

Don’t give up! WAN links use shielding and beamforming, or even just lasers to avoid general background noise and achieve high bandwidth even in adverse conditions. Anything can be a medium for data!


Don’t give up! WAN links use shielding and beamforming, or even just lasers to avoid general background noise and achieve high bandwidth even in adverse conditions. Anything can be a medium for data!


How is frying with duck fat compared to other fats?


Hey that’s not fair, plenty of them also know how to upload hardcoded secrets to postman.


Take it a step further, though. You shouldn’t have to combine posts, they should all be the same post.
Can you elaborate?
We have Lemminati at home.


You might try looking into brands like scepter that offer dumb TVs, but if you have the money you could also check for retail displays since some still lack cloud management features and can be dumb as well as huge. They advertise with different specs than consumer TVs though so it’s sometimes hard to get info around input delay and other things you’ll care about.


I can’t sleep :(


Typosquat domain for sure! In a sandbox I’m seeing that all the download links point to the same HTML page on a .ink domain that cloudflare is now refusing to serve.
But our buddy joe already got a copy for us so we can at least view that report for fun: https://www.joesandbox.com/analysis/1763244/1/html
Edit: It pulls down an MSI installer or something it runs with msiexec but disguised with a PDF file extension. It seems to want a copy of cmd.exe to exist in an AutoIT installation (SearchPathW vs “C:\Program Files (x86)\AutoIt3\cmd.exe”) as well as pointing toward the multilanguage (.exe.mui) and other cmd variants. I suspect we’re one step away from a real payload with this report and that’s what we’d see the “Invoke-Obfuscation” powershell the sandbox spotted used for (if that wasn’t a false positive due to the base64 offset string).
You deserve your meds, and a treat for taking your meds.
If you microdose a breakdown by crying in a closet afterwards you get extra cooldown reduction.


The custom interiors and crew based stuff is really interesting and I want to see it as a light no fire testbed if nothing else after they said it was the same core tech as their ocean faring ships.


Maybe OP is describing a prolasped rectum, where some intestine is pushed out, rather than a hemorrhoid like you describe.


Discord can make threads, but they are effectively invisible to people who don’t post in them or get @ in them. They can be set to auto archive and have their own permission structure, so I tend to create them for individual games and sub topics like that.
The discoverability problem means people have to seek them out, which might suit your purposes, but just expect it to be like a somewhat self archiving channel anyone can start.


I guess it’s interesting to see how she views her son as blameless and contorts her worldview to ignore that he chose his fathers womanizing habits and money over her.
Who would want to reconcile that her abuser trained her son to abuse, and that mindset brought them both ridiculous wealth?
I’m not sure how all of this is news though, more like hiring your mother to get between you and a mob with pitchforks.


Sure, here’s an opinion.
Banning is permanent and shouldn’t be first or immediate response. Repeat offenders that cross some quality or quanity threshhold may deserve that, but you should adopt power rangers rules and seek proportional responses, and only escalate as a response where possible.
Bans should be transparent, contestable, and consistent in their application. However fair or unfair the rules you settle on, the perception of that consistency and impartiality influences the communitiea reaction. Too gentle and your community’s purpose blurs into something unintended, too harsh and your users will flee for greener pastures.
Asking instead of dictating is the right approach in my opinion so I think you’re aimed in a good direction.
Three strikes is where I would start, but maybe some strikes count for more than others? This is a hard problem and the answer will change over time. In cases where you can’t be consistent though, you must be transparent to salvage the trust you’re eroding.


Text wall incoming, no offense taken for walking away:

People always talk about distributed denial of service attacks but this is not distributed. It’s concentrated in that one farm, and that informs the types of denial of service attacks it’s suited to carry out without help and influence the govt agencies which might give a shit. A simbox is a machine that can initiate one simultaneous call for each provisioned sim card in it, or whatever other cellular network operations the towers in range support. Look downstream of that for a second though, how many 911 operators are there for that area? Denying service can be more than knocking machines offline! Do I have enough sims to drown them in prerecorded panicked AI calls so they send all their firefighters to the wrong locations? Maybe I want to knife a guy and watch everyone on that block fail to reach 911 while he bleeds out. But they said ‘disable towers’ so let’s focus on denying telephony rather than the service telephony gets you to.
Bullshit scenario to illustrate a point:
Healthy customers operating a phone normally may call a variety of internal services once each until their session is established with the appropriate permissions, and then they’re allowed to make calls or touch websites. What if I pick one of those important steps and just hammer the dick off of it so nobody else can make new connections to the network for a period? If their security teams had the idea before me maybe they built some defenses, but maybe not, or maybe the simbox has sims from many carriers so they can get help. Does MobileX even agree that they carry the obligation to respond to this? Do they even know how since they don’t own all the network devices involved? Did they willfully put their thumb up their ass and ignore so they could continue to get money from the bad actor without caring about the consequences? No of course not companies always act morally!
Imagine my phone attaches to one of three towers in an area. Imagine there’s a back end process that lets a device tell a tower “I’m bcovertigo, so start me a session and look up my plan permissions, then report back with what I’m allowed to access” with a unique identity for the provisioned sim card. What happens when a phone starts that process but just ignores the response and never goes to the next step? What if I repeatedly chain together those half opened requests, and then 100 or so of those processes are just waiting on a response, still consuming resources. Do that for each of 32 sim cards in those pictured simboxes. Now give me a 300 strong swarm of those screaming hydras. 100/minute32sims300simboxes. Can your iphone ever get online if that critical step never completes to tell you your session is allowed to make calls and visit websites? We’re not even considering disruption of IoT security systems. Maybe they found some other flaw that lets them break existing network connections or exhaust something that’s needed for very specific functions to work. Through the magic of computing, anything can go wrong!
But enough about the attack itself. What are you going to do to stop all this?
Ban the identifiers of the sim bank? Fuck you they randomize it. Deprovision the sims as you see them used? Fuck you they have 100k of them as reserve ammo. No you have to physically find it and go there in person, which means plying some investigative govt agency for help.
Your error was just parsing him as pro “I.” when he is actually pro “I.C.E.”
He is in favor of immigration enforcement, not immigrants.