Toggle light / dark theme

Do We Actually Live Inside a Black Hole? Let’s Explore the Evidence

Support this channel on Patreon to help me make this a full time job: https://www.patreon.com/whatdamath (Unreleased videos, extra footage, DMs, no ads)
Alternatively, PayPal donations can be sent here: http://paypal.me/whatdamath.
Get a Wonderful Person Tee: https://teespring.com/stores/whatdamath.
More cool designs are on Amazon: https://amzn.to/3QFIrFX

Hello and welcome! My name is Anton and in this video, we will talk about the claims that we live inside a black hole.
Links:
https://en.wikipedia.org/wiki/Black_hole_cosmology.
https://arxiv.org/pdf/2505.23877
https://arxiv.org/pdf/1910.10819v2

#blackhole #unvierse #astronomy.

0:00 Is universe basically a black hole?
1:10 Defining a black hole and the universe.
2:30 How would universe end up inside a black hole?
5:00 Explanations for how this may work.
6:35 Rotation and angular momentum.
8:05 What this could explain.
9:35 Counter evidence and why it’s probably not a black hole.
13:00 Rotation explanation using the cosmic web.
14:00 Conclusions.

Enjoy and please subscribe.

Bitcoin/Ethereum to spare? Donate them here to help this channel grow!
bc1qnkl3nk0zt7w0xzrgur9pnkcduj7a3xxllcn7d4
or ETH: 0x60f088B10b03115405d313f964BeA93eF0Bd3DbF

Thank you to all Patreon supporters of this channel.

Malicious Chrome Extension Steals MEXC API Keys by Masquerading as Trading Tool

Cybersecurity researchers have disclosed details of a malicious Google Chrome extension that’s capable of stealing API keys associated with MEXC, a centralized cryptocurrency exchange (CEX) available in over 170 countries, while masquerading as a tool to automate trading on the platform.

The extension, named MEXC API Automator (ID: pppdfgkfdemgfknfnhpkibbkabhghhfh), has 29 downloads and is still available on the Chrome Web Store as of writing. It was first published on September 1, 2025, by a developer named “jorjortan142.”

“The extension programmatically creates new MEXC API keys, enables withdrawal permissions, hides that permission in the user interface (UI), and exfiltrates the resulting API key and secret to a hardcoded Telegram bot controlled by the threat actor,” Socket security researcher Kirill Boychenko said in an analysis.

All-In’s 2026 Predictions

Questions to inspire discussion.

💰 Q: What would California’s wealth tax cost super voting shareholders like Larry Page and Sergey Brin? A: The tax multiplies voting ownership percentage by market cap to value super voting shares, resulting in a punitive tax rate of up to 50% on net worth for founders with control premiums.

🏃 Q: How much wealth could leave California if the asset seizure tax passes? A: An estimated half a trillion dollars in net worth could exit the state, creating severe budget implications for California’s social programs and general budget.

📊 Q: What should entrepreneurs do to prepare for potential wealth taxes on unrealized gains? A: Maintain a liquid safety net to cover tax bills on unrealized gains, though this is impossible to plan for if stock values later decline and bankrupt the company.

2026 Business Opportunities.

🤖 Q: Which company will become the first with more robots than humans? A: Amazon is predicted to become the first company with more robots than humans driving its bottom line by 2026 as they deploy robots while keeping human hiring flat.

New GoBruteforcer attack wave targets crypto, blockchain projects

A new wave of GoBruteforcer botnet malware attacks is targeting databases of cryptocurrency and blockchain projects on exposed servers believed to be configured using AI-generated examples.

GoBrutforcer is also known as GoBrut. It is a Golang-based botnet that typically targets exposed FTP, MySQL, PostgreSQL, and phpMyAdmin services.

The malware often relies on compromised Linux servers to scan random public IPs and carry out brute-force login attacks.

Cloud file-sharing sites targeted for corporate data theft attacks

A threat actor known as Zestix has been offering to sell corporate data stolen from dozens of companies likely after breaching their ShareFile, Nextcloud, and OwnCloud instances.

According to cybercrime intelligence company Hudson Rock, initial access may have been obtained through credentials collected by info-stealing malware such as RedLine, Lumma, and Vidar deployed on employee devices.

The three infostealers are usually distributed through malvertising campaigns or ClickFix attacks. This type of malware commonly targets data stored by web browsers (credentials, credit cards, personal info), messaging apps, and cryptocurrency wallets.

Traditional Security Frameworks Leave Organizations Exposed to AI-Specific Attack Vectors

In December 2024, the popular Ultralytics AI library was compromised, installing malicious code that hijacked system resources for cryptocurrency mining. In August 2025, malicious Nx packages leaked 2,349 GitHub, cloud, and AI credentials. Throughout 2024, ChatGPT vulnerabilities allowed unauthorized extraction of user data from AI memory.

The result: 23.77 million secrets were leaked through AI systems in 2024 alone, a 25% increase from the previous year.

Here’s what these incidents have in common: The compromised organizations had comprehensive security programs. They passed audits. They met compliance requirements. Their security frameworks simply weren’t built for AI threats.

Hacker arrested for KMSAuto malware campaign with 2.8 million downloads

A Lithuanian national has been arrested for his alleged involvement in infecting 2.8 million systems with clipboard-stealing malware disguised as the KMSAuto tool for illegally activating Windows and Office software.

The 29-year-old man was extradited from Georgia to South Korea following a related request under Interpol’s coordination.

According to the Korean National Police Agency, the suspect used KMSAuto to lure victims into downloading a malicious executable that scanned the clipboard for cryptocurrency addresses and replaced them with ones controlled by the attacker — known as ‘clipper malware’

When will The Singularity happen? 🦾 Dr. Ben Goertzel

🏦 Invest In Luxury Dubai Property https://londonreal.tv/dubai-ytd.
🔥 Join my Crypto & DeFi Academy: https://londonreal.tv/defi-ytd.
🍿 Watch the full Ben Goertzel interview for free: https://londonreal.tv/dr-ben-goertzel-will-artificial-intelligence-kill-us/

🔔 SUBSCRIBE ON YOUTUBE: http://bit.ly/SubscribeToLondonReal.
▶️ FREE FULL EPISODES: https://londonreal.tv/episodes.

#BenGoertzel #AI #artificialintelligence #AGI #DeFi #Crypto #LondonReal #BrianRose #Cryptocurrency #Bitcoin #Ethereum #singularity #singularitynet #thesingularity.

LATEST EPISODE: https://londonreal.link/latest.

DISCLAIMER: Content on this channel references an opinion and is for information purposes only. It is not intended to be investment advice. Seek a duly licensed professional for investment advice.

WebRAT malware spread via fake vulnerability exploits on GitHub

The WebRAT malware is now being distributed through GitHub repositories that claim to host proof-of-concept exploits for recently disclosed vulnerabilities.

Previously spread through pirated software and cheats for games like Roblox, Counter Strike, and Rust, WebRAT is a backdoor with info-stealing capabilities that emerged at the beginning of the year.

According to a report from Solar 4RAYS in May, WebRAT can steal credentials for Steam, Discord, and Telegram accounts, as well as cryptocurrency wallet data. It can also spy on victims through webcams and capture screenshots.

/* */