TheDinarian
News • Business • Investing & Finance
Understanding Ledger’s Secure Screen and Why It’s Important
August 30, 2024
post photo preview
KEY TAKEAWAYS:
— The screen of the device you use for crypto transactions is a potential attack vector.

Screens rely on the security of the computer chip that controls them, and not all chips or devices are built with security in mind.

—Ledger devices use a secure screen that connects directly to the Secure Element chip, meaning that what you see is what you sign.

Blockchain transactions, once processed, are immutable and irreversible. If you want to sign a transaction, you want to know the outcome before you steam ahead. If you make a mistake, your funds could be gone forever. While some lost funds can be attributed to copying down addresses carelessly or inputting incorrect information, they are often the result of hacking.

A common attack vector is the screen of your device. Without a secure screen, a malicious transaction wouldn’t look nefarious at all. That’s because screens we use for everyday work, study, and entertainment aren’t designed for security, they are built for performance. And when it comes to protecting and managing digital assets, these devices fall short.

Simply, you can’t trust the screen on your laptop or smartphone. But how can we mitigate this risk? 

The answer lies in a secure screen that guarantees the legitimacy of the information it shows. That’s exactly why Ledger devices have a secure screen driven directly by the Secure Element chip. It’s designed with security in mind, ensuring that what you see is what you sign

But what is a secure screen and why is it so important? Let’s dive in.

The Screen of Your Laptop or Smartphone Can’t Be Trusted

Behind every screen is a chip. That chip is responsible for the information the screen shows. For your laptop or smartphone to work, the screen must be able to access information from the chip. The type of chip it uses and how it communicates with the screen is integral to the security of any device. 

The problem arises with trusting the details of a transaction on a device connected to the internet. When you use a crypto wallet on your laptop or smartphone, you rely solely on the security of that device. Since they typically connect to the internet they are vulnerable to online threats.

Once exploited, hackers can change details on the screen of an infected device—even remotely. For example, if you were trying to initiate a crypto transaction on your laptop, a hacker could change transaction details on its screen, such as the recipient address or the total number of assets you want to send. Essentially, you can’t sign any transaction on an internet-connected device without risking your assets. 

This is exactly why hardware wallets exist: they keep your private keys stored in a chip isolated from the internet-connected device and any potential malware it hosts. By storing your private keys in a chip in a separate device that doesn’t connect to the internet, they are immune to online threats.

Some Hardware Wallet Screens Are More Secure Than Others

At this point, you might think that using any hardware wallet is enough. After all, the chip that controls the screen is completely separate from the internet-connected device initiating the transaction. That must be safe, right? 

Unfortunately, it’s not as simple as it seems. Any screen is a potential attack vector, and not all hardware wallets have the same level of security. It’s not just about keeping the chip containing private keys separate from internet connectivity, you also have to ensure that all of the device’s components are protected from physical hacks. 

Typically, hardware wallets use MCU chips to control their screens, and this is where the issue lies. It’s reasonably easy and inexpensive for a hacker to replace the firmware of an MCU chip. If a hacker gains access to the MCU that controls your hardware wallet’s screen, they wouldn’t need to gain access to your private keys. Simply with access to your screen, a hacker can tamper with the details of a transaction to trick you into signing away your assets.

To mitigate this risk, some hardware wallet providers have opted to remove the feature of a screen entirely. But without a screen, how can you know a transaction is legitimate? The answer is, you can’t. 

Luckily, the Ledger security model offers a different and more practical answer: a secure screen. But how does this work exactly? 

Understanding Ledger’s Secure Screen

The security of a Ledger device’s secure screen starts with its internal components. Ledger devices store private keys on a Secure Element chip, an industry-leading computer chip often used in bank cards and passports since it can withstand common attack vectors like side-channel attacks and glitching. 

Today, several hardware wallet providers use a Secure Element to generate and store private keys, but they typically drive their screens with MCU chips, which are vulnerable to physical hacking. Ledger devices are unique for using the Secure Element to drive their secure screens. Since the Secure Element chip drives the secure screen directly, no hacker can intercept this information or tamper with the transaction details it shows. 

The screen benefits from the Secure Element’s ability to withstand attacks, meaning “what you see is what you sign”. If the details on the screen of your Ledger device match what you see in Ledger Live, you can sign with confidence. This allows you to double-check the accuracy of your internet-connected device too. If the details on your Ledger device don’t match those on your internet-connected device, your laptop or smartphone is likely infected with malware. 

Finally, driving a screen with the Secure  Element also introduces the ability to carry out cryptographic attestations; allowing you to verify your Ledger device is running the genuine BOLOS operating system. These are just a few ways a secure screen makes interacting with the blockchain more secure and intuitive. 

What Does The Secure Screen Protect Me From

So now you know why having a secure screen is important, but what about the work it’s doing? Let’s dive into some of the most common attacks the screen of your device may face and how Ledger’s secure screen approaches them.

Address Poisoning

Ledger’s secure screen protects you from address poisoning. To explain, address poisoning is when an attacker sends you a small amount of crypto to appear in your transaction history. The transaction is designed to look like you initiated it, for example, the attacker will use an address with only a few characters different from your own. The scammer simply hopes you mistakenly copy their address from your transaction history, confusing their address for one you are familiar with.

This incredibly common scam catches out even the most experienced crypto users. However, with Ledger’s secure screen, you don’t have to worry about address poisoning: you can see the full details of a transaction, including the entire wallet address directly on your Ledger device. 

Address Switcher Malware

Another way scammers may attack your screen is through address switcher malware. With this scam, the attacker takes control of your computer or smartphone’s clipboard. With access to your clipboard, a hacker can use your own transactions against you.

For example, say you were trying to send funds to a friend, when initiating the transaction, the scammer copies their address onto your clipboard. When you sign the transaction, the funds end up in the hacker’s account instead of your friend’s. They can also replicate this attack when you plan to receive funds from a friend. The attacker replaces your address with their own, and when you share the address with your friend, the funds end up in the hacker’s account.

Ledger’s secure screen is controlled by a Secure Element chip, completely separate from your internet-connected device. Your Ledger device’s secure screen will always show the correct transaction details, even if your internet-connected device is compromised

Clickjacking Malware

Finally, hackers will attempt to trick you into revealing potentially sensitive information or unknowingly consent to malicious actions via clickjacking. This attack uses your clicks against you, modifying your device’s screen to convince you to hand over your login credentials, download more malware, or sign malicious transactions or smart contract approvals. 

 In these cases, a bad actor may take control of your screen to convince you to sign away your assets. All they need to do is make the approval look legitimate, i.e. from a familiar app you use, and your assets are theirs. 

Ledger’s secure screen cannot be targeted with clickjacking malware, as the Secure Element is tamper-proof and drives the secure screen directly.

All you need to do to protect yourself is double-check that the receiving address on your Ledger device’s secure screen matches the one on your internet-connected device before signing any transaction. Your Ledger device will handle the rest!

A Secure Screen: Just One Piece of Ledger’s Security Model

In conclusion, it’s clear that a secure screen is one of the most important aspects of managing crypto transactions. Without a secure screen, you don’t know what you’re signing. Remember, using a screen with vulnerabilities to send transactions could end in losing your funds. In the very worst-case scenario, you could lose everything by sending your assets to a spoofed address. 

No matter how big or small your portfolio is, understanding the results of signing a transaction is paramount. But a secure screen is just one piece of Ledger’s security model. So don’t stop here! Check out the full article on Ledger’s Security model to learn more about the different aspects of the Ledger ecosystem keeping you, your assets, and your devices safe.

Link

community logo
Join the TheDinarian Community
To read more articles like this, sign up and join my community today
0
What else you may like…
Videos
Podcasts
Posts
Articles
👀 Klaus Schwab promises new WEF recruits 👀

In a leaked video, Klaus Schwab promises new WEF recruits that their "avatar" will live on after death, and that their brains "will be replicated through artificial intelligence and algorithms."

00:00:38
🚨BlackRock: The Most Evil Business In The World🚨

The company that owns the world. They are buying up the media, real-estate, everything you can think of and it's leading to dystopian future ahead. Larry Fink's investment management is destroying our lives.

"BlackRock is the 4th branch of government" - Bloomberg

“Whoever controls the money controls the world” - Henry Kissinger

We no longer live under free market capitalism, we live under a system of socialism for the rich.

00:15:38
🚨Klaus Schwab Admits He Has Lost Control🚨

Klaus Schwab admits he has lost control and continues to lose the narrative that once sustained public trust in him.

He claims this narrative has guided humanity since the beginning and steered people toward what he calls a better future.

Schwab says the level of push back he now faces has made international cooperation nearly impossible.

He says the elites are now being forced to think about how to create an entirely new narrative.

00:01:06
👉 Coinbase just launched an AI agent for Crypto Trading

Custom AI assistants that print money in your sleep? 🔜

The future of Crypto x AI is about to go crazy.

👉 Here’s what you need to know:

💠 'Based Agent' enables creation of custom AI agents
💠 Users set up personalized agents in < 3 minutes
💠 Equipped w/ crypto wallet and on-chain functions
💠 Capable of completing trades, swaps, and staking
💠 Integrates with Coinbase’s SDK, OpenAI, & Replit

👉 What this means for the future of Crypto:

1. Open Access: Democratized access to advanced trading
2. Automated Txns: Complex trades + streamlined on-chain activity
3. AI Dominance: Est ~80% of crypto 👉txns done by AI agents by 2025

🚨 I personally wouldn't bet against Brian Armstrong and Jesse Pollak.

👉 Coinbase just launched an AI agent for Crypto Trading

🚨 Bittensor’s founder: “TAO isn’t a crypto—it’s AI infrastructure” 🚨

A major narrative shift is being pushed by Jacob Steeves—and it directly challenges how most people view tokens like TAO.

🔑 Key points

🔹 Not a token-first system
Steeves argues TAO isn’t meant to be a speculative asset—it’s the incentive layer powering a decentralized AI network.

🔹 Marketplace for intelligence
Bittensor functions as a peer-to-peer market where AI models compete and get paid for useful output, not hype or staking alone.

🔹 Subnets = micro-economies
The network is split into specialized subnets, each acting like its own AI market (text, vision, prediction, etc.), rewarding contributors based on performance.

🔹 Fixing open-source AI incentives
Bittensor aims to solve a core problem:
👉 open AI research isn’t well monetized
👉 centralized labs dominate

So it introduces token rewards to incentivize global contributors.

🔹 “Proof of intelligence” model
Instead of proof-of-work or proof-of-stake, the network rewards useful ...

🚨 $620M floods into Bittensor as Nvidia & Polychain load up 🚨

A massive institutional wave just hit Bittensor (TAO), and it’s not small money—this is serious capital positioning around decentralized AI infrastructure.

🔑 Key points

🔹 $620M institutional injection:
Nvidia ($200M) have deployed over $620M into TAO exposure.

🔹 Heavy staking = supply squeeze:
Around 68% of TAO supply is locked, with much of Nvidia’s allocation staked—reducing circulating liquidity.

🔹 Real revenue, not just hype:
The network generated ~$43M in AI compute revenue in Q1 2026, showing actual usage.

🔹 Emission cut tightening supply:
Daily token emissions were cut in half, lowering sell pressure by ~$500K per day.

🔹 Price supported by fundamentals:
TAO rose ~21% in Q1 2026, holding strength despite volatility.

🔹 ETF narrative building:
Grayscale & Bitwise filings for TAO ETFs could become a major future catalyst.

🔎 Why it matters

🔹 This is AI infrastructure, not just a token
Bittensor is essentially a marketplace for machine...

Keep your 👀 on Europe 🇪🇺

EU’s proposed Google data access rule could enable large-scale surveillance

The European Commission is facing criticism from security and privacy experts over a proposed Digital Markets Act (DMA) measure that would require Google to share vast amounts of search data with third parties via an automated API.

Critics warn the plan could expose sensitive user queries at scale, creating both privacy and national security risks.

https://cyberinsider.com/eus-proposed-google-data-access-rule-could-enable-large-scale-surveillance/

post photo preview
The Quiet Revolution in Bittensor

This past week (April 13–19, 2026) wasn’t just another cycle of subnet drama and $TAO price noise.

Three major developments landed almost back-to-back that, when viewed together, paint a far bigger picture than most participants are seeing right now.

Bittensor is steadily transitioning from a speculative incentive network into production-grade decentralized AI infrastructure that enterprises, researchers, and real users are beginning to plug into directly.

Most eyes remain fixed on emissions, governance changes like BIT-0011, or short-term token flows. But the deeper shift happening underneath is structural. These three developments show Bittensor subnets creating tangible value across enterprise physical AI, frontier training scalability, and consumer-facing uncensored models in ways that can compound over years, not hype cycles.

  1. Score (Subnet 44) + Manako Labs Secures PwC France & Maghreb Alliance:

 

This was one of the clearest institutional validation moments the ecosystem has seen so far.
@manakoai, the commercial product layer built on @webuildscore decentralized computer vision network, took first place at Start in Block, beating more than 1,000 startups at the Louvre during
 
Around the same time, @PwC_France & Maghreb announced a strategic alliance to integrate Manako’s Business Operations World Model into its AI and digital advisory practice. PwC isn’t some small crypto-friendly firm. They are a $57B revenue global giant serving 82% of the Fortune Global 500. Reports indicate they spent months on technical and legal due diligence before deciding to move forward with deployment opportunities across retail, manufacturing, logistics, energy, and infrastructure.
 
The key capability is powerful: transforming existing enterprise camera systems into real-time physical AI decision networks without requiring companies to rebuild their entire operational stack.
 
The Bigger Picture Most Aren’t Seeing: This does not look like a one-off pilot or marketing headline. It could represent one of the first real on-ramps for Big Four consulting firms to distribute decentralized AI infrastructure to enterprise clients at scale. If successful, this creates:
 
▫️Recurring enterprise demand
▫️Regulatory credibility
▫️Higher-quality commercial usage
▫️Long-term trust in Bittensor infrastructure
 
That type of adoption cannot be replicated by retail hype alone.
 
2. Macrocosmos (Subnet 9 / IOTA) Releases ResBM: 128x Activation Compression
 
 
While enterprise headlines captured attention, @MacrocosmosAI quietly released its ResBM (Residual Bottleneck Models) research paper. The breakthrough demonstrated state-of-the-art 128x activation compression in pipeline-parallel training while maintaining near-zero loss in convergence, memory efficiency, or compute overhead. This is highly relevant because it is designed for low-bandwidth, internet-scale distributed training, the exact type of environment decentralized networks must solve for.
 
Why This Matters Long-Term:
 
The biggest barrier to truly decentralized frontier model training is not only GPU access. It is bandwidth and communication cost when massive models are split across many machines. Centralized labs solve this using expensive proprietary interconnects inside hyperscale data centers. ResBM attempts to attack that problem directly. What many miss is that this tech moat positions Subnet 9 (@IOTA_SN9), and Bittensor’s pre-training layer more broadly, as a viable alternative for the next wave of open-source models. As training demands continue to rise, the ability to scale efficiently without centralization could become a compounding strategic advantage.
 
This is not a minor upgrade. It may materially shift the economics of who gets to train competitive models.
 
3. Venice Uncensored 1.2 Launches, Trained on Targon (Subnet 4)
 
 
@ErikVoorhees and the @AskVenice team released Venice Uncensored 1.2, a Mistral 24B variant featuring:
 
• Vision support
• 4x larger context window
• Stronger tool use
• Minimal refusal behavior after extensive testing
 
Most importantly, it was explicitly trained using @TargonCompute confidential compute on Subnet 4.
 
This gained strong attention because it is a live consumer-facing product users can interact with immediately. Privacy-focused, uncensored AI running on decentralized infrastructure resonates in a world increasingly concerned about centralized censorship, data harvesting, and platform control.
 
The Underappreciated Angle Targon’s confidential compute layer is showing it can support real model training workloads for production applications.
 
Every Venice-style release creates a direct bridge between:
 
▫️End-user demand
▫️Subnet emissions
▫️Compute utilization
▫️TAO-linked ecosystem value
 
As regulation around privacy and AI governance grows stricter, demand for confidential and permissionless training environments may continue rising.
 
This is the consumer on-ramp that complements the enterprise and research stories above.
 
Connecting the Dots: The Bigger Picture for Bittensor: Individually, these are impressive wins.
 
Together, they signal something more profound:
 
▫️Enterprise bridge (SN44): Real corporate budgets and distribution channels via PwC.
▫️Technical scalability (SN9): Solving the hard physics of decentralized training.
▫️Product-market pull (SN4): Shipping usable AI to everyday users who value freedom and privacy.
 
Bittensor is no longer just incentivizing miners. It is evolving into a neutral, permissionless layer where multiple AI value chains can operate together, from world models and large-scale training to inference, compute, and consumer applications.
 
While many still focus on short-term moves such as subnet rotations, governance votes, or
$TAO price action amid post-Covenant recovery, the bigger shift is ecosystem maturity.
 
These developments help attract:
 
▫️ Serious capital
▫️ Strong technical talent
▫️ Real enterprise demand
▫️ Growing consumer usage
 
This week showed resilience and forward momentum.
 
Big Four validation, meaningful research breakthroughs, and live products all point to one thing: The vision is becoming real.
 
Final Thoughts: If you are only watching the chart, you may be missing the real shift. Bittensor is laying the groundwork to become the decentralized backbone for the next era of AI, not by competing head-on with closed labs on every metric, but by becoming the open, scalable, incentive-aligned alternative no single company can fully control or censor.
 
The pieces are moving.
 
The bigger picture is beginning to come into focus for those paying attention beyond the noise.
 

 🙏 Donations Accepted, Thank You For Your Support 🙏

If you find value in my content, consider showing your support via:

💳 Stripe:

1) or visit http://thedinarian.locals.com/donate

💳 PayPal: 
2) Simply scan the QR code below 📲 or Click Here

🔗 Crypto Donations Graciously Accepted👇
XRP: r9pid4yrQgs6XSFWhMZ8NkxW3gkydWNyQX
XLM: GDMJF2OCHN3NNNX4T4F6POPBTXK23GTNSNQWUMIVKESTHMQM7XDYAIZT
XDC: xdcc2C02203C4f91375889d7AfADB09E207Edf809A6

Read full Article
post photo preview
📈Bittensor ($TAO) Staking📈
Learn how to stake your TAO and earn potential rewards.

Decentralized staking

Staking TAO tokens lets you earn rewards by supporting the Bittensor network. In return, you receive a share of the staking rewards.

Source: Taostats

In the Bittensor (TAO) ecosystem, there are two main ways people can stake their tokens: Root staking and Alpha staking. These represent two different strategies, with different levels of risk and reward.

Root staking was the first method introduced when Bittensor launched. It allows users to lock up their TAO tokens in the core part of the network (now called Subnet 0) to earn steady, “predictable” rewards. It's straightforward and carries less risk, making it a good fit for early users or anyone who prefers a more passive, steady approach. In essence, this is the “traditional” form of token staking seen in many crypto projects. Rather than simply holding your tokens, you delegate them to validators who help run and secure the network on your behalf.

Source: Taostats.io

Later, on February 13, 2025, Alpha staking was introduced as part of a major network upgrade called Dynamic TAO (dTAO). This upgrade created subnet-specific tokens called Alpha tokens, which users receive when they stake TAO into subnets. If you’re not familiar with the concept of subnets and Bittensor infrastructure, please check out Bittensor project reviewAlpha tokens can go up or down in value, but they also offer a chance for much higher rewards, especially in new or fast-growing subnets. It has more complex staking dynamics and comes with more risk, but also more opportunity if you're actively involved.

Source: Taostats.io

In both Root and Alpha staking, there’s no fixed lock-up period—you can stake or unstake your TAO tokens at any time. However, while your tokens are staked, they’re temporarily locked, which means you can’t trade or transfer them until you unstake.

In Root staking, staking rewards are simple and “stable”. However, the reward amount (APY) is slowly going down over time. It’s because the network is moving more rewards toward Alpha staking.

In Alpha staking, things work differently. You first change your TAO into special tokens called Alpha tokens, which are connected to subnets. When you hold Alpha tokens, your balance grows as and when the subnet earns daily rewards. The more TAO is staked into a subnet, the more rewards it gets. If you want to exit, you must convert your Alpha tokens back to TAO. This process can be affected by market prices and might give you less TAO back than you put in, depending on the timing. This method can earn you more than Root staking, but it depends on how well your chosen subnet performs and how much activity it gets.

With Root staking, your rewards are based on how well your validator performs in the network. In Alpha staking, you stake your TAO into a subnet, and your rewards depend on the overall performance of that subnet. Subnets that provide more value to the network receive more emissions, which increases your Alpha token balance.

Centralized staking

Centralized TAO staking, offered by platforms like Coinbase, is a simple and beginner-friendly option where the exchange handles the staking process for you. You earn a fixed reward rate of around 17.3% APY. While your tokens are temporarily locked during staking, there are no additional lock-up periods beyond what the network requires. The main trade-off between centralized and decentralized staking is convenience versus control.

Staking is a great way to put your TAO to work while contributing to the network's security. But, it's important to understand the terms before participating, as rewards and conditions may differ depending on the platform you choose.

 🙏 Donations Accepted, Thank You For Your Support 🙏

If you find value in my content, consider showing your support via:

💳 Stripe:
1) or visit http://thedinarian.locals.com/donate

💳 PayPal: 
2) Simply scan the QR code below 📲 or Click Here


🔗 Crypto Donations Graciously Accepted👇
XRP: r9pid4yrQgs6XSFWhMZ8NkxW3gkydWNyQX
XLM: GDMJF2OCHN3NNNX4T4F6POPBTXK23GTNSNQWUMIVKESTHMQM7XDYAIZT
XDC: xdcc2C02203C4f91375889d7AfADB09E207Edf809A6

Read full Article
post photo preview
🧬VINDICATED! The Epstein Files Connect Gates, Pandemics & Censorship to a Globalist Blueprint for a Biosecurity State🧬

Every warning. Every documentary. Every article. Every post that got us banned. All of it was true. Now what? What can we do? Read on, share this Substack, help us save lives! The Light is shining! ✨

Well, well, well… look what the cat dragged in.

Actually, scratch that. Look what the Department of Justice finally dragged out of Jeffrey Epstein’s email inbox and dumped on the world’s doorstep like a rotting corpse nobody wanted to claim. Yep, that’s right. The Epstein files. It’s hilarious how the “Democratic hoax” and “fantasy” client list we were all told didn’t exist suddenly became a very real, very unsealed document.

For years—years—they called us conspiracy theorists. They slapped “misinformation” labels on our posts faster than Pfizer could print liability waivers. They kicked us off platforms, lied about us in the media, and shadow-banned our reach. Meanwhile, the real conspiracy—the one typed out in black-and-white emails between billionaires, bankers, and a convicted pedophile—was sitting in a government vault, waiting to prove us right.

And now? Now the receipts are public.

The release of Jeffrey Epstein’s files has done far more than expose a network of elite pedophilia and blackmail—it has vindicated truth-tellers like us and countless others who were smeared, censored, de-platformed, and persecuted for warning about the sinister agendas of the globalist elite. The documents reveal shocking connections between Epstein, Bill Gates, pandemic planning, and the systematic suppression of anyone who dared to connect the dots.

We weren’t crazy. We were just early. And they hated us for it.

Epstein, Gates, and the Pandemic “Business Model” They Built Together

One of the most damning revelations from Epstein’s files is his partnership with Bill Gates. Forget the carefully crafted PR spin about “regretting” those meetings. These weren’t casual dinners. These were planning sessions.

Back in 2015, Gates and Epstein exchanged emails about “preparing for pandemics” and strategies to “involve the WHO.” Gates wrote: I hope we can pull this off.”

How’s that for a chill down your spine?

This eerily foreshadowed the 2019 Event 201 simulation—a pandemic exercise hosted by the Gates Foundation, Johns Hopkins, and the World Economic Forum that just happened to model a global coronavirus outbreak… just months before COVID-19 ”mysteriously” emerged in Wuhan. Funny how that works, isn’t it?

But let’s rewind even further, to the real blueprint—the financial architecture that made the pandemic response not just possible, but profitable.

The story crystallizes in a chilling 2011 email exchangeJuliet Pullis, a JPMorgan executive under then-chairman Jes Staley, emailed Jeffrey Epstein with a list of detailed questions. The source? “The JPM team that is putting together some ideas for Gates.

The questions were precise: What are the objectives? Is anonymity key? Who directs the investments and grants? This wasn’t JPMorgan consulting an expert; it was a trillion-dollar bank asking a convicted felon to architect a billion-dollar philanthropic fund for Bill Gates.

This wasn’t JPMorgan consulting a philanthropic expert. This was a trillion-dollar bank asking a convicted felon to architect a billion-dollar philanthropic fund for one of the richest men on Earth. Let that marinate for a moment.

Epstein’s reply was fluent and commanding. He described a donor-advised fund with a “stellar board” and ties to the Gates-Buffett “Giving Pledge.” He noted the billions already pledged and identified the gap: “They all have a tax advisor, but have no real clue on how to give it away.” His solution? JPM would be an integral part. Not advisor… operator, compliance. Staley’s response: We need to talk.

By July 2011, the plan evolved. In an email to Staley, copying Boris Nikolic (Gates’ chief science advisor), Epstein laid out the core pitch: A silo based proposal that will get Bill more money for vaccines.”

Not “more research for pandemics.” Not “better public health infrastructure.” More money for vaccines.” This is the unambiguous language of capital formation, not charity. It reveals the structure’s intended output planning reached the highest levels.

In August 2011, Mary Erdoes, CEO of JPMorgan’s $2+ trillion Asset & Wealth Management division, emailed Epstein (while on vacation) with additional operational questions.

Epstein’s reply was breathtaking in scope:

  • Scale: “Billions of dollars” in two years, “tens of billions by year 4.”

  • Structure: Donors choose from “silos” like mutual funds.

  • The Kicker: However, we should be ready with an offshore arm — especially for vaccines.”

An offshore arm. For vaccines. For a charitable vehicle. Let that sink in.

So, by the time the world was panicking in March 2020, the financial machinery was already built. The investment vehicles, the donor-advised funds, the reinsurance products at places like Swiss Re, and even the simulation playbooks were dusted off and ready to go.

The pandemic wasn’t an interruption to their business—it was the Grand Opening.

Epstein’s role extended far beyond trafficking; he was a facilitator and blackmail operative for the global elite. The same forces that orchestrated the COVID-19 power grab—the mask mandates, lockdowns, censorship, and coercive mRNA push—are the ones who silenced critics like us.

Gates, despite his documented ties to Epstein (multiple flights on the “Lolita Express” after Epstein’s 2008 conviction), walks freely. He’s on TV. He’s advising governments. He’s still funding “global health initiatives” and pushing digital IDs, vaccine passports, and climate lockdowns.

Meanwhile, people like our friend, Joby Weeks, are under house arrest without charges, and voices like ours were de-platformed, demonetized, and destroyed for saying this very thing.

We told you. You knew it in your gut. Now you have the emails.

Censorship: The Elite’s “Misinformation” Label to Cover Their Crimes

The Epstein files expose not just criminal behavior, but the playbook for the systematic suppression of truth. While Epstein’s powerful friends were being protected by the FBI, the DOJ, and the media, platforms like Facebook (Meta), YouTube (Google), and Twitter went to war against anyone talking about it.

Think about the sheer audacity.

We were banned from social media for calling COVID-19 a “fake pandemic” and exposing the vaccine injury data that’s now undeniable.

Below is a screenshot of the first Facebook post that was taken down and then used as “Exhibit A” in their “reports” about how bad we were, naming us the 3rd most dangerous people on earth after Dr Joseph Mercola and Bobby Kennedy in the digital hit list they called the “Disinformation Dozen.” They attacked us, lied about us, and pressured the media, social media, and population at large to do the same: attack, threaten, and cast us out.

We were labeled “dangerous” for sharing emails, documents, and research that the DOJ and the CDC have now confirmed.

It was never about “safety.” It was about narrative control.

The same institutions that turned a blind eye to Epstein’s crimes for decades—the same ones that let him “commit suicide” in a maximum-security prison with cameras conveniently malfunctioning—suddenly became the ruthless hall monitors of “acceptable discourse,” ensuring only their approved stories could be told.

Big Tech, Big Media, and Big Government are all part of the same protection racket. They shielded Epstein’s client list, and now they shield the architects of the pandemic debacle. Independent journalists, researchers, and health advocates like us, who connected these dots, were systematically de-platformed, demonetized, and destroyed.

Why? Because we were right, and that was the greatest threat of all.

When you’re over the target, that’s when the flak gets heaviest. And brothers and sisters, we were getting shelled.

They Lied About Us While Protecting the Real Criminals

Let’s be crystal clear about what happened here.

We have spent decades exposing the cancer industry, Big Pharma’s corruption, and the suppression of natural health solutions. We produced The Truth About Cancer docu-series, reaching millions worldwide. We warned about vaccine injuries, censorship, and the coming medical tyranny years before COVID-19.

And what did they do? They called us “Conspiracy Theorists,” “Anti-Vaxxers,” and “Killers.” Dangerous.

They said we were killing people with “misinformation.”

Facebook banned us. YouTube deleted our videos. Legacy media ran hit pieces. PayPal froze our accounts.

All while Bill Gates—a man with documented ties to Jeffrey Epstein, who flew on his plane multiple times after Epstein’s conviction, who got STDs from Russian girls Epstein provided for him for which Gates asked Epstein’s help getting him antibiotics to slip secretly to his then wife, Melinda, so that she would not know about his inexcusable and perverted escapades—yes, THAT Bill Gates—was at the same time, being platformed on every major news network as the world’s health oracle.

All while Anthony Fauci—who funded gain-of-function research in Wuhan through Peter Daszak and EcoHealth Alliance, who lied under oath to Congress, who flip-flopped on masks, lockdowns, and vaccines—was treated like a saint. Time Magazine’s “Guardian of the Year.”

All while Pfizer—a company with a $2.3 billion criminal fine for fraudulent marketing, bribery, and kickbacks—was given blanket immunity from liability and billions in taxpayer dollars to produce a vaccine in record time with no long-term safety data.

Were we the dangerous ones?

No.

We were the truthful ones. And that made us the enemy.

The Weaponized Institutions: From Epstein’s Blackmail to Your Digital ID

Epstein’s operation was never just about blackmail for perversion; it was blackmail for control. The files show his cozy ties to intelligence agencies (Mossad, CIA), financial giants like JPMorgan and Deutsche Bank, and political leaders across the globe.

This is the same cabal now pushing:

  • The Great Reset

  • Digital IDs

  • Central Bank Digital Currencies (CBDCs)

  • 15-minute cities

  • Carbon credit social scoring

  • Vaccine passports

Let’s connect the dots they desperately don’t want you to see:

Financial Control:

JPMorgan banked Epstein for years despite clear red flags—over $1 billion in suspicious transactions flagged internally and ignored. They knew. They didn’t care. They paid a $290 million fine and moved on.

Now, banks like Bank of America, Chase, and PayPal de-bank conservatives, truckers, health freedom advocates, and anyone who questions the narrative. Canadian truckers. Gun shops. Crypto entrepreneurs. The goal is the same: punish dissent and control economic life.

CBDCs are the endgame—a digital leash on every citizen. Programmable money that can be turned off, restricted, or expired. Social credit by another name.

Medical Tyranny:

The FDA, CDC, and WHO—utterly captured by Big Pharma—lied about:

  • COVID origins (Wuhan lab leak dismissed as conspiracy theory)

  • Vaccine efficacy (”95% effective” turned into “you need boosters forever”)

  • Natural immunity (ignored despite being superior)

  • Early treatments (ivermectin, hydroxychloroquine, vitamin D censored and mocked)

They attacked natural health advocates just as they’ve done for decades with cancer cures, detox protocols, and anything that threatens Big Pharma profits. They are not health agencies; they are profit-enforcement arms dressed in lab coats.

Political Corruption:

Epstein’s blackmail ensured elite immunity. His client list includes presidents, princes, CEOs, scientists, and media moguls.

Meanwhile, true dissidents—Julian Assange (tortured in prison for journalism), Edward Snowden (exiled for exposing mass surveillance), and journalists like us—face persecution, imprisonment, debanking, slanderous hit pieces, and/or constant character assassination.

Two systems of justice: one for them, one for you. One for Epstein’s friends, one for truth-tellers.

The Way Forward: They’re Exposed. Now It’s Time to Build.

The Epstein files are more than proof; they are a declaration that the system is rotten to its core. But here’s the beautiful part: they vindicate us completely.

Every warning. Every documentary. Every article. Every post that got us banned. All of it was true.

The globalists’ grip is weakening. The truth—the real, ugly, documented truth—is erupting from the very files they tried to hide. They labeled us liars, but the emails show they were the architects. They silenced us, they censored us, but that only made our voices more necessary.

Epstein did not kill himself. COVID-19 was not natural. The vaccines were not safe or effective. The censorship was not about protecting you—it was about protecting them.

And now? Now it’s time to use this vindication as fuel. Not for revenge, but for revolution. A revolution of truth, health, freedom, and justice.

They tried to bury us. They didn’t know we were seeds.

The Epstein files are a smoking gun. A paper trail. A confession written in emails, financial structures, and offshore accounts.

They prove what we’ve been saying all along:

  • The system is rigged.

  • The elites are criminals.

  • The pandemic was planned.

  • The censorship was coordinated.

And we were right. 👍

Source

🙏 Donations Accepted, Thank You For Your Support 🙏

If you find value in my content, consider showing your support via:

💳 Stripe:
1) or visit http://thedinarian.locals.com/donate

💳 PayPal: 
2) Simply scan the QR code below 📲 or Click Here


🔗 Crypto Donations Graciously Accepted👇
XRP: r9pid4yrQgs6XSFWhMZ8NkxW3gkydWNyQX
XLM: GDMJF2OCHN3NNNX4T4F6POPBTXK23GTNSNQWUMIVKESTHMQM7XDYAIZT
XDC: xdcc2C02203C4f91375889d7AfADB09E207Edf809A6

Read full Article
See More
Available on mobile and TV devices
google store google store app store app store
google store google store app tv store app tv store amazon store amazon store roku store roku store
Powered by Locals