Rake

@0xRakeHMD

Joined on Jun 3, 2022

  •  Like  Bookmark
  • <a name="top"></a> [!IMPORTANT] Markdown implementation and formatting have different standards depending on the platform utilized by the end user. HackMD's Formatting and cheatsheet are a bit different from the ones utilized on GitHub. Be sure to also check: The official documentation on GitHub to learn more about writing and formatting syntax. Markdown is a method for writing formatted text using a simple plain text format. This guide will provide you with a comprehensive understanding of the key commands in Markdown, aimed at enhancing your GitHub README. Headings Text styles Syntax HighlightingInline code
     Like  Bookmark
  • macOS: Commandline & Basic Security Guidelines :::spoiler if you're looking for true security, forget macos and windows altogether - You should be looking at OpenBSD, Whonix and/or Qubes for desktop use || GrapheneOS for mobile. ::: Table of Contents This is a really really really high-level starter guide whose aim is merely to ensure minimal security standards for users of macOS. ==Regarding the CLI Commands: Probably the most important part of this entire document is this yellow warning== :arrow_down:
     Like  Bookmark
  • [TOC] Notes: Kerchoff's Principle, CIA Triangle, Certificate Authority, Registration Authority, Remote Attestation, Intel SGX, AMD TrustZone, eFUSE, SRAM PUF, Instrinsic-ID, NXP, G+D, SecureFPGA, Trussed, openTitan Introduction Traditional Security Measures taken by SemiConductor Manufacturers. Semiconductor Manufacturers offer hardware based, step-up SKUs, implemented via : BBRAM/eFuse Options/One Time Password Solutions/Wire Bond-out/Die-specifc.
     Like  Bookmark
  • _ _ __ /_\ _ __ __ _| |_ ___ _ __ ___ _ _ ___ / _| __ _ //_\\| '_ \ / _` | __/ _ \| '_ ` _ \| | | | / _ \| |_ / _` | / _ \ | | | (_| | || (_) | | | | | | |_| | | (_) | _| | (_| | \_/ \_/_| |_|\__,_|\__\___/|_| |_| |_|\__, | \___/|_| \__,_| |___/ ___ _ _____ _ _ / _ \ |__ ___ _ __ ___ _ __ /__ \_ __ __ _ _ __ ___ __ _ ___| |_(_) ___ _ __ / /_)/ '_ \ / _ \| '_ \ / _ \| '_ \ / /\/ '__/ _` | '_ \/ __|/ _` |/ __| __| |/ _ \| '_ \ / ___/| | | | (_) | | | | (_) | | | | / / | | | (_| | | | \__ \ (_| | (__| |_| | (_) | | | |
     Like  Bookmark
  • CypherPunk Manifesto Back to activism.net/cypherpunk/ A Cypherpunk's Manifesto by Eric Hughes Privacy is necessary for an open society in the electronic age. Privacy is not secrecy. A private matter is something one doesn't want the whole world to know, but a secret matter is something one doesn't want anybody to know. Privacy is the power to selectively reveal oneself to the world. If two parties have some sort of dealings, then each has a memory of their interaction. Each party can speak about their own memory of this; how could anyone prevent it? One could pass laws against it, but the freedom of speech, even more than privacy, is fundamental to an open society; we seek not to restrict any speech at all. If many parties speak together in the same forum, each can speak to all the others and aggregate together knowledge about individuals and other parties. The power of electronic communications has enabled such group speech, and it will not go away merely because we might want it to. Since we desire privacy, we must ensure that each party to a transaction have knowledge only of that which is directly necessary for that transaction. Since any information can be spoken of, we must ensure that we reveal as little as possible. In most cases personal identity is not salient. When I purchase a magazine at a store and hand cash to the clerk, there is no need to know who I am. When I ask my electronic mail provider to send and receive messages, my provider need not know to whom I am speaking or what I am saying or what others are saying to me; my provider only need know how to get the message there and how much I owe them in fees. When my identity is revealed by the underlying mechanism of the transaction, I have no privacy. I cannot here selectively reveal myself; I must always reveal myself.
     Like  Bookmark
  • Phonon Testnet FAQ :::warning Word of warning to all you "would be warriors": usage of the phonon protocol is extremely addictive. ::: Table of Contents [TOC]
     Like  Bookmark
  • Phonon X Hats Finance Table of Contents [TOC] Background Feature: = Hacker Bounties `@essential` # Prerequisites:
     Like  Bookmark
  • PHONON DAO: Press Release :::info August 1, 2022 For immediate release. ::: :newspaper: Alpha Testnet Launch Phonon DAO Launches Its Alpha Test, Laying Down a Gauntlet to Visa, Mastercard, Applepay.
     Like  Bookmark
  • Many of these rules, reflections and quotations came from my role as Chairman of the “transition team” for President Gerald R. Ford and my service as White House Chief of Staff. Others came from experiences as a U.S. Naval Aviator, a Member of Congress, Ambassador to the North Atlantic Treaty Organization (NATO), Secretary of Defense, Presidential Middle East Envoy, business executive, Chairman of the U.S. Ballistic Missile Threat Commission, and other experiences. These reflections and quotations have been gathered over the past 40 years. Credit is given where known. As the quotation has it, “If it’s not true, it’s still well founded.” (Unknown) :pushpin: Chapters Serving in the White House :: Keeping your Bearing in the White House Doing the Job in the White House Serving in Government Politics, Congress and the Press For the Secretary of Defense
     Like  Bookmark