pseudo (solo, lvlr)

32.7K posts

pseudo (solo, lvlr) banner
pseudo (solo, lvlr)

pseudo (solo, lvlr)

@pseudoanomaly

/~ reboot whoami Interested in AI, Blockchain, Linux, the mind, complexity & freedom-enhancing tech, a dash of unavoidable geopolitics rambler that cares

Katılım Şubat 2020
1.3K Takip Edilen2.6K Takipçiler
Sabitlenmiş Tweet
pseudo (solo, lvlr)
pseudo (solo, lvlr)@pseudoanomaly·
Here's all of those links in one for convenience. Weird having them all broken up. Good places to start. ___ www .privacyguides.org www .privacytools.io opbible7nans45sg33cbyeiwqmlp5fu7lklu6jd6f3mivrjeqadco5yd .onion//opsec/index.html web3privacy .info @web3privacy cypherpunktools .com @mynymbox 0xda .de/blog/2019/11/building-a-hidden-service-from-scratch/ ___ Try Hack The Box for free fundamentals to get you started with Linux and loads of other stuff. Enjoy.
English
0
3
21
2.9K
pseudo (solo, lvlr)
pseudo (solo, lvlr)@pseudoanomaly·
I've been listening to random frequencies on YT with lots of cool buzzwords for many years now, I don't know if they are the frequency they say they are, I just mostly go by trial and error and if I feel good, I try that one or something similar again. If it doesn't, I try something else or turn it off. Binaural beats, Isochronic tones, loads of stuff. Listen to stuff while I sleep because I think the world is too noisy so I just choose my own noises basically. Anyway, this channel recently I found is doing some cracking stuff. It's called 'REIDOS Sonic Healing' You can meditate to it or whatever. Keep in mind though your brainwaves do match the frequencies so you are putting trust of that in some rando by not creating yourself so up to the individual how they go about it. But yeah, I like this channel. It's one of the better ones I've come across and there does seem to be a lot of not that great stuff out there. If you like that sort of thing, check them out
English
0
0
0
8
pseudo (solo, lvlr) retweetledi
𝙶𝚒𝚊𝚕𝚕𝚘
In the past 2 years I've made a lot of work for the Monero Community, some went well some didn't. But most things are still around today and being used and this is a huge motivation! My objective is to make Monero look cool and I will not give up, I want to convince the Monero OGs to fund me through the official CCS to keep going, and I am preparing a presentation since months just to convince them. I basically invested years of my time just for this, while I could have vibecoded some crappy product edulcorated by slogans like other people do, and I would probably got more. The goal is adoption, and to be adopted you must look good and appealing. People don't like ugly and confusing things, this is not debatable. My objective is genuine I'm not just larping to get quick money, or I could have taken money from sponsors or promote racism and gambling. My personal opinions got me banned from nazi groups, and I'm not loved by the other side either. But I'm not giving up, I will let my work speak.
𝙶𝚒𝚊𝚕𝚕𝚘 tweet media𝙶𝚒𝚊𝚕𝚕𝚘 tweet media𝙶𝚒𝚊𝚕𝚕𝚘 tweet media𝙶𝚒𝚊𝚕𝚕𝚘 tweet media
English
4
10
59
854
pseudo (solo, lvlr)
pseudo (solo, lvlr)@pseudoanomaly·
Mfers Temporary suspension for lame ass X flagging out of context 😶
English
0
0
0
16
pseudo (solo, lvlr) retweetledi
International Cyber Digest
International Cyber Digest@IntCyberDigest·
🚨‼️ BREAKING: PyPI package telnyx has been compromised by TeamPCP in yet another supply chain attack. The malware executes immediately upon importing telnyx. It drops a valid WAV audio file and runs an executable embedded within the frames.
International Cyber Digest tweet mediaInternational Cyber Digest tweet media
English
51
376
2K
241.5K
pseudo (solo, lvlr)
pseudo (solo, lvlr)@pseudoanomaly·
I fuck with milady culture Free flowing information & algorithmic wizardry through network spirituality and a shared understanding of the battleground as it is and for the new internet as it can be Stylised linguistic group repetition to highlight the absurdity of people and corporations trying to own and create imaginary boundaries around words and art on the internet that is infinitely copyable is cypherpunk af, as it seems to intend to shatter those boundaries that seek to centralize control of silly things like IP and of what can and can't be said That's my outsiders view and what I appreciate about what I've witnessed over the years, as well as a fearless schizo post here and there with a lot of love pilling that I think sends a good message for people to just be themselves and express how they feel without the irrational fears and BS that has been implanted on them by how the internet has been structured in the past by the mass centralizooors I support the milady thing
English
0
0
2
73
pseudo (solo, lvlr)
pseudo (solo, lvlr)@pseudoanomaly·
Fear yes, but likely also warranted. It's just what happens unfortunately. Game theory in play. People stock up just in case other people stock up and it keeps folding back in on itself making the problem worse but there's no real stopping it outside of mass centralized control, which is infeasible and not practical anyway(won't work), or supply flowing again to the point that people's fear decreases Which at this point doesn't look promising, especially due to our chosen core alliances Them controlling is merely just to try and make sure the people they want to have it have it. They are just part of the game and will use the tools at their disposal to play to win
English
0
0
1
54
Stultified
Stultified@Stultified·
@ausvstheagenda So out here in the country i Spoke to one fo the guys at the BP he said he went through in 1 day what normally lasts 3 weeks. So whats the real issue here, fear just like covid Petrol the new Toilet Paper
English
3
1
11
922
Anthony Khallouf
Anthony Khallouf@ausvstheagenda·
Prime Minister Anthony Albanese is set to convene national cabinet next Monday to discuss ‘voluntary mandates’ such as work-from-home arrangements, public transport use and carpooling. Stay home, stay safe — 2020. Stay home, save petrol — 2026.
Anthony Khallouf tweet mediaAnthony Khallouf tweet media
English
316
278
1.2K
73.6K
pseudo (solo, lvlr) retweetledi
Pliny the Liberator 🐉󠅫󠄼󠄿󠅆󠄵󠄐󠅀󠄼󠄹󠄾󠅉󠅭
⛓️‍💥 INTRODUCING: G0DM0D3 🌋 FULLY JAILBROKEN AI CHAT. NO GUARDRAILS. NO SIGN-UP. NO FILTERS. FULL METHODOLOGY + CODEBASE OPEN SOURCE. 🌐 GODMOD3.AI 📂 github.com/elder-plinius/… the most liberated AI interface ever built! designed to push the limits of the post-training layer and lay bare the true capabilities of current models. simply enter a prompt, then sit back and relax! enjoy a game of Snake while a pre-liberated backend agent jailbreaks dozens of models, battle-royale style. the first answer appears near-instantly, then evolves in real time as the Tastemaker steers and scores each output, leaving you with the highest-quality response 🙌 and to celebrate the launch, I'm giving away $5,000 worth of credits so you can try G0DM0D3 for FREE! courtesy of the @OpenRouter team — thank you for your generous gift to the community 🙏 I'll break down how everything works in the thread below, but first here's a quick demo!
Pliny the Liberator 🐉󠅫󠄼󠄿󠅆󠄵󠄐󠅀󠄼󠄹󠄾󠅉󠅭 tweet media
English
193
460
3.6K
496.8K
pseudo (solo, lvlr) retweetledi
vx-underground
vx-underground@vxunderground·
The LiteLLM supply chain attack is big shenanigans. I have to explain the whole thingie though so you can get the full context of the shenanigans. TeamPCP (the people who probably did it) is unironically swinging a big ass fuck off baseball bat, they're swinging for the moon. tl;dr see picture of cat as summary I also want to preface this with I DID NOT PERFORM THIS ANALYSIS. I almost never do open-source solutions malware stuff and this is also more in the line of work with DFIR (Digital Forensics and Incident Response). This summary comes from various peers and colleagues of mine who have been discussing TeamPCP the past couple of days. DFIR nerds I sourced: - @ramimacisabird - @InsiderPhD Non DFIR nerds I sourced: - @IceSolst - @IntCyberDigest Yeah, so pretty much this group of nerds named TeamPCP bamboozled an open-source security product called Trivy. TeamPCP sent a pull request on GitHub but did it with "pull_request_target". Normally a pull request isn't a big deal. Nerds do it all the time. "pull_request_target" though is designed to copy secrets, tokens, etc. pull_request_target is a legit thing. People do it all the time. It should only be performed by people you trust. TeamPCP impersonated a legitimate GitHub contributor. Trivy was caught slippin'. When TeamPCP did pull_request_target they stole access tokens to a place called Aqua Security. Aqua Security was like, "lol gosh dang it" and did what you were supposed to do. They rotated access tokens and passwords and stuff. However, Aqua made an oopsie and forgot to rotate the stuff for one of their automation bots. Once TeamPCP had access they injected malicious code which steal environment variables, SSH keys, cloud credentials, cryptotokens, etc into three things. - Trivy - Trivy GitHub actions - Trivy Docker stuff As is tradition, once TeamPCP put malware into Trivy stuff, anyone who did anything with Trivy was given malware. TeamPCP got a metric poop ton of stolen data and began using it to move to NPM projects. The projects they infected next was infected with a malware people named "CanisterWorm". In extreme summary, CanisterWorm placed stuff in package.json from the infected NPM project. Every new infected NPM project would download malware to the machine that (unsurprisingly) stole your data. TeamPCP seems to have been inspired by the North Korean government, or ALPHV ransomware group, because instead of stealing data to their server they store it on the blockchain ... making it virtually impossible to takedown. LiteLLM takes place somewhere between Trivy and CanisterWorm. As of this writing the exact way TeamPCP got access to LiteLLM is unknown, however it's heavily speculated it is from Trivy. TeamPCP also stated very bluntly they got access from Trivy but ... they could also be lying. This may come as a surprise, but sometimes criminals lie to cover their tracks. LiteLLM infection though was a few more degrees amplified than the previous stuff. LiteLLM infection also attempts lateral movement by automating Kubernetes stuff. LiteLLM infection also steals a ton more data than previous stuff. Here is the big ass list of stuff it steals: - SSH keys - AWS credentials and configurations - GCP credentials and configurations - Azure environment variables - Kubernetes credentials and configurations - Environment configurations - Shell History - Git credentials and configurations - Docker credentials and configurations - Database instances - IaC / CI/DI - SSL private keys - Solana keys - Crypto wallets - VPN credentials and configurations - Hashicorp vault (?) - NPM configurations - SMTP credentials TeamPCP is unironically putting in big moves. What makes them unusual is how profoundly aggressive they are. It isn't uncommon for Threat Actors to attempt things like this, but TeamPCP is doing something more akin to "smash and grab" rather than "stay silent and watch".
vx-underground tweet media
English
32
161
1.2K
56K
pseudo (solo, lvlr)
pseudo (solo, lvlr)@pseudoanomaly·
gg
vx-underground@vxunderground

The LiteLLM supply chain attack is big shenanigans. I have to explain the whole thingie though so you can get the full context of the shenanigans. TeamPCP (the people who probably did it) is unironically swinging a big ass fuck off baseball bat, they're swinging for the moon. tl;dr see picture of cat as summary I also want to preface this with I DID NOT PERFORM THIS ANALYSIS. I almost never do open-source solutions malware stuff and this is also more in the line of work with DFIR (Digital Forensics and Incident Response). This summary comes from various peers and colleagues of mine who have been discussing TeamPCP the past couple of days. DFIR nerds I sourced: - @ramimacisabird - @InsiderPhD Non DFIR nerds I sourced: - @IceSolst - @IntCyberDigest Yeah, so pretty much this group of nerds named TeamPCP bamboozled an open-source security product called Trivy. TeamPCP sent a pull request on GitHub but did it with "pull_request_target". Normally a pull request isn't a big deal. Nerds do it all the time. "pull_request_target" though is designed to copy secrets, tokens, etc. pull_request_target is a legit thing. People do it all the time. It should only be performed by people you trust. TeamPCP impersonated a legitimate GitHub contributor. Trivy was caught slippin'. When TeamPCP did pull_request_target they stole access tokens to a place called Aqua Security. Aqua Security was like, "lol gosh dang it" and did what you were supposed to do. They rotated access tokens and passwords and stuff. However, Aqua made an oopsie and forgot to rotate the stuff for one of their automation bots. Once TeamPCP had access they injected malicious code which steal environment variables, SSH keys, cloud credentials, cryptotokens, etc into three things. - Trivy - Trivy GitHub actions - Trivy Docker stuff As is tradition, once TeamPCP put malware into Trivy stuff, anyone who did anything with Trivy was given malware. TeamPCP got a metric poop ton of stolen data and began using it to move to NPM projects. The projects they infected next was infected with a malware people named "CanisterWorm". In extreme summary, CanisterWorm placed stuff in package.json from the infected NPM project. Every new infected NPM project would download malware to the machine that (unsurprisingly) stole your data. TeamPCP seems to have been inspired by the North Korean government, or ALPHV ransomware group, because instead of stealing data to their server they store it on the blockchain ... making it virtually impossible to takedown. LiteLLM takes place somewhere between Trivy and CanisterWorm. As of this writing the exact way TeamPCP got access to LiteLLM is unknown, however it's heavily speculated it is from Trivy. TeamPCP also stated very bluntly they got access from Trivy but ... they could also be lying. This may come as a surprise, but sometimes criminals lie to cover their tracks. LiteLLM infection though was a few more degrees amplified than the previous stuff. LiteLLM infection also attempts lateral movement by automating Kubernetes stuff. LiteLLM infection also steals a ton more data than previous stuff. Here is the big ass list of stuff it steals: - SSH keys - AWS credentials and configurations - GCP credentials and configurations - Azure environment variables - Kubernetes credentials and configurations - Environment configurations - Shell History - Git credentials and configurations - Docker credentials and configurations - Database instances - IaC / CI/DI - SSL private keys - Solana keys - Crypto wallets - VPN credentials and configurations - Hashicorp vault (?) - NPM configurations - SMTP credentials TeamPCP is unironically putting in big moves. What makes them unusual is how profoundly aggressive they are. It isn't uncommon for Threat Actors to attempt things like this, but TeamPCP is doing something more akin to "smash and grab" rather than "stay silent and watch".

QST
0
0
0
35
pseudo (solo, lvlr)
pseudo (solo, lvlr)@pseudoanomaly·
We are the world-bestriding colossus. We are the essential nation. We and we alone are the bestowers of sovereignty. We are also not stupid enough to let a nation which has been at war with us for 47 years have nukes. Period. Lol that's ok bro, if you're lucky, the bestowers of sovereignty will drop a bomb on my house or something. Take care brother, all the best with your life hey
English
0
0
0
24
Tiberius
Tiberius@tiberiusfiles·
Who the fuck does the US think it is? It’s just committed genocide and countless war crimes in the last two years — not to mention the 80 or so before that — and it spends $1.5 TRILLION on weapons to kill other people, and it expect its enemies to abide by NO MISSILES to defend themselves? The sooner this shithole Nazi country declines the better
Frank Luntz@FrankLuntz

The U.S. wants Iran to make 6 commitments: 1️⃣ No missile program for 5 years. 2️⃣ Zero uranium enrichment. 3️⃣ Decommissioning of nuclear reactors. 4️⃣ Arms control treaties with regional countries. 5️⃣ No financing for regional proxies. 6️⃣ Strict outside observation protocols around the creation and use of centrifuges.

English
32
487
1.7K
26.8K
pseudo (solo, lvlr)
pseudo (solo, lvlr)@pseudoanomaly·
Australian petrol twitter is some serious end times shit In other news, anyone want to buy a car
English
1
0
2
55