#Cyber Security Blog
Explore tagged Tumblr posts
hi1ghlander987 · 1 year ago
Text
Cyber security blog
Welcome to the Cyber UK website, your go-to resource for comprehensive cyber security insights tailored specifically for UK businesses. Our website is designed to equip you with the knowledge, tools, and strategies necessary to safeguard your business’s digital assets in today’s ever-evolving threat landscape.
Cyber security blog
0 notes
highlander98 · 1 year ago
Text
Cyber security blog
Welcome to the Cyber UK website, your go-to resource for comprehensive cyber security insights tailored specifically for UK businesses. Our website is designed to equip you with the knowledge, tools, and strategies necessary to safeguard your business’s digital assets in today’s ever-evolving threat landscape.
Cyber security blog
0 notes
highlander987 · 1 year ago
Text
Cyber security blog
Welcome to the Cyber UK website, your go-to resource for comprehensive cyber security insights tailored specifically for UK businesses. Our website is designed to equip you with the knowledge, tools, and strategies necessary to safeguard your business’s digital assets in today’s ever-evolving threat landscape.
Cyber security blog
0 notes
followbusiness78 · 1 year ago
Text
Cyber security blog
Welcome to the Cyber UK website, your go-to resource for comprehensive cyber security insights tailored specifically for UK businesses. Our website is designed to equip you with the knowledge, tools, and strategies necessary to safeguard your business’s digital assets in today’s ever-evolving threat landscape.
Cyber security blog
0 notes
coolhighlanderv · 1 year ago
Text
Cyber security blog
Welcome to the Cyber UK website, your go-to resource for comprehensive cyber security insights tailored specifically for UK businesses. Our website is designed to equip you with the knowledge, tools, and strategies necessary to safeguard your business’s digital assets in today’s ever-evolving threat landscape.
Cyber security blog
0 notes
lostlibrariangirl · 1 year ago
Text
Tumblr media Tumblr media Tumblr media Tumblr media
June 19, 2024
171/366 Days of Growth
Keeping with my 3AM-4AM morning study sessions. I must admit it is harder after some years waking up this early, but I can do it.
I am grateful for the colder weather, it was hard to study with that heat, even at dawn.
Wednesday today, and it looks like the whole week has gone 🤨
185 notes · View notes
detective-jellyfish · 1 month ago
Text
Tumblr media Tumblr media Tumblr media
˙ . ꒷ 🪼 . 𖦹˙— Cyber harassment; 04/??
Tumblr media
The term "Cyber harassment" describes a type of harassment that occurs online. Cyber harassment causes severe anxiety, severe depression, PTSD (Post-Traumatic Stress Disorder) symptoms, social withdrawal and increases the risks of self harm. Victims often are dismissed because their situation is usually brushed off as "internet drama". /srs
Cyber harassment is considered a crime in several countries, where fines or jail time can be applied to the perpetrators, depending on the country's legislation. /srs
We firmly condemn cyber harassment in any way, shape or form. /srs
If you happen to find any of these blogs or posts, we firmly encourage you to report and block. /srs
Viewer discretion is advised due to the hostility of certain users. /srs
Tumblr media Tumblr media Tumblr media Tumblr media Tumblr media Tumblr media
The post on the first screenshot was uploaded on April 21st, 2025. There, you can see the user @/syltheanti willingly engaging one more time in online activities that could be considered harassment. Saying that an entire group of people should "die in a goddamn hole" could be interpreted as wishing harm (which Tumblr can ban if reported under Community Guidelines). Adding to that, it can count as inciting harassment with violent rethoric, since his post can encourage others to attack Pro-Shippers. Besides, complaining about mass reports could be considered hypocritical since Syl himself willingly engages in targeted cyber harassment, like you saw in previous posts. /srs
Proof of @/syltheanti purposely making up false accusations against @proship-froggo with the objective of justifying the targeted cyber harassment towards them down here ⬇️
Proof of @/syltheanti willingly engaging in cyber harassment while defending and supporting people who do that as well, can be found down there ⬇️
The post on the second screenshot was uploaded on April 22nd, 2025. You can see that both Anon and Syl have misunderstood the terms Pro-Shipp, Com-Shipp, and Dark-Shipp. But don't worry, we'll explain it just in case. /srs
Pro-Shipp (🌈🍖 / 🍖🌈) is a stance that supports the creation and enjoyment of all types of shipps involving fictional characters only, including those that might be considered controversial, problematic or taboo. Pro-Shippers believe fiction is separate from reality, and that enjoying problematic content in fiction doesn't necessarily mean endorsing it in real life. Pro-Shippers believe that both creators and fans should have the freedom to explore any type of relationship in fiction without censorship or judgement. Pro-Shippers often advocate for content warnings and tags to help others avoid content they might find triggering. /gen
Com-Shipp (🌸🌛 / 🌛🌸), short for "Complicated Shipping", refers to exploring or enjoying shipps that involve complex, messy, or morally ambiguous fictional characters. These relationships often have layers of conflict, tension or emotional depth. Com-Shippers are drawn to fictional relationships that aren't purely wholesome or healthy, but aren't toxic and abusive either. Com-Shippers like to explore themes like power imbalance, unresolved tension or emotional turmoil, something present in enemies to lovers fictional shipps, by example. Com-Shippers may acknowledge the problematic aspects of a shipp but still finding it interesting or meaningful. /gen
Dark-Shipp (🎱🎀 / 🎀🎱) is about shipping fictional characters in relationships that are explicitly dark, disturbing or taboo. These shipps often involve themes like abuse or manipulation. Dark-shippers are usually drawn to the exploration of dark or taboo themes in fiction, often for the sake of storytelling, emotional intensity, catharsis or shock value. Dark-shipps aren't meant to be normalized or romanticized but are instead explored as part of the story's darker elements (canon or fan made). Besides, most Dark-shippers don't endorse real life behavior, and they often emphasize the importance of content warnings and ethical storytelling when dealing with sensitive topics. /gen
Com-Shipp does exist. Maybe Syl just doesn't like the term "Com-Shipp", but that doesn't mean the term doesn't exist or shouldn't exist. For example, we don't like some things created on the internet, but that doesn't mean those things don't exist. Because the world doesn't revolve around anyone. /gen
And we just showed you that Pro-Shipp ≠ Dark-shipp. Not all Pro-Shippers are Dark-shippers. In fact, some Pro-Shippers are just Com-Shippers. /gen
Also, calling an entire online group of people "nasty fucks" is dehumanizing language meant to incite disdain or violence. /gen
The comment on the third screenshot was made on April 22nd, 2025. The user @/silly4goose20 appears once again. Let's remember it's not the first time she appears in those screenshots willingly engaging in cyber felonies. /srs
Proof that @/silly4goose20 has encouraged several people to commit suicide can be found here ⬇️
Telling people to get help or "take the trash out themselves"... Is this what we think it is? Another phrase similar to "you should get help but if you don't then you should kill yourself"? /srs.
Curiously, on the post on the fourth screenshot, you can see the hypocrisy of this individual. The post was originally uploaded on April 22nd, 2025. It seems like that, for @/silly4goose20 , inciting suicide online is okay, but she shouldn't receive a similar treatment. If she really was this worried about "people getting help" she would condemn suicide incitement in any way, shape or form. We hope her hypocrisy talks by itself. Even if the suicide incitement was unsuccessful (in the best case scenario), she still has blood in her hands and is acting no better than a real life abuser. /srs
The post on the fifth screenshot was originally uploaded on April 23rd, 2025. Well, this post (or reblog, better said) is less harmful than the other ones we've seen, but it can still count as mild cyber harassment. Comparing a group of people to literal trash is dehumanizing, and intended to degrade and insult. The post can serve as a public signal to @/sho-can-g 's online circle that mockery towards Pro-Shippers is acceptable. /srs
The post on the sixth screenshot was originally uploaded on April 13th, 2025. The user @/chubbibunni is not as active as the other users when it comes to shipping discourse, but her online behavior can be equally violent sometimes. There are several things wrong within this screenshot. /srs
The user @/smacksalad made a post saying that vent art / therapeutic art from survivors should be kept in private. As survivors of CSA and extreme physical abuse, we disagree with that statement. The Jellyfish system thinks survivors should be able to upload their vent or therapeutic art to online spaces, as long as they add the proper tags, as long as it's their own decision, and as long as they aren't willingly exposing vulnerable audiences to heavy and traumatizing topics. /gen
Survivors deserve to speak up and express themselves about the things they survived without being pressured to "be silent" or "backpedal". Many survivors (SA survivors, CSA survivors, physical abuse survivors, emotional abuse survivors, abandonment survivors, neglect survivors, and so on), are forced to stay quiet and silent by their own abusers or by the environment that enables their abusers, and this can go on for years or even decades. With this in mind, telling survivors to just "keep it to themselves" is not only disrespectful, but deeply unfair. Don't silence or censor survivors' voices and art. Yeah, some vent or therapeutic art can be deeply disturbing, but the best option is to block people who make that art, instead of urging them to "keep it private". /gen
The rage we feel every time we see someone saying "CP" instead of CSAM/CSEM is unreal omg (`皿´#) /gen /neg
To keep it short (and family friendly), if you want to support survivors, especially CSA survivors, use the correct terms. Using the term "CP" downplays and undermines the physical, psychological, and moral long-term damage survivors go through. Terms like CSAM and CSEM help remind people that it isn't a type of "porn genre", or "18+ entertainment". It's sexual violence against minors. Survivors deserve that clarity and acknowledgment. /gen
Purposely comparing vent art or therapeutic art from CSA victims/survivors and actual CSAM/CSEM is beyond fucked up. Let us do a quick explanation: /srs
Vent art / Therapeutic art about CSA
Made in a consensual and safe space. /srs
The minor has control over what happens and what doesn't happen. /srs
The main purpose is trauma processing and healing. /srs
The adult (in this case, the therapist) can guide the minor in their healing journey to achieve a better mental and physical well being. /srs
Usually consists of drawings, poems, or just phrases. /srs
CSAM/CSEM
Made in a non consensual and exploitative space. /srs
The minor has no control over the circumstances. Their autonomy and dignity are violated. /srs
The main purpose is preying on vulnerable minors and catering to pedophiles, child predator rings, or human trafficking groups. /srs
The adult (in this case, the perpetrator) often commits another type of sexual violence against the minor, provoking further physical and psychological harm.
The vast majority of times contains images or videos of real life minors being actively harmed. /srs
While the post from @/chubbibunni isn't directed to one specific user, it still can count as cyber harassment. Equating therapeutic art with literal CSAM/CSEM is not only a false comparison, but a deeply harmful one. Falsely accusing CSA/SA survivors of being child abuse perpetrators can be considered defamatory, therefore, this online behavior can be considered cyber harassment. Adding to that, this incident is not an isolated one, but a pattern of ignorant and hostile online behavior. /srs
11 notes · View notes
newsprovidernetwork · 22 days ago
Link
1 note · View note
link-layer · 4 months ago
Text
Tumblr media
Quantum Security and Post-Quantum Cryptography: Preparing for the Cryptographic Revolution
Cryptography serves as the foundation of our digital security infrastructure, protecting sensitive data from unauthorized access and ensuring the integrity of our communications. This science of secure information exchange has evolved continuously alongside advances in computing technology. However, we now stand at a critical juncture as quantum computing emerges from theoretical possibility to practical reality, threatening to undermine the very cryptographic systems we rely on daily.
The imminent arrival of powerful quantum computers presents both unprecedented challenges and opportunities for information security. This article explores how quantum computing affects current cryptographic practices, why we need quantum-resistant solutions, and the promising approaches being developed to secure our digital future in the post-quantum era.
Classical Cryptography
The Vulnerability of Classical Algorithms
The security of most cryptographic systems today relies on mathematical problems that are computationally difficult for classical computers to solve. Quantum computers, however, can exploit quantum mechanical phenomena like superposition and entanglement to solve certain problems exponentially faster than their classical counterparts.
This quantum advantage becomes particularly concerning when we consider widely-used public-key cryptographic algorithms like RSA (Rivest-Shamir-Adleman) and ECC (Elliptic-Curve Cryptography). These systems form the backbone of secure communications across the internet, protecting everything from financial transactions to private messages.
How Shor's Algorithm Threatens Current Encryption
At the heart of the quantum threat lies Shor's Algorithm, developed by mathematician Peter Shor in 1994. This quantum algorithm can efficiently solve two mathematical problems that underpin much of modern cryptography:
 RSA Encryption Under Threat
RSA encryption derives its security from the difficulty of factoring large composite numbers into their prime components. For example, while it's easy to multiply two large prime numbers (p and q) to get a product (n), working backward to determine the original primes becomes exponentially more difficult as the numbers grow larger.
A classical computer would require billions of years to factor a 2048-bit RSA key. However, Shor's Algorithm running on a sufficiently powerful quantum computer could perform this factorization in hours or even minutes. Once the prime factors are known, the private key can be easily derived from the public key, completely compromising the encryption system.
To illustrate: If n = p × q is a 2048-bit number (the product of two 1024-bit primes), a classical computer would need to check an astronomical number of possibilities. A quantum computer using Shor's Algorithm could find the factors p and q directly through quantum operations that essentially explore multiple possibilities simultaneously.
 ECC Encryption Equally Vulnerable
Elliptic Curve Cryptography faces a similar threat. ECC relies on the difficulty of solving the discrete logarithm problem on elliptic curves – finding the value k when given points G and P, where P = k·G on an elliptic curve.
Shor's Algorithm can also be adapted to solve this discrete logarithm problem efficiently. Once a quantum computer can determine the private key k from the publicly available information G and P, the security guarantees of ECC collapse completely.
These vulnerabilities are not merely theoretical concerns. As quantum computers continue to advance, the timeline for practical quantum threats to cryptography grows shorter. This reality has spurred intense research into post-quantum cryptographic solutions.
Quantum-Resistant Cryptography
Post-Quantum Cryptography: A New Paradigm
Post-quantum cryptography (PQC) represents a new approach to cryptographic algorithm design. Rather than relying on mathematical problems vulnerable to quantum attacks, PQC algorithms are built on alternative mathematical foundations believed to be resistant to both classical and quantum computational methods.
Several promising approaches have emerged in the field of post-quantum cryptography:
 Lattice-Based Cryptography
Lattice-based cryptography relies on the computational difficulty of solving certain problems related to geometric structures called lattices. These problems, such as finding the shortest vector in a high-dimensional lattice, appear resistant to quantum attacks.
CRYSTALS-Kyber, selected by NIST as a standard for post-quantum key encapsulation, exemplifies this approach. The security of Kyber stems from the hardness of the module learning with errors (MLWE) problem, which has withstood significant cryptanalysis efforts.
Lattice-based systems offer reasonable key sizes and efficient operations, making them practical for implementation across various computing environments.
 Hash-Based Cryptography
Hash-based cryptography builds secure systems from cryptographic hash functions, which are already believed to be quantum-resistant. These approaches, like SPHINCS+, provide strong security guarantees based on minimal assumptions, making them particularly attractive as conservative options for long-term security.
The main challenge with hash-based signatures has been their relatively large signature sizes, though newer variants have made significant improvements in efficiency.
 Code-Based Cryptography
Code-based cryptography leverages the difficulty of decoding certain error-correcting codes without knowledge of the code structure. McEliece, one of the oldest public-key cryptosystems (proposed in 1978), falls into this category and has resisted both classical and quantum cryptanalysis for decades.
While code-based systems typically require larger key sizes, they offer fast encryption and decryption operations, making them suitable for specific applications where key size is less constrained.
NIST's Post-Quantum Standardization Process
Recognizing the urgency of developing quantum-resistant standards, the U.S. National Institute of Standards and Technology (NIST) initiated a comprehensive evaluation process in 2016. This multi-year effort involved the global cryptographic community in analyzing and testing candidate algorithms.
In July 2022, NIST selected CRYSTALS-Kyber for general encryption and key establishment, along with three digital signature algorithms: CRYSTALS-Dilithium, FALCON, and SPHINCS+. These selections represent a significant milestone in preparing our digital infrastructure for the quantum era.
The standardization process continues with additional candidates under consideration, ensuring a diverse portfolio of solutions to meet various security and performance requirements.
Quantum Key Distribution
While post-quantum cryptography focuses on developing classical algorithms resistant to quantum attacks, quantum key distribution (QKD) takes a fundamentally different approach by using quantum mechanics itself to secure communications.
 How QKD Works
QKD leverages fundamental properties of quantum physics to create a secure communication channel. The process typically involves sending polarized photons (light particles) between two parties, traditionally named Alice and Bob:
1. Alice sends a stream of photons, each randomly polarized in one of several possible states
2. Bob measures each photon, also choosing measurement bases randomly
3. Alice and Bob publicly compare which measurement bases they used (but not the results)
4. They keep only the results where they happened to use matching bases
5. These matching results form a shared secret key
The security of QKD stems from a fundamental principle of quantum mechanics: the act of measuring a quantum system disturbs it. If an eavesdropper (Eve) attempts to intercept and measure the photons, she inevitably introduces detectable errors in the transmission. Alice and Bob can detect these errors through statistical analysis, revealing any attempted eavesdropping.
 Limitations and Practical Considerations
While QKD offers theoretical perfect security, practical implementations face significant challenges:
- Physical distance limitations due to photon loss in transmission media
- Vulnerability to side-channel attacks targeting implementation flaws
- Requirements for specialized hardware and dedicated quantum channels
- Integration difficulties with existing network infrastructure
Despite these challenges, QKD networks have been deployed in limited settings, such as financial institutions and government facilities. Ongoing research continues to address these limitations, potentially expanding QKD's practical applications.
Implementing Quantum Security
 Hybrid Cryptographic Systems
Given the evolving nature of both quantum threats and quantum-resistant solutions, security experts recommend a hybrid approach during the transition period. This strategy involves implementing both classical and post-quantum algorithms simultaneously, providing immediate protection while allowing for gradual migration.
For example, a hybrid TLS implementation might use both an RSA key exchange and a lattice-based key exchange, requiring an attacker to break both systems to compromise the connection. This approach provides defense in depth while the security community builds confidence in post-quantum solutions.
 Continuous Monitoring and Threat Detection
As quantum computing capabilities advance, organizations must implement robust monitoring systems to detect potential quantum threats. Advanced analytics and machine learning algorithms can identify unusual patterns that might indicate quantum-based attacks on cryptographic systems.
This continuous vigilance allows security teams to respond rapidly to emerging threats, potentially identifying compromised systems before significant damage occurs.
 Blockchain Integration with Quantum-Resistant Cryptography
Blockchain technology, with its emphasis on immutability and decentralized trust, represents both a vulnerable target and a potential solution in the quantum security landscape. By integrating quantum-resistant cryptographic algorithms into blockchain protocols, these systems can maintain their security guarantees even against quantum attacks.
Several blockchain projects are already implementing post-quantum signatures and encryption methods, demonstrating how these technologies can complement each other to enhance overall security.
Quantum Random Number Generation
The strength of any cryptographic system ultimately depends on the quality of randomness used in key generation. Quantum Random Number Generators (QRNGs) leverage quantum phenomena to produce truly random numbers, providing a fundamental advantage over classical random number generators.
Unlike classical RNGs, which might contain subtle patterns or biases, QRNGs derive randomness from inherently unpredictable quantum processes like radioactive decay or photon path detection. This true randomness strengthens cryptographic systems by ensuring that keys cannot be predicted, even with advanced computational capabilities.
Commercial QRNG solutions are already available, offering enhanced security for critical applications where high-quality randomness is essential.
Preparing for the Post-Quantum Future
 Impact Across Sectors
The transition to quantum-resistant cryptography will affect virtually every sector of the digital economy:
Financial Services: Banks and payment processors must protect transaction data not only from current threats but also from future attacks where encrypted data, harvested today, could be decrypted once quantum computers mature—a "harvest now, decrypt later" attack strategy.
Healthcare: Medical records contain sensitive personal information that requires long-term protection, making early adoption of post-quantum cryptography particularly important for healthcare organizations.
Government and National Security: Government agencies handling classified information face some of the most urgent needs for quantum-resistant solutions, as nation-state adversaries may be among the first to develop advanced quantum computing capabilities.
Critical Infrastructure: Power grids, telecommunications networks, and transportation systems rely on secure communications to function safely, making their protection from quantum threats a matter of national security.
 Research and Development Priorities
As we navigate the transition to post-quantum security, several research priorities emerge:
Performance Optimization: Further research to improve the efficiency of post-quantum algorithms, reducing computational overhead and resource requirements
Implementation Security: Development of side-channel resistant implementations to ensure that practical deployments don't introduce vulnerabilities
Cryptographic Agility: Creating systems that can rapidly update cryptographic algorithms without major infrastructure changes
Standards Development: Continued international cooperation on cryptographic standards to ensure global interoperability of secure systems
Conclusion
The advent of quantum computing represents both a significant challenge and an opportunity for cryptographic security. While quantum computers threaten to break the mathematical foundations of current encryption systems, they also inspire the development of more robust cryptographic approaches.
Through the development and adoption of post-quantum cryptographic algorithms, quantum key distribution, and enhanced security practices, we can ensure that our digital infrastructure remains secure in the quantum era. The path forward requires collaboration between researchers, industry leaders, and government agencies, working together to build quantum-resistant systems before large-scale quantum computers become a reality.
By understanding the quantum threat landscape and implementing proactive security measures, organizations can protect their sensitive information and maintain trust in digital systems even as quantum computing technology advances. The time to prepare for the post-quantum future is now, ensuring that cryptography continues to fulfill its essential role in securing our increasingly connected world.
0 notes
emselimahmed · 4 months ago
Text
The Best Password Managers for 2025: Secure Your Digital Life
https://techtweakster.blogspot.com/2025/02/The-Best-Password-Managers-for-2025.html
#passwordmanager #security #password #tech #secure #TechTweakster
Tumblr media
0 notes
leonbasinwriter · 6 months ago
Text
Reflections and Goals: Achievements of 2024 and Vision for 2025
As 2024 comes to a close, I’m taking a moment to reflect on a year of significant growth, impactful milestones, and valuable lessons learned. Key Achievements in 2024: Spearheaded a targeted campaign in Brazil, resulting in a 15% increase in engagement and stronger traction in the LATAM region. This success led to a significant influx of new leads and a noticeable increase in qualified…
0 notes
defencestar · 6 months ago
Text
Leonardo, Arbit Join Hands to Develop Advanced Cybersecurity Solution for Multi-Domain Operations
Leonardo, Arbit Join Forces to Develop Advanced Cybersecurity Solution: Rome – Leonardo, a global high-tech company, has announced a strategic agreement with Arbit Cyber Defence Systems, a Danish specialist in data security solutions for Intelligence, Defence, EU, and NATO multinational and multi-domain operations. The collaboration aims to co-design, co-develop, and certify a cutting-edge…
0 notes
gretavdr · 1 year ago
Text
Unforeseen consequences
I have to admit that it’s convenient to be able to pay bills online. No standing in queues at counters, no having to post paper cheques (remember them?). But as more and more of our lives are lived in the cloud, companies have had to take more and more actions to prevent the wrong people from misusing their computer systems or hacking them. Not so long ago somebody hacked Optus’s databases. It’s…
Tumblr media
View On WordPress
0 notes
lostlibrariangirl · 7 months ago
Text
Tumblr media Tumblr media Tumblr media
November 27, 2024
Days of Growth 332/366
It is hot as hell in Brazil. I am planning somethings for 2025 (and reviewing my whole life in the process 😵‍💫 I need to do something intense with my life).
91 notes · View notes
detective-jellyfish · 2 months ago
Text
Tumblr media Tumblr media Tumblr media Tumblr media Tumblr media
˙ . ꒷ 🪼 . 𖦹˙— Cyber harassment; 01/??
The term "Cyber harassment" describes a type of harassment that occurs online. Cyber harassment causes severe anxiety, severe depression, PTSD (Post-Traumatic Stress Disorder) symptoms, social withdrawal and increases the risks of self harm. Victims often are dismissed because their situation is usually brushed off as "internet drama". /srs
Cyber harassment is considered a crime in several countries, where fines or jail time can be applied to the perpetrators, depending on the country's legislation. /srs
We firmly condemn cyber harassment in any way, shape or form. /srs
The following images are evidence of these people willingly engaging in cyber harassment. Viewer discretion is advised because some of these individuals have an hostile online behavior. If you happen to see any of these posts, or if you happen to see these blogs, report and block. /srs
Tumblr media Tumblr media Tumblr media
Tumblr media Tumblr media
The owner of the blog @/syltheanti is a minor. His online behavior has reached a certain point where he is literally just a police report of being registered as a felon (cyber harassment is considered a felony in several countries), and getting his parents or legal guardians notified of his online behavior. We firmly recommend you to not interact with this individual at all, due to his hostile behavior. Report and block him. /neu
These screenshots are irrefutable proof that the user @/syltheanti willingly engages in cyber harassment and even defends people who also engage in it. The user @/kittizclouwdz , who actually goes by @/anti-rq-kitty , is known for engaging in targeted cyber harassment just like Syl. One of her most infamous moments was when she sent over 100 messages to the user @proship-froggo . You can find evidence of this in their blog. /neu
All the posts attached were uploaded on April 19th, 2025. /neu
7 notes · View notes
alpbeyazgul · 1 year ago
Text
0 notes