• 0 Posts
  • 36 Comments
Joined 2 years ago
cake
Cake day: July 30th, 2023

help-circle
  • Yeah but he’s just a temporarily inconvenienced billionaire, the rest of these welfare queens are out here collecting rent and sitting around all day. They don’t need the money like he does. As soon as he gets a job, he’ll hustle that first billion in no time.


  • His YouTube shorts (500/day goal) is videos of Elon musk saying things, with the background music alternating between the sigma male tune and the movie clip tune.

    Did you see how ELON MUSK OWNED💯 DON LEMON by getting flustered at the question of “half your advertisers have left the platform, if X fails, isn’t that on you?” so he told Don he should choose his words carefully because the interview clock only had 5 minutes left? And then Don was OWNED because he rephrased the question?

    LMAO. SUCK IT CNN



  • I think it’s being framed wrongly for the narrative by the guy posting the screenshot.

    A friend sent me MRI brain scan results

    Without more context I have to assume guy was still convinced of his brain tumor, knew a friend who knew and talked about Claude, had said friend run results through Claude and told guy who’s brain was scanned that Claude gave a positive result, and friend went to multiple doctors for a second, third, fourth opinion.

    In America we have to advocate hard when there is an ongoing, still unsolved issue, and that includes using all tools at your disposal.


  • The Y2K38 Epochalypse bug hit 2 years early due to Microsoft’s rushed implementation of Windows Subsystem for Linux under CEO Elon Musk, causing all newer systems running Windows to combust due to a combination of the bug, and a cyberattack on Musk’s new chip fab plant in the state of Mexas. The only widespread choices after that are WacOS and Ubuntrue, both parent companies owned by Elon Musk after winning in his presidential prelection in 2026 and removing all antitrust legislation. However there is a hobbyist Unix distribution still being passed around called Briarch that fixed the 2038 problem in 2025 when development started, but you have to be in close proximity to someone with it to get it, which is easy in the country of California but not as easy east of the Nutah border, you really have to trust someone to even ask if they have it.







  • First sentence of the article:

    NSO Group, the maker of one the world’s most sophisticated cyber weapons, has been ordered by a US court to hand its code for Pegasus and other spyware products to WhatsApp as part of the company’s ongoing litigation.

    NSO Group has been ordered to hand over the Pegasus malware code that allows them to silently infect phones via WhatsApp, so Meta can fix it. This isn’t NSO Group being forced to hand over WhatsApp source code.

    There will be at most 5 software developers who have access to the code, on a non-networked machine, surrounded by a group of lawyers the entire time. No one will have the ability to leak the Pegasus code. After that, it will probably be handed to the random mormon-looking plainclothes guy nobody in the room can figure out, who will take it back to the NSA so they can scour it for any non-WhatsApp 0days they don’t already have.

    It’s worth noting that NSO Group is an Israeli company, as are many ‘legal’ entities of hacking software and hardware used by many nations.







  • If you have proper full disk encryption and know the caveats, it really doesn’t matter what you name your files. If you’re the anal-retentive spy handler type, you are probably very organized, and you name files with exactly what’s in them.

    He was a spy handler who handled secret and top secret documents and worked in intelligence for a number of years. I’m sure he knew how to encrypt his hard drive.

    He may have even used a VPN, or tor for the searches which has (had?) a very curious ongoing network-wide DDoS attack (very useful if you had access to the entire inflow and outflow of the Internet via undersea cables and ISP access and wanted to do timing attacks) for at least a year in 2022-2023. The tor project themselves tell you that if your adversary is a nation-state, you need to use more protection than just browsing from your normal laptop on your home network.

    I imagine he at minimum used private browsing to search Google and reddit for this stuff, but they logged the search and the DoD was later able to easily get the customer details of the IP from his ISP at the time the searches took place, and also all other searches during a time.

    But it’s also just as likely he thought he’d be in the clear, knows how incompetent the beurocracy seems since he was inside of it, but something he did tipped them off and he was scrutinized (maybe his VISA application for China and plans to travel there yearly).

    This seems like a weird way to set someone up… Setups are much more rare than the movies would have you believe.

    I’m mostly concerned with the lack of details about whether he did or did not successfully give China those details… He was arrested at the San Francisco airport coming back from China… asset info, meeting places, etc, of even just a few known spies can potentially give the adversary a pattern to look for to find other unknown assets. I forget exactly when, where, or who, but there was some massive spy bust (either Russians in US or US in Russia, iirc) that happened because of some pattern they found between the registered addresses of the spies… Something about them all living in the same apartment building, or the numbers in the building or something. If anyone remembers the story please link it here.