#Adversarial attacks
Explore tagged Tumblr posts
Text
Challenges and Risks of Artificial Intelligence in Electronic Warfare
Sfetcu, Nicolae (2025), Challenges and Risks of Artificial Intelligence in Electronic Warfare, IT & C, 4:1, pag, xxx, Abstract Artificial Intelligence (AI) has emerged as a disruptive force in electronic warfare (EW), enabling advanced signal processing, threat recognition, and real-time decision-making. However, the integration of AI into EW systems introduces a range of challenges and risks.…
0 notes
Text
AI Revolution: Transforming Identity Verification and Authentication
Artificial Intelligence (AI) is transforming many aspects of our daily lives, and one of the most crucial fields it is revolutionizing is identity verification and authentication. These processes are critical in today’s digital age, where identity theft, fraud, and data breaches have become major concerns. Leveraging AI in this space offers increased accuracy, scalability, and security. This…
#Adversarial attacks#artificial intelligence#cybersecurity#IDAM#Identity and Access Management#Machine learning#technology
0 notes
Text
The Hidden Enemy: Understanding the Growing Threat of Adversarial Attacks on AI Systems
(Images made by author with MS Bing Image Creator) While artificial intelligence (AI) holds the promise of transformative advancements, its vulnerability to malicious exploitation remains a pressing concern. Adversarial attacks, aimed at compromising AI systems, jeopardize their security and reliability. This post explores attack techniques and strategies to fortify AI resilience against these…

View On WordPress
#Adversarial Attacks#Adversarial training#AI security#data extraction#Data Poisoning#Ensemble methods#Extraction Attacks#ML resilience
0 notes
Text
Are the means of computation even seizable?

I'm on a 20+ city book tour for my new novel PICKS AND SHOVELS. Catch me in PITTSBURGH in TOMORROW (May 15) at WHITE WHALE BOOKS, and in PDX on Jun 20 at BARNES AND NOBLE with BUNNIE HUANG. More tour dates (London, Manchester) here.
Something's very different in tech. Once upon a time, every bad choice by tech companies – taking away features, locking out mods or plugins, nerfing the API – was countered, nearly instantaneously, by someone writing a program that overrode that choice.
Bad clients would be muscled aside by third-party clients. Locked bootloaders would be hacked and replaced. Code that confirmed you were using OEM parts, consumables or adapters would be found and nuked from orbit. Weak APIs would be replaced with muscular, unofficial APIs built out of unstoppable scrapers running on headless machines in some data-center. Every time some tech company erected a 10-foot enshittifying fence, someone would show up with an 11-foot disenshittifying ladder.
Those 11-foot ladders represented the power of interoperability, the inescapable bounty of the Turing-complete, universal von Neumann machine, which, by definition, is capable of running every valid program. Specifically, they represented the power of adversarial interoperability – when someone modifies a technology against its manufacturer's wishes. Adversarial interoperability is the origin story of today's tech giants, from Microsoft to Apple to Google:
https://www.eff.org/deeplinks/2019/10/adversarial-interoperability
But adversarial interop has been in steady decline for the past quarter-century. These big companies moved fast and broke things, but no one is returning the favor. If you ask the companies what changed, they'll just smirk and say that they're better at security than the incumbents they disrupted. The reason no one's hacked up a third-party iOS App Store is that Apple's security team is just so fucking 1337 that no one can break their shit.
I think this is nonsense. I think that what's really going on is that we've made it possible for companies to design their technologies in such a way that any attempt at adversarial interop is illegal.
"Anticircumvention" laws like Section 1201 of the 1998 Digital Millennium Copyright Act make bypassing any kind of digital lock (AKA "Digital Rights Management" or "DRM") very illegal. Under DMCA, just talking about how to remove a digital lock can land you in prison for 5 years. I tell the story of this law's passage in "Understood: Who Broke the Internet," my new podcast series for the CBC:
https://pluralistic.net/2025/05/08/who-broke-the-internet/#bruce-lehman
For a quarter century, tech companies have aggressively lobbied and litigated to expand the scope of anticircumvention laws. At the same time, companies have come up with a million ways to wrap their products in digital locks that are a crime to break.
Digital locks let Chamberlain, a garage-door opener monopolist block all third-party garage-door apps. Then, Chamberlain stuck ads in its app, so you have to watch an ad to open your garage-door:
https://pluralistic.net/2023/11/09/lead-me-not-into-temptation/#chamberlain
Digital locks let John Deere block third-party repair of its tractors:
https://pluralistic.net/2022/05/08/about-those-kill-switched-ukrainian-tractors/
And they let Apple block third-party repair of iPhones:
https://pluralistic.net/2022/05/22/apples-cement-overshoes/
These companies built 11-foot ladders to get over their competitors' 10-foot walls, and then they kicked the ladder away. Once they were secure atop their walls, they committed enshittifying sins their fallen adversaries could only dream of.
I've been campaigning to abolish anticircumvention laws for the past quarter-century, and I've noticed a curious pattern. Whenever these companies stand to lose their legal protections, they freak out and spend vast fortunes to keep those protections intact. That's weird, because it strongly implies that their locks don't work. A lock that works works, whether or not it's illegal to break that lock. The reason Signal encryption works is that it's working encryption. The legal status of breaking Signal's encryption has nothing to do with whether it works. If Signal's encryption was full of technical flaws but it was illegal to point those flaws out, you'd be crazy to trust Signal.
Signal does get involved in legal fights, of course, but the fights it gets into are ones that require Signal to introduce defects in its encryption – not fights over whether it is legal to disclose flaws in Signal or exploit them:
https://pluralistic.net/2023/03/05/theyre-still-trying-to-ban-cryptography/
But tech companies that rely on digital locks manifestly act like their locks don't work and they know it. When the tech and content giants bullied the W3C into building DRM into 2 billion users' browsers, they categorically rejected any proposal to limit their ability to destroy the lives of people who broke that DRM, even if it was only to add accessibility or privacy to video:
https://www.eff.org/deeplinks/2017/09/open-letter-w3c-director-ceo-team-and-membership
The thing is, if the lock works, you don't need the legal right to destroy the lives of people who find its flaws, because it works.
Do digital locks work? Can they work? I think the answer to both questions is a resounding no. The design theory of a digital lock is that I can provide you with an encrypted file that your computer has the keys to. Your computer will access those keys to decrypt or sign a file, but only under the circumstances that I have specified. Like, you can install an app when it comes from my app store, but not when it comes from a third party. Or you can play back a video in one kind of browser window, but not in another one. For this to work, your computer has to hide a cryptographic key from you, inside a device you own and control. As I pointed out more than a decade ago, this is a fool's errand:
https://memex.craphound.com/2012/01/10/lockdown-the-coming-war-on-general-purpose-computing/
After all, you or I might not have the knowledge and resources to uncover the keys' hiding place, but someone does. Maybe that someone is a person looking to go into business selling your customers the disenshittifying plugin that unfucks the thing you deliberately broke. Maybe it's a hacker-tinkerer, pursuing an intellectual challenge. Maybe it's a bored grad student with a free weekend, an electron-tunneling microscope, and a seminar full of undergrads looking for a project.
The point is that hiding secrets in devices that belong to your adversaries is very bad security practice. No matter how good a bank safe is, the bank keeps it in its vault – not in the bank-robber's basement workshop.
For a hiding-secrets-in-your-adversaries'-device plan to work, the manufacturer has to make zero mistakes. The adversary – a competitor, a tinkerer, a grad student – only has to find one mistake and exploit it. This is a bedrock of security theory: attackers have an inescapable advantage.
So I think that DRM doesn't work. I think DRM is a legal construct, not a technical one. I think DRM is a kind of magic Saran Wrap that manufacturers can wrap around their products, and, in so doing, make it a literal jailable offense to use those products in otherwise legal ways that their shareholders don't like. As Jay Freeman put it, using DRM creates a new law called "Felony Contempt of Business Model." It's a law that has never been passed by any legislature, but is nevertheless enforceable.
In the 25 years I've been fighting anticircumvention laws, I've spoken to many government officials from all over the world about the opportunity that repealing their anticircumvention laws represents. After all, Apple makes $100b/year by gouging app makers for 30 cents on ever dollar. Allow your domestic tech sector to sell the tools to jailbreak iPhones and install third party app stores, and you can convert Apple's $100b/year to a $100m/year business for one of your own companies, and the other $999,900,000,000 will be returned to the world's iPhone owners as a consumer surplus.
But every time I pitched this, I got the same answer: "The US Trade Representative forced us to pass this law, and threatened us with tariffs if we didn't pass it." Happy Liberation Day, people – every country in the world is now liberated from the only reason to keep this stupid-ass law on their books:
https://pluralistic.net/2025/01/15/beauty-eh/#its-the-only-war-the-yankees-lost-except-for-vietnam-and-also-the-alamo-and-the-bay-of-ham
In light of the Trump tariffs, I've been making the global rounds again, making the case for an anticircumvention repeal:
https://www.ft.com/content/b882f3a7-f8c9-4247-9662-3494eb37c30b
One of the questions I've been getting repeatedly from policy wonks, activists and officials is, "Is it even possible to jailbreak modern devices?" They want to know if companies like Apple, Tesla, Google, Microsoft, and John Deere have created unbreakable digital locks. Obviously, this is an important question, because if these locks are impregnable, then getting rid of the law won't deliver the promised benefits.
It's true that there aren't as many jailbreaks as we used to see. When a big project like Nextcloud – which is staffed up with extremely accomplished and skilled engineers – gets screwed over by Google's app store, they issue a press-release, not a patch:
https://arstechnica.com/gadgets/2025/05/nextcloud-accuses-google-of-big-tech-gatekeeping-over-android-app-permissions/
Perhaps that's because the tech staff at Nextcloud are no match for Google, not even with the attacker's advantage on their side.
But I don't think so. Here's why: we do still get jailbreaks and mods, but these almost exclusively come from anonymous tinkerers and hobbyists:
https://consumerrights.wiki/Mazda_DMCA_takedown_of_Open_Source_Home_Assistant_App
Or from pissed off teenagers:
https://www.theverge.com/2022/9/29/23378541/the-og-app-instagram-clone-pulled-from-app-store
These hacks are incredibly ambitious! How ambitious? How about a class break for every version of iOS as well as an unpatchable hardware attack on 8 years' worth of Apple bootloaders?
https://pluralistic.net/2020/05/25/mafia-logic/#sosumi
Now, maybe it's the case at all the world's best hackers are posting free code under pseudonyms. Maybe all the code wizards working for venture backed tech companies that stand to make millions through clever reverse engineering are just not as mad skilled as teenagers who want an ad-free Insta and that's why they've never replicated the feat.
Or maybe it's because teenagers and anonymous hackers are just about the only people willing to risk a $500,000 fine and 5-year prison sentence. In other words, maybe the thing that protects DRM is law, not code. After all, when Polish security researchers revealed the existence of secret digital locks that the train manufacturer Newag used to rip off train operators for millions of euros, Newag dragged them into court:
https://fsfe.org/news/2025/news-20250407-01.en.html
Tech companies are the most self-mythologizing industry on the planet, beating out even the pharma sector in boasting about their prowess and good corporate citizenship. They swear that they've made a functional digital lock…but they sure act like the only thing those locks do is let them sue people who reveal their workings.
If you'd like an essay-formatted version of this post to read or share, here's a link to it on pluralistic.net, my surveillance-free, ad-free, tracker-free blog:
https://pluralistic.net/2025/05/14/pregnable/#checkm8
#pluralistic#apple#drm#og app#instagram#meta#dmca 1201#comcom#competitive compatibility#interop#interoperability#adversarial interoperability#who broke the internet#self-mythologizing#infosec#schneiers law#red team advantage#attackers advantage#luddism#seize the means of computation
428 notes
·
View notes
Text

the fearsome emperor of the combined realms
#hes actually very scary anyway as an adversary. remember in shrek 2 when puss in boots pretended he was harmless and adorable#and then he attacked the guards. thats him that binghe#luo binghe#scum villain#svsss fanart#人��反派自救系统#svsss#lbh#shen qingqiu#mxtx#bingqiu#scum villains self saving system
2K notes
·
View notes
Text
A Super Smash Bros Ultimate Moveset for The Princess
General Playstyle
The Princess can be considered a grappler. Her attacks do a lot of damage, but have significant startup, as she nearly always needs to change into one of chapter two or three forms to attack. She is a heavyweight character (that chain weighs her down), albeit one of the lightest heavyweights, having the weight of the sandbag*. She is decently fast on the ground (faster than R.O.B., but slower than Kirby), but slower in the air, having the same airspeed as Snake and Villager with a high falling speed (the same as Bowser), as well as being burdened with a somewhat small jump height (the same as Zelda). This generally makes her unable to go high over the stage, but she can go off it due to ridiculous up-special recovery. She does not have access to many useful projectiles, but has many command grabs.
Notes: The Princess is able to crawl.
Ground Attacks
Jab -- The Soft Princess: The Soft Princess continuously stabs downwards. Low damage, but hard to escape from.
Forward tilt -- The Witch: The Witch stabs the pristine blade forward and slightly up. This attack does significant extra damage if The Witch stabs the opponent’s back, and almost no damage if that is not the case.
Up tilt -- The Burned Grey: The Burned Grey throws a torch in an arc forward. Low range, but lights opponents that it hits on fire.
Down tilt -- The Thorn: The Thorn directs thorny vines from the ground to her body. One of The Princess’s quickest attacks, but does self-damage.
Dash attack -- The Eye of the Needle: The Eye of the Needle rushes forwards with her arms swinging.
Smash Attacks
Forward smash -- Heart-ripper (The Spectre): The Spectre reaches into the opponent’s body and takes out their heart. While this locks the opponent in place and does significant damage, she is vulnerable while her hand in the body. The opponent collapses to the knocked-down state once the heart is ripped out. Has significant endlag.
Up smash -- The Apotheosis: The Apotheosis grows to a massive size before quickly shrinking back to the Princess’s base form. Has significant knockback and startup.
Down smash -- The Fury: Command grab. The Fury grabs her opponent and rotates them so they are hidden from the camera, behind her body. They take damage and are knocked straight up.**
Aerial Attacks
Neutral aerial -- The Adversary: The Adversary elbow bashes forward.
Forward aerial -- The Beast: The Beast lunges forward, her mouth open, propelling the princess forward. If an opponent gets in range of the attack, they will be bitten.
Back aerial -- Let’s Go Again (The Adversary): The Adversary grabs an opponent behind her, twists and throws them, sending them flying in front of her.
Up aerial -- The Den: The Den flaps her wings and pounces upwards at an angle, her mouth open. If an opponent gets in range of the attack, they will be bitten.
Down aerial -- The Drowned Grey: The Drowned Grey summons her corpse to drag those directly below her down.
Grabs & Throws
Grab -- The Razor: The Razor unsheathes a sword from her right arm and attempts to skewer an opponent.
Pummel -- She Skewers You (The Razor): The Razor unsheathes her left arm and skewers hers opponent, then pulls out her left sword
Forward throw – The Empty Cup (The Razor): The Razor explodes into her final form and swings her left hand, knocking the opponent in a low angle, but taking self-damage, as her hand crumples.
Back throw -- No Way Out (The Razor): The Razor unsheathes her left arm sword and uses it to skewer and drag her opponent behind her. The knockback the opponent will take will be skidding on the ground.
Up throw -- Mutually Assured Destruction (The Razor): The Razor explodes into her final form and uses both blades to throw her opponent diagonally upwards. A kill-throw that isn’t that great at killing, but does significant damage to make up for it.
Down throw -- The Arms Race (The Razor): The Razor unsheathes her left arm and uses it to whack her opponent off her right sword, bouncing them off the ground in front of her.
Get-up Attacks
Floor attack (front) -- The Harsh Princess: The Harsh Princess gets up and attempts to slit where a human’s throats would be with the pristine blade. Slow, and has a small hurtbox.
Floor attack (back) -- The Prisoner: The Prisoner rolls onto her back, summons a chain that will latch onto an opponent the right distance away, and pulls them towards her, knocking them down and towards her.
Floor attack (trip) -- Roots of the Wild (The Witch): The Witch summons roots in front of her to crush the opponent’s legs or equivalent.
Edge Attack -- The Wraith: The Wraith grabs her opponent’s leg/bottom part and crushes it.
Special Attacks
Neutral special -- The Nightmare: The Nightmare floats next to her opponent and raises her index finger to their face, doing damage, but not paralyzing them. Can be canceled into Down Special.
Side special -- The Tower: The Tower points forward, forcing them to hurt themself (usually by punching themself), although they are still able to move. The opponent attacking will end this effect. Has decent range.
Up special -- The Spectre: The Spectre becomes invincible, and slowly floats upwards. She can go through the stage, which will extend the timer of the move until she is out of it. There is notable endlag when exiting from the stage, and The Princess will go into free fall when this move ends while she is in the air.
Down special -- The Moment of Clarity: The Nightmare takes off her mask and forces her opponent to look at her face, paralyzing them and doing damage. Must be canceled from neutral special, has no effect otherwise (The Princess will motion to take off a mask, and look confused). The most damaging of all her attacks, excluding final smash.
Final Smash -- The Shifting Mound. Opponents in The Princess’s surrounding area are taken to The Long Quiet, where the Shifting Mound bursts from the floor, sending opponents upwards and doing damage.
Animations & Aesthetics
On-screen appearance -- The Princess flickers in front of a halfway-open door*** before solidifying fully.****
Taunts
Up taunt -- The Damsel: The Damsel becomes more poorly drawn up to four times. The up taunt input must be pressed again for each time.
Side taunt -- The Stranger: The Stranger shatters and multiplies up to four times. If cancellation is attempted, The Stranger will instantly multiply into five Princesses before the taunt is canceled.
Down taunt -- The Networked Wild: The Princess becomes the Networked Wild. If attacked while performing this taunt, she will enter shield-break.
Shield-Break -- The Wounded Wild: The Wounded Wild is stuck in a small tree for the duration of shield-break.
Idle poses
Idle 1 -- The Princess sits down, adopting a slumped posture.
Idle 2 -- The Princess sits down, adopting a composed posture.
Victory poses
Left -- The Princess opens the door out of a cabin, holding hands with The Long Quiet.
Up -- The Shifting Mound opens the construct, holding hands with The Long Quiet.
Right -- The Stranger opens the door out of a cabin, holding hands with The Long Quiet.
Palutena’s Guidance
Palutena: You’re in Skyworld. And in Skyworld there is a temple. And in that temple is a princess. You’re here to KO here. If you don’t, it will be the end of the match.
Pit: Forget about that! Why does she fight like that!
Palutena: The Princess took most of her fighting style from when she was placed in a life-or-death situation, so the way she fights is…brutal.
Viridi: Well, you can avoid most of her attacks if you just don’t get grabbed! Her attacks have a lot of start-up and little range, so pepper her from a distance and zone her out!
Pit: That’s harder than you make it sound! She has a lot of dirty tricks!
Palutena: Pit, respect your great-great-grandmother.
Pit: WHAT?
*-Perception becomes her reality, and people are likely to perceive an average fighter as the weight they are most familiar fighting against.
**-What happens here is not appropriate to be shown in a game with an E10 rating.
***-Door frame is included.
****-This is a reference to events preceding The Nightmare.
#slay the princess#the princess#the shifting mound#slay the princess spoilers#smash bros#super smash bros#super smash bros ultimate#super smash brothers#super smash brothers ultimate#palutena#pit#viridi#stp#stp spoilers#stp princess#ssb#ssbu#I would want to replace one The Adversary#esses#Palutena being descended from The Princess is because TSM is stated to exist across all universes#And Gods tend to be related to each other#The Princess being a grappler was an accident#I just noticed that a lot of the attacks I made had her grabbing
146 notes
·
View notes
Text
“I didn’t like how this storyline/character was handled—“ yeah express yourself hon
“—and that’s why I think horikoshi is the worst person alive” whoa there
#like! I do NOT understand this adversarial attitude toward horikoshi! I don’t get it#like idk I have been in fandoms where the creators are clearly embarrassed by their fanbase or outright hate them#calling them delusional and writing unkind portrayals of their fans into the canon of the story#horikoshi as far as I can tell is a guy who is enthusiastic about the story he’s telling and cares about his characters#you’re allowed to be disappointed by shit! you’re allowed to not like it#heaven knows I’ve had stuff I’m#not crazy about in this story and I’ve expressed that before#but like????? attacking the creator about it? it’s not it.#tt talks
12 notes
·
View notes
Text
AI is rewriting cybersecurity—faster, smarter, stronger. But here’s the brutal truth: it’s also weaponizing cybercrime at an unprecedented scale.
#Adversarial AI#AI Cybercrime#AI in Cybersecurity#AI vs Hackers#AI-Driven Security#AI-Powered Attacks#CISO Strategy#Cybersecurity Trend#Future of Cybersecurity#Security Leadership#Threat Intelligence AI#Zero Trust A
0 notes
Note
You're more amazing than :O
You're more amazing than an EX Drilltusk Tetsucabra corpse.
Also I had another dream where I was menaced by the passive presence of a giant monster. This time it was Shara Ishvalda rising out of some hole in the ground and staring at me.
For context, this is what Shara Ishvalda looks like:

#i beat all 16 drilltusk quests! including the extra-hard EX quest!#apparently it was a total fluke tho because i tried it again 3 times and died within the first 10 minutes every time#it was faster to clear than quest 15 and gave a lot of rewards so i wanted to do it again but oh well :(#triple damage is just too much to handle#anyway i think i've mentioned before my sorta-fear of Big Creatures?#giant looming creatures that just Stand There Menacingly#i remember i had at least one dream of a Big Looming Creature when i was really young#it was just my big dog plushie ruff-ruff but i was super super small so just staring up at the absolutely MASSIVE plush was. scary#xenoblade chronicles x probably added to my nervousness by giving me various Big Looming Creatures to feel nervous about#“wow what a neat mountain oh hey a ravine i wonder what's down there- JESUS FUCKING CHRIST!!”#monster hunter has not managed to make me feel this way. possibly because even the giants are very killable#you're Supposed to fight the giant whale/snake/dragon you aren't an insect it can swat away you're a threat an adversary#and it's not a danger to be avoided. it's your prey#meanwhile in xenoblade the giants will unavoidably rip you to shreds in seconds if you catch their attention#like you CAN fight them. but you're not going to be able to normally. they're postgame content#i've thought about the idea of a game focused on Big Looming Creatures#forcing you to interact with them and being in danger at their slightest movements#or actually maybe interacting with the giants would fail to capture the feeling. just like how monster hunter's giants aren't scary#maybe you're just gathering stuff and the giants are just threats#some will attack if you catch their attention. some can just kill you on accident. some might accidentally help (ex. by climbing on them)#the core is: you have to go near them. and when you do you will look up and see how they rise like mountains and block the sky#you will see how they turn their head and eclipse the sun#they will step in front of you and you'll see nothing but their leg#and you will dread the thought of one turning its gaze down to you#i should play shadow of the colossus#ka asks
0 notes
Text
Five-Year Battle Against Chinese Cyber Adversaries Targeting Southeast Asian Infrastructure
Sophos’ “Pacific Rim” report outlines a five-year defensive and counter-offensive operation against multiple Chinese-linked cyber adversaries targeting Southeast Asian critical infrastructure. The attackers, including well-known groups like Volt Typhoon, APT31, and APT41, aimed at compromising unpatched devices with novel exploits, conducting surveillance, sabotage, and espionage. Sophos…
0 notes
Text
Forcing your computer to rat you out

Powerful people imprisoned by the cluelessness of their own isolation, locked up with their own motivated reasoning: “It’s impossible to get a CEO to understand something when his quarterly earnings call depends on him not understanding it.”
Take Mark Zuckerberg. Zuckerberg insists that anyone who wanted to use a pseudonym online is “two-faced,” engaged in dishonest social behavior. The Zuckerberg Doctrine claims that forcing people to use their own names is a way to ensure civility. This is an idea so radioactively wrong, it can be spotted from orbit.
From the very beginning, social scientists (both inside and outside Facebook) told Zuckerberg that he was wrong. People have lots of reasons to hide their identities online, both good and bad, but a Real Names Policy affects different people differently:
https://memex.craphound.com/2018/01/22/social-scientists-have-warned-zuck-all-along-that-the-facebook-theory-of-interaction-would-make-people-angry-and-miserable/
For marginalized and at-risk people, there are plenty of reasons to want to have more than one online identity — say, because you are a #MeToo whistleblower hoping that Harvey Weinstein won’t sic his ex-Mossad mercenaries on you:
https://www.newyorker.com/news/news-desk/harvey-weinsteins-army-of-spies
Or maybe you’re a Rohingya Muslim hoping to avoid the genocidal attentions of the troll army that used Facebook to organize — under their real, legal names — to rape and murder you and everyone you love:
https://www.amnesty.org/en/latest/news/2022/09/myanmar-facebooks-systems-promoted-violence-against-rohingya-meta-owes-reparations-new-report/
But even if no one is looking to destroy your life or kill you and your family, there are plenty of good reasons to present different facets of your identity to different people. No one talks to their lover, their boss and their toddler in exactly the same way, or reveals the same facts about their lives to those people. Maintaining different facets to your identity is normal and healthy — and the opposite, presenting the same face to everyone in your life, is a wildly terrible way to live.
None of this is controversial among social scientists, nor is it hard to grasp. But Zuckerberg stubbornly stuck to this anonymity-breeds-incivility doctrine, even as dictators used the fact that Facebook forced dissidents to use their real names to retain power through the threat (and reality) of arrest and torture:
https://pluralistic.net/2023/01/25/nationalize-moderna/#hun-sen
Why did Zuck cling to this dangerous and obvious fallacy? Because the more he could collapse your identity into one unitary whole, the better he could target you with ads. Truly, it is impossible to get a billionaire to understand something when his mega-yacht depends on his not understanding it.
This motivated reasoning ripples through all of Silicon Valley’s top brass, producing what Anil Dash calls “VC QAnon,” the collection of conspiratorial, debunked and absurd beliefs embraced by powerful people who hold the digital lives of billions of us in their quivering grasp:
https://www.anildash.com/2023/07/07/vc-qanon/
These fallacy-ridden autocrats like to disguise their demands as observations, as though wanting something to be true was the same as making it true. Think of when Eric Schmidt — then the CEO of Google — dismissed online privacy concerns, stating “If you have something that you don’t want anyone to know, maybe you shouldn’t be doing it in the first place”:
https://www.eff.org/deeplinks/2009/12/google-ceo-eric-schmidt-dismisses-privacy
Schmidt was echoing the sentiments of his old co-conspirator, Sun Microsystems CEO Scott McNealy: “You have zero privacy anyway. Get over it”:
https://www.wired.com/1999/01/sun-on-privacy-get-over-it/
Both men knew better. Schmidt, in particular, is very jealous of his own privacy. When Cnet reporters used Google to uncover and publish public (but intimate and personal) facts about Schmidt, Schmidt ordered Google PR to ignore all future requests for comment from Cnet reporters:
https://www.cnet.com/tech/tech-industry/how-cnet-got-banned-by-google/
(Like everything else he does, Elon Musk’s policy of responding to media questions about Twitter with a poop emoji is just him copying things other people thought up, making them worse, and taking credit for them:)
https://www.theverge.com/23815634/tesla-elon-musk-origin-founder-twitter-land-of-the-giants
Schmidt’s actions do not reflect an attitude of “If you have something that you don’t want anyone to know, maybe you shouldn’t be doing it in the first place.” Rather, they are the normal response that we all have to getting doxed.
When Schmidt and McNealy and Zuck tell us that we don’t have privacy, or we don’t want privacy, or that privacy is bad for us, they’re disguising a demand as an observation. “Privacy is dead” actually means, “When privacy is dead, I will be richer than you can imagine, so stop trying to save it, goddamnit.”
We are all prone to believing our own bullshit, but when a tech baron gets high on his own supply, his mental contortions have broad implications for all of us. A couple years after Schmidt’s anti-privacy manifesto, Google launched Google Plus, a social network where everyone was required to use their “real name.”
This decision — justified as a means of ensuring civility and a transparent ruse to improve ad targeting — kicked off the Nym Wars:
https://epeus.blogspot.com/2011/08/google-plus-must-stop-this-identity.html
One of the best documents to come out of that ugly conflict is “Falsehoods Programmers Believe About Names,” a profound and surprising enumeration of all the ways that the experiences of tech bros in Silicon Valley are the real edge-cases, unreflective of the reality of billions of their users:
https://www.kalzumeus.com/2010/06/17/falsehoods-programmers-believe-about-names/
This, in turn, spawned a whole genre of programmer-fallacy catalogs, falsehoods programmers believe about time, currency, birthdays, timezones, email addresses, national borders, nations, biometrics, gender, language, alphabets, phone numbers, addresses, systems of measurement, and, of course, families:
https://github.com/kdeldycke/awesome-falsehood
But humility is in short supply in tech. It’s impossible to get a programmer to understand something when their boss requires them not to understand it. A programmer will happily insist that ordering you to remove your “mask” is for your own good — and not even notice that they’re taking your skin off with it.
There are so many ways that tech executives could improve their profits if only we would abandon our stubborn attachment to being so goddamned complicated. Think of Netflix and its anti-passsword-sharing holy war, which is really a demand that we redefine “family” to be legible and profitable for Netflix:
https://pluralistic.net/2023/02/02/nonbinary-families/#red-envelopes
But despite the entreaties of tech companies to collapse our identities, our families, and our online lives into streamlined, computably hard-edged shapes that fit neatly into their database structures, we continue to live fuzzy, complicated lives that only glancingly resemble those of the executives seeking to shape them.
Now, the rich, powerful people making these demands don’t plan on being constrained by them. They are conservatives, in the tradition of #FrankWilhoit, believers in a system of “in-groups whom the law protects but does not bind, alongside out-groups whom the law binds but does not protect”:
https://crookedtimber.org/2018/03/21/liberals-against-progressives/#comment-729288
As with Schmidt’s desire to spy on you from asshole to appetite for his own personal gain, and his violent aversion to having his own personal life made public, the tech millionaires and billionaires who made their fortune from the flexibility of general purpose computers would like to end that flexibility. They insist that the time for general purpose computers has passed, and that today, “consumers” crave the simplicity of appliances:
https://memex.craphound.com/2012/01/10/lockdown-the-coming-war-on-general-purpose-computing/
It is in the War On General Purpose Computing that we find the cheapest and flimsiest rhetoric. Companies like Apple — and their apologists — insist that no one wants to use third-party app stores, or seek out independent repair depots — and then spend millions to make sure that it’s illegal to jailbreak your phone or get it fixed outside of their own official channel:
https://doctorow.medium.com/apples-cement-overshoes-329856288d13
The cognitive dissonance of “no one wants this,” and “we must make it illegal to get this” is powerful, but the motivated reasoning is more powerful still. It is impossible to get Tim Cook to understand something when his $49 million paycheck depends on him not understanding it.
The War on General Purpose Computing has been underway for decades. Computers, like the people who use them, stubbornly insist on being reality-based, and the reality of computers is that they are general purpose. Every computer is a Turing complete, universal Von Neumann machine, which means that it can run every valid program. There is no way to get a computer to be almost Turing Complete, only capable of running programs that don’t upset your shareholders’ fragile emotional state.
There is no such thing as a printer that will only run the “reject third-party ink” program. There is no such thing as a phone that will only run the “reject third-party apps” program. There are only laws, like the Section 1201 of the Digital Millennium Copyright Act, that make writing and distributing those programs a felony punishable by a five-year prison sentence and a $500,000 fine (for a first offense).
That is to say, the War On General Purpose Computing is only incidentally a technical fight: it is primarily a legal fight. When Apple says, “You can’t install a third party app store on your phone,” what they means is, “it’s illegal to install that third party app store.” It’s not a technical countermeasure that stands between you and technological self-determination, it’s a legal doctrine we can call “felony contempt of business model”:
https://locusmag.com/2020/09/cory-doctorow-ip/
But the mighty US government will not step in to protect a company’s business model unless it at least gestures towards the technical. To invoke DMCA 1201, a company must first add the thinnest skin of digital rights management to their product. Since 1201 makes removing DRM illegal, a company can use this molecule-thick scrim of DRM to felonize any activity that the DRM prevents.
More than 20 years ago, technologists started to tinker with ways to combine the legal and technical to tame the wild general purpose computer. Starting with Microsoft’s Palladium project, they theorized a new “Secure Computing” model for allowing companies to reach into your computer long after you had paid for it and brought it home, in order to discipline you for using it in ways that undermined its shareholders’ interest.
Secure Computing began with the idea of shipping every computer with two CPUs. The first one was the normal CPU, the one you interacted with when you booted it up, loaded your OS, and ran programs. The second CPU would be a Trusted Platform Module, a brute-simple system-on-a-chip designed to be off-limits to modification, even by its owner (that is, you).
The TPM would ship with a limited suite of simple programs it could run, each thoroughly audited for bugs, as well as secret cryptographic signing keys that you were not permitted to extract. The original plan called for some truly exotic physical security measures for that TPM, like an acid-filled cavity that would melt the chip if you tried to decap it or run it through an electron-tunneling microscope:
https://pluralistic.net/2020/12/05/trusting-trust/#thompsons-devil
This second computer represented a crack in the otherwise perfectly smooth wall of a computer’s general purposeness; and Trusted Computing proposed to hammer a piton into that crack and use it to anchor a whole superstructure that could observe — and limited — the activity of your computer.
This would start with observation: the TPM would observe every step of your computer’s boot sequence, creating cryptographic hashes of each block of code as it loaded and executed. Each stage of the boot-up could be compared to “known good” versions of those programs. If your computer did something unexpected, the TPM could halt it in its tracks, blocking the boot cycle.
What kind of unexpected things do computers do during their boot cycle? Well, if your computer is infected with malware, it might load poisoned versions of its operating system. Once your OS is poisoned, it’s very hard to detect its malicious conduct, since normal antivirus programs rely on the OS to faithfully report what your computer is doing. When the AV program asks the OS to tell it which programs are running, or which files are on the drive, it has no choice but to trust the OS’s response. When the OS is compromised, it can feed a stream of lies to users’ programs, assuring these apps that everything is fine.
That’s a very beneficial use for a TPM, but there’s a sinister flipside: the TPM can also watch your boot sequence to make sure that there aren’t beneficial modifications present in your operating system. If you modify your OS to let you do things the manufacturer wants to prevent — like loading apps from a third-party app-store — the TPM can spot this and block it.
Now, these beneficial and sinister uses can be teased apart. When the Palladium team first presented its research, my colleague Seth Schoen proposed an “owner override”: a modification of Trusted Computing that would let the computer’s owner override the TPM:
https://web.archive.org/web/20021004125515/http://vitanuova.loyalty.org/2002-07-05.html
This override would introduce its own risks, of course. A user who was tricked into overriding the TPM might expose themselves to malicious software, which could harm that user, as well as attacking other computers on the user’s network and the other users whose data were on the compromised computer’s drive.
But an override would also provide serious benefits: it would rule out the monopolistic abuse of a TPM to force users to run malicious code that the manufacturer insisted on — code that prevented the user from doing things that benefited the user, even if it harmed the manufacturer’s shareholders. For example, with owner override, Microsoft couldn’t force you to use its official MS Office programs rather than third-party compatible programs like Apple’s iWork or Google Docs or LibreOffice.
Owner override also completely changed the calculus for another, even more dangerous part of Trusted Computing: remote attestation.
Remote Attestation is a way for third parties to request a reliable, cryptographically secured assurances about which operating system and programs your computer is running. In Remote Attestation, the TPM in your computer observes every stage of your computer’s boot, gathers information about all the programs you’re running, and cryptographically signs them, using the signing keys the manufacturer installed during fabrication.
You can send this “attestation” to other people on the internet. If they trust that your computer’s TPM is truly secure, then they know that you have sent them a true picture of your computer’s working (the actual protocol is a little more complicated and involves the remote party sending you a random number to cryptographically hash with the attestation, to prevent out-of-date attestations).
Now, this is also potentially beneficial. If you want to make sure that your technologically unsophisticated friend is running an uncompromised computer before you transmit sensitive data to it, you can ask them for an attestation that will tell you whether they’ve been infected with malware.
But it’s also potentially very sinister. Your government can require all the computers in its borders to send a daily attestation to confirm that you’re still running the mandatory spyware. Your abusive spouse — or abusive boss — can do the same for their own disciplinary technologies. Such a tool could prevent you from connecting to a service using a VPN, and make it impossible to use Tor Browser to protect your privacy when interacting with someone who wishes you harm.
The thing is, it’s completely normal and good for computers to lie to other computers on behalf of their owners. Like, if your IoT ebike’s manufacturer goes out of business and all their bikes get bricked because they can no longer talk to their servers, you can run an app that tricks the bike into thinking that it’s still talking to the mothership:
https://nltimes.nl/2023/07/15/alternative-app-can-unlock-vanmoof-bikes-popular-amid-bankruptcy-fears
Or if you’re connecting to a webserver that tries to track you by fingerprinting you based on your computer’s RAM, screen size, fonts, etc, you can order your browser to send random data about this stuff:
https://jshelter.org/fingerprinting/
Or if you’re connecting to a site that wants to track you and nonconsensually cram ads into your eyeballs, you can run an adblocker that doesn’t show you the ads, but tells the site that it did:
https://www.eff.org/deeplinks/2019/07/adblocking-how-about-nah
Owner override leaves some of the beneficial uses of remote attestation intact. If you’re asking a friend to remotely confirm that your computer is secure, you’re not going to use an override to send them bad data about about your computer’s configuration.
And owner override also sweeps all of the malicious uses of remote attestation off the board. With owner override, you can tell any lie about your computer to a webserver, a site, your boss, your abusive spouse, or your government, and they can’t spot the lie.
But owner override also eliminates some beneficial uses of remote attestation. For example, owner override rules out remote attestation as a way for strangers to play multiplayer video games while confirming that none of them are using cheat programs (like aimhack). It also means that you can’t use remote attestation to verify the configuration of a cloud server you’re renting in order to assure yourself that it’s not stealing your data or serving malware to your users.
This is a tradeoff, and it’s a tradeoff that’s similar to lots of other tradeoffs we make online, between the freedom to do something good and the freedom to do something bad. Participating anonymously, contributing to free software, distributing penetration testing tools, or providing a speech platform that’s open to the public all represent the same tradeoff.
We have lots of experience with making the tradeoff in favor of restrictions rather than freedom: powerful bad actors are happy to attach their names to their cruel speech and incitement to violence. Their victims are silenced for fear of that retaliation.
When we tell security researchers they can’t disclose defects in software without the manufacturer’s permission, the manufacturers use this as a club to silence their critics, not as a way to ensure orderly updates.
When we let corporations decide who is allowed to speak, they act with a mixture of carelessness and self-interest, becoming off-the-books deputies of authoritarian regimes and corrupt, powerful elites.
Alas, we made the wrong tradeoff with Trusted Computing. For the past twenty years, Trusted Computing has been creeping into our devices, albeit in somewhat denatured form. The original vision of acid-filled secondary processors has been replaced with less exotic (and expensive) alternatives, like “secure enclaves.” With a secure enclave, the manufacturer saves on the expense of installing a whole second computer, and instead, they draw a notional rectangle around a region of your computer’s main chip and try really hard to make sure that it can only perform a very constrained set of tasks.
This gives us the worst of all worlds. When secure enclaves are compromised, we not only lose the benefit of cryptographic certainty, knowing for sure that our computers are only booting up trusted, unalterted versions of the OS, but those compromised enclaves run malicious software that is essentially impossible to detect or remove:
https://pluralistic.net/2022/07/28/descartes-was-an-optimist/#uh-oh
But while Trusted Computing has wormed its way into boot-restrictions — preventing you from jailbreaking your computer so it will run the OS and apps of your choosing — there’s been very little work on remote attestation…until now.
Web Environment Integrity is Google’s proposal to integrate remote attestation into everyday web-browsing. The idea is to allow web-servers to verify what OS, extensions, browser, and add-ons your computer is using before the server will communicate with you:
https://github.com/RupertBenWiser/Web-Environment-Integrity/blob/main/explainer.md
Even by the thin standards of the remote attestation imaginaries, there are precious few beneficial uses for this. The googlers behind the proposal have a couple of laughable suggestions, like, maybe if ad-supported sites can comprehensively refuse to serve ad-blocking browsers, they will invest the extra profits in making things you like. Or: letting websites block scriptable browsers will make it harder for bad people to auto-post fake reviews and comments, giving users more assurances about the products they buy.
But foundationally, WEI is about compelling you to disclose true facts about yourself to people who you want to keep those facts from. It is a Real Names Policy for your browser. Google wants to add a new capability to the internet: the ability of people who have the power to force you to tell them things to know for sure that you’re not lying.
The fact that the authors assume this will be beneficial is just another “falsehood programmers believe”: there is no good reason to hide the truth from other people. Squint a little and we’re back to McNealy’s “Privacy is dead, get over it.” Or Schmidt’s “If you have something that you don’t want anyone to know, maybe you shouldn’t be doing it in the first place.”
And like those men, the programmers behind this harebrained scheme don’t imagine that it will ever apply to them. As Chris Palmer — who worked on Chromium — points out, this is not compatible with normal developer tools or debuggers, which are “incalculably valuable and not really negotiable”:
https://groups.google.com/a/chromium.org/g/blink-dev/c/Ux5h_kGO22g/m/5Lt5cnkLCwAJ
This proposal is still obscure in the mainstream, but in tech circles, it has precipitated a flood of righteous fury:
https://arstechnica.com/gadgets/2023/07/googles-web-integrity-api-sounds-like-drm-for-the-web/
As I wrote last week, giving manufacturers the power to decide how your computer is configured, overriding your own choices, is a bad tradeoff — the worst tradeoff, a greased slide into terminal enshittification:
https://pluralistic.net/2023/07/24/rent-to-pwn/#kitt-is-a-demon
This is how you get Unauthorized Bread:
https://arstechnica.com/gaming/2020/01/unauthorized-bread-a-near-future-tale-of-refugees-and-sinister-iot-appliances/
All of which leads to the question: what now? What should be done about WEI and remote attestation?
Let me start by saying: I don’t think it should be illegal for programmers to design and release these tools. Code is speech, and we can’t understand how this stuff works if we can’t study it.
But programmers shouldn’t deploy it in production code, in the same way that programmers should be allowed to make pen-testing tools, but shouldn’t use them to attack production systems and harm their users. Programmers who do this should be criticized and excluded from the society of their ethical, user-respecting peers.
Corporations that use remote attestation should face legal restrictions: privacy law should prevent the use of remote attestation to compel the production of true facts about users or the exclusion of users who refuse to produce those facts. Unfair competition law should prevent companies from using remote attestation to block interoperability or tie their products to related products and services.
Finally, we must withdraw the laws that prevent users and programmers from overriding TPMs, secure enclaves and remote attestations. You should have the right to study and modify your computer to produce false attestations, or run any code of your choosing. Felony contempt of business model is an outrage. We should alter or strike down DMCA 1201, the Computer Fraud and Abuse Act, and other laws (like contract law’s “tortious interference”) that stand between you and “sole and despotic dominion” over your own computer. All of that applies not just to users who want to reconfigure their own computers, but also toolsmiths who want to help them do so, by offering information, code, products or services to jailbreak and alter your devices.
Tech giants will squeal at this, insisting that they serve your interests when they prevent rivals from opening up their products. After all, those rivals might be bad guys who want to hurt you. That’s 100% true. What is likewise true is that no tech giant will defend you from its own bad impulses, and if you can’t alter your device, you are powerless to stop them:
https://pluralistic.net/2022/11/14/luxury-surveillance/#liar-liar
Companies should be stopped from harming you, but the right place to decide whether a business is doing something nefarious isn’t in the boardroom of that company’s chief competitor: it’s in the halls of democratically accountable governments:
https://www.eff.org/wp/interoperability-and-privacy
So how do we get there? Well, that’s another matter. In my next book, The Internet Con: How to Seize the Means of Computation (Verso Books, Sept 5), I lay out a detailed program, describing which policies will disenshittify the internet, and how to get those policies:
https://www.versobooks.com/products/3035-the-internet-con
Predictably, there are challenges getting this kind of book out into the world via our concentrated tech sector. Amazon refuses to carry the audio edition on its monopoly audiobook platform, Audible, unless it is locked to Amazon forever with mandatory DRM. That’s left me self-financing my own DRM-free audio edition, which is currently available for pre-order via this Kickstarter:
http://seizethemeansofcomputation.org

I’m kickstarting the audiobook for “The Internet Con: How To Seize the Means of Computation,” a Big Tech disassembly manual to disenshittify the web and bring back the old, good internet. It’s a DRM-free book, which means Audible won’t carry it, so this crowdfunder is essential. Back now to get the audio, Verso hardcover and ebook:
https://www.kickstarter.com/projects/doctorow/the-internet-con-how-to-seize-the-means-of-computation
If you’d like an essay-formatted version of this post to read or share, here’s a link to it on pluralistic.net, my surveillance-free, ad-free, tracker-free blog:
https://pluralistic.net/2023/08/02/self-incrimination/#wei-bai-bai
[Image ID: An anatomical drawing of a flayed human head; it has been altered to give it a wide-stretched mouth revealing a gadget nestled in the back of the figure's throat, connected by a probe whose two coiled wires stretch to an old fashioned electronic box. The head's eyes have been replaced by the red, menacing eye of HAL 9000 from Stanley Kubrick's '2001: A Space Odyssey.' Behind the head is a code waterfall effect as seen in the credits of the Wachowskis' 'The Matrix.']
Image: Cryteria (modified) https://commons.wikimedia.org/wiki/File:HAL9000.svg
CC BY 3.0 https://creativecommons.org/licenses/by/3.0/deed.en
#pluralistic#chaffing#spoofing#remote attestation#rene descartes#adversarial interoperability#war on general purpose computing#canvas attacks#vpns#compelled speech#onion routing#owner override#stalkerware#ngscb#palladium#trusted computing#secure enclaves#tor#interop#net neutrality#taking the fifth#right to remain silent#real names policy#the zuckerberg doctrine#none of your business#the right to lie#right to repair#bossware#spyware#wei web environment integrity
2K notes
·
View notes
Text
What AI Cannot Do: AI Limitation
Artificial Intelligence (AI) has made remarkable strides in recent years, revolutionizing industries from healthcare to finance. However, despite its impressive capabilities, there are inherent AI limitation to what it can achieve. Understanding these limitations is crucial for effectively integrating AI into our lives and recognizing its role as a tool rather than a replacement for human…
#adversarial attacks on AI#AI in customer service#AI limitations#automation and employment.#biases in AI algorithms#common sense in AI#context understanding in AI#creativity in artificial intelligence#data quality in AI#emotional intelligence in machines#ethical concerns with AI#human-AI collaboration#job displacement due to automation#machine learning limitations#robustness of AI systems
0 notes
Text
The Ancient Warrior
DP x DC Prompt
Danny is either bored of King work or is forced on a vacation from his Ghost King duties in the DC Universe. But because of Clockwork, Danny is sent the very distant past of the world, and because of his immortal body, something he got when he accepted the Crown of Flames and the Ring of Rage when he was 19, he doesn't age at all or die from being hot with a fatal blow.
Clockwork was the one to tell him to be a warrior where the Halfa found himself, so he donned a modified version of his Kingly Armor that covers his entire body and makes his voice deeper and more menacing and had done so. The modified armor he has allows him to access weaker versions of the Ancients powers.
Danny had unknowingly started a new religion in the DC Universe, the Warriors Religion. It's a religion about fighting, but even Danny himself has told those part of it, when he eventually found out about the religion, that it's not always about fighting physically, it can be for any battle one takes.
Danny has many fighting styles, as he is the Ghost King and needs to defend himself when attacked, which are made up of many long dead fighting styles from many Ghosts in the Infinite Realms, amd because Pandora was one of his mentors, he had Amazonian training as well.
As the years go by, with it getting closer to modern times in the DC Universe, Danny has had many students and adversaries. Ra's Al Ghul and his daughters Talia and Nyssa were some of his students, Diana of Themyscira was an adversary, but not one to battle him to death like many others before her. And then he got another student, Bruce Wayne. While training Bruce, the Al Ghuls would challenge him in battles, but not to the death, as they seen what he did to those killed, as whenever he killed someone, the intense emotions, the ectoplasm from him, and a violent death at his hands causes all his opponents to become Ghosts, but before they could fully form, he gently grabs there forming core in one hand, and teleports them to the Infinite Realms after saying something to the cores. Because those he kills and sends to the Infinite Realms can not be revived by the Lazarus Pits
"May you find peace in the afterlife" for those that had no ill will
"May you find redemption in the afterlife" for bad guys he kills
When Danny is not his 'Warrior' persona, he's an average Gothamite with an average job and trying to survive till the next day in the chaotic city he calls home.
#danny phantom#dp x dc#dpxdc#dcu#ghost king danny#danny fenton#dc x dp crossover#dp crossover#dp x dc prompt
1K notes
·
View notes
Text
words for when your characters get into a fight (pt. 4)
Pain
ache, anesthesia/anaesthesia, distress, harassment, hurt, pinch, strain, suffer, torture, wrong
Attack
aggression, assail, beat up, blast, blind-side, bomb, brutality, charge, come at, coup d’état, embroil, encroach, fire, foray, go for, infest, insurrection, invasion, lay into, mug, occupation, offensive, onslaught, overrun, pillage, pounce, raid, ravage, rush, sortie, subvert, waylay
To destroy
ablate, abolition, annul, batter, bomb, bring down, burst, butcher, clobber, come unglued, consumption, coup de grâce, crumple, cut down, decimate, deforestation, demolition, desecrate, desolate, devastate, dismantle, dispatch, do away with, do in, end, endanger, eradicate, erosion, execute, expunge, exterminate, extinguish, finish, genocide, hara-kiri, homicide, jeopardize, kill, knock off, liquidate, mangle, massacre, murder, obliterate, paralyze, pillage, poison, prostrate, pulverize, put away, put out, quench, raze, ruin, sack, shiver, slaughter, smash, stamp out, subdue, suppress, undo, vandalism, violation, wipe out, wreck
To injure
abuse, ail, batter, beat, bruise, cost, crush, debilitate, deface, deform, desecrate, devastate, disagree, disfigure, expose, fragment, gripe, handicap, hurt, incapacitate, jeopardize, lacerate, maim, mar, mistreat, mutilate, outrage, paralyze, poison, pummel, repay, ruin, sabotage, scar, shatter, shoot, smart, snap, spoil, stress, taint, torture, turn, violate, vitiate, wrong
To make dirty
adulterate, clutter, mess up, smudge, stain, tarnish
To make hot or cold
air, chill, freeze, heat, melt, numb, refrigerate, shrivel, warm
To make wet
absorb, dampen, dip, drench, drool, dunk, extinguish, marinate, oil, permeate, saturate, souse, splash, spray, squirt, submerge
Military action
barrage, blow up, conflict, coup d’état, deploy, deposition, dethrone, disarm, draft, engage, enlist, explosion, incursion, induction, invade, maneuver, occupation, offensive, overthrow, rebellion, revolt, salute, station, volley, warfare
Bad person
accessory, accurser, adversary, aggressor, alarmist, antagonist, ass, assassin, authoritarian, barbarian, bigmouth, bottom feeder, bum, burglar, cad, captive, charlatan, clod, cold fish, conspirator, criminal, crook, culprit, deadbeat, delinquent, demon, derelict, desperado, devil, dirty old man, dolt, do-nothing, dope, dregs, drone, dumbbell, dunce, enemy, espionage, exile, failure, fall guy, femme fatale, fighter, firebrand, fool, fugitive, gangster, glutton, good-for-nothing, gossip, grump, hellion, hobo, hot dog, hypocrite, imbecile, impostor, incubus, insurgent, intruder, Judas, killer, klutz, know-it-all, lawbreaker, lemon, loafer, loser, lummox, mad person, maniac, menace, misanthrope, miser, mole, mountebank, naysayer, ne’ er-do-well, nuisance, nut, ogre, organized crime, parasite, pawn, pessimist, pill, placebo, prodigal, prostitute, psychopath, quack, rascal, renegade, rogue, ruffian, sap, scamp, schlemiel, Scrooge, shirked, shyster, simpleton, skinflint, sleazebag, sneak, sourpuss, spy, swindler, tattletale/tattler, thug, tool, traitor, troll, truant, tyrant, vandal, wanton, whipping boy, wimp, witch
NOTE
The above are concepts classified according to subject and usage. It not only helps writers and thinkers to organize their ideas but leads them from those very ideas to the words that can best express them.
It was, in part, created to turn an idea into a specific word. By linking together the main entries that share similar concepts, the index makes possible creative semantic connections between words in our language, stimulating thought and broadening vocabulary. Writing Resources PDFs
Source ⚜ Writing Basics & Refreshers ⚜ On Vocabulary Writing Notes: Fight Scenes ⚜ Word Lists: Fight ⚜ Pain
#vocabulary#langblr#writeblr#writing reference#spilled ink#creative writing#dark academia#writers on tumblr#poets on tumblr#poetry#literature#writing tips#writing prompt#writing#words#lit#studyblr#fiction#light academia#fight scene#writing resources
2K notes
·
View notes
Text


fucked up evil creatures experience remorse
witch and adversary my beloved, loved them since the moment I saw them <333
insta | youtube | tiktok | kofi
ramble under the cut




I had to do this after I played pacifist with the adversary, I love the parallels of both the princesses undoing themselves if you refuse to continue the cycle of violence
The way witch ends up looking more human in the thorn while the adversary literally turns herself inside out. The witch expects violence but longs for for connection, she wants to hang on to the glimmer of hope you had given her in her past lives yet she feels like fool for that, but the adversary found connection in the violence, it is truly all she's ever known
The line "I don't want to think, why are you trying to make me think?" got me fucking feral
she thinks she's found her place in the pain, she doesn't want to look at what else there could be and in that desperation she twists herself into something worse, and then she tries to hurt you again
do you guys get it
do you guys see what i see
neither of them think theres any way out of the role theyve been given and the realization that there is kills them and gives them a new shape and it hurts them so much but thats the only way you guys can leave the cabin together
and even then youve got to be so careful with the thorn because shed rather be in pain forever than be a fool again, and youve got to be patient with the fury while she shows you what shed done to herself because of your absence
they both want a better existence so bad but neither of them even know what that is and youve got to offer your hand over and over again
does this make sense
no this doesnt say anything about me what are you on about
also also if you attack the adversary death becomes meaningless and you dont even get a third chapter (much like the witch if you do anything other than giving her the blade) because where else is there to go at that point? yet if you attack the witch the place crushes you both alive because this isnt what you guys are meant to be
and still if you choose violence in their third chapters you have no other choice but slay the fury and get trapped with the thorn, youve done nothing but repeat what you did to them in their first lives
ghhrgrrhr i am so normal and coherent about this
if youve come this far know that there will be a follow up piece
#slay the princess#fanart#takealook#the witch stp#stp witch#stp adversary#the adversary stp#stp fanart#slay the princess fanart#my artwork#artists on tumblr#art#digital art#slay the princess spoilers#stp
862 notes
·
View notes
Quote
As I said, Musk runs things. So, much as it’s necessary to be sensitive to the needs of the guy with the gun during a stick-up, people at the Pentagon are doing just that. But none of this gets to the most jaw-dropping part of this. Musk and Thiel propose making this network of hundreds of surveillance and attack satellites into a subscription service that the Musk/Thiel/Luckey consortium would own and the Pentagon would subscribe to. Not only is this crazy and absurd but it goes without saying that in no normal time would anyone at the Pentagon be okay with the U.S. not owning the hardware at the center of national defense. We’ve seen how this goes with Starlink, where Musk routinely threatens to turn the system on or off based on his whims and opens up separate lines of communications and perhaps deals with adversary leaders like Vladimir Putin.
Musk to Force Pentagon to Build and Then Pay Him to Use Network of Killer Satellites
Do not forget that Republicans have veto-proof majorities in Congress. They can stop this tomorrow if they want to.
They don’t want to.
This is not just Trump and Musk. This is the entire Republican party.
Never forget and never forgive the people who did this to us.
790 notes
·
View notes