2024-05-16 21:01:57
- reply
by npub16as…g2tf
I love these! Growing up, there was one in my house and it took me years and years to figure it out.
In these I saw some lions, a camel, some weird snowmen, and ants (maybe?). For anyone who doesn't know, take of your glasses if you wear them, get the image out of focus, and then slowly bring your eyes back into focus. If you do it right, you'll see a 3d image emerge from the noise.
2024-05-16 20:55:41
by npub16as…g2tf
Looks like Swan was hit hard enough to send out a guide on how not to get scammed. The kid was probably for real.
---
Hi Jay,
We have seen an elevated incidence of a phone-based scam across the financial industry. Please be vigilant and protect yourself from losing funds, including from your Swan account.
How does the scam work?
Hackers will call you, or contact you online from unknown phone numbers or unknown accounts, claiming to be from Microsoft, Google, your bank, or a company you have a relationship with, like Swan. These fake “agents” will ask you to take certain actions such as reading them a code from your phone or computer. After they obtain this code, they will drain all of your online accounts.
Swan representatives will never ask you to share codes or request access to your account.
How do you protect yourself?
- Never share any code from any device, for any reason, with anyone over the phone, the internet, or in person. Triple check that you’re on the right website before typing in any codes.
- Don’t interact with any phone calls requiring you to respond to a robot (“press 1 to continue”). Don’t respond to any calls that tell you your account is at risk and you must take urgent action. Contact us, or book calls, through [official channels](https://link.swanbitcoin.com/ODc1LVhLUS02MzQAAAGTIW8bTj-zEZobK2kXVjFTfu4WTw-gu-ZAr_iuvpGZpCCgZHmue0QzQu3gYfo0vn728bdQZO4=) only.
- Set up app-based 2FA on all your online accounts, especially your email and Swan account. [Here’s how to do it on Swan](https://link.swanbitcoin.com/ODc1LVhLUS02MzQAAAGTIW8bTxLsXuzVkHvWlDp_K78gIQ7kcbH69itNYujTLVDniRDAETmZxMB9TtQRwJVm70SLFCw=).
- Consider disabling Google Authenticator Cloud Sync. Hackers are exploiting Google Authenticator because it has a feature called Cloud Sync, which is being exploited for this attack. If you use Google Authenticator, here is how to disable cloud sync: Open Google Authenticator ⇒ Tap Profile Photo ⇒ Hit “Use without an account” ⇒ Hit Continue
- Carefully read about [common online scams](https://link.swanbitcoin.com/ODc1LVhLUS02MzQAAAGTIW8bTgjWp-Yx27PWFYzErXtmu6f5XGCSloLqcEeiSRAUVGqMlppWPjUwa34FWqHm7239KYA=).
- Think twice before completing an identity verification such as a selfie request - Swan will only request a selfie in order to unlock your account. Hackers will often try to convince you to complete this flow and then attack the account once you complete it.
- Visit a site like haveibeenpwned.com. If your email has appeared in a data breach, consider updating your email password and changing the email associated with your Swan account. If you'd like to change your Swan email, instructions are located [here](https://link.swanbitcoin.com/ODc1LVhLUS02MzQAAAGTIW8bTsDvTiqvQZvejrvpxaluAjEoA2F1Xay23igJHyFnDBvKisfe5ZZL4cgXP_7IpHf1gPQ=).
How do hackers access my accounts?
1. Hackers typically first access your Google account because you’ve reused your password across online accounts, so they can easily guess it. Then they often bypass Google’s account protections by getting you to read them a code over the phone.
2. Once inside your Google account, they rely on people using Google Authenticator for 2FA. Google Authenticator has a dangerous “cloud sync” feature, where your 2FA codes become accessible as soon as they hack your Google account.
3. Once they have your 2FA codes, they can access most if not all of your online accounts including Bitcoin/cryptocurrency accounts, banking accounts, and other sensitive data. They will use this information to drain your funds, steal your personal data, and escalate their attack.
This scam can also be performed on other common email accounts such as Yahoo, AOL, Comcast, and others. Google Authenticator is not the only way to perform the scam, but it is common. Stay vigilant and never give information over the phone to anyone claiming to be an agent or protecting you.
Consider using a unique password for all your accounts and storing them in a service like 1Password.
Pay close attention to emails received from your trusted financial institutions. Prior to clicking on any link, right-click and copy it and validate that it goes to swanbitcoin.com or swan.com, for example. Check that the email From field is from those domains. These are the only authorized Swan domains.
If you would like more information, or have any further questions, please visit our [FAQ page](https://link.swanbitcoin.com/ODc1LVhLUS02MzQAAAGTIW8bTrDf1f6C3_bmgcIr25mZmyZuBCP6Rl-JQRSPXr3e3cq7147ieIs5XeXePrg5aQecGAQ=).
Thank you,
Swan Team
#nevent1q…uqxx
2024-05-16 19:38:25
- reply
by npub1rzg…kxve
The title is hilarious.
As early adopters, we only had to jump through the hoop of using earlier versions of nostr clients, a year and a half ago. We didn’t have to jump through hoops to get sats though. The user experience is night and day compared to then.
But again, 2 apps is noob friendly.
Online banking for example:
-login to bank app
-get a 2fa code via email
-open email, copy code
-paste code on bank app
Objectively, using a banking app is a pretty seamless experience. Damus + WoS (or another wallet) is same difficulty level. (And lets say a user doesn’t care for zaps, his experience is even easier)
I dont think the issue is the ease of use. I think people are too attached to legacy social media. Seems like westerners dont care about censorship resistance (if i dont have anything to hide, why do i care type of mentality).
2024-05-15 23:14:43
- reply
by npub16as…g2tf
If you have a chocolate bar.
And I have a chocolate bar.
If I cut mine in half, from one whole to two halves, we both still have two chocolate bars between us, but I've added a decimal place (1 bar to 2×0.5 bars). I could also make 1000 0.001 bars, it doesn't make a difference. There's no inflation because we each still have the same amount of chocolate.
But if I conjure a second chocolate bar out of thin air, then suddenly I have twice as much chocolate as you, and we have three bars between us, which is chocolate inflation and a crime worthy of the guillotine.
2024-05-15 01:47:18
- reply
by npub1zan…7kyn
REVISED:
There's a difference between hiding something, and controlling who you share private information with.
When discussing how governments spy on their citizens, we agree that keeping your information to yourself is a non-existing reality for most. Gov know a lot about us. Information is being collected consecutively.
But why should they keep our information centrally? Most of us are not criminal. We are born with the right to control who we share personal information with.
I don't support centralization of personal information because I believe gov is misusing it.
Edward Snowden uncovered PRISM.
The gov in China has a social credit system.
The PNR system in Europe.
Russia's Yarovaya Law.
There's proof.
So... I'm not hiding. I am restricting, because that's my right.
"But I have nothing to hide, I don't care the government knows everything about me".
That's also your right.
I can simultaneously exercise my right to keep my personal information privately, and also have nothing to hide.
It's data I produce. I get to decide what to do with it.
---
Gov justifies collecting our realtime location, our internet use, our payment information, how we interact online, who we talk to, what you say to your friends and family...
"To stop terrorists, of course."
And how's that going?
Did it help them to have my information to stop the terrorists?
No.
There are active terrorists still, and I wasn't one of them. Neither were you.
It seems fitting to discuss the irony of naming oneself a "fighter of terrorists", while illegally collecting and misusing personal data to benefit a political agenda that deteriorates your own citizenry.
It seems equally fitting to discuss the danger of someone doing just that, and calling themselves democrats.
There's nothing useful for them to do with my personal information. So why should they have it?
I think they shouldn't.
That's all.
2024-05-15 01:37:05
by npub1zan…7kyn
There's a difference between hiding something, and controlling who you share private information with.
When discussing how governments spy on their citizens, we agree that keeping your information to yourself is a non-existing reality for most. Gov know a lot about us. Information is being collected consecutively.
But why should they keep our information centrally? Most of us are not criminal. We are born with the right to control who we share personal information with.
I don't support centralization of personal information because I believe gov is misusing it.
Edward Snowden uncovered PRISM.
The gov in China has a social credit system.
The PNR system in Europe.
Russia's Yarovaya Law.
There's proof.
So... I'm not hiding. I am restricting, because that's my right.
"But I have nothing to hide, I don't care the government knows everything about me".
That's also your right.
I can simultaneously exercise my right to keep my personal information privately, and also have nothing to hide.
It's data I produce. I get to decide what to do with it.
---
Gov justifies collecting our realtime location, our internet use, our payment information, how we interact online, who we talk to, what you say to your friends and family...
"To stop terrorists, of course."
And how's that going?
Did it help them to have my information to stop the terrorists?
No. There are still terrorists.
It seems fitting to discuss the irony of naming oneself a "fighter of terrorists", while illegally collecting and misusing personal data to benefit a political agenda.
It seems equally fitting to discuss the danger of someone doing just that, and calling themselves democrats.
There's nothing useful for them to do with my personal information. So why should they have it?
I think they shouldn't.
That's all.
2024-05-13 20:44:06
- reply
by npub1s9v…3ctl
Basic critical thinking skills. Get info from different sources, compare, contrast, evaluate, try my best to understand. Humans have the capacity to reason about things without needing complete knowledge about every detail. Of course it's possible I could be led astray. This is always a risk. Blindly trusting the experts is also risky. All users should have strong opinions about changes to bitcoin. When someone tells me that my opinion isn't valid because I'm not a dev, that is a huge red flag. I have strong opinions about what software is running on my node. Devs need to accept this and sell me on upgrading, not dismiss it. Otherwise I will most certainly not be upgrading.