Chad Brigance

8 Followers
63 Following
161 Posts
IT Security guy and some other things.
@chadbri.bsky.social
https://twitter.com/ChadBrigance
ransomware except in addition to encrypting data it plays a 10 hour supercut of all yotubes worst jarjar binks impressions and zingers forever until they pay

What Happens When a Bad-Tempered, Distractible Doofus Runs an Empire? | The New Yorker

One of the few things that Kaiser Wilhelm II, who ruled Germany from 1888 to 1918, had a talent for was causing outrage. One of the many things that Wilhelm was convinced he was brilliant at, despite all evidence to the contrary, was “personal diplomacy,” fixing foreign policy through one-on-one meetings with other European monarchs and statesmen. In fact, Wilhelm could do neither the personal nor the diplomacy, and these meetings rarely went well. The Kaiser viewed other people in instrumental terms, was a compulsive liar, and seemed to have a limited understanding of cause and effect. He was susceptible but never truly controllable. He asserted his authority unpredictably, as if to prove he was still in charge, staging rogue interventions into his own advisers’ policies and sacking ministers without warning. Sound familiar? Revisit Miranda Carter on the lessons of Kaiser Wilhelm II:

https://www.newyorker.com/culture/culture-desk/what-happens-when-a-bad-tempered-distractible-doofus-runs-an-empire

What Happens When a Bad-Tempered, Distractible Doofus Runs an Empire?

Miranda Carter draws comparisons between President Donald Trump and Kaiser Wilhelm II, whose touchiness, unpredictability, and narcissism helped precipitate the fall of the German Empire.

The New Yorker
How a Poisoned Security Scanner Became the Key to Backdooring LiteLLM https://snyk.io/articles/poisoned-security-scanner-backdooring-litellm/
How a Poisoned Security Scanner Became the Key to Backdooring LiteLLM | Snyk

On March 24, 2026, threat actor known as TeamPCP published backdoored versions of the litellm Python package after stealing PyPI credentials via a compromised Trivy GitHub Action in LiteLLM's CI/CD pipeline. Here's what happened, how the three-stage malware works, and how to check if you're affected.

Snyk
i love that we went from "zero trust" as a fundamental buzzword to "trust autonomous nondeterministic agents everywhere in your stack"

it just struck me, is there a list somewhere somebody maintains of "free" airport wifi networks that just plain don't work, block ssh out, appear to be blocked by the outside world in general? (one or more of, other criteria fine too)

Not asking for a friend (yes, using my phone as hotspot in TPE at the moment), and I have encountered a few more that should be added to such a list.

Please boost for reach.

This isn't possible 😔 Chuck Norris can't die. He just decided to change into a different state.

RIP

#chucknorris

Having fun with the revelation that Kagi Translate is actually something like a thin wrapper over an LLM, so you can pass anything you want as the "to" language in the URL's query string and it will do its best to "translate" your text to that

https://translate.kagi.com/?from=en&to=pentagon+speak&text=I+think+we+should+break+up.

Drone strikes halt a third of the world's helium supply, threatening chip production

At the center of the issue is the precision gas vital to chip manufacturing and cryogenics. Helium cools silicon wafers during fabrication, maintaining the extremely low temperatures...

TechSpot
Stole this idea from @daedalus - the cloud is the new mainframe. Since then we had a few decades of hardware and software portability. And we are now back at "pick a cloud vendor and lock yourself in".