Reading view

There are new articles available, click to refresh the page.

Consistency Is Not Discipline — It’s Identity

Consistency Is Not Discipline — It’s Identity

“You should never move your stop loss.”

This is one of the most famous statements any trader will come across in their career, whether a newbie or an experienced trader.

My setup was solid. I was calm, composed (at least I thought I was), and knew what was expected of me. Executed my entry to perfection. I even took a screenshot to brag to my future self about how “perfect trades” get executed.

Little did I know, my trade had just begun. The price oscillated for hours around my breakeven level. I could feel the heaviness building up in my jaw with every price point move against my position.

There was no major news this day, so the price inched lower and lower, slowly heading towards my stop loss. “This is not fair. Why me?” I remember asking. “But hey… I am an experienced trader. I can beat the market. If only I could move my stop — and let this trade breathe a little. Only this once!

Once became twice, then three times, and then four times. By the time I snapped out of it, I was negative 30% down on my account balance. That’s when I realized that I just met the Guy who trades my account.

Why that story matters

That story isn’t about mistakes. It’s about identity exposure. Every trader has moments where the market removes excuses and leaves only one question:

“Who are you when execution actually costs something?”

Week 7 is about answering that honestly. Not with discipline. With identity.

The lie traders believe about consistency

Most traders believe consistency comes from:

  • More discipline
  • More motivation
  • More effort

That belief keeps them trapped. Because discipline is conditional.
Identity is not.

You don’t become consistent by trying harder. You become consistent when inconsistency becomes psychologically expensive. Until then, discipline will always fail on schedule.

Why discipline always breaks (and always will)

Discipline depends on variables the market is designed to attack:

  • Mood
  • Energy
  • Confidence
  • Recent results

When any of these shift, discipline collapses.

That’s why traders can look “disciplined” for:

  • A good week
  • A winning streak
  • A funded challenge phase

…and then implode.

Not because they’re lazy. Because discipline was never the controlling force. Identity was.

The identity gap that ruins traders

Here’s the uncomfortable truth:

Most traders act like traders, but identify as gamblers trying to improve.

So under pressure:

  • Gamblers seek relief
  • Traders seek execution

Your actions will always obey your identity — not your goals.

If you still need:

  • A win to feel “back on track”
  • Confirmation to feel confident
  • Market approval to stay calm
You already know which identity is in control.

How professionals actually think about consistency

Pro traders don’t ask:

“How do I stay disciplined here?”

They ask:

“What does someone like me do in this situation?”

That question removes:

  • Debate
  • Emotional negotiation
  • On-the-spot rationalization

Consistency stops being forced. It becomes self-aligned behavior. This is not mindset. It’s identity enforcement.

The three identity anchors of consistent traders

These are not traits. They are standards with consequences.

1. Outcome detachment

Consistent traders do not need this trade to work.

They measure success by:

  • Rule adherence
  • Quality of execution
  • Emotional neutrality

If your self-worth moves with P&L, consistency is impossible.

Pro traders understand this rule clearly:

A profitable trade with broken rules is logged as a loss.

If rules are violated:

  • Size is reduced
  • Or trading stops

No exceptions. No emotional accounting.

2. Process loyalty

Inconsistency begins the moment you say “just this once.” Pro traders do not violate rules to win.

They understand something amateurs don’t:

Rule violation is the real loss.

Winning while breaking rules trains the wrong identity. So they enforce this standard:

  • Rules are followed even when uncomfortable
  • Especially when uncomfortable

If you can’t follow your process on bad days, you don’t own a process — it owns you.

3. Self-trust

Consistency is impossible without self-trust.

And self-trust is not confidence.
It is evidence accumulated over time.

It’s built by:

  • Keeping promises to yourself
  • Executing without emotional justification
  • Stopping after mistakes instead of chasing recovery

No evidence = no trust. No matter how good today feels.

Why most traders sabotage consistency

Because consistency is boring.

No adrenaline.
No hero moments.
No dramatic recoveries.

Just:

  • Repetition
  • Restraint
  • Silence

Most traders don’t fail from a lack of skill. They fail because their ego needs stimulation. Boredom is the price of staying in the game. Most traders won’t pay it.

Consistency as a competitive advantage

Markets are noisy.
Participants are emotional.
Information is abundant.

Consistency is rare. And rarity creates edge. Not because it’s complex, but because it’s uncomfortable to maintain. If you can do what others won’t sustain, you don’t need to outsmart them.

You just outlast them.

Where this fits in the Roadmap

  • Weeks 1–2: Awareness & mindset
  • Weeks 3–4: Structure & analysis
  • Weeks 5–6: Execution under pressure
  • Week 7: Identity

This is where the roadmap stops being theory and starts becoming behavior. If identity doesn’t change here, nothing downstream holds.

Final standard (read this carefully)

You don’t become consistent by forcing discipline.

You ONLY become consistent when:

  • Your identity demands it
  • Your standards enforce it
  • Your behavior aligns without debate

Consistency is not something you do. It’s who you are when no one is watching.

And if your behavior changes when no one is watching, your identity hasn’t changed.


Consistency Is Not Discipline — It’s Identity was originally published in Coinmonks on Medium, where people are continuing the conversation by highlighting and responding to this story.

The Next Security Battleground: Agentic Identity

Shahar Tal, CEO and co-founder of Cyata, discusses how the company is building the control plane for agentic identity. With deep roots in Israel’s Unit 8200 and Check Point, Cyata is tackling one of the next big security challenges: governing, securing and managing identities in an agent-driven AI world. Tal argues that organizations have spent..

The post The Next Security Battleground: Agentic Identity appeared first on Security Boulevard.

How agencies can ensure trust and transparency in digital identity

From the airport to the DMV, government employees are required to provide efficient and accurate services while also verifying identities at several touchpoints with the public. Despite this need, many agencies still rely on physical identification materials, such as driver’s licenses, passports and Social Security cards. As the demand for faster, modernized services grows, this outdated approach limits agencies’ ability to keep pace with mission demands.

However, since the implementation of smartphones and a federal push toward customer experience, agencies are adopting digital identity and biometrics solutions through initiatives like the General Service Administration’s Login.gov, and the Department of Homeland Security and Transportation Security Administration’s REAL ID.

A digital ID is a collection of data that represents an individual or entity in the digital world, often including information like usernames, passwords and personal details. Used for authentication and access control in various online services and systems, a digital ID serves as identity in the palm of a user’s hand. Through initiatives like Login.gov, users have just one account to log in to several federal websites, requiring them to remember fewer passwords, streamlining data integrity, and improving mission efficiency.

Biometrics and digital identity technology utilize unique biological traits, such as fingerprints, facial features and iris patterns, to verify who a person claims to be. By linking a physical identifier to digital credentials, there’s an additional level of assurance and security that traditional identity tools can’t compete with.

However, for biometric technology adoption to be successful, federal agencies must align standards for compliance and interoperability while also focusing on building and maintaining public trust.

Compliance and transparency 

As digital identity solutions are adopted, standards that govern the use and transparency of biometric data are not optional add-ons — they’re necessary at a foundational level.

Biometric security standards like the National Institute of Standards and Technology’s SP 800-63-4 Digital Identity Guidelines, ISO/IEC 19795 Series, GSA’s FICAM approach and the FIDO Alliance define how data should be collected, stored and secured to improve and maintain accuracy and privacy.

Integrating security and privacy into all identity tools and solutions is equally as vital as standards compliance. Building security and privacy into systems from the beginning helps improve public trust and prevents costly redesigns or necessary additions after vulnerabilities appear. By creating a network of solutions that prioritize security- and privacy-by-design principles, agencies ensure that protections are integrated into every stage of the biometric lifecycle.

Despite these opportunities for increased security, efficiency and progress, much of the public has doubts about data collection, bias and privacy, creating barriers to implementation and adoption. For this reason, transparency is critical to building and maintaining public trust.

Federal agencies must clearly communicate the parameters of biometric technology use, including how biometric data is collected, stored and accessed. Establishing offices like DHS’ Office of Biometric Identity Management provides a centralized point for disseminating pertinent information, like new policies and procedures, or addressing questions about biometric data use and where the public might encounter the technology.

Another opportunity to increase transparency is mandating third-party audits and compliance reporting that align with approved, existing frameworks, like NIST’s Digital Identity Guidelines, to measure compliance.

The digital security landscape is constantly evolving, so federal agencies must prioritize transparency through continuous testing to gain public trust through demonstrated compliance, accuracy and responsible use.

Digital identity is transforming the way governments deliver public services. But technology can’t drive progress alone. Trust is critical for success.

Complying with recognized security standards and improving data transparency lay the groundwork for a thriving digital identity ecosystem in federal government, but its continued success relies on cross-agency and industry collaboration and third-party validation. When combined, these actions will transform operations, creating a unified and secure digital ID future.

Jesús Aragón is the CEO and cofounder of Identy.io.

The post How agencies can ensure trust and transparency in digital identity first appeared on Federal News Network.

© Getty Images/iStockphoto/ArtemisDiana

Multi-Factor Authentication Concept - MFA - Screen with Authentication Factors Surrounded by Digital Access and Identity Elements - Cybersecurity Solutions - 3D Illustration

Expert Edition: How to build cyber resilience for the quantum era

By: wfedstaff

Cyberthreats aren’t slowing down. Federal agencies face a pivotal moment: How can they modernize fast enough to stay ahead of adversaries while managing legacy systems, tight budgets and workforce challenges?

Our new e-book dives into the strategies shaping the next era of cybersecurity and shared on Day 2 of our Cyber Leaders Exchange 2025, presented by Carahsoft and Palo Alto Networks. From preparing for quantum computing risks to implementing zero trust, securing DNS and building AI expertise, these insights from federal and industry innovators will help chart a path forward.

Featured voices include:

  • Kelvin Brewer, director of public sector sales engineering, Ping Identity
  • Garfield Jones, associate chief of strategic technology, CISA
  • Bill Newhouse, cybersecurity engineer, National Cybersecurity Center of Excellence, NIST
  • Christopher Paul, U.S. Marine Corps chair for information, Naval Postgraduate School
  • Egon Rinderer, senior vice president, federal and enterprise growth, NinjaOne
  • Jim Smid, principal architect for DoD and the IC, Palo Alto Networks
  • Chris Usserman, chief technologist for public sector, Infoblox
  • Merrick Watchorn, chief cyber, quantum and cognitive information services architect, Air Force

As Brian O’Donnell of Carahsoft said, “Cybersecurity remains a top priority for CIOs and senior leaders across every sector. It’s not just a technical concern — it’s a strategic imperative.”

Don’t wait for tomorrow’s threats to become today’s crisis. Download the full e-book now and discover how agencies are turning complexity into resilience.

The post Expert Edition: How to build cyber resilience for the quantum era first appeared on Federal News Network.

© Federal News Network

Cyber Leaders day 2 ebook

German Authorities Shut Down 47 Crypto Exchange Services in Cybercrime Crackdown

German Authorities Shut Down 47 Crypto Exchange Services in Cybercrime CrackdownGerman authorities have dismantled 47 exchange services involved in facilitating anonymous crypto transactions for criminal activities. These platforms bypassed anti-money laundering protocols, enabling cybercriminals to exchange digital currencies without identity verification. The takedown follows a series of other operations targeting major cybercrime networks. With seized user and transaction data, authorities are set to pursue further […]

How to Protect Your Digital Identity

By: Amy Bunn

People under 60 are losing it online. And by it, I mean money, due to digital identity theft.

In its simplest form, your digital identity consists of a set of attributes that can be traced back to you and your identity. That can range from photos you post online to online shopping accounts, email accounts, telephone numbers, bank accounts, and your tax ID.

In this way, your digital identity is like dozens upon dozens of puzzle pieces made up of different accounts, ID numbers, and so forth. When put together, they create a picture of you. And that’s why those little puzzle pieces of your identity are such attractive targets for hackers. If they get the right combination of them, you can end up a victim of theft or fraud.

In this article, we’ll look into the kinds of information that include your digital identity, tactics to protect you from identity theft, signs that your identity has been stolen, and the steps to take to reclaim your identity.

What is digital identity?

Your digital identity is much more comprehensive than a simple username or password. Think of it as your complete digital existence, a unique combination of your information, behaviors, and digital traces that collectively represent who you are online. Unlike a single account that you create for one website, your digital identity encompasses every piece of data connected to you across the entire digital landscape.

Information that comprises your digital identity

  • Personal identifiers: The foundation of your digital identity includes personal data such as your full name, address, phone numbers, Social Security number, and date of birth. These are the pieces hackers need to impersonate you for financial gain, making you a prime target for identity theft.
  • Digital identifiers: Your usernames, email addresses, and social media handles create your online presence. These identifiers link your various accounts together, so when one gets breached, criminals can often trace their way to your other accounts.
  • Authentication factors: Your passwords, security questions, passkeys, and multi-factor authentication (MFA) settings are the locks that protect your digital doors. When these are weak or reused across multiple accounts, you’re essentially giving criminals a universal key to your digital life.
  • Device and network data: Your computer’s IP address, device fingerprints, browser settings, and network connections help legitimate services recognize you, but they also help criminals track your movements online and potentially hijack your sessions or attack you. Your phone’s unique device ID and browser’s specific settings and installed plugins also contribute to your digital identity.
  • Behavioral signals: Beyond personal data, your digital identity extends to your behavioral patterns, such as the websites you visit, shopping and banking habits, the times you’re typically online, and even how you type or move your mouse. Each day you access healthcare portals or interact with government services online, you add data that creates a picture of who you are.
  • Biometric information: Your facial recognition data and fingerprints also create a unique digital signature. While these enhance your security when used properly, they also represent permanent identifiers that can’t be changed if compromised. 
  • Linked accounts and services: Your banking, shopping, healthcare, and government service accounts all connect to your core identity. Each account holds pieces of your identity that criminals can exploit. The more accounts you have, the more entry points exist for potential breaches.

The more aware you are of what makes up your digital identity, the better equipped you’ll be to keep those puzzle pieces secure and out of the wrong hands.

Applications of digital identity

Your digital identity is constantly at work in ways you don’t notice. Every time you log in to your bank, check your medical records, book a flight, or shop online, your digital identity verifies who you are and grants access to the services you need. With that convenience comes responsibility: the more places your identity appears, the more important it becomes to protect it.

  • Banking and fintech: Your digital identity enables instant transfers, mobile check deposits, and personalized financial insights. While you gain convenience and speed, you’re sharing sensitive financial data and behavioral patterns online.
  • Healthcare portals: Patient portals use your digital identity to provide secure access to medical records, prescription refills, and telehealth appointments. You benefit from coordinated care and easy access to your health information, but medical data breaches can have lasting consequences. 
  • Government services: Digital identity streamlines tax filing, driver’s license renewals, and benefit applications through secure government portals. You save time and reduce paperwork, but government databases are high-value targets for cybercriminals.
  • Travel and transportation: Your digital identity powers everything from Transportation Security Administration (TSA) PreCheck to mobile boarding passes and hotel check-ins. This creates seamless travel experiences and reduces wait times, but travel data reveals your location patterns and personal habits.
  • E-commerce and shopping: Online retailers use your digital identity to offer one-click purchasing, personalized recommendations, and targeted promotions. You get convenience and a tailored shopping experience, but companies collect extensive data on your preferences and spending habits.
  • Social media and messaging platforms: Social networks leverage your digital identity to connect you with friends, share content, and build communities around shared interests. However, these platforms collect comprehensive data about your personal life and relationships.

People under 60 are major targets for fraud

Here’s what’s happening: People under 60 were twice as likely to report losing money to online scams, and more than four times more likely to report losing money to an investment scam, and the majority of those losses happened in scams involving some form of cryptocurrency investments.

It’s no surprise that younger adults get targeted this way. They’re far more likely than any other age group to use mobile apps for peer-to-peer payments, transferring money between accounts, depositing checks, and paying bills. In short, there’s a lot of money flowing through the palms of their hands thanks to their phones, as well as their computers.

Protecting yourself from hackers and fraud means safeguarding your digital identity. And that can feel like a significant task, given all the information your digital identity contains. It can be done, though, especially if you think about your identity like a puzzle. A piece here, another piece there, can complete the picture (or complete it just enough) to give a hacker what they need to separate you from your money. Thus, the way to stay safe is to keep those puzzle pieces out of other people’s hands.

Signs your identity has been stolen

As I mentioned, the quickest way to understand what’s happening with your identity is to check your credit report. Identity theft goes beyond money. Crooks will steal identities to rent apartments, access medical services, and even get jobs. Things like that can show up on a credit report, such as when an unknown address shows up in a list of your current and former residences or when a company you’ve never worked for shows up as an employer. If you spot anything strange, track it down right away. Many businesses have fraud departments with procedures in place that can help you clear your name if you find a charge or service wrongfully billed under your name.

Other signs are far more obvious. You may find collection agencies calling or even see tax notices appearing in your mailbox (yikes). Clearly, cases like those are telltale signs that something is really wrong. In that case, report it right away:

Likewise, many nations offer similar government services. A quick search will point you in the right direction.

Another step you can take is to ask each credit bureau to freeze your credit, which prevents crooks from using your personal information to open new lines of credit or accounts in your name. Fraud alerts offer another line of protection for you as well.

Ways to protect your digital identity from hackers and fraud

It’s actually not that tough. With a few new habits and a couple of apps to help you out, you can protect yourself from the headaches and flat-out pain of fraud. Here’s a list of straightforward things that you can get started on right away:

1. Start with the basics: security software

Protect yourself by protecting your stuff. Installing and using security software on your computers and phones can help prevent a range of attacks and keep you safer while you surf, bank, and shop online. I should emphasize it again: protect your phone. Only about half of people protect their phones even though they use them to hail rides, order food, send money to friends, and more. Going unprotected on your phone means you’re sending all that money on the internet in a way that’s far, far less safe than if you use online protection.

2. Create strong passwords

You hear this one all the time, and for good reason: strong, unique passwords offer one of your best defenses against hackers. Never reuse them (or slight alterations of them) across the different platforms and services you use. Don’t forget to update them regularly (at least every 60 days)! While that sounds like a lot of work, a password manager can keep on top of it all for you. If your platform or service supports two-factor authentication, enable it. It’s an additional layer of security that makes hacking more difficult for cybercriminals.

3. Keep up to date with your updates

Updates pop up on our phones and computers nearly every day. Resist the urge to put them off until later. In addition to improvements, updates often include important security fixes. So, when you receive an alert on your device, update the operating system or app. Think of it as adding another line of defense against hackers who are looking to exploit old flaws in your apps.

4. Think twice when you share

Social media is a common channel for hackers to harvest personal information because people sometimes share more than they should. With info like your birthday, the name of your first school, your mother’s maiden name, or even the make of your first car, they can answer common security questions that could hack into your accounts. Crank up the privacy settings on your accounts so only friends and family can see your posts—and realize the best defense here is not to post any potentially sensitive info in the first place. Also, steer clear of those “quizzes” that sometimes pop up in your social feeds. Those are other ways that hackers try to gain bits of info that can put your identity at risk.

5. Shred it

Even though so many of us have gone paperless with our bills, identity theft by digging through the trash or “dumpster diving” is still a thing. Items such as medical bills, tax documents, and checks may still arrive in your mailbox. You’ll want to dispose of them properly when you’re through with them.

First, invest in a paper shredder. Once you’ve deposited the check or paid the odd bill online, shred it so that any personal or account information on it can’t be read (and can be recycled securely).

Second, if you’re out of town for a bit, have a friend collect your mail or have the post office place a temporary hold on it. That’ll prevent thieves from lifting personal info right from your mailbox while you’re away.

6. Check your credit

Even if you don’t think there’s a problem, go ahead and check your credit. The issue is that someone could be charging expenses to your name without you even knowing it. Depending on where you live, different credit reporting agencies keep tabs on people’s credit. In the U.S., the big ones are Equifax, Experian, and TransUnion.

Also in the U.S., the Fair Credit Reporting Act requires these agencies to provide you with a free credit check at least once every 12 months. Canada, the UK, and other nations likewise offer ways to get a free credit report. Review your options; you may be surprised by what you find.

7. Audit your public profiles

Do an inventory of your online presence by searching for your name, email addresses, and phone numbers across major search engines and social platforms. Review what information appears publicly on your social media accounts, professional profiles, and any other online accounts. This is your chance to remove the information that’s not relevant to the account. The FTC recommends conducting these searches regularly to understand what personal information is visible to others online.

8. Remove old and unused accounts

Web technology changes so fast that some websites become outdated. If you have accounts on any such website, delete them, especially on platforms that may have obsolete security measures. This reduces the number of places where your personal information could be compromised. If you can’t remember all your accounts, check your email for old account creation confirmations. There might also be tools that identify forgotten accounts across various services.

9. Opt out of data brokers

Data brokers collect and sell your personal information to advertisers and other companies. You can opt out of major data brokers like Acxiom, LexisNexis, and Spokeo by visiting their websites and following their opt-out procedures. The FTC provides guidance on how consumers can limit data-broker activities, though this process requires ongoing effort as new brokers emerge.

10. Monitor data exposures

Set up Google Alerts for your name and other personal information to track when your data appears online. Consider using identity monitoring services that alert you to potential data breaches involving your information. Regularly check your credit reports and bank statements for unusual activity, as these can be early indicators that your digital footprint has been compromised.

Taking control of your digital footprint requires ongoing attention, but these steps significantly reduce your exposure to identity theft and online privacy violations. Start with the actions that feel most manageable, then gradually work through the complete checklist to build stronger protection for your online presence.

Final thoughts

Protecting your digital identity is an ongoing commitment that requires constant vigilance and smart habits. By regularly monitoring your credit reports, using strong authentication methods, maintaining your privacy on social media, keeping your software up to date, and responding promptly to any suspicious activity, you’re building a robust defense against identity theft. With consistency, these protective measures will become your second nature over time. 

Safeguarding your identity becomes even easier with the right tools. Consider exploring comprehensive digital identity protection services that monitor your personal information across multiple platforms and alert you to potential threats in real time. With the combination of vigilant habits and reliable protection tools, you can confidently continue with your digital activities knowing your identity is secure.

The post How to Protect Your Digital Identity appeared first on McAfee Blog.

Darknet bunker plot thickens: ties to right-wing dissidents and WikiLeaks

By: Skyler

The German Public Prosecution Service confirmed that a bunker functioning as an illegal cyber center had ties to a right-wing dissident movement and possibly to WikiLeaks. These revelations came to light when the main suspect – Herman Johan Verwoert-Derksen (60), also known as ‘Johan X.’ – reacted to his criminal case for the first time.

According to German media, the employees of the cyber center saw the hosting of servers for dissident groups as a lucrative endeavor. One group is specifically mentioned: Generation Identity. That right-wing movement has chapters in several European countries, such as France, Germany, Austria, and the United Kingdom.

Through encrypted messages, an employee of the bunker communicated with a member of Generation Identity. For just thirty euros a month, the cyber bunker would host a cloud server for the group. A very competitive price because other tenants paid hundreds of euros a month for the same service. That may indicate that the employees of the bunker had some degree of sympathy for the ideology of Generation Identity.

@NATO is not involve in this affair, but let's just say it's ironic… #Darknet #cybercrime servers hosted in former NATO #bunker in #Germanyhttps://t.co/sTjdpKxqAA #infosec #cyebrsecurity #darkweb @infosecsw pic.twitter.com/pMldc7zBf2

— Steve Waterhouse (@Water_Steve) September 29, 2019

The cyber bunker offered a host of IT services, without requiring contracts or personal details. Furthermore, the bunker hosted many websites on the dark web involved in the distribution of drugs, weapons, and even child pornography. The center was also connected to dark web markets such as Wall Street Market, Cannabis Road, and Flugsvamp 2.0. Moreover, massive cyber attacks were conducted from the bunker, sometimes targeting a million routers at the same time.

In 2013, Johan X. – the head of the organization – bought the former NATO bunker located in Traben-Trarbach, a town in Western Germany. In secret, he converted the former bunker into an underground data center. In addition to the main suspect, the police arrested twelve other men, all German and Dutch nationals. They claim to provide a high degree of privacy and thus do not know illegal content was hosted on their servers.

In 2002, Johan X. was involved in a similar case, running a data center in the South West of the Netherlands. His customers were mostly legal pornographers. The police also discovered an ecstasy laboratory in the same building, although he was never convicted in that case.

📷 architectureofdoom: Former Cold War bunker turned into a dark web cyberbunker, Traben-Trarbach, Germany https://t.co/1h5fKSiGO6

— Tim Munn (H) (@amish_man) May 8, 2020

Johan X. claims to be a victim of political persecution. He believes the German authorities only showed interest because his data center hosted the servers of WikiLeaks. The public prosecutor denies those allegations, stating that investigators did not found any server belonging to WikiLeaks. Furthermore, WikiLeaks is not even mentioned in the indictment.

Regardless of the outcome, (former) employees of Johan X. are already making plans for a new data center. Several countries showed interest, including Bahrain, Moldova, Zimbabwe, and Vietnam.

The post Darknet bunker plot thickens: ties to right-wing dissidents and WikiLeaks appeared first on Rana News.

❌