#it shut down in 2017 but the server is open source
Explore tagged Tumblr posts
hexedbug · 1 year ago
Text
i went on whirled earlier and someone put on audio that was just the one fucking toy story "suck my motherfucking dick" edit pitched up and looped for 30 minutes
3 notes · View notes
seo-news-bangladesh · 4 years ago
Text
Things Web Designers can learn from Web Developers
With so much competition, how can web designers maintain a premium identity for their work while also forging a successful career in web design? The solution is found in the design approach. Web designers must exit the race by competing on a completely different level.
An overview of the existing race in Web Designing
As people are spending more and more of their time online, digital user experiences are becoming the foundation for almost every large organization.
Businesses that do not have a proper website risk missing out on an excess of growth opportunities. They can reach far more people through the internet than they can through any other medium of advertisement. Therefore, organizations both globally and in Bangladesh who jumped into the boat of digital user experience, are having their website be the focal point of their company's online presence.
As a result, the number of web designers and web developers in Bangladesh, as well as web design and development firms, has increased to meet the demands of the growing popularity of startups and businesses seeking to go online.
While the supply is plentiful, so is the competition.
The web designers' goal should be to create distinctively one-of-a-kind design works for their clients, which elevates them above the competition and contributes to the development of a diverse, one-of-a-kind, and strong body of work.
Web designers frequently concentrate their efforts on the visual aspects of a design. How do the colours compliment one another? Is the design balanced? Is the spacing ideal? As designers, it is normal for them to want their work to be as visually appealing as possible since it has a direct impact on the overall quality of the experience.
However, designing an excellent website entails far more than simply making it visually attractive. Therefore, to improve web design skills, one of the most effective things designers can do is to connect with web developers for inspiration.
Web developers bring a website into its full functioning form by developing both the front-end and back-end part of a website. After the website’s design is made, designers hand it over or work side by side with the developers to bring the website into its life.  Afterwards, the developers work their magic. However, after the site is published, developers have the access to its performance analytics. So, they can provide valuable information on improvement factors of the design as well as information about the modern technologies they can implement.
At Dcastalia, one of the best web development companies in Bangladesh, professional web developers and designers work closely together on a project. By following the Agile Methodology, the whole team collaborates with the user, to create segments of the website design and functionality, test it and then repeat the whole process for another segment. In this way, the web designers get valuable insights from both the expert developers and the clients which they can utilize to generate the visual aspects of their next design.
Ensuring Security for Website Visitors
Source: Pixabay
Web protection is now more important than ever. With technical innovation comes a slew of new attempts to breach online defences. Every hour new malware strains are being produced and other groups of data mining taking it to the next level.
The State of Cybersecurity in Bangladesh and how web designers can improve
Bangladesh has risen from 73rd to 65th and ranked 2nd in South Asia in the UK-based National Cyber Security Index's global cybersecurity Index (NCSI). According to a press release published by Dhaka Tribune, the index was created by the NCSI to assess countries' preparedness for basic cyber-attacks as well as their efforts in handling cybercrime and major crises.
While this gives up hope but does not give us the guarantee that our information is secured. Therefore, web designers in Bangladesh need to be up to date on web security and technological expertise. Considering site protection from the beginning of website design and collaboration with the web developers in Bangladesh will reduce the likelihood of potential cyberattacks.
Security while generating customized-display
Customization is all about helping companies better satisfy customers using their websites but at a cost.  Modern websites are designed to collect personal information from users (from cookies), or while opening accounts which is then used to give a more tailored experience. This applies especially to business sites or eCommerce sites that take in customer's payment details.
Credit card compromises rose by 212% a year, credential leaks increased by 129%, while malicious applications grew by 102%.
(Source: Purplesec )
As a web designer, it is important to provide security and priorities more than personalization. The designer must consider the demographic of customers for the websites. For example, if the percentage has more senior people visiting the site, then ensuring them that their data is safe through visualization is vital.
Even if it is just a name and email address that the site is requesting from customers, designers need to learn how to get that information through visual cues which ensure security. In this case, Chrome browser, for example, indicates that the site is served on HTTPS which is a more secured server compared to HTTP. However, most of the customers need a more prominent signal which is easier to understand.
Defense against front-End vulnerabilities
A cross-site scripting vulnerability (XSS) that causes a company to shut down its service is the last thing any company needs to deal with.
Web designers must pay special attention to preventing client XSS and should exercise extreme caution when using Iframes, CORS, and cookies, as well as HTML5 elements and APIs, which are considered to be fraught with vulnerabilities.
Web designers are now expected to be more security conscious than ever before, and they have no choice but to live up to standards.
The designer and the developer must discuss issues such as the above while building a website. Only through this type of teamwork can the best outcome be obtained — one based on how the website is supposed to look and perform, as well as the criteria for handling and protecting users' data.
Top web design firms in Bangladesh such as Dcastlaia, comprises a team of professional and experienced designers and developers who work together in bringing out highly secured websites for local clients. Dcastalia’s in house production of their very own customizable eCommerce platform: Store -Up proves their established methods and concern for web security and thus ranked their services such as web development, eCommerce development as well as web security and maintenance high up in the country.
Responsive Websites – Is it the responsibility of the designers or developers or both?
Source: Unsplash
According to Statista, mobile traffic accounted for 52.64 per cent of all global traffic in 2017, implying that a website that is not responsive or mobile-friendly is losing roughly half of its traffic.
Responsive websites are those that adjust to all screen sizes and resolutions, not just desktop, but also smartphone, tablets, and, in some cases, smart TV.
Despite the advancement in modern technologies and growing designers and front-end developers, there are still abundant websites that are not responsive. This is because many designers are still learning the principles of responsive design, and front-end developers are hesitant to take on the responsibility since according to them, website responsiveness appears to be in design territory.
This resulted in the presence of blind spots in a typical Design - Frontend setup, which is located at the junction of design and development.
To begin with, none of the design tools available for web designers allows for truly responsive interfaces to be created and the available tools prove to be inefficient. Designers cannot fully grasp the principles of a responsive website unless they dive into the code. Front-end developers, on the other hand, front-end developers either lack the authority or the neOnst to make design decisions directly in code.
As a result, the blind spots are ignored, and the internet is flooded with ordinary websites. Building responsive sites is impossible unless there is a connection built between design and frontend development.
Share the responsibility – Break the ice with your Front-End Colleague
There is a major difference in the responsibilities for a web designer and a web developer which is a whole other topic.
The solution is not for the web designers to learn to code and start programming but to consider the fundamentals of responsive website development and to be conscious of the technical options available. In the meantime, web designers can share their design concepts and knowledge of good and bad user interfaces with their front-end colleagues.
Rise of responsive web development in Bangladesh requiring designers to stay updated
Bangladesh's ICT sector has grown at a 40 per cent annual rate since 2010.
(Source: UNCTAD).
The emergence of a large number of young entrepreneurs and their passion, as well as the government's strong emphasis on "Digital Bangladesh," are key driving forces in Bangladesh's ICT industry.
As Bangladeshis become more reliant on technology, many businesses began to establish online presences to participate in the evolution of Digital Bangladesh. Therefore, the need to have a unique and responsive website to represent the company’s value has mounted to attract customers. With that, over the last decade, Bangladesh's web development industry has grown exponentially.
The constant quest for web designers to use creativity and innovation has resulted in a drastic change in the way websites are developed today. Web developers in Bangladesh are now using advanced techniques and methods to create functional websites that have unique user experiences and are mobile-friendly.
With the emergence of new website design trends and techniques, web designers in Bangladesh are making the design development process more exciting. As with every other creative discipline, experts in the web design industry in Bangladesh often pursue the latest trends to better serve their clients.
Renowned web development companies in Bangladesh such as Dcastalia follow SDLC for web development.
The Software Development Life Cycle (SDLC) is a method used to design, develop and test high-quality software. This method induces the collaboration of web designers and developers especially in the designing phase of the process where the designer has to produce more than one design approach and document it in the Design Document Specification (DDS) which is then reviewed by all the important stakeholders such as the developers and clients. This process ensures high quality, robust and mobile-friendly website design and development.
Optimizing Accessibility – What the developers have to say
Source: Equalize Digital
According to the Web Content Accessibility Guidelines ( WCAG),  Web accessibility refers to the design and development of websites, resources, and technologies so that people with disabilities can use them. More specifically, people can:
- perceive, recognize, navigate, and communicate with the Web
- participate in the Web
Web accessibility includes all disabilities that affect access to the Web, such as:
- Auditory
- Emotional
- Neurological
- Physical
- Voice
- visual
Current role of web designers for implementing accessibility
Accessibility is initiated during the design process. To build for usability, the designers must consider the users' needs. The inclusive design ensures that digital materials meet the needs of the greatest number of people, regardless of age or skill.
Understanding the needs of disabled users is important for creating better and more inclusive experiences for them. One of the most difficult aspects of designing for accessibility is determining which individual user type needs to be addressed.
Colour and contrast
Colour is a powerful tool for defining a brand, conveying thoughts, feelings, and ideas; however, the power of colour is diminished when a user cannot see or understand it differently. Colour blindness affects approximately one in every 200 women and one in every twelve men .
Web designers usually include a non-colour identifier, such as icons or text descriptions, to help distinguish between colours and avoid oversaturated and high-contrast colours, which are common in autism spectrum disorders. It is best practice to maintain a minimum contrast ratio of 4.5:1 between the foreground and background colours.
Images
It is also the designer's responsibility to consider the context of images and determine whether the image is merely decorative, conveys meaning, or contains the text.
Designers can transform image information into alt text so that screen reader users can understand the image's meaning. A screen reader is a program that reads out loud the contents on the screen to visually impaired users.
How developers ensure web accessibility and what designers can learn from them
The developers usually have to consider accessibility as soon as they begin writing code. While there is a learning curve at first, writing accessible code takes about the same amount of time as writing inaccessible code.
Developers and designers need to collaborate the accountability for improving accessibility in a website, especially when it comes to making user interfaces for several adaptive technologies such as screen-readers. Their collaborative goal should be to create a website that at a minimum meets the Web Content Accessibility Guidelines (WCAG) which is established through the W3C process in collaboration with individuals and organizations all over the world, to create a common shared standard for web content accessibility that addresses the needs of individuals, organizations and governments worldwide.
During web development, it is important for both the designers and developers to frequently audit and test for web accessibility. It can be done by checking the website in a browser to ensure that the display and the functionalities work correctly or not. There are many browser plug-ins and tools that assist in auditing the code for accessibility. Finally, testing the website or web application with a screen reader is recommended but not always required.
Bangladesh’s contribution in terms of Web Accessibility for all
Around twenty million out of 166 million people in Bangladesh have a disability. While Bangladesh aspires to become an ICT-based digital economy, there is a frightening likelihood that a substantial percentage of the population with varying degrees of disability and illiteracy will be left behind. While ICTs have the potential to improve the lives of people with disabilities, the lack of web accessibility is a significant barrier.
In November 2015, a2i, the Bangladesh government's innovation activator, conducted an internal accessibility audit and discovered various barriers to accessing government websites. As a result, a national web accessibility guideline for Bangladesh has already been drafted under the leadership of a2i and the Prime Minister's Office. A web accessibility toolkit is currently being developed to make all websites accessible and barrier-free for all.
In this regard, it is mandatory for web designers and web developers in Bangladesh to implement accessibility while building a website. Dcastalia is established as a prominent web development company in Bangladesh with over a decade of experience. The company excels at creating scalable, responsive and accessible websites to help companies establish a strong online presence. Their supremely talented and experienced developers and designers create effective, user-friendly web sites through mutual collaboration and by following the WCAG standard for web accessibility.
Last but not the least: Staying updated as a Web Designer
Source: Unsplash
Web designers who keep up with web design trends have an advantage over those who stick to what they learned in universities. This is very common among web developers who like playing with modern tools and languages and are always trying to incorporate that in their work.
Instead of focusing on the basics, designers can give clients new solutions for their needs if they are aware of what is trending in the web design industry. Creating new design work regularly that combines current trends with the designer’s style will transform their online portfolio into a one-of-a-kind visual destination for other designers and clients alike.
There are a few different ways to stay up to date with web design trends and keep that at a higher standard. It is not difficult, and all web designers can do it, whether they are fresh graduates, self-taught, or have been in the industry for over a decade.
Thinking outside the box
Sticking to the comfort zone is one of the biggest shortcomings of a web designer. Repeating the same steps for each new design project would just trap the designer in a box.
Web designers must look for ways to expand their imagination, encourage their ambition, and learn new skills. International web designer forums are a great place to share ideas and see what other designers are up to. Taking a course or watching a video on something new to do or not entirely comfortable doing can be a way of learning new trends.
No limit to learning
These days it is not very difficult to find a learning resource. Online courses and tutorials for learning new skills are all plentiful on the internet now. The tutorials on the internet are created by web designers who are keeping up with trends and giving back to the web design community.
Co-working with other designers and web developers
Web designers have a surplus number of resources at their disposal to stay in touch with one another and showcase their work in a community setting. Sites like Behance, Dribble, and Interaction Design Foundation are some of many great places to not only keep the portfolio up to date but also to meet other designers and developers and see what they are working on. Online communities are great, but joining a design association that hosts regular events and competitions can make things even more interesting.
Final Word
Lastly, by understanding the points of improvements and the things developers can teach in terms of web designing, designers can not only create unique work for the clients but will also be able to build a strong body of design work for themselves.
They will be able to show that good design is not something that can be purchased off the shelf and that if a potential client wants a distinct and unique web presence, it's something worth investing in.
Dcastalia is one of the leading web design and development company in Bangladesh and has a dedicated team that carefully considers the client's needs and curates creative, adaptable, responsive, accessible and cost-effective websites. The company offers versatile services such as web development, eCommerce development, web design, experience design and many more.
Frequently Asked Questions - Regarding Web Design
Source: Pixabay
How much does designing a new website cost?
The cost of a web design is determined by the requirements of each individual project. Every website is unique and necessitates different components; web designers design and develop custom websites for each business.
How much input can the clients provide in the process of designing?
A great deal! The clients’ input and feedback are critical to the success of the web designing process. The clients have to be clear about their needs, likes, and desires, and then work with the designer to create the perfect look and functionality.
What if the client wants to redesign a website?
The process is the same as making a design from the sketch. The client meets with the designer and other stakeholders in the team to share the requirements, goals and have an in-depth discussion about the design. After that, the designer starts making wireframes and prototypes in which the client provides feedback.
Do you make designs on pre-made templates?
Every website the designer creates is one-of-a-kind and custom-made for each client. Designers usually do not use any pre-made templates or themes unless the client specifically asks for them.
Can I add features such as an email sign up form on my website?
When web designers design your website, they will incorporate all of the features you desire, including an email sign-up form. Since they usually design the website from scratch, they can ensure that it complements your website's style and branding.
2 notes · View notes
bjsmall · 4 years ago
Photo
Tumblr media Tumblr media Tumblr media Tumblr media Tumblr media Tumblr media Tumblr media Tumblr media Tumblr media Tumblr media
06.06.20
We went to the Oracle VirtualBox site and downloaded and installed VirtualBox 6.0. Oracle VM VirtualBox is free, open source virtual machine software maintained by Oracle Corp.
It was originally an Innotek product before Innotek was acquired by Sun Microsystems in 2008. Sun Microsystems was in turn acquired by Oracle in 2010. The alternative software to Oracle VM VirtualBox is VMware workstation.
I have been using Oracle VM VirtualBox since 2016 and have learnt a lot of information about how it works and how to install various operating systems.
Virtualbox can run Linux guest operating systems and Microsoft Windows guest operating systems. It can emulate both 64-bit operating systems and 32-bit operating systems.
Each operating system you add to VirtualBox is treated as a Guest. The guest operating system is running in its own virtual environment, which emulates a real machine on your PC. This means that anything you do in it does not affect your PC. The guest runs in a console:
About the VBox console: The VirtualBox console displays the active virtual machine. It shows the virtual guest operating system activity icons in the status bar. The console can be re-sized, minimised and forced closed from the title bar. It is not recommended to force close an active guest operating system as this acts like switching off mains power. Your guest operating system should be shut down cleanly. You can select different viewing modes in the view list or use the shortcut keys assigned with them. These mode include full screen mode, seamless mode and scaled mode. VirtualBox website link: https://www.virtualbox.org/ VirtualBox wiki link: https://en.wikipedia.org/wiki/VirtualBox  
After setting it up, I went to find some Linux-based operating systems to download. Each download is a disc image file with the file extension .iso. 
I chose:
Ubuntu MATE 20.04 LTS (Long Term Support)
This operating system uses the MATE Desktop Environment, which is the continuation of the former GNOME 2 Desktop. I like this desktop environment because it has a very configurable interface.
Ubuntu MATE: https://ubuntu-mate.org/
Wiki link: https://en.wikipedia.org/wiki/Ubuntu_MATE
Linux Mint Cinnamon 19.3 Tricia (based on Ubuntu 18.04 LTS)
This operating system uses the Cinnamon Desktop Environment which is based on GNOME 3. Cinnamon uses MGSE (Mint Gnome Shell Extensions), which re-creates a more traditional desktop linux experience whilst also looking modern. 
I like this desktop environment because it looks modern and feels familiar to those who come from Windows.
Linux Mint: https://www.linuxmint.com/
Wiki link: https://en.wikipedia.org/wiki/Linux_Mint
Linux Mint MATE 19.3 Tricia (based on Ubuntu 18.04 LTS)
Linux Mint edition featuring the MATE Desktop Environment. I like this desktop environment because like Ubuntu MATE, it is very configurable. It also features Linux Mints system updating utility.
Ubuntu 20.04 LTS
This version of Ubuntu is the main version by Canonical Ltd. This operating system uses the GNOME 3 Desktop Environment.
Ubuntu came out in 2004 and used GNOME 2 as it’s desktop environment until 2011, when it changed to the now discontinued Unity Desktop. In 2017, Canonical announced it would return to GNOME. I like this desktop environment as unlike the GNOME 3 default interface, Ubuntu uses its own orange style theme and adds a Unity like dock on the left of the screen.
Ubuntu: https://ubuntu.com/
Wiki link: https://en.wikipedia.org/wiki/Ubuntu
Xubuntu 20.04 LTS
This operating system uses the XFCE Desktop Environment which aims to be lightweight on system resources and has a really configurable user interface. Xfce once stood for XForms Common Environment. The menu system is called  the Whisker Menu. I like this desktop environment because like MATE it is very configurable.
The Ubuntu 20.04 Long Term Release is code named: Focal Fossa. All Ubuntu based distros use .deb (Debian Package Manager) for software installation.
Xubuntu: https://xubuntu.org/
Wiki link: https://en.wikipedia.org/wiki/Xfce
Fedora Workstation 32
Fedora is a Linux distribution developed by the community-supported Fedora Project which is sponsored primarily by Red Hat, a subsidiary of IBM, with additional support from other companies. Fedora is used by Linus Torvalds who is the creator of the Linux kernel.
Fedora is the upstream source of the commercial Red Hat Enterprise Linux distribution.
Since the release of Fedora 30, five different editions are currently available: Workstation, focused on the personal computer, Server for servers, CoreOS, focused on cloud computing, Silverblue, focused on an immutable desktop specialized to container-based workflows and IoT, focused on IoT devices.
I like this desktop environment because it looks fresh and modern. This operating system features the latest version of the GNOME Desktop Environment. 
The screenshot of Fedora shows the ‘Activities’ dial screen which gives you a Visual overview of your GNOME Desktop. 
With the Activities screen, you can see and control currently opened app windows, all installed applications, search system and switch desktop work spaces.
Fedora: https://getfedora.org/
Wiki link: https://en.wikipedia.org/wiki/Fedora_(operating_system)
CentOS 8.1
CentOS (Community Enterprise Operating System) is a Linux distribution that provides a free, community-supported computing platform functionally compatible with its upstream source operating system, Red Hat Enterprise Linux (RHEL). It is maintained by The CentOS Project (affiliated with Red Hat). Both operating systems use GNOME 3 as their default desktop environment.
It is basically a free version of Red Hat Enterprise Linux, with the Red Hat branding removed and update servers pointing away from Red Hat servers.
Red Hat Enterprise Linux is a commercial focused Linux distro.
All Red Hat Linux based distros such as RHEL, CentOS and Fedora use .rpm (Red Hat Package Manager) for software installation.
CentOS and Red Hat Enterprise Linux can be installed on servers, workstations and desktops. Both are very popular on mission critical commercial server systems as it is designed to be flexible and very stable.
I thought this Linux distro is interesting because unlike the Ubuntu based distros above, installation of CentOS is more involved, you set up software sources, installed software, desktop and operating system components.
CentOS runs on a lot of web servers.
CentOS: https://www.centos.org/
RHEL:
https://www.redhat.com/en/technologies/linux-platforms/enterprise-linux
CentOS Wiki link: https://en.wikipedia.org/wiki/CentOS
RHEL Wiki link: https://en.wikipedia.org/wiki/Red_Hat_Enterprise_Linux
VirtualBox requires the installation of Guest Additions, which adds extra features to the virtual machine, such as the ability to scale the resolution of the guest operating system, better 3D acceleration and the ability to move files between the Guest and Host machine.
To install Guest Additions on a Linux guest, you will need to use the terminal. installation of this is different on .deb and .rpm builds of Linux.
4 notes · View notes
softkwannie · 5 years ago
Text
the cream coloured knit pullover ✧ 
part of the sweater collection series ~
warning(s): references to alcohol, vvvvv lightly implied sexual activity 
-
It was funny, when you thought about it - that the sweater you felt most attached to was one whose owner you met only once. 
You twirled the hems of the material in your fingertips. Block-cream-coloured and blank in pattern, it was probably the plainest sweater of them all. Yet now, held tightly in your grasp, it felt anything but. There was danger in the very thread of it. Electricity was pulsing it alive. One look at it and you were reeling back in time, the night you received it coming into clear and colourful view. 
You could remember your journey to the bar vividly. Just as the glossy moonbeams had left the sky thick with cloudless light, the pangs of post-breakup loneliness had left your chest feeling hard and heavy. And there was only one way to ease it.
“Rough day, sweetheart?”
You glanced up, feeling your eyes widen as they focused in on the owner of the voice.
He definitely didn’t seem the ‘soft cream sweater’ type when you first saw him. Yes, woven threads of off-while wool had absolutely no place on this man’s body. Instead, a sleek black button up sat cuffed at his elbows. He was nothing else but professional behind that bar. Familiar, perhaps. 
“Whatever it is, that isn’t the answer…” he mused, pausing to look down at your glass, “...I would know.”
You couldn’t put your finger on it then, but looking back you knew exactly why you revealed what you did right then: he made you feel wanted. He wanted to listen to you. Or at the very least, he did a good job looking like he did. He freed his hands completely of dishcloths and dirty glasses as he approached you - his deep, dark eyes softened in colour and focusing solely on yours as you took a breath to speak. 
“I just ended it with someone,” you said finally, stringing a lip between your teeth, “the second guy this month.”
“How come?” 
“It’s hard to explain...”
“Try me.” He smiled. 
And before you knew it, you were making out in a taxi on the way to his apartment - your hands tangled in his hair, his hands sliding up and down your arms like the cascading reflections of city lights against the cab windows. You should have been thoughtless in that moment. Yet, they played on your mind as you pressed your lips to his. If you held your eyes shut you could smell their fresh detergent scent on his skin, and the fluorescent blonde locks of his hair twirled in your fingers became the fraying hem of a sweater you were yet to collect...
You pulled away. 
“Jeonghan, I…”
“Everything okay?” He hummed, leaning away with concern. 
“Yes, I just...need to tell you something.” 
“It was that guy from a few weeks back you just broke up with, wasn’t it? The one who ordered you the shot across the bar?”
You blinked back in awe. 
“How did you know?”
“I served you, that night.”
Of course he had. If you hadn’t been held so closely in his arms you might not have realised. He was wearing this shirt that night, too. The same black shirt with the same sleeves folded over at the same point at the crook of his forearms. 
“To be honest with you,” he continued, “I usually suck at remembering regulars’ orders and faces. But you...I knew I had to remember you.” 
You smiled up at him as he drew you in again. 
The heat of his breath against your own sent you reeling, the dense beating of your heart thundering in your ears. You almost couldn’t feel his lips as they gently touched your forehead and slowly trailed down to the tip of your nose; your focus instead was on his fingers - how they curled into yours like they were his home.
“What were you going to say, sweetheart?” He breathed in-between a few, small pecks. 
“Nothing.” You replied, wrapping your arms around his neck to be pulled in closer. 
“I think you’re going to enjoy this.” He smirked, reaching for the car door. 
He was right - you did. But that only meant one thing: you had to go. 
You hadn’t seen him since.
Some would’ve called what you had a rebound. Maybe it was, by definition. But he meant more than that to you. 
And if that was truly all you meant to him, he wouldn’t have hidden a sweater in your bag as you left the next morning, making sure you wouldn’t forget him again. 
No, not again. 
You held it close to your chest as you spiralled down the stairs. Within minutes you’d called for a cab, pleading for the driver to speed you to the bar as quickly as he could. The sweater - sprawled across your lap in a heap of knitted regret - was all you could focus on. If only he knew the effect it had on you, the effect he himself had had. How you’d been filling every hour of every day since your encounter desperately trying to stop thinking of him. 
The great, silvery doors of the place soon came into view, towering over you like they were begging you not to go in. You ignored them completely, sweeping one of them open with such force you almost hit the wall on the other side. As you entered, the small room was packed with people, the only source of light being the fluorescent beams of purple rippling over the waves of crowds in the darkness. You knew you were going to struggle to find him - hell, you knew he might not even be there to find  - but you’d come too far to leave now. 
You struggled your way through to the bar. Behind it, you could count five servers bustling up and down with drinks. Two had the electric blonde hair you knew - both huddled together at the far end. One of them had to be him. 
Holding your breath, you shuffled through the final hoards of crowds to reach the familiar surface, settling down a hand and heaving yourself forwards as though you were about to order. The furthest bartender approached, and it only took you seconds to realise - you’d found who you were looking for. 
He looked directly at you, his eyes very quickly glazing over in confusion. He froze entirely, placing down the glass in his hands down and standing completely still. 
He might have been aching with hurt, but he was exactly the same as before. 
“What are you doing here?” 
“I came to return your sweater.” You replied, settling it onto the countertop. 
-
Tumblr media
➴ jeonghan wore this sweater in this interview/photo shoot with anan web in 2017 
a/n: okay this needs to be re-edited so excuse any clarity/grammar errors but phew chile. here it is. rly i have no excuse for how long this took and i’m kinda scared its awful bc most of it has been spewed from my brain in the past few days fhfhfh and i also feel like there’s not enough exposition/its all a bit too vague/not well explained BUT HEY i wanted to put it up to get the ball rolling on this series!! hopefully you didn’t dislike it as much as i do fhfhf thanks for waiting and reading
(but who was the guy from the bar??? is he another sweater bearer??? hmmmmmmmm all will be revealed....
23 notes · View notes
Text
Press: Elizabeth Olsen Opens Up for Who What Wear's September Cover
youtube
Tumblr media Tumblr media Tumblr media Tumblr media
  Gallery Links:
Studio Photoshoots > 2019 > Session 006
Studio Photoshoots > 2019 > Session 006 – Behind the Scenes
  WHAT WHEN WEAR: A loose linen blouse. An untouched plate of madeleines. An empty French bistro in the Valley on a Tuesday at 4 p.m. These are the poised circumstances under which I spend an afternoon attempting to better understand one of Hollywood’s most discreet young celebrities: Elizabeth Olsen.
The 30-year-old actress’s identity doesn’t seem like it would lend itself to much mystery. Since 2014, Olsen has starred as the Scarlet Witch in Marvel’s superhero movie franchise—one of the most-watched film series in entertainment history. (This summer’s Avengers: Endgame quickly became the second-highest-grossing movie of all time.) It’s a role she’ll reprise later with WandaVision, a Disney+ spin-off series about her superhero character coming spring 2021. In the meantime, Olsen executive produces and stars in Sorry for Your Loss, a drama series following Olsen as Leigh, a young widow struggling to deal with the sudden loss of her husband. (The show airs on Facebook Watch, and its second season premieres October 1.) By any objective measure, business is booming for Olsen, the younger sibling of Ashley and Mary-Kate, who long ago reached a level of fame so behemoth they no longer need a last name. The Olsens are as much American royalty as the Kennedys or the Rockefellers. I should know everything about Elizabeth Olsen.
And yet, as soon as she walks through the door of Petit Trois (the setting she chose for our interview) and introduces herself to me, it sinks in how little I do know. “I’m Lizzie,” she says with a jumpy half-hug, half-handshake—though the awkwardness is entirely my fault. I’m caught off guard that the young starlet lives just outside of L.A., around the corner from where she grew up (I would have pegged her for more of a hip Eastside girl), and I never knew she went by the cozy nickname. “Thanks for coming to the Valley,” she says, smiling.
Following behind two heavy-hitting child stars turned esoteric fashion moguls, Olsen, who decided at a young age to pursue a career in acting (and obtained a degree in it from NYU), had prodigious shoes to fill. Her on-screen breakout, a critically lauded lead in the 2011 Sundance hit Martha Marcy May Marlene, suggested that Olsen would be taking a cleverly divergent route from her older sisters—one of a risk-taking indie cinema darling. Some of her filmography still reflects that identity—roles in quirky small-budget dramedies like 2012’s Liberal Arts and 2017’s Ingrid Goes West.
Maybe that’s why, even after all the Marvel movies, which are about as commercial as they come, I still see her in that light. Or maybe it’s Olsen’s enigmatic personal life, almost laissez-faire approach to style (“A combination of suburban mom meets little boy,” is how she describes it), and overall serenity of manner that create the sort of intrigue that independent film girls tend to have.
Her current project, Sorry for Your Loss, certainly has some of that indie energy, simply because Facebook Watch is still a new and unknown content platform. Olsen admits that selling the show to Facebook felt like a scary move in the beginning since most audiences don’t know that watching TV on Facebook is a thing at all. Moving into season two, she’s still figuring out the best way to spread the word to audiences. “There is no precedent, and that can be really challenging,” Olsen emphasizes. Still, there are major pluses to the marriage of television and social media, especially for a show that addresses a topic as personal and underrepresented as grief. “The show living on Facebook has been interesting because of the dialogue people get to have about their own experiences with grief and loss on the platform,” Olsen says.
The actress is looking forward to audiences’ feedback on season two, which finds Leigh “taking big swings, making big mistakes, and trying to figure out the balance.” As Olsen says, “Grief isn’t something that you ever just shut a door on or move forward from. It’s very cyclical.”
Olsen, however, will not be participating in these conversations with fans herself, because—ironically—she’s not on Facebook. She didn’t have a trace of social media presence until 2017. She finally downloaded Instagram shortly after the release of Ingrid Goes West, in which she pulls off playing a very convincing L.A. influencer. In contrast to millennial celebrities who use social media to speak about everything from beauty products to social justice, Olsen doesn’t feel the obligation to be any sort of influencer, politically or otherwise. “If I like blending into a wall, screaming from a stage isn’t something that would help me enjoy my life,” she says. “Sometimes I just don’t want to be part of a conversation because I don’t want anyone looking my way.”
As it turns out, privacy and stability inform everything about Olsen’s life—from how she dresses to the roles she chooses—more than any desire to seem “cool.” She lives in suburbia with her fiancé, musician Robbie Arnett, where she enjoys cooking, eating, and dabbling in interior design. “I love food more than I love anything that has to do with clothes,” she says, starkly contrasting her stylish sisters. (Though the actress is more of a beauty girl—she currently serves as a global ambassador for Bobbi Brown Cosmetics.) Categorizing herself as an “obsessive, detailed perfectionist” beset with a heavy dose of social anxiety, Olsen prefers poring over moldings and wood stains than obsessing over how her body looks in a dress and which angle she should pose in.
Transforming into a character—wearing costumes, acting on camera—puts the performer right at home, but photoshoots and red carpets, which give her no role to disappear into, are a source of great distress. “I don’t like standing out in a crowd,” she tells me just after ordering the dainty plate of madeleines. Our server also named raspberry tarts and pains au chocolat on her list of available pastries, but down to her desserts, off-screen Olsen likes to keep it simple.
“At 30, I feel like I’m finally getting to an age that was meant for my personality,” the actress says with no ounce of irony. “Just domesticated. A homebody.” I introduce her to the term JOMO: the joy of missing out. “Yeah… that,” she confirms. “I never feel bad about not leaving my house.”
Quietude feels inherent to Olsen’s personality, but it’s also something she learned from her family. She tells me her parents have had the same group of 10 friends their whole lives; so have her older sisters. Like other famously private Hollywood families (the Coppolas, the Fondas), the Olsens justifiably keep their circles tiny and exclusive to those with whom they have history—those they can trust. “I don’t have too many friends that I’ve met through work,” Olsen says. “I care about privacy. I don’t have a desire for people to speak about me.” Bottom line: Lizzie Olsen is not particularly interested in fame.
Ultimately, no matter how superhuman she appears on the big screen, Olsen values a fairly normal life: She wants her pastries from Petit Trois, where everybody knows her; she wants her white button-downs and her stable paychecks from Facebook and Marvel (most of which she’s been tucking away in savings to prepare for a family, she says). “Maybe I think about things too rationally, but my career goals are longevity and stamina,” Olsen tells me. “Working steadily, feeling challenged, and just kind of hunkering down for a bit.” One day, that paycheck might come from a less visible job; Olsen says that later in life she’d like to go back to school for a degree in architecture, interior design, or landscaping. “I’m interested in the new science of irrigation and water conservation in California,” she shares. “I could be someone who’s lived multiple lives, multiple careers.”
Before heading out, Olsen packs the six madeleines, which have all gone untouched, in a to-go box for later, when she’s home, to savor in her quiet, happy place. “The next career could be a lot more private,” she says. “Maybe. We shall see.”
Press: Elizabeth Olsen Opens Up for Who What Wear’s September Cover was originally published on Elizabeth Olsen Source • Your source for everything Elizabeth Olsen
7 notes · View notes
zeltricstudio · 3 years ago
Text
Tumblr media
OVEREXPOSURE
WICKET
MAY 2017
The Sun Reach Nuclear Power Plant, located way outside of Wicket, suffered a power outage. After 24 hours of no communication from the internal team or the team sent to investigate, the Special Entity Contamination Team was sent in to investigate, led by Captain Alice Stormer and 4 other Echo Soldiers. All of them were dressed in the yellow hazmat suits, except reinforced with metal plates and wielding assault rifles. Alice had the forearms of her suit cut out. After the transport bus arrived at the entrance to the Nuclear Power Plant, Alice and her team exited. The outside to the power plant was abandoned, except for several cars littered about, most likely from the people who were still inside. The emergency lockdown had been initiated and the security doors had locked the facility. Alice put her arms out, fingers outstretched and molded them into sharp metal knives, before proceeding to slide them through the cracks of the doors. Once she had a grip, she proceeded to pull apart the doors, breaking the mechanism and allowing the doors to open. Alice and the team entered the facility.
Inside the facility was completely dark, with only the red siren lights briefly illuminating the hallways. Echo Soldier #1 pulled up a portable Gauge Counter. The counter indicates that the air is extremely toxic and lethal, and any sort of exposure could immediately kill them.
“Alright everyone, lights on and safety’s off. Stick close, our main goal is to locate the Server Room, where the distress call came from and if deal with what caused this. I’ll take point, stay in a straight line” Alice said, moving to the front of the line as the soldiers got into formation.
The team slowly began to make their way through. The walls and floors of the facility had scorch marks on them, with the walls rusting and breaking down. A toxic gas was present all around, making it hard to see directly in front of them. Alice came to a directory, which showed the Server Room was underground, on Level 5. They made their way to a set of doors that lead to a stairway and began making their way down. The sound of the emergency generator began to get louder. Finally they all made it to Level 5 and continued the path to the sever room, when in the distance they hear a loud screech, almost a mixture of human and something else entirely.
The team began to move a bit more quickly, not wanting to face whatever made that noise. Eventually the team made it to the Server room and to their horror, they noticed that a hand-shaped hole was melted through the security doors. Alice was able to get a grip and pried open the doors. Inside the room was quite a shock.
There laid the bodies of 4 people, whose skin had melted off, exposing their flesh and bones as the meat was sizzling, the sound was horrific. Their eyeballs had popped, with only the optic nerve hanging out. Only one of the bodies had a deep cut across their wrist. Their bodies were slumped in the chairs and their clothing had been burnt.
“What the fuck happened here?” Echo #02 asked, still by the doorway, afraid to get closer
“I don’t know, but it was probably the same thing that made that hole in the door” Alice replied, not being able to take her eyes off the bodies
“Captain, behind you on the wall” Echo #03 pointed out.
They all turned around and on the corroded walls was the phrase ‘PW SUNDANCE5057QXY’ written in blood.
“Echo #04, see if you can figure out the computer” Alice instructed
“Affirmative” Echo #04 replied, before moving over to the terminal and began typing.
“These men were exposed to Level 5 radiation, they must’ve died within seconds” Echo #01 said, as he moved the counter over the bodies
“Must’ve been the most painful couple of seconds in existence” Echo #02 replied, still hanging by the door.
“Captain, I got something” Echo #04 said
“What is it?” Alice said as she and Echo #01 and #03 moved over
“It is audio recordings, all dated yesterday”
“Play them”
Echo #04 hit play and the speakers came to life.
“May 7th, 2017. It is 1:00 am since the reactor downstairs had exploded. It wasn’t a big explosion, but big enough to initiate security protocols. Me, researcher Andy Hood and William Bend along with Technician Jim Court have been locked inside the server room. Not sure about the others but we hope they got to a room in time. We are currently awaiting the Seal Team to arrive and contain the exposure so we can all leave.”
“May 7th, 2017. It is 1:47 am. The Seal Team has arrived and began to get to work. They assured us it would take an hour or two to accurately assess the damage and seal it up. Thankfully we have the newspaper to do crosswords in as we kill time.”
“May 7th, 2017. It 2:30 am. Shortly after the last recording we kept in contact with the Seal Team via radio. As they got closer to the reactor chamber, their comms began to go haywire. The last thing we heard was screaming before dead silence.”
“May 7th, 2017. It is 3:00 am. We haven’t heard anything back from the Seal Team. I fear the radiation has become a lot stronger, melting their hazmat suits. The boys are beginning to get unnerved, but I fear something worse.”
“May 7th, 2017. It is 3:10 am. The external towers have gone off now, the radiation has mostly likely radiated the cables and lines. Thankfully the emergency generators haven’t been touched yet.”
May 7th, 2017. It is 4:00 am. Our worst fears have been confirmed. All of the Seal Team members are dead, except for one. On the security cams we saw a glowing hand melt through the security doors, before his whole body melted through. He rolled through the hole, before getting up. Soon after that the camera went off. I think he fried the circuits.”
“May 7th, 2017. We’ve lost visual contact with the exposed man. All our cams are off. So far we are fine, but if the radiation gets worse, I don’t know if the doors can withstand the radiation for much longer.”
“May 7th, 2017. In case something happens, this is the last recording I will make. Don’t have sympathy for me, don’t care about me. To anyone who finds this, do NOT allow them to restart this project. We have created something new, something much worse. William is trying to make a sign or note to anyone who finds our computer terminal and what to do. Please shut down this project, bury it as deep as you can- oh god, oh god he’s here everyone get down!”
The sound melting metal is heard, along with a loud groan that doesn’t sound human. A scream is heard in the distance, the melting metal stops and heavy footsteps begin to fade as the exposed man begins running to the source of the screaming.
“Oh fuck we’re breached. William get that note written now! Use whatever you can! We don’t have much time, promise me you’ll kill this project- ARGHHHHHHHHHHHHHH” all 4 men begin screaming in agony. The sounds of their screaming go for a long time before eventually dying down, with the only sound remaining is sizzling.
“Fuck” Alice said, as she and the Echo Team looked around at the men. The sound of something screaming in the distance caught their attention.
“Let’s go” Alice said as she took charge and the soldiers followed behind her.
The followed the sounds of screaming through a few hallways before a sudden wave of heat hit them. The counter began to rise rapidly, before the glass broke. Echo #01 was forced to drop the counter as it began getting hotter and hotter. They all rounded the corner before stopping and seeing the exposed man, standing in the hallway, hunched over and shaking violently. His skin was a bright green, his bones could been seen in black outlines and the hazmat suit had the top half melted off. The exposed man turned around upon sensing their presence. His eyes were brighter than his body, almost casting a spotlight on the Echo team. Instinctively all of them raised their guns, aimed at him. The exposed man made a loud screeching noise before running at them.
They all opened fire and the bullets tore through him but didn’t stop him. Glowing splats painted the walls as he continued charging. Echo #04 held his gun up with both hands, bracing himself for the impact. The exposed man tackled him over, his hands immediately melting through his protective armor.
“AHHHHHHHHHH!” Echo #04 began screaming, before stopping when the exposed man pressed his hands to his forehead, melting through it and melting his brain. The exposed man got back up and charged at the rest of the members. Alice and Echo #01 and #02 began to run, hopping to get to a wider space to avoid the exposed man. They all made it to the open area, except for Echo #03. He managed to reach the end of the hallway, before the exposed man began running into him. Echo #03 locked arms with him, before turning and throwing him away. Echo #03’s gloves and shoulder pads were exposed.
“AHHHHHHHHHHHH!” He began screaming as his body fell to the ground, his body convulsing rapidly. After a few seconds, the screaming stopped and the body went limp. The exposed man got back up and turned his attention to the remaining members. Alice threw her gun on the ground and stood between Echo #01 and #02 and the exposed man. The exposed man began screeching and running at Alice. Alice tightened her stance and was preparing for impact. The exposed man and Alice locked arms with each other, Alice’s arms on his shoulder and his arms going for her face. His hand was inches from her face but Alice had a tight grip of him. In a quick and easy swoop, Alice moved her right arm to his throat, grabbing it. The exposed man stopped going for her throat and his arms went to her arm. He began clawing at it, but Alice didn’t let go. Her arms began to spark up as the radiation tried to eat through her arms. Alice let go of her left hand and pulled it back, making her hand into a fist before driving it into the exposed man’s face. The impact made all the bones in his face crack, the exposed man temporarily stopped clawing as he stood dazed. Alice then winded up her arm again, before driving it back into his face. She punched him again and again until he stopped moving entirely. Alice let go of his throat and he fell to the ground, unconscious.
“Echo #02. Take off Echo #03’s suit” Alice instructed
“What?” Echo #03 replied, not sure if he heard properly
“His suit, take it off him and bring it here” Alice repeated, this time more aggressively
Echo #02 walked over to Echo #03 and ripped the suit off of him, which started to begin sticking together from the flesh. Alice took the suit and laid it over the exposed man’s head. She then proceeded to rapidly punch the man’s face, caving it in as the sound of bones breaking and radiated blood began spraying. After a few more punches, Alice stopped and took a few steps back. The blood managed to eat through the armor plating, melting it. The radiant glow from the man began to fade. After a few minutes of waiting to make sure he wasn’t coming back to life, the Echo team began to leave. They reached the entrance to the lab and once outside, could safely take off their head gear to breathe.
“Echo #01, call it in. The SECT is officially taking over and if anyone tries to complain, direct them to me and I’ll sort them out” Alice instructed
“Understood” Echo #01 replied and moved to the bus to begin his work
“Echo #02, grab whatever is strong enough to survive and transfer the data recordings over, then send them to the Director”
“Understood” Echo #02 replied and moved to begin his work.
The SECT arrived and began to cover up this mess. The whole incident was covered up as a fire incident and the Nuclear Power Plant was shut down completely. Whatever experiment was going on was seized by the SECT and hidden away. The power plant was locked down and anyone who got out before the radiation took over was threatened to keep quiet about what happened. Alice and the remaining Echo team returned back to their base, to get first aid and await further orders.
“What the fuck happened there?” Alex asked as he applied applying a special chemical to Alice’s arm
“Some sort of experiment gone wrong I think. I don’t know and I don’t want to” Alice replied
“Well, at least we figured out what can hurt us now. Could be a good exit plan” Alex joking said
“Maybe for you, I plan on living as long as I can” Alice replied sternly
“Okay, all done. Take it easy now” Alex said as he put a plastic coating on her arm.
“Thank you” Alice replied, examining her arm before getting up from the table. Alice examined her wounds and noticed that they were completely healed.
0 notes
elizabethaudrey · 4 years ago
Text
DappBirds&EOSC DApp sport ecological development road
EOSC mainnet Continue to evolve towards a decentralized high-performance smart contract platform attention Guide
Tumblr media
On December 12, 2019, Beijing period, DAppBirds operating bird brother published a community revealing on the EOSC local community with the theme of "Where to find a good DApp". He mentioned: "EOSC is the first of many public chains to adopt a decentralized spending budget. The systematic general public chain, through the spending budget system to achieve ecological design is an extremely interesting path inside our opinion. It solves the dilemma of developers in the first cool start, and in addition solves the dilemma of the project's early promotion and publicity." The following is a record of sharing. 1. Introduction to DappBirds Hello everyone, I'm the operating bird brother of DAppBirds, a game lover, and this issue I will share with you these days is: How exactly to discover a good DApp. Very first introduce our current primary operating platform DB: DappBirds may be the world's leading Dapp ecological support platform, from Dapp data analysis, to create, chain reform, issuance, operation, cross-chain, and deal. It's been docked with more than 14 This general public chain consists of almost 4,000 DAPPs, chain reforms and releases a large number of chain games. It is also the only system in the market that has individually developed access to wallet solutions and can be straight downloaded in the worldwide AppStore. The merchandise are currently PC, H5, Small programs, APPs are completely covered, and there is a forward thinking game mining swimming pool model. IOST is already the very best ten mining pool node on earth. It can be seen our team has helped the public chain to accomplish a lot of landing issues. Additionally it is among the essential node people of the current mainstream open public chains and contains rich expertise in ecological landing. 2. Hundred billion U.S. dollars blockchain sport market As a sunrise industry, the game industry has maintained rapid growth in the last 20 years, forming explosive growth and iteration, that is fundamentally the dual impact of fluctuations brought about by the launch of dividends and changes on the need aspect and the source side. From the aforementioned picture, we can see that the "2018 Global Game Market Report" released by market research company Newzoo demonstrates the global game market revenue in 2018 reached 125.4 billion U.S. bucks, and this data will reach 143.5 billion U.S. dollars by 2020. The gaming sector is likely to end up being the most rewarding industry in the entertainment industry within the next ten years. Among them, the Asia-Pacific video game marketplace revenue in 2018 will reach 71.4 billion U.S. bucks, accounting for 52% of global game revenue, a year-on-year raise of 16.8%. Thanks to the growth of smartphone games, the Asia-Pacific region's share of the worldwide game marketplace has increased year by year. THE UNITED STATES continues to be the world's second largest game marketplace, accounting for 23% of the worldwide game market's complete revenue, a year-on-year increase of 10%, and is expected to reach US$32.7 billion in 2018.
Tumblr media
The share of Europe, the center East, and Africa slightly lags behind THE UNITED STATES, accounting for 21% of total global game revenue, and is expected to reach US$28.7 billion in 2018. The overall game marketplace in Latin America will grow to US$5 billion this year, accounting for 4% of the global market share. However, previously two years, with the rise of short video, live broadcast along with other entertainment strategies, user dividends possess declined, and the game life routine is short. Apart from several games, there is little area for enhancement in payment prices and ARPU, which also makes the traditional game industry extremely competitive. It has triggered many little and medium-sized sport manufacturers to survive. The reason for this situation is related to the requirements of users, in fact it is directly related to the abuses of traditional games over the years. This means that that the game has further established its leading position in global entertainment activities. The blockchain industry has experienced explosive growth previously 2 yrs. In 2017 and 2018, average users increased by thousands. By 2018, nearly 25 million users created a market of hundreds of vast amounts of dollars. Games employ a special status inside the blockchain field. Because whether in the traditional Internet industry or the blockchain field, games are among the easiest sectors to understand, and the game industry nevertheless has the characteristics of low learning from your errors costs. Because the development of blockchain games, countless teams have successively introduced many new game types and gameplays, including works which are very successful both in terms of data and company, and gradually formed a mature business model and distribution strategy. Especially before two years, blockchain games have formed explosive growth, forming a globally distributed user group with high willingness to pay. And the pattern of younger blockchain users obviously has very strong investment attributes and is unanimously well-liked by the exterior world. If the blockchain can take root in the overall game industry, you won't only rectify the name of the blockchain, but also obtain an encrypted currency flow portal that connects billions of people. But at the same time we also note that the original game market has many discomfort points: 1. Dislocation of data ownership Users pay time and money costs when working with game products, but they cannot obtain the corresponding value possession rights. Game companies may control user data and user assets without supervision, which in disguise makes users' legal rights and interests continue being damaged. 2. Fragmentation of asset value The economic system of the overall game is fragmented. Each sport has an independent economic climate and can't be interconnected with other games. The life cycle of the overall game is bound. For players, after the video game is stopped, the digital property that has been paid will undoubtedly be lost and wasted. The circulation of game assets is inefficient, and there are problems such as for example inconsistent transaction standards, high transaction costs, and transaction security suffering from many uncertain factors, which restrict the circulation of game asset value. 3. Uneven distribution of resources The monopoly of resources in traffic and monetization, and the free competition in content production, have caused the expense of game production and distribution to continue to go up, which ultimately greatly increased the risks for practitioners and investors. There are always a large numbers of uncertain factors along the way of game distribution, leading to independent game developers and small and medium-sized game companies with an individual ability, even though they have excellent creativity and product capabilities, it really is difficult to build competitiveness with resource-based companies. 4. Lack of transparency In the game, players will usually get some rare items by means of monster drops. For gamers, these rare game items have important value, either they are able to quickly improve the skills of the character, or they may be exchanged for a degree of game foreign currency. In today's game atmosphere, the actual drop probability of these rare items is often not really disclosed. These methods that lack transparency have impacted the playability and fairness of games.
Tumblr media
5. Safety hazards With the continuous development of the overall game marketplace, the security of virtual house in the overall game has received constant attention. Frequent cases of theft and hacker attacks in virtual transactions have caused the players' own interests to be significantly damaged. Second, the existing game props are issued by video game companies. Game props are locked in a certain video game. If the game stops for some reason, the player will also lose the house rights of the game props, that will also lead to the player's very own passions to be significantly damaged. Simultaneously, we are fortunate to possess access to blockchain technology, and we've also seen that blockchain technology + game content ecology will solve related pain points and have many advantages. We believe that blockchain technologies does not produce modifications, but provides fresh possibilities and ideas, technically solves the essential trust issue, and truly returns the rights and interests that should participate in users. The mix of blockchain and games has taken about changes in thinking and business models for games, along with the possibility of nurturing new game types and gameplay. Weighed against traditional games, it has an advantage that cannot be replicated. Included in these are: 1. Asset possession and liquidity Blockchain technology enables the ownership of digital resources to be fully attributable to users. Gamers invest time to obtain valuable virtual items. They're no longer affected by operators' shutting down of services and secretly changing data. They will also gain stronger participation when doing offers. sense. Players can dispose of their own possessions anytime and anywhere, and different game manufacturers can trade or transfer assets to other games for make use of, which greatly improves the liquidity of resources. 2. Provides the idea of "Game is Investment"
Tumblr media
The application of assets on the chain prevents game programmers from spamming game currency and props. Gamers can vote making use of their foot to abandon the official game "hard fork" out of private servers. Unscrupulous manufacturers will undoubtedly be abandoned and powered by greed to commit evil The cost has become very large, so the value of digital assets could be preserved or even increased. Beneath the protection of the system, the user's sport behavior is valuable. The overall game is no longer a genuine entertainment and intake activity. Players can obtain reasonable value through their own investment in game time and money and advantages in game abilities. Return. In this case, playing games may no more be "waste" but "investment". 3. Transformed the partnership between players and game manufacturers Using the distribution associated with rights plus interests of the token economy, players gain a certain right to speak, and the interests associated with the manufacturers become consistent, plus the players gain a certain right to speak, and the interests of the manufacturers turn out to be consistent, to allow them to reach a certain consensus, form the community, plus jointly keep up with the sport The development associated with the game brings unprecedented freedom and democracy in order to the game. 4. Home based business logic The mix of the token economy and the game has brought unlimited possibilities for the economic model inside and outside the game. Essentially, blockchain technology has solved the issue of "have faith in". Through the gradual exercise of the concept of decentralization, it is expected to realize the web simultaneously. Free democracy and efficient collaboration stimulate the enthusiasm of ecological participants and bring unprecedented creativeness and vitality to the community. Furthermore, through completely fair and transparent on-chain correct confirmation technology, digital assets have grown to be the label of visitors, and new video games could be streamed through digital asset reuse or benchmarking airdrops, thereby reducing customer acquisition costs. In a nutshell, with the continuous improvement of blockchain technology and the continuous innovation of token design, blockchain games will continuously gain brand-new empowerment, thereby creating greater value, and the future of blockchain games is immeasurable. GoBlock: EOSC's initial chain game GoBlock game may be the first on-chain game developed by EOSC and DappBirds, in fact it is also the first step inside the cooperation among EOSC and DappBirds. 1. Introduction to Gobock sport: "GoBlock" is an extremely fun casual shooting game released by DAppBirds predicated on eosc. You can choose weapons, update weapons, eliminate all sorts of nasty virus blocks, and share higher ranking rewards each day. . 2. GOblock advancement process: * Developer: 5 people altogether, including 3 developers, 1 artist, and 1 product * Development cycle: front-end and back-end programs, art, products (estimated 10 business days) * Development costs: 240,000EOSC server maintenance costs (50,000) labor costs (190000) 3. EOSC budget system EOSC is the first public chain to adopt a decentralized spending budget system among many general public chains. Its application releases and ecological expansion. All teams can donate to the ecology through budget applications. In this manner is in our opinion. An extremely interesting street. He solved the issue of programmers in the early cool start, and in addition solved the issue of the project's earlier promotion and publicity. At the moment, for most general public chains in China, rewards for programmers and ecological expansion remain at the phase of centralized Bounty centralized procedure. For the public chain, as well as the node part, ecological expanders and programmers and neighborhood communicators benefit from the whole ecosystem. Over time, it is a process of long-phrase ecological prosperity. This is actually the first time to cooperate with EOSC. It is extremely identified for EOSC's high-efficiency, low-latency functionality and decentralized neighborhood operation and growth. You will see more cooperation and typical development later on. Thank you. -- Recommended reading -- -- Join the EOSC neighborhood -- EOSC Community Collection Group EOSC Neighborhood Telegram Group
0 notes
piercemxt228-blog · 5 years ago
Text
Say Goodbye To Mistakes With Roblox Id Codes
Just how to eliminate Roblox Infection Is Roblox safe for kids What Parents Required to Understand About Roblox Roblox closing down: Is Roblox shutting down TODAY? Here'' s what you require to know Robux Just website how much does Robux set you back?
Tumblr media
Or do you simply want to hang out and chat with your buddies online? An expanding library of worlds created by the community means there's constantly something exciting and brand-new for you to play every day. On July 12, 2016, the looks of the visitors were changed for the first time in a while. The male guest (BillyBloxxer) put on a Roblox jacket, black denims, and also truth Blue Hair.
RAREST PET CRATE UNBOXING IN ROBLOX! (Roblox Phantom Forces) - Czas trwania: 21 minut.
This ever-changing and increasing library of games is a huge component of Roblox appeal. Combine this with the millions of various other players to complete versus in obstacles as well as you have the perfect recipe for young people to delight in. These games can then be played by kids worldwide, typically on the internet with each other, through a phone or tablet application or an internet internet browser. This is the concern that a lot of parents are coming to grips with, complying with the recent problems elevated in the media. To aid ease those fears, Pocket-lint technology journalist and Gamings Expert, Andy Robertson clarifies the video game and also how it can be played securely.
How much does Robux set you back?
Is Roblox down today?
Epic Games' Fortnite is said to be shutting down in June 2020.
Roblox likewise enables your kid to block as well as report disruptive or frustrating players. Naturally, this additionally produces a chance to have a discussion regarding on the internet etiquette, which truthfully should not be all that different than exactly how you educate them to behave off-line! " Do unto others as you would certainly have them do unto you" goes a lengthy means. An additional basic web safety guideline is to never share personal information or passwords online.
Gamers can get Robux by buying Robux with genuine currency, from a persisting Robux stipend given to participants with premium membership, and from other gamers by selling digital material on Roblox. Customers can bid on an advertisement for their games, apparel, groups or models for various quantities of Robux. Users can create a Badge for their video game at a price of 100 Robux each.
Tumblr media
When a gamer hovers the computer mouse over a guest image when checking out video game servers, the name utilized to look like "A Pleasant Guest". This was altered to read "A Roblox Player" before the Visitor function was removed. The Guest was a function developed for the meant use letting newcomers test Roblox prior to making an official account. They were presented on September 26, 2008. The last revision of a Visitor's character. Robux is the virtual money in Roblox that permits players to acquire various products.
Later on, Guests would certainly be provided the exact same look as the "ROBLOX" account, including hats, enabling Visitors to technically "attempt" devices and have the ROBLOX account's gears. If a player joined a video game while not logged right into an account, they would be labeled as a "Guest".
All the games function penalty without additional web content, but at the exact same time will signpost players to benefits of investing cash as this is how video game makers make a profit from their developments. The very best remedy to this is to specify the Account Constraints embeding in the linked Roblox account. This limits the usable video games to those selected by Roblox itself. Although do note that establishing a child's age as under 13 does not restrict the video games they can accessibility.
Is Roblox better than Minecraft?
Roblox is a totally different kind of games than Fortnite. It's hard to compare them. Roblox allows you to be creative, to build virtual objects, worlds, and even games. So, you can have lots of fun here, and the type of that fun will depend on your mood, on your gaming preferences.
Tumblr media
( If the game was set to R6 Just, then R6 would have been used.) After Roblox presented a brand-new logo design, the guest's shirt transformed to the brand-new Roblox Logo design Coat on January 16, 2017 (six days after the logo design started usage). Afterwards, sex choices were included, enabling Guests to appear as "BillyBloxxer" or "BettyBloxxer". They had really similar looks to the user ROBLOX but had different hats depending on the gender chosen. BillyBloxxer wore the Red Roblox Cap, while BettyBloxxer used the Pinktastic Hair.
The women guest (BettyBloxxer) is similar to the male visitor other than it wore the Lavender Updo Hair. The other visitor kind (DefaultGuest) looks similar to both the other guest types except it was bald. On September 13, 2016, guests started to put on the Robloxian 2.0 package and also the DefaultGuest started wearing theROBLOX 'R' Baseball Cap.
Guest
As discussed above, the Roblox infection declares to be an in-game hack and also. Email spam projects distribute destructive add-ons (typically MS Office papers) that, when opened up, carry out commands that install as well as download malware. Unofficial download sources existing destructive executables as reputable software, thus fooling customers into downloading and install and mounting malware. Fake updaters infect the system by manipulating outdated software program bugs/flaws or just installing as well as downloading and install malware instead of updates.
Exactly how did Roblox virus contaminate my computer?
The Roblox virus is trojan-type malware that claims to be a dishonesty application for a game called Roblox. Some players think that this harmful app will substantially alleviate gameplay (allegedly enabling them to produce in-game currency at no cost), yet they simply end up contaminating their computer systems. Restricting your children's accessibility to on the internet video games is the number one method of stopping your child's ability to connect as well as see with unsuitable material.
0 notes
magzoso-tech · 5 years ago
Photo
Tumblr media
New Post has been published on https://magzoso.com/tech/social-media-platforms-that-thrived-or-died-in-the-decade-past/
Social Media Platforms That Thrived (or Died) in the Decade Past
Tumblr media
“You are what you share.” These famous words from Charles Leadbeater’s renowned book ‘We Think: The Power Of Mass Creativity’ are extremely apt in today’s times. Your personal and professional resume gain extra weightage, based on the number of followers, and the number of eyeballs your social posts get. The last decade in particular, has seen the evolution of social media in tonnes of growth spurts. It saw TikTok become a household name, and Tinder became the new way for people to find partners. While some social media platforms thrived in this Internet era, some stumbled off the shelf.
The increasingly competitive market space and the ingrained fleeting nature of social media forced some platforms to shut shop as well. The biggest shockers were Orkut, Google+, Yahoo Messenger, and Blackberry Messenger or BBM, as users fondly liked to it. In the face of the competition, these didn’t manage to grab their audience’s attention long enough and were forced to close down. As far as social media is concerned, this was the decade of WhatsApp, Instagram, and TikTok.
We have compiled a list of big social media networking platforms that debuted in and reigned in the last decade, and a list of platforms that succumbed under pressure. Some of the platforms that died saw significant highs at the beginning, only to be shut down years later. This list is filled with nostalgia, heartache, and is a nagging reminder to a massive life reality check – nothing lasts forever.
Instagram 
Instagram is one of the biggest social media platforms in the world right now. The image-sharing app was launched in 2010 by creators Kevin Systrom and Mike Krieger, and was acquired by Facebook in 2012. It enjoys over one billion monthly active users, and has 500 million users who use Instagram Stories every day. The app was also the second most downloaded free app on the App Store in 2018 (2019 stats still not available). Instagram allows users to share photos and videos, lets you follow friends and influencers, and even post 24-hour snippets called Instagram Stories. Currently, Instagram competes with Snapchat and TikTok in the social networking space.
Snapchat 
Snapchat arrived at a time when Facebook and Twitter were already extremely popular, and Instagram was gaining momentum as well. Launched in 2011 by Evan Spiegel, the photo and video sharing app now enjoys 210 million daily active users (as of October 2019). Snapchat played on the idea of disappearing messages, something that wasn’t tapped into before. This feature has since been aped by Facebook in all of its properties – including WhatsApp and Instagram.
Telegram 
Telegram is essentially a WhatsApp alternative, and has grown quite a bit of fan following since its launch in 2013. As of March 2018, the app enjoys 200 million monthly active users, and Telegram gets new features regularly via updates. It competes directly with WhatsApp that has taken the instant messaging world by storm.
TikTok 
Having launched in 2017, TikTok is touted to be the fastest growing social media app out there. It has almost 500 million active users, and was the third most downloaded app in Q1 2019 with 188 million downloads. This is 70 percent growth from Q1 2018. The app looks to fill the void that Vine left, but it offers a lot more. Influencing creators on TikTok are considered celebrities, and it is well on its way to world domination. The latest data from App Annie suggests that TikTok is continuing its explosive growth around the world, with the insights company ranking TikTok just behind Instagram in terms of monthly active users through the third quarter of 2019.
Pinterest 
Founded in 2010, Pinterest offers online discovery of information in the form of images, GIFs, and videos. As of August 2019, the platform has reached 300 million active users. Over time, the platform has attracted over 200 billion Pinterest pins, and over 4 billion Pinterest boards. Interestingly the gender parity is quite large, and 70 percent of Pinterest users are females.
Tumblr media
Over time, Pinterest has attracted over 200 billion Pinterest pins
Tinder
Tinder, a unique dating app, was welcomed with open arms. Launched in 2012, it has now become quite popular amongst teenagers. Recent user statistics are not known, but a 2018 report states that over 57 million people use Tinder around the world, out of which 4.1 million Tinder subscribers pay for a premium Tinder Plus and Tinder Gold. Furthermore, Tinder is used in 190 countries, and is available in 40 languages.
Quora 
If you’re looking for answers, Quora is possibly the place to go to. From questions like ‘Which is the best way to learn programming?’ to questions like ‘Which is the best country to migrate from India and start a new life?’ – all of these are answered in detailed manner by varied users. This platform was launched in 2010, and is now a pool of some great answers. Quora’s userbase is constantly growing. It grew from 200 million monthly active users in 2017 to 300 million monthly active users in 2018.
Tumblr media
Quora was launched in 2010, and is now a pool of some great answers.
Facebook Messenger 
Facebook Messenger was introduced as a separate app by the social giant in 2011, forcing users to download the app from the app stores if they wished to continue chatting to their Facebook friends. While user base stats of the app are not known, Facebook last year introduced AI bots for businesses to chat with clients easily.
Mastodon 
Mastodon, an open source decentralised social networking platform, is fast gaining popularity. Touted to be an alternative to Twitter, the Mastodon community has grown to over 2.2 million people. Unlike Twitter, where one corporation has full control over the rules and regulations, any user can create their own server of Mastodon and manage it.
Twitch 
Twitch is a live video streaming platform that was launched in 2011 and is prominently used for gameplay streaming. It is particularly famous in the US, and as of 2018, it enjoys 2.2 million broadcasters monthly and 15 million daily active users. The platform is owned by Amazon. As of October 2019, Twitch owns 75.6 percent of the streaming market, and YouTube is second with 17.6 percent.
Periscope 
Periscope is also a live streaming app that was launched in 2015 by Twitter. The successor of Meerkat, Periscope has managed to stand its ground in a space where many have faltered. Twitter doesn’t reveal usage stats of Periscope.
Minds 
Minds was launched in 2015, and it essentially runs on the same principle as Mastodon. The open source network rewards its users with tokens for their contribution and engagement. As of March 2018, Minds has over 1.25 million registered users and 105,000 active users.
Helo 
Helo is a newly launched social media app made for the vernacular speaking audience. The app has seen a sharp rise since 2017, and it has 50 million active users in India alone. While traditional social media apps are available in the universal language of English, Helo tries to offer solace to the large vernacular speaking audience. The app supports 13 Indian languages.
ShareChat 
ShareChat follows the same principle as Helo, and taps into the vernacular speaking audience as well. The Indic language-based social network ShareChat app has been growing steadily over the last two years. Launched in 2015, the app is now touted to be India’s largest vernacular social media platform with nearly 60 million users. ShareChat has some big investors like Xiaomi and Twitter, and latest round of funding was led by the latter. The Bengaluru-based chat app startup is today valued at over $600 million.
WhatsApp
Wondering why WhatsApp is at the bottom of this list? Because, it was launched in the latter part of 2009 missing this decade by a few months. While this list is all about the social media platforms that launched and grew in this decade, we couldn’t leave out WhatsApp as its evolution began in this decade, changing the digital social landscape of today. The app became the world’s most popular messaging app in 2015, and as of February 2018, it enjoys more than 1.5 billion users worldwide.
Tumblr media
As of February 2018, WhatsApp enjoys more than 1.5 billion users worldwide.
Google+
Google+ was launched with a lot of promise in 2011, but succumbed to the competition from Facebook and others. The final nail on the coffin was a major security issue that was reportedly discovered, compelling Google to shut down Google+ in April this year. The company also claimed that its social platform wasn’t experiencing enough usage or engagement from its users with most sessions maxing out at 5 seconds.
Orkut 
Orkut was a household name in India in the latter part of the last decade, but the growing popularity of Facebook got users to migrate from Orkut, leaving it no option but to shut down in 2014. Owner Google said that other platforms had outpaced Orkut’s growth, and the website no longer exists. Google then pegged its hope on Google+, but sadly, that platform also fell off the shelf this year.
Tumblr media
Orkut was shut down in 2014 by Google Photo Credit: TheNextWeb
BlackBerry Messenger
BlackBerry Messenger also shut shop earlier in May this year, blaming the difficulty of bringing new users to BBM as one of the top reasons. BBM was one of the most loved instant messaging applications of its time, but its popularity dwindled as competing chat apps like WhatsApp and Facebook Messenger gained momentum.
Vine
In 2016, Twitter announced that it was shutting down Vine, a popular video loop app that offered users the ability to make and share six second videos. The app couldn’t compete with the rising popularity of Instagram, and users who were once considered as Vine celebrities started posting videos on Instagram instead. Instagram can be considered as a big reason why Vine became obsolete.
Yahoo Messenger
If you’re a 90’s kid, there are high chances that you’ve used most of the apps mentioned on this grim list. While these apps don’t exist today, they were once an integral part of our online social life. Yahoo Messenger was once such instant messaging app that died last year. In its prime years, the service was the most used as it was an alternative to emails and SMS messaging. However, with the arrival of smartphones, Facebook, and eventually WhatsApp – Yahoo Messenger lost its steam and users started to switch.
Path 
Initially launched in November 2010, Path social platform served as personal journal of sorts that you could share with your family and friends. This platform gained over a million users once, but eventually died in 2018 due to lack of proper growth and increasing competition.
iTunes Ping 
Apple’s promising iTunes Ping social network failed to gain traction that it had hoped from the users. The music-based social network was launched in 2010, and was shut two years later. It is one of the biggest examples of Apple having difficulty in getting people to use its web-based services.
Meerkat
Meerkat, the once popular live-streaming app, closed in 2016. It was early on the scene by launching a live-streaming service ahead of Twitter and Facebook, but its fame was short-lived.
Yik Yak 
Yik Yak was an anonymous messaging app for college students that shut shop in 2017. The app rode to popularity after its launch in 2014, but soon became a breeding ground for hate speech, cyber bullying, discriminatory speech, and gun and bombing threat, all under the garb of anonymity. The company tried to bring in measures to curb the slur, while also maintaining anonymity, but it then started to lose user base, and had to wind down operations eventually.
Friendster 
Friendster was one of those social networks that helped kick off the social media era. It was founded in 2003, and soon lost credibility due to technology issues. There were problems in feature launches, and it soon drifted into irrelevance as Facebook gained momentum quickly. Interestingly, in the early days, Friendster investors reportedly had approached Facebook with an acquisition deal, which Mark Zuckerberg then refused. Zuckerberg later bought Friendster’s entire portfolio of social networking patents for reportedly $40 million. Friendster closed its doors on 2015.
Friends Reunited
Friends Reunited, another pioneer in the social media industry, announced that it would be winding down in 2016. The platform was launched in 2000, but couldn’t keep up with the likes of Facebook, Twitter, and Instagram. In its closing announcement, the company’s founder Steve Pankhurst said, “It is clear that the site is no longer really used for the purpose it was built for … therefore, it is with a heavy heart, that we have decided to close the service down.”
Pheed 
Pheed was launched in 2012, and the social platform let you share texts, photos, and videos, just like the others. It managed to top the App Store charts in the social networking category in just a year after launch. Aimed at teenagers, it failed to gain the long-term momentum it hoped for. Pheed was sold to American Movil in March 2014, and in April 2016, Pheed was shut down and the technology was integrated to América Móvil platforms.
DailyBooth 
DailyBooth was a social network that allowed users to take a picture of them every day, and post it with a caption. The website would in turn generate a little flip book style video for its users. While the concept was intriguing, it never truly broke through to the mainstream, and had to close down in 2012.
Tbh app (Facebook-owned)
Tbh app, another anonymous social app, was launched in 2017, and in just a month it managed to rank number one in the US App Store. It was acquired by Facebook soon after, but its fame was extremely short-lived, as the social giant announced its discontinuation in July 2018 due to low usage.
Eons.com 
Eons.com was yet another social networking site founded in 2006, and this one tried to cater to the baby boomers and users over the age of 40. The site was shut down in 2012, after a business issue with the service provider was not resolved. To this date, the site remains shut.
0 notes
southeastasianists · 7 years ago
Link
On June 9 2017, a Thai man was sentenced to 35 years in jail for sharing Facebook posts. The crime: he allegedly defamed the king.
This harsh sentence is just one example of Thailand’s increasing repression in the digital sphere. Since the 2014 coup, the Thai military junta has take a hard stance toward online critics and dissidence.
In May, authorities threatened to shut down Facebook if the company failed to remove content deemed “inappropriate”. Facebook, which did not comply, has not been shut down. At least, not yet.
Cyber repression in Thailand
Thailand’s cyber repression seems to be linked to its troubled history of military coups.
At the advent of the 2006 military coup, the Computer Crime Act was passed, authorising state agencies to block internet content deemed a threat to national security. It encouraged “netizens” (web users, many of them young) to monitor and report transgressive internet behaviours.
This early effort emerged from alarm about the fact that the country’s two main factions, the red shirts and the yellow shirts, had taken their fight to cyberspace, with the red shirts vocally opposing the coup and questioning the country’s monarchy.
Internet control increased tremendously after the May 2014 coup, staged to facilitate royal secession and preserve elite status quo in Thailand.
Hundreds of websites were blocked during May 2014 alone, and working groups were set up to monitor and analyse internet content.
This heightened control was accompanied by a dramatic increase in lèse majesté charges against critics, dissidents and ordinary citizens. Non-criminal acts such as sharing or “liking” a Facebook post or chat message that insulted the monarchy became punishable by long jail sentences.
And in 2015, the Single Gateway proposal sought to monitor internet content by reducing the existing 12 internet gateways to a single, state-controlled portal.
The Single Gateway policy under attack
Against these continuing encroachments on digital privacy, Thai pro-democracy activists and civic groups have waged a courageous battle.
Opposition to the Single Gateway plan cleverly centred not on digital rights and freedom of expression (though those concerns were evident in the debate), but on more universal issues, such as e-commerce and the economy.
Some business groups, concerned that the proposal would slow internet connectivity in Thailand, raised alarm that the Single Gateway would discourage foreign investment in the country. Ordinary people, too, resented the attempt to limit internet access.
Thailand’s internet-penetration rate is 42%, and over 29 million citizens go online for entertainment, communication, public transport and food delivery.
Online game players and techies were worried that the policy would affect the speed of online games and expose their personal data.
Amid these diverse concerns, three forms of activism emerged.
The Internet Foundation for the Development of Thailand  and the Thai Netizen Network created a Change.org petition online to gather signatures against Single Gateway, providing information to citizens about the effects of the proposed legislation.
Alternative discussion forums also cropped up on Facebook and elsewhere. In groups like The Single Gateway: Thailand Internet Firewall,  Anti Single Gateway, and OpSingleGatway, people from across Thai society braved criminalisation to join the debate on internet control.
An anonymous group calling itself the Thailand F5 Cyber Army utilised a so-called “distributed denial of services” (DDoS) system to wage cyber war on the Thai government. It demanded that the junta completely cancel its Single Gateway policy.
They encouraged netizens to visit official websites (among them the Ministry of Defense, the National Legislative Assembly and the Internal Security Operation Centre) and to repeatedly press the F5 key, which causes the webpage to refresh constantly, overwhelming servers.
The attacks caused many government web pages to shut down temporarily, in part because the sites were technologically outdated.
Coupled with other forms of resistance, this virtual civil disobedience worked. On October 15 2015, the junta announced that it had scrapped the plan.
The Computer Crime Act campaign
But the victory was short-lived. In April 2016, the junta proposed to modify the 2007 Computer Crime Act to better tackle cyber threats to national security, claiming it would help develop Thailand’s digital economy.
Activists again geared up for a fight. This time, given the law-and-order frame of the proposed amendment, public criticism of it took a different shape.
The business sector abandoned its concern over the economic effects of internet control to focus on the proposed law’s broad threat of legal sanction against violators, anticipating that fear would lead to self-censorship online.
Netizens used online forums to discuss the impacts of the cyber law, including the fact that it was gearing toward increasing sentences against loosely-defined cyber law “offenders”, whose crimes could merely be sharing a Facebook post deemed a threat to the nation’s moral integrity or considered distorted information.
Rights groups such as iLaw and Thai Network of Netizens took to Twitter and engaged with progressive online magazines to raise public awareness of the issue. They also worked with environmental activists who had already experienced local authorities’ abuse of the Computer Crime Act.
Meanwhile, the F5 Cyber Army continued its attacks on government websites, providing manuals so ordinary citizens could wage cyberwar. And an online petition, which received more than 300,000 signatures, was submitted to members of the National Legislative Assembly.
This time, though, popular discontent went unheeded. On December 16 2016, the revised Computer Crime Act passed in the Assembly.
Cyber activism and political messages
There are lessons to be learned from the very different outcomes of these two similar campaigns against internet regulation.
Opposition to the Single Gateway plan concentrated on its likelihood to slow internet speed. The consequences for the economy and everyday conveniences were obvious, even to apolitical citizens and junta sympathisers.
This was a critical breakthrough, because these are vulnerable policy areas for the junta. Thailand’s military leadership derives its legitimacy partly from Bangkok’s middle class, whose livelihood and everyday convenience depends on the country’s continued economic growth and global connection.
The junta had more success in its second attempt to limit internet freedom by changing its framing of the issue. By invoking a law-and-order rationale, which has constituted the junta’s source of legitimacy since its seizure of power, the government could argue that the impact of the proposed law would be finely honed: only “wrongdoers”, not regular netizens, would be punished.
This sleight of hand ultimately enabled the government to criminalise an array of online activities, handing privacy-rights advocates a major defeat. Next time the junta seeks to obfuscate its agenda with a law-and-order rhetoric, Thai activists will be better prepared.
24 notes · View notes
joshuajacksonlyblog · 5 years ago
Text
TipJar Shuts Down as Cryptocurrency Market Slows
Cryptocurrency micropayment service TipJar is shutting down in Q1 2020 due to low usage, developers have confirmed.
Cryptocurrency Tipping Fails To Catch On
In a Reddit post on October 6, user u/doppio requested users withdraw any remaining funds held on their accounts. 
TipJar’s Reddit bot for automated payments will stop functioning immediately, he said, with the website to follow “in six months.”
“I had a great time creating this service, and it was fantastic seeing all the engagement when it was being used actively, but lately there has been very little activity on the bot,” the post explained. 
“I have been paying the monthly server fees for several years, and although they are pretty minimal, at this point it doesn’t make much sense for me to continue putting money into the service when it’s going unused.”
TipJar used Ethereum to offer micropayments on social media in various cryptocurrencies. Born in 2017, the service saw the considerable decline in altcoin markets continue for most of its existence. 
u/doppio added he was considering making TipJar’s code open source once the shutdown was complete, something users had long requested.
“I have been asked a lot about making the code open-source, which I have been hesitant to do before doing a more rigorous analysis of the system’s security, but I would be happy to make the code open-source when the service is no longer running,” he concluded.
ChangeTip Showed Tough Market Challenges
Cryptocurrency tipping gained considerable attention when the concept first hit the mainstream several years ago. Nonetheless, it appears TipJar’s experience – the gap between real use versus approval of the idea itself – is not new.
In 2016, fellow tipping service ChangeTip also disappeared. At its height, the tool made frequent appearances on Reddit in particular, and even raised $3.5 million in a seed funding round.
A subsequent staff takeover by Airbnb left the crypto aspect with less interest, leading to the decision to halt activities. 
In its lifetime, ChangeTip processed around 350,000 transactions. Zapchain, another tipping platform, followed at the same time.
TipJar’s demise meanwhile comes at a time when investment preferences are shifting away from Blockchain technology to businesses dealing specifically in Bitcoin.
As Bitcoinist reported, so-called ‘blockchain-not-bitcoin’ funding has decreased 60% in 2019. At the same time, other once-popular crypto fundraising methods such as initial coin offerings (ICOs) have also fallen by the wayside.
What do you think about cryptocurrency tipping? Let us know in the comments below!
Images via Shutterstock
The post TipJar Shuts Down as Cryptocurrency Market Slows appeared first on Bitcoinist.com.
from Cryptocracken Tumblr https://ift.tt/2Itt0gI via IFTTT
0 notes
louisallman64-blog · 5 years ago
Text
Week07 - “Something Awesome” Final Update
In this final update for my “Something Awesome” project I will be going over three different ways (Macros, DDE, Fake Website) of attacking the target through phishing emails. Within these I will give a brief description of the exploit, an example of the exploit being used in the real-world, and my own “less malicious” version of the exploit showing how it could be used.
Macros
A macro is a series of commands and instructions that you group together as a single command to accomplish a task automatically. They are often used to automate frequently used tasks. However macros can also be used maliciously and is a common (yet easy to avoid) way of transmitting malware via phishing scams. The key to successful macro scams is in the social engineering aspect of the phish.
Real-world example:
The Melissa Virus (https://en.wikipedia.org/wiki/Melissa_(computer_virus))
The phishing email came with a message like: “Here is that document you asked for, don't show it to anybody else." Once opened, the virus replicated itself and sent the same email out to the top 50 people in the recipient's Outlook e-mail address book. While it did not destroy files or other resources, Melissa disabled email systems due to the ripple effect of spam email, including Microsoft who shut down incoming e-mail until the virus was reigned in.
Here is the virus code for anyone interested: https://packetstormsecurity.com/files/12131/melissa.macro.virus.txt.html
Writing my own macro based “malware”:
1. Create a new macro in the macro menu inside word
Tumblr media
2. Write your macro
runs when document is opened
executes calc.exe
Tumblr media
3. When someone opens a document with macros they will get this warning (relies on effective social engineering in the phishing email to deceive the target into clicking “Yes”).
Tumblr media
4. Windows Calculator is opened by macro.
Tumblr media
DDE
Microsoft’s Dynamic Data Exchange (DDE) is a protocol designed to allow the transportation of data between MS Office applications. DDE allows the execution of embedded code once a victim opens such a file, without the authorisation request associated with macros (won’t get picked up by anti-virus). 
Note: this exploit was rendered somewhat useless when Microsoft released a patch following the exploit https://docs.microsoft.com/en-us/openspecs/office_standards/ms-oi29500/4fe6d033-f0d4-4d73-ac81-a7128522c5ff
However not all versions of Word received the update and users can still re-enable DDE. Since many people still rely on legacy applications, an attacker may still be able to exploit DDE in Word (also in Excel and Outlook).
Real-world Example:
Both these examples highlight how DDE has been used to maliciously phish in the real world. However it also shows how easy it is to avoid being infected by DDE exploits, as you have to click through at least 2 warning screens before anything malicious can occur like macros (though many people do click through warnings without reading them).
https://isc.sans.edu/forums/diary/Necurs+Botnet+malspam+pushes+Locky+using+DDE+attack/22946/?source=post_page---------------------------
https://isc.sans.edu/forums/diary/Hancitor+malspam+uses+DDE+attack/22936/?source=post_page---------------------------
Writing my own DDE Exploit:
1. Insert field
Tumblr media
 ...
Tumblr media
2. Write desired code
This executes calc.exe again
Tumblr media
3. Target gets two prompts (again good social engineering is needed)
Second prompt would scare off many targets but can be hidden as shown here: https://twitter.com/ryhanson/status/917820530975223809?lang=en
Tumblr media Tumblr media
4. Calculator is launched
Tumblr media
Fake login page
Fake login pages are a classic example of how hackers steal their targets data and is a very common phishing method. The hacker will either attach an html document or will make their own website with a spoofed url similar to the real login page.
Real world example:
A bit of an outdated example as Facebook has since changed the format of their login page slightly but I think it effectively shows how this method can trick people.
Real login:
Tumblr media
Fake login (taken from http://ankitsingh24.blogspot.com/2017/04/phishing-hack-fbamezonflipcart-phishing.html):
Tumblr media
We see here that unless the target was very familiar with the layout of the Facebook login page or looked at the url (but who does that??) they would likely be tricked due to how legit the fake page looks.
Recreating my own fake login page:
For this exploit I will be recreating the old Google login page so that I can hypothetically steal the login details of Google users by sending them to my phony sign in page via a phishing email. Through this I may also be able to access many other accounts owned by the target as most people use the same password across platforms.
Here is the actual Google login page:
Tumblr media
And here is my recreation:
Tumblr media
It looks a little shabby and less refined than the actual Google login page (and doesn’t actually do anything) but I’m not a professional software engineer so there’s that. Either way most people are so used to not getting hacked that they would blindly enter their details anyway (if the phishing email was good). Once they’ve done this I can reroute it to my server and use this to maliciously access their account.
If anyone is interested here is the html and css for the site:
Tumblr media Tumblr media Tumblr media Tumblr media
0 notes
un-enfant-immature · 5 years ago
Text
Aavgo security lapse exposed hotel bookings
A security lapse at a hotel management startup has exposed hotel bookings and guests’ personal information.
The security lapse was resolved Monday after TechCrunch reached out to Aavgo, a hospitality tech company based in San Francisco, which secured a server it had left online without a password.
The server was open for three weeks — long enough for security researcher Daniel Brown to find the database.
He shared his findings exclusively with TechCrunch, then published them.
Aavgo bills itself as a way for hotels to organize their operations by using several connected apps — one for use by guests using tablets installed in their hotel rooms for entertainment, ordering room service and checking out, and another for staff to communicate with each other, file maintenance tickets and manage housekeeping.
Several large hotel chains, including Holiday Inn Express and Zenique Hotels, use Aavgo’s technology in their properties.
The database contained daily updating logs of the back-end computer system. Although most of the records were logs of computer commands critical to the running of the system, we found within personal booking data — including names, email addresses, phone numbers, room types, prices, the location of the hotel and the room and the dates and times of check-in and check-out.
There was no financial information in the database beyond the credit card issuer.
The database also contained room service orders, guest complaints, invoices and other sensitive information used for accessing the Aavgo system, the researcher said.
Many of the records were related to its corporate hotelier customers.
One of those customers included Guestline, a property management company for hoteliers, which uses Aavgo as the underlying technology for its property management system. Guestline says it facilities 6.3 million bookings a year.
When reached, Guestline’s data protection officer James Padkin said data protection is of “paramount importance” and the company has “ceased our very limited trial of the AavGo housekeeping app.”
After the company failed to respond to the researcher’s initial email, Aavgo shut down the database a few hours after TechCrunch made contact with its chief executive, Mrunal Desai.
“We had no data breach; however, we did find a vulnerability,” said Desai. He said data on 300 hotel rooms was exposed. Brown said based on his review of the data, however, that the number is likely higher. Desai added that the company has “already started informing our customers about this vulnerability.”
Midway during our correspondence, Desai copied the company’s outside counsel, a Texas-based law firm, which threatened “immediate legal action” ahead of publishing this report.
Aavgo becomes the latest hospitality company embroiled in a hotel-related security incident in recent years.
In 2017, hotel booking service Sabre confirmed a seven-months long data breach of its SynXis reservation system, affecting more than 36,000 hotels globally and millions of credit cards.
A year later, Marriott-owned Starwood admitted a breach that affected up to 383 million hotel guests around the world. Earlier this month U.K. authorities said they would fine the company $123 million for the breach under the new GDPR regime, which affected about 30 million customers in the European Union.
Read more:
Millions of Venmo transactions scraped in warning over privacy settings
An unsecured SMS spam operation doxxed its owners
Samsung spilled SmartThings app source code and secret keys
Security lapse exposed a Chinese smart city surveillance system
A leaky database of SMS text messages exposed password resets and two-factor codes
We found a massive spam operation — and sunk its server
Dow Jones’ watchlist of 2.4 million high-risk individuals has leaked
Robocaller firm Stratics Networks exposed millions of call recordings
Massive mortgage and loan data leak gets worse as original documents also exposed
0 notes
whittlebaggett8 · 6 years ago
Text
Ousted MoviePass cofounder Stacy Spikes breaks his silence on the startup’s whirlwind rise and crash to financial reality, Defence Online
Tumblr media
caption
Stacy Spikes.
source
Getty
In his first major interview since being fired by the company in 2018, MoviePass cofounder Stacy Spikes opened up to Business Insider about creating the startup and what led to his exit.
Spikes talked about the game-changing innovations that made MoviePass possible, including creating a geolocation mapping system from scratch in 90 days with a team of five.
He spoke about the heartbreak after AMC Theatres walked away from making MoviePass a partner after a successful trial run.
Spikes also explained his latest venture, PreShow, which has you watch branded content in order to go see movies for free.
Visit BusinessInsider.com for more stories.
Though movie-ticket subscriptions have been popular in Europe for some time, the godfather of the model in the US is MoviePass cofounder Stacy Spikes.
Before MoviePass took its place in pop culture in the summer of 2017, when it dropped its monthly price to $10 a month and amassed millions of subscribers, Spikes was the trailblazer who got the scrappy startup from idea to reality.
MoviePass has sparked the creation of many movie subscription services since, but has struggled financially. It burned hundreds of millions of dollars as the stock of its parent company fell over 99.99%. It was kicked off the Nasdaq in February and is trading at less than half a cent per share. And Spikes has had to watch the fall as an outsider after being ousted from the company in January 2018.
Today, Spikes is at an office in a WeWork in Manhattan – with the first ever MoviePass card framed by his desk – and has taken the decade of experience making MoviePass and launched a new venture, PreShow.
Defence Online sat down with Spikes to conduct his first major interview since being let go by MoviePass.
He talked about the challenging path taken to get MoviePass off the ground, which included building a mapping system for the app from scratch in 90 days with a staff of five; the disappointing rejection by AMC Theatres following a successful trial run at the chain; and what led to his dismissal from MoviePass.
This interview has been edited for length and clarity.
Jason Guerrasio: How did the idea of movie-ticket subscription even come up in your mind?
Stacy Spikes: It goes back to Urbanworld Film Festival. I had been running the film festival for 8 to 10 years and in 2005, we were looking for a model to expand it to something year round.
I had a conversation with Travis Reid, who was then the CEO at Loews Cineplex, and he thought subscription for seeing movies was a great idea, but it should be done for the entire industry not just Urbanworld. And on the horizon you could see Netflix, Spotify, Pandora, Hulu, this whole subscription wave is coming. So Travis let me build the first prototype with Loews.
Guerrasio: You build out an SMS protocol. It works great. Why didn’t Loews just buy it right there?
Spikes: Travis thought it was great but then Loews and AMC merged. This is 2006 and I went to AMC, Regal, Cinemark, National Amusements, and they all had a different version of either IMAX or large format or 3D. They felt that’s the future. “What you’re talking about is not,” they said. “Why would anybody do that.” Five years I get “no’s.”
I then have a conversation with Guy Primus, who at the time was at Will Smith’s company. And he said, “Do you know Hamet Watt?” I knew his name, we had been in the same circles, but we had never met. So Hamet and I got on a call and we were finishing each other’s sentences. And then he said, “I can help raise capital.” So we cofounded MoviePass. I focused on getting the product built and he focused on the funding. We raised $1 million: $500,000 from AOL and $500,000 from True Ventures.
Guerrasio: Then the summer of 2011 is when you have your launch in San Francisco, and it doesn’t work out too well.
Spikes: 4th of July 2011 we do the San Francisco launch. We announce the company, it’s on the front page of Variety. 19,000 people tried to sign up on the first day. It was $50 a month to go to all the movies you wanted. And the servers crashed that day. We had built it into MovieTickets.com. We used their infrastructure. We gave them funds up front and we built it directly into their API. And we said, “Do we need to present this to your exhibitor partners?” They said, “No, that’s why you have us. We have all the rights and approval.”
Then we get a call … it’s AMC saying: “Who gave you approval to launch this?” We told them it was through MovieTickets.com and they said they never gave them approval. We brush it off. The next morning we are all excited by the sign-ups, Hamet and I are on the cover of the San Francisco Chronicle business section. I’m flying back home and I’m floating above the clouds.
I land and my phone is full of voice messages. The first is, “Hey, we would love to interview you,” then it changes to “Hey, what is your response to the statement that AMC released saying they are shutting you down?”
MovieTickets.com shrugged and said they didn’t know what happened but AMC is one of their shareholders so they can’t go forward. So we’re dead.
From there, we pivot to doing this thing using Hollywood Movie Money where you go online, log into an account, print a single use voucher, and you would come up to the ticket counter at the theaters with the voucher. From August through October, we’re crawling.
Tumblr media
source
Defence Online
Guerrasio: But then the game-changer move happens. You line up with a credit card.
Spikes: Yeah, and the next thing that happened is MoviePass as we know it. We needed every single person to be able to do their credit card transaction dynamically in real time. It seems simple now, but back then it didn’t exist. We had to build real-time loading with geolocation capability. So we had to geolocate every theater in North America.
Guerrasio: How did you do it?
Spikes: We had a list of all the theaters in America and our team put in a zip code and address, the pin would show up, and they would have drag the pin to the front of the theater and take that longitude and latitude coordinate and plug them into our system. We built our own mapping system that provided the new coordinates for every theater.
Guerrasio: How long did that take?
Spikes: Everything I’m describing to you from new technology to mapping of the whole country to the credit card loading, we did it all in 90 days.
Guerrasio: How big was the team?
Spikes: Five. [Laughs.] We weren’t sleeping.
Guerrasio: How did you find more money?
Spikes: We were down to nothing when we had this built. I got on the plane to meet with Jon Callaghan from True Ventures. I met him in the rain at his office and I held up the first card. The first MoviePass card. I walked him through the technology and I checked into a theater down the street from his office. I said, “Jon, we’re going to have a patent for our technology, no one can stop us, the theaters can’t stop us, we’ll have access to all theaters and all movies.” If John said “no” [to another funding round], we were done. He said he loved the pivot and couldn’t believe we pulled it off in 90 days.
Guerrasio: And at what price point are you at?
Spikes: We were testing: $19.99 was the lowest and we did up to $49.99. We tested regional pricing. Markets are very different. There’s an $8 market in Waco, Texas, and $17 market in Manhattan. And subscriptions are climbing. The plane worked, the engines are strong, now we have to climb up to 30,000 feet. It was 5,000 subscribers, 7,000, 10,000.
Guerrasio: But the credit card you were using at the time was Discover, and that came with challenges at the movie theater, right?
Spikes: The theaters thought this was a retail card, even though the Discover logo was in the back of the MoviePass card. But we were getting a lot of traction, so MasterCard came to us and liked what we were doing and they wanted to partner with us. We put the MasterCard logo on the front of the card and now everyone could recognize that this was a debit card.
Tumblr media
source
Hollis Johnson/Defence Online
Guerrasio: Then in January 2015 you do a trial program with AMC.
Spikes: Yeah, I start stalking AMC CEO Gerry Lopez. Gerry would see me at a conference from across the room and he’d have this look like, “Oh, no, here he comes.”
Guerrasio: But at this point you are doing all of this without the help of theater owners. Why suddenly are you chasing one of the biggest chains in the world?
Spikes: My mindset is the data shows we create 100% lift every month per person. IMAX never did that, 3D never did that, I’ve never seen anything in my 20-something years in the industry that ever did this.
So I went to Gerry with the proposal: “Gerry, if I can prove I can create 100% lift in a double-blind study, would you partner with me?” He said, “If you can create 100% lift month over month, sure.” And we shook on it. So AMC loaded in their loyalty data, Stubs. We loaded in our MoviePass data and a study was done with neither of us able to see for the whole year what the numbers were. In Denver and Boston we did the trial. At the end of the year, data came back exactly as we said: 100% lift. With that report, we started to talk to some big investment players in the VC space.
Read more: Bitter enemies MoviePass and AMC once worked together – here’s a look inside the relationship’s epic collapse
Guerrasio: But AMC backed out, why?
Spikes: Gerry agreed to greenlight MoviePass on AMC across all markets, then he called me a week later and said, “I’m leaving.” So Gerry tells me they are putting the program on hold and then Adam Aron comes in as CEO. I reach out to Adam, he says, “I love subscription, I come from the sporting world and subscribers are your core base, but I think I might want to build it myself.” He saw the data and basically said, “I don’t know why I need you.” That really slowed the engines down for us.
Guerrasio: So it’s 2016, how is the company doing financially?
Spikes: We have 15,000 to 20,000 subscribers. Our average life was two years. We had a 3% churn. Utilization was around 1.5 to 2. And the math was figuring we’ll get profitable a few months down the line because people would calm down in their behavior.
Guerrasio: But a major change happens at MoviePass.
Spikes: Me and the board decided we’d get one person to focus on getting capital, and since I built the product, [I’d] focus on operations. So Mitch Lowe came in, we put him as CEO, I was COO. We look and see that three theaters take up 50% of the business and the rest takes up the other 50%. Since AMC said “no,” Regal and Cinemark aren’t going to say “yes,” we decide to go from the bottom up.
Tumblr media
caption
MoviePass CEO Mitch Lowe.
source
Vivien Killilea/Getty Images for MoviePass
While Mitch was out chasing capital, I spent the time setting up all these smaller theaters. Studio Movie Grill, signed on, they also invested. We also talked to Alamo Drafthouse, B&B, Landmark, Marcus. The conversations were going good, but it’s not a quick process.
Guerrasio: Then in the summer of 2017, Helios and Matheson Analytics comes in the picture. When’s the first time you heard of them?
Spikes: We went and had a couple of meetings in New York and we were introduced to them. Ultimately the proposal came in as $25 million for 51% of the company. And in the proposal it said they wanted us to temporarily drop the subscription price to $10 to help climb up to 100,000 subscriptions. Then eventually the company would go public. None of that was too painful. The $10 was thought of as a promotional thing, in a way celebrating HMNY buying us. But we hit 100,000 in 48 hours. [Laughs.] So I’m like, “Okay, turn it off. We reached our goal.”
Where things started to divide is myself and a handful of others were methodical about testing price points. The lowest we ever got down to was $12.99 and as high as $75 where we added IMAX and 3D. We knew what was sustainable. But the overriding voice was, “No, this is awesome, look how fast we’re growing.” And it was this moment of, “But $10.” It doesn’t fly. Now the plane is falling.
It’s now December and we were growing at a quarter of a million subscriptions a month and I definitely was not a happy camper and was making that known.
Guerrasio: In that month, the photo of Mitch and Helios and Matheson CEO Ted Farnsworth in front of the AMC in Times Square is released to celebrate the company hitting 1 million subscribers. What did you think of that?
Spikes: It’s more, what was the industry’s reaction? I think the industry’s reaction was a sense of disappointment. It’s a small neighborhood, exhibition. These are handshake deals, some families have owned these companies for generations. That photo changed the relationship in the marketplace. The tone turned it more adversarial. Up to that point, MoviePass had been the underdog champion for going to the movies.
Tumblr media
caption
MoviePass CEO Mitch Lowe and Helios and Matheson Chief Executive Ted Farnsworth
source
MoviePass/Reuters
I wasn’t part of that decision. Then on January 9, I get an email that said, “Thank you, but your services are no longer needed.” And my feeling is we just disagreed on the approach. After that, I’ve never spoken to Mitch or Ted. And I’ve been watching it all unfold like everyone else.
Guerrasio: What is it like being on the outside now and seeing what has unfolded?
Spikes: People were becoming upset with the company, and we had built brand loyalty for years. The fact that was evaporating so quickly was concerning. The good side was cinema had not been taken seriously since Netflix really got its footing. So what I liked about that was this had risen to the zeitgeist of conversation. 75% of our members were under the age of 26. Cinema was an event people cared about again. So while there is a sadness around the brand I was happy to see that this is front and center.
Look, the back of the envelope idea was this: For the cost of one major motion picture, you could set up a subscription that could create a 10% lift for the whole industry. Well, at the 2018 box office it got to half that. The price point was set too low, but the output was close. It was a 6% lift and I think 5% of that was MoviePass. If you doubled that for the next year, you would have gotten a 10% lift. The other thing that our data showed back then was 50% of that lift was Monday through Thursday. We have learned to live without that money as an industry and now people are going mid-week.
Guerrasio: But this was your baby, people laughed in your face when you presented the idea of MoviePass in board rooms, you weren’t hurt personally by some of the stuff you read about the company you founded after you left?
Spikes: Listen, you go through a whole string of emotions like any kind of breakup – “Great, I’m glad to be out of there” to “I wish I was still there to help from the inside” – but there’s a saying investors always like to ask entrepreneurs, “Would you rather be rich or would you rather be the king?” What they are trying to get out is are you more important or is the mission more important? My mission in my heart and soul is I love moviegoing. From working in a video store in high school all the way through my career I’ve had one job: help people see movies.
Guerrasio: That brings us to your latest innovation, PreShow. Explain how you got this idea.
Spikes: What we are saying with PreShow is that money the brand is spending stays within the movie. If Audi has a product placement deal with the new “Avengers” movie, Audi wants YouTube to run its ad whenever the “Avengers” trailer is played. We are saying the same thing but the payout is in the form of a free ticket to the movie. So the product placement and the movie is kept in the ecosystem. That’s the premise. We guarantee that you saw the ad. The phone creates a cone that is simply motion detection. It doesn’t record you, it just knows that you’re watching the screen and if you look away it pauses the ad. It lets a brand know the person is really watching.
Tumblr media
caption
PreShow.
source
PreShow/Kickstarter
Guerrasio: You hit your Kickstarter goal very quickly, what do theater owners think of this idea?
Spikes: I’ve sent emails to all the exhibitors and I sent emails to all the studios telling them what we’re doing. I want to keep them in the loop. I want to reduce the friction of being able to go to the movies.
Guerrasio: Looking back, did MoviePass have to basically go to an insane price point and have this crazy roller coaster ride for the last few years to prove that movie-ticket subscription can work in this country?
Spikes: This is going to sound weird: I trust the universe. There’s no such thing as a mistake. There’s just learning what to do and what not to do. They both make you better. I remember at MoviePass packing up my box and getting home and I took about a week off, then I got an office and was like, “If I could redo MoviePass today, what would I do?”
The post Ousted MoviePass cofounder Stacy Spikes breaks his silence on the startup’s whirlwind rise and crash to financial reality, Defence Online appeared first on Defence Online.
from WordPress https://defenceonline.com/2019/04/11/ousted-moviepass-cofounder-stacy-spikes-breaks-his-silence-on-the-startups-whirlwind-rise-and-crash-to-financial-reality-defence-online/
0 notes
duaneodavila · 6 years ago
Text
Why Cybersecurity Matters: A Lawyer’s Toolkit
Tumblr media
Ed. note: This is part one of a two-part series focused on how lawyers can better understand and reduce their exposure to the rapidly growing cybersecurity risks that exist in the legal sector. Part one will focus on the landscape of threats posed to the lawyers, and part two will focus on practical measures that lawyers can take to reduce their threat profile.
A veritable honeypot of sticky data
In recent years, we’ve heard plenty about massive data breaches at organizations such as Marriott/Starwood (500 million guest accounts exposed), Equifax (146 million accounts), and Uber (57 million users). Large consumer-facing brands, such as Target and Home Depot, have been easy prey for sophisticated hackers as have government organizations. And while no entity or industry is immune, the legal industry is among the juiciest of all honeypot for hackers, given the datasets held by firms, practitioners, and within the public judicial system itself.  Clients turn over their most valuable information to their lawyers under the auspices of attorney-client privilege to advise on M&A, IP, and corporate activity, all of which can enrich cyber thieves intent on capitalizing from this insider information.
Breaches and attacks against the legal industry hit hard.  More than 11.5 million documents from the Panama-based law firm Mossack Fonseca were leaked to the public in 2016, representing a jaw-dropping 2.6 terabytes of data. In 2017, global firm DLA Piper fell victim to a ransomware attack that shut down many of its offices — a short-term revenue killer. Small firms, too, are at risk. Moses Afonso Ryan, a 10-attorney firm in Providence, filed suit against its insurance carrier after it denied claims from a ransomware attack that resulted in hundreds of thousands of dollars in lost billable hours. The lesson? Firms should consider the ramifications of cyberattacks not only from a revenue and productivity standpoint, but also the reputational damages that result from security vulnerabilities. It’s too easy for clients to switch firms if they sniff out an operations issue that could jeopardize confidentiality.
How did we get here?
Compared with other sectors, law firms haven’t always prioritized security.  Many lack the internal security expertise and security policies that scale with growth.  Still others don’t even take the precaution of attaching a password to their guest networks.   Additionally, more established firms tend to have aging legacy systems that have been patched over the years and contain large amounts of personally identifiable information (PII) and other sensitive client data in a central location.  Those systems weren’t designed with security in mind and in some cases, modern security technologies such as encryption are difficult to apply.  It’s not just law firms either: consider the types of public databases which judges and law enforcement people can access, such as massive criminal databases and public records such as driver’s licenses.
Network security can also prove tricky at many firms, leaving easy pathways for outsiders to hack into corporate servers and databases.  That’s not to say that attorneys aren’t tech savvy — they love the latest gadgets and apps but can bypass firm policies and procedures in pursuit of productivity.  Chances are, they haven’t been adequately prepped on how to safely use their personal devices for work matters or are using their devices and applications on the side, as “shadow IT.”
Hot button areas for hackers
The stark reality is that most attorneys are highly independent and singularly focused on servicing their clients, whether as in-house or outside counsel.  The extra steps required to access files and applications with oft hard-to-remember (but more secure) passwords are not always congruous with billable hours and around-the-clock attention to deliverables.  Lawyers may compromise on security to ensure direct communications with clients on their platform of choice, in pursuit of the almighty billable hour.
Another vulnerability is that attorneys crave information, the more the better.  This trait is something that savvy hackers understand and will use to their advantage.  Email phishing, in that regard, is a frequent tactic.  The smart cyber-villain will quickly learn how to dupe attorneys and their assistants by sending attachments and links by email that appear to come from a legitimate source.  Once said attachment is opened — bingo! — the malware starts to execute and do the dirty work behind the scenes, scouring the device for desired data points and eventually securing access to an internal network.
Lawyers who are focused on growing their networks and developing relationships and leads to enhance their practices may also fall prey to the foibles of social media.  Recent evidence points to LinkedIn as a tool for hackers seeking to extract personal information from individual users, beginning with innocuous requests related to jobs or business opportunities. Nation states are even using the platform to recruit spies.  All the more reason for lawyers to be careful what they share, whom they connect with, and what they post.  Best practices and policies related to safe social media use can help practitioners demonstrate some restraint in their online activities.
Cyber insurance is not enough
If there is a thought that all this risk can be abated with the proper cyber liability insurance policy, it may be worth revisiting that concept.  Insurance companies have recently demonstrated a disturbing determination to push back on claims related to nation-state hacking through reliance on the “act of war” exemption in some policies.  Whether this evidences a material derogation of coverage is still unclear, but what is clear is that insurance claims are just one more hurdle in recovering from a debilitating attack.
Fortunately, there’s a lot that firms and attorneys themselves can do to reduce risk and ensure client confidentiality in a competitive global climate. The next article will take a deep dive into some frictionless things lawyers can do differently to improve their cyberstance in an increasingly hostile environment.
Tumblr media
Jennifer DeTrani is General Counsel and EVP of Nisos Inc., a technology-enabled cybersecurity firm. She co-founded a secure messaging platform, Wickr Inc., where she served as General Counsel for five years. You can connect with Jennifer on Wickr (dtrain), LinkedIn, or by email at [email protected].
Why Cybersecurity Matters: A Lawyer’s Toolkit republished via Above the Law
0 notes
adstoppi · 6 years ago
Link
The Internet Archive has published a catalogue of 490,000 MySpace songs uploaded to the service between 2008 and 2010 that were previously thought lost as a result of a botched server migration. These songs are less than one percent of the estimated 50 million tracksuploaded between 2003 and 2015 that the once dominant social network accidentally deleted.
The source of the saved tracks is an “anonymous academic group” that was studying music networks while MySpace was still active. As part of their research, it downloaded 1.3 terabytes of music from the service. Later, when the news of the data loss emerged, it contacted the Internet Archive and offered to send it the files.View image on Twitter
Tumblr media Tumblr media
Jason Scott@textfiles
ANNOUNCING THE MYSPACE MUSIC DRAGON HOARD, a 450,000 song collection of mp3s from 2008-2010 on MySpace, gathered before they were all “deleted” by mistake. https://archive.org/details/myspace_dragon_hoard_2010 … includes a link to a special custom search and play mechanism that lets you search and play songs.9948:35 AM – Apr 4, 2019592 people are talking about thisTwitter Ads info and privacy
The music is now available to play through an online interface which has been charmingly designed to look like MySpace’s original music player. It can be a little slow to search through and start playing your music, but the Internet Archive has said that the database’s searcher, “Hobbit,” is still being optimized and will eventually be open-sourced.
The Internet Archive has provided numerous backups for music over the years. Back in 2017, amid fears that SoundCloud could shut down following a massive round of layoffs, the Internet Archive hosted a large backup of songs from the service in case they were lost. That same year, the organization also backed up 50,000 vinyls received from the Great 78 Project.
The current MySpace song database has only been recovered because an organization made a backup when it was still available, making it unlikely the rest of the 50 million tracks will ever resurface.
The post Hundreds of thousands of ‘lost’ MySpace songs have been recovered appeared first on Adstoppi.
0 notes