Skip Navigation

  • The custom interiors and crew based stuff is really interesting and I want to see it as a light no fire testbed if nothing else after they said it was the same core tech as their ocean faring ships.

  • For clarity this is windows malware, not a browser exploit.

    Distributed as c++ payload, persists in Startup by writing itself there with the CopyFileA api, uses powershell to pull browser data from file system... This is windows malware that knows what files to look in for various browsers and then exfiltrates via telegram. I wouldn't have titled it like this since it make it seem like a browser exploit instead of a ball of c++ and powershell but it's neat that they cast such a wide net I guess. No mention so far of distribution method, initial exploit, or group attribution that I've been able to spot.

    Original report from July: https://hybrid-analysis.blogspot.com/2025/07/new-advanced-stealer-shuyal-targets.html

    Additional info: https://www.pointwild.com/threat-intelligence/shuyal-stealer-advanced-infostealer-targeting-19-browsers

  • Maybe OP is describing a prolasped rectum, where some intestine is pushed out, rather than a hemorrhoid like you describe.

  • Discord can make threads, but they are effectively invisible to people who don't post in them or get @ in them. They can be set to auto archive and have their own permission structure, so I tend to create them for individual games and sub topics like that.

    The discoverability problem means people have to seek them out, which might suit your purposes, but just expect it to be like a somewhat self archiving channel anyone can start.

  • I guess it's interesting to see how she views her son as blameless and contorts her worldview to ignore that he chose his fathers womanizing habits and money over her.

    Who would want to reconcile that her abuser trained her son to abuse, and that mindset brought them both ridiculous wealth?

    I'm not sure how all of this is news though, more like hiring your mother to get between you and a mob with pitchforks.

  • Just so I'm clear, this move entails:

    Get a massive loan, use it to buy a company, take the money back from the company, saddle the company with the debt for it's own purchase, scrap it for parts and let it go bankrupt?

  • Always has been

  • DID I HEAR A ROCK AND STONE???

  • #advertisement #inappropriate #irritating #unwelcome #notworththeaskingprice #wasteoftime #unprofessional #cantfollowinstructions #dghndconsultancy #gobacktoreddit

  • No, because they don't do math. If the LLM calls a script to do the math and just formats the input it might get accurate results consistently... but you just invented a machine to press calculator buttons for you at that point which is hilariously energy inefficient. This is unacceptable from a cost and reliability standpoint. If you're familiar with enterprise reliability metrics you'd weep at the thought of a multistage process where each step had a single 9 and no visibility to underlying model tuning that can change outputs in wildly unexpected ways.

  • Sure, here's an opinion.

    Banning is permanent and shouldn't be first or immediate response. Repeat offenders that cross some quality or quanity threshhold may deserve that, but you should adopt power rangers rules and seek proportional responses, and only escalate as a response where possible.

    Bans should be transparent, contestable, and consistent in their application. However fair or unfair the rules you settle on, the perception of that consistency and impartiality influences the communitiea reaction. Too gentle and your community's purpose blurs into something unintended, too harsh and your users will flee for greener pastures.

    Asking instead of dictating is the right approach in my opinion so I think you're aimed in a good direction.

    Three strikes is where I would start, but maybe some strikes count for more than others? This is a hard problem and the answer will change over time. In cases where you can't be consistent though, you must be transparent to salvage the trust you're eroding.

  • Text wall incoming, no offense taken for walking away:

    People always talk about distributed denial of service attacks but this is not distributed. It's concentrated in that one farm, and that informs the types of denial of service attacks it's suited to carry out without help and influence the govt agencies which might give a shit. A simbox is a machine that can initiate one simultaneous call for each provisioned sim card in it, or whatever other cellular network operations the towers in range support. Look downstream of that for a second though, how many 911 operators are there for that area? Denying service can be more than knocking machines offline! Do I have enough sims to drown them in prerecorded panicked AI calls so they send all their firefighters to the wrong locations? Maybe I want to knife a guy and watch everyone on that block fail to reach 911 while he bleeds out. But they said 'disable towers' so let's focus on denying telephony rather than the service telephony gets you to.

    Bullshit scenario to illustrate a point:

    Healthy customers operating a phone normally may call a variety of internal services once each until their session is established with the appropriate permissions, and then they're allowed to make calls or touch websites. What if I pick one of those important steps and just hammer the dick off of it so nobody else can make new connections to the network for a period? If their security teams had the idea before me maybe they built some defenses, but maybe not, or maybe the simbox has sims from many carriers so they can get help. Does MobileX even agree that they carry the obligation to respond to this? Do they even know how since they don't own all the network devices involved? Did they willfully put their thumb up their ass and ignore so they could continue to get money from the bad actor without caring about the consequences? No of course not companies always act morally!

    Imagine my phone attaches to one of three towers in an area. Imagine there's a back end process that lets a device tell a tower "I'm bcovertigo, so start me a session and look up my plan permissions, then report back with what I'm allowed to access" with a unique identity for the provisioned sim card. What happens when a phone starts that process but just ignores the response and never goes to the next step? What if I repeatedly chain together those half opened requests, and then 100 or so of those processes are just waiting on a response, still consuming resources. Do that for each of 32 sim cards in those pictured simboxes. Now give me a 300 strong swarm of those screaming hydras. 100/minute32sims300simboxes. Can your iphone ever get online if that critical step never completes to tell you your session is allowed to make calls and visit websites? We're not even considering disruption of IoT security systems. Maybe they found some other flaw that lets them break existing network connections or exhaust something that's needed for very specific functions to work. Through the magic of computing, anything can go wrong!

    But enough about the attack itself. What are you going to do to stop all this?

    Ban the identifiers of the sim bank? Fuck you they randomize it. Deprovision the sims as you see them used? Fuck you they have 100k of them as reserve ammo. No you have to physically find it and go there in person, which means plying some investigative govt agency for help.

  • They're only allowed to do that if they can find a way to summon them for battle after the fact.

  • It's like canopic jars, if you preserve everything he gets to use it in the afterlife.

  • Archive link to an FAQ for the Slate electric trucklette that claims no sim cards and minimum digital bits. No clue if it will be a good vehicle so don't take this as an endorsement. https://archive.ph/PMKpC

    Anyone know other options?

  • He's fucked either way.

  • I think that you should have the freedom to live and raise your children how you see fit, but I don't see how you can expect that for your family without giving others the same autonomy. I can't understand the grounds on which you deserve society's benefits, as a piece of a larger societal system, while wanting to restrict how others can live and express themselves I guess.

    I want to believe you have a world view that makes sense though so I'd like to understand. Does every homosexual person have to avoid you so they aren't in your life? Do you have to avoid anyone else in the same way or is this a one sided rule? What's the underlying reasoning?