Workflow
Security
icon
Search documents
Zelenskyy delivers address at United Nations General Assembly
NBC News· 2025-09-24 15:07
Geopolitical Landscape & Security Concerns - The report emphasizes that in the 21st century, national security relies on strong alliances, partners, and weapons, highlighting a departure from reliance on international law and cooperation [1][2] - The report points out the ineffectiveness of international institutions in preventing or stopping conflicts, citing examples like Sudan, Somalia, Palestine, and Syria [3][4] - The report underscores the vulnerability of nations even within military alliances, referencing the violation of Polish airspace by 19 Russian drones, with only 4 being intercepted [8] - The report warns of Russia's attempts to destabilize Moldova, drawing parallels to Iran's actions in Lebanon, and stresses the importance of supporting Moldova's stability to prevent its dependence on Russia [9][10][11] Evolving Warfare & Technological Threats - The report highlights the rapid evolution of weapons, particularly drones, and the increasing accessibility of drone technology to non-state actors like terrorist groups and cartels [15][17] - The report expresses concern over the development of fully autonomous AI-driven weapons systems and the potential for a destructive arms race involving artificial intelligence [19][20] - The report mentions Ukraine's development of drones with a range of up to 3,000 kilometers (1864 miles) as a necessity for self-defense [21] - The report cites Ukraine's successful use of sea drones in the Black Sea to push back the Russian Navy, protecting ports and maritime trade routes [22][23] Calls for Action & International Cooperation - The report urges the international community to take decisive action to stop Russia's aggression, arguing that it is more cost-effective than dealing with the long-term consequences of the conflict and arms race [26][27] - The report advocates for global rules governing the use of AI in weapons, comparing the urgency to preventing the spread of nuclear weapons and calling for restored international cooperation for peace and security [20] - The report promotes Ukraine's initiative to build a new security architecture with over 40 countries, including joint weapons production and financial commitments for defense [29] - The report encourages countries to support peace by condemning Russia's actions and joining efforts to defend life and international law [34]
X @wale.moca 🐳
wale.moca 🐳· 2025-09-24 08:03
I don't think there is a real solution to this btw.There are measures you can (and should) take to improve your security:1) Use a cold hardware wallet.2) Don't store your seed phrase online.3) Install extensions that warn you before malicious signatures.4) Do not install suspicious games or software.Ultimately however, there is no such thing as 100% security.You can minimize the risk but shit can still happenwale.moca 🐳 (@waleswoosh):Crypto still has a major problem, which is that you can lose everything yo ...
X @Starknet
Starknet 🐺🐱· 2025-09-24 03:12
RT ForgeYields (@ForgeYields)Security first 🔒@cairoaudit has completed the audit of ForgeYields’ cross-chain yield aggregator primitive.Results are public and verifiable.Full report below 👇 ...
X @Market Spotter
Market Spotter· 2025-09-23 06:00
Crypto Essentials - Security is paramount in the crypto space [1] - Speed of transactions is a key factor [1] - Liquidity is crucial for a healthy crypto market [1] - Adoption is essential for the growth of crypto [1]
X @vitalik.eth
vitalik.eth· 2025-09-22 22:46
Base is doing things the right way: an L2 on top of Ethereum, that uses its centralized features to provide stronger UX features, while still being tied into Ethereum's decentralized base layer for security.Base does not have custody over your funds, they cannot steal funds or stop you from withdrawing funds (this is part of the L2beat stage 1 definition).You can see Base's status as an L2 on l2beat: https://t.co/bBrvnbxSgDI feel like many people have been confused by recent cynicism and think that things l ...
X @CoinGecko
CoinGecko· 2025-09-22 11:30
Cryptocurrency Comparison - The report compares Bitcoin ($BTC) and Ethereum ($ETH) across several key dimensions [1] - The analysis includes security, tokenomics, and real-world applications [1] Resource - The report directs the audience to a video link for a detailed comparison [1]
X @Trust Wallet
Trust Wallet· 2025-09-22 08:48
Sync your Trust Wallet Mobile <> Extension in seconds 📲 ➡️ 💻Introducing QR Sync: the safe way to bring your wallet to desktop.Goodbye secret phrases and copy-paste stress. https://t.co/n6I6I8i9uA ...
X @OKX Wallet
OKX Wallet· 2025-09-21 14:42
Rugs? Not on our watch.We scan for:• Fake sites• Malicious domains• Risky tokensAlpha, without the traps 🤝 https://t.co/OdV7gLVmkC ...
X @BBC News (World)
BBC News (World)· 2025-09-20 23:04
Heightened security as Americans gather for Kirk memorial https://t.co/UWI3YwCZJc ...
X @Avi Chawla
Avi Chawla· 2025-09-20 06:33
The ultimate Full-stack AI Engineering roadmap to go from 0 to 100.This is the exact mapped-out path on what it actually takes to go from Beginner → Full-Stack AI Engineer.> Start with Coding Fundamentals.> Learn Python, Bash, Git, and testing.> Every strong AI engineer starts with fundamentals.> Learn how to interact with models by understanding LLM APIs.> This will teach you structured outputs, caching, system prompts, etc.> APIs are great, but raw LLMs still need the latest info to be effective.> Learn h ...