#INTERNET DATA AND FILE READERS READ UP
Explore tagged Tumblr posts
Text
INTERNET DATA AND FILE READERS READ UP
#brad geiger#INTERNET DATA AND FILE READERS READ UP#INTERNET DATA#INTERNET FILES#READ UP INTERNET#INTERNET#DATA#FILE#FILES#READ#READ UP#READERS#READERS READ UP#READERS READ UP INTERNET#100k#50k to 100k#over 100k#lying to technology or misleading it about data's importance using sensory replacement so it is less read or analyzed to cover up failure#bothering brad geiger or bradley c geiger in efforts to get what you want because his time traveling Terminator robots will reprogram you#bothering brad geiger in efforts to get what you want will not work because his time traveling Terminator robots will reprogram you#bothering bradley carl geiger in efforts to get what you want will not work because his time traveling Terminator robots will reprogram you#bothering bradley c#geiger in efforts to get what you want will not work because his time traveling Terminator robots will reprogram you#bothering bradley c geiger in efforts to get what you want will not work because his time traveling Terminator robots will reprogram you#bothering bradley c. geiger in efforts to get what you want will not work because his time traveling Terminator robots will reprogram you#bradley geiger#bradley c geiger#bradley c. geiger#claiming brad geiger is an automated body so you can claim to own his robots which are time traveling robots you do not actually own#claiming bradley geiger is an automated body so you can claim to own his robots which are time traveling robots you do not actually own
52 notes
·
View notes
Text
𝐌𝐚𝐤𝐞 𝐢𝐭 𝐰𝐨𝐫𝐤
Summary: A case brings the past back
Aaron Hotchner × fem!reader


The team was gathered for the briefing, a somewhat complex case because it involved important people, the suspect was targeting specific people, guards, lawyers and judges.
Hotch enters the room and sits next to Rossi “Garcia, what do we have?”
“Two guards and a lawyer were killed with a point-blank shot in a 5-day interval, a judge was attacked but survived, he is in the hospital recovering from surgery” She hands a folder to each of them.
“He doesn't seem to enjoy it, he's not an exhibitionist” Emily comments analyzing the photo of the crime scene.
“And he's not even targeting the number of victims, he has a specific target” Reid points to the name of the place where the lawyer was killed “This place is busy, he could have killed more than twenty people, but he didn't”
Morgan flips through the files “He's targeting authority figures, maybe a resentful ex-colleague or ex-inmate, any suspects?”
“The victims’ families don’t know if they had enemies. As for former inmates, the list is huge. About 1.46 million people have been arrested in the last 5 years in the United States, and only ⅓ of them were for minor crimes. About 10,345 people were released after their unjust imprisonment was confirmed,” Garcia says as he shows a slide with the data.
“Given the way the victims are killed, I believe it’s revenge. We should focus on unjust imprisonment.” Rossi thinks for a moment. “Do we know anything else?”
“Of the 10,345 people unjustly imprisoned, 2,300 people were released three weeks before the murders began. Of those 2,300, 1,000 people were imprisoned due to psychiatric reports. The families all went to the same company. It redid all the reports and proved that they were forged.”
“Which company?” Hotch asks, looking up from the report.
Garcia hands him a sheet of paper “Themis, it’s a multidisciplinary company, lawyers, psychologists and psychiatrists work there. After they close the case, the names of those involved are omitted from the database.”
Rossi nods “I’ve heard of this company, they’ve worked on important cases, the big judges and the best law firms only work with them, they also provide advice to some lawyers.”
Reid closes the report “I read some articles by the founder about the State×mental health, she has really interesting points about the way society views crimes and how our morals affect judgment.”
Hotch looks at Spencer, confused “Founder?”
“Yes, there aren’t many pictures of her on the internet, but she wrote many articles. She said that society fails to spread information about mental disorders and that the State also fails to consider this when judging cases. She founded this company so that everyone could have access to legal assistance when it comes to mental disorders. Which fits with the name of the company, since Themis is the goddess of law in Greek mythology. Daughter of Uranus and Gaia, the deity was the guardian of men’s oaths and the law. She was often invoked in trials, which is why she was often seen as the goddess of justice-”
Morgan touches Spencer’s arm, a silent and gentle warning that he was rambling. Spencer stops talking, mumbling a small apology.
“Okay, JJ and Rossi are going to the hospital to talk to the judge, Morgan and Prentiss are going to the crime scene, Reid and I are going to the company to see if we can get the list without needing a warrant, we leave in thirty minutes.” Hotch closes the report and puts it in his briefcase before leaving the room.
◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇
Being a successful woman had its price, a very high price to be honest, you worked so hard to have your space and be respected in a sea of men. In the beginning it wasn't easy, you worked to your limit, for renowned lawyers, judges, big law firms, at the same time you continued studying and doing research to improve yourself and be able to open your own company.
You were analyzing a report when Ella, your assistant, entered your office.
"Y/N?" She asked hesitantly
"Yes?" you hummed in response without looking away from the computer.
"Don't freak out now but there are two FBI agents wanting to talk to you"
Ok, now you were paying attention, you stop what you were doing and look at her, your head starts to go over your whole life, did you forget to file your income tax? Did someone in your family get arrested? Oh my god, did you kill someone and you don't remember?
"To me? Did I do something?" you ask panicking.
She looks at you confused “I don’t know, did you?”
“No,” you shake your head as you stand up “Did you do something?”
“What? I didn’t!” She shakes her head with wide eyes.
You sigh trying to calm yourself down “I’m going now.”
You head towards the mirror in the corner of the room, fixing your skirt and hair slightly. If you’re going to get arrested, you should at least look nice.
As you leave the room, you can see Ella talking to two men. They have their backs to you. You glance between them quickly. One of them has a sweater over his shirt. That’s cute, you think. Your gaze turns to the other. He’s wearing a suit, and he looks expensive from the way the fabric hangs on his body.
“What do I owe you for the honor of your visit-” you stop talking abruptly when your eyes land on them and you recognize one of them.
“Aaron? Aaron Hotchner?” You smile. What were the chances?
He frowns for a moment as he studies you, his eyes lingering on your sun-shaped necklace, you can see the understanding dawning in his eyes.
“Y/N?” He asks in surprise
You laugh as you nod, who would have thought you would end up bumping into your ex-boyfriend from college.
You were serious, you dated for practically four years of college. You fell in love with him because, well, he was gorgeous, smart and funny, a stark contrast to the scowling man you saw a minute ago. But to be fair he looked even more handsome now, God is that fair?
You can see a slight smile playing on his lips, though it soon returns to its previous expression.
“It’s been years since I’ve seen you, how are you?” He asks softly.
You smile “I’m fine, how have you been? The last time I heard from you you were still a lawyer”
“I think I make more of a difference in the FBI” he shrugs not looking away from yours.
Yes, you know, he is the most selfless person you have ever met.
You nod, holding his gaze.
“Uh-huh,” the man next to him cleared his throat, catching his attention. “Do you know each other?” He looked confused.
You and Aaron exchange a brief look, you let him answer.
“We met in college” your tone was firm, not leaving room for questions.
Auth, just acquaintances? That hurt. You bite the inside of your cheek.
“Oh sorry, I’m Y/N” you offer a soft smile.
“Cough the CEO” Ella says while faking a cough.
You scold her with your gaze turning to them.
“I’m Dr. Reid” he has a shy smile on his lips “I’ve read many of your articles on Psychology in the legal world, the one of yours about the death penalty is really interesting, I guess I never thought about it from that angle, you did a good job with the humanization of the victim. And the name of the company? Really great idea, Themis? Although I think you could call it Athena too-” Hotch lightly pats your arm.
“Spencer”
He stops talking, blushing slightly and mumbling “sorry”.
You smile gently at him “It’s okay, I’m glad someone understood the meaning behind the name.”
He gives a slight nod, looking more relaxed.
“So, why are you here?” You ask curiously, looking between them.
Hotch hands you a folder with three photos.
“We have a murder case and we believe it may be a revenge-motivated crime, we need the list of the 1,000 you helped free. Do you know any of them?”
You look at the photos but don’t recognize any of them. “I don’t know them, I wish I could help but I can’t give out my clients’ information.”
He sighs, taking the folder when you hold it out to him “Y/N, this is serious, I understand that there is ethical confidentiality but if you don’t help more people will get hurt”
Would you be a really bad person if you admitted that you didn’t pay attention to what he said? God, why did he look so attractive? Was it his clothes, his hair, his tone of voice, or the lines on his face? Maybe it was all of them-
“Y/N? Did you hear what I said?” He scans your face for a sign that you understand the gravity of the situation.
“I..” you sigh “Ella?”
“Yes?” She stands up from her desk.
“Give Dr. Reid the information he needs.” She nods, guiding Spencer to her desk.
Hotch gives Spencer a slight nod for her to go with Ella, and then turns his gaze back to you.
“Thank you, that really will help.” He crosses his arms.
Your gaze immediately drops to your arms.
Why did you break up again?
“No problem.” You give him a toothless smile. “It’s good to see you again.”
“It’s good to see you too.” He hesitates for a moment. “I’m… sorry about the way things ended. I was an idiot.”
Oh, yes, you just remembered why you broke up.
You loved him, but you had learned that love alone wasn’t enough to sustain a relationship. It took understanding, effort, and reciprocity. You knew that Aaron had difficulty expressing his feelings, a reflection of the traumas he carried since childhood. You tried to be patient, to fill the gaps with gestures and unspoken words, but in the end, you felt like you were carrying the weight of the relationship alone.
But that’s in the past. You were in your twenties. What did you really know about relationships? You’ve gotten over it.
He hesitates for a moment, looking down at his shoe. “I wish I could go back and fix things.”
Your heart skipped a beat. What is he trying to insinuate?
He turns his gaze to you “I know I shouldn’t ask you this but, would you like to go out on Saturday? I know a coffee shop near downtown that has that sweet bread you liked.”
Your heart melts, he still remembers.
Maybe it’s worth the risk.
You smile “I’d love to actually.”
◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇◇
#aaron hotchner#criminal minds#aaron hotch hotchner#aaron hotch x reader#aaron hotch imagine#aaron hotch fanfiction
247 notes
·
View notes
Text
Libraries have traditionally operated on a basic premise: Once they purchase a book, they can lend it out to patrons as much (or as little) as they like. Library copies often come from publishers, but they can also come from donations, used book sales, or other libraries. However the library obtains the book, once the library legally owns it, it is theirs to lend as they see fit. Not so for digital books. To make licensed e-books available to patrons, libraries have to pay publishers multiple times over. First, they must subscribe (for a fee) to aggregator platforms such as Overdrive. Aggregators, like streaming services such as HBO’s Max, have total control over adding or removing content from their catalogue. Content can be removed at any time, for any reason, without input from your local library. The decision happens not at the community level but at the corporate one, thousands of miles from the patrons affected. Then libraries must purchase each individual copy of each individual title that they want to offer as an e-book. These e-book copies are not only priced at a steep markup—up to 300% over consumer retail—but are also time- and loan-limited, meaning the files self-destruct after a certain number of loans. The library then needs to repurchase the same book, at a new price, in order to keep it in stock. This upending of the traditional order puts massive financial strain on libraries and the taxpayers that fund them. It also opens up a world of privacy concerns; while libraries are restricted in the reader data they can collect and share, private companies are under no such obligation. Some libraries have turned to another solution: controlled digital lending, or CDL, a process by which a library scans the physical books it already has in its collection, makes secure digital copies, and lends those out on a one-to-one “owned to loaned” ratio. The Internet Archive was an early pioneer of this technique. When the digital copy is loaned, the physical copy is sequestered from borrowing; when the physical copy is checked out, the digital copy becomes unavailable. The benefits to libraries are obvious; delicate books can be circulated without fear of damage, volumes can be moved off-site for facilities work without interrupting patron access, and older and endangered works become searchable and can get a second chance at life. Library patrons, who fund their local library’s purchases with their tax dollars, also benefit from the ability to freely access the books. Publishers are, unfortunately, not a fan of this model, and in 2020 four of them sued the Internet Archive over its CDL program. The suit ultimately focused on the Internet Archive’s lending of 127 books that were already commercially available through licensed aggregators. The publisher plaintiffs accused the Internet Archive of mass copyright infringement, while the Internet Archive argued that its digitization and lending program was a fair use. The trial court sided with the publishers, and on September 4, the Court of Appeals for the Second Circuit reaffirmed that decision with some alterations to the underlying reasoning. This decision harms libraries. It locks them into an e-book ecosystem designed to extract as much money as possible while harvesting (and reselling) reader data en masse. It leaves local communities’ reading habits at the mercy of curatorial decisions made by four dominant publishing companies thousands of miles away. It steers Americans away from one of the few remaining bastions of privacy protection and funnels them into a surveillance ecosystem that, like Big Tech, becomes more dangerous with each passing data breach. And by increasing the price for access to knowledge, it puts up even more barriers between underserved communities and the American dream.
11 September 2024
154 notes
·
View notes
Text
TLDR;; my personal Severance theory for what the hell is Lumon's deal. it's a cult, but with great benefits (plus dental!). also, the MDR Orientation Booklet! yay!
hi, so,,,, hyperfixation time:::
the Severance Reddit guys (they're the real heroes and we're all a family here at Lumon) said there was something called the 'Lexington Letter' - it's sort of a proof of concept letter/story for Severance's worldbuilding, probably more intended for the studio rather than audiences at first, apparently published as promo later.
SPOILER WARNING HERE, just this once.
so i read it all, and the letter in itself has some elements of the base/what i guess is the original story: car accidents, severing because of depression, Lumon appearing misteriously, innie-outie communication, people following people. it's written as an exposé on Lumon, sent to a small newspaper in hopes they will publish it. it's very interesting (and another piece of media to obsess over), so i'll leave the link here in case you want to read it:
the thing is:: this letter includes a copy of the Orientation Booklet, and it explains the refining process as if the readers were innies.
it goes on about the process, but it defines the data to refine as part of four different categories: WO, FC, DR and MA.
each of these categories ellicits the following emotional responses that we are told about during the show:
WO=melancholy
FR=joy
DR=fear
MA=rage
NOW::: i'm probably not the first to notice this, so please chime in if you did. but i think each of these categories corresponds to each of the four Tempers that Kier believed to conform every human soul/personality. those being WOE, FROLIC, DREAD and MALICE.
so the (human) refiners are !!instinctively!!!! classifying numbers that correspond to each type of the four Tempers that their biotech-founder (and presumably god) believed to make humans, well, human. and every time they put the numbers in each bin, the bin shows a progress report defining how much of each of the four categories there is already. much like the 'balance' between tempers Kier talked about.
small interruption here (i promise it'll be relevant later): in the Lexington Letter, three things are mentioned that stood out to me. first, the letter itself tells about the explosion of a truck of Lumon's business rival, Dorner Therapeutics. the accident kills 6 people, and the explosion is triggered barely two minutes after one of the files has been fully refined. so -at least according to the original show's plan- the refining process is an actual thing with a tangible function. it actually IS encrypted data that they're looking at all day.
the second thing was very brief: some sort of controversy regarding Lumon's feeding tubes that had caused a libel suit (by Lumon) that made another small paper go bankrupt. it's mentioned as a deterrent, and the Lexington Letter is not published.
third (last one, i promise):: Peg, who writes the letter, says at one point that a Lumon employment ad came up on the radio just as she said, alone in her car, 'Fuck this job' (her former job). as if it heard her, basically.
so, end of interruption. bringing me back to::: THE THEORY.
we have the Four Tempers; Lumon, a biotech/generally huge everything-corporation with (according to Devon) influence everywhere; and at the center of it all, Kier, who is effectively a messianic figure.
we have the Gemma reveal (Mark says in s2ep2 that he identified the body, so there WAS a body).
then there's Ms Cobel/Sigwell's shrine and //feeding?// tube, with the name Charlotte Cobel on it, and an apparent lore-compliant, unknown controversy to go with it.
finally, we also have a fuckton of encrypted data that:: a) needs refining b) actually serves a purpose in the real world c) we are very briefly shown that the file's progess is related to Gemma (dead, but also alive, personality-lacking, and in the experimental floor) and, presumably, other people. and goats.
i don't really know the purpose of it, but i think they might be sequencing the human genome and personalities of everyone //related to Lumon//? to like. make replica people??
like,,, sure, maybe they want Mark specifically to chill forever with his not-so-dead-anymore clone of a wife, but it IS a biotech company that plays god with life and death, and HAS a god like in their company policy. they have legends, and paintings, and rites, and scripture, and mysteries.
like. Lumon is -BY DESIGN- THE ultimate intersection between a literal religion and corporate loyalty/devotion that plagues and defines the current job market paradigm. the work is mysterious and important, and the company provides or punishes as an absolute and final entity. Kier is all-knowing father, overseeing judge, the origin and ultimate motive for everything. you don't even need to exit the Lumon product ecosystem to live, because they're already everywhere outside. hell, they've existed from the beginning of the only history you need to care about--late industrialism!! the rise of the market economy!! wouldn't it make sense for them to give you a solution to the final problem of death as well?
so, my current theory (To Be Forgotten Tomorrow) is that they are trying to deliver on that promise that every religion out there gives. they're ending the finality of death, and making people again. not just physically; they are literally bringing back complete reproductions of people, body and soul. they use the severeds' intuitions (and probably some sort of conditioning in their chips) to estimate the precise balance of tempers that make up distinct human personalities, just as Kier said.
because think of Ms Cobel, or Mark. for me, they are the most extreme cases. if you had lost, say, your wife. or your mother, or daughter. the person you loved the most, dead. and if a family company that you've seen everywhere, and known all your life, stepped in and told you they'd be able to rid you of the pain. or bring them back. if they told you that if you're loyal enough, blindly trust them with your own agency, they'll make everything right - wouldn't you take them up on that offer?
and now that's out of my head yaaayy. sorry for the long thing. i hope at least the letter and manual helped.
if you read all that, congrats! you've been awarded a fingertrap.
kiers!!! (as in 'cheers'. like. you get it, right? right.)
❤️❤️❤️
#severance#severance season 2#severance spoilers#severance theories#omg i don't think i've ever written a tumblr post this long#oh ariana we're really in it now
57 notes
·
View notes
Text
Hello, everyone who is freaking about the CDC censorship in news and press reports. I would like to make clear a specific portion or claims HAVE actually been exaggerated- which is good news! It means that not everything is bad. But, to keep straight what is currently being censored is important, as well as other happenings of the CDC that affect the release of information.
1- The CDC is not allowed to speak to the public.
Despite being a public health awareness agency, the CDC is currently banned from speaking to the press, or utilizing their own public speakers to release information on health concerns. This is dangerous because it limits the intervention that officials can provide on public health emergencies and alerts, such as disease outbreaks.
2- The CDC website is under construction, not down.
This is an important distinction, but equally as dangerous. The site is still accessible to visual readers, though actual accessibility such as screen readers, large font, and other features is not on most pages. These pages are being revamped visually everywhere on the site, but so far, I cannot find any actual missing data on the web pages I have visited. There are thousands of web pages, I cannot visit them all to confirm, and the Internet Archive does not save every single page. Even worse, science is an ever changing field, and pages even a year old are not useful when comparing to the current pages. There are so many web pages, I doubt they could be removed methodically in the way the pages have been modified on the site. This is optimistic, but optimism with more evidence then the alternative. The alternative seems true upon first glance, but with further digging, I have found only surface level proof to the panic.
3- Other sources are available.
Scientists use other websites to gain information, usually NIH's systems for research papers. This is not useful to the public, because these papers can be painful to read. But with that in mind, the primary source material is FAR more powerful than any transliterated report, because it contains minute details that are essential in science but unhelpful to the public. They contain data, collection methods, other referenced sources, and so much more information that the friendly-to-read versions cannot provide. The best part? Getting rid of these are close to impossible. I, personally, have hundreds of these papers downloaded on 6 different topics and 48 different specifications on my 1 TB hard drive, and that takes up less than 7% of the entire drive. I am not even a professional researcher, just a nerd who works in applied science. Can you imagine how much the researchers hold? Imagine the back ups in the cloud, the forgotten paper files in the library, the teachers and professors in colleges? The more understandable information can be given from the complex later, if they choose to remove data on the CDC.
Download more, please. This isn't perfect, and every page lost is a tragedy to humanity. Freely available information is the greatest feat humanity has achieved, along side the Tropical Neglected Disease project and the obliteration of Smallpox. Every page saved, is likewise, a boon to society. If papers are truly being removed, or worse, destroyed by our current suspected regime, let them know backlash, and let them know that nothing is ever lost on the internet. Put it on the dark web for all I care, next to hacker forums and suspicious ads, so long as that informative stays in the world, I can have hope.
Finally, for those who threaten this modern burning of Alexandra. Count your happy days. Count your blessed moments. Every page you ruin, every second you waste burying information that ultimately benefits lives you deem lower, will be counted on your death toll. When the bell finally stops ringing, you won't even be able to enjoy the blessed silence before I cut you down. Your actions threaten lives outside of what you target. You target gender care, you risk patients with chromosomal abnormalities. You target sexuality studies, you threaten mental health research and psychology as a whole. You target medical papers that threaten your pathetic understanding of the world, and you will watch hundreds of children die from disease forgotten long before your miserable exsistence.
I have a personal claim in this. I have siblings, I have friends, I have lives threatened by your actions. You so much as step in that direction? Well, thank God for the actions of our forefathers, who gave us the right to bear arms. I have the right to self defense, and in defense of those who you forced to be legally classified as 'other' and unworthy of rights, I will knock you down.
#uspolitics#unitedstates#americanpolitics#us politics#CDC#centers for disease control and prevention#good news#sorry for the rant at the end#tw us politics#information#information wars#history repeats itself
10 notes
·
View notes
Text
i usually don't do tag games but they've tagged me a couple times now and i meant to n never got around to it tagged by: @type6reverb last song: Femtanyl - GIRL HELL 1999. Femtanyl fucking SLAPS i've got the whole Chaser EP saved directly in my phones files so i can put it on while i'm out without fucking around with premium apps or paying in cell data.
youtube
favorite color: changes. anything in a light pastel is good but i really light faded greens or yellows or purples specifically. especially when an accent to some darker even more muted color
currently watching: nothing, i don't rlly do TV shows and none of the internet ones really interest me
last movie: the first half of Dune, was hanging out with a friend before work the other day and while i was there we had it on for background noise (we've all seen it so didn't rlly care that wed miss most of it)
currently reading: Basic Principles of Marxism-Leninism: A Primer by Jo Ma Sison. my bf bought me a couple of foundational theory books and we read quotations of mao together and this is one of em i chew on every couple of days (i'm a very slow reader) sweet/spicy/savory: all three at once, kimchi ramen with brown sugar is simply the best food no questions, pack it up boys it don't get better than this relationship status: mono with my boyfriend, pettybourgeoisculturalreform. reaching heresoon the 8 month mark i think. we live several hours away so we don't get to see each other as often as we want but love leaps all barriers current obsession: between fixations at the moment. I just made a new blorbo for a SWRPG campaign coming up but that's like a year away
last thing i googled: see next question currently working on: my bfs birthday is coming up and im making *something* for him but i have to keep it a secret for now because he'll see this post :3
8 notes
·
View notes
Text
(K)night in Black Armor (Part 28) – Spock (Mobster!AU)
Pairing: Spock x reader
Warnings: mentions of death, sickness,
Words: 3479
All parts: Series Masterlist
Let me know if you want to be added to the Series taglist!
Please do not repost my work on other sites or platforms
-
“Spock! What the fuck are you doing? Spock! That’s not the time for fits of anger! Do you know what you’re doing?! Spock!”
“I am trying to minimalize the damage” suddenly he stopped, had a checking look before he dropped the tool and pulled you back upstairs “Disconnect your phone and laptop from the Wi-Fi if you want to keep it”
“Please what? Spock, what’s wrong with you?”
“Do as I said” you were shocked by his tone so you only gave a nod and did as he said, also switching off the devices. Then you went to his office where you found Spock typing commands on his computer and had a look at the phone with the countdown, which now was down at 2 minutes 51 seconds. You swallowed and placed your hand on his arm. Then he took the flash drive he had chosen, looked at you and put the stick into the respective interface on his computer. Then he opened a file that was on the drive. In curiosity, you looked at him, watching how he took out a tablet from the second drawer and switched it on.
“Spock!” you shouted when you saw how random letters and numbers and symbols littered the monitors. But he didn’t seem impressed and kept looking at the countdown phone
“Please let it work” he silently pleaded
“Work what? What’s wrong with your computer?” he didn’t reply but when the countdown disappeared on the phone you let out a muffled cry of success before getting to work on his tablet, typing commands in a speed that you couldn’t even read the words you understood. Finally, he bit his lip and seemed done. Slowly, the numbers on the phone disappeared and you saw the countdown again, just that it had stopped zero minutes, 43 seconds. “Spock?” you asked when it really stayed at that number before the screen went darker and finally switched off completely “What does that mean? What-what happened? Is it defused? Did it work?” he still said nothing and took the phone, dropping it to the floor and crushing it with his boot. “Spock!” you shrieked, grabbing his arm “Am-am I safe or-or?” when he didn’t reply, you shook him “Did it work? We’re talking about my life!” then, he seemed to out of his stiffness and he pulled you against his body, pressing you as close as possible.
“Yes” he finally choked out “the bomb is deactivated” he sounded out of breath and you let out a happy squeal, mixed with a sigh of relief. After a while, you looked up at him, leaning up to place a loving kiss on his lips
“I knew you could do it” you whispered and stroked his face “Spock, you’re really hot”
“You often say that” he chuckled
“No, your skin is so warm” you placed the back of your hand on your forehead “And you’re sweating? Are you okay?”
“It was just the nervousness and perturbance” he assured you, taking your hands in his and pressing a kiss to each of them before letting go of them.
“What did you even do?”
“Connected the phone to the internet of the computer and sent it a virus over it so that I could access the programming of the bomb countdown”
“Oh. What about your computer?” it still had the numbers on it “Does it have a virus too?”
“Yes”
“But it’s your own virus… I mean… you made it, right?”
“Not quite. It would be too dangerous to continue using it” he let out a chuckle “Bones always used to joke that I loved my computer more than you. Now he has the proof that I do not”
“What about the Azienda? Did you send it to them too?”
“No that is why I have been in the server room”
“You cut the Internet connections”
“Indeed”
“But doesn’t that ruin business?”
“Perhaps cause a damage of a couple ten thousand to a few hundred thousand dollars. Plus another few thousands to restore the infrastructure. I did tell Jim to install redundant servers to minimize data loss but he wouldn’t listen”
“Oh”
“What is wrong?”
“You- you did that all because of me” he cupped your face
“I could not lose you”
“You guess you’ll be in trouble for cutting the servers off?” the telephone on his table rang and he looked at you after he glanced at the number
“At least I suppose they noticed” he cupped your face and pressed a kiss to your forehead “Perhaps you should go upstairs” you only gave a nod and squeezed his hand before you threw a last glance at the mess on the table and went upstairs.
-
Of course you wondered what Spock had because he had thrown a glance into your room after the phone call and told you that there were a few things he had to take care of. You had offered him your help because it was your fault after all but he refused, saying you should make yourself a nice evening, order some food and do something to relax. He didn’t seem to care about your protests that you wanted to enjoy your evening with him and not alone. The only thing that helped a bit was the fact that he stayed at home, probably plugging in the server cables he had not cut. So you cooked something for the two of you and ate your portion in front of the TV before you went to the basement with a plate for him.
“Spock? Are you still here? I thought you might be hungry” you got no answer “Spock?” then you saw him kneeling and leaning against one of the racks “Oh there you are” you walked closer but he didn’t’ respond “Spock?” you put the plate down and sat down beside him, gently shaking him. It was of no use so you shook him harder, crying his name. The only thing you achieved was that he tilted and fell into you, unconscious. With a gasp you checked his temperature again and he felt even hotter, also the sweat was still there. “Spock?” you started to get scared and held your hand under his nose to see if he still was breathing, which he luckily was. Not sure what to do, you cradled him against your chest and stroked his hair while you were crying. Then you swallowed and got up, gently putting him on the floor “Hold on, I’ll get help” you promised and ran upstairs, taking your phone and switching it on. Now you were glad that you had switched it off. “Bones!” you shouted after dialing the number.
“(Y/N)? How can I help?”
“It’s Spock… he’s hot and sweating and he fell unconscious I guess”
“He what? When did he faint?”
“No idea. He’s been in the server room the last hour or so. I found him there. But I noticed his temperature and sweating earlier. About three hours ago”
“Do you have any idea what it could be?”
“N-no… I mean a computer virus really can’t affect people?”
“Of course not. Despite the fact he’s thinking and working like a machine. But don’t worry, I’m on my way” you only made an agreeing sound and gave a sad nod. You went back to the server room, placing his head in your lap until Bones arrived. “Help me getting him upstairs to the couch” you nodded and did as he said. “Let’s see what’s up with you” while he was working he was asking what he had been doing in the past hours, what he had eaten or if he’d been exposed to any kind or substances he shouldn’t be.
“No. Nothing. Unless something happened while he was away with Medusa. I mean before he came here to defuse the bomb”
“I see. Did he get injured during the fight?”
“No, not really, he got hit a few times. And the small cut on his upper arm”
“Was it Medusa who cut him?”
“I-I guess so, why?”
“Damn it Spock, you stupid idiot”
“Why? What’s wrong?”
“Do you know what Medusa means?”
“The monster from Greek mythology that turned men into stone?”
“Yes, but it’s also Italian for jellyfish”
“So?”
“There’s a class of jellyfish called box jellyfish. They’re venomous”
“You-you’re saying he’s poisoning him?”
“He tries that with most of his victims. Which arm was it?”
“The right one” you said with tears in your eyes. Bones tore down the leave and you saw that the wound looked different. The bandage was gone but instead he had attached a ziptie to his arm above the injury.
“You stupid dimwit” Bones muttered “You should have called me right away. That’s not the time to play hero”
“What-what can we do?”
“It’s probably too late for this but please bring me some vinegar” you gave a nod and hurried to the kitchen and got what he wanted. The doctor poured some of it onto a towel which he attached to Spock’s arm.
“Will he make it?”
“I’m quite sure he will. It’s not always deadly, you know? And Spock also has been taking small doses of the venom to make himself immune. At least he tried to”
“You’re saying it could be worse?”
“Yes. But in his case I’m quite sure he’ll just suffer for a few days” he let out a snort “Which is funny. Because for other humans, the venom is more harmful and he just gets unconscious and maybe vomits some hours with a few other symptoms. But if you give that guy a hot chocolate, he’ll almost die on you too”
“His allergies are no fun and neither is his injury”
“I know” you looked down
“I think he saved my life several times today”
“And he’d do it again just after he wakes up. Heard he blew up his computer to save you from the tiny bomb?”
“He put a virus on it so that the phone with the countdown got it”
“Damn. I’d have never thought he’d go that far with his beloved computer. That shows he’s really in love with you”
“I know” you said, taking your husband’s hand. “Can you do something for him?”
“Maybe later. I’ll stay here for the night but it would be good if you could have an eye on him too. I bet that once he wakes up he’ll want to go to the bathroom and stay there for the next hours”
-
Bones was right. Shortly after Spock had woken up, he staggered to the bathroom where he vomited into the toilet. When he was done, the doctor came back to check up on him again and ask him a few questions before leaving again. But Spock stayed bent over the toilet for the rest of the night and you stayed with him, even though you suddenly fell asleep. In the middle of the night you woke up again when you felt something touching you. Slowly, you opened your eyes and saw that Spock had put a blanket over you.
“You’re unbelievable” you muttered
“You should go to bed” he replied, stroking your hair
“No way. In good and bad times, remember?”
“Technically, our oaths have been slightly different”
“I don’t care. I’m staying” you moved closer, placing a hand on his shoulder “How are you feeling?”
“A bit better than earlier”
“Can I do something for you? Would you like some food?”
“That can wait until the morning” you gave a nod and nuzzled his back
“Why did you tell no one?”
“If I had, Bones would have treated me right away. But I was certain that Medusa or Seth would plan revenge and I wanted to be there to help you” you shook your head in disbelief
“Then why not calling Bones after I was saved?”
“I had to minimalize the damage I have caused but I suppose I was weaker than I believed”
“Yeah, seems so. Promise me that next time you’ll get help sooner.”
“I will try to”
“That’s the best I’ll get, huh?”
“It is”
“You really are something. And I don’t think I’ve thanked you enough for what you did for me yesterday”
“There is no need to. I promised to protect you and this I did”
“You were ready to sacrifice yourself”
“If you recall, you too have not listened to me when I told you to flee and remained behind to help me”
“Fair enough” you chuckled “Can I at least bring you some water?”
“I would not say no to this”
-
Bones had cooked Spock a light breakfast; a vegetable broth with potatoes. To your relief, Spock ate more than you thought he would and went to the couch afterwards instead of the bathroom. You sat down beside him, leaning your head against his shoulder and falling asleep again. But when the door opened you woke up again. It was Jim and you swallowed he looked at both of you and gave a nod
“How are you two doing?”
“I’m good” and Spock explained that he was feeling a lot better. Your hand slipped into Spock’s “Is he in trouble now?”
“For what?”
“His revenge act against the Romulanos and the server incident”
“It was just money. He already said he’d cover at least half of the damage he caused and takes care of the repair costs for the hard- and software. The two bodyguards are not a problem anymore. The only ones who truly cared were Seth and Medusa… which is the bigger problem”
“Jim” Spock said and his glance fell to you
“I know. But that she has to know” Jim ran his hand over his face “Medusa died in the course of the night. We don’t know if he poisoned himself of if it was the injury. In that moment, some Romulanos are at the Stella and seem pissed that no one’s there they can vent their anger on.” you swallowed and looked down. Spock placed a hand on your back rubbing it gently
“And now? What do we do?” you wanted to know
“I’m sorry” Jim said “But we can’t discuss that with you. In fact, Spock won’t even help because he’s sick and the mess is his responsibility. But he deserves an update on what’s going on. Besides, I still value his inputs.”
“I see” you gave a nod and kissed Spock’s cheek before you went upstairs.
-
As far as you could judge the situation with the Romulanos seemed pretty good. At least your friends could return to the Stella only three days later and Spock assured you that you didn’t need to fear anything for the moment. Of course you were curious what they had done but you doubted you’d hear it. After all, you currently had other problems right now. Well, it wasn’t a problem but it had been five years since you had gotten your hormone spiral for birth control and you now needed something new. Since it concerned him too, you discussed it with Spock but he was quite unhelpful because he said it was your decision in the end and you could use the method you preferred. A part of you even wanted to ask if he thought that contraceptives were necessary at all or if he wouldn’t care if you got pregnant. After some consideration, you finally chose the contraceptive patch. At least Spock accompanied you to a gynecologist, so that you could discuss the details and get the prescription for it. Much to your horror, the doctor asked you to undress for the examination. But you successfully could avoid one after about ten minutes of discussing but you had to plan another appointment in two weeks, with a female doctor.
“You should not have made such a fuss” Spock said when you were in the car on your way home
“Oh? Judging by your look you were that close to snapping his neck when he started talking about the bimanual palpation. Maybe I just wanted to save his life”
“(Y/N), I understand that it is unknown to you because you have not been examined like this before but it is for your own good”
“Is that a reference to the fact that I worked at the Stella? Suddenly that bothers you?”
“It does not bother me. I only want to ensure that you are alright”
“Well I am”
“Does the thought of the examination make you uncomfortable?”
“Dunno… it shouldn’t… but it does”
“It is no shame. I will come with you if you want” you shrugged
“Only if you promise not to hurt her if she hurts me”
“I hope it will not hurt you at all”
“How about you do a quick-study in the two weeks to be able to perform the examination yourself? After all I only had some ‘unofficial’ examinations before and all we need to know is that I’m healthy. No need that at doctor needs to know it”
“You would let me perform it?”
“Fuck’s sake yes. More than anyone else. Why wouldn’t I?” you placed your hand on his
“Besides, there will need to be an appointment where you have the spiral removed” you groaned before you opened the package of your patches to read the information leaflet.
“We’ll probably have to use condoms for a while too that the contraception really works” you said quietly
“That does not matter” he squeezed your hand.
“Maybe I’m just scared because I remember how much putting the spiral in hurt. I got in the year I was eighteen, before my birthday. Once I was of age, I didn’t want to work because I was scared sex would hurt just as much” he looked at you and part of you thought he’d say or ask something but he didn’t, instead giving your hand another squeeze.
-
At the beginning of April, Spock approached you, saying that there was some kind of annual meeting for mobsters of all the San Francisco families and asked if you wanted to accompany him.
“But the Romulanos?”
“It is a peaceful meeting… as long as nothing is provoked. It is like an ant jar”
“Huh?”
“If you put two kinds of desert ants in a jar nothing will happen. However, as soon as the jar is shaken, they will attack and kill each other”
“Oh. Have you ever experienced something like this?”
“Once, when I was a fourteen”
“What happened?”
“I am not allowed to give you too many details, however, I had just joined the Vulcano family officially and my father took me to the meeting because he was the advisor of our boss. I never knew what exactly happened that the situation escalated but all of a sudden everyone had a weapon and shooting ensued. Some tried to escape, others honored the codex and helped the women out first. So did I and was bringing out one of the Romulano women. Someone came after us and in our fight, in which also my father engaged in, she was killed”
“Oh no. Did you know who it was?”
“Not in the beginning. She got injured and my father told me to get her into safety. I tried to and when I was outside, I was approached by Medusa. He seemed to believe I was responsible for her death. Respectively blamed me for not having been able to save her”
“She was his wife” you concluded “That’s why he hated you” he gave a nod “And that’s why you didn’t want me to be a part of the mission… because you feared he’d find out who I am and get revenge”
“Yes” he nodded
“But if I came to this meeting… do you think something would happen to me?”
“I doubt they would attempt such a thing during the sit-down. We all know that it could start a war between the families. It is a gathering that is supposed to be peaceful and keep the peace between us as well as possible”
“I guess I’d like to come. I mean… wouldn’t it look bad if you didn’t bring me? Like you don’t trust them?”
“Perhaps. This could be a reason our wives are there as well, to prove that we are not planning something” you shrugged
“Well, I guess I need a dress for the occasion. I’ll go check my wardrobe” you wanted to run upstairs but he caught your arm.
“Wait. I thought we could go and buy you one”
“Oh. Sounds great. Of course only if it doesn’t end with sex in the changing room again”
“First of all, that was in a sex shop, and secondly, you did enjoy it”
“I was fucking terrified” you shook your head “God, sometimes I wonder what happened to the guy that would blush when he saw me naked”
-
Taglist: @rookietrek
4 notes
·
View notes
Text
File: The Babadook
SCP#: AFK
Code Name: The Anxiety Demon/ The Gay Freedom Cry.
Object Class: Keter Joke/Archon
Special Containment Procedures: SCP-AFK is contained a within a book at the [data expunged] library within a private selection. Due to SCP-AFK's anomalous abilities this area is the idea place to keep SCP-AFK in a single contained area. To further ensure containment, the book SCP-AFK is in has magical scriptures provided by the Department of Technology, Alchemy, Science, Magic and Warfare. The purpose of the scriptures is to further ensure that SCP-AFK does not move the book it currently possesses. SCP-AFK is to be left alone despite its surge through the internet. Because of its transition from a literature-based anomaly to a meme-based anomaly it has become impossible to contain. Though Mobile Task Force Kappa-10 is to monitor its movement through the web they are not to interfere with its growing influence.
Description: SCP-AFK was originally a demonic entity that found victims in people under depression, stress, and anxiety. SCP-AFK typically takes the form of a large man dressed in a large black coat, with a black top hat, and has a pale white face, extremely light blue eyes to the point that they appear white, and disgusting black teeth with black lips. SCP-AFK normally appears first as a pop-up book that seems child friendly to trick whoever sees it to read it to the whole family. It's because of this that it was theorized that SCP-AFK prefers to attack families of at minimum one parent and one child. Once the sinister true nature of the book is revealed and a reader of the book starts to get scared, they will immediately become infected with SCP-AFK's influence.
SCP-AFK will then proceed to torment its victims and slowly spread to everyone within the same household. SCP-AFK will continue to break down the victims filling them with paranoia, constant anxiety, utter despair, and agony until the mentally break. SCP-AFK will then possess the individual that is the most mentally broken of the family. They will then proceed to kill everyone in the family and then themselves, feeding SCP-AFK in the process. Once SCP-AFK has finished killing everyone and feeding on their despair, it will transform back into a popup book and attempt to find a new family. How exactly SCP-AFK finds new victims are unknown.
SCP-AFK was discovered in 2014 at [data expunged], Australia where it was found in the house of a widow and her seven-year-old son. A string of murders and family suicides lead to the house as well as witness reports of the widow, [data expunged], and her son, [data expunged], acting strangely. SCP-AFK was found in the basement, apparently it was unable to possess the widow anymore but refused to leave thus a sort of truce was made. The truce being that SCP-AFK would remain in the basement and never leave to hurt the widow or anyone else so long as she fed him bugs and worms every day. Foundation agents disguised as Child Serivces's agents went to the house and when going to the basement found the book form of SCP-AFK. The widow begged them to leave the book in the basement, but the child told them about SCP-AFK and therefore they kept the book in exchange for not reporting the widow to the real Child Services. After SCP-AFK was recovered Foundation forces snuck back into the house and gave the Widow and her child Class G Amnestic's to make them believe they imagined the anomaly.
SCP-AFK was transported to Site-AA for testing. After SCP-AFK's properties were discovered through extensive experiments by the Department of Technology, Alchemy, Science, Magic and Warfare SCP-AFK's true nature was finally discovered. SCP-AFK was sent to a library in [data expunged] to trick it into believing that at any time it could get a new victim.
Update: 6/23/2017 - SCP-AFK has somehow mutated into meme on the internet allowing it to travel anywhere. However rather than continuing to seek anxiety filled and depressed victims it seems to now take a liking to an entirely new food source.
SCP-AFK now spreads through meme's relating to LGBT+ such as topics, jokes, and inspirational quotes. SCP-AFK no longer feeds on the anxiety and depression of its victims nor does it possess them after breaking their minds. Instead, SCP-AFK now fills its intended victims with bravery; they become overwhelmed with the desire to express themselves, their identity, and sexuality. SCP-AFK ends up feeding on the resulting joy and ecstasy that comes from the host. SCP-AFK has grown stronger and as a result is able to possess more people at once and therefore feed more than ever before.
"It seems that most in the Foundation are willing to blame SCP-AFK for the sudden surge of memes as well as support for the LGBT+ Movement as a whole. I mean sure it might have pushed them in the right direction, but I think it's mainly just humans finally realizing that love is better than hate. The Foundation really doesn't give humanity enough credit to take care of itself, but I do agree that it took them longer than expected." -Dr. Zeek
"I find it hilarious but also extremely interesting that SCP-AFK turned from a Keter class demonic parasite to a Joke class gay meme. I only wish it was possible to turn other Keter class or dangerous class anomalies into Joke class anomalies like SCP-682, SCP-106, and SCP-079. But then again, I hate joke anomalies so maybe we stick to neutralizing them or just keep them rotting in their cells." -Site Director James.
.
SCP: Horror Movie Files Hub
#DZtheNerd#SCP: Horror Movie Files#SCP Foundation#scp au#scp fanfiction#the babadook#lgbtq#lgbt+#joke scp
7 notes
·
View notes
Text
We often take the internet for granted. It’s an ocean of information at our fingertips—and it simply works. But this system relies on swarms of “crawlers”—bots that roam the web, visit millions of websites every day, and report what they see. This is how Google powers its search engines, how Amazon sets competitive prices, and how Kayak aggregates travel listings. Beyond the world of commerce, crawlers are essential for monitoring web security, enabling accessibility tools, and preserving historical archives. Academics, journalists, and civil societies also rely on them to conduct crucial investigative research.
Crawlers are endemic. Now representing half of all internet traffic, they will soon outpace human traffic. This unseen subway of the web ferries information from site to site, day and night. And as of late, they serve one more purpose: Companies such as OpenAI use web-crawled data to train their artificial intelligence systems, like ChatGPT.
Understandably, websites are now fighting back for fear that this invasive species—AI crawlers—will help displace them. But there’s a problem: This pushback is also threatening the transparency and open borders of the web, that allow non-AI applications to flourish. Unless we are thoughtful about how we fix this, the web will increasingly be fortified with logins, paywalls, and access tolls that inhibit not just AI but the biodiversity of real users and useful crawlers.
(MIT Tech Review gives you a free read - I think every month - so click through if you haven't read from them recently, but if you've already hit your limit, the rest of the article is below.)
A system in turmoil
To grasp the problem, it’s important to understand how the web worked until recently, when crawlers and websites operated together in relative symbiosis. Crawlers were largely undisruptive and could even be beneficial, bringing people to websites from search engines like Google or Bing in exchange for their data. In turn, websites imposed few restrictions on crawlers, even helping them navigate their sites. Websites then and now use machine-readable files, called robots.txt files, to specify what content they wanted crawlers to leave alone. But there were few efforts to enforce these rules or identify crawlers that ignored them. The stakes seemed low, so sites didn’t invest in obstructing those crawlers. But now the popularity of AI has thrown the crawler ecosystem into disarray.
As with an invasive species, crawlers for AI have an insatiable and undiscerning appetite for data, hoovering up Wikipedia articles, academic papers, and posts on Reddit, review websites, and blogs. All forms of data are on the menu—text, tables, images, audio, and video. And the AI systems that result can (but not always will) be used in ways that compete directly with their sources of data. News sites fear AI chatbots will lure away their readers; artists and designers fear that AI image generators will seduce their clients; and coding forums fear that AI code generators will supplant their contributors.
In response, websites are starting to turn crawlers away at the door. The motivator is largely the same: AI systems, and the crawlers that power them, may undercut the economic interests of anyone who publishes content to the web—by using the websites’ own data. This realization has ignited a series of crawler wars rippling beneath the surface.
The fightback
Web publishers have responded to AI with a trifecta of lawsuits, legislation, and computer science. What began with a litany of copyright infringement suits, including one from the New York Times, has turned into a wave of restrictions on use of websites’ data, as well as legislation such as the EU AI Act to protect copyright holders’ ability to opt out of AI training.
However, legal and legislative verdicts could take years, while the consequences of AI adoption are immediate. So in the meantime, data creators have focused on tightening the data faucet at the source: web crawlers. Since mid-2023, websites have erected crawler restrictions to over 25% of the highest-quality data. Yet many of these restrictions can be simply ignored, and while major AI developers like OpenAI and Anthropic do claim to respect websites’ restrictions, they’ve been accused of ignoring them or aggressively overwhelming websites (the major technical support forum iFixit is among those making such allegations).
Now websites are turning to their last alternative: anti-crawling technologies. A plethora of new startups (TollBit, ScalePost, etc), and web infrastructure companies like Cloudflare (estimated to support 20% of global web traffic), have begun to offer tools to detect, block, and charge nonhuman traffic. These tools erect obstacles that make sites harder to navigate or require crawlers to register.
These measures still offer immediate protection. After all, AI companies can’t use what they can’t obtain, regardless of how courts rule on copyright and fair use. But the effect is that large web publishers, forums, and sites are often raising the drawbridge to all crawlers—even those that pose no threat. This is even the case once they ink lucrative deals with AI companies that want to preserve exclusivity over that data. Ultimately, the web is being subdivided into territories where fewer crawlers are welcome.
How we stand to lose out
As this cat-and-mouse game accelerates, big players tend to outlast little ones. Large websites and publishers will defend their content in court or negotiate contracts. And massive tech companies can afford to license large data sets or create powerful crawlers to circumvent restrictions. But small creators, such as visual artists, YouTube educators, or bloggers, may feel they have only two options: hide their content behind logins and paywalls, or take it offline entirely. For real users, this is making it harder to access news articles, see content from their favorite creators, and navigate the web without hitting logins, subscription demands, and captchas each step of the way.
Perhaps more concerning is the way large, exclusive contracts with AI companies are subdividing the web. Each deal raises the website’s incentive to remain exclusive and block anyone else from accessing the data—competitor or not. This will likely lead to further concentration of power in the hands of fewer AI developers and data publishers. A future where only large companies can license or crawl critical web data would suppress competition and fail to serve real users or many of the copyright holders.
Put simply, following this path will shrink the biodiversity of the web. Crawlers from academic researchers, journalists, and non-AI applications may increasingly be denied open access. Unless we can nurture an ecosystem with different rules for different data uses, we may end up with strict borders across the web, exacting a price on openness and transparency.
While this path is not easily avoided, defenders of the open internet can insist on laws, policies, and technical infrastructure that explicitly protect noncompeting uses of web data from exclusive contracts while still protecting data creators and publishers. These rights are not at odds. We have so much to lose or gain from the fight to get data access right across the internet. As websites look for ways to adapt, we mustn’t sacrifice the open web on the altar of commercial AI.
Shayne Longpre is a PhD Candidate at MIT, where his research focuses on the intersection of AI and policy. He leads the Data Provenance Initiative.
0 notes
Text
The rage of Funko('s IP trolling bot)
This is a crosspost of my newsletter! If you’d like to get posts like this direct to your inbox or RSS reader, subscribe here.
Over the weekend, itch.io (an indie games marketplace, and also one of the sites where I host my books) was taken offline by its domain registrar in response to a complaint by an automated piece of "brand protection software" deployed by toy company Funko.
(I initially assumed this complaint was filed against IMMORTAL Pop!bat, but now that the site is back up it appears IMMORTAL Pop!bat is still available, so probably not.)
itch.io claims they took down the offending page immediately. But in addition to Funko's complaint being completely automated, so was the response from registrar iwantmyname; no human being at iwantmyname read itch.io's email informing them the page had been taken down, and their system automatically disabled the domain instead.
The site was back up and running within a day, which I'm sure was a relief to all the developers and creators who depend on itch.io to make a living. But this whole mess highlights how many of the companies that make up the backbone of the modern internet simply do not employ human beings to handle things like this anymore. The complaint was automated, the response was automated, and the resolution process was most likely also automated — and through it all, real people's livelihoods hung in the balance.
New Flash Fiction: "Anytime You Like"
At first, the idea hadn't been much more than a bit of stupid drunken wordplay. Jay's eager reaction made the prospect very real, and one that Sebastian found himself obsessing over in the following weeks.
I've got to be honest with you, folks: this is just 1400 words of Sebastian Moran getting pegged. You can read it for free on Ko-fi or Medium (but if you happen to be one of my parents, maybe don't).
This Week's Links
Moderators Across Social Media Struggle to Contain Celebrations of UnitedHealthcare CEO’s Assassination
On Facebook, UnitedHealth Group locked comments on its post mourning the death of its “dear friend and colleague,” but it couldn’t block people from reacting with emojis, which more than 73,000 have so far with the crying-laughing face (compared to around 2,400 doing a sad face). Laugh-reacting became a meme of its own on Facebook, with a lot of the more than 6,800 shared posts including people telling friends to go hit the laugh emoji.
Dozens of people in Canada have scurvy, and it's because of food
Food insecurity across the provinces rose to 22.9 per cent in 2023, an increase from 18.4 per cent the year before, according to data from Statistics Canada. Nova Scotia, Prince Edward Island and Saskatchewan saw the highest rates of food insecurity between 28 and 29 per cent. Black and Indigenous populations were the most affected.
Tesla Cybertruck Immediately Dies in Canadian Winter
lol. lmao.
-K
1 note
·
View note
Text
Price: [price_with_discount] (as of [price_update_date] - Details) [ad_1] "This unique book delves down into the capabilities of hiding and obscuring data object within the Windows Operating System. However, one of the most noticeable and credible features of this publication is, it takes the reader from the very basics and background of data hiding techniques, and run’s on the reading-road to arrive at some of the more complex methodologies employed for concealing data object from the human eye and/or the investigation. As a practitioner in the Digital Age, I can see this book siting on the shelves of Cyber Security Professionals, and those working in the world of Digital Forensics - it is a recommended read, and is in my opinion a very valuable asset to those who are interested in the landscape of unknown unknowns. This is a book which may well help to discover more about that which is not in immediate view of the onlooker, and open up the mind to expand its imagination beyond its accepted limitations of known knowns." - John Walker, CSIRT/SOC/Cyber Threat Intelligence Specialist Featured in Digital Forensics Magazine, February 2017 In the digital world, the need to protect online communications increase as the technology behind it evolves. There are many techniques currently available to encrypt and secure our communication channels. Data hiding techniques can take data confidentiality to a new level as we can hide our secret messages in ordinary, honest-looking data files. Steganography is the science of hiding data. It has several categorizations, and each type has its own techniques in hiding. Steganography has played a vital role in secret communication during wars since the dawn of history. In recent days, few computer users successfully manage to exploit their Windows® machine to conceal their private data. Businesses also have deep concerns about misusing data hiding techniques. Many employers are amazed at how easily their valuable information can get out of their company walls. In many legal cases a disgruntled employee would successfully steal company private data despite all security measures implemented using simple digital hiding techniques. Human right activists who live in countries controlled by oppressive regimes need ways to smuggle their online communications without attracting surveillance monitoring systems, continuously scan in/out internet traffic for interesting keywords and other artifacts. The same applies to journalists and whistleblowers all over the world. Computer forensic investigators, law enforcements officers, intelligence services and IT security professionals need a guide to tell them where criminals can conceal their data in Windows® OS & multimedia files and how they can discover concealed data quickly and retrieve it in a forensic way. Data Hiding Techniques in Windows OS is a response to all these concerns. Data hiding topics are usually approached in most books using an academic method, with long math equations about how each hiding technique algorithm works behind the scene, and are usually targeted at people who work in the academic arenas. This book teaches professionals and end users alike how they can hide their data and discover the hidden ones using a variety of ways under the most commonly used operating system on earth, Windows®. This is your hands-on guide to understand, detect and use today’s most popular techniques in hiding and exploring hidden data under Windows® machines, covering all Windows® versions from XP till Windows® 10. Starting with the Roman Emperor, Julius Caesar, and his simple cipher method to the surveillance programs deployed by NSA, to monitor communication and online traffic, this book will teach you everything you need to know to protect your digital data using steganographic & anonymity cryptographic techniques.
Written in a simple style and requiring only basic knowledge of main Windows® functions, techniques are presented in a way to easily implement them directly on your computer. A brief history of steganography since early inception to present day Simple methods to hide your data without using any third party tools, and different ways to investigate and explore hidden data Exploiting multimedia files to conceal data using text, image, video and audio steganography Exploiting Windows® NTFS file system to hide your secret data A wide array of encryption techniques to protect your confidential data and securing your online communications Using cryptographic anonymity tools to conceal your identity online Explaining how hidden data could be used to plant a malware and launch sophisticated attacks against computer systems Methods to crack steganography and cryptography A chapter dedicated to anti-forensic techniques, detailing how to conceal data when using a Windows® machine Publisher : Syngress; 1st edition (23 September 2016) Language : English Paperback : 324 pages ISBN-10 : 0128044497 ISBN-13 : 978-0128044490 Item Weight : 880 g Dimensions : 14 x 1.5 x 22 cm [ad_2]
0 notes
Text
5 Trends in ICT
As we live in this ever-changing modern world, many people find it challenging to keep up with new technological trends making it difficult for them to stay informed, relevant and up-to-date with technological advancements. Information and Communication Technology (ICT) is constantly evolving, impacting how we live and communicate. It introduces new trends that are crucial to learn in order to adapt to technological advancements.
Here are five key trends in ICT:
1. CONVERGENCE
Technological convergence is the merging of various technologies to work towards a common goal. This trend demonstrates the increasing collaboration between once-separate technological fields, resulting in innovative solutions and new products.
Example:
Back then, people used to listen to music on radios, watch movies on DVDs, and use telephones to make calls. But now, with technological convergence, most people use phones for all these activities.
2. SOCIAL MEDIA
Social media includes websites, apps, and online platforms where users can create, collaborate, discuss, modify, and share content. It's a key part of how we communicate today, connecting people worldwide and building communities around common interests.
Examples:
Facebook, TikTok, Youtube, Instagram, Twitter, and LinkedIn.

3. MOBILE TECHNOLOGIES
Mobile technology has completely changed how we access information and communicate. Smartphones and tablets are now everywhere, providing features that used to need a computer. With mobile technology constantly improving, it's easier than ever to stay connected and get things done on the go.
Examples:
Smartphones, tablets, and smartwatches.

4. ASSISTIVE MEDIA
Assistive media refers to technology to help people with disabilities, like visual or reading impairments, access information and communicate. It's essential for ensuring everyone can be part of the digital world, breaking down barriers and promoting inclusivity.
Examples:
Screen readers, audio books, voice assistants, and closed captioning.

5. CLOUD COMPUTING
Cloud computing has changed how we store, process, and access data. It uses the internet to offer flexible, scalable, and cost-effective computing services. With more businesses adopting it, it's becoming the standard for efficient and accessible data management.
Examples:
- Software-as-a-Service (Saas): Salesforce
- Infrastructure-as-a-Service (Iaas): DigitalOcean
- Platform-as-a-Service (Paas): AWS
- File Sharing and Data Storage: Dropbox
- Big Data Analysis: Civis Analytics
- Data Governance: Carbonite
- Cybersecurity: Forcepoint

CONCLUSION
- In conclusion, these five ICT trends are improving how we interact with the world. Convergence brings together different technologies to create innovative solutions, while social media connects people globally. Mobile technology makes it easy to access information and communicate anywhere. Assistive media helps people with disabilities join the digital world, and cloud computing offers flexible data management via internet. Understanding and adapting to these trends is important for staying relevant and making the most of the opportunities in our rapidly evolving digital landscape.
Submitted by: ULUAN, PRECIOUS KYLA
Grade/Section: 11 STEM2
1 note
·
View note
Text
Unlocking the Full Potential of Wattpad with MOD APK 10.69.0: A Comprehensive Guide
Wattpad has transformed the way we consume and create stories, offering a vast library of user-generated content that ranges from heartwarming romance to thrilling mysteries. For those who want to enhance their Wattpad experience, the MOD APK version 10.69.0 with Premium Unlocked features might be the key. In this blog, we will explore what this MOD version offers, how to install it, and the benefits of unlocking the premium features.
What is Wattpad MOD APK 10.69.0?
Wattpad MOD APK 10.69.0 is a modified version of the original Wattpad app. This version comes with unlocked premium features that are typically available only through a paid subscription. With the MOD APK, users can enjoy an ad-free experience, access to exclusive stories, offline reading, and more.
Key Features of Wattpad MOD APK 10.69.0
Ad-Free Experience: Enjoy uninterrupted reading sessions without pesky ads popping up.
Unlimited Offline Stories: Download and read your favorite stories offline, anytime, anywhere.
Exclusive Premium Stories: Gain access to a vast collection of premium stories not available to free users.
Enhanced Reading Experience: Customize your reading experience with various themes and font options.
Priority Updates: Get early access to new features and updates before they are rolled out to the general public.
How to Install Wattpad MOD APK 10.69.0
Step 1: Download the APK File
First, download the Wattpad MOD APK 10.69.0 file from a trusted source such as ModVersionAPK. Make sure your device has enough storage space to accommodate the app.
Step 2: Enable Unknown Sources
Before installing the APK file, you need to enable the installation of apps from unknown sources. Go to Settings > Security > Unknown Sources, and toggle the switch to enable it.
Step 3: Install the APK File
Locate the downloaded APK file in your device’s file manager and tap on it to begin the installation process. Follow the on-screen instructions to complete the installation.
Step 4: Launch the App
Once installed, open the Wattpad MOD APK app and sign in with your existing Wattpad account or create a new one. Enjoy all the premium features for free!
Is It Safe to Use Wattpad MOD APK?
While the Wattpad MOD APK offers many appealing features, it’s essential to consider the potential risks. Modified APKs are not officially supported by the original developers and might pose security risks, including malware or data breaches. Always download APK files from reputable sources and use antivirus software to scan for any potential threats.
Benefits of Premium Features
Unlocking premium features on Wattpad can significantly enhance your reading and writing experience. The ad-free environment allows for seamless story consumption, while offline access ensures you can enjoy your favorite tales even without an internet connection. Exclusive premium stories provide unique content that enriches the overall Wattpad experience.
Conclusion
Wattpad MOD APK 10.69.0 with Premium Unlocked features offers an enhanced and more enjoyable reading experience for avid Wattpad users. By following the installation guide and being mindful of potential risks, you can unlock the full potential of Wattpad and dive into a world of limitless storytelling. Whether you’re a reader looking for uninterrupted sessions or a writer seeking inspiration, this MOD version has something to offer for everyone.
0 notes
Text
Different real life scenarios of 7 Facets of ICT
Hello, readers! I am Jezylei, a second year BEED student. In this blog, I will share different real-life scenarios about the 7 facets of ICT.
Transaction
I am renting a place now which is called “Ladies dormitory”. The owner is not lives here; instead of coming here, nor going her place to pay my rent, I do send my payment through Instapay. Also, I love ordering clothes in online shop such as shein and shopee however, I live in dormitory so, basically there is no people here to pay my parcel since I always in school so, what I usually do is I use shopeepay or gcash to pay my parcels.
Cloud computing
I love keeping my memories in pictures but, I am aIready full storage so, I use google photos to back up my photo and videos.
Software
Jhozel is using Safari to access websites and search for informations. She also use safari to read articles, finds a place to go, or when she wants to see a place or image that she can’t see in person. She finds it useful because she explores the world or information all over the internet.
Hardware
Printer is hardware device that is used to get a hard copy of a document or file. My classmates is using a printer to have a printed materials such as handouts, outputs, and lesson plans; they also printed designs for them to make their instructional material for the teaching demonstration. Moreover, my classmates also use printer to have their favourite photo/image that they want to display on their wallet.
Communication Technology
Rea and Jass are best friends. They always talk in school or wherever they are nevertheless, when they are not together, they still finds a way to communicate with each other with a use of social media app which is messenger or telegram to communicate, sharing information, and sharing stories together. With the help of communication technology, Rea and Jass still keep in touch with each other.
Digital Data
My family loves watching different channels, for them to watch different movies, news, and entertainments, they bought an digital television; for them also to have better quality picture, audio, and wider screen since we loves watching all together.
Internet access
My sister is using a broadband for her to access internet, instant communication, and access informations through internet.
Thank you for taking time to read my blog! 🫶
1 note
·
View note
Link
0 notes
Text
[ad_1] Securing Your Laptop: Effective Tips & Tricks Introduction In today's digital era, laptops have become an essential part of our lives, serving as our personal assistant, entertainment hub, and gateway to the online world. However, the convenience and accessibility offered by these devices also come with certain risks. As we become increasingly reliant on laptops for storing sensitive data and conducting various online activities, it is crucial to prioritize their security. In this comprehensive guide, we will explore effective tips and tricks to secure your laptop, ensuring the protection of your valuable information. So, let's delve into the world of laptop security and equip ourselves with the necessary knowledge to safeguard our digital assets! I. Understanding the Perplexity and Burstiness of Laptop Security Before we dive into the details, let's shed some light on the two essential factors that impact the quality of content: perplexity and burstiness. Perplexity measures the complexity of text, ensuring a comprehensive and informative read for the readers. On the other hand, burstiness compares the variations of sentences, adding depth and diversity to the content. When it comes to securing your laptop, emphasizing both perplexity and burstiness becomes vital for capturing the readers' attention and delivering valuable information efficiently. II. Strengthening Your Laptop's Defenses 1. Implement Strong Passwords: A strong and unique password acts as the first line of defense against unauthorized access. Avoid using common words, personal information, or easy-to-guess patterns. 2. Enable Two-Factor Authentication (2FA): Adding an extra layer of security, 2FA requires a verification code in addition to the password, significantly reducing the chances of a successful breach. 3. Keep Your Operating System Up to Date: Regularly updating your laptop's operating system ensures that you have the latest security features and patches, effectively protecting against emerging threats. 4. Install Reliable Antivirus Software: Invest in reputable antivirus software and keep it updated to detect and eliminate malware, viruses, and other malicious programs that could compromise your laptop's security. 5. Secure Your Wi-Fi Connection: Enable the WPA2 or WPA3 encryption protocols on your wireless network to prevent unauthorized access. Additionally, change the default admin password of your router to enhance security further. 6. Be Wary of Phishing Attempts: Exercise caution while clicking on suspicious links or downloading attachments from unknown sources. Phishing attacks are prevalent, and being vigilant can save you from falling victim to such scams. 7. Utilize a Virtual Private Network (VPN): When accessing the internet, especially on public Wi-Fi networks, use a VPN to encrypt your online activities and protect your sensitive information from potential eavesdroppers. 8. Regularly Backup Your Data: Create backups of your important files and store them securely either on an external hard drive or a cloud-based service. This practice acts as a failsafe against data loss caused by hardware failure, theft, or other unforeseen events. III. Physical Security Measures for Your Laptop 1. Use a Strong Laptop Lock: Secure your laptop when in public places by investing in a strong laptop lock that immobilizes your device, preventing theft. 2. Avoid Leaving Your Laptop Unattended: Always keep an eye on your laptop in public areas, such as cafes or airports. Unattended laptops are easy targets for opportunistic thieves. 3. Employ Biometric Security Features: If your laptop supports biometric authentication, such as a fingerprint scanner or facial recognition, ensure you enable and use these features for added security. IV. Best Practices for Safe Online Behavior 1. Be Cautious with Public Wi-Fi: Public Wi-Fi networks are notorious for being vulnerable to attacks. Avoid accessing sensitive information, such as online banking, while connected to such networks.
2. Regularly Review App Permissions: Review the permissions granted to various applications installed on your laptop. Restrict access to sensitive data unless necessary, minimizing the potential risks. 3. Be Selective with Downloaded Software: Download software only from reputable sources to avoid inadvertently installing malware or adware that could compromise your laptop's security. 4. Securely Dispose of Old Laptops: When the time comes to replace your laptop, ensure you wipe all data from your old device using secure erasure methods. This prevents unauthorized access to your personal information. V. Frequently Asked Questions (FAQs) Q1. How often should I update my laptop's operating system and applications? A1. It is recommended to update your laptop's operating system and applications as soon as updates become available. Regular updates help patch security vulnerabilities and ensure optimal performance. Q2. Can hackers still access my laptop even if it is password protected? A2. Although a password provides a layer of security, determined hackers can circumvent it. Hence, it is crucial to implement additional security measures, such as encryption and two-factor authentication. Q3. How do I create a strong password? A3. To create a strong password, combine uppercase and lowercase letters, numbers, and special characters. Avoid using easily guessable information, such as names or birthdates. Q4. What should I do if my laptop gets stolen? A4. In case of a stolen laptop, report it to the local authorities immediately. Also, notify your employer or any relevant institutions if the laptop contains sensitive work or personal data. Q5. Is it necessary to pay for antivirus software? A5. While there are free antivirus software options available, investing in a reputable paid antivirus program offers additional features and better protection against evolving threats. Conclusion Securing your laptop is of utmost importance in our increasingly interconnected digital world. By following the effective tips and tricks outlined in this comprehensive guide, you can significantly enhance your laptop's security and protect your valuable data from potential breaches. Remember, maintaining a strong and unique password, enabling two-factor authentication, regularly updating your operating system, and being cautious while connecting to the internet are fundamental practices that will go a long way in safeguarding your laptop. Stay informed, stay vigilant, and stay secure! [ad_2] #Securing #Laptop #Effective #Tips #Tricks
0 notes