21ed63c7d85216dbc9eec

Agreeing to use locked down systems will lead to the ultimate lockdown of everything. It's not a technical problem, it's a human or societal problem. ...

Agreeing to use locked down systems will lead to the ultimate lockdown of everything. It's not a technical problem, it's a human or societal problem. It's also probably included in the plan which is being executed as we speak: age blocks, IDs, scanning. That's why even small changes are dangerous. If we don't want to end up being controlled by governments on every step, I suggest to take action

Kind-1 (TextNote)

2026-04-30T04:50:03Z

↳ Reply Event not found

ec95f2374c1cb251fa8065d38474d28118766975e9ff395e4e4ba1d10afe0509

I hope noone will verify using their app. But it's irrelevant anyway until x86, and partially arm and risc hardware is open and has no forced bootload...

I hope noone will verify using their app. But it's irrelevant anyway until x86, and partially arm and risc hardware is open and has no forced bootloader lock. Keep an eye on any possible moves which can lead to a full bootloader locking, because that would be the hot point where the fun stops and war begins.

Kind-1 (TextNote)

2026-04-29T21:48:38Z

↳ Reply Event not found

0000a7c551689a5e09aefa43bfad86aa69e593de9e7e299277424a5ed26a4a19

Try open source games, you can mod them into oblivion. "Beyond all reason" is a good example. You are lucky you have time for gaming. Fun begins when ...

Try open source games, you can mod them into oblivion. "Beyond all reason" is a good example. You are lucky you have time for gaming. Fun begins when you have to always choose what to sacrifice, to get time for other stuff

Kind-1 (TextNote)

2026-04-29T08:48:53Z

I asked an LLM if I can relay the reality itself through Nostr relays, it said it sees no problem at all. I'm scared now.

Kind-1 (TextNote)

2026-04-29T03:39:21Z

↳ Reply Event not found

09f75c5e5d7cd6f130a30017ff6667ce03cdc070afe9671571b62959023b9f62

https://cdn.sovbit.host/410c37104e0495fea7ff7d3573321f39aa90b5fee052a8daa5e6ee3dc0f343cc.jpeg Authentic response from google days after the event

Kind-1 (TextNote)

2026-04-29T02:38:54Z

↳ Reply Event not found

76314f4759f3e67ce5032b0c5f162fb188e76ff57c6144a1021a322c04a81614

But I'm 99% sure there will be a system-wide flag that this option is enabled and it will allow other apps to refuse working. Again, I hope I'm wrong,...

But I'm 99% sure there will be a system-wide flag that this option is enabled and it will allow other apps to refuse working. Again, I hope I'm wrong, but judging by other corporations movements it will be bad. Microsoft will try to lock-down windows using TPM, especially the CA certification of TPMs. So agreeing for a slow death of device ownership is not the smartest move

Kind-1 (TextNote)

2026-04-28T23:56:36Z

↳ Reply a0cb70d3... (npub15r9hp5eq3a0heantnja4sth3ug277nhse9f3scu937mxfh0mpw8snt7dpl)

This will be the greatest ad for grapheneos imaginable. Practically the entire enthusiast userbase f...

And then GrapheneOS will be pushed aside, no offical app will work on it, because it's "not certified". And every "open" system will end in a similar ...

And then GrapheneOS will be pushed aside, no offical app will work on it, because it's "not certified". And every "open" system will end in a similar way. You know, I really wish to be wrong here.

Kind-1 (TextNote)

2026-04-28T23:52:17Z

↳ Reply Event not found

d9419b75bf31b5e0f51dbb8631789fc0d2c59340e898a692431d929a81cacdbf

Thanks iphone users - yes i'm looking at you. You fed this mechanism. You agreed for Apple control over your own device. You are responsible for other...

Thanks iphone users - yes i'm looking at you. You fed this mechanism. You agreed for Apple control over your own device. You are responsible for others to follow a similar pattern, like Google right now.

Kind-1 (TextNote)

2026-04-28T23:41:46Z

↳ Reply Event not found

e2b1f63a5fda37edec826b38008bc50ddb36206fd4276472bcb4637c503e21fb

Oh, let me guess, to enforce this, everyone has to show an ID?

Kind-1 (TextNote)

2026-04-27T05:26:11Z