RE: https://wetdry.world/@ihatecompvir/116289367138743369
All I know is :q! to exit without saving changes
Since you all asked nicely: the large vertical prints are available - either as a physical print shipped by me with my stamp on, *or* as a digital file so you can print it yourself because shipping costs are poopoo and nobody wants to pay them (understandably)
Physical print:
https://doombloomart.com/products/no-ai-support-human-artists-nouveau-art-print
RE: https://xoxo.zone/@ilovecomputers/116275772384259836
No, seriously - I can't possibly overstate the value in my life that has come from the internet or how it has enriched me.
Like Ed Zitron & @pluralistic have both written about at various times, I'm not mad at technology - I'm fucking furious at the fuckfaces who deliberately ruined it, just so they could squat their ignoble asses upon a mountain of riches like the shittiest, saddest little saggy dragons imaginable.
That's not just more 🇨🇦 state surveillance.
In 2024, Chinese state hackers broke AT&T+Verizon through a similar backdoor. 1 mil+ people's data was compromised.
Coming soon to 🇨🇦 through #BillC22.
Threat Actors are "Bringing Their Own Forensics"
In a recent ClickFix campaign, we saw threat actors likely related to Interlock Ransomware, running Volatility (https://vol.py) directly on victim machines.
Commonly a tool for defenders, the threat actors are using it to:
➡️Dump RAM: Capturing mem.raw from the infected host.
➡️Extract Hashes: Using windows.hashdump to pull NTLM hashes.
➡️Steal Credentials: Using windows.cachedump to extract cached creds.
