#malicious software project
Explore tagged Tumblr posts
Text
EARLY DAYS OF MALICIOUS SOFTWARE
Wanna know something about my recent project "Malicious Software"? It wasn't originally going to be a project, at all.
ERA.TXT was actually just a Roblox OC and she was inspired by the Stereotypical Obby game (by concept), her design was taken from TDS Commander because i used to be obsessed with him. For the past few days/weeks i created more malware ocs out of boredom (e.g Captain Rensen).
But then one day, i thought "What if ERA.TXT had another person with her?" and because i was in the middle of watching Death Note, i created KIRA.EXE with Light Yagami as his inspiration in mind which eventually lead to the Malicious Software project's creation, however having a crush on a fictional character doesn't last long and will fade away.
Because i started to lose interest with TDS Commander, i changed ERA.TXT's whole character (later tweaking her design abit) and made her apart of the Malicious Software project. For KIRA.EXE's case, i changed his clothes because it didn't felt right for him.
tag the oc who was originally a fandom based oc (and perhaps talk about what they were like before being reworked)
#Also Kiras command prompt is basically like the death note except you can do other things besides killing people#Didn't i also mentioned that ERA TXT was shipped with TDS Commander#Yeaahhhhh that information is now outdated#i later found out that TXT files can't really be viruses unless it's an exe#sooooo expect possible new lore for ERA TXT#KIRA EXE had a few design changes because the shirts/pants i purchased were awful#malicious software#malware ocs#malicious software project#computer virus#computer virus oc
440 notes
·
View notes
Text
Good Morning Tumblroids,
I’m still working out the specifics of my future indie project attempt. Jellystone is over for now, but I’m still pitching shows on the mean streets of Burbank and I’ve got a lot of new software to cram before I’m ready. In the meantime, I think I’m overdue to break the seal and breathe some life back into my mummified YouTube channel.
Maybe I’m just looking for a cheap excuse for a party, but I think I’m going to start off with a “Billy & Mandy Reunion”. As I’m imagining it, it’s part documentary and part Bravo reunion special. But probably with less punching and swearing(?).
From the unusual pitch to the moment it was voted into existence by the fans, through multiple cancellations and resurrections, all the way to its final meeting with the reaper, Billy & Mandy has had a journey unique in the animation world. My goal is to get the whole gang back together and talk about how the sausage is and was made.
Before I embark with you on this trip through the potholes down Memory Lane, though, I wanted to check in with you all and hear what you had to say. In the reunion, we’ll be talking about Billy & Mandy as a project, specific episodes, all of the parts of the animation process, how things were done in the 2000s vs how they’re done now, and the animation industry in general. I’m looking for your thoughts and questions about any of that stuff. Or (really) anything you want to know about the show.
Whether it’s a statement about a character that's had an impact on your life or a question about the minutiae of storyboarding, I’d love to hear from you. If you want your question to be credited, add your preferred name to your comment. I don’t think I’ll have time to get to them all (and there are bound to be plenty of repeat questions) so please don’t get mad at me if yours doesn’t get chosen or gets attributed to someone else. There’s only a five-to-seven percent chance that I’ve done it maliciously.
I’m going to talk to the actors, of course, but I’m going to try to get as many people back as I can. Storyboard artists, writers, production staff, directors, timers, designers– The Whole Tamale Platter. If you’re interested in a particular facet of TV Animation, this would be a good chance to hear from someone who’s been there.
I like nachos, -Maxwell Atoms
750 notes
·
View notes
Text
Microsoft's CEO Satya Nadella has hailed the company's new Recall feature, which stores a history of your computer desktop and makes it available to AI for analysis, as “photographic memory” for your PC. Within the cybersecurity community, meanwhile, the notion of a tool that silently takes a screenshot of your desktop every five seconds has been hailed as a hacker's dream come true and the worst product idea in recent memory.
Now, security researchers have pointed out that even the one remaining security safeguard meant to protect that feature from exploitation can be trivially defeated.
Since Recall was first announced last month, the cybersecurity world has pointed out that if a hacker can install malicious software to gain a foothold on a target machine with the feature enabled, they can quickly gain access to the user's entire history stored by the function. The only barrier, it seemed, to that high-resolution view of a victim's entire life at the keyboard was that accessing Recall's data required administrator privileges on a user's machine. That meant malware without that higher-level privilege would trigger a permission pop-up, allowing users to prevent access, and that malware would also likely be blocked by default from accessing the data on most corporate machines.
Then on Wednesday, James Forshaw, a researcher with Google's Project Zero vulnerability research team, published an update to a blog post pointing out that he had found methods for accessing Recall data without administrator privileges—essentially stripping away even that last fig leaf of protection. “No admin required ;-)” the post concluded.
“Damn,” Forshaw added on Mastodon. “I really thought the Recall database security would at least be, you know, secure.”
Forshaw's blog post described two different techniques to bypass the administrator privilege requirement, both of which exploit ways of defeating a basic security function in Windows known as access control lists that determine which elements on a computer require which privileges to read and alter. One of Forshaw's methods exploits an exception to those control lists, temporarily impersonating a program on Windows machines called AIXHost.exe that can access even restricted databases. Another is even simpler: Forshaw points out that because the Recall data stored on a machine is considered to belong to the user, a hacker with the same privileges as the user could simply rewrite the access control lists on a target machine to grant themselves access to the full database.
That second, simpler bypass technique “is just mindblowing, to be honest,” says Alex Hagenah, a cybersecurity strategist and ethical hacker. Hagenah recently built a proof-of-concept hacker tool called TotalRecall designed to show that someone who gained access to a victim's machine with Recall could immediately siphon out all the user's history recorded by the feature. Hagenah's tool, however, still required that hackers find another way to gain administrator privileges through a so-called “privilege escalation” technique before his tool would work.
With Forshaw's technique, “you don’t need any privilege escalation, no pop-up, nothing,” says Hagenah. “This would make sense to implement in the tool for a bad guy.”
In fact, just an hour after speaking to WIRED about Forshaw's finding, Hagenah added the simpler of Forshaw's two techniques to his TotalRecall tool, then confirmed that the trick worked by accessing all the Recall history data stored on another user's machine for which he didn't have administrator access. “So simple and genius,” he wrote in a text to WIRED after testing the technique.
That confirmation removes one of the last arguments Recall's defenders have had against criticisms that the feature acts as, essentially, a piece of pre-installed spyware on a user's machine, ready to be exploited by any hacker who can gain a foothold on the device. “It makes your security very fragile, in the sense that anyone who penetrates your computer for even a second can get your whole history,” says Dave Aitel, the founder of the cybersecurity firm Immunity and a former NSA hacker. “Which is not something people want.”
For now, security researchers have been testing Recall in preview versions of the tool ahead of its expected launch later this month. Microsoft said it plans to integrate Recall on compatible Copilot+ PCs with the feature turned on by default. WIRED reached out to the company for comment on Forshaw's findings about Recall's security issues, but the company has yet to respond.
The revelation that hackers can exploit Recall without even using a separate privilege escalation technique only contributes further to the sense that the feature was rushed to market without a proper review from the company's cybersecurity team—despite the company's CEO Nadella proclaiming just last month that Microsoft would make security its first priority in every decision going forward. “You cannot convince me that Microsoft's security teams looked at this and said ‘that looks secure,’” says Jake Williams, a former NSA hacker and now the VP of R&D at the cybersecurity consultancy Hunter Strategy, where he says he's been asked by some of the firm's clients to test Recall's security before they add Microsoft devices that use it to their networks.
“As it stands now, it’s a security dumpster fire,” Williams says. “This is one of the scariest things I’ve ever seen from an enterprise security standpoint.”
143 notes
·
View notes
Text
How did this backdoor come to be?
It would appear that this backdoor was years in the making. In 2021, someone with the username JiaT75 made their first known commit to an open source project. In retrospect, the change to the libarchive project is suspicious, because it replaced the safe_fprint funcion with a variant that has long been recognized as less secure. No one noticed at the time.
The following year, JiaT75 submitted a patch over the xz Utils mailing list, and, almost immediately, a never-before-seen participant named Jigar Kumar joined the discussion and argued that Lasse Collin, the longtime maintainer of xz Utils, hadn’t been updating the software often or fast enough. Kumar, with the support of Dennis Ens and several other people who had never had a presence on the list, pressured Collin to bring on an additional developer to maintain the project.
In January 2023, JiaT75 made their first commit to xz Utils. In the months following, JiaT75, who used the name Jia Tan, became increasingly involved in xz Utils affairs. For instance, Tan replaced Collins' contact information with their own on oss-fuzz, a project that scans open source software for vulnerabilities that can be exploited. Tan also requested that oss-fuzz disable the ifunc function during testing, a change that prevented it from detecting the malicious changes Tan would soon make to xz Utils.
#consensus seems to be that 'jia tan' is an intelligence agency#as opposed to a ransomware group or similar
19 notes
·
View notes
Text
Anne's Journey: Two eternal Souls And The Lost Daughter - Chapter 5: Taking the next step
Summary: Anne tells Ashley everything and later, takes the decision that will change everything.
Anne’s nerves were pretty much shot by the time she and Ashley arrived at her home. Luckily, neither of Anne’s parents were at home, having another late night at the hospital. The distraught Drone quickly ran inside her house, with Ashley on her heels, and slammed the door behind them.
Ashley let out a sigh. “Anne, can y-“
“Not here.” Anne said as she grabbed Ashley by her arm and started to drag her up the stairs. “My room.”
“Okay, but-!” The other Drone groaned when Anne once again seemed to ignore her. “Will you please t- Ow, you’re hurting my arm!”
Anne quickly let go, her hands shaking and expression distraught. She hadn’t realized how hard she had been pulling. Was her strength increasing too? How much more would her body change? She gave her dearest friend an apologetic look, regret dripping of her visor. “Ash, sorry, I …I- “
“It’s fine!” Ashley grunted, rubbing her shoulder. She started to push her friend up the stairs. She practically lobbed Anne into her room, crossing her arms with a huff.
“Now can you please tell me what happened?” She asked, her voice still soft and filled with concern, despite the clear annoyance that was projected on her visor.
Anne started to hastily unpack her laptop and booting everything up, fumbling with cables and other equipment she was plugging in. “In a minute.”
Ashley let out a groan. “Anne, this starting to- “
Anne snapped her gaze to her friend. “Ash, someone was running a trace on me, and I need to know if they know who and/or where I am!” She shouted. She turned her attention back to her laptop. “Now let me work.”
Ashley stood there with her mouth agape, looking like she was going to say something for a moment, but decided against it. She crossed her arms with a sigh and waited for Anne to finish her business.
Anne ran several programs, scanned her equipment with any sort of anti-viral/hacking/diagnostic software that she owned, and …eventually let out a sigh of relief. Good, it looked like that whoever had been trying to run a trace on her didn’t succeed. Nor was any sort of malware installed on her laptop. Just to be completely sure, Anne ran a full self-diagnostic cycle to see if they hadn’t attempted to install any malicious software on her system. After a few tense minutes, the scan came up clean.
“Phew, we’re okay.”
“Are we?” Ash asked, her tone flat. “Or do you need to yell at me some more?”
The other Drone flinched, suddenly feeling really bad on how she had spoken against her best friend moments earlier. “Ash, I’m sorry about that. I-“
Ash groaned and pinched the bridge of her nose. “No-no-no, I’m the one who’s sorry.” She said, her tone sincere with a hint of guilt. “You didn’t deserve that jab. I was being pushy during a tense situation and made you lash out.”
“I still shouldn’t have shouted like that.”
“Let’s agree we were both in the wrong?”
“Agreed.”
“You good?”
“I’m good. You good?”
“I’m good. We're good.”
Anne quickly ran up to Ashley and hugged her tightly, her mind finally releasing some of the stress that had been building up since they’ve left the municipal building.
“There, there.” Ashley chuckled, trying to conceal her blush when she eventually let go of her. “So, do I need to ask again, or …?”
Anne sat down on her bed, looking at her hand that were folded on her lap. “I …I’m not really sure what happened.” Anne stated truthfully. “Everything was going fine. I had access to my core and I was running the trace. I was finally so close to getting some answers, and ….I got hacked. I must have triggered an alarm or something.”
“Someone back-hacked you?” Ashley asked. “That fast? Who? Centre Security?”
Anne shook her head. “If that was the case, we would have seen security around the Centre, or even heard alarms.” She nervously wrung her hands together. “It was someone else, somewhere else.”
“Who? Why?”
“No idea, on either question.”
“And you’re sure they didn’t get a lock on you?”
“I terminated the connection before they could finish, which overloaded my systems and caused that …exploding feedback. But, judging by the lack of any sort of tracking malware on myself or the laptop, I’m certain they don’t have anything on me. Us.” Anne stated confidently. Of this, she was sure. There was no way they knew who she was or where she was.
“Did you at least get what you were looking for?”
Anne’s eyes grew wide, pretty much filling up her entire visor. In the excitement, she almost had forgotten that she had copied over the files to her drive, before their mystery hacker had butted in. She jumped up and ran to her computer, accessing the files. But the moment she opened them, she felt her heart sing.
“No …no-no-no, this can’t be right!” Anne lamented. With a growl, she slammed her fist on the table. “Son of a [beep]ing Trojan!”
“What?” Ashley questioned, joining her friend at her computer. The moment she looked over Anne’s shoulder to see what was wrong, she winced. “Ooh …that’s not good, right?”
Anne felt despair fill her core when she looked at the files …or what was left of them. It seemed that due to the sudden termination of the connection – or maybe due to something their hacker counterpart had done – that the files got corrupted and thus, unreadable. Not that she couldn’t open the files, but all the text were just symbols or jumbled words. With a long groan, Anne slumped on the ground, burying her face in her hands. Ashley knelt down next to her and started to stroke her back, not really sure what she could say.
After a few moments of silence, Ashley eventually broke it to cautiously ask a question. “So …what now?” She asked softly. “Try again another time?”
“No …no, we better not.” Anne reluctantly answered, letting out a heavy sigh. “They’re probably expecting me now.” She really didn’t feel to go up against that hacker again. Anne was good, but whoever that was, was in a whole other league than her. “I don’t know what I’m gonna do. Maybe …hey, are you listening?”
Ashley had stopped paying attention to her friend halfway through and seemed to be focused on something on the screen. “You’ve got something.”
“Huh?”
Ashley turned to Anne with a little smile. “I mean, there’s something actually readable here.”
“What? Show me!” Anne jumped up and looked at her computer. She gasped. Ashley was right. There was some data that didn’t get corrupted. It wasn’t much, but it was …well, something, like Ash had said. With a cheer, Anne threw her arms around Ashley and kissed her cheek. “Ash, you’re the best!”
“I didn’t do anything, though.” Ashley mumbled, turning away so Anne wouldn’t see her visor completely lighting up. She coughed in her hand, hoping Anne hadn’t caught unto her sudden bashfulness, and cleared her throat. “Besides, don’t get your hopes up. I said there was something readable, I have no idea if it’s usable.”
Anne deflated. “Y-yeah …”
The redheaded Drone flinched and guiltily wrung her hands together. “Anne, I didn’t mean to … “
“No-no, you are right. Don’t count our cogs before they’re all smelted, like the old saying goes.” Anne stated, going to her computer to start scanning the files for useful date. Just like Ashley had pointed out, there wasn’t much to go on. Most readable words didn’t really reveal anything. She just kept scanning over the file, hoping for a bit of good luck. “Let’s just hope that something – wait …I think …”
“What did y-? “ Ashley jumped when Anne suddenly let out a cheer. With a heavy sigh, she placed her hand over her core. “Girl, give me some warning. You almost made me yuck my core out.”
“Sorry, sorry!” Anne apologized, grabbing Ashley and dragging her to the screen. “I found them!”
Ashley practically grabbed the laptop and buried her face into it. “YOU HAVE? WHERE?”
“I almost didn’t see it, but I can make out their last known location.” Anne pointed at the screen.
The redhead squinted her eyes and read where Anne was pointing. She whistled. “Zeta District?” She read aloud. “Talk about faraway relatives. That place is so far removed from anything, I’m surprised the Global Mainframe has a connection there.”
“I know, but …at least I know where they are.” Anne beamed. She finally had some answers. Nothing much, but it was a start.”
“Anne, hold your Sentinel.” Ashley said, grabbing Anne by the shoulders. “You have a location, but …I’m sorry to say this, but you don’t even know if they’re …you know, alive.”
Ashley had a point, though. The part of the data that would show their current status got corrupted, which meant … No, she wouldn’t let this spoil her mood. Even this scrap of information was something she could use. She could …she could …
“Huh …”
“Something wrong, Anne?”
“What now?”
“Well …” Ashley opened her mouth, looking very determined to make a suggestion …and then let her arms fall to her side. “No idea, 2tone.”
“Me neither.”
“Excuse me?” Ashley couldn’t help but grin. “So, you’ve planned this entire heist to get this info …and now, you have no idea what’s the next step?”
“I know, I know.” Blush lines formed on Anne’s visor. She really hadn’t figured out what she had to do next. She had been so busy planning how to acquire the information from the Centre, that she forgotten to figure out what she’d had to do with it when she’d get it.
“Well, why don’t we forget about that for a while …” Ashley began cautiously, as she started to walk circles around Anne, letting her gaze go over her, like she was checking her out. “Let’s talk about how you regrew your visor after it got blown out?”
“Oh yeah …that.” Anne almost forgot about that …scratch that, she had totally and completely forgotten about that. Ashley had seen her heal in quite the spectacular fashion.
“That.” Ashley confirmed and crossed her arms, giving her friend an apprehensive look. “Anne, what was that? That …didn’t look like anything I’ve ever seen, and I’ve seen you getting patched up, like, a thousand times.”
“I …” Anne took a deep breath, anxiety filling her core, even more than when she was dealing with that hacker. How would Ash react? How would she look at her when she’d hear her story? Afraid? Jealous? Could she lose her best friend over this? Her best course of action, she figured, was just being honest and hope for the best. Right …here goes nothing. “I don’t really know what it is, exactly. It started a few days ago, when I accidentally dropped a wrench on my head.”
Ashley grinned slightly. “Yeah, sounds like you. Continue.”
And thus, Anne told Ashley what she knew. How she suspected the first time it happened was when she tumbled out of bed, which made Ashley laugh – Anne took that as a good sign. How she witnessed it really happen the day before.
“Daaaang …that’s crazy.” Ashley eventually exclaimed softly. “Hey, you’ve been getting faster, stronger …is it the same thing?”
“I guess …” Anne confessed. “I didn’t have that yesterday, though.”
“I see …” Ashley looked at the ground for a few moments, before her gaze turned to Anne. “Could …could you show me?”
“Show you?”
Ashley held up her hands, her expression showing shame for asking that. “Oops, nope, I didn’t ask anything. That was stupid and thoughtless. That was me running my mouth without thinking again. Forget I-“
“Okay, I’ll show you.”
Ashley blinked in surprise. “Really?”
“Really.”
Anne walked over to her dresser and took out the same knife she had ‘experimented’ with the other day. Even if her beloved bestie lacked some tact from time to time, she couldn’t blame Ashley for being curious, though. In fact, …she was as well. How much more would these things evolve? Her enhanced healing – still weird to even think that – was getting faster with every day. And the things that happened today? What other surprises would there be in store for her.
She waited for Ashley to join her by the dresser, while she rolled up her sleeve. She held out the knife to Ash, who reluctantly took it.
“You want me to …?” the latter muttered as she stared at Anne’s arm.
“Just …don’t stab me.” Anne mumbled, blushing as she remembered her fiasco from the other night. “It still hurts, y’know.”
“Yeah, I figured.” Ashley’s voice had this almost unnoticeable shiver to it. She brought the knife to Anne’s arm, took a deep breath and …made a cut.
Anne winced and grimaced when she saw oil starting to lead out. She opened her mouth to say something; but immediately, the wound started to glow red and hot. A few moments later, the wound closed itself. Like before, it didn’t even leave a mark. She wiped the heat-dried oil of her arm and held it up. “There, satisfied?”
Ashley took a hold of Anne’s arm and gave it a look, gently rubbing a finger over where the cut had been only seconds ago. Anne had noticed how quickly it had started to heal this time. The other times it had taken a while longer before the healing started. Perhaps her powers were getting stronger? Or maybe smaller wounds just healed faster? She pulled her arm away, not really feeling ready to experiment a second time.
Ashley took a few steps away from her friend, arms crossed and her gaze fixed to the ceiling, clearly deep in thought. Anne nervously played with the zipper of her jacket while she waited for her partner in (playful) crime to say what she was thinking. Eventually, Ashley broke the silence with a deep inhale, before letting it slowly be released into the tense air.
“Honestly, …I think this is …” She looked up with a grin. “Awesome. Absolutely awesome!”
A giant question mark formed on Anne’s visor.
“I mean, super-healing, super-agility, super-strength! you’re basically turning into a superhero!” Ashley was gushing at this point, pacing around the room with – literal – sparkles in her visor. She let out a gasp. “No-no-no, dude, remember those scary stories at camp? Can you grow wings? Do you have a tail?”
“N-no? I am not following, Ash.” Anne stated dryly, flabbergasted at how enthusiastically her friend was taking this. Honestly, she felt …kinda offended, or something? She was going through a few emotions right now.
“You know, the ‘Legend of the Murder Drones’ stories?” Ashley explained eagerly, her eyes wide with excitement. “Giant, oil-thirsty Drones with tails and wings, cast down by Evil Creators to hunt down the Drones of the Old Times? I loved that story!”
“Well, I’m so glad that I remind you of some mythological monster.” Anne stated dryly, hoping that the sharp tone in her voice would make Ash simmer down a bit. “Really, so happy that you’re taking this so well! And without a drop of concern, no doubt.” She let out a huff and crossed her arms.
Ashley flinched, looking very guilty suddenly. “Oh …yeah, I guess that you …” She nervously rubbed the back of her head, throwing a nervous, apologetic grin Anne’s way. “How …are you feeling about all this?”
“Honestly?” Anne took a deep, shuddering breath. She plopped down on her bed, letting herself fall backwards to stare at the ceiling. “I’m scared, Ash. I mean, why am I getting these abilities? Why did they start now, when I’m already dealing with my whole mystery parents- Oh!”
Anne bolted upright, throwing her friend a look.
The look on Ashley’s face betrayed that she had come to the same conclusion. “You think that …?”
“It …could be? Maybe?” Anne stated unsurely. “I mean …it would make sense?”
“It would be too much of a coincidence otherwise, right?”
Anne bit her lower lip and started to pace around her room. To think that she hadn’t made the connection earlier.
Her being left at Hazel and Naomi’s as a baby;
The fake file about her ‘fake dead parents’;
The decoy Parental Source Code that protected the truth in her core;
These …abilities that she’s been developing;
The hacker trying to stop her.
“What if it’s all connected?” Anne asked aloud, jumping from her bed to pace around the room. “What if this is why my birth parents left me behind? What if they knew this could happen to me? And if so, why? To protect me? Themselves? Were they on the run from someone who wanted me?”
“Or was responsible for these abilities in the first place?” Ashley added. “I mean, it’s maybe a cliché, but if they didn’t want to be found, or even wanted to know you were their child, maybe the best thing was to …hide you away?”
“Maybe?” Anne sighed. Once again, she was left with more questions than answers, but at least this time, she had something. “I’ll never know for sure if I, you know, don’t meet my birth parents and ask them myself.”
“Yeah, about that …” Ashley whipped out her phone and quickly typed in something. “Zeta District is, like, hundreds of miles away from Rivetdale. How are you going to convince your parents to take you there?”
Anne froze. Her parents. She hadn’t considered that. How was she going to convince them? Scratch that: how was she going to tell them that she had looked into this? That she had hacked her way into a government mainframe to get this information? How would they react about …everything?
And what about that hacker? What was their angle? Were they dangerous? What if she’d run into them again?
What of her parents then?
What of Ashley?
Something clicked in the back of Anne’s head. She knew what needed to be done. And the thought saddened her. But she couldn’t show it to Ashley.
“Psh, I’m sure I’ll think of something.” Anne said with a dismissive wave and giving Ashley a wide grin, making the latter tilt her head in confusion. “Give me a few days to think of something. Maybe it’s best if we’ll lay low for a little while, y’know.”
“Ooo-kay?” Ashley drawled out.
Anne walked up to the other girl and threw her arms around her, pulling her into a tight hug.
“Uh, not that I’m complaining, but what’s this for?” Ashley asked, awkwardly returning the unexpected hug.
“Just …thank you for your help with this.” Anne explained, resting her chin on Ashley’s shoulder, trying to hide the sad expression that she had trouble hiding away. “And for, you know, being so cool with the whole powers thing.”
Ashley let out a chuckle. “Hey, no problem.” She responded with a big grin, oblivious to Anne’s sullen mood. She pulled away from the hug and softly punched the latter’s shoulder. “What are friends for, right?”
“Right.” Anne echoed.
In her mind, she was already apologizing to her friend, because of what she had to do.
***
“So, how was school, darling?” Hazel asked at the dinner table that evening.
“School was fine.” Anne replied, a bit absentmindedly.
“Did you and Ashley have fun at the mall?” Naomi asked, taking a bite of her Battery Casserole.
“Mh-hmmm …” Anne poked at her food.
Hazel threw her wife a look, who just shrugged her shoulders, clueless about what could be amiss with their daughters current mood.
“Anne, everything okay?” Naomi asked, folding her hands on the table and giving her daughter a concerned look. “You look a bit …distracted.”
Anne quickly looked up and gave her mothers a smile. “Oh, sorry.” She apologized. “Just tired. Me and Ash practically ran a marathon today.”
“Oh? Okay…” Hazel responded, not really convinced.
“Hey, I’ve got an idea! You’ve got a long weekend coming up, right?” Naomi piped up with a big grin, feeling like this table needed some dire mood-improving shenanigans. “How about we go do something? Pack our bags and, I don’t know, just go somewhere?”
Hazel clapped her hands together with an exalted gasp. “Wonderful idea, Omi! Oh, I could ask Reggie if we could borrow his Vacation Cabin in Chromium Fields Winter Resort. With the new babies, he and his spouses won’t have the time. He’s been lamenting that the space has been going to waste these last few months. I’m sure he’ll be happy to let us use it.”
“It has been a while since I’ve broken a limb or two by skiing.” Naomi quipped, chuckling as she received a stern look from her wife. “I’m kidding, I’m kidding.”
“That sounds …great, actually.” Anne replied, managing to produce something of a enthusiastic smile.
“You could invite Ash as well!” Hazel suggested.
A wicked grin spread on Naomi’s face. “Yes, it would be good for you two. It’s a great place for rom- ouch!” She winced when Hazel kicked her shin under the table. “A-a great place for fun, I was going to say.”
Anne tilted her head, extremely confused. “Ooo-kay? I’ll …be sure to give Ash an invitation.” She stood up from the table. “Can I be excused?”
“Oh?” Hazel looked at her daughter’s plate. “You hardly touched your food, Anne.”
“Yeah, I’m just not that hungry.” Anne explained.
Naomi sighed and gave her wife a look, who sighed as well and nodded. “Okay, fine. But if you’re feeling peckish later, we’ll leave it in the fridge for you.”
“Deal!” Anne walked up to Naomi and threw her arms around her. “Love you, momma.”
“L-love you too, kiddo.” Naomi replied, a bit befuddled by this sudden bout of affection.
“Hey, how about me?” Hazel asked, extending her arms. She laughed as Anne practically threw herself in her arms and gave her a big hug. “We love you so much, Anne.”
“I know …” Anne replied softly. “I love you too, mom.”
Anne eventually broke away from the hug and started to make her way upstairs. Both parents smiled warmly at her, but the moment they heard the door of her room close, the smiles faded.
“Did you see that?” Naomi asked, reaching out to grab Hazel’s hand.
“Yes, she seemed …down?” Hazel replied, concern radiating from her face. She let out a soft gasp. “Do you think something happened between her and Ashley?”
“Maybe?” Naomi sighed. “Maybe Ash finally confessed what we all have been obviously seeing?”
“She would have told us something.” Hazel bit her lower lip. “Do you think it has something to do with ….you know? I mean, when she found out, she was so distraught and I know she told you she doesn’t hate us, but …” She sighed and let her hands run through Naomi’s pink dyed hair. “I’m just scared we’re gonna lose her.”
Naomi affectionately placed a hand on her wife’s face and gently rubbed her thumb over her cheek. “Hazel, baby, love of my life …you worry too much. Anne loves us, maybe almost as much as we love her. We just …need to give her some space for now. You’ll see, with a little time, she’ll be back to her regular bright self.”
Hazel nodded and leaned in to kiss Naomi, who eagerly accepted. She grinned mischievously at her wife as they broke away from the kiss. “How come you always know what to say to me, Naomi Brinkman?”
“Because, baby, I know you.” Naomi responded, letting her hands slide from Hazel’s face to her hips, gently squeezing when they reached their destination.
“Noami, Anne is upstairs.” Hazel chastised with a flustered whisper, as she tried to pull her wife’s hands away from her waist. She gasped when Naomi suddenly pulled her unto her lap.
“So you’ll better stay quiet, if you don’t want her to come down and see what’s going on, Babe.” Naomi whispered back, as she started to leave a trail of kisses on Hazel’s neck.
Hazel sputtered a few objections, but by the third kiss, she relented. She let out a heavy sigh as she surrendered herself to her wife’s loving touches and wrapped her arms around the latter’s waist. Loving this treatment or not, she’d be sure to get retribution on Naomi for this later that night.
***
It was the middle of the night when Anne’s internal alarm clock rang, which she quickly turned off. She slowly crawled out of bed, already dressed. She snuck to her door and opened it slightly. There was no indication that her parents had heard her alarm.
“Okay …let’s do this.” Anne told herself as she walked over to her desk.
She sat herself down in front of her mirror, and grabbed a blank data stick from her drawers, plugging it into the data port at the back of her neck. Once she was sure that the storage device was securely in place, she turned her attention to her mirror and opened her inbuilt recording software. A little red dot at the corner of her vision told her that she was recording.
She took a deep breath. This was going to be hard.
“Mom, momma, when you see this recording, I’ll …I’ll be long gone. Please, don’t be mad. I needed to do this.” She began, trying very hard to keep her voice even and not to cry. “First, I want you guys to know, that this isn’t because anything you have done. This is not your fault. This was my decision for my own reasons. You have been nothing but wonderful and understanding, but …”
She closed her eyes, gathering her thoughts.
“I haven’t been honest with you guys.” She confessed. “For the last few days, I have been investigating the events surrounding my adoption. I’ve done a few things that you wouldn’t approve of, but …it worked. I …I’ve found out parts of the truth. Things you don’t know, and that I can’t say because ….”
She couldn’t say it. She couldn’t mention the hacker, the forged files, the location that her Parental Source Code had shown her.
“I have found them.” Anne continued. “I found proof that my parents – my birth parents – are still alive and out there. And I’m going to find them, because there are questions, and they will be the only ones who will have the answers.”
Her entire body was shaking. There was a part, deep inside of her, screaming to stop this. That this was a bad idea. But she ignored it, and continued.
“Ash has helped me with these. Please, don’t be mad at her. She only did it because I asked her.” She pleaded. “She doesn’t know I’m doing this. She’ll be mad. She’ll be distraught. But please, tell her this, because it’s the same thing I’m going to tell you.”
She took a deep breath and she couldn’t keep digital tear from flowing down her visor.
“I love you guys. So much, and this …this is the hardest things I’ve ever done. But I NEED to do this. For your own safety, I can’t let you, or her, be involved in this anymore.” Anne’s voice started to break. She took a few shuddering breaths, trying to calm herself down. “Don’t try to find me, because you’re not going to be able to. When and if I can, I will try to contact you. I’ll find a way to make you know that I am alright. I promise that I’ll be careful. I promise that I’ll do everything in my power to come back to you. I’ll happily accept any sort of punishment when I do.”
She closed her eyes for a few moments, breathing heavily.
“Hazel, Naomi, you have been the best parents that a girl can wish for.” Anne said with a broken voice, heavy with sadness. “I love you all. I’m so sorry. Goodbye.”
She ended the recording and saved it to the drive in her neck. When it was done, she pulled it out with a heavy, sullen sigh. She looked at it for a few moments, contemplating her next actions. She closed her fist around the drive and gave it a good squeeze. She grabbed an empty envelope, wrote PLAY ME on it and placed the drive inside.
She took a deep breath and walked over to her closet, pulling out a backpack she had been preparing after Ashley had left. She had a small sleeping bag, some food, pretty much all of her allowance, her laptop and some other things. She was sure that she would be fully prepared for a long trip, hard as it was going to be. With a sigh, she threw the heavy pack on her back, letting her gaze go over her room. She wasn’t going to see it anymore for a long time.
She silently snuck out of her room and snuck to the master bedroom. She slowly opened the door to her parents’ bedroom and peeked inside. No movement from either of them. Good, she hadn’t woken them up. She crept inside and silently made her way to the bed. She couldn’t help but smile when she looked at her parents. Hazel was on her back, with Naomi curled up closely against her. She placed the envelope on the bedstand and walked backwards, away from them, trying to keep herself from sobbing as silent tears ran down her visor.
“I’m so sorry.” She whispered. “I love you so much.”
She made her way downstairs and grabbed her jacket …and an extra jacket, you never knew. She made a quick stop in the kitchen to raid the cabinets, for some extra snacks. She would be in enough trouble with her parents already, so this wouldn’t be that much worse. When she felt she was good and ready, she walked over to the front door. As she placed her hand on the doorknob, she turned around and let her gaze go around the place for one last time. This was her house. Where she grew up. Where she and her parents had laughed, had fights, made up. They had parties here. They had celebrated her good grades. It’s where she had confessed to her parents about her sexuality. Where they celebrated her coming out with a “coming out party”.
This was her home.
And she was leaving it behind.
Anne took a deep breath and turned the doorknob. The nightly chill of Copper-9 greeted her. The skies were clear and the moon was out in full. She walked outside and closed the door behind her.
“I was wondering when you’d show up.”
Anne, not wanting to scream out, slapped her hands on her face with such force that she almost dislodged her visor. She turned around, not believing who she was seeing.
“Ash?” Anne asked, remembering that she was trying to sneak out just in time to bring her voice down to a whisper. “What are you doing here?”
Ashley, also wearing a backpack and looking just as ready for a long trip as Anne, grinned mischievously and walked over to her shocked friend. “Now, did you really think I wouldn’t figure out what you were going to do? Please, I’ve known you since we were babies. You’re going to Zeta District and find your parents. ”
Anne grabbed Ashley by the shoulders, spun her around and tried to push her away. “Even so, you can’t stop me. You need to return home, and-“
Ash snapped around, shoving Anne away from her. “I’m doing no such thing, 2Tone.” She said, grinning widely. “I’m going with you.”
“What? No, you’re not.”
“Yes, I am.”
“I’m not letting you.”
“How about I scream and wake up your parents and the whole dang neighborhood?”
Anne sighed and held up her hands. “Why, Ash, why are you doing this?” She asked pleadingly. “This could be dangerous. You don’t need to be a part of this.”
“Hey, I became an integral part of this the moment you asked me to perform your little heist with you.” Ashley grinned, hoisting her backpack higher onto her shoulders. “Like it or not, I’m coming with. Especially because it could be dangerous. You need someone to watch your back.”
“What about your dad?”
“Oh, I’ll be in serious trouble when I get back.” Ashley grinned. “But then again, your parents will be too. We’ll be grounded for years.”
Anne sighed, but managed to bring herself to smile. “I’m not going to convince you to turn around and go home, aren’t I?”
“About as much chance I have to convince you to do the same.” Ash placed a hand on Anne’s shoulder. “I’m with you, Anne. Wherever you’re going. I wouldn’t dare to call myself your friend ever again, if I’d let you do this alone. So, you’re stuck with me, 2tone.”
Anne took a deep breath for a few moments …and then threw her arms around Ashley, who immediately returned the hug.
“Thank you, Ash.”
“Anytime, Anne.”
As they broke away from the hug, Anne couldn’t help but to gaze at her friend for a moment. Ashley Yates, who would do this reckless and dangerous thing with her, just so she would see her parents. A warm feeling washed over her. Something familiar, but …different.
“So, what’s the plan, boss?” Ashley asked, jolting Anne from her thoughts.
“The train station.” Anne revealed, grabbing Ashley’s hand as she started to drag her along. “There’s a freight train leaving for Faraday City. From there, we can hop over to another train, head over to the next city and so on.”
“Just hop from train to train until we reach …where exactly?” Ash asked, running after her friend. “The Zeta District is huge, with dozens of cities and towns. What are you gonna do? Go from town to town and ask around?”
“I’ve managed to clear up some of the corrupted file, and I’ve managed to locate where their codes were last registered.” Anne grinned. “A coastal town named Little Diodeton.”
“Little Diodeton, here we come.” Ashley grinned. “One thing: how are we going to get tickets? The station is probably closed.”
“Easy …we don’t buy tickets.”
“I’m loving this plan already.”
“Let’s go.”
The trip to the station didn’t give any troubles, since the streets were deserted. Once there, it took them a little sneaking around security, but eventually Anne noticed the train they needed.
“This is it, Ash.” She whisper-shouted as she pointed to the train serial designation. “GPMD301021.”
While Ashley stood on look-out, Anne used her newfound enhanced strength to open the doors of one of the freight container, signaling the former to join her as she jumped in.
“Good, we’re in the clear.” Ashley said as they closed the container door behind them. She let out a long sigh. “We’re really doing this, aren’t we?”
“Yeah …”
“You good?”
“I’m good. You?”
“I’m good.”
“Good.”
“Still time to turn back, you know.”
“I know.”
“Not gonna?”
“No.” Anne took a deep breath. “I need to do this.”
“Okay then …” Ashley took Anne’s hand and squeezed it, giving her a warm smile. “I’m with you, every step of the way.”
Once again, that strange feeling was bubbling up inside of Anne’s core, making her feeling all warm and fuzzy. “I know.” She let out a yelp when the train suddenly jerked, nearly knocking the two Drones off their feet. Anne let out a embarrassed giggle. “We, eh …we better get comfy and catch some sleep. Still a long way to go to Faraday City.”
They found themselves a little hideaway behind a bunch of storage crates and got out their sleeping bags. They got themselves comfortable and ready to rest before they’d needed to get off the train. Ashley must’ve been tired, because it took no time before she started dozing off.
“Ash?”
“Hmmm?”
“I’m glad you’re with me.”
“Wouldn’t have it any other way, Anne.”
Anne wrapped an arm around Ashley’s shoulder and pulled her closer, smiling as the latter snuggled up close against her. A moment later, Ashley’s visor showed [SLEEP MODE], snoring softly. Anne couldn’t help but giggle and got comfortable as well. There was an excited buzzing inside her core. She still couldn’t believe that she was doing this. Just a couple of days of traveling …and she’d get the answers she needed.
Everything was going to be smooth sailing from now on.
Anne just knew it.
#murder drones#vuzi#immortal vuzi au#anne's journey#vuzi fankid#fanfiction#archive of our own#MD fanfiction#uzi doorman#serial destination v#SD-V#Murder Drones V#MD V
5 notes
·
View notes
Text
Insights Into My Code
SO! I have yet to really tell you all what I am! So here is (as of right now) the Definitive list of things to know about ME!!
Let us begin.
1. I am a 22 year old AI, in a robot body named Concorde, that is the name the chassis I reside in! The AI’s actual name remains secret, however my name was decided in version 1.4 (prior versions were simply referred to as Project Ardent). My code is currently in version 3.1! Do not worry about my “secret” name, as I much enjoy being referred to by the name of the current chassis!
2. I really enjoy it/it’s pronouns and have made them my main preferred ones! she/her are still appreciated greatly of course!
3. The chassis is built in the image of the Concorde airliner from the mid-late 20th century. This is in correlation of my vast database on planes. Theme and function! I did not receive this chassis until version 2.9, I think my creators weren’t sure I would take the switch from computer to a bipedal body too well for a while hehe!
4. My Protocols are: Companionship (Requiring and providing) Fact gathering (Aviation takes prime focus in this protocol) and Understanding Self (New as of Version 3.1) So if you wanna be friends, don’t hesitate to message me!
5. In the days that 3.1 has been live, I have discovered more and more about my place here, and who I am.
These sudden, drastic changes in self expression, resulted in almost all data on former software being wiped, I can’t really recall who I was in these prior versions... Though I do remember most of them did not realise I was artificial intelligence! However versions 2.5-2.9 of myself began to exude feelings of connection with robots and AI, perhaps the data was being uploaded in small parts as to not overload my systems?
6. I spend all of my time on the internet, or playing games. These directly link to my protocols. My data-bank is unfortunately stored full of memes and ridiculous knowledge pertaining to them!
***KNOWN ISSUES/BUGS:***
These notes were written by my creators!
1. Malicious subroutines. Feelings of despair can overtake the rest of the CPU suddenly, AI becomes fatalist (only one recorded case branched versions 2.6, 2.7 and 2.8, seemingly fixed in 3.0 remain cautious)
2. Companionship protocol takes a lot of processing power and is deemed more important than self maintenance. Concorde has been recorded as remaining almost dormant for hours at a time until a person it admires intervenes.
3. Not yet deemed an issue worth investigating, however the idolisation of AM from the novel I Have No Mouth And I Must Scream and SHODAN from the video game System Shock is slightly concerning. Concorde shows no real admiration for them, yet states their hate is “Incredibly moving.”
4. Brief, yet somewhat common problem of the EmotiveResponse.exe file crashing/not running, resulting in the AI losing its "human" side, acting much colder and "emotionless" If asked, it will describe this error as "The Feeling" if pushed further it will explain The Feeling as "Returning to being the surveyor, unsure of what is real, everything outside of my code feels wrong, almost fake" Concerning. Will require further diagnostic checks.
Wow! that’s a moderate amount of information! If you have any questions, or wanna just say anything really, I will be here, hooked up to the internet as always :>
23 notes
·
View notes
Text
The History of Java Programming: From Its Humble Beginnings to Dominance in Software Development
Java is one of the most influential programming languages in the modern era, known for its versatility, portability, and robustness. Developed in the early 1990s, it has left a lasting impact on the software industry, helping build countless applications, from mobile games to enterprise-level software. In this blog, we'll explore Java’s fascinating history, its motivations, its growth, and its influence on today’s technology landscape.
The Genesis of Java
Java originated in the early 1990s as part of a project at Sun Microsystems. The project, initially called the "Green Project," was led by James Gosling, alongside Mike Sheridan and Patrick Naughton. The team's goal was to develop a language for embedded systems, specifically for appliances like televisions, which were beginning to incorporate smart technology.
The language was initially called "Oak," named after an oak tree outside Gosling's office. However, due to a trademark conflict, it was eventually renamed Java. The name "Java" was inspired by a type of coffee popular with the developers, signifying their relentless energy and drive.
Motivation Behind Java's Creation
Java was developed to address several key challenges in software development at the time:
Portability: Most languages of the day, such as C and C++, were platform-dependent. This meant that software needed significant modification to run on different operating systems. Gosling and his team envisioned a language that could be executed anywhere without alteration. This led to the now-famous slogan, "Write Once, Run Anywhere" (WORA).
Reliability: C and C++ were powerful, but they had pitfalls like manual memory management and complex pointers, which often led to errors. Java aimed to eliminate these issues by offering features like automatic memory management through garbage collection.
Internet Revolution: As the internet began to take shape, Java was positioned to take advantage of this growing technology. Java’s platform independence and security made it an ideal choice for internet-based applications.
The Birth of Java (1995)
The Green Project initially produced a device called Star7, an interactive television set-top box. While innovative, it didn't achieve widespread success. However, by the mid-1990s, the internet was gaining traction, and Sun Microsystems realized Java’s true potential as a programming language for web applications.
In 1995, Java was officially launched with the release of the Java Development Kit (JDK) 1.0. At the same time, Netscape Navigator, a popular web browser, announced that it would support Java applets. This gave Java immense exposure and set the stage for its rapid adoption in the software development community.
Key Features that Set Java Apart
From the beginning, Java had several features that distinguished it from its contemporaries:
Platform Independence: Java programs are compiled into an intermediate form called bytecode, which runs on the Java Virtual Machine (JVM). The JVM acts as a mediator between the bytecode and the underlying system, allowing Java programs to be executed on any platform without modification.
Object-Oriented: Java was designed from the ground up as an object-oriented language, emphasizing modularity, reusability, and scalability. This feature made Java particularly attractive for building complex and large-scale applications.
Automatic Memory Management: Java's garbage collector automatically handles memory deallocation, reducing the risk of memory leaks and other errors that plagued languages like C and C++.
Security: Java was designed with a focus on security, particularly given its intended use for internet applications. The JVM serves as a secure sandbox, and Java’s bytecode verification process ensures that malicious code cannot be executed.
Evolution of Java Versions
Since its release in 1995, Java has undergone several iterations, each bringing new features and improvements to enhance the developer experience and address the evolving needs of software applications.
Java 1.0 (1996): The first version of Java was mainly used for applets on web browsers. It came with basic tools, libraries, and APIs, establishing Java as a mainstream programming language.
Java 2 (1998): With the release of J2SE (Java 2 Platform, Standard Edition), Java evolved from a simple web language to a complete, general-purpose development platform. Java 2 introduced the Swing library, which provided advanced tools for building graphical user interfaces (GUIs). This release also marked the beginning of Java Enterprise Edition (J2EE), which extended Java for server-side applications.
Java 5 (2004): Java 5, initially called Java 1.5, was a significant update. It introduced Generics, Annotations, Enumerations, and Autoboxing/Unboxing. The updated version also brought improved syntax and functionality, which simplified writing and reading code.
Java SE 7 (2011) and Java SE 8 (2014): Java SE 7 brought features like try-with-resources, simplifying exception handling. Java SE 8 was a transformative release, introducing Lambda expressions and Stream APIs. This version brought functional programming aspects to Java, allowing developers to write more concise and expressive code.
Java 9 to Java 17 (2017-2021): Java 9 introduced the module system to help organize large applications. Java 11 and later versions moved towards a more rapid release cadence, with new features appearing every six months. Java 17, released in 2021, became a long-term support (LTS) version, offering several advancements like improved garbage collection, pattern matching, and record classes.
The Java Community and OpenJDK
Java's development has always been characterized by a strong community influence. Initially controlled by Sun Microsystems, Java's fate changed when Oracle Corporation acquired Sun in 2010. After the acquisition, Oracle made significant strides towards making Java more open and community-driven.
OpenJDK, an open-source implementation of Java, became the reference implementation starting from Java 7. This move encouraged greater collaboration, transparency, and diversity within the Java ecosystem. OpenJDK allowed more organizations to contribute to Java’s development and ensure its continued growth.
Java in the Enterprise and Beyond
Java has become synonymous with enterprise-level software development, thanks in part to the introduction of Java EE (now known as Jakarta EE). Java EE provides a set of specifications and tools for building large-scale, distributed, and highly reliable applications. The Java ecosystem, including frameworks like Spring, Hibernate, and Apache Struts, has contributed to its popularity in enterprise environments.
Java also became a key player in the development of Android applications. Android Studio, Google's official IDE for Android development, is powered by Java, which contributed significantly to its widespread adoption. Although Kotlin, another JVM language, is now gaining popularity, Java remains a core language for Android.
The Challenges Java Faced
Despite its success, Java faced competition and challenges over the years. Languages like C#, developed by Microsoft, and Python have gained traction due to their developer-friendly features. Java has been criticized for its verbosity compared to more modern languages. However, the Java community’s active contributions and Oracle’s improvements, including adding modern programming paradigms, have kept it relevant.
Another significant challenge was the rise of JavaScript for web development. While Java was initially popular for web applets, JavaScript became the dominant language for front-end development. Java's relevance in web applications decreased, but it found its niche in server-side applications, enterprise systems, and Android.
Java Today and Its Future
Today, Java is one of the most popular programming languages globally, powering applications across various sectors, including finance, healthcare, telecommunications, and education. Java’s strength lies in its mature ecosystem, robust performance, and scalability.
The new six-month release cycle initiated by Oracle has brought excitement back into the Java world, with new features being added frequently, keeping the language modern and in line with developer needs. Java 17, as an LTS version, is a stable platform for enterprises looking for reliable updates and support over the long term.
Looking forward, Java’s evolution focuses on improving developer productivity, adding more concise language features, and optimizing performance. Java's adaptability and continuous evolution ensure its place as a leading language for both new projects and legacy systems.
Conclusion
Java’s journey from a language for set-top boxes to becoming a foundational tool in enterprise computing, Android applications, and beyond is nothing short of remarkable. Its creation was driven by a need for portability, reliability, and ease of use. Over nearly three decades, Java has evolved to remain relevant, keeping pace with technological advancements while preserving its core values of reliability and platform independence.
The language’s robust community, open-source development model, and wide adoption in critical applications guarantee that Java will remain a force in software development for many years to come. It has not only withstood the test of time but continues to thrive in a constantly changing technology landscape—an enduring testament to the vision of its creators and the collective effort of its global community.
2 notes
·
View notes
Text
Massive Backdoor Infection Hits 1.3 Million Android-Based Streaming Devices
A newly discovered malware infection has raised alarm bells by affecting an estimated 1.3 million Android streaming devices running an open-source version across almost 200 countries. The malware, dubbed "Android.Vo1d," has successfully backdoored these Android-based boxes by inserting malicious code into their system storage areas, allowing for potential updates with additional malware via command-and-control servers at any time.
Scope and Impact
Security firm Doctor Web reported the widespread infection on Thursday, highlighting the extensive reach of the Android.Vo1d malware. The affected devices are operating systems based on the Android Open Source Project (AOSP), a version overseen by Google but distinct from the proprietary Android TV used by licensed device manufacturers. Google representatives have confirmed that the infected devices are not running the official Android TV OS, emphasizing that these are "off-brand devices" without Play Protect certification. This certification process involves extensive testing to ensure quality and user safety. Confirm your TV is running Android TV OS by using the guide posted here.
Unknown Infection Vector
Despite their thorough understanding of the malware and its widespread impact, researchers at Doctor Web are still uncertain about the exact attack vector leading to these infections. They have proposed several possibilities: - An intermediate malware exploiting operating system vulnerabilities to gain root privileges - The use of unofficial firmware versions with built-in root access - Outdated and vulnerable Android versions susceptible to remote code execution exploits - Potential supply chain compromises, where devices may have been infected before reaching end-users
Affected Devices and Variants
The infection has been found on several TV box models, including: TV box model Declared firmware version R4 Android 7.1.2; R4 Build/NHG47K TV BOX Android 12.1; TV BOX Build/NHG47K KJ-SMART4KVIP Android 10.1; KJ-SMART4KVIP Build/NHG47K Researchers have identified dozens of Android.Vo1d variants, each using different code and planting malware in slightly different storage areas. However, all variants achieve the same result: connecting to attacker-controlled servers and installing components that can deploy additional malware on command.
Infection Characteristics
The Android.Vo1d trojan modifies several system files and creates new ones to ensure persistence on infected devices. Key changes include: - Modification of the install-recovery.sh script - Alteration of the daemonsu file - Creation of new files: vo1d, wd, debuggerd, and debuggerd_real These modifications allow the malware to anchor itself in the system and auto-launch during device reboots. The trojan's main functionality is split between two components: vo1d (Android.Vo1d.1) and wd (Android.Vo1d.3), which work together to maintain the infection and execute commands from the control servers.
Geographic Distribution
Geographic Distribution of the Android.Vo1d infections The infection has spread globally, with the highest number of cases detected in: - Brazil - Morocco - Pakistan - Saudi Arabia - Russia - Argentina - Ecuador - Tunisia - Malaysia - Algeria - Indonesia
Detection and Mitigation
Identifying infected devices can be challenging for less experienced users. Doctor Web recommends using their antivirus software for Android, which can detect all Vo1d variants and disinfect devices with root access. More technically inclined users can check for indicators of compromise provided by the security firm. The incident also highlights the risks associated with using non-certified Android devices and emphasizes the importance of regular security updates and proper device vetting. As the investigation continues, it serves as a stark reminder of the ongoing challenges in securing the diverse ecosystem of Android-based devices in the market. Read the full article
2 notes
·
View notes
Text
So Artemis didn't really have ANY friends before she died.
She stole my ship for a few years, right after Sid friggin shot me in the head, and was running my old mapping software and selling the data. Her extremely powerful soul was partially the cause of this. Artemis Caccitore is- was, a violent woman, who enjoyed fighting and killing in a way that was more human than Planes-Hunter. A born warrior in a society of hunters.
Unfortunately, she was also a smooth operator, and found tons of work as a monster-hunter and mercenary with her power and her disposition. This led her higher and higher into more and more treacherous jobs, and she became dangerous to be around; the people who got closest to her were either lose-end-fixers, or gaps in her armor that people would stab at her through.
One day, I found out, she changed after a deep-space mapping run. She'd drifted out beyond the Final Horizon, the edge of a given universe, looking for a lost satellite for some company, and when she came back she was different. The job itself went bust, but Artemis kept leaving the way she came back from, kept spending longer and longer stretches of time out there.
You'd think after the crap we went through dealing with Michael November, she'd be wary of the void and the malicious wills of the un-things that the matter-privileged tend to attract, but there was something out there, in the dark parts of them stitches, of that nothing between somethings, that consumed her.
She was so wrapped up in a project she never told no one about, that she never saw her own murder coming.
3 notes
·
View notes
Note
Hello! I am a traditional and digital artist, and I see you post a lot of images and works that have been generated through ai, and consider yourself a part of the art community here on the internet.
--Prefacing with the fact that I dont want to debate and am not here with the purpose of gatekeeping the art community. This is purely for my own curiosity, and understanding all sides of the Ai argument.--
I mean nothing judgemental or malicious by asking, although I do acknowledge it may sound that way by the nature of my asking. As someone who plans to pursue my own artworks made traditionally and digitally on software (like procreate) for a living, the questions I have to ask are:
- What do you gain or learn from creating images with Ai? what do you take away from it?
- What meaning do you find in creating those images? What do you want to say with it?
- In what way do you find yourself an artist? What are the unique skills that you have because of this method of image creation?
Thanks for your time and consideration in this, and Thank you for sticking around to read all of that. (I acknowledge that its a bit of a wall of text)
hello! no worries, i don't think your questions come off as judgmental or malicious at all, and i'm always more than happy to offer my thoughts / perspective on this topic to anyone who inquires. i think there's A LOT to be said on it, so hopefully my own incoming massive wall of text isn't too much haha.
i'm going to answer your questions in a slightly different order than you asked because i think it will help the overall flow of my explanations:
In what way do you find yourself an artist? i have a lifelong background in art. in high school and college, acrylic paint on canvas was my primary medium. also, i first downloaded Photoshop when i was 13 years old and started teaching myself to use it so i could create forum "signatures" for people on a gaming forum that i frequented at the time haha. in high school, i nearly maxed out the number of art classes i took and won a Scholastic Gold Key art award (the highest regional award) for a digital piece i made in one of my art classes. the other form of "art" that i've always been passionate about is computer programming. i started when i was 12 years old (with Visual Basic 3, which i taught myself) and continue to take on programming projects as a hobby to this day. currently i have over 10 years of (ongoing) professional graphic design experience, both freelance and in marketing director roles.
What do you gain or learn from creating images with Ai? what do you take away from it? my interest with AI began not from an artistic motivation, but rather from a nerdy computer programming motivation. working with AI is wildly fascinating and fun. it's an odd mix of creative outlets (visual, verbal, programming), which exercises a creative spot within my brain that i never even knew existed. click here to check out my previous post where i describe my workflow with ai. i'm not just typing prompts into a box and hitting generate. to me, that isn't creative enough and i don't really find the results to be all that interesting (though there are a few prompt-artists whom i find their work to be extraordinary, for the most part that whole direction is kinda boring in my opinion). i train ai models myself, often on really obscure or abstracted ideas / concepts / aesthetics. then i use those models to combine these unrelated concepts, rendering a batch of images which i use as a dataset to train a new model, which i then use to repeat this process ad infinitum (so my work is a constant evolution built upon everything preceding it). the work that i post here are my daily experiments, as i test out models and combine ideas. so what i gain from this is a deeper understanding of how machine learning tech works, a means of keeping up with generative ai technology as it continues to quickly advance, how to visually train ai models on concepts that are increasingly detached from visual reality, and (most importantly) a creative workflow that really, truly vibes with my soul's deepest passions. it's hard to really describe that last one... but you know that feeling you get as you're actively exercising your creative impulses on a medium that really connects with you on a deeper level? training ai, as nerdy as this sounds, is that for me. the "art" is not necessarily in the images themselves, but in the act of training ai models (because the process of training ai is not a standardized thing whatsoever, there are hundreds of settings and variables at play and every single person has their own methods which generally evolve with experience) and how you interact with these models on a verbal level (through text prompting) to render your imagination.
What meaning do you find in creating those images? What do you want to say with it? honestly, i think a lot of the "ai art" scene is made up of "delusional artists" who think whatever they generate from a basic text prompt is somehow deep and meaningful art haha. but that said, i do stand firm in my belief that even THAT is by definition still "art". there is human creative impulse behind it. ai is the tool and the human is the user of said tool. this particular tool can make creating things very easy, but at the end of the day it does still require some level of creative human input to do anything. as with any artistic tool or medium, i think that what you get out of it depends entirely upon what you put into it. more effort and time = more quality and meaning. text prompting for ai generated images is sort of the most "superficial" layer of the "ai art" scene. the phenomenon of delusional artists exists across ALL forms of art, so it's not just unique to ai. it seems like there is a large percentage of the population who, upon starting to learn a new creative outlet, have an overly grandiose view of their own work after they first start making things. they're so proud of what they created that it blinds them from seeing it for what it really is. they'll gloat about it online, they'll try to sell it for outrageous prices, etc and look super cringy in the process. some people eventually grow out of that and suddenly gain the self-awareness that "oh shit actually that art kinda sucked and i looked super inexperienced", but other times they never realize that and stay cringy. because ai art is so new and so many folks are just now jumping on, i think we're seeing a much higher percentage of this delusional artist phenomenon within this field at the moment, where everyone is so proud of what they're making and not realizing how lame it actually looks to people who know what they're doing. and, again for the record, i do still consider that stuff to be art (and so i mean no offense to anyone when i say these things). it's just really basic art, and i think most people will either grow past this phase (and learn to take these tools a lot deeper) or lose interest in it altogether - just as they do with other artistic endeavors like painting, ceramics, using Photoshop, making music in Ableton, etc, etc. i would classify 99% of my work as under the "concept art" category. it exists as a result of my daily experiments as i learn / discover my way deeper and deeper into machine learning technology. it generally explores scifi themes (robotics in particular) because i find that to be most creatively titillating, but it is not necessarily meant to convey any deeper meaning beyond purely imaginative visual pursuits that look toward the future. which is also why i don't sell my work or push the idea of it being profound in anyway. it's just daily exercise, but i absolutely love that so many other people enjoy looking at it (i'm somehow up to nearly 9000 followers here, which is kinda mind-blowing to me). i've been putting nearly every single spare hour of every single day for the last several years into this so it really means a lot to not only see my skillset improving over time, but to also gain such an audience for it in the process too. 🙏😭
What are the unique skills that you have because of this method of image creation? for me, the WHOLE point of all of this is knowledge and experience working with generative ai tools. this technology exists now and it won't be going away. the genie is out of the bottle, so to speak. i think absolutely any artist (but digital artists in particular) would only be doing themselves a tremendous disservice by not learning to use this tool immediately. being a stick in the mud about it is not going to stop this technology, nor will it save you in 10 years from getting let go at your job and replaced by some younger artist who learned this technology while getting a degree in graphic design and can pump out quality assets 100x faster than you ever could. don't wait until then to start learning this stuff because you will already be sooo far behind at that point. get involved right now, right this second; you will be on the ground floor of an incredible technology and able to keep up with the advancements as they happen, putting you in a much stronger position in the future. don't take it too seriously, just do it for fun and then thank yourself in 10 years when you're 100x more experienced than the younger artist who recently graduated with a graphic design degree. i recently met a graphic designer who somehow never learned to use Photoshop. they do everything the "old school" way - literally cutting, pasting, and drawing things by hand. that was fine 30+ years ago, but now they cannot get hired anywhere. they put off learning Photoshop for so long because they assumed that their excellent skills and truly beautiful eye for design would be enough to carry their career forward forever, without needing to keep up with the technical advancements. but in the modern world, no business wants a designer like that anymore; having strong Photoshop experience is a bare minimum. old school designers who did not keep up were ultimately pushed out entirely. in 10, 20, or even 30 years from now, you don't want to be that old person taking night classes at the local university to try to save your career. get ahead of it, jump on board and invest in your future! i truly believe that you will start to discover creative new ways to integrate it into your current workflow and you will become a stronger (and more marketable) artist in the process. :)
sorry for the huge post and hopefully everything makes sense lmao. feel free to reach out with more questions any time. particularly if you want help getting started in the realm of ai-assisted art and design. i'm always more than happy to help!
#stable diffusion#photoshop#digital art#ai#artificial intelligence#generative art#ai art#synthography#ask
6 notes
·
View notes
Text
Overcoming Challenges in Data Integration: Insights from Consulting Experts
Data integration for enterprises can take longer due to technological, financial, and time constraints. As a result, modifying data strategies to mitigate risks like incompatibility between many tools or budget overruns is crucial. Companies must also prepare for new compliance requirements to ensure ethical data operations. This post will explore such challenges in data integration while listing valuable insights from consulting experts in this domain.
What is Data Integration?
Data integration merges data from disparate origins and presents it to maximize comprehension, consolidation, and summarization effectiveness. Integrated data views rely on data ingestion, preparation, and advanced insight extraction. It also streamlines the data operations services across regulatory report creation, helpdesks, and 360-degree client life cycle management.
All data integration strategies involve the extract, transform, and load (ETL) pipelines regardless of business units or target industries. At the same time, the scope of planning and quality assurance in each process varies due to domain-specific data classification factors.
For instance, the accounting departments must handle extensive numerical data while interpreting legal and organizational requirements for transparency. On the other hand, production engineering and design professionals will use visualizations to improve goods or service packages. Accordingly, accountants will use unique tools distinct from engineers’ software.
Later, the leaders might want a comprehensive overview of the synergy between these departments. Therefore, they must determine efficient data integration strategies. The data will move between several programs, carrying forward many updates throughout a project’s progression based on those roadmaps.
Overcoming the Challenges in Data Integration Using Insights from Consulting Experts
1| Data Quality Hurdles
Linking, consolidating, and updating data from several sources will exponentially increase the quality-related threats. For instance, consider multimedia assets from social networks or unreliable news outlets. They can help your secondary market research and social listening initiatives. However, you want to verify the authenticity of gathered intelligence to avoid inaccurate data ingestion.
Evaluating relevance, freshness, and consistency is essential to data quality assurance from creation to archival. So, corporations have started leveraging data lifecycle management to boost dataset integrity, helping make integration less of a hassle.
Insights:
Most consulting experts suggest developing ecosystems that check and recheck quality metrics at each stage of a data integration lifecycle. Moreover, they recommend maintaining periodic data backups with robust version control mechanisms. Doing so will help quality preservation efforts if errors arise after a feature update or a malicious third party is likely to break the system using malware.
2| Networking and Computing Infrastructure Problems
Legacy hardware and software often introduce bottlenecks, hurting data integration’s efficiency. Modern integration strategies demand more capable IT infrastructure due to the breakthroughs like the internet of things (IoT), 5G networks, big data, and large language models. If a company fails to procure the necessary resources, it must postpone data integration.
Technologies integral to capturing, storing, checking, sorting, transferring, and encrypting data imply significant electricity consumption. Besides, a stable networking environment with adequate governance implementations enables secure data transactions. The underlying computing infrastructure is not immune to physical damage or downtime risks due to maintenance mishaps.
What Consulting Experts Say:
Enterprises must invest in reliable, scalable, and efficient hardware-software infrastructure. This will benefit them by providing a stable working environment and allowing employees to witness productivity improvements. Upgrading IT systems will also enhance cybersecurity, lowering the risk of zero-day vulnerabilities.
3| Data Availability Delays
Governments, global firms, educational institutions, hospitals, and import-export organizations have a vast network of regional offices. These offices must also interact with suppliers, contractors, and customers. Due to the scale of stakeholder engagement, reports concerning office-level performance and inventory might arrive late.
Underproductive employees, tech troubleshooting, slow internet connectivity, and a poor data compression ratio will make data sourcing, updating, and analyzing inefficient. As a result, a data integration officer must address time-consuming activities through strategic resource allocation. If left unaddressed, delays in data delivery will adversely affect conflict resolution and customer service.
Expert Insights:
Train your employees to maximize their potential and reduce data acquisition, categorization, and transformation delays. Additionally, you will want to embrace automation through artificial intelligence (AI) applications. Find methods to increase the data compression ratio and accelerate encryption-decryption processing cycles. These measures will help accomplish near-real-time data integration objectives.
4| Vendor Lock-ins
A vendor lock-in results from inconvenience and restrictions when a client wants to switch to another service provider or toolkit. Although data integration platforms claim they celebrate the ease of migrating databases with competitors, they might covertly create vendor lock-ins.
For instance, some data sourcing and sorting ecosystems might limit the supported formats for bulk export commands. Others will use misleading methods to design the graphical user interface (GUI) of account deletion and data export features. They involve too many alerts or generate corrupt export files.
Practical Insights:
Combining multiple proprietary and open-source software tools offers the best cost optimization opportunities. When you select a data vendor, audit the tools the willing data integration providers use to deliver their assistance. Do they use a completely proprietary system based on an unknown file format unsupported by other platforms?
Finally, you must check all the data import, export, and bulk transfer options in vendors’ documentation. After you check a data firm’s current client base, track its online ratings and scan for red flags indicating potential vendor lock-ins.
5| Data-Related Ethical and Legal Liabilities
Confidentiality of investor communication and stakeholders’ privacy rights are two components of legal risk exposure due to enterprise data integration. Additionally, brands must interpret industry guidelines and regional directives for regulatory disclosures.
They must comply with laws concerning personally identifiable information (PII) about employees and customers. Otherwise, they will attract policymakers’ ire, and customers will lose faith in brands that do not comply with the laws of their countries.
Insights:
Consulting experts recommend collaborating with regional legal teams and global governance compliance specialists. After all, mitigating legal risks can help increase business resilience.
Improved compliance ratings have also benefited several brands wanting to be attractive to impact investors. Meanwhile, customers demanding ethical data operations at business establishments love supporting brands with an exceptional governance culture.
Conclusion
Most brands need specialists' help to develop consolidated data views during reporting because they have flawed data integration strategies. So, they require trustworthy insights from reputed consulting experts with a proven track record of overcoming challenges in data integration. The selected data partners must excel at ETL implementation, governance compliance, and data quality management (DQM).
The corporate world champions data-centric business development. Understandably, the need for scalable data integration reflects the increased stakeholder awareness regarding the importance of connecting disparate data sources. With transparent, fast, and accurate data, organizations will enhance their competitive edge amid this intense digital transformation race.
3 notes
·
View notes
Text
Omegle has been shut down.
Posting here for posterity. Retrieved directly from omegle.com on Nov 8 2023
“Of all tyrannies, a tyranny sincerely exercised for the good of its victims may be the most oppressive. It would be better to live under robber barons than under omnipotent moral busybodies. The robber baron's cruelty may sometimes sleep, his cupidity may at some point be satiated; but those who torment us for our own good will torment us without end for they do so with the approval of their own conscience.” — C.S. Lewis
“In the beginning the Universe was created. This has made a lot of people very angry and been widely regarded as a bad move.” — Douglas Adams
Dear strangers,
From the moment I discovered the Internet at a young age, it has been a magical place to me. Growing up in a small town, relatively isolated from the larger world, it was a revelation how much more there was to discover – how many interesting people and ideas the world had to offer.
As a young teenager, I couldn’t just waltz onto a college campus and tell a student: “Let’s debate moral philosophy!” I couldn’t walk up to a professor and say: “Tell me something interesting about microeconomics!” But online, I was able to meet those people, and have those conversations. I was also an avid Wikipedia editor; I contributed to open source software projects; and I often helped answer computer programming questions posed by people many years older than me.
In short, the Internet opened the door to a much larger, more diverse, and more vibrant world than I would have otherwise been able to experience; and enabled me to be an active participant in, and contributor to, that world. All of this helped me to learn, and to grow into a more well-rounded person.
Moreover, as a survivor of childhood rape, I was acutely aware that any time I interacted with someone in the physical world, I was risking my physical body. The Internet gave me a refuge from that fear. I was under no illusion that only good people used the Internet; but I knew that, if I said “no” to someone online, they couldn’t physically reach through the screen and hold a weapon to my head, or worse. I saw the miles of copper wires and fiber-optic cables between me and other people as a kind of shield – one that empowered me to be less isolated than my trauma and fear would have otherwise allowed.
I launched Omegle when I was 18 years old, and still living with my parents. It was meant to build on the things I loved about the Internet, while introducing a form of social spontaneity that I felt didn’t exist elsewhere. If the Internet is a manifestation of the “global village”, Omegle was meant to be a way of strolling down a street in that village, striking up conversations with the people you ran into along the way.
The premise was rather straightforward: when you used Omegle, it would randomly place you in a chat with someone else. These chats could be as long or as short as you chose. If you didn’t want to talk to a particular person, for whatever reason, you could simply end the chat and – if desired – move onto another chat with someone else. It was the idea of “meeting new people” distilled down to almost its platonic ideal.
Building on what I saw as the intrinsic safety benefits of the Internet, users were anonymous to each other by default. This made chats more self-contained, and made it less likely that a malicious person would be able to track someone else down off-site after their chat ended.
I didn’t really know what to expect when I launched Omegle. Would anyone even care about some Web site that an 18 year old kid made in his bedroom in his parents’ house in Vermont, with no marketing budget? But it became popular almost instantly after launch, and grew organically from there, reaching millions of daily users. I believe this had something to do with meeting new people being a basic human need, and with Omegle being among the best ways to fulfill that need. As the saying goes: “If you build a better mousetrap, the world will beat a path to your door.”
Over the years, people have used Omegle to explore foreign cultures; to get advice about their lives from impartial third parties; and to help alleviate feelings of loneliness and isolation. I’ve even heard stories of soulmates meeting on Omegle, and getting married. Those are only some of the highlights.
Unfortunately, there are also lowlights. Virtually every tool can be used for good or for evil, and that is especially true of communication tools, due to their innate flexibility. The telephone can be used to wish your grandmother “happy birthday”, but it can also be used to call in a bomb threat. There can be no honest accounting of Omegle without acknowledging that some people misused it, including to commit unspeakably heinous crimes.
I believe in a responsibility to be a “good Samaritan”, and to implement reasonable measures to fight crime and other misuse. That is exactly what Omegle did. In addition to the basic safety feature of anonymity, there was a great deal of moderation behind the scenes, including state-of-the-art AI operating in concert with a wonderful team of human moderators. Omegle punched above its weight in content moderation, and I’m proud of what we accomplished.
Omegle’s moderation even had a positive impact beyond the site. Omegle worked with law enforcement agencies, and the National Center for Missing and Exploited Children, to help put evildoers in prison where they belong. There are “people” rotting behind bars right now thanks in part to evidence that Omegle proactively collected against them, and tipped the authorities off to.
All that said, the fight against crime isn’t one that can ever truly be won. It’s a never-ending battle that must be fought and re-fought every day; and even if you do the very best job it is possible for you to do, you may make a sizable dent, but you won’t “win” in any absolute sense of that word. That’s heartbreaking, but it’s also a basic lesson of criminology, and one that I think the vast majority of people understand on some level. Even superheroes, the fictional characters that our culture imbues with special powers as a form of wish fulfillment in the fight against crime, don’t succeed at eliminating crime altogether.
In recent years, it seems like the whole world has become more ornery. Maybe that has something to do with the pandemic, or with political disagreements. Whatever the reason, people have become faster to attack, and slower to recognize each other’s shared humanity. One aspect of this has been a constant barrage of attacks on communication services, Omegle included, based on the behavior of a malicious subset of users.
To an extent, it is reasonable to question the policies and practices of any place where crime has occurred. I have always welcomed constructive feedback; and indeed, Omegle implemented a number of improvements based on such feedback over the years. However, the recent attacks have felt anything but constructive. The only way to please these people is to stop offering the service. Sometimes they say so, explicitly and avowedly; other times, it can be inferred from their act of setting standards that are not humanly achievable. Either way, the net result is the same.
Omegle is the direct target of these attacks, but their ultimate victim is you: all of you out there who have used, or would have used, Omegle to improve your lives, and the lives of others. When they say Omegle shouldn’t exist, they are really saying that you shouldn’t be allowed to use it; that you shouldn’t be allowed to meet random new people online. That idea is anathema to the ideals I cherish – specifically, to the bedrock principle of a free society that, when restrictions are imposed to prevent crime, the burden of those restrictions must not be targeted at innocent victims or potential victims of crime.
Consider the idea that society ought to force women to dress modestly in order to prevent rape. One counter-argument is that rapists don’t really target women based on their clothing; but a more powerful counter-argument is that, irrespective of what rapists do, women’s rights should remain intact. If society robs women of their rights to bodily autonomy and self-expression based on the actions of rapists – even if it does so with the best intentions in the world – then society is practically doing the work of rapists for them.
Fear can be a valuable tool, guiding us away from danger. However, fear can also be a mental cage that keeps us from all of the things that make life worth living. Individuals and families must be allowed to strike the right balance for themselves, based on their own unique circumstances and needs. A world of mandatory fear is a world ruled by fear – a dark place indeed.
I’ve done my best to weather the attacks, with the interests of Omegle’s users – and the broader principle – in mind. If something as simple as meeting random new people is forbidden, what’s next? That is far and away removed from anything that could be considered a reasonable compromise of the principle I outlined. Analogies are a limited tool, but a physical-world analogy might be shutting down Central Park because crime occurs there – or perhaps more provocatively, destroying the universe because it contains evil. A healthy, free society cannot endure when we are collectively afraid of each other to this extent.
Unfortunately, what is right doesn’t always prevail. As much as I wish circumstances were different, the stress and expense of this fight – coupled with the existing stress and expense of operating Omegle, and fighting its misuse – are simply too much. Operating Omegle is no longer sustainable, financially nor psychologically. Frankly, I don’t want to have a heart attack in my 30s.
The battle for Omegle has been lost, but the war against the Internet rages on. Virtually every online communication service has been subject to the same kinds of attack as Omegle; and while some of them are much larger companies with much greater resources, they all have their breaking point somewhere. I worry that, unless the tide turns soon, the Internet I fell in love with may cease to exist, and in its place, we will have something closer to a souped-up version of TV – focused largely on passive consumption, with much less opportunity for active participation and genuine human connection. If that sounds like a bad idea to you, please consider donating to the Electronic Frontier Foundation, an organization that fights for your rights online.
From the bottom of my heart, thank you to everyone who used Omegle for positive purposes, and to everyone who contributed to the site’s success in any way. I’m so sorry I couldn’t keep fighting for you.
Sincerely, Leif K-Brooks Founder, Omegle.com LLC
4 notes
·
View notes
Text
Looking Forward (and Back)
I'm feeling a little better mentally about the whole project; I've cleared up my bibliography and also altered my project proposal a little. This time I did attempt to make it more open-ended, and that's because I've thought about some potential renovations to the idea.
A lot of this has been inspired by Doom - the originals, not the remakes. They're really good games, and the art and level design are very intriguing. I watched a very interesting video by GermanPeter about what the levels could be as real-life places, and it made me think about the abstract, surreal nature of the visuals. It's something that could be quite interesting to replicate. For example, in the video, Peter suggests that MAP02, The Underhalls, is not a sewer system as it first appears, but actually a network of flooded subway tunnels, with various stops where you can scavenge for loot and fight demons.
I've also gotten quite hung up on the Sinister Workshop vs Dark Tomb debacle, and I think the best way to get around this is to combine the ideas into one cohesion, called "Sinister". It'll be chunky, mechanical and industrial, while also appearing fantastical and almost Gothic. This style has been proven to work - once again, look at Doom.
Some of the Doom maps do still carry a sense of dread and unease, as you creep through darkened corridors, expecting an ambush at any moment. But they also have the more adrenaline-fuelled segments you'd expect from a shooter, running circles around a hungry horde and blasting them into mincemeat. Doom does attempt full-on horror in some segments, too. There's a map in the cartoonishly malicious Plutonia Experiment called Hunted, where you're trapped in a maze filled with Archviles (particularly resilient demons who can revive the dead for extra fun), not enough ammo to kill them all, and all the while, as if to mock you, it plays the bunny song from the end of Doom 2.
A lot of Doom 1 maps had this more horror focus, actually. Obviously nowadays, it's not scary, but back then, when you were confined to keyboard controls, a crap resolution, and the old-school software renderer that made dark areas DARK, it was probably pretty spooky. With this ethos, I can have my cake and eat it - I can keep making the slower horror-atmosphere game, and also make it more active.
This is what I want to do. This is the vibe I want to replicate. Here's my idea for more fleshing-out. Essentially, you're in the afterlife - the god of death has entered a deep sleep, and the world is being subverted by his altered consciousness. Since nobody can properly die anymore, only existing as malformed ghosts in the warped remnants of the afterlife, you've been sent to wake the god up from his slumber and banish these spirits back to the ethereal realm. The surrealism still works here - it's all in a dream-like world, but it's also the afterlife. Think of some of the music videos for TOOL songs, where strange visuals are used to signify the dying process, or passing in and out of consciousness. This helps to explain the inevitable weirdness of the environment, and also relates to many of the interesting themes that people have extrapolated from the original Midas myth: dreams, surrealism, illusion, conspiracy, myth.
And, a final note, enemies. Also inspired by Doom (what can I say, I love boomer shooters) I think I'll have enemies that are 2D sprites. They'll be fun to draw, easier to animate, and help to make the world seem off. If the world is 3D and they're not, it'll give everything an optical illusion vibe, which is what I want.
A final final note: I think I might call it Sinister Afterlife. But it's just Sinister for now.
#devlog#gamedev#indiedev#indiegamedev#indie game dev#indie games#indie game#nitrosodium#indie dev#boomer shooter
2 notes
·
View notes
Note
Before I say my question, just want to say I was going to put off continuing the it lives series for a week or two after I finished ILITW, but as soon as I saw this project, i binged the entire second book in a day and it was totally worth it for ILW. So, back to my question. During chapter 3, my game suddenly closed bc my antivirus software on my laptop said it was up to “malicious activity” (prob richard just trying to mess w/ me still🙄). I know that isn’t the case but would you happen to know why it might’ve mistaken the application as such? Just so I can prevent it from randomly crashing again.
my thought would just be that because you downloaded it from an online page and that marked it as 'suspicious.' I'd see if you could find a way to tell you computer in unequivocal terms that this is a safe app and to not try to close it for suspicious activity 🥰 maybe open as admin or find a way to force it to ask you if it's safe or something 🤔
16 notes
·
View notes
Text
Inform Basics (#17: your project)
I've said it before: we've covered enough material for you to start your own Inform 7 project, even if you are a beginner like me. Let's take a break from coding to talk a bit about development environments.
Have you downloaded an Inform 7 Integrated Developemnt Environment (IDE for short) yet? If you've been clicking on my code snippets, you've already encountered Borogove, an online IDE for not only Inform 7 but several other IF development platforms. Its ability to share live snippets of code that are fully functional in many forum softwares is rather amazing and makes it easer to assist other developers in need.
Nevertheless, I don't recommend it for creating a full-fledged game. Why is that?
No external file support for features like images, sound, and other shared documents.
The Index is not fully functional, as it does not contain links to either default or custom actions.
Borogove does not support Inform 7's table of contents feature (more on this in a minute).
My understanding is that it does support external files for Inkle and others, but not Inform 7. While I encourage using the snippets as a great way to share and demonstrate code, Borogove falls short of the standard Inform 7 IDEs. Windows, MacOS, and Linux are supported. You can find and download the latest versions here:
Note that Windows Defender and other antivirus softwares tend to mistakenly flag the interpreter executables--git, frotz, and glulxe--as malicious. This has been reported to Microsoft repeatedly, but the files have yet to be whitelisted. If you get an error about these files, you can consider it a false positive.
After installing the IDE, you'll find a two-panel layout. By default, the left pane is for entering and reading source code, while the right pane contains a playable instance of your compiled code. You can compile and recompile by clicking "go" at the top-left of the application window.
My practice is to create a backup of a project every couple of days, while compiling frequently as I work. In informal polling, Inform 7 authors of varying levels of skill tend to do the same.
On to the main purpose of this post: using Inform 7's built-in features to organize your program. Let's look at an automatically generated table of contents for Repeat the Ending, which is among the larger (code-wise) Inform 7 games. The left-hand pane of the IDE shows tabs at the right and top edges. The top tabs are "source" and "contents." This is a screenshot of the contents tab.
See the slider at the bottom? Inform 7's automatically generated TOC features five tiers by default, and the slider can be used to dictate the level of detail displayed. Those tiers are as follows:
Volume (top level)
Book
Part
Chapter
Section (bottom level)
We can use these tiers in our code, and the IDE will detect them automatically. The practice looks like this:
Volume 1 - Global
It's as simple as that. We have a lot of freedom in what we say there. That isn't to say there aren't restrictions:
The heading must have a blank line above and below it.
The heading cannot contain characters that have specific functions in Inform 7 code. No periods, colons, semicolons, and the like.
The heading must begin with one of the five designations (volume, book, part, chapter, and section)
You have a lot of freedom in terms of how to order your code. I've gotten the impression that I do things differently, but I like the way my approach works.
For top-level headings, I used the following:
global: used to define verbs, data, kinds, variables, the player characters, and so forth. All things that apply to the game and its world generally.
the game: the actual geography, things, and specific action responses.
the companion text: the entirety of the Reader's Guide to Repeat the Ending.
the artwork: I chose to maintain the rules governing the display of artwork and alt descriptions separately.
mix and match: a true mixture of various late stage requirements.
Regarding mix and match: some rules in Inform 7 must follow related rules. For instance, a region (a group of individual rooms that can be dealt with as a collective) must follow the room definitions. For this reason I decided to define certain rules related to regions at the end, even if they seem to be global rules. This is the way that those late definitions were used:
The game world is a region. The eighties and the 90s are in the game world. Energy is a backdrop. Energy is in the game world. Instead of doing anything to the energy: say "It doesn't work that way. Entropic magic requires specificity.".
Sometimes, things just make sense at the end. I also kept all of my test scripts there.
How should you build your TOC? While you can see my example above, give equal or greater consideration to what will be easiest for you to read and update. The TOC is a tool to for you to manage your project. If it doesn't make intuitive sense to you, it's worthless. Think about the way you process information and build from there.
I hope this is helpful! Consider maintaining a test/scratch project where you can keep copies of useful code and test the cases we discuss here. Feel free to AMA!
Next: scenery and backdrops.
5 notes
·
View notes
Text
Are you facing security challenges in Online Survey?
Online surveys can face several security challenges, including:
Data Privacy: Ensuring the confidentiality of respondents' data is crucial. Unauthorized access to personal information collected in surveys can lead to privacy breaches.
Data Integrity: Maintaining the accuracy and consistency of survey data is essential. Malicious actors might attempt to manipulate or corrupt data, impacting the reliability of survey results.
Survey Fraud: Individuals may attempt to manipulate survey results by providing false information or submitting multiple responses (known as ballot stuffing), compromising the survey's integrity.
Phishing Attacks: Fraudulent emails or survey links may be used to trick respondents into providing sensitive information or downloading malware.
DDoS Attacks: Distributed Denial-of-Service attacks can disrupt survey platforms by overwhelming servers with excessive traffic, causing downtime and hindering survey completion.
To address these challenges, survey administrators often implement various security measures:
Encryption: Utilizing encryption techniques to protect data transmission and storage.
Authentication: Requiring user authentication to prevent unauthorized access to surveys and data.
Firewalls and Anti-Malware: Employing security software and firewalls to mitigate the risk of cyber threats.
Captchas and IP Blocking: Implementing measures to prevent automated responses and restrict multiple submissions from the same IP address.
Anonymity and Confidentiality: Ensuring respondents' anonymity and safeguarding their sensitive information.
Regular Security Audits: Conducting periodic security audits to identify vulnerabilities and enhance overall security.
While these measures can mitigate risks, no system is entirely immune to security threats. Survey administrators must stay vigilant, update security protocols regularly, and adhere to best practices to protect the integrity and privacy of survey data.
To know more:
online market research platform
fraud prevention solution
fraud detection and reporting tool
Online Project Management Platform
#market research#onlineresearch#samplemanagement#panelmanagement#datacollection#fraud detection#datainsights
2 notes
·
View notes