-_-_-_x_-_-_-
All the Establishment's control wants, is, Distractions, Illusions, Consume,
Unknowledge, people forgot about ...
and all they want is found an way to criminalize btc formly, and this is an way of much others ways... some is not wrong on your thouchs, if on nowdays they do this on web, deep web, seeking for 'net-criminals' every they, btw, are work for this, every single day, ....
But I also know that the concern of many who are concerned is not only the possibility of inserting so-called criminal images, but also in this way the insertion of probable other lines that will compromise the security of many miners.. . . .
A simple example,:
"In this article, I focus on two modern defenses:
address space layout randomization (ASLR) and data execution prevention (DEP).
The beauty of these defenses is that they have little runtime overhead and can
provide some protection for all programs—even ones with serious vulnerabilities—
without requiring access to the program’s source code. This flexibility comes with
a tradeoff, however: the deployed defenses are not perfect. In this article, I shed
some light on how these defenses work, when they work, and how the presence of
unrandomized code can allow attackers to bypass them."
So, suppose if I am a malicious actor, who
has tried before and almost succeeded, and I know that it is possible for me to be able to build an executable within the network, but now I have one more option, since before I had some, such as using the fake publc keys and also the secret keys, but I had limitations and difficulties, But it was going well according to my goal and then they released another way for me to put images, and with practically unlimited space, I just need to adjust. But my intention is not in the images, but what I can put in each one, a little of what I'm building so that in the future, I have an executable within the network.
. Simple examples of how it works.:
Hackers can hide malware in image files using techniques such as altering pixels in a JPEG photo to embed malicious code, making subtle color value differences between altered and unaltered pixels that are undetectable to the human eye, hiding a payload within the code itself, calling other executables for an attack, and appending text strings to the end of a file without changing the visual appearance of the image (HackerNoon, SentinelOne).
No strange file names. No antivirus warnings. Just a harmless picture, secretly concealing a payload that can steal data, execute malware, and take over your system without a trace.
So, putting all this together, and having finished my supposed executable divided into several public keys and so on, the time has come for me to put my supposed plan into practice and execute it as follows: sending transactions in the necessary order for these public keys to be grouped in the correct way. Adding signatures and messages on the network that make them run everything inside a single node, even if these keys are in separate blocks, they will group together and it will be my first attempt to make this executable work, and I can't make a mistake, and to prevent it from failing, I've tested them in a test-net before....
....
. Can this be possible? I don't know.
. Can this be impossible? I don't know.
. Is it possible to avoid it? yes.
---------------------------------------------------------------------
-it can also be said that the discussion induced by size/limit, SPAM, sensitive images(CSAM) etc, are just a distraction to obfuscate something bigger.
-----------------------------------------------------------------------------------------------------
And so, it's based on that that I said that one day there would come a point where it would be necessary to enable arbitrary
CoinJoin.
" It may have some scaling advantages if it is used as more than just a privacy tool. "
--------------------------------------------------------------------------------------------------------
So, randomly I talked about it here a few days ago, and see that it has already been proposed for 2026>>>
#
Reduced Data Temporary Softfork(committed
3 days ago*)
"We propose a flag day startheight of 934864 (2026-02-01), with mandatory signaling leading up to activation. This implies an expiry day stopheight of 987424 (2027-02-01). These heights were extrapolated from block 920464 which occurred near 00:00 UTC on 2025-10-24."
-In addition to being temporary, it does not solve the real problem, and it even causes more problems. /#
"Bitcoin, the world’s largest and oldest blockchain, is confronting an existential question of how much data should live on its ledger.
A new proposal, Bitcoin Improvement Proposal 444 (BIP-444)(

), seeks to roll back a recent OP_RETURN upgrade that allowed users to attach text, images, and digital signatures to transactions.
Its supporters call it a necessary defense against legal exposure. However, critics say it’s a misguided overreach that could fracture Bitcoin’s open ethos."
. I would also like to add that it would be necessary to add a limit for a maximum of 3 mult 'SK' to avoid this likely grouping.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
And instead of seeing a healthy and productive discussion, we see the usual, division!
as if it were orchestrated to take the focus off the main objective, security. and the permanence/perseverance of this security continues to exist.
As I now would want to be seeing a discussion about how to send BTC transactions via radio, via newspaper, via smoke signal, via couriers to horses in apocalyptic times carrying hashes to be confirmed in secret bunkers and by resilient people who remain strong on goals in the midst of major crises. and constantly looking for ways to escape from the greater controller, the great thief, I see just another essence of freedom being used as a tool of the controller, joining him instead of fighting him, sad progress.
gotennawas selled to forterra
txTenna is a proof-of-concept Android app developed by Samourai as part of the Mule.Tools research and development initiative exploring alternative means of transaction broadcasting to enhance censorship resistance.
txTenna can:
. be used for transmitting transactions to the bitcoin network via SMS. Send your own transactions by SMS using a known txTenna relay or allow your own contacts to use your mobile number as an SMS relay.
. be used for transmitting transactions to the bitcoin network via the goTenna mesh network.
Samourai has been curating Mule.tools, an R&D initiative to further reinforce the censorship-resistant properties of the Bitcoin blockchain and also published the code for Pony Direct, a proof-of-concept app for broadcasting transactions over SMS in January. “We believe one of the most fundamental value propositions that bitcoin provides is censorship resistance,” SW, the CEO of Samourai, told Bitcoin Magazine. “The freedom to transact freely and without permission is not a freedom to take lightly, or give up without a fight. We saw the open internet transform into a walled garden, captured by regulatory and corporate interest working together — and largely aided by red-herrings like ‘net-neutrality.’ “The tools we are building arm the little guy — the individual — with the tools they need to level the playing field against the inevitable overstepping of bounds by hostile actors, oppressive regimes and overzealous governments,” said SW. “We're making some material changes to Samourai Wallet to allow for a greater high latency and offline experience. In conjunction with the release of txTenna, Samourai Wallet users will be able to theoretically keep their phone offline at all times and still be able to send and receive payments with minimal hassle.”


whats happened with cce.cash openly recently with cool new feautures ..easy acces?nokyc?

-----------------------------------------------------------------------------------------------
What I realize with all this happening over time is that security measures for privacy and resilience are being left aside, and even the opposite, paths are being opened litle by litle that can come in a way, weaken security, with paths that are being opened where they did not exist before.
---------------------------------------------------------------------------------------------------
Destroying BTC from the outside in, is harder than destroying it from the inside out.
Would it be a new direction to be taken? It's to be thought...
----------------------------------------------------------------------------------------------------
***So, all this fallacy was written by a layman, who is only interested in the subject and tries day after day to reason outside the box.
>>conclusion:
>> The right thing is I will fish and stop writing a lot of nonsense that comes into my head because I keep feeding it with what I see on the INTERNET.
And come here just to talk about the weather, of the moon and space, since the uncertainty of the closing of the month of October is getting worse and worse and there are 3 days left.!!