
JP
2.5K posts

고정된 트윗

HOW TO PICK THE RIGHT NICHE
The Perfect Niche Has ALL 5 of These(SaaS):
1. MONEY - They have budget to pay you
2. PAIN - They have a painful, repetitive problem
3. VOLUME - There are 10000+ businesses in this niche
4. REACHABLE - You can find and contact them easily
5. AI-READY - Their problem can actually be solved with AI/automation
English


@buildswithjp Depends how many chrome tabs you pretend you’ll come back to
English

🚨 A hacker (or small group) operating under the alias FlamingChina claims to have pulled off one of the biggest data breaches in Chinese history.
They say they exfiltrated over 10 petabytes (10,000+ terabytes – roughly 1,000x the entire printed U.S. Library of Congress) from China’s National Supercomputing Center (NSCC) in Tianjin.
This isn’t just any server farm – it’s a state-run supercomputing hub that supports 6,000+ clients, including top defense contractors, aerospace giants (AVIC, COMAC), and military research institutes.
WHAT WAS STOLEN?
According to samples posted on their Telegram channel (active since early Feb 2026) and dark-web listings:
•Missile & bomb designs + explosion simulation animations
•Structural strength tests for aircraft/missiles
•J-20 stealth fighter renderings & 6th-gen fighter concepts
•Nuclear submarine schematics
•Hypersonic weapons systems data
•Target/strike simulations against U.S. assets (HIMARS rocket systems, carrier strike groups)
•Classified (“secret”) defense documents
•Aerospace engineering, bioinformatics, fusion reactor simulations, and more (data timestamps 2021–2025)0
Cyber experts who reviewed the previews told outlets like CNN the files appear genuine and match exactly what the Tianjin NSCC would produce.
HOW THEY (ALLEGEDLY) DID IT
FlamingChina told investigators:
•Initial access via a compromised VPN domain controller (surprisingly easy entry point).
•Then they quietly siphoned the data over ~6 months using a massive botnet for distributed exfiltration and storage.
•The botnet helped them stay under the radar – no single massive download spike to trigger alarms.
They’ve even shared screenshots of the botnet setup that match the claimed volume.
WHERE IS THE DATA NOW?
•First surfaced on dark-web forums via user “airborneshark1” offering previews for ~$3,000.
•FlamingChina took over promotion on their anonymous Telegram and Breach Forums.
•Full dataset is being auctioned to the highest bidder in Monero (XMR) crypto.
Samples have been circulating since early February 2026. No full public dump yet – it’s for sale.
REACTION SO FAR
•China has not officially confirmed the breach.
•Reports note that shortly afterward, the Chinese Academy of Sciences removed several senior military-tech officials (including the chief designer of the J-20 fighter).
•Independent verification is impossible right now, but multiple cybersecurity researchers who examined samples call the data credible and consistent with NSCC workloads.
This would be a catastrophic intelligence failure for Beijing. The NSCC Tianjin is central to China’s advanced weapons R&D – hypersonics, stealth, nuclear subs, fusion, you name it. If real, adversaries (or anyone with crypto) now have the blueprints.
The irony? China has poured billions into cyber defenses and “great firewall” tech… yet a VPN compromise + botnet allegedly walked out with the crown jewels undetected for half a year.
Stay tuned – this story is developing fast. If the full 10PB drops or sells, it could reshape military intelligence for years.
Sources: CNN, NetAskari, Vision Times, expert analyses of samples. All claims are from FlamingChina’s statements and third-party reviews (no official Chinese confirmation yet).
What do you think – biggest cyber heist of 2026 or elaborate hoax?
Drop thoughts below. 🔥🇨🇳
English

My M1 Pro MacBook just got bricked during the macOS 26.4 update 😞
Screen went completely black during install, and now it won’t boot or even enter Recovery Mode. Looks like the firmware/update process got stuck.
Trying a DFU revive from another Mac now and hoping it restores without wiping data.
Anyone else facing this issue after updating to macOS 26.4?
English
JP 리트윗함

🚨🇮🇷 IRGC Navy: “The Strait of Hormuz will never return to its former state, especially for the US and Israel.”
They’re in final stages of operational prep for a “new order” in the Gulf.
Iran’s parliament advancing draft law: transit fees in rial, ban on US/Israeli ships, restrictions on sanctioning nations.
Source: Al Jazeera

Mario Nawfal@MarioNawfal
🚨🇮🇷 Iran threatened to shut down the Bab al-Mandab Strait. A top advisor to new Supreme Leader Mojtaba warned: “The flow of global energy and trade can be disrupted with a single signal.” That’s another ~7 million barrels of oil per day, plus 22% of world container trade, at risk. Combined with Hormuz? Up to 25 million bpd offline. Iran already rejected a U.S. ceasefire deal to reopen Hormuz. Oil prices are screaming toward $120+. It's time to teach your car to eat insects. Source: @KobeissiLetter, TBS
English

Someone scared of getting sued converted the leaked TypeScript code into Python using Codex overnight.

Chaofan Shou@Fried_rice
Claude code source code has been leaked via a map file in their npm registry! Code: …a8527898604c1bbb12468b1581d95e.r2.dev/src.zip
English

Hey @X 👋
I'm looking to #connect with folks interested in:
🎨 Frontend
⚙️ Backend
🧑💻 Full Stack
🤖 AI / ML
📱 App Dev
☁️ DevOps / Cloud
🧩 Software Engineering
☕ SaaS
💼 Freelancing
🌐 Open Source
Let's grow, and build together
#letsconnect
English

Hey @X 👋
Looking to connect with people working or learning in:
• App Development
• AI / ML
• DSA
• Full Stack Development
• Frontend / Backend
• Node.js / APIs
• Software Development
• Java
• LeetCode & problem solving
I’m currently focused on improving my skills and building consistently.
If you’re on a similar journey, let’s connect 🤝
#BuildInPublic #LearnInPublic #DevCommunity
English












