#Secure Document Authentication
Explore tagged Tumblr posts
hagueapostilleservicesblog · 8 months ago
Text
Get Your Merger Agreements Apostille Online
1. What is a Merger Agreements Apostille? A Merger Agreements Apostille is an official certification that authenticates the validity of merger-related agreements for use in countries that are members of the Hague Apostille Convention. This certification ensures that such agreements are legally recognized abroad, essential for cross-border mergers, compliance, and legal proceedings. 2. Why Do…
0 notes
anotherdayforchaosfay · 3 months ago
Text
Cybercriminals are abusing Google’s infrastructure, creating emails that appear to come from Google in order to persuade people into handing over their Google account credentials. This attack, first flagged by Nick Johnson, the lead developer of the Ethereum Name Service (ENS), a blockchain equivalent of the popular internet naming convention known as the Domain Name System (DNS). Nick received a very official looking security alert about a subpoena allegedly issued to Google by law enforcement to information contained in Nick’s Google account. A URL in the email pointed Nick to a sites.google.com page that looked like an exact copy of the official Google support portal.
As a computer savvy person, Nick spotted that the official site should have been hosted on accounts.google.com and not sites.google.com. The difference is that anyone with a Google account can create a website on sites.google.com. And that is exactly what the cybercriminals did. Attackers increasingly use Google Sites to host phishing pages because the domain appears trustworthy to most users and can bypass many security filters. One of those filters is DKIM (DomainKeys Identified Mail), an email authentication protocol that allows the sending server to attach a digital signature to an email. If the target clicked either “Upload additional documents” or “View case”, they were redirected to an exact copy of the Google sign-in page designed to steal their login credentials. Your Google credentials are coveted prey, because they give access to core Google services like Gmail, Google Drive, Google Photos, Google Calendar, Google Contacts, Google Maps, Google Play, and YouTube, but also any third-party apps and services you have chosen to log in with your Google account. The signs to recognize this scam are the pages hosted at sites.google.com which should have been support.google.com and accounts.google.com and the sender address in the email header. Although it was signed by accounts.google.com, it was emailed by another address. If a person had all these accounts compromised in one go, this could easily lead to identity theft.
How to avoid scams like this
Don’t follow links in unsolicited emails or on unexpected websites.
Carefully look at the email headers when you receive an unexpected mail.
Verify the legitimacy of such emails through another, independent method.
Don’t use your Google account (or Facebook for that matter) to log in at other sites and services. Instead create an account on the service itself.
Technical details Analyzing the URL used in the attack on Nick, (https://sites.google.com[/]u/17918456/d/1W4M_jFajsC8YKeRJn6tt_b1Ja9Puh6_v/edit) where /u/17918456/ is a user or account identifier and /d/1W4M_jFajsC8YKeRJn6tt_b1Ja9Puh6_v/ identifies the exact page, the /edit part stands out like a sore thumb. DKIM-signed messages keep the signature during replays as long as the body remains unchanged. So if a malicious actor gets access to a previously legitimate DKIM-signed email, they can resend that exact message at any time, and it will still pass authentication. So, what the cybercriminals did was: Set up a Gmail account starting with me@ so the visible email would look as if it was addressed to “me.” Register an OAuth app and set the app name to match the phishing link Grant the OAuth app access to their Google account which triggers a legitimate security warning from [email protected] This alert has a valid DKIM signature, with the content of the phishing email embedded in the body as the app name. Forward the message untouched which keeps the DKIM signature valid. Creating the application containing the entire text of the phishing message for its name, and preparing the landing page and fake login site may seem a lot of work. But once the criminals have completed the initial work, the procedure is easy enough to repeat once a page gets reported, which is not easy on sites.google.com. Nick submitted a bug report to Google about this. Google originally closed the report as ‘Working as Intended,’ but later Google got back to him and said it had reconsidered the matter and it will fix the OAuth bug.
11K notes · View notes
jcmarchi · 11 months ago
Text
Global Cyber Resilience Report 2024: Overconfidence and Gaps in Cybersecurity Revealed
New Post has been published on https://thedigitalinsider.com/global-cyber-resilience-report-2024-overconfidence-and-gaps-in-cybersecurity-revealed/
Global Cyber Resilience Report 2024: Overconfidence and Gaps in Cybersecurity Revealed
The Global Cyber Resilience Report 2024 presents an in-depth analysis of the current state of cyber resilience across various industries worldwide. Based on a survey conducted by Cohesity and Censuswide, involving 3,139 IT and Security Operations (SecOps) decision-makers from eight countries, this report sheds light on the significant gaps between perceived and actual cyber resilience capabilities.
Survey Demographics and Scope
The survey, conducted in June 2024, covered both public and private organizations across several countries:
United States: ~500 respondents
United Kingdom: ~500 respondents
Australia: ~500 respondents
France: ~400 respondents
Germany: ~400 respondents
Japan: ~300 respondents
Singapore: ~300 respondents
Malaysia: ~200 respondents
Participants were evenly split between IT and SecOps professionals, providing a comprehensive overview of the current cyber resilience landscape.
Key Findings
1. Overestimation of Cyber Resilience
A striking revelation from the survey is the overestimation of cyber resilience capabilities among organizations. Only 2% of respondents indicated that they could recover their data and restore business processes within 24 hours of a cyberattack. This starkly contrasts with the confidence expressed by nearly 4 in 5 (78%) respondents in their organization’s cyber resilience strategy.
2. Ransom Payments: A Growing Concern
The willingness to pay ransoms has become alarmingly common. Approximately 75% of respondents indicated their organization would pay over $1 million to recover data and restore business operations, with 22% willing to pay over $3 million. In the past year, 69% of respondents admitted to paying a ransom, despite 77% having policies against such payments.
Slow Recovery Times
Recovery times reported by organizations reveal significant vulnerabilities:
Only 2% could recover within 24 hours.
18% could recover within 1-3 days.
32% required 4-6 days.
31% needed 1-2 weeks.
16% would need 3+ weeks.
These recovery times fall short of the targeted optimum recovery time objectives (RTO), with 98% aiming for recovery within one day and 45% targeting within two hours.
4. Insufficient Data Privacy Compliance
Just over 2 in 5 (42%) respondents claimed their organization could identify sensitive data and comply with applicable data privacy laws. This indicates a significant gap in necessary IT and security capabilities.
5. Zero Trust Security Deficiencies
Despite the availability of effective security measures, many organizations have not adopted them:
48% have not deployed multifactor authentication (MFA).
Only 52% have implemented MFA.
Quorum controls or administrative rules requiring multiple approvals are used by 49%.
Role-based access controls (RBAC) are deployed by 46%.
These deficiencies leave organizations vulnerable to both external and internal threats.
The Escalating Threat Landscape
The survey underscores the increasing threat of cyberattacks:
In 2022, 74% of respondents felt the threat of ransomware was rising. By 2023, this figure rose to 93%, and in 2024, it reached 96%.
Two-thirds (67%) of respondents reported being victims of ransomware in the past six months.
Industries Most Affected
The report identifies seven industries that have been hardest hit by cyberattacks:
IT & Technology (40%)
Banking & Wealth Management (27%)
Financial Services (27%)
Telecommunications & Media (24%)
Government & Public Services (23%)
Utilities (21%)
Manufacturing (21%)
Areas of Critical Concern
1. Confidence-Capability Paradox
The disparity between confidence in cyber resilience strategies and the actual capability to execute these strategies effectively is evident. While many organizations have a cyber resilience plan, their ability to recover quickly from attacks lags significantly behind their goals.
2.  Rampant Ransom Payments
The prevalence of ransom payments, often in contradiction to organizational policies, highlights a reactive rather than proactive approach to cyber resilience. The financial impact of paying ransoms extends beyond the immediate cost, affecting downtime, lost opportunities, and reputational damage.
3. Zero Trust Security Deficiencies
The failure to implement robust data access controls like MFA and RBAC poses a significant risk to organizations. Effective security measures are essential for protecting critical data and ensuring business continuity.
Recommendations for Improvement
To address these critical issues, the report suggests several actionable strategies:
Engage in rigorous testing, drills, and simulations to ensure the effectiveness of backup and recovery processes.
Sign up for ransomware resilience workshops to enhance cyber incident response capabilities.
Automate testing of backup data to verify integrity and recoverability without manual intervention.
Maintain detailed documentation and recovery playbooks to ensure all stakeholders understand their roles during an incident.
Conclusion
The Global Cyber Resilience Report 2024 that was commissioned by Cohesity highlights the urgent need for organizations to bridge the gap between their perceived and actual cyber resilience capabilities. By identifying and addressing these vulnerabilities, organizations can enhance their ability to recover from cyberattacks and protect critical data, ensuring a more secure and resilient future.
The comprehensive data and insights from this report serve as a crucial resource for IT and SecOp professionals aiming to strengthen their cyber resilience strategies and safeguard their organizations against the evolving threat landscape.
0 notes
adeelseo · 1 year ago
Text
Incfile login
1 note · View note
crazy-hazy-sims · 3 months ago
Text
Hey everyone it seems there a malicious individual trying to hack the sims cc community again and fill it with malware you need to stay vigilant as a creator and a downloader so
i have some tips for both to stay safe while downloading:
1- sims cc file extension is always .Package never download anything that is .exe
2- do not auto unpack zip files and rar files into your mods folder directly, open each zip or rar individually check the file extensions and drag them to your mods folder one by one
3- the only mods that have a .ts4script extension are ones that affect gameplay or how the game works, understand that if you are downloading cas or bb items you shouldn't have a .ts4script file
4- if you are downloading gameplay mods that do have .ts4script make sure that A) the creator hasn't announced on their pages that its infected B) you are downloading from a link provided by the creator of the mods themselves not something off of google or a link you got sent and make sure dates of upload match dated of announcements
5- if the mod or cc creator has retired and hasn't posted for a while LOOK AT THE DATES OF THE UPLOAD if it has been "updated recently" after the creator has left the community its most likely re-uploaded by a hacker and infected
6- download mod gaurd by Twisted mexi and keep it updated and keep your windows defender or malware detector Program up to date and always running do not disable it
7- make sure everything you download comes from a direct link from the cc creator, in this day and age do not trust link shortners, adfly, linkverse, etc get the universal bypass extension and ublock extension to stay safe but genuinely NEVER CLICK ON THOSE no matter how much the creator reassures you its safe it. is. NOT.
8- this is more of a general saftey precaution but, create a system restore point weekly before you run the game with new mods that way if anything happens you could have a chance to restore your windows to an earlier date before you downloaded anything.
9- BACK UP YOUR SHIT im serious right now either weekly or monthly put your files somewhere safe like a usb a storage card a hard drive even an online cloud if you dont have any of the previous.
10- files you should back up are your media from games and media everything else, any mods, games saves, work files, passwords, saved bookmarks, any documents txt files word files pdfs, links you saved, brushes or actions for Photoshop if you have any, any digital bills or certificates if you have any, and keep a physical list of all programs you have installed and where you installed them from
11- turn on any 2 factor authentication and security measures for any account you have
12- google and firefox have the option to check your paswords and emails against any data leaks USE THIS FEATURE and change any leaked passwords
13- regularly check your logged in sessions to make sure all the logged in devices or computers are yours and log out any that aren't and any old devices or unused sessions do this for every website and app you have an account on if available
14- change your passwords often. I know this is a hassle i know its hard to come up with new passwords but changing your passwords every few months will help you against anything mention previously that wasn't detected.
15- and as a cc creator check your cc and the accounts you host cc on and its uplaod and update dates make sure nothing has been changed without your permission :(
16- generally try not to get swept up in the "i must get it" fever you do not need to "shop" for mods weekly or monthly you do not need to download everything by that one creator you do not need to download new cc everytime you want to make a sim, im guilty of this so i know how hard it is to resist but take a breath and think "do i want this or do i need it" before downloading.
These are prevention methods i cant claim they are 100% will prevent any hacking but its better to be safe than sorry and these do keep you safe so
Brought to you by someone who has had their laptop ruined and data leaked from downloading cc once upon a time
3K notes · View notes
aliasgarabbasbhai · 1 year ago
Text
How Can You Check Your Digital Document’s Authenticity?
Tumblr media
The new normal, rise of remote and hybrid work models, and widespread penetration of the Internet have ushered in the digital era of documents. As more and more businesses and organizations are moving away from paper-based documents or digitizing their existing records, it’s necessary to check if the digital document you have is authentic.
Admittedly, a digital document is eco-friendly, costs less, and doesn’t require copious amounts of real estate to store unlike their paper contemporary, but they are vulnerable to targeted attacks. This means digital documents can be hacked, forged, and altered easily by someone who has the know-how and isn’t afraid to take risks.
In this scenario, it becomes difficult for you to decide if the document you have is original or a tampered version? Worse, what if the presented document digital is fake? Fortunately, there are several methods you can employ to check the authenticity of digital certificates, aka verifiable credentials.
What is a Digital Certificate?
Before we get into the methods you can use, it’s important to understand the meaning of a digital certificate. A digital certificate is similar to a regular digital document. The key difference is this document is hosted on the blockchain. It also follows the guidelines laid down in the Verifiable Credentials Data Model 1.0 by the World Wide Web Consortium (W3C).
Based on its association with blockchain and the data model rules, the document is tamper-proof, can be verified by machines, and uses privacy-enhancing technologies, like decentralized identifiers (DIDs). This is all well and good, but how can a digital certificate prove authenticity?
4 Ways You Can Check the Authenticity of Your Digital Documents
Here are the four ways you can check the authenticity of your digital documents:
1. Verify the Document’s Digital Signature
Digital documents are signed to authorize the information presented and help build trust in the document. Think of them as regular signatures, but more secure and binding. They use popular digital signature protocols like the DSA (digital signature algorithm).
That being said, this type of signature isn’t exempt from fraud. So, how can you verify the document’s digital signature? Look for two key elements in a digital signature to verify its authenticity, including:
Pairing of private and public keys: Since the digital signature certificate is hosted on a blockchain network, it uses public and private keys for signature. Basically, the issuer uses their private key to securely sign a verifiable credential, whereas the public key is shared with the holder or public (in case a lot of people need to access the secured document). Unless the public key matches the private key, no one can decrypt the encrypted message.
Hash code: When the issuer cryptographically signs a document using their private key, a hash code (containing letters and numbers) is generated based on the document’s content. Ultimately, this code is encrypted using the signer’s private key for the development of a digital signature.
These two elements are your guide to verifying the authenticity of your document. The first step is to match the public key with the private key. If a public and private key don’t match, that’s a definite red flag.
The other option is to compare the hash code. A receiver generates a new hash code for the received document when they decode it. This generated hash code should match the hash code generated during signature. If the code isn’t exactly the same, it could be indicative of a tampered and fake document.
2. Check the document’s metadata
A document’s data can often be found in its metadata (the data about data). The metadata will offer details regarding the document’s content, origin, history, and more. The data is your map to explore the hidden paths of the document and learn all about it. You just need to know where to look and be patient while going through the data.
To illustrate, if you want to check the document’s authenticity, you might want to check how it was created and dive deep into the licenses and rights of the document. So, to discover all this information about the document, you’d want to check its administrative metadata. You might also be interested in checking the location of where the document was created. If yes, look for the document’s geospatial metadata.
But if you are more curious about the document’s creator, keywords, its title, and more, you’d get your answers by exploring the descriptive metadata. Similarly, structural metadata will cover details on the document’s structure, like pages, sequence order, chapters, and more.
Simply put, all the data about the document is already there, you just need to exercise patience and go through it with a fine-toothed comb so you don’t leave any interesting crumbs behind.
3. Authenticate the document’s hash value
A document’s hash value is akin to its digital fingerprint. Just like no two fingerprints are the same, no two hash values are the same (though there might be some exceptions). This is mostly because a hash value, a fixed character string of letters and numbers, is generated solely based on the document’s contents.
When secured on the blockchain, the hash code is submitted on the network, too. This makes the hash value immortal. Here’s the kicker: Whenever someone makes a change to the document (think a change as miniscule as a grammar Nazi removing or adding a comma), its hash value changes inexplicably.
This property makes the hash value a game-changer in the world of document security. For instance, when you send a document to a receiver, you just need to provide the original hash value to the receiver. The recipient will then recalculate the document’s hash to ensure it matches the issuer’s. If it doesn’t it’s a clear indicator of a tampered document.
Most blockchain-based document security platforms use the SHA-256 (secure hash algorithm-256) to secure and tamper-proof documents.
4. Examine the document’s digital trail
A digital trail is akin to a document’s history. Think of this exercise as checking a Google Doc’s history. So, basically examining when the document was created and by who. Further, when and how it was edited and who contributed to the edits. This adds another layer of security to the document.
However, this feature isn’t available for all digital documents. This is mostly provided by blockchain security solutions, like ProofEasy, that want to build a digital fortress around all documents and ensure you know exactly what’s happening with your document.
Keeping track of the digital trail will help you stay on track and check if the document has been altered or tampered. It’s important to note that an original document stored on the blockchain can never be altered because whenever you edit it (even if you’re the issuer), a new hash value is created for the document.
So, you’ll always be in the know when a document is altered or tampered with. An absence of a digital trail will also help you identify fake documents and keep your business secure against fraudsters.
Generate Authentic Documents on ProofEasy
ProofEasy is a blockchain and QR code solution that helps secure existing documents and securely issue new documents. The best part, though? You’ll always be in charge of your documents. All you have to do is go to the unified dashboard to keep track of all your documents and manage them.
The cherry on top is the budget-friendly pricing of the solution. But you don’t have to commit to anything until you’re 100% ready. So, why don’t you take ProofEasy for a spin? Simply sign up on the platform to start your free trial. No credit card details are required.
0 notes
saywhat-politics · 3 months ago
Text
A U.S.-born citizen was arrested in Florida on Wednesday and charged with illegally entering the state as an “unauthorized alien.” Twenty-year-old Juan Carlos Lopez-Gomez was detained for a day at the request of the U.S. Immigration and Customs Enforcement, despite his mother producing his birth certificate and Social Security card at a court hearing.
Leon County Judge LaShawn Riggans inspected the birth certificate during a court hearing on Thursday, confirmed it was “an authentic document,” and said she found no probable cause for the charge, the Florida Phoenix reported. But a state prosecutor said that because ICE had asked the local jail to hold Lopez-Gomez, the court did not have the authority to grant his release.
302 notes · View notes
caoimhewritesfics · 2 months ago
Text
Vacation
I was just on vacation and it got me thinking about how TF 141 + König act on vacation with you so here's some headcanons
CW: None
WC: 669
Tumblr media
Ghost isn't really the kind of guy to go on vacation. He's a "stay at home and relax" man, enjoying the short amount of time he gets at home with you. "I'm always off on deployment, I don't understand why I would use my time at home to just ship myself off somewhere else," he always says. You're in disbelief when you finally manage to convince him to actually travel anywhere farther than the couch with you. He won't complain though, he'll feel too guilty if he does. So, he begrudgingly putters through the airport with you. Amusement parks are a big no for him. Too many people, long lines, overpriced food? Yeah he'll pass. But, if you take him somewhere quiet and peaceful, he'll love it. If he can sit around reading his books or window shopping in a small rural town, he'll be on top of the world.
König HATES planes. Being 6'10 makes the small spaces difficult. So, expect to be on a train or something much less cramped to get to your destination. He loves to hike and he's very intense about sunscreen use. Expect for him to be making sure you reapply it every two hours and no swimming until it's fully soaked in. Loves going to remote places with a small bed and breakfast. He'll be up early as usual, activities planned out in extreme detail. He has a detailed itinerary of every day. The breakfast is always set at exactly the same time, and he already has a map of the trails you’ll explore that day, marking spots along with estimated times of arrival. He likes to make the hikes an all day activity so he packs plenty of snacks for when you're out so you don't get hungry.
Price is an airport dad. He will make sure you're there several hours early. By the time you get to the check-in counter, he’s already double-checked your boarding passes, your IDs, and even your luggage tags, just in case. You’ve barely made it past security, and he’s already on the phone with the airline, double-confirming the gate and asking the attendant how early they’ll start boarding. He’s acting like he’s planning a military operation. He's basically power walking through the airport to your gate. While you’re busy teasing him, he’s already five steps ahead, securing the perfect spot to sit near the gate, ensuring you’re in an area that’s both close enough to the restrooms and far enough from the crowds. You can’t even get to your seat before he’s asking if you’ve got your passport, your phone, your charger, your headphones, he even offers you a neck pillow.
Gaz is really into the local scene. He spends weeks prior to your trip researching non-tourist spots that locals love. He says he wants an "authentic travel experience." He doesn't really go for the thrill seeking activities, he's much more of a city explorer. He's really into a chill vacation where he can just spend time with you exploring a new place. He's so organized that the whole trip goes smoothly. He has all the documents like passports, plane tickets, ID"s on hand at all times. Takes pictures of EVERYTHING. He loves to make them "artsy". Once you get home he's getting the pictures printed and putting them in a special photo album.
Soap is over the moon when it comes to vacation. He loves a good trip. He's down to go anywhere and do pretty much anything. If you want to go to a fancy resort and just sit by the pool he's more than happy, but if you want to go on a wilderness retreat he's all for it. Loves an amusement park. Even if it's crowded and the lines are long he's still having a great time. He would love trying all the different foods that are in the park. Much like Price, he is an airport dad all the way. He's the most prepared person in that airport (besides Price).
145 notes · View notes
soapoet · 2 years ago
Text
What are you like as a spouse?
Tumblr media Tumblr media Tumblr media Tumblr media Tumblr media Tumblr media
requested by anon.
like & rb if it resonates ♡
01.
Shufflemancy: Stay with me by Anson Seabra
As a spouse you are a little territorial. You trust your partner, but everybody else is under your careful scrutiny. You very easily pinpoint weeds in your garden, and pull them out root and stem swiftly. Your spouse can rely on you to be on the look out for all sorts of dangers, big or small. Security is of great importance to you, both regarding your relationship and your loved ones, and yourself. Perhaps less so yourself, as you seem to have an instinct to protect which sometimes overrules your own safety. You could relate to the knight archetype to some extent, the concept of serving and protecting. There is an intensity to your love that is like a fine wine, and simply intoxicating to your partner. You're akin a guard dog; out in public you are an intimidating presence ready to bark and bite should need arise, but behind closed doors your service is paid for in tender love and care and you melt when your partner dotes on you. And your spouse adores this duality in you, dominance and submission merged into one.
You're observant, and pay careful attention to your partner's wants and needs, and this lends itself to both an intuitive understanding and awareness of your partner's feelings and the shifts that occur, and makes you a great gift-giver too. You're also a great example of the "girlfriend effect" (regardless of gender) because you encourage your partner's authentic self expression and help them daringly try new things, style wise but also in general. It is safe for your partner to take leaps of faith in career and other matters that may come with risks, because you stand watch and are always there to catch them should they fall. It's possible that you're a late bloomer, or have a series of tumultuous relationships before finding your person, which leads you to take things slowly, desire clarity, and develop effective communication skills to avoid misunderstandings with your spouse. You have a deep need for emotional support and reassurance, so your spouse is somebody who you can truly trust and feel the ground sturdy and secure beneath your feet in their presence, and find shelter and comfort in their arms when you need it.
For some, the term spouse is used loosely, as formal marriage may not be of interest to you if you have any qualms regarding tradition, or simply prefer the intimacy of privacy. Some could opt for court house marriage with a lowkey get together with loved ones at a later date, and others none, and simply commit as life partners without legalities or traditions taken into consideration. If marriage does occur, it's likely to happen later once career matters are stable.
If you and your partner have children, you are your child's biggest cheerleader and encourage any interests of theirs, fuel their passions and show up to their activities to support them. Strong likelihood of children who are outcasts of some sort, deemed strange by their peers, bullied, could be neurodivergent, queer, or otherwise experience difficulties growing up, which you are uniquely equipped to handle and care for. Some in this group may simply decide to have no children of their own, or consider fostering as an alternative, but could otherwise deal with children, especially the unfortunate, in their community or on a larger scale in society.
Additional details: oddly specific spotify playlists, swords and daggers, rpgs, tarot, history, psychology, the moon, moths, wolves, pirates, red or purple lips, cherries, citrus fruits, birthday dinner, makeovers (self or room idk??), emails, documents, nintendo, tattoos, kuromi, donuts, fairs or theme parks, escape rooms, the nightmare before christmas, wednesday and the addams family, fate: the winx saga, euphoria, purple, chai, scorpio/aries/aquarius/gemini, saturn/mars/moon/lilith, april/march/november/december.
02.
Shufflemancy: This side of paradise by Coyote theory
As a spouse you are a breeze. A gentle caress of the sea blowing through your spouse's hair on the beach. You're a little bit of an old romantic, and may have an affinity with the classics or period dramas. You enjoy simplicity and peace, breaking bread at the kitchen table and quality time simply spent in the vicinity of your dear. Merely cooking together can be an adventure, as can the clean-up. You're attentive and try to be both a good friend and lover to your spouse. Resting your head on their lap and enjoying the silence, the act of nesting behind closed doors appeals to you, but you're partial to little getaways too just the two of you, slipping away somewhere near or far to see what you may find and get up to.
Physical closeness is important to you, but it is not possessive, suffocating, or clingy, but gentle and warm like a shelter from the storm. Your marriage is airy and light, and even the ceremony that got you to this point may be very cozy and intimate, invites sparce and spaces dimly lit. It's a very solitary life that you lead, with little socialising outside your little bubble. Contact seems restricted to only family and a couple of long-time friends and little else. You could even choose to live in the countryside or farther from the hustle and bustle of lively cities.
Should you have children, you are a very involved parent, as is your spouse. Messes are happy accidents and you emphasise comfort and peace in your child, and encourage them to make good friends, and you may very well come to consider your children's friends bonus children who can trust you as safe adults when they have nowhere else to turn to. Neither of you are very hard on your children, and do not mind if they don't succeed at everything so long as they try and have direction all within themselves. You're forgiving and patient, both with your spouse and children. You would do particularly well raising a child of the opposite sex, masculines doing well at raising feminines and vice versa.
You may take longer to feel ready to date in general, or due to circumstances or personal issues have a delay in romance, but once you do stumble upon love, commitment is sure and stable and long-lasting. Many are likely to marry their first love or first serious partner, and others could experience the classic friends to lovers arc that slowly blossoms but then remains in bloom forever if cared for.
Additional details: paper planes, strategy and simulation games, chess, archeology, history, cartography, geography, museums, genealogy, family events (dinners, birthdays, weddings, baby showers, funerals), babysitting, cats and mice, twitch, youtube, memes, news, acoustic guitar, green, lotus flowers, blankets, sweet tea, conventions, comics, anime, cartoons, arts and crafts, sticks and stones, seaside, countryside, camping, hiking, road signs, numbers, dirt roads, pine trees, virgo/aquarius/cancer/libra, mars/sun/neptune/ascendant, january/march/july/september.
03.
Shufflemancy: Somebody to you by BANNERS
As a spouse you are quite the little ray of sunshine, but also the sudden gust of winds of change. You are collaborative, and may serve as either the artist or the muse. Both, perhaps, as there is inspiration being exchanged between you and your spouse like sparkling water shared between two cups, clear and fizzy, as sharp as it is delightful and refreshing. You're enthusiastic and cheer your spouse on, loud and proud, supporting them in their trials and assure they have your arms to run into when they return with their accolades and treasures. You may easily get flustered, and try to avenge your spouse by attempts to charm and woo them in return, even if just to wipe the smug smile off their face as their bask in the glory of making your little heart flutter.
You may be a little needy, or quick to feel discouraged, but you're just as easily brought back to your feet with kind and reassuring words and helpful hands. You try your best to make yourself useful even in situations that are new to you, especially if your partner could use the help. You're able to laugh at yourself, but also communicate when the stumble actually hurt so that your spouse can kiss it all better. Regardless of your age, you will retain a youthful air about you, which will keep things interesting as you always find new adventures and things to share.
If you have children, you'll let them grow in whichever direction they best find the sun and rain to bloom in their time and their way. You love your freedom, and want to bestow it upon your child too, who will grow up to be very close with you and consider you a great friend and trusted confidante with whom they may share all their joys and sorrows without judgement. Some of you may not have children and instead raise fur babies, travel the world with your spouse, or create an alternative kind of family of misfits and kindred spirits amongst your peers.
You are very bubbly and sociable, and eagerly introduce your partner to your friends and make merry with theirs. You could really rejoice in the merging of your individual friend groups for the sake of building a community to call home. You enjoy exchaning favours, and have the mindset and desire of managing tasks between both you and your spouse and your community so that different strengths get utilised to combat defeat should somebody have to face big challenges they're not equipped to handle. So, though you may be called chaotic from time to time, you're still a good taskmaster and collaborator, who does not keep score, and manage your spouse and groups of people well even though things aren't colour coded and organised from A to Z.
Additional details: daydreaming, dream journals, streaming, paperwork, paint, coffee stains, red and blue, strawberries, avocado, live chat, chopsticks, van or camper or truck, packages, identity crisis, illness/medicine, learning, waiting, theatre, pets, money, siblings or cousins, slurpees, sushi, suburbs, small towns, interviews, phone calls, sneakers, broken windows, kpop and jpop, manga or manhwa, lore, toys, polar bears or bears in general, empty playgrounds, twitter/x, instagram, lost and found, wooden trinkets, herbs. capricorn/sagittarius/leo/pisces, jupiter/venus/uranus/vesta/chiron, march/june/august/october.
04.
Shufflemancy: Dandelions by Ruth B.
As a spouse you seem to be a jack of all trades, the scales of justice perfectly balanced. Your diligence and the ease at which you tackle tasks, the perseverance you show despite life's challenges, and how you always get back up again when you get knocked down, all makes you a wonderful partner. You are goal-oriented, but know when to slow down and relax. You push your partner to chase their dreams, but know not to push too hard and when to offer up comfort and quiet reassurance instead.
You may have a little bit of a saviour complex, as you pride yourself in both your ability to help and your emotional intelligence. You are patient, and know that in life there is no such thing as a one-size-fits-all, and you're uniquely able and willing to find missing pieces of puzzles so that everybody finds what works for them, and will be a healing presence to your spouse especially. Your spouse finds you to be a rock, but let's not kid ourselves and pretend you don't melt like butter when they pull you close and tell you to relax, and lull you to sleep with a heartbeat and fingers running through your hair. Your spouse is well aware of how hard you work and how heavy the burdens on your shoulders sometimes become, and insist that you are no Atlas, at least not in the sanctuary you call home where you may rest and recharge.
Should you have children together, you may settle into traditional or otherwise clearly defined roles and assure neither of you take on too much and both get to be involved in the life of your children to an equal extent. You're likely the problem solver and the one to help with the homework, and deeply encourage active and social pursuits to ensure your children grow up healthy and experience relationships with people of all walks of life. With the combination of you and your spouse, your children are likely to grow up gentle but quick to defend the underdogs and fight injustice. Assuring your children have access to options and opportunities as well as a safety net to fall back on should it be needed is something you will both make sure of. Note that this is the only group I have no alternatives for and sense no absence of children, so ¯\_(ツ)_/¯ if you really do not want children, take double or triple the precautions.
You may enjoy home improvement or possibly have either you or your spouse working from home. You delegate responsibilities fairly and make consistent efforts to show your spouse your care and affection, especially through acts of service and the kindest of words when they are at their lowest. Though you are responsible and often do things by the book, there is a little streak of mischief and wanderlust that I sense, which keeps things interesting, making you a balance between homebody and explorer. You may have great banter with your spouse and frequently tease each other.
Additional details: car rides, crying, nerves, vhs tapes, siblings, young people, writing and rewriting, praise, headbands, flannels, glasses, family issues, guardian angels, cleaning, mermaids, rodents, deer, letters, arguments, flowers, office (work or the show idk), radio station, static, noise, real estate, architecture, mushrooms, pickles, salads, sleepless nights, muscle pain (or strain), sleepless nights, sleeping on the couch, glasses, hair cuts, lilies and elderflowers, soap, hugs and hand holding, patience, reluctance, overcoming fear, hearing music from another room, virgo/cancer/capricorn/aquarius, pluto/sun/venus/juno/union, june/august/october/november.
05.
Shufflemancy: Slow dancing by Aly & AJ
As a spouse you like to be in charge, or wear the pants, so to speak. Somebody has to tell the waiter your spouse asked for no pickles, right? Though you have a dominant energy about you, you are very nurturing and full of love and care and can be surprisingly sensitive emotionally. You like to stay on top of things and have things to do, places to be, and you could serve as something of a secretary in your relationship. Your spouse can always rely on you to know what to do and to get the Christmas cards sent out on time. You have a taste for the finer things in life and enjoy indulging in these together with your spouse. You likely introduce your spouse to many new things, be it music, literature, politics, foods, or some lifestyle and habits you maintain.
You revel in the quality time spent with your spouse, though you're independent and encouraging of them living their life separate from yours too whilst you engage with your own endeavours. You are secure and loyal, and give your spouse no reason to doubt your commitment and you speak as highly of them as they of you, so shenanigans and misfortunes stay at bay. You may have only few but close friends, but keep them for life and they enjoy the company of your spouse. You may frequently host dinner parties or other intimate get togethers in your home with the few privileged to know the two of you.
As a parent you would raise well-mannered and good children, to whom you would teach many of your own talents and push them to hone and master their own abilities and take both their interests and responsibilities seriously. You have a close bond with children even if you do not have them, which for many may be the case, and you could instead together with your partner be very involved with the children of your friends or family and serve as godparents or the cool aunts/uncles. You may still teach these children valuable lessons and be an important adult figure in their lives, and possibly lend your talents to teach them new skills.
You may also work with your spouse, be it through a mutual or related field, literally sharing the same workplace, or by joining up to start a business together or works as collaborators on separate passion projects. You're highly encouraging of them and push them to pursue their goals and even wildest dreams because with you in their corner there aren't many places in the world they couldn't go.
Additional details: co-op games, cookbooks, bullet journals, weddings, calendars and memos, perfect timing, awkwardness, dogs and canines in general, horses, rapunzel, children, phone calls, electric guitars, drums, men and fathers, streetlights, stalking, power outages, doctor's appointments, pedagogy or social work, education/school, stage fright, long distance travel, reunions, road trips, ice cream, spicy food, alcohol, orange and pink, pearls, grapefruits and blood oranges, hot chocolate, lgbt+, anxiety or depression, archery, sleepovers, libra/taurus/leo/cancer, mars/mercury/pluto/descendant, april/may/october/december.
06.
Shufflemancy: Comethru by Jeremy Zucker
As a spouse you are a natural in many ways, even, or especially if, you worry that you aren't. To your spouse you are a very nurturing and compassionate, gentle lover, who is intuitive and always seems to know the right words that they need to hear or the moment to hug them from behind and press your head against their tense and tired back. You dedicate yourself to being a source of light to your spouse, and tend to be quite romantic, albeit you get shy and blush even decades into the marriage when they return the sentiment. You learn quickly to express boundaries and communicate your needs to your partner if that has been a struggle in your past as they make a big effort to make sure you make your voice heard. You carefully consider their feelings, as they consider yours. You could as a couple have an almost telepathic connection, an inherent understanding and the blue print of each other's soul, knowing each twitch and micro-expression to know when the other requires assistance or wishes to leave a situation, etc.
You may find the role of a homemaker ideal, though you aren't without your own ambitions and occupational ideals. You could for a time be a stay-at-home spouse, or parent, but simultaneously engage with your own projects and end up working from home. You really make home feel like home, and your spouse finds relief and peace every time they return home. You have an eye for aesthetics and a way to make any space feel cozy, inviting, warm, and comfortable. Even though you are more of a homebody and like the solitude, your friends may rejoice in their visits and feel at home in your house and you could occasionally agree to host bigger holidays in your home, because really, nobody does Christmas like you do.
You are very clever and learn quickly, and your curiosity takes you on quite a few adventures in just one afternoon, and you enthusiastically share these wonders with your spouse and coax out their own adventurous and speculative side. You could spend hours talking and never seem to run out of things to speak of, but also find comfort in enjoying the silence. You're affectionate and like to be close to your partner, but eventually slip away as your mind begins to wander and take you in different directions. You have a youthful and ever-curious energy that your spouse delights in.
As a parent you would truly dedicate yourself to parenthood and rejoice in even the little steps and achievements of your little ones. You are doting, but not a doormat and find that your children trust and respect you without being told or taught to. You encourage your children to think for themselves because you value logic as much as feelings. Good reasoning skills and the ability to judge things on a case by case basis is something you will instill in your children. Your children are likely to grow up very independent and just the right balance of kind and clever to be an asset to society. Both you and your spouse share a deep distaste for the state of the world and are dedicated to raising children who know wrong from right and don't blindly follow anyone or anything and have the wires between head and heart connected. You and your spouse may both do a lot to improve your community and work to eventually leave the world better than how you found it.
Additional details: tears, keys, incoming text messages, psychiatry, therapy, home, teaching or writing, good luck, headaches, cramps, horror movies, haunted side of youtube/tiktok, conspiracy theories, stim toys, minecraft, rabbits, birds, cats, hoodies, grey and blue, energy drinks, vitamin water, winning, brownies, pancakes, soup, winnie the pooh, lion king, 2000s cartoons/music, fuzzy socks, beaded curtains or string lights, green or hazel eyes, candles, intuition, dust, sleet or snow, cold/grey/dreary weather, iron and vitamin d deficiency, water colours, astrology, vanilla or coconut scent, bubble baths, gemini/cancer/virgo/scorpio/libra, jupiter/neptune/moon/lunar nodes, february/may/june/october.
2K notes · View notes
victusinveritas · 2 months ago
Text
Tumblr media
This morning former Director Jon Jarvis made this statement about recent events involving the National Park Service:
"I have been watching the Trump administration trying unsuccessfully to suppress the National Park Service with a mix of pride and amusement. The NPS is the steward of America’s most important places and the narrator of our most powerful stories, told authentically, accurately, and built upon scientific and scholarly research. The Park Ranger is a trusted interpreter of our complex natural and cultural history and a voice that cannot be suppressed. Edicts from on-high have directed the NPS to not talk about “national policy”, but permission is granted to use social media for visitor center hours and safety. The ridiculousness of such a directive was immediately resisted and I am not the least bit surprised. So at Martin Luther King Jr. National Historic Site in Atlanta should we not talk about his actions to secure the rights to vote for African Americans in the south, or is that too “national policy”? At Stonewall National Monument in New York City, shall we only talk about the hours you can visit the Inn or is it “national policy” to interpret the events there in 1969 that gave rise to the LGBT movement? Shall we only talk about the historic architecture of the Washington, DC home of Alice Paul and Alva Belmont or is it too “national policy” to suggest their decades of effort to secure the rights of women can be linked directly to the women’s marches in hundreds of cities last weekend? And as we scientifically monitor the rapid decline of glaciers in Glacier National Park, a clear and troubling indicator of a warming planet, shall we refrain from telling this story to the public because the administration views climate change as “national policy”? These are not “policy” issues, they are facts about our nation, it is how we learn and strive to achieve the ideals of our founding documents. To talk about these facts is core to the mission of the NPS. During the Centennial of the National Park Service, we hosted over 300 million visitors (now that is huge) to the National Parks and most came away inspired, patriotic and ready to speak on behalf of the values we hold most dear. The new Administration would be wise to figure out how to support the National Park Service, its extraordinary employees and their millions of fans."
104 notes · View notes
lanaroff · 3 months ago
Text
House of Broken Hearts- Chapter 14
Paring: Wanda Maximoff and Reader
Tumblr media Tumblr media Tumblr media
The ride to D.C. is quiet.
You sit in the back of the car, sandwiched between Wanda and Natasha, your hands clenched together so tightly that your nails bite into your palms. The file Sharon gave you rests in your lap like it weighs a thousand pounds. Inside it are months of her work—intel, surveillance, intercepted communications. The kind of evidence that should clear your name. That should be enough.
But you’ve seen how truth doesn’t always matter.
Wanda’s fingers graze your knuckles, her thumb brushing gentle circles into your skin. It’s the only thing keeping you tethered right now. You glance sideways and find her already looking at you, her expression soft but stormy—love in her eyes, yes, but rage too. She doesn’t want you to go in there. Not alone. Not without her.
And you’re not. She’s not letting you do this alone.
By the time you get to the federal building, your heartbeat is so loud in your ears it feels like static. You’re ushered through the cold marble halls with stern faces and too many armed guards. It’s not an official arrest. Not yet. But it might as well be.
They lead you into a sterile, windowless conference room. There’s only one person waiting inside.
General Thaddeus Ross.
He doesn’t stand when you walk in. He doesn’t offer you a seat. He barely looks up from the folder in his hands.
“This better be good,” he says, voice clipped, already full of disdain.
You sit slowly, back stiff, eyes flicking to the security camera in the corner. Wanda remains standing behind you. She’s not sitting. Not for him. She crosses her arms, eyes never leaving Ross.
You clear your throat, even though your voice is already shaking. “I came to explain—”
“I don’t want your explanations,” Ross cuts in. “I want to know how a former Avenger, one we trusted with our nation’s most classified intel, ended up feeding information to HYDRA.”
“That’s not what happened,” you say quickly, trying to keep your voice steady. “I was undercover. I was working under Fury’s directive.”
“Fury,” he says with a scoff. “Convenient, isn’t it? The one man who could verify your story suddenly vanishes into thin air?”
“I have proof.” You slide Sharon’s file across the table. It takes everything in you not to flinch when your fingers brush the cold metal. “This is intel gathered during my mission. HYDRA infiltrations, safe houses, names. Some of these operations have already been dismantled based on this data.”
Ross flips the folder open. His eyes skim the documents, but you already know he isn’t really reading. He’s waiting. Waiting to tell you you’re lying. Waiting to watch you fall apart.
After a long silence, he closes the file slowly. “Looks authentic. Hell, maybe it is. But I’ve seen fakes better than this. You could’ve staged all of it.”
“I didn’t—” you start, but your voice breaks, and you shut your eyes tightly.
Ross leans forward, voice low and cold. “You think a sob story and a few stolen files are going to erase everything? Your face has been on our watchlist for six months. The public wants blood. And unless Fury walks through that door with a miracle, your future’s already written.”
Something in you shatters, right there. Because you can’t bring Fury through that door. And Ross is right—without him, you’re just another ghost with a thousand secrets and no one willing to vouch for them.
You don’t notice your hands trembling until Wanda speaks.
“She’s not the one you should be questioning,” Wanda says quietly, stepping forward. “The question you should be asking is how a government you serve let this happen in the first place.”
Ross raises an eyebrow, clearly unimpressed. “And who are you supposed to be? Her lawyer? Her girlfriend?”
Wanda doesn’t flinch. She steps closer to the table, placing her hands on it and leaning in just enough that Ross stiffens. “I’m the person who will burn this country to the ground if you lay another hand on her.”
“Is that a threat, Maximoff?”
“It’s a promise.” Her voice is deadly calm. “She was tortured. Left to die. She did what she had to do to survive. While you sat here playing politics, she was bleeding for you.”
You open your mouth to stop her, to say something, but the words die in your throat. Because deep down, you’re grateful. You needed someone to see it. To say it. To not pretend it was anything less than it was.
Ross doesn’t back down, but he doesn’t interrupt again either.
“You want to accuse someone?” Wanda continues. “Accuse HYDRA. Accuse the ones who planted their agents inside your system. She’s not the traitor. She’s the scapegoat. And if you don’t clear her name, if you even think of hurting her—I’ll destroy every last inch of your precious system.”
The silence that follows is suffocating.
Ross looks at you again, but this time there’s something almost uncertain in his eyes. “You’re lucky she’s here,” he mutters, pushing the file back across the table.
“I know,” you whisper.
He sighs and finally leans back in his chair. “I’ll review the intel. We’ll run it through our analysts. Don’t expect miracles. But if your story checks out—if it really checks out—we’ll talk about clearing your name.”
You nod, but you don’t trust it. Not yet. Not until it’s real.
Wanda places a hand on your shoulder as you both stand. “We’re done here,” she says, more to you than to him.
And you let her lead you out. You let her guide you through the building, back into the light, back into the car, where Natasha is already waiting.
You don’t speak until the door closes and the engine starts.
Then it hits you all at once.
The weight. The fear. The exhaustion.
You press your face into your hands and try to breathe, but the tears come anyway. Wanda pulls you in without a word, cradling your head to her chest like it’s the only place in the world you’re safe.
“You did so good,” she whispers. “I’m so proud of you.”
You nod, but you’re not sure you believe it yet.
All you know is this: you’re not alone anymore.
And for now, that’s enough.
That night, the farmhouse settles into stillness. The wind rustles the fields outside, and the soft hum of insects echoes just beyond the open window.
You sit on the back porch alone, the stars scattered overhead like distant promises. Natasha had slipped you a secure satellite phone before retreating to bed—“In case you want to talk to Sharon,” she’d said, her voice unusually gentle.
And you did.
You always do.
You dial the familiar code, fingers trembling slightly. When Sharon picks up, her voice is soft and warm and so deeply hers that you nearly break down.
“Hey,” she says.
Your lips twitch into a small, exhausted smile. “Hey.”
There’s a pause. Then—“How did it go?”
You sigh. “About as awful as we expected. Ross thinks I made the whole thing up.”
“Of course he does,” she mutters. “He always hated you.”
You huff a dry laugh. “He hates all of us. But—Wanda was with me. And she—God, Sharon, she lost it. For me. You should’ve seen her. She stood between me and him like she would’ve burned the whole damn building down if he looked at me wrong.”
You glance down at your hand, still faintly red from how tightly Wanda had held it.
“She said things I never thought she would. Things I didn’t think anyone would say for me. Not after everything.”
Sharon is quiet for a second, then says, softly, “You didn’t think she’d still love you.”
You nod, even though she can’t see it. “I didn’t think anyone could.”
There’s a long pause. The only sound is the wind brushing against the wooden porch rail, and your breath—slow and shaky.
“But she does,” you whisper. “God, Sharon, she loves me so much. And I love her.”
You hear the crack in your voice. You don’t stop it.
“She’s been so patient. So gentle. Like I’m something fragile she refuses to break. She doesn’t push. She waits. She sees me. She’s not scared of what happened to me. She’s not scared of the mess I’ve become.”
You feel the weight of your words, the truth of them pressing against your ribs.
“I wish you were here,” you whisper. “I wish we could all be here, safe. But—” You glance over your shoulder, back toward the house. Toward the room where Wanda is. “I think I’m in a good place right now. I think she’s helping me get there.”
There’s a smile in Sharon’s voice. “She’s always loved you like that.”
You nod again, swallowing down the knot in your throat. “I just didn’t think I deserved it.”
“You do,” Sharon says, firm now. “You do. And if Wanda’s reminding you of that… then I’m glad she’s there.”
You don’t see her—but Wanda hears it all.
You don’t hear the creak of the floorboards behind you. You’re too caught in the silence after the call, in the way your own words still echo softly in your chest. The breeze has picked up now, brushing over your skin like ghost fingers. The stars above are clearer than you’ve ever seen—bright and distant and untouchable.
Your hands are in your lap, fingers loosely intertwined. You feel hollow and full all at once.
Then you hear her.
Barefoot steps.
The soft scrape of wood under weight.
You turn your head.
Wanda stands at the edge of the porch, the moonlight catching in the strands of her hair. She’s wearing one of Clint’s old flannels, sleeves rolled up, collar open enough that you can see the soft line of her collarbone, the shadow of her heartbeat.
You freeze. Your heart stumbles.
“I didn’t know you were awake,” you say softly, voice barely more than breath.
She steps closer. “I couldn’t sleep.”
You know why.
She lowers herself beside you with quiet, deliberate ease. Her knee brushes yours. She looks out at the open fields, the dark horizon, the stars that don’t care how broken you are.
“I didn’t mean to listen,” she says.
You nod, staring at your fingers. “I didn’t mean for you to hear.”
“But I’m glad I did,” she says again—firmer now. And then she turns to you, her eyes luminous in the low light, red-rimmed but steady.
“I needed to hear that you know what I see in you.”
Your breath catches.
She lifts one hand and traces the side of your jaw with the backs of her fingers. It’s not even a touch, not fully—just a ghost of one. Like she’s asking permission without words.
You lean into it. Just barely.
“I don’t know if I deserve any of this,” you whisper. “Not you. Not this peace. Not this… life.”
Wanda’s brow furrows. “You survived hell.”
You close your eyes. “I let it change me.”
She exhales sharply—like that hurt her more than anything.
“You think I love you in spite of what happened to you,” she says, “but I love you because of all of it. Because you’re still here. Because you feel. Because even with all the darkness, you still choose to love.”
You turn your face to her, and her hand cradles your cheek now—firm and sure.
“I heard you,” she whispers. “Every word. I heard how scared you were. And how much you love me. And I just… I needed to tell you this too.”
She leans in. Her lips brush yours like they’re testing the shape of your sorrow. It’s a slow kiss, tender and unhurried, but it still makes your heart race in your chest like it’s trying to claw its way closer to her.
And you kiss her back like you mean it.
Like you’re still alive.
Like that means something now.
When she pulls back, you’re breathless.
“I would’ve burned everything down in that room today,” she murmurs. “I would’ve destroyed him. If he had looked at you the wrong way… if he’d touched you…”
You press your forehead to hers. “You scared me.”
She smiles softly. “Good. He should be scared too.”
You both laugh, just a little. Just enough.
Wanda’s thumb strokes along your cheekbone, and her voice dips into something quieter, more vulnerable.
“I don’t want to lose you again,” she says. “Not to HYDRA. Not to the government. Not to the ghosts in your head. I’ll fight them all if I have to. Every last one of them.”
You nod, tears stinging your eyes. “I’m trying, Wanda. I really am.”
“I know.” She kisses your temple, slow and warm. “I see it. Every single day.”
She reaches down with one hand and threads her fingers through yours.
“Come inside,” she says gently. “Let me stay with you tonight.”
You nod again, and let her lead you inside—like she always does. Not dragging. Not pushing. Just walking beside you.
Later, when the farmhouse has gone quiet, when the lights are off and the sheets are pulled up. The only sound is the chirping of crickets outside the window and the slow, steady rhythm of Wanda’s breathing beside you in bed.
Or… was beside you.
You lie there, eyes wide open, staring at the ceiling. The sheets are soft. The pillows smell like her. Everything is safe. Everything is fine.
And yet your chest feels like it’s caving in.
The weight is too much.
You move quietly, slipping from the bed like a whisper. The wood floor is cold beneath your feet, but it grounds you. It’s familiar in a way comfort never quite is.
You settle on the floor beside the bed, pulling a pillow down with you. Your knees curl up to your chest. Your back rests against the edge of the mattress.
And just as your body begins to settle into that familiar ache of exhaustion, you hear movement above you.
The sheets rustle. A deep breath. The creak of the bed frame.
You turn your head, confused, just as Wanda climbs down beside you. She’s carrying a pillow in one hand, a folded blanket in the other. She doesn’t say anything at first, just starts arranging them on the floor with practiced ease.
Your eyebrows draw together, voice quiet, rough. “What… what are you doing?”
She settles down beside you, blanket pulled halfway over both of you, and lies on her side, facing you. Her hand finds yours beneath the covers. “I’m going to sleep.”
You stare at her.
There’s no edge to her voice. No judgment. No pity.
Just a simple truth: I’m going to sleep. Here. With you.
Your chest tightens. “You don’t have to do this.”
She shrugs. “I know.”
“But the bed’s more comfortable.”
“I know.”
You hesitate. “You don’t have to—”
“I want to.” Her voice is firm now, but gentle. “I want you to feel safe. And if this is where you sleep, then this is where I’ll be.”
And just like that, she shifts a little closer, adjusting the blanket around your shoulders, tucking it behind your back like she’s done it a thousand times.
You watch her.
She’s really doing this. No hesitation. No dramatics.
Just her. Just Wanda.
And it breaks something open inside you—something soft and aching and full of gratitude.
You scoot closer. Not thinking. Just feeling.
You wrap your arms around her and bury your face into the curve of her neck, holding her tightly. Desperately. Like you might fall apart if you let go.
She exhales shakily and wraps her arms around you just as tight, her fingers stroking the back of your head.
The silence between you stretches long and warm.
You whisper into her skin, “It’s just for tonight.”
She laughs softly, low and full of affection. “Sure it is, sweetheart.”
You smile.
And for the first time in so long, the dark doesn’t feel like it’s trying to swallow you whole.
Because she’s there.
And you don’t feel alone anymore.
Tag list: @seventeen-x @womenarehotsstuff @redhoodte @ayrtonwilbury @justyourwritter69 @casquinhaa @womenarehotsstuff @justarandomreaderxoxo @yelldontwhisper @raven-ss @chickenlittlsblog @username23345 @justyourwritter69 @ayrtonwilbury
99 notes · View notes
hagueapostilleservicesblog · 8 months ago
Text
Get Your Joint Venture Agreements Apostille Online
1. What is a Joint Venture Agreements Apostille? A Joint Venture Agreements Apostille is an official certification that authenticates the validity of joint venture-related agreements for use in countries that are members of the Hague Apostille Convention. This certification ensures that such agreements are legally recognized abroad, making it essential for cross-border collaborations and…
0 notes
justinspoliticalcorner · 4 months ago
Text
Jay Kuo at The Status Kuo:
Let’s talk briefly about the jaw-dropping scandal that remains the talk of Washington.
If you’re just getting up to speed, we learned on Monday that National Security Advisor Mike Waltz had created a chat group on Signal, which is a private, encrypted communications app. It included some of the top officials in the Trump administration, including himself, Secretary of Defense Pete Hegseth and Vice President JD Vance. The topic was a potential military strike on the Houthis in Yemen. In creating the group, Waltz apparently inadvertently invited Jeffrey Goldberg, the Editor in Chief of The Atlantic, to the chat. No one can explain yet how this happened. Goldberg himself at first understandably thought it was a hoax, or perhaps some kind of trap for the media. Because after all, it would be a stunning display of incompetence, stupidity and even illegality to make that kind of mistake. But the longer the private thread went on, the more Goldberg understood that this was in fact a real chat, and he was somehow on it. A day after he broke the story, now that we’ve all had time to absorb just how shocking, irresponsible and, yes, criminal this Signal group was, we’ve also begun to understand how the administration is choosing to respond. And it’s only deepening concerns.
Deny it happened, then attack the reporter
This is a White House that never owns up to its mistakes, especially its colossal ones, nor admits the truth even when confronted. And that made for some head-spinning moments for what some, in honor of Defense Secretary Pete Hegseth, are calling “whiskeyleaks.” “Nobody was texting war plans!” Hegseth insisted with a straight face. To his credit, Hegseth has years of experience lying to the public on Fox & Friends, and this is likely one of the reasons Trump picked him. Hegseth made this claim of “no war plans” even though, per reporting by the Associated Press, the National Security Council admitted that the text chain described by Goldberg in The Atlantic “appears to be authentic.” When asked how a reporter came to even be in a top secret chat group, Hegseth deployed his base media instincts again to go after the reporter’s reputation, as if that had anything to do with what had happened. He really could have been describing himself here: “So you are talking about a deceitful and highly discredited so-called journalist who has made a profession of peddling hoaxes,” Hegseth said, implying again that the story was untrue while attacking Goldberg personally.
The man who created the original f*ck-up, National Security Advisor Mike Waltz, took the same approach even after the story was confirmed. Waltz even went on Fox to suggest that Goldberg had hacked into the system, rather than been directly invited by Waltz.
[...]
It was “hair on fire” with Hillary Clinton
It’s important to note that Waltz and Hegseth were some of the biggest critics of Hillary Clinton for having a private email server on which a handful of classified documents inadvertently exchanged hands. Back in 2016, for example, Hegseth argued that if Hillary Clinton were any security professional, “military, government or otherwise,” she would be ��fired on the spot” for what she did. By his own logic and argument, he also should be fired immediately for participating in the highly compromised group chat, which never should have happened outside of a secure government communication channel in the first place. Hegseth even claimed falsely during the text thread that they had “Operational Security” over the mission.
The same people who were apoplectic over Hillary Clinton’s emails are all of a sudden making excuses for the Signal leaks regarding Yemen featuring Pete Hegseth and Michael Waltz. The Signal leaks were more of a threat to national security than Clinton’s emails ever were.
84 notes · View notes
ms-demeanor · 6 months ago
Note
Since the asks all seem to be about password managers, might as well ask my own question.
While I understand that a (good) password manager would make my accounts safer, I really don't like the idea of needing a separate app/extension to access my account. (The reasons, and whether or not they make sense, are irrelevant to the question)
So, as a compromise, I decided to invest in a security key. Sure, it's technically not as safe, since it can get stolen, but it does significantly reduce the amount of people who could get into my account due to needing that physical key, wouldn't it? Plus, if a random person would want to connect to my account and somehow stole it from me without me realizing, they would still need the password, and the likelihood of someone both knowing my password (due to a leak, or a guess, or something), having my physical security key and knowing both are linked would be very, very slim. Obviously, having both would be safest, but is there a danger I missed in my assessment?
I think that security keys are a great MFA option and that you should absolutely use one - alongside recovery codes that you keep in a secure location. Like a password manager.
The risk with MFA is different than the risk with a password manager and, is in my opinion, scarier and requires WAY more backups.
The question with MFA is not "would I be able to log in at a public library" like it is with a password manager, the question is "if I lose access to this one piece of hardware will it permanently lock me out of any accounts that this device is used to authenticate?"
I'm very cautious about the accounts that I'll put MFA on, and I'm *exceptionally* cautious about documenting recovery codes in my password manager for every single one of those accounts.
Having a physical token for authentication can be very good and secure, but also possibly too secure in a way that permanently locks you out.
However I'll shout out bitwarden again: there is an option to use bitwarden totally in-browser so you do not need an app or extension to use the password manager. That's how it passes the "would I be able to log in at a public library" test.
80 notes · View notes
darkeagleruins · 1 year ago
Text
This Is How RIGGED The 2024 Election Is Going To Be
CAUGHT ON CAMERA: Fake American ID’s, Green Cards & Social Security Cards openly being sold to illegal migrants. Guess what they’ll do with these? They’ll vote
“Counterfeit green cards and social security cards to illegals in Queens. The New York Post observed around 10 men openly selling these fake documents on street corners along Roosevelt Avenue, with prices ranging from $80 to $250.
These forged social security cards could facilitate illegal activities such as opening bank accounts and potentially acquiring authentic driver’s licenses.
158 notes · View notes
partisan-by-default · 5 months ago
Text
(Dominic Byrd-McDevitt on LinkedIn)
On Friday night, the president officially fired the Archivist of the United States, as he had promised to do before taking office. So, hi there! 👋 Former National Archives employee here. The quality of the reporting on this has been disappointing to say the least, with only the most basic understanding of what the National Archives does. This is bigger than a little spat with a small agency.
Yes, the National Archives holds billions of pages of government records—essential for research, journalism, and government transparency—making it a crucial part of how citizens hold their government accountable, and also a key steward of our nation’s historical narratives. But, even beyond that, the functions of the National Archives and the Archivist of the United States are far more significant than most citizens realize. If you are wondering about what this could mean for our democracy, here is a short list of other things you should know about NARA and the AOTUS:
The Archivist of the United States is responsible for administering the Electoral College process. They are provide the official instruction to the states on how to carry out their Electoral College voting and transmit their electors’ votes, and also for receiving and validating the certificates before public viewing and permanent preservation.[1]
The National Archives is responsible for the publication of the Code of Federal Regulations, which is the official document that codifies all regulations of federal agencies, as well as the Federal Register, which is where the government gives notice of presidential actions, public meetings, and any proposed changes federal regulations before their required public comment period.
The National Archives is responsible for administering the Constitutional amendment process. The Archivist would receive any proposed amendment from Congress and transmit it to the states with instructions. They then receive and authenticate any ratification documents from the states. When sufficient states ratify, the Archivist is the one that formally certifies that the Constitution has been amended, with an official proclamation.[2]
As the National Archives states in all of its rulemaking postings, “Agencies may not destroy Federal records without the approval of the Archivist of the United States.” The National archives maintains records schedules, mandatory rules for agencies about how to retain records, and can determine which records are temporary (not permanently preserved). When these are violated, NARA can investigate and conduct oversight.[3]
The National Archives houses the National Personnel Records Center for the federal government. This is where all the personnel files of all federal employees are transferred after they separate from the government. Agencies have been charged with making lists of employees engaged in certain jobs for the White House, but it is worth noting any federal worker who ever left the government before now also has a file at the NPRC.
The National Archives has important roles in the classification process, including housing the Information Security Oversight Office and the National Declassification Center. In addition, the National Archives receives classified documents from the government for retention, as was widely reported during the president’s related criminal indictment. ISOO is the office that, by law, must be notified by anyone who encounters mishandled classified documents.[4]
The Freedom of Information Act (FOIA) ensures that citizens have the ability to hold the government accountable by establishing a right to access public records. It is a crucial tool for journalists. National Archives’ Office of Government Information Services is the ombudsman for federal FOIA program, receiving public complaints about violations of the law and producing compliance reports on agencies.[5]
Do you know of anyone who wants to interfere with the Electoral College vote, wipe out government regulations, change the Constitution, destroy or illegally retain government records, etc.?
So far, with everything else going on, this has hardly registered in the top news stories. It is important to know that none of this is normal. No Archivist of the United States has ever been fired by a president, in almost 100 years since the position was created, making Shogan—the first woman in the office—the shortest serving AOTUS. This is an apolitical position, even when the officeholder was appointed by the previous president. The statute regarding the office of the Archivist of the United States (44 USC § 2103) reads: "The Archivist shall be appointed without regard to political affiliations and solely on the basis of the professional qualifications required to perform the duties and responsibilities of the office of Archivist."[6]
Regardless of your politics, failing to defend the independence National Archives and its staff right now—and allowing it to be gutted or turn political—could be disastrous for the future of democracy.
Notes
[1] Here is the letter sent by Shogan after before 2024 election to state officials: https://www.archives.gov/files/electoral-college/state-officials/example-archivist-letter.pdf
[2] Here is the Archivist’s proclamation of the 27th Amendment: https://catalog.archives.gov/id/1512313
[3] For example, here is the letter sent when, in the Obama administration, the IRS was scrutinized for targeting conservatives and emails were deleted. https://oversight.house.gov/wp-content/uploads/2014/06/6-17-2014-NARA-to-Bennett.pdf The Archivist provided testimony to Congress in the matter. https://www.politico.com/story/2014/06/irs-lost-emails-archivist-108242
[4] In response to high-profile cases of government officials retaining classified documents, ISOO published a notice in 2023 with guidance on identifying and handling classified materials. https://www.archives.gov/files/isoo/notices/cogc-isoo-notice-final-06-21-2023.pdf
[5] See https://www.archives.gov/ogis/mediation-program/request-assistance & https://www.archives.gov/ogis/foia-compliance-program
[6] It also states regarding removal from office: "The President shall communicate the reasons for any such removal to each House of the Congress." Which does not appear to have happened yet, or has not yet been reported in any news reports. 44 USC 2103
68 notes · View notes