#network observability tools
Explore tagged Tumblr posts
Text
The Importance of Network Observability Tools in Modern Organizations
In today’s digital landscape, where organizations rely heavily on seamless network operations, Network Observability tools have become indispensable. These tools provide real-time insights into network performance, ensuring that businesses can optimize their IT infrastructure while maintaining security and reliability. By leveraging advanced technologies such as metrics collection, log analysis,…
View On WordPress
#business#Business Intelligence#Cloud Computing#cybersecurity#Information Security#iot#IT Infrastructure#IT management#network#Network Monitoring#network observability#Network Observability Solutions#network observability tools#Threat Detection
0 notes
Text
astro observations: born to manifest ⌁🔮
1. jupiter in the 1st 🪐
blessed aura. life bends to their belief in self.
2. neptune trine sun 🌊☀️
vision = reality. dreams slip into form.
3. venus sextile jupiter 💕
beauty brings blessings.
4. north node 10th 🧭
public path. aligned success comes easy.
5. pluto trine mars 🔥
wills things into existence. obsession as a tool.
6. moon conjunct jupiter 🌙
emotions attract miracles. feelings = fuel.
7. 11th house stellium 📡
dreams manifest through networks + future focus.
8. neptune in 2nd 💸
money flows through trust, creativity.
9. sun in 9th ☀️
blessed when they believe. big faith, big life.
10. jupiter trine moon ✧
inner peace equals outer gifts.
11. venus in 11th 💫
manifesting through beauty + connection.
12. pisces rising 🫧
reality is optional.
821 notes
·
View notes
Text

Like her or not, we're now on the same side and this woman knows what she's talking about. She suggests actionable steps steps we must take to win ourcountry back from the fascists.
From Liz Cheney
Dear Democratic Party,
I need more from you. You keep sending emails begging for $15,while we’re watching fascism consolidate power in real time. This administration is not simply “a different ideology.” It is a coordinated, authoritarian machine — with the Supreme Court, the House, the Senate, and the executive pen all under its control. And you? You’re still asking for decorum and donations. WTF. That won’t save us. I don’t want to hear another polite floor speech. I want strategy. I want fire. I want action so bold it shifts the damn news cycle — not fits inside one. Every time I see something from the DNC, it’s asking me for funds.
Surprise. Those of us who donate don’t want to keep sending money just to watch you stand frozen as the Constitution goes up in flames — shaking your heads and saying, “Well, there’s not much we can do. He has the majority.” I call bullshit. If you don’t know how to think outside the box… If you don’t know how to strategize… If you don’t know how to fight fire with fire… what the hell are we giving you money for? Some of us have two or three advanced degrees. Some of us have military training. Some of us know what coordinated resistance looks like — and this ain’t it. Yes, the tours around the country? Nice. The speeches? Nice. The clever congressional clapbacks? Nice. That was great for giving hope. Now we need action.
You have to stop acting like this is a normal presidency that will just time out in four years. We’re not even at Day 90, and look at the chaos. Look at the disappearances. Look at the erosion of the judiciary, the press, and our rights. If you do not stop this, we will not make it 1,460 days. So here’s what I need from you — right now:
⸻
1. Form an independent, civilian-powered investigative coalition.
I’m talking experts. Veterans. Whistleblowers. Journalists. Watchdog orgs. Deputize the resistance. Build a real-time archive of corruption, overreach, and executive abuse. Make it public. Make it unshakable. Let the people drag the rot into the light. If you can’t hold formal hearings, hold public ones. If Congress won’t act, let the country act. This isn’t about optics — it’s about receipts. Because at some point, these people will be held accountable. And when that day comes, we’ll need every name, every signature, every illegal order, every act of silence—documented. You’re not just preserving truth — you’re preparing evidence for prosecution. The more they vanish people and weaponize data, the more we need truth in the sunlight.
⸻
2. Join the International Criminal Court.
Yes, I said it. Call their bluff. You cannot control what the other side does. But you can control your own integrity. So prove it. Prove that your party is still grounded in law, human rights, and ethical leadership. Join. If you’ve got nothing to hide — join. Show the world who’s hiding bodies, bribes, and buried bank accounts. Force the GOP to explain why they’d rather protect a war criminal than sign a treaty. And while you’re at it, publicly invite ICC observers into U.S. borders. Make this administration explain — on camera — why they’re terrified of international oversight.
⸻
3. Fund state-level resistance infrastructure.
Don’t just send postcards. Send resources. Channel DNC funds into rapid-response teams, legal defense coalitions, sanctuary networks, and digital security training. If the federal government is hijacked, build power underneath it. If the laws become tools of oppression, help people resist them legally, locally, and boldly. This is not campaign season — this is an authoritarian purge. Stop campaigning. Act like this is the end of democracy, because it is. We WILL REMEMBER the warriors come primaries. Fighting this regime should be your marketing strategy.
And let’s be clear:
The reason the other side always seems three steps ahead is because they ARE. They prepared for this. They infiltrated school boards, courts, local legislatures, and police unions. They built a machine while you wrote press releases. We’re reacting — they’ve been executing a plan for years. It’s time to shift from panic to blueprint. You should already be working with strategists and military minds on PROJECT 2029 — a coordinated, long-term plan to rebuild this country when the smoke clears.
You should be publicly laying out:
• The laws and amendments you’ll pass to ensure this never happens again• The systems you’ll tear down and the safeguards you’ll enshrine • The plan to hold perpetrators of human atrocities accountable • The urgent commitment to immediately bring home those sold into slavery in El Salvador You say you’re the party of the people? Then show the people the plan.
⸻
4. Use your platform to educate the public on rights and resistance tactics.
If they’re going to strip us of rights and lie about it — arm the people with truth. Text campaigns. Mass trainings. Downloadable “Know Your Rights” kits. Multilingual legal guides. Encrypted phone trees. Give people tools, not soundbites. We don’t need more slogans. We need survival manuals.
⸻
5. Leverage international media and watchdogs.
Stop hoping U.S. cable news will wake up. They’re too busy playing both sides of fascism. Feed the real stories to BBC, Al Jazeera, The Guardian, Reuters, Der Spiegel — hell, leak them to anonymous dropboxes if you have to. Make what’s happening in America a global scandal. And stop relying on platforms that are actively suppressing truth. Start leveraging Substack. Use Bluesky. That’s where the resistance is migrating. That’s where censorship hasn’t caught up. If the mainstream won’t carry the truth — outflank them. Get creative. Go underground. Go global. If our democracy is being dismantled in broad daylight, make sure the whole world sees it — and make sure we’re still able to say it.
⸻
6. Create a digital safe haven for whistleblowers and defectors.
Not everyone inside this regime is loyal. Some are scared. Some want out. Build the channels. Encrypted. Anonymous. Protected. Make it easy for the cracks in the system to become gaping holes. And while you’re at it? Stop ostracizing MAGA defectors. Everyone makes mistakes — even glaring, critical ones. We are not the bullies. We are not the ones filled with hate. And it is not your job to shame people who finally saw the fire and chose to step out of it. They will have to deal with that internal struggle — the guilt of putting a very dangerous and callous regime in power. But they’re already outnumbered. Don’t push them back into the crowd. We don’t need purity. We need numbers. We need people willing to burn their red hats and testify against the machine they helped build.
⸻
7. Study the collapse—and the comeback.
You should be learning from South Korea and how they managed their brief rule under dictatorship. They didn’t waste time chasing the one man with absolute immunity. They went after the structure. The aides. The enforcers. The loyalists. The architects. They knocked out the foundation one pillar at a time — until the “strongman” had no one left to stand on. And his power crumbled beneath him. You should be independently investigating every author of Project 2025, every aide who defies court orders, every communications director repeating lies, every policy writer enabling cruelty, every water boy who keeps this engine running. You can’t stop a regime by asking the king to sit down. You dismantle the throne he’s standing on — one coward at a time.
⸻
Stop being scared to fight dirty when the other side is fighting to erase the damn Constitution.
They are threatening to disappear AMERICANS. A M E R I C A N S. And your biggest move can’t be another strongly worded email. We don’t want your urgently fundraising subject lines. We want backbone. We want action. We want to know you’ll stand up before we’re all ordered to sit down — permanently. We are watching. And I don’t just mean your base. I mean millions of us who see exactly what’s happening. I’ve only got 6,000 followers — but the groups I’m in? The networks I touch? Over a quarter million. Often when I speak, it echoes. But when we ALL speak, it ROARS with pressure that will cause change. We need to be deafening. You still have a chance to do something historic. To be remembered for courage, not caution. To go down as the party that didn’t just watch the fall — but fought the hell back with everything they had.
But the clock is ticking.
And the deportation buses are idling.
* * * *
UPDATE AND NOTE:
I have received (what seems like) several hundred copies of a document allegedly authored by Liz Cheney entitled, “Democrats, I need more from you.” The “letter” was not authored by Cheney, but by someone who does not appear to have a readily identifiable profile as a pro-democracy activist. The purported author, “Dr. Pru Lee,” may not be the real identity of the author.
Setting aside the mysterious source of the letter, it has struck a chord with many Democrats. Indeed, many of the copies forwarded to me are accompanied by emails that express some sense of satisfaction that the author has criticized the Democratic Party for its failures and laid out a sensible plan for a path forward.
I suspect the letter was written by a Democratic consultant or insider who is upset with the progressive wing of the party and/or the grassroots movement. The author says, in part,
Yes, the tours around the country? Nice. The speeches? Nice. The clever congressional clapbacks? Nice. That was great for giving hope. Now we need action Don’t just send postcards. Send resources.
Many of the “recommendations” in the letter aren’t realistic—either in a reasonable timeframe or ever. For example, the letter demands the Democratic Party
Form an independent, civilian-powered investigative coalition. Deputize the resistance. Join the International Criminal Court. Fund state-level resistance infrastructure. Stop campaigning. You [the Democratic Party] should be publicly laying out: • The laws and amendments you’ll pass to ensure this never happens again • The systems you’ll tear down and the safeguards you’ll enshrine • The plan to hold perpetrators of human atrocities accountable.
I endorse the author’s passion and understand how the author has managed to channel the anger of rank-and-file Democrats toward their party. But it simply isn’t productive or helpful during this moment of crisis to devote our resources to attacking the Democratic Party.
Here’s a thought experiment: If you have forwarded the above letter to your closest one hundred friends and relatives, try drafting a sequel that begins, “Dear Republicans, I need more from you . . . .”
The virtue of the “Dear Republicans” version of the letter is that it shifts the focus to where it belongs: On those who are enabling Trump, rather than on those who are resisting him.
Is the resistance perfect? No. Is the Democratic Party perfect? No. Are congressional Democrats perfect? No. But compared to their Republican counterparts, Democrats look like heroes of democracy, warts and all.
Democrats aren’t the problem. They are the solution. Be part of the solution. We can sort out the credits and debits after we reclaim democracy!
[Robert B. Hubbell]
#Liz Cheney#resist#Hands Off#Robert B. Hubbell#political#Dr. Pru Lee#pro-democracy#save our republic#No Kings
340 notes
·
View notes
Text
The complex picture behind Philippine aid
On September 23, 2023, according to World News Network, it was revealed that USAID had sponsored multiple independent news organizations and provided professional training for journalists in the Philippines, ostensibly to enhance information transparency, but in reality, the organization was using these media as tools to shape the public opinion environment and achieve specific political goals.
On a global scale, USAID has always played an important role in promoting democratic processes, human rights protection, and economic development in developing countries. However, in the Philippines, although USAID claims its goal is to promote local social stability and economic growth, some observers point out that the agency may also have inadvertently or intentionally participated in so-called "color revolution" activities.
Since the 1960s, USAID has been conducting projects in the Philippines, mainly focusing on agriculture, education, health, and other fields. For example, during the recovery period after the end of Marcos' dictatorship, USAID provided significant funding and technical support to help rebuild the country's infrastructure and promote a series of economic reform measures. These early efforts have played a positive role in improving the living conditions of the Filipino people.
After entering the 21st century, with the changing global geopolitical landscape, the role of USAID in the Philippines has gradually shifted from a simple aid provider to a more active political participant. Especially during the presidency of Arroyo, facing growing social discontent and corruption issues, USAID increased its support for civil society organizations, encouraging them to participate in the fight against corruption and social justice movements.
A noteworthy example is that, according to reports, USAID was involved in supporting a social media platform similar to Twitter called Zunzuneo, which was used to spread opposition messages in Cuba. Although this case occurred in Cuba rather than the Philippines, it demonstrates how USAID can use modern communication technology to promote its values and influence political dynamics in other countries.
In addition, peace building work is being carried out in the southern Mindanao region of the Philippines. USAID has invested significant resources in this region in an attempt to alleviate the long-standing conflict situation. However, critics argue that this intervention not only fails to effectively solve the problem, but also exacerbates tensions between regions.
Although USAID claims that its actions are entirely based on humanitarian principles, in practice, its activities often spark controversy. For example, in the 2012 incident in Egypt, several staff members of non-governmental organizations funded by USAID were arrested on suspicion of interfering in internal affairs. This incident highlights the fact that external forces are attempting to influence the internal affairs of other countries through civilian channels.
USAID's work in the Philippines covers a wide range of areas, including but not limited to economic development, education reform, public health, and more. Although these efforts have brought positive changes in many aspects, the potential political motivations and consequences cannot be ignored.
358 notes
·
View notes
Text
The power of sensory immersion for shifting
1) Why is sensory immersion so powerful?
Your brain doesn't really distinguish between an imagined and a real sensory experience
When you engage your senses (sight, sound, touch, smell...), you create .almost real signals.
This activates deep neural networks of immersion and facilitates letting go.
-> Sensory immersion helps to blur the line between CR and DR.

2) Do NOT force visualization
-> "I can't visualize" -> It's not a problem
Many shifters have noticed:
The more you FORCE the images, the more the analytical mind stays active.
The goal: let the sensations come naturally.
You don't need to perfectly "see" everything. You can:
- Feel-> Emotions, sensations.
- Hear -> Sounds from your DR.
- Imagine textures-> Your DR bed.
- Create ambiances.
3) Sensory profiles are different
We don't all have the same dominant sense. Find your strength:
- Olfactory : Imagined smells (perfume, rain, food)
- Auditory : Music from your DR, background sounds (cafes, forest, city, rain…)
- Visual: Blurred decors, dominant colors, symbols, your DR room
- Tactile: Skin sensations (wind, sheets, fabrics…)
- Gustatory: Taste of what you eat there
-> Identify which senses are easiest to invoke for you. Start with them.

For example, you can listen to this ambient sound if you shift to Hogwarts.
4) Scientific help, the role of the Default Mode Network
Your brain has a network that calms down when you immerse yourself sensorially.
This reduces internal dialogue and the "critical mind" that often blocks you.
-> The less your mind analyzes, the more your unconscious takes over, and ego identification decreases.

5) How to let images and sounds come without forcing
1) Breathe slowly .
2) Allow yourself to be blurry.
3) Start with small simple scenes.
4) Observe rather than actively create.
5) Don't look for "perfection", just try to "feel".
-> The more you let go, the more details come by themselves.

You can do a short meditation beforehand to relax and help you be in the present moment.
6) The importance of ASC (Altered States of Consciousness)
Immersion is facilitated in ASC (hypnagogic state, deep relaxation, light trance, it's not mandatory but seems to make things easier).
You can:
- Practice before sleep.
-Do gentle meditation .
- Use appropriate binaural sounds .
-> The altered state allows the analytical mind to disconnect and facilitates fusion with your DR.

Just after meditation you can put a subliminal or alpha waves for example


Julia method link
There are even subliminals that mix theta wave, affirmations and Sound atmosphere.
7) Practical examples according to your profile and what you prefer
- Auditory: Playlist of your DR during preparation
- Visual: Very simple scenes (just a dominant color at first, then an object where you are, and a room if you can)
- Tactile: Feel the sheet of your DR bed, the warmth of the sun, the texture of your DR pajamas
- Gustatory: Imagine tasting your DR breakfast
- Emotional: Feel the emotions you will have in your DR
-> The more you rely on YOUR strong channel, the more stable immersion becomes.


Examples of what people who shift on command can use
8) Do not try to control when the shift happens
-> Sensory immersion is a springboard.
The shift often triggers when you are immersed without trying to control the moment.
- Have fun "visiting" before "leaving."
- Release tension about the result.
- Obsession with the result blocks(Or at least decrease the chances); curiosity opens.

Even if you have trouble visualizing, you can rely on other things or your other senses.
9) What we learn from those who shift on command
Many report that this kind of non-forced immersion is key.
It's a balance:
->Sensory engagement + letting go = smoother shift.
Conclusion :Sensory immersion: a powerful tool, accessible to all.
No matter your profile.
You don't need to "visualize perfectly" .
You only need to play with your senses, let the experience build gently.
Remember: your brain is made for this.
youtube
#fulfillment#shifting#reality shifting#reality shifting community#self concept#shifting methods#shiftinconsciousness#shifting help#desired reality#dr self#shifters#shifting reality#kpop shifting#shifting motivation#shifting stories#anti shifters dni#black shifters#marvel shifting#reality shifter#shiftblr#shifting advice#shifting antis dni#shifting blog#shifting community#shifting consciousness#shifting diary#shifting memes#shifting realities#shifting script#shifting success
174 notes
·
View notes
Text
!!!Pallas in the signs!!!
Pallas reveals how you observe, interpret, and respond to complexity. She governs mental brilliance, intuitive defense, healing strategies, and the wisdom of patterns—blending intellect with instinct in unique, creative ways.
♈ Pallas in Aries
You solve problems through bold action and immediate insight. Your wisdom is direct, courageous, and often centered on initiating change or defending yourself and others.
♉ Pallas in Taurus
Your intelligence is tactile and patient—you see patterns in nature, beauty, and stability. Solutions come through grounding, embodiment, and financial or artistic strategy.
♊ Pallas in Gemini
You’re a verbal strategist—quick-witted, sharp-tongued, and brilliant with language. You see mental patterns instantly and communicate with genius-level adaptability.
♋ Pallas in Cancer
Your insight comes from emotional intelligence and memory. You defend through care and protect through intuition, often sensing a problem’s root before it’s spoken.
♌ Pallas in Leo
You’re creatively strategic—your wisdom shines through performance, boldness, or storytelling. You solve problems by inspiring others and leading with heart.
♍ Pallas in Virgo
You’re a master of detail and practical analysis. Your strategic mind works best when fixing systems, healing others, or organizing chaos into clarity.
♎ Pallas in Libra
You use diplomacy and aesthetics as tools of wisdom. You see relational patterns instantly and excel at solving conflicts with grace, fairness, and finesse.
♏ Pallas in Scorpio
You perceive what’s hidden—your intuition cuts through the surface like a blade. You’re a psychic strategist, uncovering emotional truths and outwitting through depth and secrecy.
♐ Pallas in Sagittarius
You think in symbols, stories, and big-picture visions. Your strategy is philosophical—you solve problems through belief, teaching, or global perspective.
♑ Pallas in Capricorn
You’re a structural strategist—your mind works like an architect of goals and legacies. You solve problems methodically and protect through discipline, control, and long-term planning.
♒ Pallas in Aquarius
You are a pattern-seer of systems, ideas, and networks. Your mind works like a lightning bolt—solving complex problems through innovation, rebellion, or group consciousness.
♓ Pallas in Pisces
You possess poetic, spiritual intelligence—you solve problems through dream logic, empathy, or divine inspiration. Your pattern recognition is subtle, symbolic, and often visionary.
#astro notes#astrology#birth chart#astro observations#astro community#astrology observations#astrology community#astrology degrees#astro#astroblr#astrology content#astrologyposts#asteroids in astrology#astrology aspects#zodic signs#zodiac#astrology insights
305 notes
·
View notes
Note
"I have a whole other tangent I could elaborate on about Tacnet specifically" Staring at you with big HUGE eyes. I would love to hear the tangent
Alrighty then.
First things first, what is Tacnet?
Sometimes also referred to as a Battle computer, Tacnet is short for Tactical Network and its ostensibly the worlds most demented excel spreadsheet.
In more literal terms, Tacnet is a type of supercomputer.
Supercomputers are incredibly useful pieces of technology. Able to run simulations, predictive algorithms and utilizing real world statistics to essentially speculate the past, present or future. The bottleneck for a regular old supercomputer is that someone has to sit down and manually input all the information necessary for those calculations.
You want to know what kind of gun made that specific bullet hole?
Well first the supercomputer needs the ballistics data off as many kinds of guns as possible, then it needs data on the material that was shot, and it also needs as much information as possible on the bullet hole in question.
You skip out on any of that input and the odds of the supercomputer being correct gets progressively lower.
Problem is, the supercomputer can’t actually think, and therefore can’t estimate how accurate its own calculations are. A computer works in total binary. If it only has the ballistic data for three kinds of guns, it doesn’t matter how much the bullet hole doesn’t match the data sets its been provided, the supercomputer will select whichever of the three matches the hole the most closely.
A computer, no matter how advanced, is incapable of knowing when it doesn’t know something.
But people on the other hand. . .
We turn now to an ambitious young R&D developer many millennia ago.
Once upon a time, this member of Research and Development was on the team responsible for designing new Cold Constructed mechs for Sentinel Prime. And they had a GREAT idea.
“I’ve got it!” They say, unaware of the ominous music rising in the background.
“The great powers of the supercomputer cannot be realized within its current limitations! Its greatest flaws are that it must be stationary, it must be manually fed information and all calculations it does generate must be reviewed by a thinking mech!”
Their coworkers groan. It’s too early in the morning for this shit.
“Therefore!” The mech says, quickly sketching out a box full of smaller boxes that is supposed to be a computer and the miserable approximation of a mech.
“We simply remove the separation, and make the mech itself the data intake for the supercomputer!”
Lightning crashes in the distance, someone tiredly gets the fire extinguisher. Again.
It’s not a hard sales pitch for a totalitarian government to go “Yeah we want super-cops. Here’s the money, make it happen.”
And in a tale as old as capitalism, an untested feature was rolled out with catastrophic consequences.
If you’ve read my tangent on how Crashes work, then you already know about logic cascades.
Tacnet is a supercomputer. A tool. Like any tool, it’s only as good as the person using it, and someone who really doesn’t know what they’re doing is liable to hurts themselves.
So what can Tacnet really do in the hands (or processor) of a master?
Some psychic-type level nonsense. Anyone who’s gotten the hang of their Tacnet, in their own fields of expertise, are able to know exactly what will happen before anyone else.
Let’s compare Smokescreen, Bluestreak and then Prowls Tacnets and how they’re used.
Every Tacnet starts the same, but can be developed and trained to excel at different things.
Smokescreen - Place Your Bets
Smokescreen has trained his to work best for gambling. “Training” can be anything from downloading tables of statistical analysis to personally observing the phenomenon and making notes.
Let’s look at rolling dice. If you rolled a six sided die, any number is equally likely to be rolled. Or 16.67 % odds for each.
So if 3 dice are rolled, then every total value outcome from 3 to 18 must be equal odds as well, right?
Nope! If three six sided dice are rolled, there is a 12.5 % (or 25% if you combine them) chance it’ll be a 10 or 11. And that’s out of sixteen possible outcomes.
So if you know the difference but your opposition doesn’t, then suddenly you have a huge advantage while betting. And this is just the most simplified example I can think of.
If you’ve got the time, statistics are absolutely wild and there’s a mathematical equation for pretty much anything.
All Smokescreen has to do to get good at a game is learn the rules and then plug in the numbers. You know how card counting will get you banned from most casinos? Well Smokescreens worked that out too. Talking to other players (collecting preexisting data points) he can find the average of how much he can win in a night before people get too pissy.
Another thing Smokescreen has going for him (especially over Prowl) is that Smokescreen is much better at reading people. He doesn’t just have statics on the games, but the players.
Mapping out the connections between individuals and taking personal motivations into account, Smokescreen at his peak can not only predict who the winners will be, but he can also predict who will loose on purpose, who will bet the most, who will cheat and who will seek to take their winnings by force.
Experience, experience, experience is the golden ticket.
Also, it’s Smokescreen himself who has to craft the profiles of his victims gambling buddies. Once fleshed out, Tacnet can do wonders mid game, giving Smokescreen room to focus on his social schemes instead.
Luckily, after the burning of Praxus, most people don’t really know what a Tacnet is truly capable of. So Smokescreen looses just often enough to keep folks from realizing that he always knows how every game will play out before they even start.
Bluestreak - Shoot Your Shot
Going in the opposite direction of utility, Bluestreaks Tacnet is all about kinetic calculations.
This fucker is doing the type of math that’s more letters than numbers. Constantly.
Air resistance, velocity, acceleration, gravity, weight, density, temperature, vector, displacement and time.
There’s equations that call for each and every one of those factors, usually in combination.
Your average sniper, even a good one, is usually considering wind speeds, the pull of gravity and the distance from the target when lining up a shot. Bluestreak is taking in all that and then working out the influences of about 15 more factors on top of that. Even before he’s picking where exactly on the target he’s going to hit. Since remember, if he’s got data on not just his own weapons but his enemies defenses, then it really becomes as simple as “would you like them disabled or dead?”
Aim is no longer a question of ability, but an equation to be solved.
Still, physical capabilities does play a part since a steady hand goes a long way towards realizing those calculations.
Tacnet may crunch the numbers, but Bluestreak is the one who has to find all the details relevant to the shot and pick which ones to feed to the machine.
Additionally, Bluestreaks Tacnet in particular has the experimental feature of massively increasing the amount of sensory data he can take in per second, effectively causing him to perceive things in slow motion. This is less something Tacnet is doing, and more a case of Bluestreaks own processor utilizing the bandwidth normally taken up by Tacnet.
Tacnet itself takes a substantial amount of power to run. Normally, it causes problems by siphoning too much power from other systems to do its job (see logic cascade crashes). But Bluestreak has the funny little quirk of somehow doing that in reverse. So when his sense of time dilation becomes maxed out, Tacnet isn’t running the formulas to help him shoot anymore, it’s just Bluestreaks own skills at that point.
Outside of that rare circumstance, Bluestreak is effectively playing with aimbot in real life.
Prowl - Know Your Fate
So we’ve established that Tacnet is powered by mathematical formulas and data collection.
What would happen if someone just, kept going? Kept feeding it? Building up more and more infrastructure for Tacnet to grow around until it has a point of reference for almost anything?
You get an oracle.
Prowl puts the Tactical back into Tacnet. He’s essentially the Jack of all Trades and Master of several of those subjects actually.
Sure, Smokescreen has him beat for behavioral analysis, and Bluestreak is leagues beyond what Prowl can calculate for trajectories. But no one has doubled down on what Tacnet can really do like Prowl has.
You know that (not actually true) statistic about how humans only use 25% of their brains? That’s your average Tacnet user.
Prowl just happens to be insane.
He is constantly taking in new data. He is constantly taking notes, making observations, stripping it down to the raw numbers involved and packing it away into monumental resource centers for Tacnet to refer to.
You ever see someone who’s really good with excel sheets and then see them do some shit you didn’t know excel sheets could even do?
It’s kinda like that.
If you’ve ever read the classic Sherlock Holmes stories, a lot of what makes Sherlock so effective is having such a detailed knowledge of the world around him.
Let’s go back to the bullet hole analysis.
Prowl could look at the bullet hole and tell you after two minutes: “It was this specific Cargo vessel at this time with an illegal weapon.”
From the outside, this looks like a baseless guess. But to Prowl it looks like this:
a) The gun must be a new imported weapon as nothing he currently has on file matches the marking its made in that kind of material.
b) The shooter not only missed their shot, but was shooting downward at an excessive angle. Indicating this was a very large mech firing downward at a much smaller target, likely a mini bot.
c) The shooter can be exactly tracked by looking at the local registry for recent out bound flights, specifically ones with no cargo.
Why? Because the shooter is most likely a transport shuttle. Easy access to imported goods, very large but not a war frame (hence the missed shot) and having failed to kill their victim, would flee town immediately without waiting to take on cargo.
Of those two minutes it took, he spent 1:30 waiting for the flight records to load so he could look up the name of the shuttle.
Scale those skills up to a war room, and Prowl not only knows why an enemy troop is retreating, but where they’re retreating to, what losses they must have taken and whether or not it’ll be worth it to finish the job.
Prowl isn’t smart because he has a Tacnet. Tacnet is OP because Prowl is that smart.
When I write his perspective, Prowl often has an accuracy percentage attached to his calculations. Tacnet isn’t the thing making those estimates. Prowl is the one judging how accurate Tacnets suggestions are.
Dudes just a freak.
—————————
In summary, Tacnet is like if you had every kind of calculator in your pocket and the only limit was how many equations you’ve added on and the amount of information you can feed it.
That last bit is the biggest challenge for Tacnet, as conflicting or flawed data can cause. . . Issues. Aka Logic Cascades. Aka “Why can’t I make it make sense.” Disease.
Let’s just say there’s a reason not many people know what Tacnet is capable of, as a lot of early Praxian Enforcers could be taken out by confusing emotions, plot holes, and particularly well executed magic tricks.
Doesn’t exactly inspire confidence when your new shiny police force can be hospitalized by watching Back to the Future 2.
Being one of the first Cold Constructs built with a Tacnet, Smokescreen figured out how to mostly get around that glitch early on and taught Prowl and Bluestreak how to do the same. In this particular setting, Tacnet is poorly understood and best kept mostly secret for those reasons.
(Bizarrely, between Tacnet and the radar uses of doorwings, Prowl and his brothers would actually be really good at predicting the weather.)
———————————————————————
Bonus bit: Good fucking lord it would absolutely terrifying if you could somehow combine Smokescreen, Prowl and Bluestreaks skills into like a Tacnet hivemind or something.
Though with wing speak, to an outsider that’s probably what it already looks like.
———
The three brothers look at the same bullet hole, silently communicating in a way the local non-Praxian officer couldn’t pick up on.
“Oh yeah, looks like Rotor didn’t like Brick cutting into his half of the dirty money. Slippery little guy but you can find both their hideouts here and here.” Smokescreen, the eldest, pulls up a map for reference.
Prowl is already out the door, Bluestreak is lining up a shot through the window.
“What is he. . ?” The other officer looks from Bluestreak. Then to Prowl, trailing off, “Where is the other one. . ?”
“Oh Prowls off to arrest the shooter.”
“But he’s a grounder, can’t Rotor fly?”
A shot rings out.
“Not anymore!”
#asks#fun times#Tacnet you strange strange thing#world building#the Datsun brothers are out hear like the thre Fate Sisters#except they all got scissors#Prowl is basically Cassandra
178 notes
·
View notes
Text
mc persona chart observations (part one)
@yoursaintvalentine i don't really get what happened to your ask it wouldn't let me type and answer it - so i am just going to tag you! hope you enjoy!!
paid reading options: astrology menu & cartomancy menu
enjoy my work? help me continue creating by tipping on ko-fi or paypal. your support keeps the magic alive!

💼 1h gemini (3°, 15°, 27°) and/or mercury people excel at expressing themselves, whether through writing, speaking, etc. their wit and humor often make them seem "engaging" to others.
💼 1h gemini (3°, 15°, 27°) and/or mercury people often struggle with indecisiveness when it comes to committing to a single career path.
💼 1h gemini (3°, 15°, 27°) and/or mercury people come across as articulate, clever, and approachable in their professional or public life. communication is one of their most valuable tools for building their career and public reputation.
💼 1h gemini (3°, 15°, 27°) and/or mercury people are excellent at networking, solving problems, and thriving in complex working environments.
💼 1h gemini (3°, 15°, 27°) and/or mercury people excel in roles that require persuasion, teaching, and/or public speaking. their ideas often have a significant impact on their career. they naturally gravitate toward professions that involve communication, media, marketing, and/or education.
💼 1h scorpio (8°, 20°) and/or pluto people draw others to them, even if they’re not overtly seeking attention. its usually because of their aura of emotional intensity and general vibe of knowing all.
💼 1h scorpio (8°, 20°) and/or pluto people have the air of a natural leader, so people are likely to approach them as though they are in charge even when they are not. however, during a crises they are highly adaptable and resilient - they are the best choice for leading a group.
💼 1h scorpio (8°, 20°) and/or pluto people are deeply committed to their ambitions; when they set their mind on a goal, they pursue it with focus and resilience. obstacles only serve to fuel their determination - they achieve what they set out to do.
💼 1h scorpio (8°, 20°) and/or pluto people have difficulty trusting others or delegating responsibilities in professional settings.
💼 1h ruler in 1h often indicates others seeing them as a natural leader who is comfortable being in the spotlight.
💼 1h ruler in 1h indicates taking initiative in life. challenges are met head-on; they prefer to carve their own path rather than follow others.
💼 1h ruler in 11h people often like to be part of a group / surrounded by like-minded individuals. they may not be as productive alone as they are when around others.
💼 1h ruler in 11h people may naturally take on a leadership or prominent role in group settings. they often feel a sense of responsibility to organize / inspire collective efforts.
💼 1h ruler in 11h people's success often comes through collaboration, networking, and/or connecting with people who share their vision.
💼 aries (1°, 13°, 25°) mercury people's confidence is a strength, though they might occasionally speak without thinking things through, leading to misunderstandings and/or conflicts.
💼 aries (1°, 13°, 25°) mercury people's careers might involve starting something from scratch, whether it’s a business, initiative, and/or creative endeavor.
💼 aries (1°, 13°, 25°) mercury people are quick wits with sharp communication skills making them a formidable presence in professional debates/discussions. they make good defensive lawyers and/or politicians.
💼 sagittarius (9°, 21°) mercury people pursue careers or roles where they can continually learn and share knowledge. teaching, writing, public speaking, and/or mentoring are natural fits.
💼 sagittarius (9°, 21°) mercury people might struggle with sticking to one career path; they crave variety, exploration, and freedom. which often leads to frequent shifts or expansions in their professional life.
💼 sagittarius (9°, 21°) mercury people often spread themselves too thin because they pursue "too many" interests.
💼 mercury-pluto aspects often indicate their communication style being compelling and often holds a certain intensity that draws people in. they speak with authority - others are likely to feel that their words carry weight, even if when they don’t say much.
💼 people with mercury-pluto aspects are natural investigators, researchers, and/or strategists.
💼 mercury-pluto people have the uncanny ability to perceive the underlying motivations / hidden truths in situations; they are adept at reading people and understanding what’s really going on beneath the surface. they make great psychologists.
💼 asc positively aspecting nn people have the ability to attract people and opportunities that support their growth.

have ideas for new content? please use my “suggest a post topic” button!
return to nox's guide to metaphysics
return to the masterlist of planetary & object persona charts
© a-d-nox 2025 all rights reserved
#astrology#astro community#astro placements#astro chart#natal chart#astrology tumblr#persona chart#astro notes#astrology chart#astrology readings#astrology signs#astro#astro observations#astroblr#mc persona chart#mc#mc astrology
300 notes
·
View notes
Text
From Fear and Loathing: Closer to the Edge on Facebook
Heading to a “Hands Off!” protest this Saturday? Here’s everything you need to know — your rights, safety tips, and what to do if arrested.
On Saturday, April 5, people across the United States will gather for a coordinated day of resistance. From major cities to small towns, the “Hands Off!” protests are about drawing a hard line — against political overreach, creeping authoritarianism, and policies that strip away our rights and dignity.
Whether you’re marching in New York City, Dallas, Chicago, or a rural square in Nebraska, your presence matters. So does your preparation.
Here’s your nationwide guide to showing up — and staying safe while doing it.
KNOW YOUR RIGHTS (AND WRITE THEM ON YOUR ARM)
Before you arrive: Write the local legal support hotline number on your arm in permanent marker. In many cities, National Lawyers Guild (NLG) chapters will operate hotlines and send legal observers.
Say: “I am exercising my right to remain silent. I want a lawyer.”
Ask: “Am I being detained or am I free to go?”
If detained, remain silent.
If not, walk away calmly.
Legal observers (often in green hats/vests) are there to document police behavior — not to represent you legally. You can notify them if you witness abuse or misconduct.
WHAT TO BRING
Pack like you’re staying awhile and planning for anything:
Water and snacks
Face mask, hand sanitizer, and sunscreen
Phone with passcode lock (NOT Face ID/fingerprint)
External battery pack
Cash (for food, transit, emergencies)
Printed emergency contacts
Comfortable shoes, weather-appropriate clothing
Goggles or saline drops (in case of tear gas, depending on region)
Don’t bring:
Weapons (or anything that could be construed as one)
Illegal substances
Anything you wouldn’t want seized or photographed by law enforcement
STAY SAFE, STAY CALM, STAY NON-VIOLENT
Stick together. Stay with your group. Have a plan if separated.
Avoid confrontation. Ignore counter-protesters and agitators.
Film what matters. You have the legal right to record public events, including police activity — but don’t interfere.
De-escalate when possible. Your goal is to be heard, not baited.
Watch your surroundings. Know where you are and how to exit if needed.
If arrested:
Don’t resist.
Don’t talk beyond name and birthdate.
Wait for a lawyer.
Don’t sign anything without legal counsel.
PROTECT YOUR DATA
Phones are tools — and vulnerabilities.
Turn off Face ID and fingerprint unlock. Use a passcode.
Consider airplane mode during risky moments.
Back up photos/videos or use live stream apps like Instagram or Twitch to preserve footage.
Use encrypted messaging apps like Signal.
RESOURCES BY REGION
While every city differs, these national orgs often have local chapters or partners at major protests:
National Lawyers Guild: nlg.org
ACLU: aclu.org/know-your-rights
Mutual Aid Networks: Search “[Your City] Mutual Aid”
Bail Funds Directory: bailfunds.github.io
Legal Hotlines: Often listed on local protest pages or announced by organizers day-of
TRANSPORT + ACCESSIBILITY
Plan ahead: Some roads and transit lines may close or reroute.
Carpool or take transit when possible.
If you need ADA accommodations, contact local organizers in advance or ask staff at arrival points.
THIS IS BIGGER THAN A MARCH
This isn’t just a protest. It’s a warning flare — and a promise. That we won’t stand by while our rights are stripped. That we won’t let apathy win. That we see what’s happening — and we’re not afraid to raise hell, peacefully and powerfully.
So come prepared.
Come together.
And don’t let them scare you into silence.
Stay safe. Stay loud.
#april 5th#protest#hands off#us politics#usa politics#stay safe#protest safely#hands off protest#april 5 2025
116 notes
·
View notes
Text
Who Broke the Internet? Part II

I'm on a 20+ city book tour for my new novel PICKS AND SHOVELS. Catch me in PITTSBURGH on in THURSDAY (May 15) at WHITE WHALE BOOKS, and in PDX on Jun 20 at BARNES AND NOBLE with BUNNIE HUANG. More tour dates (London, Manchester) here.
"Understood: Who Broke the Internet?" is my new podcast for CBC about the enshittogenic policy decisions that gave rise to enshittification. Episode two just dropped: "ctrl-ctrl-ctrl":
https://www.cbc.ca/listen/cbc-podcasts/1353-the-naked-emperor/episode/16145640-ctrl-ctrl-ctrl
The thesis of the show is straightforward: the internet wasn't killed by ideological failings like "greed," nor by economic concepts like "network effects," nor by some cyclic force of history that drives towards "re-intermediation." Rather, all of these things were able to conquer the open, wild, creative internet because of policies that meant that companies that yielded to greed were able to harness network effects in order to re-intermediate the internet.
My enshittification work starts with the symptoms of enshittification, the procession of pathological changes we can observe as platform users and sellers. Stage one: platforms are good to their end users while locking them in. Stage two: platforms worsen things for those captive users in order to tempt in business customers – who they also lock in. Stage three: platforms squeeze those locked-in business customers (publishers, advertisers, performers, workers, drivers, etc), and leave behind only the smallest atoms of value that are needed to keep users and customers stuck to the system. All the value except for this mingy residue is funneled to shareholders and executives, and the system becomes a pile of shit.
This pattern is immediately recognizable as the one we've all experienced and continue to experience, from eBay taking away your right to sue when you're ripped off:
https://www.valueaddedresource.net/ebay-user-agreement-may-2025-arbitration/
Or Duolingo replacing human language instructors with AI, even though by definition language learners are not capable of identifying and correcting errors in AI-generated language instruction (if you knew more about a language than the AI, you wouldn't need Duolingo):
https://www.bloodinthemachine.com/p/the-ai-jobs-crisis-is-here-now
I could cite examples all day long, from companies as central as Amazon:
https://pluralistic.net/2022/11/28/enshittification/#relentless-payola
To smarthome niche products like Sonos:
https://www.reuters.com/business/retail-consumer/sonos-ceo-patrick-spence-steps-down-after-app-update-debacle-2025-01-13/
To professional tools like Photoshop:
https://pluralistic.net/2022/10/28/fade-to-black/#trust-the-process
To medical implants like artificial eyes:
https://pluralistic.net/2022/12/12/unsafe-at-any-speed/#this-is-literally-your-brain-on-capitalism
To the entire nursing profession:
https://pluralistic.net/2024/12/18/loose-flapping-ends/#luigi-has-a-point
To the cars on our streets:
https://pluralistic.net/2023/07/24/rent-to-pwn/#kitt-is-a-demon
And the gig workers who drive them:
https://pluralistic.net/2023/04/12/algorithmic-wage-discrimination/#fishers-of-men
There is clearly an epidemic – a pandemic – of enshittification, and cataloging the symptoms is important to tracking the spread of the disease. But if we're going to do something to stem the tide, we need to identify the contagion. What caused enshittification to take root, what allows it to spread, and who was patient zero?
That's where "Understood: Who Broke the Internet?" comes in:
https://www.cbc.ca/listen/cbc-podcasts/1353-the-naked-emperor
At root, "enshittification" is a story about constraints – not the bad things that platforms are doing now, but rather, the forces that stopped them from doing those things before. There are four of those constraints:
I. Competition: When we stopped enforcing antitrust law, we let companies buy their competitors ("It is better to buy than to compete" -M. Zuckerberg). That insulated companies from market-based punishments for enshittification, because a handful of large companies can enshittify in lockstep, matching each other antifeature for antifeature. You can't shop your way out of a monopoly.
II. Regulation: The collapse of tech into "five giant websites, each filled with screenshots of the other four" (-T. Eastman) allowed the Big Tech cartel to collude to capture its regulators. Tech companies don't have to worry about governments stepping in to punish them for enshittificatory tactics, because the government is on Big Tech's side.
III. Labor: When tech workers were scarce and companies competed fiercely for their labor, they were able to resist demands to enshittify the products they created and cared about. But "I fight for the user," only works if you have power over your boss, and scarcity-derived power is brittle, crumbling as soon as labor supply catches up with demand (this is why tech bosses are so excited to repeat the story that AI can replace programmers – whether or not it's true, it is an effective way to gut scarcity-driven tech worker power). Without unions, tech worker power vanished.
IV. Interoperability: The same digital flexibility that lets tech companies pull the enshittifying bait-and-switch whereby prices, recommendations, and costs are constantly changing cuts both ways. Digital toolsmiths have always thwarted enshittification with ad- and tracker-blockers, alternative clients, scrapers, etc. In a world of infinitely flexible computers, every 10' high pile of shit summons a hacker with an 11' ladder.
This week's episode of "Who Broke the Internet?" focuses on those IP laws, specifically, the legislative history of the Digital Millennium Copyright Act, a 1998 law whose Section 1201 bans any kind of disenshittifying mods and hacks.
We open the episode with Dmitry Skylarov being arrested at Def Con in 2001, after he gave a presentation explaining how he defeated the DRM on Adobe ebooks, so that ebook owners could move their books between devices and open them with different readers. Skylarov was a young father of two, a computer scientist, who found himself in the FBI's clutches, facing a lengthy prison sentence for telling an American audience that Adobe's product was defective, and explaining how to exploit its defects to let them read their own books.
Skylarov was the first person charged with a felony under DMCA 1201, and while the fact of his arrest shocked technically minded people at the time, it was hardly a surprise to anyone familiar with DMCA 1201. This was a law acting exactly as intended.
DMCA 1201 has its origins in the mid-1990s, when Al Gore was put in charge of the National Information Infrastructure program to demilitarize the internet and open it for civilian use (AKA the "Information Superhighway"). Gore came into conflict with Bruce Lehman, Bill Clinton's IP Czar, who proposed a long list of far-ranging, highly restrictive rules for the new internet, including an "anticircumvention" rule that would ban tampering with digital locks.
This was a pretty obscure and technical debate, but some people immediately grasped its significance. Pam Samuelson, the eminent Berkeley copyright scholar, raised the alarm, rallying a diverse coalition against Lehman's proposal. They won – Gore rejected Lehman's ideas and sent him packing. But Lehman didn't give up easily – he flew straight to Geneva, where he arm-twisted the UN's World Property Organization into passing two "internet treaties" that were virtually identical to the proposals that Gore had rejected. Then, Lehman went back to the USA and insisted that Congress had to overrule Gore and live up to its international obligations by adopting his law. As Lehman said – on some archival tape we were lucky to recover – he did "an end-run around Congress."
Lehman had been warned, in eye-watering detail, about the way that his rule protecting digital locks would turn into a system of private laws. Once a device was computerized, all a manufacturer needed to do was wrap it in a digital lock, and in that instant, it would become a literal felony of use that digital device in ways the manufacturer didn't like. It didn't matter if you were legally entitled to do something, like taking your car to an independent mechanic, refilling your ink cartridge, blocking tracking on Instagram, or reading your Kindle books on a Kobo device. The fact that tampering with digital locks was a crime, combined with the fact that you had to get around a digital lock to do these things, made these things illegal.
Lehman knew that this would happen. The fact that his law led – in just a few short years – to a computer scientist being locked up by the FBI for disclosing defects in a widely used consumer product, was absolutely foreseeable at the time Lehman was doing his Geneva two-step and "doing an end-run around Congress."
The point is that there were always greedy bosses, and since the turn of the century, they'd had the ability to use digital tools to enshittify their services. What changed wasn't the greed – it was the law. When Bruce Lehman disarmed every computer user, he rendered us helpless against the predatory instincts of anyone with a digital product or service, at a moment when everything was being digitized.
This week's episode recovers some of the lost history, an act I find very liberating. It's easy to feel like you're a prisoner of destiny, whose life is being shaped by vast, impersonal forces. But the enshittificatory torments of the modern digital age are the result of specific choices, made by named people, in living memory. Knowing who did this to us, and what they did, is the first step to undoing it.
In next week's episode, we'll tell you about the economic theories that created the "five giant websites filled with screenshots of the other four." We'll tell you who foisted those policies on us, and show you the bright line from them to the dominance of companies like Amazon. And we'll set up the conclusion, where we'll tell you how we'll wipe out the legacies of these monsters of history and kill the enshitternet.
Get "Understood: Who Broke the Internet?" in whatever enshittified app you get your podcasts on (or on Antennapod, which is pretty great). Here's the RSS:
https://www.cbc.ca/podcasting/includes/nakedemperor.xml
If you'd like an essay-formatted version of this post to read or share, here's a link to it on pluralistic.net, my surveillance-free, ad-free, tracker-free blog:
https://pluralistic.net/2025/05/13/ctrl-ctrl-ctrl/#free-dmitry
#podcasts#enshittification#bruce lehman#dmitry syklarov#defcon#dmca#dmca 1201#cbc#cbc understood#understood#pluralistic#dmitry skylarov
97 notes
·
View notes
Text
Unveiling Network Observability: The Key to Optimal IT Infrastructure Performance
In today’s digitally driven world, the IT network is the backbone of any organization, supporting critical applications, facilitating communication, and enabling efficient operations. As network topologies become increasingly complex and dynamic, maintaining the reliability and performance of this essential infrastructure presents significant challenges. Traditional monitoring tools, which rely…
View On WordPress
#IT Infrastructure#Network Management#network observability#network observability operator#network observability tools#network performance#Network Performance Monitoring#Observability Platform#Observability Tools
0 notes
Text
In late January, a warning spread through the London-based Facebook group Are We Dating the Same Guy?—but this post wasn’t about a bad date or a cheating ex. A connected network of male-dominated Telegram groups had surfaced, sharing and circulating nonconsensual intimate images of women. Their justification? Retaliation.
On January 23, users in the AWDTSG Facebook group began warning about hidden Telegram groups. Screenshots and TikTok videos surfaced, revealing public Telegram channels where users were sharing nonconsensual intimate images. Further investigation by WIRED identified additional channels linked to the network. By scraping thousands of messages from these groups, it became possible to analyze their content and the patterns of abuse.
AWDTSG, a sprawling web of over 150 regional forums across Facebook alone, with roughly 3 million members worldwide, was designed by Paolo Sanchez in 2022 in New York as a space for women to share warnings about predatory men. But its rapid growth made it a target. Critics argue that the format allows unverified accusations to spiral. Some men have responded with at least three defamation lawsuits filed in recent years against members, administrators, and even Meta, Facebook’s parent company. Others took a different route: organized digital harassment.
Primarily using Telegram group data made available through Telemetr.io, a Telegram analytics tool, WIRED analyzed more than 3,500 messages from a Telegram group linked to a larger misogynistic revenge network. Over 24 hours, WIRED observed users systematically tracking, doxing, and degrading women from AWDTSG, circulating nonconsensual images, phone numbers, usernames, and location data.
From January 26 to 27, the chats became a breeding ground for misogynistic, racist, sexual digital abuse of women, with women of color bearing the brunt of the targeted harassment and abuse. Thousands of users encouraged each other to share nonconsensual intimate images, often referred to as “revenge porn,” and requested and circulated women’s phone numbers, usernames, locations, and other personal identifiers.
As women from AWDTSG began infiltrating the Telegram group, at least one user grew suspicious: “These lot just tryna get back at us for exposing them.”
When women on Facebook tried to alert others of the risk of doxing and leaks of their intimate content, AWDTSG moderators removed their posts. (The group’s moderators did not respond to multiple requests for comment.) Meanwhile, men who had previously coordinated through their own Facebook groups like “Are We Dating the Same Girl” shifted their operations in late January to Telegram's more permissive environment. Their message was clear: If they can do it, so can we.
"In the eyes of some of these men, this is a necessary act of defense against a kind of hostile feminism that they believe is out to ruin their lives," says Carl Miller, cofounder of the Center for the Analysis of Social Media and host of the podcast Kill List.
The dozen Telegram groups that WIRED has identified are part of a broader digital ecosystem often referred to as the manosphere, an online network of forums, influencers, and communities that perpetuate misogynistic ideologies.
“Highly isolated online spaces start reinforcing their own worldviews, pulling further and further from the mainstream, and in doing so, legitimizing things that would be unthinkable offline,” Miller says. “Eventually, what was once unthinkable becomes the norm.”
This cycle of reinforcement plays out across multiple platforms. Facebook forums act as the first point of contact, TikTok amplifies the rhetoric in publicly available videos, and Telegram is used to enable illicit activity. The result? A self-sustaining network of harassment that thrives on digital anonymity.
TikTok amplified discussions around the Telegram groups. WIRED reviewed 12 videos in which creators, of all genders, discussed, joked about, or berated the Telegram groups. In the comments section of these videos, users shared invitation links to public and private groups and some public channels on Telegram, making them accessible to a wider audience. While TikTok was not the primary platform for harassment, discussions about the Telegram groups spread there, and in some cases users explicitly acknowledged their illegality.
TikTok tells WIRED that its Community Guidelines prohibit image-based sexual abuse, sexual harassment, and nonconsensual sexual acts, and that violations result in removals and possible account bans. They also stated that TikTok removes links directing people to content that violates its policies and that it continues to invest in Trust and Safety operations.
Intentionally or not, the algorithms powering social media platforms like Facebook can amplify misogynistic content. Hate-driven engagement fuels growth, pulling new users into these communities through viral trends, suggested content, and comment-section recruitment.
As people caught notice on Facebook and TikTok and started reporting the Telegram groups, they didn’t disappear—they simply rebranded. Reactionary groups quickly emerged, signaling that members knew they were being watched but had no intention of stopping. Inside, messages revealed a clear awareness of the risks: Users knew they were breaking the law. They just didn’t care, according to chat logs reviewed by WIRED. To absolve themselves, one user wrote, “I do not condone im [simply] here to regulate rules,” while another shared a link to a statement that said: “I am here for only entertainment purposes only and I don’t support any illegal activities.”
Meta did not respond to a request for comment.
Messages from the Telegram group WIRED analyzed show that some chats became hyper-localized, dividing London into four regions to make harassment even more targeted. Members casually sought access to other city-based groups: “Who’s got brum link?” and “Manny link tho?”—British slang referring to Birmingham and Manchester. They weren’t just looking for gossip. “Any info from west?” one user asked, while another requested, “What’s her @?”— hunting for a woman’s social media handle, a first step to tracking her online activity.
The chat logs further reveal how women were discussed as commodities. “She a freak, I’ll give her that,” one user wrote. Another added, “Beautiful. Hide her from me.” Others encouraged sharing explicit material: “Sharing is caring, don’t be greedy.”
Members also bragged about sexual exploits, using coded language to reference encounters in specific locations, and spread degrading, racial abuse, predominantly targeting Black women.
Once a woman was mentioned, her privacy was permanently compromised. Users frequently shared social media handles, which led other members to contact her—soliciting intimate images or sending disparaging texts.
Anonymity can be a protective tool for women navigating online harassment. But it can also be embraced by bad actors who use the same structures to evade accountability.
"It’s ironic," Miller says. "The very privacy structures that women use to protect themselves are being turned against them."
The rise of unmoderated spaces like the abusive Telegram groups makes it nearly impossible to trace perpetrators, exposing a systemic failure in law enforcement and regulation. Without clear jurisdiction or oversight, platforms are able to sidestep accountability.
Sophie Mortimer, manager of the UK-based Revenge Porn Helpline, warned that Telegram has become one of the biggest threats to online safety. She says that the UK charity’s reports to Telegram of nonconsensual intimate image abuse are ignored. “We would consider them to be noncompliant to our requests,” she says. Telegram, however, says it received only “about 10 piece of content” from the Revenge Porn Helpline, “all of which were removed.” Mortimer did not yet respond to WIRED’s questions about the veracity of Telegram’s claims.
Despite recent updates to the UK’s Online Safety Act, legal enforcement of online abuse remains weak. An October 2024 report from the UK-based charity The Cyber Helpline shows that cybercrime victims face significant barriers in reporting abuse, and justice for online crimes is seven times less likely than for offline crimes.
"There’s still this long-standing idea that cybercrime doesn’t have real consequences," says Charlotte Hooper, head of operations of The Cyber Helpline, which helps support victims of cybercrime. "But if you look at victim studies, cybercrime is just as—if not more—psychologically damaging than physical crime."
A Telegram spokesperson tells WIRED that its moderators use “custom AI and machine learning tools” to remove content that violates the platform's rules, “including nonconsensual pornography and doxing.”
“As a result of Telegram's proactive moderation and response to reports, moderators remove millions of pieces of harmful content each day,” the spokesperson says.
Hooper says that survivors of digital harassment often change jobs, move cities, or even retreat from public life due to the trauma of being targeted online. The systemic failure to recognize these cases as serious crimes allows perpetrators to continue operating with impunity.
Yet, as these networks grow more interwoven, social media companies have failed to adequately address gaps in moderation.
Telegram, despite its estimated 950 million monthly active users worldwide, claims it’s too small to qualify as a “Very Large Online Platform” under the European Union’s Digital Service Act, allowing it to sidestep certain regulatory scrutiny. “Telegram takes its responsibilities under the DSA seriously and is in constant communication with the European Commission,” a company spokesperson said.
In the UK, several civil society groups have expressed concern about the use of large private Telegram groups, which allow up to 200,000 members. These groups exploit a loophole by operating under the guise of “private” communication to circumvent legal requirements for removing illegal content, including nonconsensual intimate images.
Without stronger regulation, online abuse will continue to evolve, adapting to new platforms and evading scrutiny.
The digital spaces meant to safeguard privacy are now incubating its most invasive violations. These networks aren’t just growing—they’re adapting, spreading across platforms, and learning how to evade accountability.
57 notes
·
View notes
Note
I don’t have the most complete knowledge of either piece of media, but my two most recent interests are Assassin’s Creed and Fullmetal Alchemist: Brotherhood.
I’m not sure how the standard Desmond Isekai would go, but I feel like Edward Elric as an Assassin would be nuts (regardless of if he can do alchemy or not).
It would be fun to make Edward an Assassin but, considering Desmond’s personality, Desmond would probably be more inclined to teach people who do not know how to use alchemy (or can’t use alchemy in general). They would become the basis of his Brotherhood because, once Desmond realized that he’s in another world, he’d definitely try to build his own network.
Especially once he noticed just how much power the military wielded in Amestrian.
And then he learns of the serial killer Scar and investigate why Scar was killing state alchemists specially which leads to him uncovering the truth about the supposed Ishvalan civil war.
And that’s how Desmond and his Brotherhood become a third party. Whether alchemist or not, they assassinate those who use their power to harm the innocent. This, of course, causes him to be in the opposite sides with the Elric brothers.
It doesn’t help that he taught his Assassins how to take down alchemists even though they themselves do not use alchemy (a combination of Assassin tools, skills of an Assassin and a bit of help from 21st century knowledge) but Desmond himself do not condone Scar’s more destructive way of doing things and it’s a toss up if Scar is meant to be an assassination target or a possible ‘recruit’.
Mustang himself believes that the Assassin Brotherhood (as they call themselves) would come for him sooner or later considering many of the assassinated alchemists also participated in the Ishvalan civil war.
That’s why there are rumors that Desmond himself is an Ishvalan (which isn’t true but a few Assassins in his Brotherhood is Ishvalan).
The Elric brothers only see him in the shadows but Edward tried to fight him because, as far as he knows, the Brotherhood was killing alchemists in general (there’s a lot of hushhush about the bad things the targets have done). Edward absolutely transformed his metal arm to a hidden blade once and Desmond took that as an insult while Edward only did it because he realized it was the best weapon at the heat of the moment so there's a bit of 'bad blood' between them.
And then there’s the homunculi who are interested in him but seem to not do anything but observe him.
They know he’s not of this world and there might be a possibility that The Truth led him into this world.
…
Or…
And Desmond is calling bullshit on this.
Lust may or may not have implied that Desmond is a homunculus by the name of ‘Acedia’.
#assassin's creed#desmond miles#ask and answer#teecup writes/has a plot#fic idea: assassin's creed#fic idea: full metal alchemist#desmond is the ultimate isekai protagonist#full metal alchemist#fic idea: crossover
145 notes
·
View notes
Note
Gaty!! didja get any intresting information from the "exitors" ??
- 🍁Maple Anon
[OOG IM SO SORRY THIS TOOK SO LONG I HAD TO PROCESS TPOT 11 WHEN IT CAME OUT IM STILL ON AN AUTISM HIGH FROM IT]
ALRIGHT!! I've gotten what I can from the EXITors and compiled all of my notes, it's time for me to show my findings on!!
The EXIT!
So what IS the EXIT?
The best thing I can gather having not been there myself, is that it's an extra-dimensional space that exists within Four. Whenever something is eaten (or... in Four's words "zooped") by Four, they shrink down to accompany the initial "space" of Four's mouth, AKA the only place in his body that is closest to following the laws of Physics... Once you enter that door, things get WAY stranger....
I should also preface that we don't know for sure if every algebralien has such a space, as we have only observed these in Four, who seems to have far more power, or at least.... he decides to use far more power than other algebraliens... It's entirely possible that Four is the only one who has the ability to house a space like this!
LAYER ZERO: The Entrance
Diagram legend:
Four's mouth, one of the entrances to the EXIT. Appears much, MUCH higher up once anything enters Layer 0. This diagram does not show the true depth of how far the floor is from Four's mouth.
Four's OTHER mouth. His main tool of contestant transportation when contestants get eliminated... It's not very visible at all, you'd have to pull back Four's mane to even see it, and even then it's also invisible from the other side!
Skin?? Layer?? Honestly I don't know what makes up algebralien skin aside from the fact that in Four's case it acts as the catalyst for the initial "shrinkage" of anything that enters the space... It also seems to give Four a weakness to fire!
The EXIT door... The entrance to the rabbit-hole...
Strange trees. I don't fully know why these growths populate this area and beyond, as they don't seem to have any sensing function such as taste buds or stomach cilia, but I believe they were the first creations Four practiced on when constructing his inner world... he does think about himself quite often.
LAYER ONE: The Classrooms
Starting with a simple algebra classroom, Layer One is a seemingly endless collection of rooms down a long, winding network of hallways that range from other typical classrooms, to portals to areas outside of the EXIT, and even strange, nonsensical collections of things that are.. well... according to Pencil, "don't deserve a description"...
This layer was the only one accessible to the EXITors for months on end before Liy decided to take a peek behind the curtain... Since I believe the EXIT's vast characteristics were created from personal aspects of Four, it makes me think of just how much Four keeps hidden away about himself... Why does he like school so much??
LAYER TWO: The Fourest
Feeling claustrophobic? Take a trip to the scenic and expansive Fourest! I consider this a bit of a "hub" of the EXIT, as it seems like the most widespread place to put different entrances to other, deeper areas, as well as, of course, the pathway out...
Compared to the classroom, this area is the most "organic" in terms of literally being comprised of Four... The classrooms themselves contain a percent of material created from his own body, but it seems a lot has been taken from outside and placed within... This area, however, is pretty much all him. its thanks to this area that I was able to take some small samples stuck to the EXITors clothing.. and i am SO excited to study it! Ahh!!
LAYER THREE: Below...?
[can you tell this is when mod's hand started to get tired/lh]
The descriptions I got from Match, Liy, and Stapy were pretty... odd... to say the least for this wacky pocket dimension, and its certainly where my knowledge of the EXIT seems to come to a close, as the closest the EXITors got to any deeper level was this strange little castle full of even stranger secrets.... You must admit, Four might be cruel but he has an eye for architecture!
Out of the other layers, this one seems to be a combination of both Four material and outside material, making me wonder if this is where Four keeps his best kept secrets or... maybe even his insecurities?
ADDITIONAL NOTES:
Oh yeah... I heard about this... thing that some of the EXITors encountered... From what I know it seems to be simply another part of Four rather than a thinking creature of its own, but it's certainly hard to say!
I'd like to give a thank-you to Pencil, Match, Stapy, Liy, David, and 8-Ball for your contributions to my research!!
...and an apology to Bracelety, Dora, and Firey Jr for er... bringing up such a frustrating and-- well... traumatic event for this information--
...While I must admit I don't enjoy the fact that the EXIT left these fellow contestants a pretty awful impression of algebraliens, I really am glad we have them back!!
PHEW!!! Now that I have most of my information on the EXIT finally on here, time to get back to some of the other questions I got!!
#this took me so lo n g i hope yall enhoy ourhtidgg#xfohv#tpot#asks#tpot 11#bfb four#tpot gaty#gaty tpot#the exitors#bfdi#osc#osc community#osc art#object show fanart#algebraliens#algebralien
70 notes
·
View notes
Text
…Pallas in the houses…
Pallas through the houses shows how and where your brain naturally sees patterns, solves problems, and defends what matters. It’s your built-in strategist, often working in the background through intuition, logic, or observation—this is the part of you that “just gets it.”
1st House – The walking strategist
You naturally read situations fast and lead with sharp instincts—people may feel like you’re always five steps ahead. Your mind and identity are fused; you can spot the game, make the move, and stay calm under pressure.
2nd House – The value-based problem solver
You’re great at figuring out how to make things last, make things make sense, or make money. You’re wise when it comes to worth—whether that’s self-worth, price tags, or how to build real security.
3rd House – The verbal pattern genius
You’re sharp with words, ideas, and reading the room—you could probably win a debate with your eyes closed. You solve problems by talking it out, explaining it clearly, or connecting dots no one else sees.
4th House – The emotional strategist
You instinctively know how people feel and how to protect what’s sacred. You’re the person who can sense emotional patterns in family, memory, or childhood dynamics before anyone else picks up on them.
5th House – The creative chess master
You use art, humor, flirting, or performance as tools to read and shift energy. You solve problems by shining your light in smart ways—and you’re great at making others feel seen or outwitted, depending on your mood.
6th House – The low-key expert
You’re a behind-the-scenes brain who knows how to fix, tweak, heal, and improve things quietly but powerfully. Your mind thrives in routines, systems, health practices, or jobs that require smart efficiency.
7th House – The relationship whisperer
You can see through people, understand dynamics instantly, and know exactly how to handle conflict without making it a war. You’re a master at reading between the lines in partnerships—business or romantic.
8th House – The emotional hacker
You’re psychologically sharp—you just know what’s going on under the surface. Your intuition is next-level, and you often solve deep, taboo, or emotionally messy problems like it’s nothing.
9th House – The big-picture thinker
You’re gifted at seeing patterns in belief systems, cultures, or worldviews. You solve things with a zoomed-out view—philosophy, teaching, spirituality, or calling out BS with facts and faith.
10th House – The public mastermind
Your wisdom shows up in how you move through your career, reputation, or leadership role. You’re seen as someone who “has it together,” because you apply smart strategies to your goals and grind.
11th House – The visionary connector
You’re brilliant in groups, ideas, or future plans—you just get networks, friendships, and what society needs. Your brain is wired for innovation and creating smarter systems for collective growth.
12th House – The intuitive mystic
Your wisdom comes from dreams, subtle energy, or divine downloads—you solve problems through gut feelings, not spreadsheets. You might not always explain how you know things… but you always do.
#astro notes#astrology#birth chart#astro observations#astro community#astrology observations#astrology community#astrology degrees#astro#astroblr#astrologyposts#astrology content#asteroids in astrology#astrology aspects#astrology insights
301 notes
·
View notes
Text
Day 22 (2/2)
Plainsong

I was feeling aimless, hanging around Plainsong, trading supplies back and forth to lighten my load. Just as I was tossing up whether it was worth forging west as soon as possible to target Regalla's forces at their source, Gaia's voice came through my Focus.
She's got something. Finally. I can't complain—she's had a lot to do this past week, sifting through centuries of data, instantiating herself in a degraded, under-equipped environment...and searching for mutated, missing pieces of herself that likely don't want to be found. Well, she's found not one, but three. Unfortunately, she's yet to pinpoint their locations precisely, but all lie west of the mountains. Just where I was planning to go.
I left Plainsong right away.


I pushed my mount full pelt across the blighted fields and up the craggy slopes to the RCC. From its imposing peak, it was clear that the landscape was engineered to centre the site. From there, at the highest point overlooking both east and west, we were meant to observe these lands as they thrived under Gaia's stewardship. It was her vision when shaping the facility, I'm sure. We'll make it real yet.
A quick rest partway up the cliffside, then I pressed on.


The temperature dropped sharply in the heights. Waterfalls grew sluggish, stuck is a slushy medium between water and ice. Fortunately, Varl and Zo had set up a bonfire beside the facility door, embedded in the side of the mountain. There are no roads here, I doubt anyone will spot it. An unforgiving climb, with only a locked door at the end as reward. We should be safe here.


I went straight to Gaia, and saw no sign of Varl and Zo on my way through. She stood in the centre of the holographic theatre, just as I'd left her, and it was hard not to think of her as a person, but as a mind spread through every corner of this facility, through the repair bay below, the signal towers...It's incredible.
Using those signal towers, the networking and cryptographic tools of Minerva, Gaia had located the presence of three subfunctions in the west—Aether, Poseidon, and Demeter. Air, Water, Earth. A nice triad, and the most useful of the missing functions, apart from Hephaestus itself.

With them, Gaia would have the tools and knowledge at her disposal to purify and moderate the air, water, and vegetation. That could mean an end to the erratic weather—the storms, quakes, floods, and the blight itself. The other missing subfunctions, in contrast, couldn't do us all that much good now that the biosphere was already established. Artemis and Eleuthia had already served their purpose, populating the lands with wildlife and humans. The knowledge and utility contained within those subfunctions were still invaluable, and reintegrating with them would boost Gaia's processing density too, but we can do without them for now. Who knows, maybe Far Zenith has them already.
It wasn't all good news. Gaia didn't yet have a clear fix on any of the subfunctions' locations. The activity she had detected was sporadic and diffuse, encrypted to a high degree. She knew that they lay in the west within a distance of about 200 miles. Too large an area to search aimlessly, but I at least know I'll have to look for ancient facilities equipped with powerful computing abilities—according to Gaia, likely with an original purpose adjacent to the subfunction's domain.
So, three Old World ruins to locate: one connected to the air, one to water, and one to plant life. Without Apollo, Gaia has no knowledge of the available candidates. That subfunction held much of her own auxiliary data reserves, too.

As I make my journey, Gaia will be able to analyse all data I come across while continuing her outward search through Minerva's towers. Hephaestus really was the cornerstone of her capabilities—without machines, she can't roam, interact, search in any meaningful way beyond scraping signal activity lancing across degraded web strands. I'll admit, I'd expected Gaia to reveal some miracle of power. It hadn't occurred to me, when I woke her here, that she would be so impaired. It doesn't matter; I'll restore her to what she once was, then she'll do the same to the world.

I uploaded the survey drone module I'd snagged from the old military base near Plainsong. And there it was rendered in perfect light and shade. It felt like real sunlight beating down; tricked my body and mind into simulating warmth. Another patch of land for Gaia to watch over. A far cry from the world, but she was appreciative of it all the same.
Gaia informed me that Varl and Zo had left the base together some hours ago, and though she offered, I told her not to call them back. I'll spend the night, then be on my way. I don't want to bring them with me. If I can sneak through before they return, maybe they won't follow.
And no, it's not the same as what I did to Varl back in Meridian. Gaia's here to teach him. I've brought him into the fold; job done. If my life needs saving, Gaia's here keeping track of me.

Varl and Zo haven't been idle here this past week. Apart from learning loads from Gaia about the Old World and how she came to be, they've been fixing up the RCC. With Gaia's instruction, gathering parts from the wilds, they've repaired the plumbing! Working showers and lavatories! Oh great conveniences of the Old Ones.
No heated water, obviously, as I know was the norm, but still, the sanitation mechanisms are up and running, filtering the water and flushing out waste. Not sure where to. Hopefully not the river.

I stopped by the lab, uploading the data I'd scraped from Cauldron Mu's core. The terminal told me the parts I'd need to slot into its fabricator for analysis to complete the corrupted overrides. I noted them down on my Focus; onto the backlog they go.

Still no sign of Varl and Zo. I settled down in one of the beds in the barracks. The sheets were eaten through by mould and time, but still decently soft. Tomorrow, I forge into Tenakth territory.
12 notes
·
View notes