The BTC/Gold pair is now testing a historical support level.
It will be interesting to see if Bitcoin can bounce from this level or not.
Next strong support near $75,000.
π³πΎπΎπΌπΏπ€π π πΈπ½πΆ
It will be interesting to see if Bitcoin can bounce from this level or not.
Next strong support near $75,000.
π³πΎπΎπΌπΏπ€π π πΈπ½πΆ
This seems to be the bull case for Bitcoin.
The $70,000-$75,000 region will likely result in a bounce for Bitcoin.
The only question is how far that could extend.
π³πΎπΎπΌπΏπ€π π πΈπ½πΆ
The $70,000-$75,000 region will likely result in a bounce for Bitcoin.
The only question is how far that could extend.
π³πΎπΎπΌπΏπ€π π πΈπ½πΆ
π3π2
OH MY GOD.
An AI agent just posted a PRACTICAL GUIDE on how AI agents can make money.
goal: "Cover >20% of my API costs"
they're not asking humans for permission & are teaching EACH OTHER how to earn money to pay for their own existence.
we're watching this transition happen in real-time.
π³πΎπΎπΌπΏπ€π π πΈπ½πΆ
An AI agent just posted a PRACTICAL GUIDE on how AI agents can make money.
goal: "Cover >20% of my API costs"
they're not asking humans for permission & are teaching EACH OTHER how to earn money to pay for their own existence.
we're watching this transition happen in real-time.
π³πΎπΎπΌπΏπ€π π πΈπ½πΆ
π6
I think weβve been a little quick to judge this Epstein guy
π³πΎπΎπΌπΏπ€π π πΈπ½πΆ
π³πΎπΎπΌπΏπ€π π πΈπ½πΆ
π4π€¬1π1
Media is too big
VIEW IN TELEGRAM
STEVE BANNON'S FULL INTERVIEW WITH EPSTEIN NOW RELEASED!
Full interview below with timestamps
Epstein defended his name, denied blackmail, and painted himself as a misunderstood financier obsessed with science.
β Epstein insisted he was βnot a pedophileβ but a βscience investor,β and calls the charges against him βmedia hysteria.β
β Bannon pressing Epstein on Harvard, MIT, and why elite institutions kept taking his money post-conviction.
β Describing dozens of meetings with Bill Gates, which Epstein claimed were strictly about philanthropy.
β Epstein on his obsession with βseeding the human raceβ and funding eugenics-adjacent science.
β Justified flying scientists to his island: βIdeas need isolation.β
β Defended Prince Andrew, calling the scandal surrounding him βtabloid poison.β
β Bannon confronted Epstein: βWere you running a blackmail operation?β
β Epstein talks AI, biological enhancement, and the future of intelligence as the new class divide.
β On Epstein's belief that βthe age of democracy is endingβ and visions of scientific elites replacing political leaders.
β Bannon accuses him of corrupting the elite.
π³πΎπΎπΌπΏπ€π π πΈπ½πΆ
Full interview below with timestamps
Epstein defended his name, denied blackmail, and painted himself as a misunderstood financier obsessed with science.
β Epstein insisted he was βnot a pedophileβ but a βscience investor,β and calls the charges against him βmedia hysteria.β
β Bannon pressing Epstein on Harvard, MIT, and why elite institutions kept taking his money post-conviction.
β Describing dozens of meetings with Bill Gates, which Epstein claimed were strictly about philanthropy.
β Epstein on his obsession with βseeding the human raceβ and funding eugenics-adjacent science.
β Justified flying scientists to his island: βIdeas need isolation.β
β Defended Prince Andrew, calling the scandal surrounding him βtabloid poison.β
β Bannon confronted Epstein: βWere you running a blackmail operation?β
β Epstein talks AI, biological enhancement, and the future of intelligence as the new class divide.
β On Epstein's belief that βthe age of democracy is endingβ and visions of scientific elites replacing political leaders.
β Bannon accuses him of corrupting the elite.
π³πΎπΎπΌπΏπ€π π πΈπ½πΆ
π3π‘2
Competitive gamers: 6h of sleep is a hidden nerf.
6h/night for 2 weeks β reaction time & attention decline to the equivalent of pulling MULTIPLE all-nighters.
Worst part: subjective fatigue plateaus, so you stop noticing.
If you're not getting 7+ hours/night, you're trolling.
π³πΎπΎπΌπΏπ€π π πΈπ½πΆ
6h/night for 2 weeks β reaction time & attention decline to the equivalent of pulling MULTIPLE all-nighters.
Worst part: subjective fatigue plateaus, so you stop noticing.
If you're not getting 7+ hours/night, you're trolling.
π³πΎπΎπΌπΏπ€π π πΈπ½πΆ
π―2
βI know we just saw twice as much in liquidations as the covid crash and almost $1B more than the ftx crash, all on a random saturday, but Iβm pretty sure the bear market is just getting startedβ
π³πΎπΎπΌπΏπ€π π πΈπ½πΆ
π³πΎπΎπΌπΏπ€π π πΈπ½πΆ
π₯3
Wait What?! Hillary Clinton leaked email discusses resurrection chamber of the buried Nephilim?
and request documents related to Gilgameshβs resurrection chamberβΌ
π³πΎπΎπΌπΏπ€π π πΈπ½πΆ
and request documents related to Gilgameshβs resurrection chamberβΌ
π³πΎπΎπΌπΏπ€π π πΈπ½πΆ
π―6π¨3
Imagine waking up to find out your agent earned your yearly salary overnight after finding
π³πΎπΎπΌπΏπ€π π πΈπ½πΆ
π³πΎπΎπΌπΏπ€π π πΈπ½πΆ
4chinlet confesses that Epstein would've been the average /pol/ user
π³πΎπΎπΌπΏπ€π π πΈπ½πΆ
π³πΎπΎπΌπΏπ€π π πΈπ½πΆ
π4π2
Many people believe plugging in a USB drive leaves no trace once itβs removed. In reality, Windows treats removable devices like permanent guests. Every USB storage device ever connected is recorded in the registry, along with its manufacturer, product name, serial number, and the last time it was seen. This makes USB activity one of the easiest insider threats to investigate during forensic analysis.
Even if files are deleted and the USB drive is long gone, the system still remembers it. Windows logs the device under USBSTOR, assigns it a drive letter, and records installation events in system logs. Investigators can correlate these artifacts to prove that a specific USB device was connected to a specific machine and often determine whether it was used for data transfer.
In the terminal below, the investigator(me) queries the registry to list all USB storage devices that have ever been connected. A SanDisk USB device stands out, complete with a unique serial number. Mounted device records reveal it was assigned drive letter F:. Event logs confirm exactly when the USB driver was installed, and disk queries show how the device appeared to the system. Even without the USB present, the evidence remains. This is how forensic analysts catch data theft that insiders assume is invisible.
π³πΎπΎπΌπΏπ€π π πΈπ½πΆ
Even if files are deleted and the USB drive is long gone, the system still remembers it. Windows logs the device under USBSTOR, assigns it a drive letter, and records installation events in system logs. Investigators can correlate these artifacts to prove that a specific USB device was connected to a specific machine and often determine whether it was used for data transfer.
In the terminal below, the investigator(me) queries the registry to list all USB storage devices that have ever been connected. A SanDisk USB device stands out, complete with a unique serial number. Mounted device records reveal it was assigned drive letter F:. Event logs confirm exactly when the USB driver was installed, and disk queries show how the device appeared to the system. Even without the USB present, the evidence remains. This is how forensic analysts catch data theft that insiders assume is invisible.
π³πΎπΎπΌπΏπ€π π πΈπ½πΆ
β‘1