• 0 Posts
  • 624 Comments
Joined 3 months ago
cake
Cake day: April 10th, 2025

help-circle
  • It’s also probably the most common type of breach. It’s way easier to compromise tech support than find a vulnerability, so it makes a ton of sense for a company like Blizzard to have an auditing team to test the various attack vectors.

    Yep, absolutely.

    The uh, funniest one that sticks in my memory was the hack of basically an early build of GTA 6.

    Somebody social engineered their way into someone at Rockstar who had some level of admin acces, I think via fake / intercepted and reformed 2FA auths to the target’s phone, along with some spear phishing.

    Then, they were proficient enough to exploit thier way throughout the intranet… but not smart enough to cover all their tracks.

    A lot of roles like QA and cyber security sound glamorous, but that’s because people like glamorous titles. If you’ve spent even a tiny amount of time working in a relevant industry (in this case, anything touching computers), you should be able to read between the lines.

    You would think this, but everywhere I have worked in the industry… most people cannot infact read between the lines.

    I’ve attended and even spoken at some tech conferences, and they’re like 90% entry level stuff with a handful of interesting events and talks that actually break some new ground.

    Impressive!

    I’ve been to some, never spoken though… also, not DEFCON though.

    I imagine cyber security conferences are similar. (mostly exist for networking)

    I agree.

    But yeah, streamers like to appear like they know their stuff because that’s what gets people to watch.

    Yeah, but Thor takes it to an uncommon point of basically being a conman, with his so much of his reputation built, by himself, on vastly overstated credentials.

    Its like getting a 2 year nursing assistant degrer and then acting as if you can safely perform a brain surgery.



  • He did technically end up in cybersecurity, but basically yeah, a role that involves almost zero actual technical skill.

    He did social engineering, aka, worming his way into people’s emails and texts and social circles, sending fake ‘your account has been comprimised, send me your user name and password to fix’ type shit.

    Ironically, social engineering is quite a fitting uh, subclass, for a low technical skill, high charisma narcissist to slot into.

    He thought hacking and DEFCON was the coolest convention to go to, so him and some buddies… won the scavenger hunt badge, I believe thats more or less running around the Con with your network analyzer open on your phone, to find wifi/bluetooth enabled hidden scavenger hunt items, maybe with a couple extra steps.

    Its literally a gimmick badge, its not really anything to do with actual pentesting, nothing like developing a totally novel exploit.

    EDIT: Like, I am reasonably confident I know more about ethical hacking than he does, just having futzed around with tryhackme and some other free online sort of, ‘basics of hacking’ tutorials with simulated demonstrations on VMs, for a few years in my spare time.

    Ask him what SYN, SYN-ACK and ACK are, and why they are important, and I’m guessing he would have to look it up, whilst making it look like he is not looking it up.


  • Not…webbed feet.

    Webbed feet is when there is … webbing, skin connecting between your toes, like a swimming flipper, as a duck does, though its usually not that pronounced when it occurs in humans.

    Hers have been deformed by her wearing extremely poorly fitting shoes her whole life, and/or possibly just had fucked up toe alignment to some extent, to begin with.

    More like foot bondage, but less extreme, and self imposed.

    Think of how if your teeth grow in funny, you may need braces to better align them.

    Well, this is sorta like that, but where the shoes are functionally the braces, and they’re all fucked up and force the toes into an extreme configuration over time.

    EDIT:

    Basically, MTG is Cinderella’s evil half or step sisters.

    They kept jamming their feet into badly sized and badly formed fancy shoes, and at least in the original version, they actually cut off parts of their feet to try and literally fill Cinderella’s shoes, but the Prince kept noticing the blood, and them walking awkwardly.

    MTG has just been jamming her feet into, eh, likely needle point pumps of some kind, for so long, that they’ve smushed her pinky toes under and behind the adjacent toe, and the other toes have splayed out to compensate for the lack of balance that causes.




  • Oh it is gross in many ways, no argument there, gross feet, gross tabloid / social media bs…

    But, this is apparently the state of modern US politics, and I wanted to give an at least semi-credible source, and not have to personally dive in to twitter to find the direct source.

    Also, this is, I think, the real photo.

    The fake one has MTG with only 3 visible toes on each foot.

    Here, hers are splayed badly, and her pinky toes are basically crushed under/behind the sandal and adjacent toe, but you can still make them out.

    EDIT: goddamnit.

    Yeah, here it is, the fake, based off of the above image, that circulated around twitter:






  • Maybe not specifically this comm, but I had been sporadically arguing with people on various places on lemmy about SKG before Ross even dropped his ‘SKG is probably dead’ video that (re)ignited this whole thing.

    A whole, whole lot of people I talked to basically had the same talking points Thor initially did, a lot of them were dedicated to various facts that were simply wrong, rhetoric that was either bipolar/hypocritical, or just ultimately nihlist (nothing can be done).

    I was actually very relieved, initially, when Ross made above mentioned video, simply so I would no longer have to keep explaining all the various intricacies… Ross had addresed all this stuff before, but you’d have to watch about 2 or 3 hours of videos to truly get it, in all its detail.

    The ‘SKG is probably dead’ video did a good job of doing both a broad overview, as well as going into detail with the more common, in-depth misunderstandings… which were pretty much all popularized by Thor.


  • I mean… the FBI and INTERPOL/EUROPOL routinely do things like infiltrate dark web black markets for physical things, services, hacked data, hacks themselves, that exist mainly or only on a .onion site, then honeypot the users for 6 to 12 months, then crackdown on as many as they can at the same time.

    They also go after rom hosting sites, they go after the sites that host torrents and trackers…

    Sure, call those ‘Law Enforcement’ agencies instead of ‘Intelligence’ agencies if you want to, fact of the matter is they often collaborate and share methods, practices and just direct intel.

    Kinda like how US police have largely militarized after getting all the surplus guns from Iraq 2 and Afghanistan.

    Have you never seen a website with a:

    “THIS SITE HAS BEEN SEIZED AND SHUTDOWN”

    Banner replacing the main site?

    If not, you must not have been pirating anything for very long, or even just following that genre of news.

    Happens all the time, and its often a big smorgasbord of collaborating LE/Intel agencies with their logos on the banner.



  • sp3ctr4l@lemmy.dbzer0.comto196@lemmy.blahaj.zoneDont be a rule
    link
    fedilink
    English
    arrow-up
    15
    ·
    edit-2
    3 days ago

    Meanwhile most autists have been aware of this since they got to roughly middle school age, and have just long since given up hope of neurotypicals ever broadly figuring this out, as well as gave up hope they’d ever stop being bullied as kill-joys for pointing this out.

    But, nontheless, hey, good that more people may be catching on?



  • Europe’s markets generally more resemble ‘free markets’ (which really means: competetive markets) because they are more heavily and properly regulated.

    So, they’re more like ‘fair markets’ than they are ‘free markets’.

    You cannot naturally maintain competetive markets over time without some kind of system for counteracting the natural tendency of such markets to consolidate over time.

    ‘Free markets’ don’t exist, as that phrase is an intentionally vague and confusing propaganda term, that means whatever to uneducated and naive person wants it to mean.

    Are they free as in free beer, free lunch?

    Are they free as in, free to enter, free to leave?

    ‘Free’ is a word that has many different, distinct meanings, and it is a hallmark of con artists and cult leaders to use such words and switch from one definition/meaning of the same word, from sentence to sentence, sometimes even within the same sentence.

    Look at how quantum mystic type gurus use ‘energy’ to waffle between and conflate the actual, physics definition of ‘energy’ and the colloquial ‘overall emotional disposition’ meaning of ‘energy’.

    Its the same thing with ‘free market’ peddlers.


  • sp3ctr4l@lemmy.dbzer0.comtoPolitical Memes@lemmy.worldThe Capitalist Cycle
    link
    fedilink
    English
    arrow-up
    1
    arrow-down
    1
    ·
    3 days ago

    No, that’s completely meaningless as a working definition, and also just broadly false.

    Monopolistic companies often rank high in public polls of ‘most hated / least trusted’ companies.

    Monopolies are more accurately described as using and abusing trust, by building up a reputation, and then betraying that trusted reputation once they’ve grown to become actual monopolies.

    Enshittification can basically be described as the latter half of that process.

    Its a slow motion bait and switch.


  • In some sense yes, but:

    If your TOR entry exit node is comprimised, you are basically fucked.

    I’ve seen estimates that roughly 1/3 of them are comprimised, run by State actors of some kind.

    People seem to forget that TOR was originally invented by the US Navy and used by them and the CIA and shit to move sensitive data around in the early 2000s, possibly late 90s.

    Then they handed it off to the public.

    Do you really think they do not know how to defeat it, when they really want to?

    Also… I2P traffic is more anonymized/encrypted than TOR traffic is, in that each chunk in each packet is anonymized and encrypted… each packet is kind if a sausage of a bunch of people’s data being moved around all at once, the whole point is you can’t tell whose data ia whose.

    IIRC, TOR packets do not work this way, they’re specifically addressed to a single encrypted and anonymized person.

    So, its easier to reverse engineer who is the actual person using the network.

    Whereas with I2P, you’re always routing for others as well as receiving your own data, albeit much, much more slowly.