Before the modern Internet existed, there were still plenty of ways of connecting with other computer users “online”, although many of them might seem completely foreign to those of us in the modern era. One of those systems was the Bulletin Board System, or BBS, which would have been a single computer, often in someone’s home, connected to a single phone line. People accessing the BBS would log in if the line wasn’t busy, leave messages, and quickly log out since the system could only support one user at a time. While perhaps a rose-tinted view, this was a more wholesome and less angsty time than the modern algorithm-driven Internet, and it turns out these systems are making a bit of a comeback as a result.
The video by [The Retro Shack] sets up a lot of this history for context, then, towards the end, uses a modern FPGA-based recreation called the Commodore 64 Ultimate to access a BBS called The Old Net, a modern recreation of what these 80s-era BBS systems were like. This involves using a modern networking card that allows the C64 to connect to Wi-Fi access points to get online instead of an old phone modem, and then using a terminal program called CCGMS to connect to the BBS itself. Once there, users can access mail, share files, and even play a few games.
While the video is a very basic illustration of how these BBS systems worked and how to access one, it is notable in that it’s part of a trend of rejecting more modern technology and systems in favor of older ones, where the users had more control. A retro machine like a C64 or Atari is not required either; modern operating systems can access these with the right terminal program, too. A more in-depth guide to the BBS can be found here for those looking to explore, and we’ve also seen other modern BBS systems recently.
Seoul investigators say they have disrupted a secret money-transfer network that moved roughly 150 billion won—about $102 million—into and out of South Korea using a mix of mobile payment apps and cryptocurrencies.
Reports say three people have been formally accused under the country’s foreign exchange laws after a probe that traced the scheme over several years.
How Money Moved Through Apps
According to the Korea Customs Service, the group collected money from customers using platforms like WeChat Pay and Alipay, then used those funds to buy virtual coins abroad.
Those coins were shifted into digital wallets in Korea and converted to Korean won through many bank accounts.
The pattern was basic and careful. Cash or mobile transfers arrived from overseas. Crypto purchases followed in multiple countries to avoid any one regulator seeing the full trail.
Finally, the funds were funneled into local accounts under different names. This took place over a long window, from September of 2021 until June of last year, investigators say.
Covering Tracks With Everyday Costs
According to reports, the ring hid the origin of money by dressing transfers up as ordinary expenses — payments for cosmetic surgery, fees for overseas study, and trade-related charges. Those labels made the flows look normal on paper and helped the group slip past routine checks.
Bank transfers were layered with small, seemingly legitimate payments. That made suspicious activity harder to spot until customs officers pieced together patterns across accounts and platforms.
At that point, the scope became clear: these were not isolated transfers but a linked series of transactions designed to wash large sums.
What Authorities Recovered
Investigators arrested and referred three Chinese nationals for prosecution, saying the suspects handled the bulk of the scheme’s operations.
Records show almost 150 billion won was moved in the period under review. Authorities have opened cases under the foreign exchange transactions law and are seeking to trace the remaining funds.
The case underlines how easy it can be for cross-border payment tools and crypto markets to be used together.
Regulators in Korea have been tightening rules for both mobile wallets and exchanges in recent months, and courts have allowed seizures of crypto assets in criminal probes. That legal backdrop helped the customs office act when the patterns surfaced.
Featured image from Dao Insights, chart from TradingView
Snapchat Track Apps: Social media apps are some of the most used apps on smartphones and Snapchat is up there. Snapchat is especially popular among youngsters. Here, teenagers share short videos ‘snaps’, pictures and gifs. However, parents who have concerns about how their kids use their smartphones can now track their kid’s activities. Dozens of […]
Iran has been experiencing intense protests against the Islamic Republic regime in recent weeks. Authorities have responded with severe measures, including a nationwide telecoms blackout and jamming satellite services like Starlink, aimed at preventing coordination among demonstrators.
Iranians are embracing freedom tech tools; Bitchat, Noghteha, and Delta Chat for offline communication. Two of these apps trace their origins directly to Bitcoin, highlighting how technologies from this community provide practical solutions in high-stakes environments. Bitchat, built by Bitcoin pioneers Jack Dorsey and open-source developer Calle, operates over Bluetooth mesh networks and the Nostr protocol without needing an internet connection. Noghteha on the otherhand, is a closed-source fork of Bitchat, adapted for the Iranian context with full Persian/Farsi support, an enhanced user interface, and features tailored to local needs.
How Did Bitchat and Noghteha Gain Popularity?
Bitchat first gained widespread attention when Jack Dorsey announced it on X on July 6, 2025, describing it as a weekend project to explore Bluetooth mesh networks. The announcement generated immediate interest, reflected in surges on Google Trends for related searches. In September, Frank Corva wrote about Bitchat’s role in supporting Nepalese protestors during social media restrictions and unrest, where nearly 50,000 downloads occurred in a single day.
Noghteha, on the other hand, saw rapid adoption in the first week of January 2026. Before the full internet shutdown, Google Play recorded more than 70,000 downloads of Noghteha in the space of three days, with numbers likely increasing through peer-to-peer sharing, sideloading, and Bluetooth transfers afterward.
Promotion of Noghteha reached a broad audience through Iran International, an opposition satellite TV channel based outside Iran. The station, a major source of information and coordination guidance from figures like opposition leader Reza Pahlavi, broadcast details about the app.
در شرایط بحران، وقتی اینترنت قطع میشود و تماسها دیگر پاسخگو نیستند یک راه ارتباطی هنوز باقی است. «نقطهها» اپلیکیشنی برای ارتباط بدون اینترنت. pic.twitter.com/0QiDLPbRNq
The developer Nariman Gharib, a digital-political activist, released the app independently, without government or private funding, as a response to the regime’s tactics.
But Why Fork Bitchat?
The Iranian regime employs highly sophisticated information warfare tactics. As Ziya Sadr, a prominent Bitcoin researcher and former political prisoner, explains: “The regime sets up phishing attacks, creates fake download links, and uses influencers on social media to misguide people into installing malicious versions of the same app.”
This persistent threat is likely the main reason the Noghteha developer chose not to release the app as fully open-source, and perhaps it also explains the app’s release timing, just before the internet shutdown. By releasing so close to the expected blackout, there was an opportunity to distribute a new, closed-source version into as many hands as possible before the regime could interfere with downloads or seed malicious alternatives.
Noghteha remains compliant with Bitchat’s MIT license, which allows modifications and redistribution with proper attribution. This approach is an attempt to quickly protect protesters from regime sabotage.
Calle, Bitchat’s co-creator, doesn’t quite see it that way. He’s concerned about the closed-source elements, donation requests, and security risks in adversarial settings—points that are valid and hard to dispute.
warning: iranian bitchat clone raises multiple red flags:
– full clone of our code but zero attribution or credit for our work. – not open-source. the app could be spying on you without your knowledge. NEVER USE A CLOSED-SOURCE PRIVACY MESSENGER! – asks for money. bitchat is… pic.twitter.com/byLlA9Lqmo
Yet the interaction raises a worthy question: Is Bitchat cypherpunk enough to counter the regime’s potential undermining of it, where openness itself could be weaponized? In that sense, does Noghteha achieve something that Bitchat can’t, and should that be the case, can Bitchat be adapted to become more resilient against such tactics?
Ultimately, it’s inspiring to see Bitcoin gaining prominence on the international stage, alongside freedom tech tools rooted in the cypherpunk principles of privacy through cryptography. Cypherpunks and, more recently, Bitcoin developers have pioneered technologies that excel in high-stakes scenarios, empowering individuals to maintain communication and autonomy amid oppression. With many of these tools released under permissive open-source licenses like MIT, they invite cloning and repurposing to fit various needs. While closed-source adaptations introduce new risks, they also can also generate valuable lessons, potentially guiding future enhancements to better withstand information warfare tactics.
The events in Iran demonstrate how innovations from the Bitcoin ecosystem adapt and thrive, offering real support to those navigating censorship, blackouts, and repression through resilient, user-focused tools.
Editor’s Note: A Warning on Security Users should proceed with caution. Noghteha is a closed-source application. Calle, the original developer of Bitchat, has explicitly warned against using the app due to the inability to verify its code or security. However, reports from the ground indicate it is being widely and successfully used by protestors.
Have you ever worried about your private text messages being spied on? This may be because you are using a non-secure messaging app. When you use non-secure messaging apps, you may risk getting hacked or stealing your private information.
Source: pexels.com — Kevin Malik
Thankfully, there is an encrypted text messaging mobile application that you can download and use safely. With encryption, your text messages and the information you include in your texts are safe. So, here are a few recommendations on encrypted messaging apps for your interest.
Signal
One of the most popular encrypted text messaging app choices is Signal. It is a free messaging app for Android phones and iOS devices. Signal uses its end-to-end encryption protocol for voice calls and chats. With this app, you can send personal and group texts, voice calls, media, and attachments to your contacts. What is nice about Signal is that you do not need PINs or unique login credentials to access the app. Additionally, it allows you to have up to 40 participants at once in video calls.
Moreover, even when you are not on your phone, you can access your texts with a web browser. Even when you change your phone number, Signal enables you to keep your Signal account data if it is used on the same device. In addition, with the most recent update, Signal has added more user-friendly features such as customizable chat backgrounds and animated stickers.
Telegram
Another great texting app that is encrypted is Telegram. The app is available for iOS and Android, free of charge. With Telegram, you only need to link your phone number to a Telegram account. Then you can access it on your phone, browsers, or desktop app.
In addition, Telegram is not just an excellent encrypted messaging service, but it is also a worldwide social media platform. This app has substantial user groups and broadcasts that allow its users to reach millions of followers instantly. You may even have a group chat with up to 200 thousand members. However, encryption is not enabled by default for Telegram. You have to switch it on manually and use the Secret Chat Mode. In addition to this, you can even send self destructing texts and media. It is also important to note that chats with more than one person are not end-to-end encrypted.
WhatsApp
One of the most popular encrypted messaging apps, WhatsApp, is also a good choice to add to your phone. Like most apps, it is also usable on your iPhone and Androids. What is nice about WhatsApp is that it has been using end-to-end encryption on all messages since 2016, and the developers are constantly improving this feature.
In addition to the encryption, you can even send self-destructing text messages, videos, and pictures. Choose the duration that you would like the delivered item, whether it’s a message or media, will be available for the receiver to access them. For instance, you can choose to have messages disappear after 24 hours, seven days, or 90 days. To be more secure with chats, WhatsApp users can verify each chat’s 60-digit security-verification code or QR code.
Source: pexels.com — Mizuno K
Silence
For those who like SMS or MMS, here is an app that gives you more security than your standard text messaging. This open-source programme, Silence, uses the Axolotl encryption technology created by Signal and applies it to SMS sent through the phone. Like the usual SMS experience, Silence allows you to send text messages to your contacts but with the option of encrypting. In addition, this app is free for you to download, with no extra cost to use.
However, Silence is only available for Android users making it difficult for you to text your loved ones if they are using Apple devices. That being said, Silence is still an excellent option for an encrypted messaging app. Plus, this app does not need the internet to work, so if you ever find yourself with no internet, you can still send messages.
Threema
Threema mobile app is also another option for an encrypted messaging experience. It is available for both Androids and Apple devices for the price of $3.99. For this price, you get to have private chats and end-to-end encryption without needing your phone number or email.
When you start the app, it will generate a unique Threema ID key, which allows you to use the app anonymously. Despite being so, you can also make an account, making it easier for other Threema users to find you. Like other texting services, Threema also offers you voice messages, pictures and video sharing, and up to 20MB of file sharing. Plus, emojis, group messaging, and polling options are also available for users to use while texting.
The only downside is that Threema has yet to be used by most English speakers. Which makes it hard for you to text anyone on the app unless you are speaking or learning German. However, the app is still one of the best-encrypted texting mobile apps that you can get due to its robust security.
Conclusion
It is clear that there are a plethora of encrypted texting apps available for you to download. Although it is encrypted, it is also worth noting that you should always be careful and mindful of the information you write down in chats. With that said, hopefully, this list has helped you choose a suitable application for your chats. Good luck!