Thank gawd for the blockchain!

5/10/23 Gummo #hacker #blackhat | Hacker since 1986.

Some random thoughts.
1. AI has been the latest buzzword recently as I wished to share some key points in what is coming, first increased sophistication where AI powered malware will utilize machine learning algorithms to adapt within it’s environment(s) allowing for greater damage and nearly instantaneous deployments.
2. Automating AI attack surfaces & channels that have the ability to autonomously launch campaigns without human intervention.
3. Social Engineering AI powered malware can analyze vast amounts of data to specifically identify marks either as hvt or state sponsored targets.
4. Lastly, we look at weaponizing AI to where malicious AI can ‘take over’ existing AI systems such as autonomous vehicles, industrial control systems, consumer applications all leading to catastrophic scenarios.
Q: Do you think personal AIs will become a thing, as far as protecting individuals from malicious AIs?
A: Yes, as common as antivirus is now.
Q: Do you see BTC to play role in the verification process what is real and what is not, after few years?
A: thank gawd for the blockchain!

ECP Nethappenings Newsletter Bank Runs, Bitcoin, Pregnancy, AI, Privacy, Railroads

BANK RUNS

IF
#Bitcoin is rat poison …

THEN

Banks are the rats!!!

BITCOIN released in 2009 BECAUSE of Bank Failures in 2008

@EdKrassen
In 2018 President Trump signed a bill that rolled back Dodd-Frank regulations on banks like Silicon Valley Bank. Prior to the bill, the threshold for which banks were required to submit resolution plans for their rapid and orderly resolution to the FDIC was set at $50 billion and higher. This was to ensure failure would not have serious adverse effects on financial stability in the US.

“You can leave your fate in the hands of people debating how to best screw you over. By making it unaffordable to buy things, or to make you lose your job? Or .. opt out, and start saving in #Bitcoin.”

Investors and depositors tried to pull $42 billion from Silicon Valley Bank on Thursday, per Bloomberg. SVB’s CFO, CEO, and CMO fortunately cashed out before the crash.

Silicon Valley Bank Fails After Run on Deposits
The Federal Deposit Insurance Corporation took control of the bank’s assets on Friday. The failure raised concerns that other banks could face problems, too.

FDIC Creates a Deposit Insurance National Bank of Santa Clara to Protect Insured Depositors of Silicon Valley Bank, Santa Clara, California

Wells Fargo says ‘technical issue’ causing customers to report missing deposits
The bank sought to reassure frustrated customers that their accounts remained secure and said it was working to resolve the issue.

Normally FDIC insurance stops this kind of run from happening.
Because everyone knows the federal government will cover their deposits, they aren’t worried about losing their money in a run, so they’re never in a rush to pull it out. And because they never rush to pull it out, runs can’t even get started. For a normal bank, about 50% of deposits are FDIC insured
But 93% of SVB’s deposits were not FDIC insured. So SVB was vulnerable to a classic, textbook bank run.

“Why this sudden meltdown in bank stocks?
A couple of interesting theories and charts are doing the rounds, so let’s have a look under the hood. A thread. 1/

‘Pathetic’: Feds Rule Candidate ‘Slush Funds’ Are Legal

BITCOIN released in 2009

BECAUSE of Bank Failures in 2008

Financial regulation to protect your money FROM a system designed to steal your money is an oxymoron.

2008: #Bitcoin is born amidst a financial crisis
2023: #Bitcoin will thrive amidst a financial crisis

#Bitcoin  is the safest money out there – Tim Draper, Billionaire Silicon Valley VC

THIS IS THE VALUE PROPOSITION THAT BITCOIN PROVIDES

Softwar: A Novel Theory on Power Projection and the National Strategic Significance of Bitcoin Paperback

AUDIO: My reading of “SoftWar: A Novel Theory on Power Projection and the National Strategic Significance of Bitcoin” by Major Jason Paul Lowery. This video uses the book in accordance with http://creativecommons.org/licenses/by/4.0 under which the book was published. Minimal commentary. Minimal video edits. Any commentary is my own opinion./Any deviation from the source material is an unintentional error.

Jason Lowery on Twitter:
“NOT BUYING #BITCOIN IS A US NATIONAL STRATEGIC SECURITY HAZARD.”

Fiat-pegged coins like Tether, USDC, and Dai, don’t deserve to be called “stable”-coins. Fiat currencies are not stable. Circle’s eight page single-spaced memo to congress included zero instances of the word “Bitcoin.” Play fiat games, win fiat prizes.

1st they ignore you
2nd they laugh at you
3rd they fight you <WE ARE HERE>
4th We Win!

The Silent March of Bitcoin Policies Across US States
Because it separates state from money, Bitcoin is inherently a political animal.
Bitcoiners may not want to interact with the state, but the state wants to contend with Bitcoin.

AI

People Used Facebook’s Leaked AI to Create a ‘Based’ Chatbot that Says the N-Word
After 4chan published LLaMa online, others have taken the language model and created a functioning chat bot in Discord, which claimed that the n-word can refer to people who don’t have good intentions.

After 4chan published Facebook’s LLaMa online, others have taken the language model and created a functioning chat bot in Discord, which claimed that the n-word can refer to people who don’t have good intentions.

Simple regurgitation of search engine results and mutations of artwork is not AI. ChatGPT cannot pass my test. It is not AI. It’s nowhere close. ChatGPT is a “Machine Learning” model (“ML”). It is not AI and you should stop calling it AI.

My proposed standard for determining legitimate creation of ‘Artificial Intelligence’:
“The Vickery AI Test”

PRIVACY

Mental health provider Cerebral alerts 3.1M people of data breach

@matthew_d_green
The EU’s “chat control” legislation is the most alarming proposal I’ve ever read. Taken in context, it is essentially a design for the most powerful text and image-based mass surveillance system the free world has ever seen.

Section 702 has become something Congress never authorized: a domestic spying tool. Congress should consider ending the program entirely, but shouldn’t reauthorize it without critical reforms, including true accountability and oversight.

PREGNANCY

“Michigan voters enshrined abortion rights in the state constitution during the midterms, a move that was intended to help block the ban from taking effect… ‘This is proof positive that elections matter.’”

Lauren Boebert will became a grandmother at 36 years old the same age her mother did, announcing her 17-year-old son got 15 year old little girl pregnant.

Maybe instead of teaching Kaydon how to hold a gun she should have taught him how to hold a condom.
Boebert was pregnant at 17 (2003) dropped out of high school (to support her family, i.e. self/baby). She didn’t marry her husband until 2007.
Boebert’s 17 year old son got a 15 year old pregnant. That’s Statutory Rape. Where’s the outrage.
Age of consent in Colorado is 17… Boebert’s son, Kaydon Boebert, raped a 15 year old and got her pregnant. Belongs in jail. She was not of age to consent.

When you get pregnant as a teenager and drop out of school like Lauren Boebert did, you are highly unlikely to return. Boebert didn’t.
It’s likely her son’s gf won’t either. This sets up a trajectory of poverty and illiteracy in most instances. It’s not to be celebrated.
Sarah Palin’s daughter was pregnant at 17, and now Lauren Boebert’s son
https://thehill.com/blogs/in-the-know/3894140-boebert-praises-high-rural-teen-birth-rates-while-announcing-first-grandchild/

West Virginia Child Marriage is just fine.
West Virginia Republicans Block Child Marriage Ban
According to Unchained At Last, 78 percent of marriages involving a minor are between an underage girl and an adult man.

Neo-Nazi Homeschoolers Could Be Paid $22,000 to Teach Their Kids About Hitler

NATIONALIZE THE RAILROADS

Medical guidance is thin in East Palestine. Scared and sick citizens are calling a health hotline operated not by the EPA, but CTEH, a consulting company regularly accused of downplaying health risks that Norfolk Southern hired to test if the air was safe.

FBI investigates data breach impacting U.S. House members and staff

Educational CyberplayGround: NetHappenings Politics, AI, FTX, Debt, Good News

#POLITICS

Why are there so many tech layoffs, and why should we be worried?
As layoffs in the tech sector mount, Stanford Graduate School of Business Professor Jeffrey Pfeffer is worried. Research – by him, and others – has shown that the stress layoffs create takes a devastating toll on behavioral and physical health and increases mortality and morbidity substantially. Layoffs literally kill people, he said.
Why are so many tech companies laying people off right now?
The tech industry layoffs are basically an instance of social contagion, in which companies imitate what others are doing. If you look for reasons for why companies do layoffs, the reason is that everybody else is doing it. Layoffs are the result of imitative behavior and are not particularly evidence-based.

Texas Paul Schroder @Paultx890
FYI, cutting funding to cripple the IRS by Republicans has to pass through not just the House but also the Senate. It must also survive a Presidential veto. It’s dead before it finished leaving the vocal cords of those traitor bastards.

Senator Amanda Cappelletti @SenCappelletti
I was just called “out of order” in committee for calling January 6, 2021 exactly what it was: an insurrection.

WOW: After Dr Dre got her locked out of her Twitter account for stealing his music, Marjorie Taylor Greene just ATTACKED his “thug” lyrics.
Is there anything more Republican than appropriating a Black man’s music AND attacking it with racist dog whistles at the same time?

Kevin McCarthy agreed to cut aid for Ukraine 🇺🇦 to secure enough votes to become Speaker of the US 🇺🇸 House of Representatives, reported The Telegraph

@emptywheel
The people pretending there are hairs to split between the Biden and Trump docs story are missing one of the funniest differences.
At the time–continually since 2008–Biden had clearance.
Trump did not.
Anyway the crime in question–18 USC 793e–is refusing to give [classified] docs back.
Biden gave them back.
Trump still hasn’t.

The moment they were discovered they were all returned – they were not hidden or moved to another hiding place.
No search warrant was needed.
No affidavit falsely asserting all were returned was made.
No special master from a special’ judge was ordered.
Traditionally, former Presidents continue to receive classified intelligence briefings Biden did not extend this courtesy to Trump because of the security risk he presented *before* classified documents were found at MAL.

#AI

Cybercriminals Starting to Use ChatGPT – Check Point Research
hatGPT has also added some spice to the modern cyber threat landscape as it quickly became apparent that code generation can help less-skilled threat actors effortlessly launch cyberattacks.

Researcher Deepfakes His Voice, Uses AI to Demand Refund From Wells Fargo

“Kids are using AI to write essays and get straight A/s”
Will AI Art Help or Hurt Artists?
Imagine creating an entire painting by typing a few sentences. AI tools like Stable Diffusion will forever change how people create art. But will AI help or hurt artists? And what lessons can we learn from history on how this will play out? The AI model trains using images from other artists without their permission. As you can imagine, this has ethical implications.

#FTX

Sullivan & Cromwell, FTX Lead Counsel in Bankruptcy, Says It Has No Adverse Relationships, Despite Representing Four of FTX’s Crypto Exchange Competitors Andrew (Andy) Dietderich, Law Partner at Sullivan & Cromwell Sullivan & Cromwell ranks among the oldest law firms in America. It was founded 144 years ago by Algernon Sydney Sullivan and William Nelson Cromwell in Manhattan’s financial district. During the financial bust in the 1930s, Sullivan & Cromwell […]

JPMorgan Chase Hit with Lawsuit for Facilitating Jeffrey Epstein’s Crime Network; Similar Charges Were Brought Against It for Facilitating Madoff’s Ponzi Scheme

#DEBT

2022 Visualizing $65 Trillion in Hidden Dollar Debt
FX swap debt a $80 trillion ‘blind spot’ BIS says

No less than $65 trillion in unrecorded dollar debt circulates across the global financial system in non-U.S. banks and shadow banks. To put in perspective, global GDP sits at $104 trillion.

This dollar debt is in the form of foreign-exchange swaps, which have exploded over the last decade due to years of monetary easing and ultra-low interest rates, as investors searched for higher yields. Today, unrecorded debt from these foreign-exchange swaps is worth more than double the dollar debt officially recorded on balance sheets across these institutions.

No less than $65T in unrecorded debt circulates across the global financial system in non-US banks & shadow banks today

Visualizing $65 Trillion in Hidden Dollar Debt
READ https://elements.visualcapitalist.com/visualizing-65-trillion-in-hidden-dollar-debt/

We’ve charted the rise in hidden dollar debt across non-US financial institutions & examined the wider implications of its growth:
According to the BIS, non-banks outside the US owe a mind-blowing $25 trillion in missing debt. And if that wasn’t enough, non-US banks owe an additional $35 trillion. It’s more than the combined total of US dollar Treasury bills, repurchase agreements, and commercial paper.
No problem – just create more! That’s the game.

Or….  maybe there is no such thing as a debt. There is only wealth transfer.

Fix The Money

Stack sats, separate money from state, end war, make the world a better place.

Total global debt is somewhere in the neighborhood of 400 trillion.
Couple that with total global assets and you get to 900 trillion USD.
Now say #bitcoin only absorbs 5% of that 900 trillion, that gives you a price target of 2.2 million per #bitcoin. Math is fun.

White Hat Gummo @GummoXXX Dec 13, 2022
#Binance should not be trusted. If you have money with this outfit you should remove it. #cryptocurrencies
Being kind to others is probably one of the best fucking things you can do today & everyday..
As per his claims, he says he is holding 171,347.32 BTC with BTC trading at $16,962 per coin, his stack is worth $2,906,387,814 today.

@GummoXXX teaching at https://www.ju.edu/
#hacker #blackhat | Hacker since 1986.
Ponte Vedra Beach, Florida
#Ethereum is an un-trusted biased network
Nov 21, 2022
Guys, if some #bitcoin or crypto evangelists is selling books, offering advice, has a telegram channel, website, app, has a significant ostentatious tone, it’s probably #bullshit these fuckers getting on stages at these crypto conferences are all fucking frauds. DONT send them $!
fun fact : I learned how to read & write aramaic by the agE of 14 😉 my colleagues used to trip out when they would see my notes ha!

Nov 10, 2022
…typical crypto scams be like

1. Has a telegram channel
2. Cannot be verified through ANY legitimate diligence
3. Obscure technologies
4. Operates outside of United States Jurisdictions
5. Usually some self professed crypt0 ‘god’ supposedly has the ‘secret’
6. +4% rtn

Good News

99% Efficiency: Princeton Engineers Have Developed a New Way To Remove Microplastics From Water

FDA Approves Alzheimer’s Drug Lecanemab Intended To Tackle The Root Of The Condition And Slow Cognitive Decline Amid Safety Concerns What many regard as a milestone approval has been tainted by reports of deaths that may have been caused by the therapy. Lecanemab, the second medication to treat Alzheimer’s disease and delay cognitive decline, has been given the green light by the US Food and Drug Administration (FDA). Researchers applaud the decision, but the joy is tempered by reports that the FDA acted incorrectly when it approved the first such medicine last year and patient deaths.

Educational CyberPlayGround NetHappenings News SECURITY 4-15-2021

► ► Educational CyberPlayGround®, Inc. 1999 https://edu-cyberpg.com
► ► Blog https://CyberPlayGround.org ©
► ► NetHappenings Newsletter ©1989 email subscribe / unsubscribe
► ► K12 School Directory © http://k12playground.com
► ► Twitter @Cyberplayground @NetHappenings @K12Playground

THIS IS VERY VERY LONG……

MAKE SURE YOU SCROLL ALL THE WAY DOWN

A Casino Gets Hacked Through a Fish-Tank Thermometer
https://www.entrepreneur.com/article/368943
Are your fish tanks secure? Secure yourlaptop. Secure your smart phone. Secure your tablet. And, before I forget, secure your fish tank. Yes, you heard me. Your fish tank. That was the lessoned learned a few years ago from the operators of a North American casino. According to a 2018 Business Insider report, cybersecurity executive Nicole Eagan of security firm Darktrace told the story while addressing a conference.
“The attackers used that (a fish-tank thermometer) to get a foothold in the network,” she recounted. “They then found the high-roller database and then pulled that back across the network, out the thermostat, and up to the cloud.” Can this really be possible?  It certainly can. And you can blame the Internet of Things.

AI Security: How Human Bias Limits Artificial Intelligence
April 15, 2021 | By Mark Stone
https://securityintelligence.com/articles/ai-security-human-bias-artificial-intelligence/
For cybersecurity experts, artificial intelligence (AI) can both respond to and predict threats. But because AI security is everywhere, attackers are using it to launch more refined attacks. Each side is seemingly playing catch-up, with no clear winner in sight.
How can defenders stay ahead? To gain context about AI that goes beyond prediction, detection and response, our industry will need to ‘humanize’ the process. We’ve explored some of the technical aspects of AI, like how it can both prevent and launch direct-denial-of-service attacks, for instance. But to get the most out of it in the long run, we’ll need to take a social sciences approach instead.
What AI Security Can’t Do
First, let’s establish what AI and machine learning are. AI, much like its name, represents the higher concept of machines carrying out ‘smart’ tasks. Machine learning (ML) is a subset of AI. It provides data to computers so they can process that data and learn for themselves. Whether it’s AI or machine learning, algorithms are built based on data that determine what patterns are expected and what are considered abnormal.
The best AI requires data scientists, statistics and as much human input as possible. As you train it, AI learns to create results that may not be visible to the human running it. It can even make judgments based on data for which you didn’t train it. This ‘black box’ nature means there’s also a push to make AI that can reveal how it makes decisions.

No matter how well AI trains itself, human oversight and input are key to its success. That’s the takeaway from Julie Carpenter, research fellow in the ethics and emerging sciences group at California Polytechnic State University.

“Every decision you make in AI should have a human in the loop at this point,” she says. “We don’t have any sort of genius AI that understands human context, or human ways of life or sentience. Some sort of oversight is necessary.”

AI Can’t Outthink Us
Carpenter explains that AI’s original goal is to replicate human-like thinking, an attempt that remains true today for most AI products. AI cybersecurity — and AI in general — is there to serve humans in one way or another, she said. But it still doesn’t understand human context, culture or meaning.

The belief that AI will, sometime in the future, outsmart and outthink us is incorrect, Carpenter said. She also shared her strong doubts about the current state of AI reading emotion. ‘Affective’ AI like this is being used in advertising to try to read consumers’ attitudes toward products and marketing campaigns.

“I don’t think it’s necessarily a good direction for AI to go,” she warned. “How can we teach AI to do something we (ourselves) cannot do — which is perfectly read each other’s emotions?”

How AI Bias Hurts Cybersecurity
Is artificial intelligence a threat? Maybe not in the science fiction sense of machines taking over the world. But it does open up new avenues of attack. And because AI is trained by humans, it can include human bias — or fail to account for human bias. Instead of approaching AI security from an external standpoint (i.e. preventing breaches) we must also consider the impact it might have internally.

Suppose you decide you’re going to start using AI to prevent breaches in your company. In that case, you may not want to worry so much about how to block clever threat actors. Instead, you should worry more about how to keep your own users, customers or employees safe. By using AI security in some form, are you putting them at risk? In today’s threat landscape, where personal devices are on corporate networks with people working from home, enterprise networks are handling much more personal traffic than ever before.

How to Overcome Bias
Carpenter advises that companies look for the broader impacts that go beyond just the intended use of the AI product.

In our industry, protecting personal information is critical. But what happens when AI security glosses over something that may, at first glance, seem harmless but is, in fact, sensitive to certain groups?

Carpenter offers an example. Let’s say a company suffers a data breach in which the only information that leaked was employees’ genders. For many people, that might not be a concern.

“But having someone’s gender hacked and put out there could be a really big deal for a lot of people,” she said. “It could be life changing … devastating … traumatizing … because gender is such a complicated social and cultural issue.”

Depending on what kind of service you handle and what kind of data is linked, you may have different kinds of outcomes.

The Limits on ‘Reading People’
Another potential pitfall for the use of AI in cybersecurity is with advanced biometrics — especially when it comes to specifics like facial expressions. Even looking ahead into the 2040s, Carpenter is skeptical that AI will understand visual cues. The subtleties, nuances and cultural differences are simply too complex.

“It’s going to disregard context, situations and suggestiveness,” she says. “You could have a frown on your face and the AI technology thinks that you’re frustrated or angry. But you pull back the picture, and the person is standing while they’re reading a book, and they’re actually just concentrating. It doesn’t really matter what other biometrics you triangulate it with. It’s a guessing game.”

Remember Ethical Frameworks
One piece of ‘low-hanging-fruit’ companies can take from a user perspective, Carpenter advises, is to look at things like the General Data Protection Regulation (GDPR) and any protocols that talk about the user’s rights and think about an ethical framework built on those rights.

“If you look at things like the rights for the citizen section of the GDPR, it explicitly defines what my rights are as a user and as a data person,” she says. “If my data is incorrect, how do I fix it, how can I get organizations to stop disseminating false data about me? These are the ethical questions that are out there, and things that are user-centered that can be a starting point for discussions in organizations.”

With any type of strategic planning, having the right people in place is a crucial element for success. With AI security, it’s no different.

Checklist for Working With AI
Carpenter insists organizations should have an important initial discussion about AI security and answer several key questions:

What are the goals of using AI, even beyond the business goals?
How does the organization think of AI as a concept?
What should the AI do, and what shouldn’t it do?
What is it we’re artificially replicating with AI?
Whose intelligence are we artificially replicating?
How will this intelligence be used?
What do we want the intelligence to do that goes above and beyond its primary functionality?

“There needs to be explicit discussions, smaller discussions and micro discussions between and within the teams and working groups,” she says. “We also need to make decisions about what to include and not to include, what to code and not to code, how to promote the product or not promote their product, who do we give it to and who we are designing it for.”

What’s Next for AI Security?
Carpenter recalls a recent talk with another very large tech company in which she asked how their AI security handles a huge data breach. Beyond its uses, she was curious about what the company learned about the group that carried out the attack.

“We’re not detectives,” the executive told her, “and all we can do is put a cork back in the leak and move on to predicting how they might attack us again.”

This type of reactive, short-term thinking is often the best we can do to keep up with the cycle of prediction, detection and response. Carpenter hopes that in the long term, cybersecurity can leverage people in social sciences more. They could help AI find forensic patterns, cultural patterns, how attacks were happening, who is behind the attacks and what their motivations are. When programmed and put in place correctly, AI security could someday predict and forecast how future events might emerge.

Use Some AI … But Not Too Much
“AI should provide more refined insights, not so much in terms of quantity but in terms of quality,” Carpenter says. “Because you’re looking at this diverse set of rules, and you’re not stuck in an echo chamber with the same ideas and the same concepts. Frankly, if I was working in cybersecurity, and I was working in an organization with everybody throwing around the term AI (too much), I’d be a little concerned.”

Cybersecurity experts, she suggests, must learn to think like social scientists, taking a step back, so everyone in the enterprise is on the same page — increasing communication to help everybody’s plan.

“People from social sciences are specifically trained to help you give AI more understanding,” she says.

Better AI Security By Thinking Like a Human
In fact, it’s difficult not to come away with the perception that winning in cybersecurity is about taking human psychology and social sciences into account in other areas, too. Almost anyone who has instilled a culture of awareness in their enterprise will tell you that they’re much more confident about their security posture.

Learning about, adopting and getting the most out of AI security is no different. The more we understand about the human element and the more we add that understanding into AI input, the better off we’ll be as an industry.

FACEBOOK

So where did that cache of 500 million Facebook phone numbers come from? @lilyhnewman got to the bottom of it. Turns out it was scraped from the site directly by exploiting an undisclosed vulnerability in the site’s contact import feature, which allowed attackers to create a massive address book with millions of phone numbers in order to “match” those numbers against existing Facebook accounts. Facebook never fully disclosed the issue, instead this past week pointed back to similar — but only tangentially related — stories.

Motherboard: Cool, how about one more? There’s yet another cache of Facebook phone numbers in the form of a Telegram bot. @josephfcox ran the numbers.

Clearview AI, the controversial facial recognition app

BuzzFeed News: Breathtakingly good reporting here. BuzzFeed News found more than 7,000 users from close to 2,000 public agencies using Clearview AI, the controversial facial recognition app that checks faces against a database of 3 billion images scraped from social media sites. BuzzFeed News published the results in a searchable table — including ICE, the Air Force, and even public schools. This is incredible work that took the reporters over a year to complete.

THE BOTNET

Bitcoin should become a global, universal currency. In this context, asymmetric threats like embedded illegal data become a major challenge.

Akamai has reported on a new method: a botnet that uses the Bitcoin blockchain ledger. Since the blockchain is globally accessible and hard to take down, the botnet’s operators appear to be safe.

There’s even illegal pornography and leaked classified documents. All of these were put in by anonymous Bitcoin users. But none of this, so far, appears to seriously threaten those in power in governments and corporations. Once someone adds something to the Bitcoin ledger, it becomes sacrosanct. Removing something requires a fork of the blockchain, in which Bitcoin fragments into multiple parallel cryptocurrencies (and associated blockchains). Forks happen, rarely, but never yet because of legal coercion. And repeated forking would destroy Bitcoin’s stature as a stable(ish) currency.

The botnet’s designers are using this idea to create an unblockable means of coordination, but the implications are much greater. Imagine someone using this idea to evade government censorship. Most Bitcoin mining happens in China. What if someone added a bunch of Chinese-censored Falun Gong texts to the blockchain?

Direct line. Now #IndictTrump

On the Insecurity of ES&S Voting Machines’ Hash Code

It turns out that ES&S has bugs in their hash-code checker: if the “reference hashcode” is completely missing, then it’ll say “yes, boss, everything is fine” instead of reporting an error. It’s simultaneously shocking and unsurprising that ES&S’s hashcode checker could contain such a blunder and that it would go unnoticed by the U.S. Election Assistance Commission’s federal certification process. It’s unsurprising because testing naturally tends to focus on “does the system work right when used as intended?” Using the system in unintended ways (which is what hackers would do) is not something anyone will notice.

Also:

Another gem in Mr. Mechler’s report is in Section 7.1, in which he reveals that acceptance testing of voting systems is done by the vendor, not by the customer. Acceptance testing is the process by which a customer checks a delivered product to make sure it satisfies requirements. To have the vendor do acceptance testing pretty much defeats the purpose.

Capitol Police ignored intelligence warnings ahead of Jan. 6 riots, watchdog report finds

The Capitol Police ignored critical intelligence ahead of the Jan. 6th riot, including overlooking a warning that, “Congress itself is the target,” according to an internal watchdog report obtained by NBC News.

The police force tasked with protecting the U.S. Capitol also lacked policies and procedures that left them severely unprepared to deal with the deadly insurrection, the 104-page report prepared by the Capitol Police’s inspector general found. The report has not been made public.

Pennsylvania GOP launches ‘super MAGA Trump’ primary
Never mind Pittsburgh and Philadelphia. Palm Beach, Fla., is where the party’s Senate nomination is likely to be decided.
“There’s no denying that the Republican Party in Pennsylvania is still a party of Trump.” Steve Bannon, a former White House chief strategist to Trump, told POLITICO that “any candidate who wants to win in Pennsylvania in 2022 must be full Trump MAGA.”

US formally names Russian Foreign Intelligence Service (SVR) as the culprit in SolarWinds hack

The former president of the united states of America acted like a Russian operative for 4 years, blew the pandemic response, got Covid, crashed the economy, insulted everyone in the world, hasn’t conceded, and incited an ongoing insurrection and violent attack on the capitol

For the first time EVER, the US government said Russian agent Konstantin Kilimnik provided Russian intelligence agencies with the internal Trump campaign polling/strategy data he received from Manafort and Gates in 2016. Even Mueller didn’t go that far.

We knew Trump 2016 polling data went from Manafort > Kilimnik. Today, Treasury says that data went from Kilimnik > Russian intelligence agencies.
https://home.treasury.gov/news/press-releases/jy0126

Here’s KK with long term buds Manafort and….look, it’s Bernie’s 2016 Chief Strategist Tad Devine!

One of the most under-talked about pieces of the Mueller report. Manafort met Kilimnik to discuss polling data & Trump campaign strategy in the Midwest, but also discussed the Russian belief that Trump needed to win in order for Russia to effectively control Eastern Ukraine.

See https://home.treasury.gov/policy-issues/financial-sanctions/recent-actions/20210415