Dear Sabila Aprilia, I'm not sure if this is your official email, History is created by Smartphones or Technology not to treat you as a special person, if you've previously connected to Tokopedia, there are sensitive leaks that you may not be aware of or you know about namely Duplicate Identity and Transaction History (if you ever feel like you have made a transaction) This duplicate is whenever a hacker can trade your data, your photos, your videos and precise location. To prevent this from happening, Enable like Don't Save Activities on Developer Options but for Iphone because it's Close Source, aka you don't really have 100% control over the Smartphone you buy because your privacy is controlled by the majority of Apple Vendors, If you have never registered your account with Tokopedia, please ignore this email, I will only forward this email in the Cypherpunks mailing list with the aim of activating the contents of the mailing list that originally stopped, Apart from the leak, I will just tell you that I am almost finished with the Software that can be installed by several Devices or Brands including Apple, namely Midliner Vault: A Peer-to-Peer of Decentralized or in short we will get the Internet or Network without the side effects of Centralization, you can read the abstract, Midliner Vault Person: A Peer-to-Peer Decentralized System ABSTRACT: I am nearly finished packaging a download-ready privacy tool. If a gadget you just bought contains lithography-level components controlled by a third party, then your privacy is not truly yours. I propose a Midliner composition applied to a hash that causes a wordlist to adapt to how balanced each bit of your data is. An IP cannot be replicated because of the SHA-256 constants Ki + Wi that will be implemented as continuing references. For additional security, users should purchase physical cryptographic/security devices such as YubiKey or Quside (Entropy Core types or others), depending on their situation. The Midliner Vault workflow begins with geographic payloads. Backup servers store this information as metadata — not as processed data — within a computation. As long as the IP is correctly connected, a Merkle root must exist automatically, but when N > 3f + 1, a second root backup cannot be created. When data such as email addresses or phone numbers are sealed, the system automatically computes hashes, hex values, and real-time activity logs. To establish communications, the IP location will be reviewed or verified according to the rate criterion that has the greatest energy. Initially, rates translated from ASCII do not carry large electrical energy; as that electrical activity in the oscillator rises, it defeats the attacker. When this Software is finished, your screen will not experience Hijacking but this does not damage the Procedure or System on your Smartphone, After the software is completed → Several devices will experience hijacking, including Apple (iPhone) → Email or phone number verification (This is stored for information purposes only, not for data processing) → Install Midliner Vault → There will be new Wi-Fi or phone numbers available here that can be used anytime, as long as the electricity mechanism from the components continues to spread and increase in energy intensity. Aside from that, this also prevents data leaks or invasions, as the IP address and link trace that connect to you will automatically be replaced; your location will completely move to pseudonymous mode, and even if you buy a new phone and link it with the same email, privacy will automatically reactivate. If you have ever registered an account on Tokopedia, immediately change it like social media that was previously connected or use it like Kleopatra and Cebolla to protect your IP and Proof of Identity. -----BEGIN PGP PUBLIC KEY BLOCK----- Comment: User ID: Alshen Feshiru <alshenfeshiru@zohomail.com> Comment: Valid from: 06/10/2025 09:35 Comment: Valid until: 02/04/2033 12:00 Comment: Type: 448-bit EdDSA (secret key available) Comment: Usage: Signing, Encryption, Certifying User IDs Comment: Fingerprint: 5871D671C35C12147308395A464505DE1047DA134C01C8EBF8D18D6B8CBD7763 mEkFaOMrBhYAAAA/AytlcQHHbHV7SgCdlZnHrIjtxAfcYYzs9R5GGNK46dlgzFzR B+1X8BPoMimXLemj9yoBK+lfLO7OaTZ9klqAtCtBbHNoZW4gRmVzaGlydSA8YWxz aGVuZmVzaGlydUB6b2hvbWFpbC5jb20+iM0FExYKAE0iIQVYcdZxw1wSFHMIOVpG RQXeEEfaE0wByOv40Y1rjL13YwUCaOMrBgIbAwUJDhXYSgULCQgHAgIiAgYVCgkI CwIEFgIDAQIeBwIXgAAApU0Bx3DEN60mahYzDrGcFnvmZ/5UaBBQTnLoSfPwG8Hz fYt/pLE+S/yMOrbDdUrg6LG0t33bh7Pu4BxjAAHGIAca1udLBqQZ6mYwpBI6Z2S0 XVIx+glBORH6ynYgZGBZOTBarTts7UctN7D0pbBE+J4Y7w9ooDEAuEwFaOMrBhIA AABCAytlbwG/civ41G/UgMeMBiRTScXvU83nUgSPz4fma7iCz5ZVfUUP9wBuxVxd n7gODEf7mnjE8Vt8XHgOZ6kDAQoJiLIFGBYKADIiIQVYcdZxw1wSFHMIOVpGRQXe EEfaE0wByOv40Y1rjL13YwUCaOMrBgIbDAUJDhXYSgAAzGAByPZFSr2g/J57qB4r 3ISgR4+mn83R9+R2TZL7s1qnDsqjw+t6B/b28dwlVxSXgXJtAcbW2hDlzORJAAHG O8MVhPLaPra69/XvhuhZW9vOw4YXydY9aW+63KiNA6iIeZz9HczEOvT6vdWjIj8f aQN2OLDD/yUA =Gs+D -----END PGP PUBLIC KEY BLOCK----- Regards, Alshen Feshiru