POPULARITY
Categories
Dan Bongino and Cash Patel break silence on the Trump assassination attempt. PBD, Vinnie, and the crew react to the backlash, Epstein fallout, and why people are losing trust in “lone gunman” narratives.
Episode 4507: Who Really Is Pope Leo The XIV; Our Power Grid Is Compromised
(0:00) The guys talk about the latest with Belichick and Jordon Hudson. (11:02) They continue to talk about Bill and Jordon and weigh in on Pablo Torre’s comments. (24:18) We go back and forth on Will Campbell’s future and Zo’s plans for the weekend. (32:27) The guys finish the hour with calls and reactions to Patriots, Belichick, and Red Sox news.
Send us a textWe explore the five key factors beyond hormone imbalance that can cause vaginal irritation, infection, and microbiome disruptions that many women experience without clear explanations. This mini-episode provides practical detection strategies and solutions for identifying your specific triggers, with special focus on maintaining vaginal health while traveling.• Blood sugar spikes provide food for yeast and other microbes, especially when consuming sugar without protein, fiber or fat• Gut health imbalances and antibiotic use disturb both digestive and vaginal microbiomes• Estrogen levels affect glycogen availability and infection susceptibility when too high or too low• Vaginal pH can be disrupted by menstrual products, soaps, fragrances, menstrual blood, and semen• Compromised immune function from stress or illness decreases your body's ability to maintain microbiome balance• Choose breathable cotton underwear and appropriate menstrual products when traveling• Plan ahead for proper sleep, hydration, and nutrition when traveling to maintain immune function• Prepare protein and fat-forward snacks to stabilize blood sugar during tripsFuture you is going to love yourself for planning ahead, and you will feel so much better throughout the day, energy-wise, plus hopefully you won't have as much irritation.CONNECT WITH BRIDGET LinkedIn | Instagram | Website Book your free strategy call here | Sign up for weekly tips via email
Compromised At The Top? Patel, Bongino, and the FBI's Biggest Mysteries! On today's show I ask have Dan Bongino and Kash Patel, the MAGA darlings of the FBI, been compromised? Are the 2 Trumps loyalist known for going against the Deep State, hiding something? Web Site: www.DontTreadonMerica.com Email the show: Donq@donttreadonmerica.com DTOM Store (Promo code DTOM for 10% off) Sponsors: www.makersmark.com www.alppouch.com/DTOM www.dubby.gg Promo code: DTOM Social Media: Don't Tread on Merica TV DTOM on Facebook DTOM on X DTOM on TikTok DontTreadonMericaTV DTOM on Instagram DTOM on YouTube
In today's very exciting episode, we sit down with Shane & Shane, a Christian contemporary music duo, to hear their testimonies of how they came to faith, despite not being raised in Christian homes or growing up as Christians. They also tell us about how they started making worship music together, starting with simply singing the Psalms. We also talk about the power of worship music and its ability to bring us from despair into the joy of the Lord. And Shane & Shane treat us to a brief worship session and devotional, so be sure to stick around until the very end! Text DEVO to 682-318-3835 to receive the Worship Initiative devotional every day! Share the Arrows 2025 is on October 11 in Dallas, Texas! Go to sharethearrows.com for tickets now! Buy Allie's new book, "Toxic Empathy: How Progressives Exploit Christian Compassion": https://a.co/d/4COtBxy --- Timecodes: (01:09) Shane & Shane introduction (08:42) Testimonies (16:29) Starting making worship music (25:57) Leading Godly families (29:18) Worship Initiative (37:28) Worship and devotional --- Today's Sponsors: We Heart Nutrition — Get 20% off women's vitamins with We Heart Nutrition, and get your first bottle of their new supplement, Wholesome Balance; use code ALLIE at https://www.WeHeartNutrition.com. Shopify — Shopify is the commerse platform behind millions of businesses around the world. Get started with your own design studio to turn your big business idea into profit. Go to shopify.com/allie to sign up for your $1 per month trial and start selling with Shopify today! CrowdHealth — get your first 3 months for just $99/month. Use promo code 'ALLIE' when you sign up at JoinCrowdHealth.com. --- Related Episodes: Ep 149 | Worship Music https://podcasts.apple.com/us/podcast/ep-149-worship-music/id1359249098?i=1000446698428 Ep 1083 | Maverick City Music: Christlike or Compromised? https://podcasts.apple.com/us/podcast/ep-1083-maverick-city-music-christlike-or-compromised/id1359249098?i=1000673212591 --- Buy Allie's book, You're Not Enough (& That's Okay): Escaping the Toxic Culture of Self-Love: https://alliebethstuckey.com/book Relatable merchandise – use promo code 'ALLIE10' for a discount: https://shop.blazemedia.com/collections/allie-stuckey Learn more about your ad choices. Visit megaphone.fm/adchoices
REFLECTION QUESTIONS1. Why does Jesus describe himself as the one who has the sharp two-edged sword? Why do we often think of God's judgment first coming to the outside world? Why is it important to remember that judgment begins at the household o God?2. How does opposition to Christianity look different in our culture than it did in Pergamum? Are there any similarities?3. In what areas do you think we as Christians are most likely to compromise today? What can we do to prevent compromise in our lives and in our churches?4. Jesus points out the error of some to the whole church. What should we take away from this? How can we restore those who are caught in sin with a spirit of gentleness (Gal. 6:1)?
SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast
Web Scanning SonicWall for CVE-2021-20016 - Update Scans for SonicWall increased by an order of magnitude over the last couple of weeks. Many of the attacks appear to originate from Global Host , a low-cost virtual hosting provider. https://isc.sans.edu/diary/Web%20Scanning%20SonicWall%20for%20CVE-2021-20016%20-%20Update/31952 Google Update Patches Exploited Chrome Flaw Google released an update for Chrome. The update fixes two specific flaws reported by external researchers, CVE-2025-4664 and CVE-2025-4609. The first flaw is already being exploited in the wild. https://chromereleases.googleblog.com/2025/05/stable-channel-update-for-desktop_14.html https://x.com/slonser_/status/1919439373986107814 RVTools Bumblebee Malware Attack Zerodaylabs published its analysis of the RV-Tools Backdoor attack. It suggests that this may not be solely a search engine optimization campaign directing victims to the malicious installer, but that the RVTools distribution site was compromised. https://zerodaylabs.net/rvtools-bumblebee-malware/ Operation RoundPress ESET Security wrote up a report summarizing recent XSS attacks against open-source webmail systems https://www.welivesecurity.com/en/eset-research/operation-roundpress/
The Cybercrime Wire, hosted by Scott Schober, provides boardroom and C-suite executives, CIOs, CSOs, CISOs, IT executives and cybersecurity professionals with a breaking news story we're following. If there's a cyberattack, hack, or data breach you should know about, then we're on it. Listen to the podcast daily and hear it every hour on WCYB. The Cybercrime Wire is brought to you Cybercrime Magazine, Page ONE for Cybersecurity at https://cybercrimemagazine.com. • For more breaking news, visit https://cybercrimewire.com
On this episode of Hell Money, we're locking in on final updates before we take over Las Vegas, Nevada. We're auctioning the first piece from FUN!, the debut collection by Casey Rodarmor and Parker Day, and showing why Bitcoin-native auction tech beats the grift of legacy art houses.We explore:- Why Sotheby's and Christie's can't compete with Bitcoin builders- Launching Megalith.art, the first Ordinals + Bitcoin-native auction platform- The debut piece from FUN! by Casey + Parker- How to use Ordinals Satscards for in-person trading of inscriptions, runes, and more- The OP_RETURN drama: Bitcoin podcasters vs. Bitcoin Core devsGet bonus content by subscribing to @hellmoneypod on X: https://x.com/hellmoneypod/creator-subscriptions/subscribeOr support the podcast by sending a BTC donation: bc1qztncp7lmcxdgude4px2vzh72p2yu2aud0eyzys 10% OFF INSCRIBING VEGAS: https://pretix.eu/inscribing/vegas/redeem?voucher=HELLMONEY10% OFF BITCOIN 2025: https://tickets.b.tc/code/inscribing/event/bitcoin-2025ORDINALS PROTOCOL SHIRT: https://shop.inscribing.com/products/ordinals-protocol-shirtTIMESTAMPS:0:00 Intro and Inscribing Vegas9:12 Megalith.art auction of FUN!27:50 Ordinals Satscards32:00 Ordinals Satscard tutorial42:15 OP_RETURN drama57:00 Outro
Revelation 14 breaks in like a cosmic alarm, interrupting the chaos of empire with heaven's final word. In this message, Pastor Darren Rouanzoin unpacks how God's mercy confronts idolatry, political deception, and religious compromise with truth and justice.We'll explore:• What the mark of the beast really means and how it's shaping people today• Why Revelation 14 isn't about fear, but about urgent mercy• What the three angels reveal about allegiance, worship, and judgment• The two end-time harvests and how your daily life is forming your eternal futureWith wisdom from Michael Gorman, Eugene Peterson, Richard Bauckham, Darrell Johnson, and G.K. Beale, this teaching invites us to ask:Are you becoming like the Lamb or like the beast?
According to The Hacker News, an ongoing campaign that infiltrates legitimate websites with malicious JavaScript injects to promote Chinese-language gambling platforms has ballooned to compromise approximately 150,000 sites to date. In this episode, host Amanda Glassner is joined by Heather Engel, Managing Partner at Strategic Cyber Partners, to discuss. To learn more about today's stories, visit https://cybercrimewire.com • For more on cybersecurity, visit us at https://cybersecurityventures.com.
Earnest ‘EJ' Christian is joined by NBA author and analyst Greg Hrinya joins to discuss the 0-2 panic meter for both the Celtics and the Cavs, whether the Warriors can survive with a compromised Steph Curry and an huge OKC bounce back. Then the guys give final letter grades for all the eliminated teams from Round 1 and partake in a ‘A Future Giannis Team' Draft Sweepstakes. Host: Earnest ‘EJ' Christian Guests: Greg Hrinya
Thorin and Peter Dun are joined by UCAM Coach Crusher to discuss the downsides of homestands in League of Legends esports, all the teams in contention for winning LEC Spring, whether G2 can succeed, disappointment from Irrelevant and BDS, Noah's strong play despite the circumstances last week, and more!
Dr. Len Munsil is president of Arizona Christian University, which seeks to be America's premier biblical worldview university. While the vast majority of Christian colleges today are significantly compromising their biblical foundations, Arizona Christian is a great example of one that isn't. So what does that look like in practice? How are many Christian colleges compromising, and what are the keys to changing that? Dr. Munsil shares excellent insights on those questions in this episode.MENTIONED IN THE EPISODE:Arizona Christian University: https://www.arizonachristian.edu/My interview with Dr. Everett Piper on the state of Christian colleges: https://natashacrain.com/the-state-of-christian-colleges-with-dr-everett-piper/My newest book, When Culture Hates You: https://www.amazon.com/When-Culture-Hates-You-Persevering/dp/0736984313
Back To Those Live Streams, Fuckery Friday, Sony Still Makes The Best Headphones, Dr Dre Has A Company Called Beats & He Has A History Of Beating Women, Worshipping Celebrities, DUI's, Rice Rockets, Asians Sucking At Driving, 90s, 2000s Words, Donald Trump Says Harvard Is Anti-Semitic & A Threat To Democracy, Donald Trump Is 100% Compromised & Owned By Israel & Not America First, Leftists Think Anytime It Rains It's Due To Climate Change, Portland Retards, Climate Freaks, Pope Was Pro-Pedophile, Pope Francis Was A Liberal, Justin Bieber Looks Like Shit, Hollywood Turning Innocent Young Kids Out, Amanda Bynes Has A Face Tattoo Now, Billy McFarland Announces Fyre Festival 2 Is Cancelled, Celebrity Letdowns, The Sly Show - Original Since 2004, Panhandlers, Begging For Money, Donald Trump Accepting Over $200 Million To Put Israel First, Israel First American Politicians, Donald Trump Says He Wants To Garnish Wages For Those Who Have Unpaid Students Loans, Terminating The I.R.S. Will Just Replace It With Something Way Worse With A Whole Lot More Government, Jews Don't Run The World Because AI Told Me Jews Don't Run The World - Therefore Jews Don't Run The World, The Eggs Lie - Eggs Are One Of The Most Healthy Things You Can Eat, Who's The Boss, Samantha Micelli, Alyssa Milano Is A Dumb Fucking Liberal, Right Wingers Who Bought Tesla's In 2025 Are Fucking Retards, Roseanne Spinoff The Connors Ends, All Reslect Lost For John Goodman, Spineless Roseanne Cast Members Are All Pieces Of Shit, Cowards In Hollywood, Going To Andrew Dice Clay Comedy Shows, Comedians Who Steal Each Others Jokes, Elon Musk Lied When He Said Comedy Is Now Legal, + Much More Fuckery TheSlyShow.com
In this powerful sermon from Rock Harbor Church, Pastor Brandon Holthaus dives deep into the life of Samson—called by God, yet compromised by his desires. Discover how Samson's story is not just a tale from the Old Testament, but a mirror reflecting modern culture, identity struggles, and the consequences of unchecked desires. Through the lens of Judges 14, this message reveals the subtle dangers of spiritual compromise, emotional manipulation, and living by sight instead of faith. You'll walk away challenged to evaluate your identity in Christ and inspired to fix your eyes on Jesus, not the fleeting things of the world. ✝️ Learn how God's call remains—even when we fall short—and how His strength is made perfect in our weakness.
On this episode of "The Federalist Radio Hour," Republican Rep. Tim Burchett of Tennessee joins Federalist Senior Elections Correspondent Matt Kittle to explain the reasons Republicans should codify President Donald Trump's agenda, discuss why he believes the U.S. is compromised, and give a behind-the-scenes look at his viral "Hot Pocket" comeback. If you care about combating the corrupt media that continue to inflict devastating damage, please give a gift to help The Federalist do the real journalism America needs.
On this episode of “The Federalist Radio Hour,” Republican Rep. Tim Burchett of Tennessee joins Federalist Senior Elections Correspondent Matt Kittle to explain the reasons Republicans should codify President Donald Trump’s agenda, discuss why he believes the U.S. is compromised, and give a behind-the-scenes look at his viral “Hot Pocket” comeback. If you care about […]
In this powerful sermon from Rock Harbor Church, Pastor Brandon Holthaus dives deep into the life of Samson—called by God, yet compromised by his desires. Discover how Samson's story is not just a tale from the Old Testament, but a mirror reflecting modern culture, identity struggles, and the consequences of unchecked desires.Through the lens of Judges 14, this message reveals the subtle dangers of spiritual compromise, emotional manipulation, and living by sight instead of faith. You'll walk away challenged to evaluate your identity in Christ and inspired to fix your eyes on Jesus, not the fleeting things of the world.✝️ Learn how God's call remains—even when we fall short—and how His strength is made perfect in our weakness.
In this powerful sermon from Rock Harbor Church, Pastor Brandon Holthaus dives deep into the life of Samson—called by God, yet compromised by his desires. Discover how Samson's story is not just a tale from the Old Testament, but a mirror reflecting modern culture, identity struggles, and the consequences of unchecked desires.Through the lens of Judges 14, this message reveals the subtle dangers of spiritual compromise, emotional manipulation, and living by sight instead of faith. You'll walk away challenged to evaluate your identity in Christ and inspired to fix your eyes on Jesus, not the fleeting things of the world.✝️ Learn how God's call remains—even when we fall short—and how His strength is made perfect in our weakness.
A group of Democratic members of Congress traveled to Louisiana to visit Mahmoud Khalil and Rümeysa Öztürk at federal detention facilities as both face potential removal from the U.S. The Trump administration claims they're each a threat to national security. Geoff Bennett discussed more with Massachusetts Sen. Ed Markey. PBS News is supported by - https://www.pbs.org/newshour/about/funders
4/22/2025 PODCAST Episodes #1929 - #1931 GUESTS: Todd Sheets, Rep. Mike Kennedy, John Reid, Michael Patrick Leahy, Rep. Derrick Van Orden, John Eastman + YOUR CALLS! at 1-888-480-JOHN (5646) and GETTR Live! @jfradioshow #GodzillaOfTruth #TruckingTheTruth Want more of today's show? Episode #1929 Suck It Up, Butter Cup; You Don't Want To Go To Prison in El Salvadore Episode #1930 Was Biden FBI Compromised in Garcia TN Traffic Stop Episode #1931 Who's Going to Enforce SCOTUS Edicts? https://johnfredericksradio.libsyn.com/
The DARK Truth About Mark Carney's Ties To ChinaBecome a supporter of this podcast: https://www.spreaker.com/podcast/radio-baloney-the-richie-baloney-show--4036781/support.
Chairs: Iva Dekaris and Massimo Busin Speakers: Elisabeth Patsoura, Joaquin Fernandez, Björn Bachmann and Alfonso Vasquez Perez We are excited to invite you to the upcoming ESCRS eConnect Webinar dedicated to the complexities of Cataract Surgery in Patients with Compromised Cornea. This event will delve into the challenges and innovative solutions associated with performing cataract surgery in cases of impaired corneal health. Participants will gain valuable insights into strategies for preventing corneal damage during surgery, managing biometry and intraocular lens (IOL) calculations in irregular corneas, and addressing the technical demands of operating in the presence of corneal opacities. Additionally, the webinar will explore advanced approaches to combined cataract and keratoplasty procedures, highlighting their role in effectively treating complex cases. This expert-led session will enhance your understanding of these critical topics, offering practical knowledge and innovative solutions to support your clinical practice.
The MAGA movement seems to be compromised, I had a fantastic conversations with Jillian Michaels & Howie Mandel, StopAntisemitism goes after children's YouTuber Ms. Rachel, and do you know John Jay Sullivan from Malibu, CA? You actually do know him. I'm totally going to blow your mind and send you down another unnecessary rabbit hole. PreBorn To donate, dial pound 250 & say the keyword “BABY” that's pound 250 “BABY” or donate securely at https://preborn.com/candace Fatty15 Fatty15 is on a mission to replenish your C15 levels and restore your long-term health. You can get an additional 15% off their 90-day subscription Starter Kit by going to http://fatty15.com/CANDACE and using code CANDACE at checkout. American Financing Act today! Call 800-795-1210 or visit http://www.AmericanFinancing.net/owens NMLS 182334, http://www.nmlsconsumeraccess.org. APR for rates in the 5s start at 6.327% for well qualified borrowers. Call 800-795-1210, for details about credit costs and terms. Patmos Make the switch to Patmos today! https://link.patmos.tech/F8C2WXL Candace Official Website: https://candaceowens.com Candace Merch: https://shop.candaceowens.com Candace on Apple Podcasts: https://t.co/Pp5VZiLXbq Candace on Spotify: https://t.co/16pMuADXuT Candace on Rumble: https://rumble.com/c/RealCandaceO Learn more about your ad choices. Visit megaphone.fm/adchoices
04-08-25 - Shout Out To Lost Our Home Pet Rescue And IncrediBull Stella Rescue - Emailer Tells Us His Brother's Friend Raped His Teddy Bear As A Kid - John Compromised Security By Clicking On A Free Tractor Giveaway In EmailSee Privacy Policy at https://art19.com/privacy and California Privacy Notice at https://art19.com/privacy#do-not-sell-my-info.
04-08-25 - Shout Out To Lost Our Home Pet Rescue And IncrediBull Stella Rescue - Emailer Tells Us His Brother's Friend Raped His Teddy Bear As A Kid - John Compromised Security By Clicking On A Free Tractor Giveaway In EmailSee Privacy Policy at https://art19.com/privacy and California Privacy Notice at https://art19.com/privacy#do-not-sell-my-info.
American Institute of CPAs - Personal Financial Planning (PFP)
In this episode, Cary Sinnett is joined by renowned CPA and tax expert Bob Keebler to unpack the complexities of theft and casualty loss deductions under IRC Section 165. From pig butchering scams to IRA fraud and Ponzi schemes, this episode dives deep into the kinds of losses the IRS will—and won't—let you deduct, what qualifies as a profit motive, and how financial planners can guide their clients through one of the most emotionally and financially painful tax situations. Five Key Insights for CPA Financial Planners: Profit Motive Determines Deductibility To qualify under Section 165(c)(2), a theft or loss must stem from a transaction entered into for profit. Losses from romantic or emotional scams—where no profit motive exists—do not qualify. Five Scam Archetypes to Know A recent IRS CCA outlined five fraud scenarios: Compromised account scams Pig butchering (crypto fraud) Phishing and impersonation Romance scams Kidnapping/extortion schemes Only the first three had profit motives and were deductible. The IRA Trap: The Tax Hit Before the Scam If a client is duped into withdrawing funds from an IRA and then loses the money to a scam, they face a double blow—taxable income and no deductible loss. CPA advisors must flag this risk early. Documentation Is Critical for IRS Support To substantiate a theft loss, clients need: Bank records (e.g., wire transfers) Law enforcement reports A clear, detailed paper trail showing the loss and the attempt to recover funds Directing the IRS to the assigned FBI agent can strengthen the claim. Mitigation and Planning: Protecting Vulnerable Clients Encourage older or high-net-worth clients to follow a “1–2% rule” on risky investments. Foster opens dialogue with family members and advisors to prevent fraud and ensure support if it occurs. Access resources related to this podcast: Note: If you're using a podcast app that does not hyperlink to the resources, visit Libsyn (PFP) to access show notes with direct links. IRC Section 165 IRS CCA 2025-101015 (the ruling discussed) Revenue Procedure 2009-20 (Ponzi Scheme Safe Harbor) AICPA PFP Section Guiding your clients who are financial caregivers Scam Tracker Risk Report This episode is brought to you by the AICPA's Personal Financial Planning Section, the premier provider of information, tools, advocacy, and guidance for professionals who specialize in providing tax, estate, retirement, risk management and investment planning advice. Also, by the CPA/PFS credential program, which allows CPAs to demonstrate competence and confidence in providing these services to their clients. Visit us online to join our community, gain access to valuable member-only benefits or learn about our PFP certificate program. Subscribe to the PFP Podcast channel at Libsyn to find all the latest episodes or search “AICPA Personal Financial Planning” on your favorite podcast app.
Mark Carney COMPROMISED Says Pierre Poilievre Over Liberal MP China ScandalBecome a supporter of this podcast: https://www.spreaker.com/podcast/radio-baloney-the-richie-baloney-show--4036781/support.
Livestock owners work hard to ensure their animals are cared for through all stages of production. Despite their efforts, some animals will become injured or sick, and decisions must be made. Consider these tips for treatment, and consult with your veterinarian. Learn more about your ad choices. Visit podcastchoices.com/adchoices
Gospel Baptist Church, Bonita Springs, FL - Fundamental, Independent, Bible Believing
March 9,2025
Trump claims to know nothing about America's extraordinary security breach while fully supporting his defense secretary who wrote in a group chat when bombs would drop. Plus, Homeland Security Secretary Kristi Noem visits the brutal Supermax prison Trump holds up as a model. Learn more about your ad choices. Visit podcastchoices.com/adchoices
Compromised Justice Robert's, New JFK Details
Michael talks to Independent Senator Angus King of Maine, about President Trump's promise to not touch Social Security, while people in his administration seem to be trying to cut the entitlement that millions of Americans pay in to. Original air date 24 March 2025.
Send us a text We are all at liberty in making our dreams, visions and wonders become a reality. What sets the difference is whether they are build upon a foundation or not. The rain, floods and wind are inevitable to face, but the question is, will your house remain standing? May this sermon be a blessings to you all!
Episode 047 | Christine Preston is a compromised Skin Therapist (certificate in Skin Therapy from George Brown College) who has been certified since 2016. Since then, she's been helping women across North America achieve calm, clear skin by helping them identify their triggers and creating skin care routines that work. She opened the Skin Discovery Spa in 2021 where she helps her clients clear acne, calm rosacea and relieve eczema-prone skin. (Did someone say road trip?!
SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast
Mirai Bot Now Incorporating Malformed DrayTek Vigor Router Exploits One of the many versions of the Mirai botnet added some new exploit strings attempting to take advantage of an old DrayTek Vigor Router vulnerability, but they got the URL wrong. https://isc.sans.edu/diary/Mirai%20Bot%20now%20incroporating%20%28malformed%3F%29%20DrayTek%20Vigor%20Router%20Exploits/31770 Compromised GitHub Action The popular GitHub action tj-actions/changed-files was compromised and leaks credentials via the action logs https://www.stepsecurity.io/blog/harden-runner-detection-tj-actions-changed-files-action-is-compromised ruby-saml authentication bypass A confusion in how to parse SAML messages between two XML parsers used by Ruby leads to an authentication bypass in saml-ruby. https://github.blog/security/sign-in-as-anyone-bypassing-saml-sso-authentication-with-parser-differentials/ GitHub Fake Security Alerts Fake GitHub security alerts are used to trick package maintainers into adding OAUTH privileges to malicious apps. https://www.bleepingcomputer.com/news/security/fake-security-alert-issues-on-github-use-oauth-app-to-hijack-accounts/
Revelation: The Compromised Church Dr. Andrew Hébert
If your sleep is chronically interrupted or too long or short in duration, you may be at increased risk for some types of cancer, research suggests. Sleep expert Charlene Gamaldo at Johns Hopkins says it's unclear whether sleep quality puts … Is compromised sleep related to the development of cancer? Elizabeth Tracey reports Read More »
While it's been observed that disease and poor sleep seem to sort together, ongoing research is looking into the why of it. Johns Hopkins sleep expert Charlene Gamaldo says a couple of possible causes have emerged. Gamaldo: A couple of … How might compromised sleep put one at risk for poorer health outcomes? Elizabeth Tracey reports Read More »
This week on The Home Defense Show Skip & Sara talk about the public's lack of confidence in the US food supply. Then they speak with author and radio host Rick Vuyst about how to start raising your own vegetables. In segment 3 firearms and Krav Maga instructor Steve Sulze talks about how to deal with bad neighbors without getting yourself shot.
From 03/12 Hour 1: The Sports Junkies discuss how their emails are getting flooded with spam.
03/12 Hour 1: Our Emails Have Been Compromised / Big Caps Win - 1:00 Better or Worse - 15:00 Tiger Woods Ruptured His Achilles Tendon - 33:00
China's cyber enterprise is rapidly growing: China-nexus activity was up 150% across industries in 2024, with a 200-300% surge in key sectors such as financial services, media, manufacturing, and industrials/engineering. CrowdStrike identified seven new China-nexus adversaries in 2024. “After decades investing in offensive cyber capabilities, China has achieved parity with some of the top players out there, and I think that is the thing that should terrify everybody,” Adam says. China-nexus threat actors aren't the only ones evolving their cyber operations. As the CrowdStrike 2025 Global Threat Report shows, nation-state and eCrime adversaries spanning regions and skill levels are gaining speed and refining their techniques. They're learning what works and what doesn't, and they're scaling their effective tactics to achieve their goals. So what works? Voice phishing (vishing) skyrocketed 442% between the first and second half of 2024 as adversaries leaned on vishing, callback phishing, and help desk social engineering to access target networks. Generative AI played a key role in social engineering, where its low barrier to entry and powerful capabilities help adversaries create convincing content at scale. Compromised credentials also proved handy last year, helping threat actors enter and move laterally through organizations and operate as legitimate users. What doesn't work as well? Malware. 79% of detections in 2024 were malware-free, indicating a rise in hands-on-keyboard activity as adversaries face stronger security defenses. Tune in to hear Adam and Cristian dig into the key findings of the CrowdStrike 2025 Global Threat Report, which also examines the latest on cloud-focused attacks, vulnerability exploitation, and nation-state activity around the world.
In recent years, Bitcoin has undergone a major culture shift which promotes stagnation, complacency & simping to politicians over maximizing the utility of the money. Eric Voskuil & John Carvalho join the show to remind everyone what the mission really is. State of Bitcoin - [00:01:17] Bitcoin Maximalism - [00:01:32] Bitcoin as a Ponzi Scheme - [00:02:27] Transaction Fees - [00:04:57] History of Bitcoin Tokens (Omni, Counterparty, Mastercoin) Definition of Tokens - [00:08:01] Custodial Problems with Tokens - [00:09:12] Bitcoin and Fiat Money - [00:11:09] Why Bitcoiners Talk About Money - [00:15:49] Stateless Money - [00:17:44] Austrian Economics and Bitcoin - [00:21:01] Monetary Inflation vs. Price Inflation - [00:26:01] Cantillon Effect - [00:29:00] Dollar Inflation and Gold - [00:33:59] Misunderstandings in the Bitcoin Community - [00:41:42] Bitcoin Semantics - [00:43:21] Bitcoin Divisibility - [01:00:13] Bitcoin Deflation - [01:03:41] Maxi Price and One Coin Assumption - [01:07:43] Competition Between Monies - [01:13:42] Scaling Bitcoin - [01:22:41] Bitcoin for the Unbanked - [01:26:14] Maximizing Throughput - [01:36:11] Right to Fork - [01:45:45] Running Old Bitcoin Versions - [01:51:35] Bitcoin as Money vs. Credit - [01:56:26] Settlement in Bitcoin - [02:07:45] Peer-to-Peer Credit Systems - [02:14:47] Fractional Reserve Banking - [02:26:32] Bitkit Wallet and Spending vs. Saving - [02:36:13] Block size increases and Bitcoin adoption - [03:00:00] Scaling Bitcoin and transaction validation - [03:01:00] Bitcoin overflowing into Litecoin and quantum resistance - [03:02:00] Pruning historical data and exchange price - [03:03:00] Lightning system complexity and Bitcoin's value proposition - [03:05:00] Bitcoin as an investment and speculation - [03:07:00] Optimizing Bitcoin throughput and developer motivations - [03:09:00] Scaling Bitcoin and speculation - [03:11:00] Shitcoins, scams, and Bitcoin's security model - [03:13:00] Litecoin's extension blocks and Mimblewimble - [03:15:00] Bitcoin's security and the legitimacy of altcoins - [03:17:00] Shitcoins and Bitcoin's essential aspects - [03:19:00] Majority hash power censorship and attacks - [03:21:00] Bitcoin speculation and market dynamics - [03:23:00] Michael Saylor's Bitcoin strategy and MicroStrategy's history - [03:26:00] Saylor's Bitcoin investment and market manipulation - [03:29:00] Saylor's stock sales and Bitcoin's future - [03:31:00] Blockstream's accomplishments and the Chia project - [03:33:00] Blockstream's influence and SegWit - [03:35:00] Adam Back's influence and Blockstream's hype - [03:37:00] Bitcoin Core's power and the need for competition - [03:39:00] Initial block download performance and Bitcoin Core's architecture - [03:41:00] UTXO store and Bitcoin Core's performance - [03:43:00] Parallelism in Bitcoin Core and assumed UTXO - [03:45:00] Initial block download time and Bitcoin Core's scalability - [03:47:00] Monoculture in Bitcoin development and IBD performance - [03:49:00] UTXO cache and shutdown time - [03:51:00] Trust assumptions in Bitcoin Core and UTXO commitments - [03:53:00] Bitcoin Core's halting problem and theoretical download limits - [03:55:00] Sponsorships: Sideshift, LayerTwo Labs, Ciurea - [03:57:00] Drivechains and ZK rollups - [04:02:00] ZK rollups and liquidity on Ethereum - [04:04:00] Drivechains and altcoins - [04:06:00] Scaling Bitcoin and cultural taboos - [04:08:00] Engineer-driven change and Monero's approach - [04:10:00] Confidential transactionsL Zano & DarkFi - [04:12:00] Fungibility and Bitcoin's metadata - [04:14:00] Privacy, metadata, and state surveillance - [04:16:00] Privacy, taint, and Bitcoin mixing - [04:18:00] Bitcoin mixing and plausible deniability - [04:20:00] Mining and company registration - [04:22:00] Block reward and hash power - [04:24:00] Privacy and mixing - [04:26:00] Privacy in the Bitcoin whitepaper and zero-knowledge proofs - [04:28:00] Dark Wallet and John Dillon - [04:30:00] Dark Wallet and Li Bitcoin - [04:32:00] Amir Taaki's projects and software development - [04:34:00] Dark Wallet funding and developer costs - [04:36:00] Libbitcoin's code size and developer salaries - [04:38:00] John Dillon and Greg Maxwell - [04:40:00] Opportunistic encryption and BIPs 151/152 - [04:42:00] Dandelion and privacy - [04:44:00] BIP 37 and Bloom filters - [04:46:00] Consensus cleanup and the Time Warp bug - [04:48:00] Merkle tree malleability and 64-byte transactions - [04:50:00] 64-byte transactions and SPV wallets - [04:52:00] Coinbase transactions and malleability - [04:54:00] Invalid block hashes and DoS vectors - [04:56:00] Core bug and ban list overflow - [04:58:00] Storing hashes of invalid blocks - [05:00:00] DoS vectors and invalid blocks - [05:02:00] Malleated Merkle trees and 64-byte transactions - [05:04:00] 64-byte transactions and Merkle tree malleability - [05:06:00] Null points and malleated blocks - [05:08:00] Redundant checks and the inflation soft fork - [05:10:00] Op code separator and code complexity - [05:12:00] Transaction order in a block - [05:14:00] Forward references in blocks - [05:16:00] Coinbase transaction rules - [05:18:00] Time Warp bug and Litecoin support - [05:20:00] Quadratic op roll bug - [05:22:00] Stack implementation and op roll - [05:24:00] Templatized stack and op roll optimization - [05:26:00] Non-standard transactions and direct submission to miners - [05:28:00] Mempool policy and DoS - [05:30:00] Monoculture and competing implementations - [05:32:00] Consensus cleanup and Berkeley DB - [05:34:00] Code vs. consensus - [05:36:00] Bitcoin Knots and Luke-jr - [05:38:00] 300 kilobyte node and Luke-jr's views - [05:40:00] Bitcoin Knots and performance - [05:42:00] Bitcoin Knots and censorship - [05:44:00] Censorship and miner incentives - [05:46:00] Censorship and hash power - [05:48:00] Soft forks and censorship - [05:50:00] Ordinals and covenants - [05:52:00] RBF and zero-confirmation transactions - [05:54:00] Double spending and merchant risk - [05:56:00] First-seen mempool policy and RBF - [05:58:00] Low-value transactions and RBF - [06:00:00] Computational cost of actions - [06:00:15] Building infrastructure and system disruption - [06:00:20] Threat actors and economic disruption - [06:00:26] Double spending detection and system control - [06:00:29] Safety and manageability of zero comp transactions - [06:00:41] Security of zero comp transactions - [06:00:51] RBF (Replace-by-fee) and its relevance - [06:01:06] Bitcoin's mempool and transaction handling - [06:01:25] Mempool overflow and resource management - [06:02:08] Transaction storage and mining - [06:02:45] Miners' incentives and fee maximization - [06:03:07] Mempool policy and DOS protection - [06:03:41] Transaction validation and block context - [06:04:11] Fee limits and DOS protection - [06:05:13] Transaction sets, graph processing, and fee maximization - [06:06:24] Mining empty blocks and hash rate - [06:07:34] Replace-by-fee (RBF) and its purpose - [06:08:07] Infrastructure and RBF - [06:09:14] Transaction pool and conflict resolution - [06:09:44] Disk space, fees, and DOS protection - [06:11:06] Fee rates and DOS protection - [06:12:22] Opt-in RBF and mempool full RBF - [06:13:45] Intent flagging in transactions - [06:14:45] Miners obeying user intent and system value - [06:17:06] Socialized gain and individual expense - [06:18:17] Service reliability and profitability - [06:19:06] First-seen mempool policy - [06:19:37] Mempool policy and implementation - [06:20:06] User perspective on transaction priority - [06:21:14] Mempool conflicts and double spending - [06:22:10] CPFP (Child Pays for Parent) - [06:22:24] Mempool management and fee rates - [06:24:30] Mempool complexity and Peter Wuille's work - [06:25:54] Memory and disk resource management - [06:27:37] First-seen policy and miner profitability - [06:29:25] Miners' preference for first-seen - [06:30:04] Computational cost and fee optimization - [06:31:10] Security, Cypherpunk mentality, and the state - [06:35:25] Bitcoin's security model and censorship resistance - [06:41:02] State censorship and fee increases - [06:43:00] State's incentive to censor - [06:46:15] Lightning Network and regulation - [06:48:41] NGU (Number Go Up) and deference to the state - [06:51:10] Reasons for discussing Bitcoin's security model - [06:53:25] Bitcoin's potential subversion and resilience - [06:55:50] Lightning Network subsidies and scaling - [06:57:36] Mining protocols and security - [07:02:02] Braidpool and centralized mining - [07:04:44] Compact blocks and latency reduction - [07:07:23] Orphan rates and mining centralization - [07:08:16] Privacy and threat environments - [07:08:40] Social graphs, reputation, and identity - [07:10:23] Social scalability and Bitcoin - [07:12:36] Individual empowerment and anonymity - [07:16:48] Trust in society and the role of the state - [07:18:01] Payment methods and trust - [07:20:15] Credit reporting agencies and regulation - [07:22:17] Hardware wallets and self-custody - [07:23:46] Security vulnerabilities in Ledger - [07:27:14] Disclosure of secrets on Ledger devices - [07:36:27] Compromised machines and hardware wallets - [07:42:00] Methods for transferring signed transactions - [07:48:25] Threat scenarios and hardware wallet security - [07:50:47] Hardware wallet usage and personal comfort - [07:56:40] Coldcard wallets and user experience - [08:02:23] Security issues in the VX project - [08:03:25] Seed generation and hardware randomness - [08:12:05] Mastering Bitcoin and random number generation - [08:17:41]
"PREVIEW: Conversation with Professor Sean McMeekin about evidence that Stalin compromised Operation Market Garden to slow the Allied advance on Berlin. More later." 1944 MARKET GARDEN
Matt Lucas, the president of Our Daily Bread, maintains that the organization has not shifted its doctrinal convictions, yet lists celebrating diversity as a historic, biblical Christian teaching alongside salvation in Christ alone and the infallibility of Scripture. I don't think anyone working for Our Daily Bread in 1938 would have said this. The fact is, Our Daily Bread has been trafficking in social justice teachings in the MeToo and BLM vein for a few years. Jon reviews some of these teachings so that Our Daily Bread readers can be informed and make up their own minds.To Support the Podcast: https://www.worldviewconversation.com/support/Become a Patronhttps://www.patreon.com/jonharrispodcastFollow Jon on Twitter: https://twitter.com/jonharris1989Follow Jon on Facebook: https://www.facebook.com/jonharris1989/Support this podcast at — https://redcircle.com/conversations-that-matter8971/donationsAdvertising Inquiries: https://redcircle.com/brandsPrivacy & Opt-Out: https://redcircle.com/privacy