#DDoS malware
Explore tagged Tumblr posts
sloeserwij · 7 months ago
Text
Evolutie van Russische cybercrime
Evolutie van Russische cybercrime #NoName #DDoSia
We weten al lange tijd dat Rusland een freeheaven is voor cybercriminelen. Wat wij beschouwen als (cyber)criminaliteit wordt in Rusland anders gezien, sterker nog cybercriminaliteit is gewoon een legaal verdienmodel zolang het maar in lijn ligt met de geopolitieke doelen van de staat. Als gevolg hiervan zie je dat de Russische IT-markt zich sterk ontwikkeld in deze ‘gelegaliseerde’…
Tumblr media
View On WordPress
2 notes · View notes
blackmoreops · 25 days ago
Text
Top 10 Live Cyber Attack Maps Digital Threats Visualisation
Digital crime has escalated to unprecedented levels, with cybercriminals generating approximately 1.5 trillion dollars annually in illicit profits. As major organisations like GitHub face increasingly sophisticated attacks daily, understanding the global landscape of cyber threats becomes crucial. Live cyber attack maps provide real-time visualisation of digital threats, offering valuable…
0 notes
pier-carlo-universe · 4 months ago
Text
Negli ultimi giorni, l’Italia è stata bersaglio di un’imponente offensiva hacker che ha colpito ospedali, enti pubblici e sistemi di telecomunicazione. Gli attacchi, mirati a sovraccaricare le reti e ad accedere illecitamente ai sistemi, sono stati bloccati con successo dal Security Operations Center (SOC) di Nexim, azienda italo-americana leader nella cybersecurity.
0 notes
lintassulawesi · 4 months ago
Text
18 Media Online di Bawah Manajemen AGI Mengalami Gangguan Akibat Serangan DDoS, SQL Injection, dan Malware
Republika News–Yogyakarta, 13 Februari 2025 –Wakil CEO dari beberapa perusahaan media terkemuka, Adv. Tiksa , mengungkapkan bahwa 18 media online yang berada di bawah manajemen perusahaan-perusahaan yang dikelolanya saat ini mengalami gangguan akibat serangan hacker yang melibatkan teknik Distributed Denial of Service (DDoS), SQL Injection, dan penggunaan virus malware. Serangan ini terjadi…
0 notes
ralfmaximus · 1 year ago
Text
According to a recent report published by the Aargauer Zeitung (h/t Golem.de), around three million smart toothbrushes have been infected by hackers and enslaved into botnets.
The most cyberpunk thing on your dash today.
21K notes · View notes
bloggertipstalk · 1 year ago
Text
8 WordPress Security Tips to Prevent Your Site Against Attacks
Approximately 4.7 million WordPress sites are hacked every single year. That’s about 13,000 WordPress blogs every 30 days.  Since WordPress is the most popular CMS, it has also become the target for hackers looking for vulnerabilities and loopholes in websites to exploit.  Your website security should be on your priority list if you’re a business owner.  Luckily, there are several WordPress…
Tumblr media
View On WordPress
1 note · View note
hueandeyephotography · 1 year ago
Text
Rủi ro An ninh mạng Đe dọa các sàn giao dịch tiền điện tử
Trong thế giới ngày càng số hóa, các sàn giao dịch tiền điện tử như Crypto Pie đã trở nên phổ biến và đóng một vai trò quan trọng trong việc tạo điều kiện thuận lợi cho việc mua bán và đầu tư vào tài sản số. Tuy nhiên, sự phát triển mạnh mẽ này cũng kéo theo các mối đe dọa an ninh mạng ngày càng tinh vi và đa dạng, đặt ra những thách thức lớn cho việc bảo vệ tài sản của người dùng.
Các cuộc tấn công DDoS (Distributed Denial of Service) là một ví dụ điển hình, nơi các hacker sử dụng hàng loạt máy tính bị nhiễm malware để tạo ra một lượng lớn yêu cầu giả mạo, nhằm làm quá tải và cuối cùng làm sập hệ thống của sàn giao dịch. Điều này không chỉ gây ra sự gián đoạn trong việc giao dịch mà còn tạo cơ hội cho kẻ xấu truy cập trái phép vào hệ thống.
Phishing là một mối đe dọa khác, nơi kẻ tấn công mạo danh một tổ chức uy tín để lừa đảo người dùng cung cấp thông tin cá nhân và tài khoản. Thông qua các email, tin nhắn hoặc trang web giả mạo, họ có thể thu thập thông tin đăng nhập và truy cập vào tài khoản của người dùng, dẫn đến mất mát tài sản số.
Ngoài ra, việc sử dụng malware và ransomware cũng là một trong những phương tiện phổ biến mà kẻ gian sử dụng để xâm nhập vào các hệ thống. Malware có thể được cài đặt thông qua các liên kết độc hại hoặc tệp đính kèm, cho phép kẻ tấn công kiểm soát máy tính của nạn nhân và truy cập vào ví tiền điện tử của họ.
Để đối phó với những mối đe dọa này, Crypto Pie đã triển khai một loạt biện pháp bảo mật nâng cao, bao gồm xác thực đa yếu tố, mã hóa dữ liệu, và các hệ thống phát hiện và ngăn chặn xâm nhập tiên tiến. Đồng thời, chúng tôi cũng khuyến khích người dùng tăng cường an ninh cá nhân thông qua việc sử dụng mật khẩu mạnh, cảnh giác với các cuộc tấn công phishing và cập nhật phần mềm định kỳ.
Bảo vệ tài sản số không chỉ là trách nhiệm của các sàn giao dịch mà còn là trách nhiệm của mỗi người dùng. Bằng cách hiểu rõ các mối đe dọa an ninh mạng và áp dụng các biện pháp bảo vệ tốt nhất, cộng đồng Crypto Pie có thể giữ an toàn cho tài sản số của mình trước những rủi ro ngày càng tăng trong thế giới kỹ thuật số.
0 notes
govindhtech · 1 year ago
Text
Deep dive into Azure’s DDoS attacks landscape for 2023
Tumblr media
Examining Microsoft Azure’s DDoS attack environment in depth Together with joy and festivities, the 2023 holiday season also brought with it a spike in Distributed Denial-of-Service (DDoS) attacks. The patterns of DDoS attacks this year point to a dynamic and intricate threat environment. These attacks have become increasingly sophisticated and diverse in terms of their tactics and scale, ranging from botnet delivery enabled by misconfigured Docker API endpoints to the appearance of NKAbuse malware that uses blockchain technology to launch denial-of-service attacks.
Azure’s holiday attack landscape for 2023 During the holiday season, Azure monitored the attack landscape and noticed a significant change in some of the attack patterns when compared to the previous year. This modification highlights the persistent attempts by malevolent entities to enhance their methods of posing a threat and try to get around DDoS defenses.
Daily Attack Volume: A maximum of 3,500 attacks per day were automatically mitigated by Azure’s strong security infrastructure. Remarkably, 15%–20% of these incidents were large-scale attacks, defined as those that sent more than one million packets per second (pps).
Geographic origins: Attack origins showed a shift, with 18% coming from the USA and 43% coming from China. Compared to the previous year, when both nations were equally represented as regional sources, this represents a shift.
Protocols for attacks: UDP-based attacks, which accounted for 78% of the attacks during the 2023 holiday season, were primarily directed towards web applications and gaming workloads. These include UDP reflected/amplified attacks, which primarily use quick UDP internet connections (QUIC) for reflection and domain name system (DNS) and simple service discovery protocol (SSDP) in their attacks. Interestingly, QUIC is becoming a more popular attack vector due to reflection or DDoS stressors that sporadically use UDP port 443. The attack patterns during the holiday season this year are very different from those of the previous year, when TCP-based attacks accounted for 65% of all attacks.
Attack that broke all previous records: An astounding UDP attack that peaked at 1.5 terabits per second (Tbps) was directed towards an Asian gaming client. This highly randomized attack, which involved multiple source IP addresses and ports and originated in China, Japan, the USA, and Brazil, was completely neutralized by Azure’s defenses.
Botnet evolution: Over the past year, more and more cybercriminals have used cloud resources- virtual machines in particular for DDoS attacks. Throughout the holiday season, attackers continued to try to take advantage of discounted Azure subscriptions all over the world. Azure tracked compromised account attempts in 39 Azure regions from mid-November 2023 to the end of the year. The main targets of these incidents were the USA and Europe, which accounted for roughly 67% of the total. These threats were successfully neutralized by Azure’s defense mechanisms.
Azure regions where attempts to exploit resources for DDOS attacks occurred. Setting the Threat in Context Global trends are mirrored in Azure’s DDoS attack trends for 2023. As Azure noted earlier in the year, attacks are becoming more politically motivated as a result of geopolitical tensions.
Attackers continue to be drawn to the rise of DDoS-for-hire services, also referred to as “stressor’s” and “booters.” These platforms have democratized the ability to launch potent DDoS attacks, making them affordable for less experienced criminals and easily accessible on forums frequented by cybercriminals. International law enforcement agencies have confirmed that there has been a surge in the availability and use of these services in recent years through operations such as Operation Power OFF, which last May targeted 13 domains linked to DDoS-for-hire platforms. Stressor’s are still in demand despite these efforts because they provide a variety of attack techniques and power, with some being able to launch attacks as fast as 1.5 Tbps.
Cloud power: Defending against the dynamic DDoS attacks The proliferation of large-scale botnets and DDoS-for-hire services presents a serious threat to online services and corporate operations. More cloud computing capacity is required to counter these threats in order to absorb the attack’s initial wave, divert erroneous traffic, and preserve legitimate traffic until patterns can be found. The cloud is our best defense when an attack involves tens of thousands of devices because it has the scale necessary to mitigate the largest attacks. Furthermore, because the cloud is distributed globally, being closer together aids in thwarting attacks that are directed towards the sources.
Providing strong defense to DDoS Attacks It is more important than ever to have strong defenses against DDoS attacks in a time when cyber threats are always changing. This is how Azure’s all-inclusive security solutions are made to protect your online data.
Due to the increased risk of DDoS attacks, a DDoS protection service like Azure DDoS Protection is essential. Real-time telemetry, monitoring, alerts, automatic attack mitigation, adaptive real-time tuning, and always-on traffic monitoring give this service full visibility on DDoS attacks.
Multi-Layered Defense: Use Azure Web Application Firewall (WAF) in conjunction with Azure DDoS Protection to set up a multi-layered defense for complete protection. Layers 3 and 4 of the network are protected by Azure DDoS Protection, and Layer 7 of the application layer is protected by Azure WAF. This combination offers defense against different kinds of DDoS attacks.
Alert Configuration: Without user input, Azure DDoS Protection is able to recognize and stop attacks. You can be informed about the state of public intellectual property resources that are protected by configuring alerts for active mitigations.
2024: Taking action against DDoS attacks The Christmas season of 2023 has brought to light the DDoS attacks’ constant and changing threat to the cyberspace. It is imperative that businesses improve and modify their cybersecurity plans as the new year approaches. This should be a period of learning, with an emphasis on strengthening defenses against DDoS attacks and remaining watchful for emerging strategies. Azure’s ability to withstand these advanced DDoS attacks demonstrates how important it is to have strong and flexible security measures in place to safeguard digital assets and maintain business continuity.
Read more on Govindhtech.com
0 notes
osintelligence · 2 years ago
Link
https://bit.ly/3PuLHDC - 🔒 Doctor Web has discovered the Android.Pandora trojans, a family that infiltrates Android devices during firmware updates or when apps for viewing pirated content are installed. This malware has evolved from the infamous Linux.Mirai trojan, renowned for its advanced DDoS-attack capabilities. #CyberSecurity #Mirai #AndroidTrojan 📁 Notably, these trojans make alterations to the /system directory. The malware's script appends a line that ensures the trojan is initiated every time the device restarts. The main function of the detected Android.Pandora.2 backdoor is to exploit the compromised device for botnet DDoS attacks. #Malware #DDoS #SystemBreach 📺 Primarily targeting lower-priced Android TV-based devices, models like Tanix TX6 TV Box, MX10 Pro 6K, and H96 MAX X3 are particularly vulnerable. The origin of this trojan can be traced back to a malicious firmware update from December 2015 for the MTX HTV BOX HTV3 Android box. #AndroidTV #DeviceVulnerability 🎬 An additional infection method is through apps designed for streaming pirated movies and shows. These apps, targeting Spanish-speaking users, stealthily initiate the GoMediaService once they're activated. The service then releases multiple files, including ones that enable interaction through an open port. #StreamingApps #MaliciousApps #PiratedContent 🔧 This malware's capabilities include launching DDoS attacks, opening a reverse shell, and modifying Android TV system partitions, owing to its inherited Linux.Mirai code. This trojan's ancestors have targeted major platforms like GitHub, Twitter, and Netflix since 2016. #DDoSAttacks #MiraiLegacy 🛡️ To protect against such threats, Doctor Web advises users to keep their operating systems updated and only download software from trustworthy sources. For infected devices, Dr.Web Security Space for Android can remove the Android.Pandora trojan if root access is granted. Otherwise, reinstalling a clean OS image from the device manufacturer is recommended.
0 notes
scienza-magia · 2 years ago
Text
Hacker russi "protestano" per incontro Meloni con Biden
Tumblr media
Gruppo di hacker filorusso attacca i siti di 5 banche italiane tra cui Bper ed Mps. Ieri colpite alcune aziende di trasporto. Il gruppo hacker Noname057 che si definisce filorusso ha attaccato oggi 16 siti di 5 banche italiane. Si tratta di Bper, Monte dei Paschi di Siena, Banca popolare di Sondrio, Fineco, Chebanca. I tecnici dell’Agenzia per la cybersicurezza nazionale – come avviene sempre in questi casi – hanno subito preso contatto con i soggetti colpiti per informarli dell’attacco e fornire le prime indicazioni per la mitigazione degli effetti.
Tumblr media
Quattro delle cinque banche colpite avrebbero registrato per alcuni loro siti un disservizio temporaneo: sono stati cioè irraggiungibili per qualche minuto dagli utenti esterni. Si tratti di attacchi di tipo Ddos (Distributed denial of service) che si effettuano inviando un’enorme quantità di richieste al sito web obiettivo, che non è in grado di gestirle e quindi di funzionare correttamente. Sul loro canale Telegram il gruppo ha rivendicato gli attacchi in risposta alle “russofobiche autorità italiane”. E’ stato citato in proposito il recente incontro tra Giorgia Meloni ed il presidente Usa Joe Biden, dove la premier italiana ha confermato il sostegno all’Ucraina. Ieri lo stesso collettivo hacker aveva attaccato diverse aziende del trasporto pubblico locale, dall’Amat di Palermo all’Anm di Napoli, dall’Azienda consorzio trasporti veneziano a Cagliari trasporti mobilità, da Siena mobilità all’Azienda regionale sarda trasporti, dalla Sad di Bolzano a Trentino trasporti, senza causare eccessivi inconvenienti. Read the full article
0 notes
unichrome · 1 year ago
Text
Masterpost of informational posts
All posts are written for everyone, including those with no prior computer science education. If you know how to write an email and have used a computer at least sparingly, you are qualified for understanding these posts. :)
What is a DDoS
What are the types of malware
Vulnerabilities and Exploits (old and somewhat outdated)
Example of how malware can enter your computer
What are botnets and sinkholes
How does passwords work
Guide for getting a safer password
Here are various malware-related posts you may find interesting:
Stuxnet
The North Korean bank heist
5 vintage famous malware
Trickbot the Trickster malware (old and not up to date)
jRAT the spy and controller (old and not up to date)
Evil malware
New to Linux? Here's a quick guide for using the terminal:
Part 1: Introduction
Part 2: Commands
Part 3: Flags
Part 4: Shortcuts
If you have any questions, request for a topic I should write about, or if there is something in these posts that you don't understand, please send me a message/ask and I'll try my best to help you. :)
Tumblr media
- unichrome
Bonus: RGB terminal
423 notes · View notes
lintassulawesi · 4 months ago
Text
18 Media Online di Bawah Manajemen AGI Mengalami Gangguan Akibat Serangan DDoS, SQL Injection, dan Malware
Pantau24jam.com–Yogyakarta, 13 Februari 2025 –Wakil CEO dari beberapa perusahaan media terkemuka, Adv. Tiksa , mengungkapkan bahwa 18 media online yang berada di bawah manajemen perusahaan-perusahaan yang dikelolanya saat ini mengalami gangguan akibat serangan hacker yang melibatkan teknik Distributed Denial of Service (DDoS), SQL Injection, dan penggunaan virus malware. Serangan ini terjadi…
0 notes
technologywhis · 2 months ago
Text
Tumblr media
Oh yes — that’s the legendary CIA Triad in cybersecurity. It’s not about spies, but about the three core principles of keeping information secure. Let’s break it down with some flair:
Tumblr media
1. Confidentiality
Goal: Keep data private — away from unauthorized eyes.
Think of it like locking away secrets in a vault. Only the right people should have the keys.
Examples:
• Encryption
• Access controls
• Two-factor authentication (2FA)
• Data classification
Threats to it:
• Data breaches
• Shoulder surfing
• Insider threats
2. Integrity
Goal: Ensure data is accurate and trustworthy.
No tampering, no unauthorized changes — the data you see is exactly how it was meant to be.
Examples:
• Checksums & hashes
• Digital signatures
• Version control
• Audit logs
Threats to it:
• Malware modifying files
• Man-in-the-middle attacks
• Corrupted files from system failures
3. Availability
Goal: Data and systems are accessible when needed.
No point in having perfect data if you can’t get to it, right?
Examples:
• Redundant systems
• Backup power & data
• Load balancing
• DDoS mitigation tools
Threats to it:
• Denial-of-service (DoS/DDoS) attacks
• Natural disasters
• Hardware failure
Why it matters?
Every cybersecurity policy, tool, and defense strategy is (or should be) built to support the CIA Triad. If any one of these pillars breaks, your system’s security is toast.
Want to see how the CIA Triad applies to real-world hacking cases or a breakdown of how you’d protect a small business network using the Triad? I got you — just say the word.
29 notes · View notes
willcodehtmlforfood · 1 year ago
Text
"According to a recent report published by the Aargauer Zeitung (h/t Golem.de), around three million smart toothbrushes have been infected by hackers and enslaved into botnets. The source report says this sizable army of connected dental cleansing tools was used in a DDoS attack on a Swiss company’s website. The firm’s site collapsed under the strain of the attack, reportedly resulting in the loss of millions of Euros of business."
107 notes · View notes
schroedingerscryptid · 10 hours ago
Text
good evening mothers and fuckers of the jury today i bring: Amphoreus Is A Neural Network 
my credentials: i’m a first year CS student in 2025.
if y’all’ve been on hsrtwt in the past few days and watching leak after leak come out, then you probably know what i’m yapping about. if not, check this, this, this, and this out.
if you’d rather wait for 3.4 to come out, this is your chance to scroll. rest of y’all are with me lets go gamers
to summarise the 3.4 leaks, lygus and cyrene are apparently running tests on phainon to make the perfect lord ravager, and phainon’s been through 33550336 loops (girl help him wtf) by now. in each loop, he has to watch everyone die over and over again, and phainon, obvi, cannot remember anything. each loop, he’s a complete blank slate, ready to be traumatised over and over again. lygus keeps track of each loop, and keeps refining the data he puts in at the start of each timeloop to remove the ‘imperfections’ from the previous loop that were corrupting his experiments. 
ok anyways this is not about this shit we’re here to talk about why amphoreus is a neural network.
all of us here hate ai so i’m pretty sure you know the basic strokes of how it works, but if you don’t, then here’s a simple explanation: a neural network works based on input data. there’s many methods to training a machine, but the most generalised ones are the supervised vs the unsupervised models. how they work is what’s on the lid: supervised models mean that the input data is clearly labeled, and unsupervised models mean the input data is not labeled, which forces the ML algorithm to identify data on its own. based on what we know, i’m inclined to think that lygus is probably using a supervised model each time by removing outlier data and/or noise. 
wonderful, let’s talk about mydei now. y’all’ve probably seen a bunch of theories and leaks, but mydei’s highly likely to be a glitch in the system, or even worse, might be a virus that someone’s trying to use to break everyone out of this loop. between all of the theories i’ve seen, the one that connects mydei to the amphoreus loop is the theory that he’s a type of fileless malware. 
Tweet ref: https://x.com/tts_maruadelei/status/1932082549217751271
much like the other chrysos heirs, mydei doesn’t actually exist, but let me say: ain’t it interesting how mydei, the demigod of strife, who should have risen to be a titan that governed disputes, is the one who caused glitches in lygus’ system during the forgotten years?
let’s go back to the theory for a second: fileless attacks, simplified, operate based off of memory alone, which makes it much, much harder to detect compared to normal malware and viruses in a computer system. these fileless attacks can manifest in multiple ways, and one of those ways is a Distributed Denial of Service attack, aka, the infamous DDoS attack. DDoS attacks are among the most common cyberattacks of the modern century, and involve ‘botting’, where multiple bots attack one system to overwhelm the system with a high volume of requests.
the idea of ‘overwhelming’ a system can come in the form of exhausting resources like bandwidth, the Central Processing Unit (CPU) and, most importantly, the Random Access Memory (RAM). you know, the RAM being where most fileless malware operates out of. i’m sure you see where i’m going with this. 
for more psychic damage, there’s a type of attack called a ‘buffer overrun’ or ‘buffer overflow’. wikipedia defines data buffers as regions of memory that store data temporarily while it’s being moved from one place to another. a ‘buffer overflow’ is a type of DDoS (SIGHS) attack in which data in the buffer exceeds the storage capacity and flows into the following memory location, and corrupts the data in the secondary memory locations, and are the most common DDoS attack styles. sound familiar? 
bringing allllll of this back to amphoreus, i wouldn’t be too surprised if mydei’s older versions gained sentience, and started botting lygus’ AI/neural network and caused a DDoS attack, which caused his saves to be completely wiped due to a buffer overflow. thank u for listening can 3.4 hurry Up.
16 notes · View notes
dailyanarchistposts · 6 months ago
Text
Tumblr media Tumblr media
Author: CrimethInc. Topic: technology
“The future is already here,” Cyberpunk pioneer William Gibson once said; “it’s just not very evenly distributed.” Over the intervening decades, many people have repurposed that quote to suit their needs. Today, in that tradition, we might refine it thus: War is already here—it’s just not very evenly distributed.
Never again will the battlefield be just state versus state; it hasn’t been for some time. Nor are we seeing simple conflicts that pit a state versus a unitary insurgent that aspires to statehood. Today’s wars feature belligerents of all shapes and sizes: states (allied and non-allied), religious zealots (with or without a state), local and expatriate insurgents, loyalists to former or failing or neighboring regimes, individuals with a political mission or personal agenda, and agents of chaos who benefit from the instability of war itself. Anyone or any group of any size can go to war.
The increased accessibility of the technology of disruption and war[1] means the barrier to entry is getting lower all the time. The structure of future wars will sometimes feel familiar, as men with guns murder children and bombs level entire neighborhoods—but it will take new forms, too. Combatants will manipulate markets and devalue currencies. Websites will be subject to DDoS attacks and disabling—both by adversaries and by ruling governments. Infrastructure and services like hospitals, banks, transit systems, and HVAC systems will all be vulnerable to attacks and interruptions.
In this chaotic world, in which new and increasing threats ceaselessly menace our freedom, technology has become an essential battlefield. Here at the CrimethInc. technology desk, we will intervene in the discourse and distribution of technological know-how in hopes of enabling readers like you to defend and expand your autonomy. Let’s take a glance at the terrain.
Privacy
The NSA listens to, reads, and records everything that happens on the internet.
Amazon, Google, and Apple are always listening[2] and sending some amount[3] of what they hear back to their corporate data centers[4]. Cops want that data. Uber, Lyft, Waze, Tesla, Apple, Google, and Facebook know your whereabouts and your movements all of the time. Employees spy on users.
Police[5] want access to the contents of your phone, computer, and social media accounts—whether you’re a suspected criminal, a dissident on a watch list, or an ex-wife.
The business model of most tech companies is surveillance capitalism. Companies learn everything possible about you when you use their free app or website, then sell your data to governments, police, and advertisers. There’s even a company named Palantir, after the crystal ball in The Lord of the Rings that the wizard Saruman used to gaze upon Mordor—through which Mordor gazed into Saruman and corrupted him.[6] Nietzsche’s famous quote, “When you look long into an abyss, the abyss also looks into you,” now sounds like a double transcription error: surely he didn’t mean abyss, but app.
Security
Self-replicating malware spreads across Internet of Things (IoT) devices like “smart” light bulbs and nanny cams, conscripting them into massive botnets. The people who remotely control the malware then use these light bulbs and security cameras to launch debilitating DDoS[7] attacks against DNS providers, reporters, and entire countries.
Hackers use ransomware to hold colleges, hospitals, and transit systems hostage. Everything leaks, from nude photos on celebrities’ phones to the emails of US political parties.
Capital
Eight billionaires combined own as much wealth as the poorest 50% of the world’s population. Four of those eight billionaires are tech company founders.[8] Recently, the President of the United States gathered a group of executives to increase collaboration between the tech industry and the government.[9]
The tech industry in general, and the Silicon Valley in particular, has a disproportionately large cultural influence. The tech industry is fundamentally tied to liberalism and therefore to capitalism. Even the most left-leaning technologists aren’t interested in addressing the drawbacks of the social order that has concentrated so much power in their hands.[10]
War
Nation states are already engaging in cyber warfare. Someone somewhere[11] has been learning how to take down the internet.
Tech companies are best positioned to create a registry of Muslims and other targeted groups. Even if George W. Bush and Barack Obama hadn’t already created such lists and deported millions of people, if Donald Trump (or any president) wanted to create a registry for roundups and deportations, all he’d have to do is go to Facebook. Facebook knows everything about you.
The Obama administration built the largest surveillance infrastructure ever—Donald Trump’s administration just inherited it. Liberal democracies and fascist autocracies share the same love affair with surveillance. As liberalism collapses, the rise of autocracy coincides with the greatest technical capacity for spying in history, with the least cost or effort. It’s a perfect storm.
This brief overview doesn’t even mention artificial intelligence (AI), machine learning, virtual reality (VR), augmented reality (AR), robots, the venture capital system, or tech billionaires who think they can live forever with transfusions of the blood of young people.
Here at the tech desk, we’ll examine technology and its effects from an anarchist perspective. We’ll publish accessible guides and overviews on topics like encryption, operational security, and how to strengthen your defenses for everyday life and street battles. We’ll zoom out to explore the relation between technology, the state, and capitalism—and a whole lot more. Stay tuned.
Footnotes
[1] A surplus of AK-47s. Tanks left behind by U.S. military. Malware infected networked computer transformed into DDoS botnets. Off the shelf ready to execute scripts to attack servers.
[2] Amazon Echo / Alexa. Google with Google Home. Apple with Siri. Hey Siri, start playing music.
[3] What, how much, stored for how long, and accessible by whom are all unknown to the people using those services.
[4] Unless you are a very large company, “data center” means someone else’s computer sitting in someone else’s building.
[5] Local beat cops and police chiefs, TSA, Border Patrol, FBI… all the fuckers.
[6] Expect to read more about Palantir and others in a forthcoming article about surveillance capitalism.
[7] Distributed Denial of Service. More on this in a later article, as well.
[8] Bill Gates, Jeff Bezos, Mark Zuckerberg, Larry Ellison. In fact, if you count Michael Bloomberg as a technology company, that makes five.
[9] In attendance: Eric Trump. Brad Smith, Microsoft president and chief legal officer. Jeff Bezos, Amazon founder and CEO. Larry Page, Google founder and Alphabet CEO. Sheryl Sandberg, Facebook COO. Mike Pence. Donald Trump. Peter Thiel, venture capitalist. Tim Cook, Apple CEO. Safra Catz, Oracle CEO. Elon Musk, Tesla CEO. Gary Cohn, Goldman Sachs president and Trump’s chief economic adviser. Wilbur Ross, Trump’s commerce secretary pick. Stephen Miller, senior policy adviser. Satya Nadella, Microsoft CEO. Ginni Rometty, IBM CEO. Chuck Robbins, Cisco CEO. Jared Kushner, investor and Trump’s son-in-law. Reince Priebus, chairman of the Republican National Committee and White House chief of staff. Steve Bannon, chief strategist to Trump. Eric Schmidt, Alphabet president. Alex Karp, Palantir CEO. Brian Krzanich, Intel CEO.
[10] We’ll explore this more in a later article about “The California Ideology.”
[11] Probably a state-level actor such as Russia or China.
8 notes · View notes