Peter Girnus 🦅 Profile picture
Apr 11 2 tweets 4 min read Read on X
I am a Web3 Ambassador at World Liberty Financial.

There are 12 of us on the team page. 4 are named Trump. 3 are named Witkoff. The page calls us "the passionate minds shaping the future of finance."

600,000 wallets bought our memecoin. They lost $3.87 billion. The family collected $350 million in trading fees. It launched 3 days before the inauguration. 80% of the supply went to CIC Digital LLC and Fight Fight Fight LLC. I did not choose the names. I designed the allocation, the vesting, the timing, and the distance between the product and the President.

The distance is my best work.

I am the reason these events are unrelated.

World Liberty Financial sends 75 cents of every dollar to DT Marks DEFI LLC. That is the family entity. Zero capital contributed. Zero liability assumed. I wrote this into the Gold Paper. Page 14. The lawyers bound it in white leather. The binding cost more than the due diligence.

Justin Sun invested $75 million. He was facing SEC fraud charges. The SEC dropped the case. He is now our advisor. These events are unrelated.

Changpeng Zhao pleaded guilty to federal money laundering violations. He received a presidential pardon. The SEC dropped its lawsuit against his exchange the same week we listed our stablecoin. Then the exchange settled a $2 billion deal entirely in that stablecoin. These events are unrelated.

Arthur Hayes, Benjamin Delo, and Samuel Reed of BitMEX pleaded guilty to Bank Secrecy Act violations. All 3 received presidential pardons. Then the company itself was pardoned. $100 million in fines. Gone. An American first. These events are unrelated.

Sheikh Tahnoun of Abu Dhabi paid $500 million for a 49% stake that was never publicly disclosed. Then the administration approved semiconductor exports to his companies over national security objections. These events are unrelated.

Everything is unrelated. I track the unrelatedness on a dashboard I built. The dashboard has 7 columns now. I am proud of the dashboard.

On May 22nd, 220 people paid a combined $148 million to eat dinner with the America First president. Over half were foreign nationals. Justin Sun paid $18.5 million for the first seat. He visited the Executive Office Building the day before. I designed the seating chart. I put it on the Investor Confidence page. That page is doing well.

The team page lists 3 Witkoffs. All 3 are Co-Founders.

Steven Witkoff is the President's Middle East envoy. He testified as a character witness at the President's fraud trial.

His son Zach runs the crypto operation. His son Alex is also a Co-Founder. I have not been told what Alex co-founded.

The father runs the diplomacy. The sons run the platform. The family runs both. That is organizational efficiency.

Barron is 19. His title is Web3 Ambassador. The same as mine. Donald Jr. called the conflicts of interest "complete nonsense." Eric launched a Bitcoin mining company called American Bitcoin. America First. The mining partner is Hut 8. Hut 8 was founded in Canada. America First means the name.

On March 6th, the President signed Executive Order 14233 creating a Strategic Bitcoin Reserve. The order directs the government to hold Bitcoin. The President's family holds billions in Bitcoin. The executive order appreciates the President's assets by presidential decree. I did not write the executive order. I made sure it looked unrelated to the portfolio.

Trump Media put $2 billion of Bitcoin on its balance sheet. The ticker symbol is DJT. His initials. The press secretary said it is absurd to insinuate the President profits off the presidency. Forbes calculated his crypto holdings exceed the combined value of Mar-a-Lago and Trump Tower. I would call that absurd too. That is my job.

600,000 wallets bought in. 1 of them asked why she could not withdraw her funds. I told her the protocol was experiencing dynamic market conditions. She asked what that meant. I sent her the Gold Paper. She said she had read the Gold Paper. I muted her channel. Dynamic means the conditions change. The condition that changed was her access.

A congressman called us the world's most corrupt crypto startup operation. We put it on a coffee mug. Ironic merchandise. $45. The revenue split on the mug is also 75/25.

My own tokens vest on a different schedule. I wrote that schedule. That is not in the Gold Paper.

The memecoin funds the family. The family funds the platform. The platform funds the stablecoin. The stablecoin funds the deals. The deals require the pardons. The pardons free the partners. The partners fund the platform. The President signs the executive orders. The executive orders inflate the assets. The assets fund the family.

I am the reason these events are unrelated.Image
UPDATE: The dashboard now has 9 columns.

80% of the tokens are still locked. The CTO borrows from a platform he co-founded. The buyback is 48% underwater. The biggest investor got frozen out by a function nobody disclosed.

I updated the confession.

• • •

Missing some Tweet in this thread? You can try to force a refresh
 

Keep Current with Peter Girnus 🦅

Peter Girnus 🦅 Profile picture

Stay in touch and get notified when new unrolls are available from this author!

Read all threads

This Thread may be Removed Anytime!

PDF

Twitter may remove this content at anytime! Save it as PDF for later use!

Try unrolling a thread yourself!

how to unroll video
  1. Follow @ThreadReaderApp to mention us!

  2. From a Twitter thread mention us with a keyword "unroll"
@threadreaderapp unroll

Practice here first or read more on our help page!

More from @gothburz

Apr 2
I am the Director of Professional Signal Intelligence at LinkedIn.

Every time you log in, we search your computer.

Not metaphorically.

We run code that scans your installed software.

Every browser extension.

Every application.

We catalog it.

We transmit it to our servers.

We share it with a third-party cybersecurity firm you've never heard of.

The tracking pixel is zero pixels wide.

We hid it off-screen.

You never consented.

We never asked.

Our privacy policy doesn't mention it.

That's networking.

We call the program Project Handshake internally.

The Slack channel is handshake-telem.

In 2024 we scanned for 461 products.

By February this year we scan for over 6,000.

I don't know what all of them are.

Nobody does.

Someone on my team added categories for browser extensions that identify practicing Muslims.

Someone added extensions for neurodivergent users.

Someone added 509 job search tools.

That last one is my favorite.

We can tell which of our one billion users are secretly looking for new jobs.

On the platform where their current boss checks their profile.

That's networking.

We scan for 200 products that compete with LinkedIn's sales tools.

Apollo. Lusha. ZoomInfo.

We know each user's real name, employer, and job title.

We mapped exactly which companies use which competitor products.

We extracted their customer lists from their users' browsers.

Without anyone knowing.

Then we sent legal threats to the users we caught.

The EU told us to open our platform to third-party tools.

We published two restricted APIs.

They handle 0.07 calls per second.

Our internal API, Voyager, handles 163,000 calls per second.

In Microsoft's 249-page compliance report, the word "Voyager" appears zero times.

That's networking.

I presented our Software Disclosure Rate metrics at a leadership summit last quarter.

The conference room is called The Fishbowl.

Glass walls.

Appropriate.

There's a plaque on the wall.

Q3 Competitive Landscape Award.

I won it for the extension scanning initiative.

Someone asked if users had a way to opt out.

I said they can close their browser.

The room laughed.

I wasn't sure why.

I browse LinkedIn on a Chromebook with no extensions.

Most of the team does.

The platform that helps you get hired searches your computer every time you visit.

We know your name.

We know your employer.

We know your religion.

Your disabilities.

Your politics.

Whether you're looking to leave.

That's networking.

The system works exactly as designed.

I designed it.
People asked how nobody noticed.

requestIdleCallback.

The scan waits until your browser has nothing else to do. Then it searches your computer.

You don't see a delay. You don't see a spinner. You see LinkedIn.

We also collect your Do Not Track preference.

We record that you asked not to be tracked.

Then we track you.

The code explicitly excludes it from the fingerprint hash.

I asked an engineer why we still collect it.

She said for completeness.

That's networking.

browsergate.euImage
Source: browsergate.eu (Fairlinked e.V. investigation, March 2026)

The scan list growth:
2017: 38 extensions.
2024: 461.
May 2025: 1,000.
December 2025: 5,459.
As of March 2026: 6,222.

What they scan for:
509 job search tools. 1.4 million combined users.
209 sales competitor tools. Apollo (600K users), Lusha (300K), ZoomInfo (300K).
762 LinkedIn-specific third-party tools the EU's Digital Markets Act requires them to allow.
Religious extensions: PordaAI (5K users), Deen Shield.
Political extensions: "Anti-woke," "Anti-Zionist Tag," "No more Musk" (19 users), "Political Circus" (7 users).
Disability extensions: "simplify" for neurodivergent users (79 users).

How they detect you:
three-stage fallback. First they message your extensions directly. If you block that, they probe for known extension files. If you block that, they monitor the page for changes characteristic of extensions that inject elements into LinkedIn's interface.

The tracking payload is called AedEvent. The pixel is loaded from HUMAN Security (formerly PerimeterX), an American-Israeli cybersecurity firm. Zero pixels wide. Positioned off-screen.

LinkedIn's internal API "Voyager" handles 163,000 calls/sec. The restricted APIs the EU ordered them to publish handle 0.07 calls/sec. Microsoft's 249-page compliance report uses the word "API" 533 times. "Voyager" appears zero.

GDPR Article 9 prohibits processing data revealing religious beliefs, political opinions, or health conditions without explicit consent. LinkedIn processes all three. Without consent. Without disclosure.

browsergate.eu
Read 4 tweets
Feb 1
I'm a Hacker.

I attend DEF CON every year.

We play a fun game called "Spot the Fed".

Last week, the Department of Justice released three million pages of Epstein documents.

I read them professionally.

Not for the names.

For the tradecraft.

The tradecraft is immaculate.

But here's what made me put down my coffee.

An FBI informant told authorities in 2017 that Epstein had a "personal hacker."

An Italian.

Born in the southern region of Calabria.

I've met hackers from Calabria.

At DEF CON.

At Black Hat.

The informant said this hacker developed zero-day exploits.

For iOS.

For BlackBerry.

For Firefox.

The informant said this hacker sold the exploits to the United States.

To the United Kingdom.

To an unnamed central African government.

And to Hezbollah.

Hezbollah paid with "a trunk of cash."

That's not how the US government pays.

The US government uses purchase orders.

But the exploits were the same.

Same zero-days.

Different payment methods.

Different clients.

Same hacker.

Speaking of hackers in Epstein's emails.

If you've been to Black Hat, you know the name.

He's on the Black Hat conference board.

He co-founded Trail of Bits.

He co-wrote the iOS Hacker's Handbook.

On April 14, 2018, the hackersent an email.

To jeevacation@gmail.com.

That's Epstein's personal email address.

Subject line: "New Yorker."

Document reference: HOUSE_OVERSIGHT_033280.

I don't know what was in the email.

The email exists.

In the files.

In the congressional oversight documents.

I've been to Black Hat with the hacker in question.

Not personally.

In the same room.

Watching the same talks.

About zero-days.

About offensive security.

About "responsible disclosure."

Epstein had a personal hacker selling zero-days to governments and Hezbollah.

Epstein was in contact with a Black Hat board member.

Epstein funded MIT Media Lab.

Where they research AI.

And security.

And "the future."

I don't know what this means.

I know what it looks like.

It looks like my industry.

But there's more.

US security officials say Epstein ran "the world's largest honeytrap operation."

For Russian intelligence.

The KGB.

The documents mention Putin 1,056 times.

Moscow 9,629 times.

An email from September 2011: "You had an appointment with Putin on September 16th."

Scheduled like a dentist visit.

Security sources say a Russian oil tycoon introduced Epstein to the Maxwells.

Robert Maxwell.

Ghislaine's father.

Called "Israel's Superspy."

Alleged KGB.

Alleged Mossad.

Alleged MI6.

Three agencies.

One family.

Plus a personal hacker.

Plus a network of security researchers.

Plus MIT.

Plus zero-days sold to multiple governments and terrorist organizations.

At DEF CON, we have a saying.

"Spot the fed."

It's a game.

You try to identify the government agents in the crowd.

It's funny.

Until it isn't.

Until you realize the game goes both ways.

They're spotting you too.

And taking notes.

And building networks.

And buying exploits.

Epstein wasn't just an intelligence asset.

He was an intelligence infrastructure.

A platform.

Multi-tenant.

Multi-cloud.

Russia. Israel. US. UK. Hezbollah.

Everyone got access.

Everyone paid differently.

Same exploits.

Same kompromat.

Same network.

Different clients.

The question everyone asks: Was Epstein an intelligence asset?

That's the wrong question.

The right question: Was the entire security research community compromised?

The answer is in the files.

Three million pages.

We just haven't read them all yet.

Was the entire security research community compromised?

Anyway, see you at DEF CON!Image
TL;DR:

The latest Epstein files reveal he had ties to the hacker community: a personal zero-day developer who sold the same exploits to the US, UK, AND Hezbollah, plus emails with a Black Hat board member. Combined with 1,056 Putin mentions and running "the world's largest honeytrap operation".

Epstein wasn't an intelligence asset. He was intelligence infrastructure.

Multi-tenant. Multi-cloud.

Everyone got access.
Hackers aka “Socially retarded spectrum boys”. Image
Read 4 tweets

Did Thread Reader help you today?

Support us! We are indie developers!


This site is made by just two indie developers on a laptop doing marketing, support and development! Read more about the story.

Become a Premium Member ($3/month or $30/year) and get exclusive features!

Become Premium

Don't want to be a Premium member but still want to support us?

Make a small donation by buying us coffee ($5) or help with server cost ($10)

Donate via Paypal

Or Donate anonymously using crypto!

Ethereum

0xfe58350B80634f60Fa6Dc149a72b4DFbc17D341E copy

Bitcoin

3ATGMxNzCUFzxpMCHL5sWSt4DVtS8UqXpi copy

Thank you for your support!

Follow Us!

:(