PinnedOfficer_CIA: RetrospectiveHere is a retrospective of my best articles! You can also track my work entirely at my start.me (always use mullvad.net when visiting it) page: OfficerCIA - start.me A startpage with online resources about OfficerCIA, created by Officer CIA.start.me Here is an article written by my good friend Max — in it he made a review of more than a year of my Twitter…Retrospectives3 min read
PinnedLaplace’s Demon Speaks: Is there a life in blockchain?Is there a life in blockchain? What does it care about? Up-to-Date Article This is rather atypical article and I want to warn you this kind of experience is new for me and I hope you like it! We’ll be looking at several important issues and also look to science in order to substantiate these conclusions. So these are the questions…Blockchain18 min read
PinnedHow to win the war, trick the KGB and protect your crypto-assets from theft by SteganographyGreetings dear readers! Today I would like to discuss with you an important thing, but to understand the topic, please read my previous articles first, especially about the OpSec view through history. …Steganography12 min read
PinnedMaster of OpSec Masters: A View Through the Prism of TimeToday I would like to discuss with you such a little discussed point as OpSec mindset, how it can be developed and why it is all needed on the example of ancient English, Greek and ancient Christian folklore and some modern references.Opsec8 min read
Aug 1The most significant milestones in the development of communicationsFor modern society, instant messaging is a necessary and familiar phenomenon in everyday life. …Communication4 min read
Jul 31Officer_CIA X MaxWayld: Content OverviewGreetings dear readers! Today I present to your attention an article written by my good friend Max — in it he made a review of more than a year of my Twitter activity. teletype.in/@maxycrypto/summary_officercia — Original article twitter.com/MaxWayld — Max’s Twitter As you know I often post just interesting tools…Blockchain16 min read
Jul 25Someone overheard me! Why it’s important to think about all attack vectors, even if they seem unlikely to happen?It is no secret that hackers can find out which keys you press. To do this, a hacker needs to install a key-logger (See 1 & 2) on the victim’s computer. ❗️Check out up-to-date article version ❗️ However, it is already possible to simply find out what a person is…Security3 min read
Jul 23MacOS + IOS + Crypto + OpSec = ?In my favorite chat room recently I was asked, in light of recent events, would it be safer to use MacOS & IOS for work? Is it true that they have better security? I don’t have a definite answer here — both yes and no. …Macos5 min read
Jul 15Scavenging: Don’t be too kindToday I want to remind you about an old scam implementation which is called a scavenging. Just remember as a golden rule — the 12-word or private key scam is a pretty common one on TG and if anyone giving you their private key/seed — he is scamming you!Scam3 min read
Jul 10How hackers may steal your Ethers and why does eth_sign function matter?| Authors: twitter.com/ortomichDev, twitter.com/officer_ciaMetamask4 min read