Skip Navigation

InitialsDiceBearhttps://github.com/dicebear/dicebearhttps://creativecommons.org/publicdomain/zero/1.0/„Initials” (https://github.com/dicebear/dicebear) by „DiceBear”, licensed under „CC0 1.0” (https://creativecommons.org/publicdomain/zero/1.0/)IP
Posts
3
Comments
885
Joined
2 yr. ago

  • My employer goes so far as to lock down what devices can connect to our network & VPN, and also locks down laptops so that removable media like USB thumb drives won’t work.

    No way in hell I’d let them do things like that to my personal laptop.

  • Well OPSEC is the stated cause. Who knows how the person was initially identified and tracked. For all we know he was quickly identified through some sort of Tor backdoor that the feds have figured out, but they used that to watch for an unrelated OPSEC mistake they could take advantage of. That way the Tor backdoor remains protected.

  • Exactly. Tor was originally created so that people in repressive countries could access otherwise blocked content in a way it couldn’t be easily traced back to them.

    It wasn’t designed to protect the illegal activities of people in first world countries that have teams of computer forensics experts at dozens of law enforcement agencies that have demonstrated experience in tracking down users of services like Tor, bitcoin, etc.

  • https://en.m.wikipedia.org/wiki/Defense_industry_of_Ukraine

    In 2012, Ukraine's export-oriented arms industry had reached the status of world's 4th largest arms exporter.[1]Since the start of the war in Donbas, Ukraine's military industry has focused more on its internal arms market and as a result slipped to the 9th spot among top global arms exporters by 2015,[2]11th spot by 2018,[3] and the 12th spot among global arms exporters by 2019.

  • Sooner or later Ukraine will start manufacturing their own such weapons. They have demonstrated time and again that they the ability to be creative and do what the world never expected of them.

    Holding them back at this point is just prolonging the war.

  • Smarter bots know how to easily avoid being detected based on the speed of their requests by simply adding a random delay to them. A few years ago we discovered a very slow speed credential stuffing attack (testing usernames & passwords) against my employers site. It was only testing one set of credentials every couple of minutes.

    Once we discovered it we didn’t block it though. We were able to spot the attack fairly easily once we knew what to look for, so we updated our system to always return a login failure no matter what credentials they sent.

  • As somebody who has spent decades on boats I find this news particularly interesting because of the apparent suddenness and violence of the storm. I’m used to hurricanes that take days or weeks to form and move into the area, not waterspouts powerful enough to capsize a 180 foot long, 400+ gross ton super yacht with virtually no warning… It’s virtually unheard of.

  • There’s security camera footage that shows the yacht anchored in relatively calm water. Within about 3 minutes it turns into an incredibly violent storm. Most of the yacht is obscured by the storm but you can still see the mast light through most of it. Then suddenly the mast light is no longer there…

    Certainly nowhere near 16 minutes.