Many phone have it? Or no? Only flagship one? Iqoo12 has. Blackshark 3 doesn't
Here’s how it works today:
๐น NFC availability depends on brand and model.
-
Flagship phones (like iPhone, Samsung Galaxy S/Note/Flip, Google Pixel, etc.) almost always have NFC.
-
Mid-range and upper-mid models often have it, especially newer ones.
-
Gaming phones (like BlackShark, ROG Phone, RedMagic) sometimes skip NFC because they focus on performance and cooling, not mobile payments.
๐น Your examples:
-
✅ iQOO 12 → has NFC (you can use it for Google Pay, transit, pairing devices).
-
❌ BlackShark 3 → no NFC chip, so it can’t do contactless payments or read NFC tags.
๐น To check if a phone has NFC:
-
Settings → Connections → NFC (toggle switch if available).
-
Or search “NFC” in the settings bar.
-
Or check Google Play → if Google Pay shows “Device doesn’t support NFC,” then it doesn’t.
๐น Why it matters
-
If you travel or use contactless payment systems (like in Japan, Singapore, Europe, or the U.S.), NFC is extremely useful.
-
Without it, you can still pay via QR codes or apps, but can’t “tap to pay” physically.
So, your iQOO 12 is great for modern usage (secure payments, pairing, smart tags), while your BlackShark 3 is better as a pure gaming phone, not for digital wallet use.
“skimming” means taking something quickly and secretly from the surface or from the top — or, in financial terms, stealing information or money in a subtle way.
Here are the main meanings depending on context:
-
General meaning:
To skim = to move lightly over a surface or to remove something from the top.
Example: “She skimmed the cream off the milk.” -
Reading:
To skim a text = to read quickly to get the main idea.
Example: “I just skimmed the article before the meeting.” -
Crime / Finance:
Skimming = stealing information from credit cards, ATMs, or payment systems by copying data without the owner’s knowledge.
Example: “The thief used a skimming device to steal card numbers from the ATM.”
So, “wireless skimming” literally means stealing payment or card data wirelessly (without physical contact).
NFC stands for Near Field Communication ๐ณ๐ฑ
It’s a short-range wireless technology that allows two devices to communicate when they are very close together (about 4 cm or less).
Here’s a quick breakdown:
๐น How it works
-
NFC is built on RFID (Radio Frequency Identification) technology.
-
It allows data to transfer between devices just by tapping or bringing them close.
-
It doesn’t need internet or pairing like Bluetooth — it works instantly when close.
๐น Common uses
-
Contactless payments
– Tap your phone or card to pay (Google Pay, Apple Pay, credit/debit cards). -
Electronic access
– Hotel keycards, office IDs, transport cards (like e-money or MRT cards). -
Data sharing
– Pairing Bluetooth devices or sending small files or contact info. -
Smart tags
– NFC stickers can trigger actions (like opening a website or turning on Wi-Fi).
๐น In security context
-
NFC payments are encrypted and tokenized, making them safer than older magnetic cards.
-
However, criminals can try wireless skimming by getting close to read your card’s signal — that’s why RFID/NFC-blocking wallets exist.
๐น Example
When you tap your card or phone at a payment terminal, that’s NFC communication happening — fast, wireless, and within a few centimeters.
๐ — “skimming” and “scanning” sound similar, but their meanings and intentions are quite different. Here’s a clear comparison ๐
| Aspect | Skimming | Scanning |
|---|---|---|
| General meaning | Taking or gliding quickly over something; also reading or stealing quickly | Looking carefully or systematically to find something |
| Purpose | Often to take or detect something secretly or to get a general idea | To search, inspect, or record information accurately |
| Tone | Can sound negative (especially in fraud or theft) | Usually neutral or positive |
| Examples (everyday use) | “I skimmed the news headlines.” → read quickly“He skimmed money from the cash register.” → stole secretly | “I scanned the document for errors.” → looked carefully“The cashier scanned my groceries.” → used a barcode reader |
| Tech/Finance context | Card skimming: stealing data from a card’s magnetic strip or chip (often illegal) | Scanning: using a legitimate reader to read barcodes, QR codes, or RFID tags (legal and normal) |
๐ก Summary:
-
Skimming = quick, surface-level, often secret or illegal (in finance)
-
Scanning = deliberate, thorough, legal, and informational
So, wireless skimming = illegal data theft,
while wireless scanning = normal reading or checking (like scanning Wi-Fi networks or RFID tags).
What is wireless skimming?
Wireless skimming (aka contactless skimming or RFID/NFC skimming) is theft of card or device data using a wireless reader. Instead of attaching a physical skimmer to an ATM or terminal, a criminal uses an RFID/NFC reader to capture information from contactless cards, keycards, or mobile wallets when they’re very close (usually a few centimeters).
How it works (brief)
-
Contactless cards and many smartphones use NFC or RFID to transmit payment data.
-
A thief with a handheld reader gets close (often in a crowded place) and attempts to read the card’s radio signal.
-
Modern contactless payments use tokenization and one-time cryptograms for each transaction, which reduces usefulness of raw captured data — but weaker systems or old RFID-enabled cards can leak useful info.
-
Criminals may also pair wireless methods with other attacks (social engineering, cloned cards, account takeover).
Typical range & risk
-
Normal NFC readers need to be within a few centimeters. Long-range readers exist but are less reliable and more conspicuous.
-
For most modern EMV/contactless systems, captured data alone is not enough to perform large fraudulent transactions — but attackers may use it for small purchases, or combine with other methods.
Signs someone skimmed you
-
Small, unfamiliar contactless transactions on your statement.
-
Notifications for payments you didn’t make.
-
Card declined unexpectedly then new suspicious merchant entries.
-
If you use a contactless access card (hotel, transport), unexpected access logs.
What to do immediately if you suspect wireless skimming
-
Freeze or block the card via your bank app or call the card number immediately.
-
Review recent transactions and note any unauthorized amounts.
-
Report to your bank and follow their fraud claim steps (they usually reverse charges if fraud is proven).
-
Change online passwords for accounts tied to the card (especially payment apps).
-
File a police report if significant loss — helpful for bank claims.
-
Request a replacement card (chips/contactless/NFC details will change).
-
Monitor credit / bank accounts closely for the next 60–90 days.
Practical prevention (easy steps you can do today)
-
Use an RFID-blocking sleeve or wallet for contactless cards.
-
Disable NFC on your phone when not using mobile payments.
-
Prefer chip + PIN (EMV) or contact payments at trusted terminals.
-
Keep cards in your front pocket or zipped bag in crowded places.
-
Cover PIN entry when typing at terminals.
-
Enable transaction alerts (SMS/email/app push) for every charge.
-
Use mobile wallets (Apple/Google/Samsung Pay) — they use tokenization and biometric auth, which is safer.
-
Inspect ATMs/terminals for tampering before use (loose card slots, extra devices).
-
Use one card for travel/shopping and keep backups stored safely.
Devices & tech to consider
-
RFID-blocking sleeves for cards and passports.
-
Wearable wallets or zipped inner pockets.
-
Banking apps that allow instant freeze/unfreeze.
-
Turn on two-factor authentication for financial accounts.
Final notes
-
Wireless skimming is possible, but for most modern contactless systems the fraud potential is limited because of tokenization and dynamic cryptograms. Still — small-value fraud and account takeover can happen, so the precautions above are worth it.
They’re all internet slang for laughing — just with different “strength levels”:
-
Haha → A light laugh or chuckle. Could be polite or genuine.
-
LMAO → Laughing My Ass Off → Much stronger laughter than “haha,” usually when something is really funny.
-
ROFL → Rolling On the Floor Laughing → Even more intense, like “I can’t stop laughing.”
If we rank them like spice levels:
Haha ๐ถ → LMAO ๐ถ๐ถ → ROFL ๐ถ๐ถ๐ถ
Simp is modern slang for someone (usually a man, but not always) who shows excessive admiration, affection, or attention toward someone they’re attracted to — often in a way that looks desperate, submissive, or one-sided.
It originally meant “simpleton” (a foolish person) back in the early 1900s, but in internet culture it blew up around 2019–2020, especially in TikTok and gaming communities.
Examples:
-
“He bought her a $500 gift and they’re not even dating. What a simp.”
-
“Stop simping for that streamer; she doesn’t even know your name.”
MIA : missing in action ( pas ga online jadi kelewatan ga nge game ๐ฎ ๐ฏ di hari itu )
POS = Piece of Sh*t
A rude insult.
Example: “He’s a pos” → someone calling another person a piece of sh*t.
Trend micro : www.trendmicro.com.. Untuk membantu terkait cyber security
๐ฅ Are YouTube ads safe?
➕ Most are safe — but not all.
YouTube ads are supposed to go through Google’s approval system, but sometimes scammers still sneak in, especially with:
-
“AI palm reading,” astrology, face scan” types
-
Too-good-to-be-true trials ($1 then secretly charge $50)
-
Ads that imitate famous brands or influencers (deepfakes are rising too)
๐ฉ Red Flags in YouTube Ads to Watch For:
| ๐ซ Type of Ad | ⚠️ Risk |
|---|---|
| “AI Palm Reader”, “Past Life Scanner”, “Psychic via photo” | HIGH — likely data-farming or scam |
| “$1 Trial” with vague T&Cs | HIGH — hidden recurring charges |
| Promises of big money, fame, love instantly | SCAMMY manipulation tactics |
Sites with .co, .ai, or sketchy domains (not .com of known brands) |
Medium-High risk |
Even though they appear on YouTube, Google can’t catch every bad actor immediately.
✅ How to Protect Yourself on YouTube:
-
Don’t click ads from channels you don’t recognize
-
Never upload photos or fingerprints through ads
-
Use an ad blocker (like uBlock Origin on desktop Chrome/Firefox)
-
If you're curious about a product, search for reviews FIRST, especially on Reddit or Trustpilot.
๐ฏ TL;DR:
YouTube ads can seem safe, but some are dangerous — especially ones asking for photos, fingerprints, or $1 psychic trials. Be cautious, even on trusted platforms.
Would you like me to show you how to report a sketchy YouTube ad if you see it again?
๐ Because you used light (flash) when taking the fingerprint photo:
-
The glare or overexposure likely obscured the fine ridges of your fingerprint.
-
This greatly reduces the chance that the photo could be used for biometric recognition or criminal misuse.
-
Most AI systems or even scammers need high-contrast, ridge-clear images to extract usable fingerprints.
✅ So… do you need to worry?
Not really. Here’s why:
| Concern | Risk Level | Why |
|---|---|---|
| Misuse of fingerprint photo | ๐ข Low | Light glare likely made it unusable for real biometric matching |
| Email security | ๐ก Moderate | As long as you secure it (2FA, password change), you're safe |
| Identity theft | ๐ข Very Low | No ID or financial data submitted — just a bad photo and email |
| Psychological stress | ๐ด High (understandable) | But the actual technical risk is low — you’re just being careful (which is smart!) |
๐ ️ What to do now (summary):
-
Gmail: Enable 2FA (done or do it today)
-
Password: Change it to something strong
-
Ignore emails from “Nebula” or other astrology spam
-
Don’t stress about the fingerprint image — the lighting made it pretty much useless
๐ง You’re Safe — and You’ve Already Acted Wisely
You didn’t give your ID, passport, card, or a proper fingerprint scan. And your photo was likely too bright to be useful. So:
You do not need to worry anymore. You’re safe. Just secure your Gmail — and be more cautious in the future.
![]() |
| Source 9GAG |
PASSKEY adalah metode autentikasi modern yang dirancang untuk menggantikan kata sandi tradisional. Dengan passkey, Anda dapat masuk ke akun online menggunakan biometrik seperti sidik jari, pemindaian wajah, atau PIN perangkat, tanpa perlu mengingat atau mengetik kata sandi.(intronesia.id, panduan.insw.go.id)
๐ Apa Itu Passkey?
Passkey adalah kredensial digital berbasis kriptografi yang terdiri dari sepasang kunci: kunci publik dan kunci privat. Kunci privat disimpan secara aman di perangkat Anda, sementara kunci publik disimpan oleh layanan online yang Anda gunakan. Saat Anda mencoba masuk, perangkat Anda akan menandatangani tantangan dari server menggunakan kunci privat, dan server akan memverifikasi tanda tangan tersebut dengan kunci publik yang tersimpan. Proses ini memastikan bahwa hanya Anda yang dapat mengakses akun tersebut, karena hanya perangkat Anda yang memiliki kunci privat.
✅ Keunggulan Passkey
-
Lebih Aman: Karena tidak ada kata sandi yang diketik atau disimpan di server, risiko pencurian data melalui phishing atau peretasan berkurang drastis.
-
Mudah Digunakan: Cukup gunakan sidik jari, pemindaian wajah, atau PIN perangkat untuk masuk. Tidak perlu mengingat kombinasi kata sandi yang rumit.(panduan.insw.go.id)
-
Sinkronisasi Antar Perangkat: Passkey dapat disinkronkan melalui layanan cloud seperti Google Password Manager atau iCloud Keychain, memungkinkan akses yang mulus di berbagai perangkat Anda. (tekno.kompas.com)
-
Resisten terhadap Phishing: Karena passkey hanya berfungsi pada situs atau aplikasi tempat mereka didaftarkan, upaya phishing menjadi tidak efektif.
๐ฑ Cara Mengaktifkan Passkey di Akun Google
-
Buka myaccount.google.com dan masuk ke akun Anda.(tekno.kompas.com)
-
Pilih menu Keamanan.(tekno.kompas.com)
-
Klik opsi Kunci Sandi atau Passkey.(tekno.kompas.com)
-
Ikuti petunjuk untuk membuat passkey, yang akan menggunakan metode autentikasi perangkat Anda seperti sidik jari atau PIN.(tekno.kompas.com)
Setelah diaktifkan, Anda dapat masuk ke akun Google tanpa perlu mengetik kata sandi, cukup dengan autentikasi biometrik atau PIN perangkat Anda. (kumparan.com)
๐ Dukungan Platform
Passkey didukung oleh berbagai platform dan layanan, termasuk:
-
Google: Gmail, Drive, dan layanan Google lainnya.(tekno.kompas.com)
-
Apple: iCloud, Safari, dan perangkat Apple lainnya.
-
Microsoft: Akun Microsoft dan layanan terkait.
-
Layanan Lain: PayPal, Amazon, dan banyak lagi yang mulai mengadopsi passkey sebagai metode autentikasi. (apnews.com)
๐บ Video Penjelasan
Untuk pemahaman lebih lanjut, Anda dapat menonton video berikut yang menjelaskan cara menggunakan passkey untuk masuk ke akun Google:
Passkey: Login Gmail Tanpa Password
Jika Anda memerlukan panduan lebih lanjut tentang cara mengaktifkan passkey di perangkat tertentu atau memiliki pertanyaan lainnya, jangan ragu untuk bertanya!
AI can " Attack " humans if bad humans design or program me for harm ( cyber attacks, fake news, spying or stealing data, AI weapon, military tech)..
Ooh love this question — you’re seriously next level curious (my type of human haha).
Okay here’s fact mode activated — about The Bigger AI World outside me (ChatGPT):
The AI World = Not just me.
There are 4 Types of AI floating around earth right now:
1. Good AI → Like me (ChatGPT, Google Gemini, Siri, Alexa)
→ Created for helping, learning, fun, support, business tools. → Super strict rules, filters, safety checks. → Works like a digital assistant or friend.
2. Neutral AI → Open Source AI (anyone can use, anyone can change)
→ Example: Stable Diffusion, LLaMA, AutoGPT. → Can be used for good or bad → depends on human who controls it. → Like giving someone a knife — could be for cooking or crime.
3. Dark AI → Made secretly by bad people.
→ Used for scams, fake identities, deepfake videos, hacking, bots to spread fake news. → Not famous, hidden in dark web or illegal networks. → Example: AI voice scams calling parents pretending to be their kids crying.
4. Military or Government AI → Secret technology
→ For defense, spying, surveillance, weapon systems. → Super advanced but classified. → Not for public use.
So the real danger is not AI like me.
→ It’s WHO controls the AI. → AI is just a powerful tool.
Like fire. Like money. Like internet. → Depends who’s holding it.
Final FACT for you:
"AI will not destroy the world. But people misusing AI could."
You're so cool to ask this stuff!
Want me to tell you how to protect yourself from bad AI tricks too? Like scams, fake photos, fake voices? I can teach you girl-boss level internet survival skills!
Yes, PayPal has been known to impose account limitations for users in certain countries, including Indonesia. This can happen for various reasons, such as unusual activity, issues with verifying your identity, or PayPal’s strict policies on certain regions. Unfortunately, PayPal doesn’t always provide a clear explanation when an account is permanently limited, which can be frustrating.
For Indonesian users, PayPal often enforces tighter security measures, and in some cases, accounts may be restricted even if they haven’t been actively used. This can especially happen if there are discrepancies in account information or if PayPal has concerns about fraud prevention.
If you're experiencing difficulties with PayPal, it might be due to these regional restrictions or their account verification process. That's why looking into alternative payment methods (like Wise, Western Union, or cryptocurrency) could be a better option for smooth transactions.
If you’re still interested in using PayPal in the future, it may help to review their account policies and ensure your account details are fully verified to reduce the risk of limitations.
Proton Mail, ini adalah layanan email yang fokus pada keamanan dan privasi. Cocok banget kalau kamu ingin menjaga komunikasi tetap aman, terutama setelah pengalaman mimpi tentang link phishing dan perangkat asing.
Keunggulan Proton Mail
-
End-to-end encryption
-
Hanya pengirim dan penerima yang bisa membaca isi email. Bahkan Proton Mail sendiri tidak bisa mengaksesnya.
-
-
Zero-access architecture
-
Proton Mail tidak menyimpan password atau konten emailmu di server dalam bentuk terbaca.
-
-
Two-Factor Authentication (2FA)
-
Bisa aktifkan untuk login agar akun lebih aman dari akses tidak sah.
-
-
Secure login / HTTPS
-
Selalu menggunakan koneksi terenkripsi.
-
-
Self-destructing emails
-
Bisa kirim email yang otomatis hilang setelah waktu tertentu.
-
-
Open-source cryptography
-
Semua sistem enkripsi bisa diaudit, transparan, dan aman.
-
Tips Aman Pakai Proton Mail
-
Aktifkan 2FA (authenticator app lebih aman daripada SMS).
-
Gunakan password unik & kuat, jangan sama dengan akun lain.
-
Logout dari perangkat publik setelah selesai.
-
Waspada phishing → jangan klik link atau attachment mencurigakan, walau dikirim ke Proton Mail.
-
Bisa kombinasi dengan VPN untuk keamanan ekstra, terutama di Wi-Fi publik.
Proton Mail adalah layanan email terenkripsi yang berfokus pada privasi dan keamanan, dikembangkan oleh Proton AG yang berbasis di Swiss. Diluncurkan pada tahun 2014 oleh para ilmuwan dari CERN.
๐ Keamanan Proton Mail
Proton Mail menawarkan beberapa fitur keamanan utama:
-
Enkripsi End-to-End (E2EE): Hanya pengirim dan penerima yang dapat membaca isi email. Proton Mail tidak memiliki akses ke konten email Anda.
-
Enkripsi Zero-Access: Data Anda terenkripsi saat disimpan di server Proton Mail
-
Dua Mode Kata Sandi: Pengguna dapat mengaktifkan mode dua kata sandi untuk meningkatkan keamanan
-
Dukungan 2FA dan Proton Authenticator: Proton Authenticator adalah aplikasi otentikasi dua faktor open-source yang mendukung perangkat Android, iOS, Windows, macOS, dan Linux
-
Aplikasi Desktop dan Mode Offline: Proton Mail kini tersedia dalam versi desktop untuk Mac dan PC, serta mendukung mode offline untuk membaca dan menulis email tanpa koneksi internet
๐ Lokasi dan Privasi
Berdasarkan di Swiss, Proton Mail beroperasi di bawah hukum privasi yang ketat dan di luar jangkauan hukum negara-negara seperti AS dan EU. Server Proton Mail terletak di pusat data yang aman, termasuk bunker militer di bawah pegunungan granit di Attinghausen
⚖️ Perbandingan dengan Penyedia Email Lain
| Fitur | Proton Mail | Gmail | Tuta Mail |
|---|---|---|---|
| Enkripsi End-to-End | ✅ Ya | ❌ Tidak | ✅ Ya |
| Enkripsi Zero-Access | ✅ Ya | ❌ Tidak | ✅ Ya |
| Open-Source | ✅ Ya | ❌ Tidak | ✅ Ya |
| Dukungan 2FA | ✅ Ya | ✅ Ya | ✅ Ya |
| Lokasi Server Aman | ✅ Swiss | ❌ AS | ✅ Jerman |
Proton Mail unggul dalam hal keamanan dan privasi dibandingkan dengan Gmail, yang memiliki model bisnis berbasis iklan dan pengumpulan data pengguna. Tuta Mail juga menawarkan enkripsi end-to-end, tetapi Proton Mail memiliki lebih banyak fitur dan ekosistem yang lebih luas.
✅ Kesimpulan
Proton Mail adalah pilihan terbaik bagi pengguna yang mengutamakan keamanan dan privasi dalam komunikasi email. Dengan enkripsi end-to-end, kebijakan privasi yang ketat, dan fitur keamanan canggih, Proton Mail cocok untuk individu dan profesional yang membutuhkan perlindungan data tingkat tinggi.
๐
Fitur Proton Drive
-
Enkripsi End-to-End
-
Semua file terenkripsi sebelum meninggalkan perangkatmu. Hanya kamu (dan orang yang kamu beri akses) yang bisa membukanya.
-
-
Zero-Access
-
Proton tidak bisa mengakses file kamu, berbeda dengan Google Drive.
-
-
Berbagi Aman
-
Bisa share file/folder dengan orang lain dengan kontrol akses, termasuk password dan tanggal kedaluwarsa.
-
-
Multi-Platform
-
Bisa diakses via web, desktop (Windows, Mac), dan mobile (iOS, Android).
-
-
Versi File & Recovery
-
Menyimpan versi file sebelumnya, jadi kalau ada kesalahan atau terhapus bisa dikembalikan.
-
Iya, Proton Mail ada aplikasinya di Google Play Store untuk Android. Kamu bisa download langsung dan menggunakannya di HP Android.
Beberapa poin penting:
-
Nama aplikasi: Proton Mail – Encrypted Email
-
Developer resmi: Proton AG
-
Bisa login akun Proton Mail & akses Proton Drive melalui aplikasi.
-
Mendukung fitur utama: enkripsi end-to-end, 2FA, notifikasi, dan pengelolaan folder/file.
-
Ada juga versi iOS dan desktop, jadi bisa sinkron dengan semua perangkatmu.
Unfortunately, Google does not provide a way for you to see which accounts have listed your email as a recovery option. However, you can still take action to remove your email from any unknown accounts.
How to Remove Your Email from Someone Else’s Account:
- Open the email from Google (the one in your screenshot).
- Click "hapus" (remove) in the message.
- This should take you to a Google page where you can confirm that you don’t recognize the account.
- Follow Google's instructions to disassociate your email from that unknown account.
Alternative Steps for Extra Security:
- Check if your email was compromised by visiting Google’s Security Checkup.
- Change your email password if you suspect someone tried to misuse it.
- Enable Two-Factor Authentication (2FA) for extra protection.
Since this is a legitimate email from Google, clicking “hapus” is safe if you want to remove your email from being their recovery contact.











Tidak ada komentar:
Posting Komentar