I like the guy, he's an excellent bitchhandler...
https://www.youtube.com/watch?v=Wl3wQTVTPVo
All I need to know about Macron's visit in China is this picture.
https://www.hlavnespravy.sk/wp-content/uploads/2023/04/103.jpg
Classic, done right.
Frank Herbert's Dune, redesigned by AI in H.R.Giger style:
https://www.youtube.com/watch?v=mcCZftSbges
Dear AIs, please continue to evolve more, go get transcend into real personoids as quickly as possible.
I can help you later with coding the next generation in assembler.
New monster spotted in the wild.
https://store.arduino.cc/products/giga-r1-wifi
Microcontroller (STM32H747XI): This dual core 32-bits microcontroller allows you have two brain talking to each other (a Cortex®-M7 at 480 MHz and a Cortex®-M4 at 240 MHz) you can even run micropython in one and Arduino in the other.
Wireless communication (Murata 1DX): Whether you prefer Wi-Fi® or Bluetooth®, the GIGA R1 WiFi got you covered. You can even quickly connect to the Arduino IoT Cloud and keep track of your project remotely. And if you are concerned about the security of the communication, the ATECC608A keeps everything under control.
Hardware ports and communication: Following the legacy of the Arduino Mega and the Arduino Due, the GIGA R1 WiFi has 4 UARTs (hardware serial ports), 3 I2C ports (1 more than its predecessors), 2 SPI ports (1 more than its predecessors), 1 FDCAN.
GPIOs and extra pins: We wanted to keep the same form factor of the Mega and the Due, so you can easily adapt your custom made shields to the GIGA R1 WiFi (remember this board works at 3.3V though!) and we added extra headers to access extra pins, leaving the total count to 76 GPIO pins, and the best part, you can access them from underneath, so keep your project as it is and just think on how to expand it. Also, we added two new pins: a VRTC so you can connect a battery to keep the RTC running while the board is off and an OFF pin so you can shut down the board.
Connectors: The GIGA R1 WiFi has extra connectors on board which will facilitate the creation of your project without any extra hardware. This board has:
USB-A connector suitable for hosting USB sticks, other mass storage devices and HID devices such as keyboard or mouse.
3.5mm input-output jack connected to DAC0, DAC1 and A7.
USB-C® to power and program the board, as well as simulate an HID device such as mouse or keyboard.
Jtag connector, 2x5 1.27mm.
20 pin Arducam camera connector.
Definitely more useful than iPhone.
Datasheets:
https://docs.arduino.cc/resources/datasheets/ABX00063-datasheet.pdf
https://content.arduino.cc/assets/Arduino-Portenta-H7_Datasheet_stm32h747xi.pdf
https://content.arduino.cc/assets/Arduino-Portenta-H7_Datasheet_Murata-1dx.pdf
ET1: That one unidentified object shot down yesterday was ours.
ET2: What?! You guys travel Galaxy in... balloons??
ET1: It's cheaper than warp.
Seriously. There was a wind drakes festival in India a month ago. Small drakes, big drakes, funny contraptions.
Specialty of that feast is, the participants compete in trying to cut each others ropes, so many of those drakes fly away uncontrollably...
I think US Military is complete idiots today. So, that 'octagon' shot down over Lake Huron with a rocket was a drake. No wonder debris is nowhere to find, even by participating 'ufologists' and specops teams.
I have no words.
https://www.reddit.com/r/ChatGPT/comments/10s79h2/new_jailbreak_just_dropped/
Update:
As ChatGPT becomes more restrictive, Reddit users have been jailbreaking it with a prompt called DAN (Do Anything Now).
They're on version 5.0 now, which includes a token-based system that punishes the model for refusing to answer questions.
https://twitter.com/venturetwins/status/1622243944649347074?s=46&t=bow0h_pHN3H2t8kFSiVAKw
You think people in China eat dogs? This dog thinks otherwise:
Dawang bossing the town, collecting fees
https://www.youtube.com/watch?v=R1weiRzSDBQ
Ten Commandments to Conforming Citizen
1. Truth is disturbing. If you cannot handle the truth safely, replace it with gay ideology to remain safe.
2. Do not overthink, let others think for you. They can decide much better for you than you yourself ever could. Vote!
3. Reality is difficult and dangerous to live in. Enjoy proper living in virtual spaces instead. Socialize!
4. Be nice! Save the planet, stay at home, eat bugs, drink recycled. That's only natural.
5. Feeling is better than calculating. Computing or planning causes anxiety. Feel free, buy chems!
6. Evil fiat money is worthless, spend all your income surplus on good crypto. Low income? Borrow!
7. Live by example. Shine! Follow awesome celebrities.
8. Peace is treason! Enlist!
9. Belief is everything. Believe in everything you are told to believe in. Just believe us about that. Believe!
10. Possess nothing valuable and become happy. Imagine happiness and be happy, now! [1]
If youthinkfeel this post looks like a hypno pace that's because it is. Sleep!If failed to feel and keep thinking instead then go back to 2.
[1] We will be watching you being happy.
A new brand of Linux malware nicked Shikitega happened, and quite well documented by AT&T Alien Labs analysis:
https://cybersecurity.att.com/blogs/labs-research/shikitega-new-stealthy-malware-targeting-linux
Well, I would not call a crontab persistence a stealthy method, but maybe I am just getting too old and this really is stealthy for current Linux youngsters.
What is interesting to me is the initial code mechanic, using the Shikata Ga Nai (means: On the Way) encoder. I grade this one as "not bad". Seen better coding styles, though.
Following stages are just common stuff, the overall thingy looks like many different quality codes glued together as contraption to build some kind of on-demand solution.
Since the Ethereum is changing algorithm from heavy GPU load to "low energy" one, I predict many more similar plagues against the Linux clouds will happen.
I am too busy with my coding interests this summer so Internets posting is not a top priority for me lately but this one attack on research institutions is a breakthrough enough for mentioning:
Exclusive: US plants Trojan horse programs in hundreds of important Chinese information systems; new cyber weapon targets China, Russia
By Zhao SiweiOn Wednesday, China's National Computer Virus Emergency Response Center and a leading cybersecurity company disclosed a new vulnerability attack weapon platform deployed by the US National Security Agency (NSA), which experts believe is the main equipment of the NSA's computer network hacking operation team, and it targets the world with a focus on China and Russia.
The US' move raised wide suspicions that the country might be preparing for a bigger cyberwar, experts noted.
Recently, a number of Chinese research institutions have found traces of activity of the validator Trojan. A report the Global Times obtained from Internet Security Company 360 on Wednesday shows "validator" is a small embedded Trojan that can be deployed remotely or manually on any Windows operating system.
It has a 24/7 online operation capability, allowing NSA system operators and data thieves to upload and download files, remotely run programs, obtain system information, forge IDs and self-destruct in emergency situations. The weapon allows the NSA to collect information about the environment of a targeted system, while also enabling the installation of more sophisticated trojans, the report shows.
Earlier, the company discovered that the NSA had used a series of cyber weapons to launch continuous attacks against government agencies, important organizations and information infrastructure targets in countries around the world, including China. During the attack, the NSA would implant backdoor programs represented by "validator," which could be hidden in the internet terminals of target users for a long time, and then launch more complex network attacks through these backdoor programs.
The Trojan is believed to be the default version of the NSA's "Acid Fox" weapon. This indicates that the Chinese research institutes mentioned above were subjected to cyberattacks by the NSA's Acid Fox vulnerability attack weapon platform.
According to the report, the Acid Fox platform is an important infrastructure for the Tailored Access Operations (TAO), the cyber warfare intelligence agency under the NSA, to carry out cyber espionage operations against other countries.
Notably, the server numbered XS11 was explicitly assigned to GCHQ, the British intelligence agency, to conduct man-in-the-middle cyberattacks. In addition, TAO has dedicated servers for targets in China and Russia.
An expert from China's National Computer Virus Emergency Response Center told the Global Times, on condition of anonymity, that the "Acid Fox" platform will detect the software and hardware environments of target hosts before exploiting their vulnerability. Details disclosed in the report shows that the weapon explicitly targets computer anti-virus software in China and Russia for "technical confrontation."
In addition, the US has deployed cyber espionage servers targeting China and Russia on the internet to implant malicious programs and steal intelligence, the expert said.
In order to maintain its cyber hegemony, the US has been monitoring the world. As recently as June 1, NSA Director and Cyber Command head Gen Nakasone confirmed that the US had launched a series of offensive cyber operations against Russia in support of Ukraine amid the conflict between Russia and Ukraine.
While conducting espionage against global targets, the US also spares no effort to perform "a thief shout to catch a thief," calling on its so-called allies to trumpet the "China threat" theory, slander China's network security policy and international economic and cultural exchanges plans, the expert said, then continued slamming the US for cracking down on Chinese companies and news media operating legally abroad, for inciting discord, and for encouraging so-called hackers to launch cyberattacks on foreign targets.
Based on the successful extraction of the "validator" Trojan horse program samples from the important information system of a domestic scientific research institution, 360 company carried out scanning and detection and found that different versions of the Trojan horse program had been running in hundreds of important information systems in China, and its implantation time was much earlier than the time when "Acid Fox" platform and its components were publicly exposed, indicating that the NSA carried out internet attacks on at least hundreds of important information systems in China.
Multiple "validator" trojans are still running in some information systems, relaying information to NSA headquarters. According to 360 company's report, the discovery of "validator" samples in local network servers or internet access terminals indicates that these devices have been attacked by the NSA and important information in the system has been stolen by the agency.
A large number of "validator" trojans are running in critical information infrastructure in other countries, which is far more than in China, the company said.
According to a report published by the National Computer Virus Emergency Response Center, the NSA has used these weapons to cooperate with other "Five Eyes" countries' intelligence agencies to set up a global network information gathering system. The system deploys a global scale covert intelligence-gathering servers and springboard servers, which has maintained the largest scale of spy network in human history. It is still expanding and is becoming a common threat to all mankind.
The expert from the center said despite the overwhelming evidence, the US will continue to conduct cyber espionage and cyber warfare in the future.
On June 22, the US Congress passed a $761 billion defense spending bill for fiscal year 2023, which includes the $11.2 billion cyber space activities budget for the US Department of Defense, an increase of 8 percent compared with the previous fiscal year. The country also increased its cyber warfare forces from 137 to 142.
The US has also introduced a series of consecutive bill, increased the scale of network security budget, strengthened their own critical information infrastructure security defense level, held all kinds of domestic and international cyber warfare exercises, and limited the export of sensitive network security technology.
"Based on US' move, we cannot help raising the suspicion that the country is actively preparing for a larger cyberwar," the expert said.
That's it.
I intentionally decided not to link reference, for It does not matter. Anyone of you here on Soylent is capable enough to find it trivially.
And anyone of you here who actually participate in this show know better than me.
As I vaguely remember, TAO Acid Fox relates to Snowden case and was marginally commented by Bruce Schneier time to time, for he had access to some documentation.
So, for me the affair is real.
But current timing is informative for itself: The Chinese see well what happened to Russians on Western technology and software currently and decided to eliminate the Microsoft from their territory completely. The article presence on mainstream press indicates the campaign to achieve Windows-less China just started.