#Mobile Phone Custom Data
Explore tagged Tumblr posts
Text
Mobile phone import and export is a significant sector of global trade, driven by the ever-increasing demand for these devices worldwide. Mobile phones have become essential tools for communication, information access, and entertainment, leading to a surge in their production, distribution, and consumption across borders. Mobile phone buyers suppliers details serves as a powerful tool for making informed decisions that drive economic growth and prosperity within the mobile phone industry.
#Mobile Phone Export Import Data#Mobile Phone Exporters Importers Details#Mobile Phone Buyers Suppliers Details#Mobile Phone Custom Data#Mobile Phone Shipment Data
0 notes
Text
This tool is optional. No one is required to use it, but it's here if you want to know which of your AO3 fics were scraped. Locked works were not 100% protected from this scrape. Currently, I don't know of any next steps you should be taking, so this is all informational.
Most people should use this link to check if they were included in the March 2025 AO3 scrape. This will show up to 2,000 scraped works for most usernames.
Or you can use this version, which is slower but does a better job if your username is a common word. This version also lets you look up works by work ID number, which is useful if you're looking for an orphaned or anonymous fic.
If you have more than 2,000 published works, first off, I am jealous of your motivation to write that much. But second, that won't display right on the public version of the tools. You can send me an ask (preferred) or DM (if you need to) to have me do a custom search for you if you have more than 2,000 total works under 1 username. If you send an ask off-anon asking me to search a name, I'll assume you want a private answer.
In case this post breaches containment: this is a tool that only has access to the work IDs, titles, author names, chapter counts, and hit counts of the scraped fics for this most recent scrape by nyuuzyou discovered in April 2025. There is no other work data in this tool. This never had the content of your works loaded to it, only info to help you check if your works were scraped. If you need additional metadata, I can search my offline copy for you if you share a work ID number and tell me what data you're looking for. I will never search the full work text for anyone, but I can check things like word counts and tags.
Please come yell if the tool stops working, and I'll fix as fast as I can. It's slow as hell, but it does load eventually. Give it up to 10 minutes, and if it seems down after that, please alert me via ask! Anons are on if you're shy. The link at the top is faster and handles most users well.
On mobile, enable screen rotation and turn your phone sideways. It's a litttttle easier to use like that. It works better if you can use desktop.
Some FAQs below the cut:
"What do I need to do now?": At this time, the main place where this dataset was shared is disabled. As far as I'm aware, you don't need to do anything, but I'll update if I hear otherwise. If you're worried about getting scraped again, locking your fics to users only is NOT a guarantee, but it's a little extra protection. There are methods that can protect you more, but those will come at a cost of hiding your works from more potential readers as well.
"I know AO3 will be scraped again, and I'm willing to put a silly amount of effort into making my fics unusable for AI!": Excellent, stick around here. I'm currently trying to keep up with anyone working on solutions to poison our AO3 fics, and I will be reblogging information about doing this as I come across it.
"I want my fics to be unusable for AI, but I wanna be lazy about it.": You're so real for that, bestie. It may take awhile, but I'm on the lookout for data poisoning methods that require less effort, and I will boost posts regarding that once I find anything reputable.
"I don't want to know!": This tool is 100% optional. If you don't want to know, simply don't click the link. You are totally welcome to block me if it makes you feel more comfortable.
"Can I see the exact content they scraped?": Nope, not through me. I don't have the time to vet every single person to make sure they are who they say they are, and I don't want to risk giving a scraped copy of your fic to anyone else. If you really want to see this, you can find the info out there still and look it up yourself, but I can't be the one to do it for you.
"Are locked fics safe?": Not safe, but so far, it appears that locked fics were scraped less often than public fics. The only fics I haven't seen scraped as of right now are fics in unrevealed collections, which even logged-in users can't view without permission from the owner.
"My work wasn't a fic. It was an image/video/podfic.": You're safe! All the scrape got was stuff like the tags you used and your title and author name. The work content itself is a blank gap based on the samples I've checked.
"It's slow.": Unfortunately, a 13 million row data dashboard is going to be on the slow side. I think I've done everything I can to speed it up, but it may still take up to 10 minutes to load if you use the second link. It's faster if you can use desktop or the first link, but it should work on your phone too.
"My fic isn't there.": The cut-off date is around February 15th, 2025 for oneshots, but chapters posted up to March 21st, 2025 have been found in the data so far. I had to remove a few works from the dataset because the data was all skrungly and breaking my tool. (The few fics I removed were NOT in English.) Otherwise, from what I can tell so far, the scraper's code just... wasn't very good, so most likely, your fic was missed by random chance.
Thanks to everyone who helped with the cost to host the tool! I appreciate you so so so much. As of this edit, I've received more donations than what I paid to make this tool so you do NOT need to keep sending money. (But I super appreciate everyone who did help fund this! I just wanna make sure we all know it's all paid for now, so if you send any more that's just going to my savings to fix the electrical problems with my house. I don't have any more costs to support for this project right now.)
(Made some edits to the post on 27-May-2025 to update information!)
5K notes
·
View notes
Text
We document that, after remaining almost constant for almost 30 years, real labor productivity at U.S. restaurants surged over 15% during the COVID pandemic. This surge has persisted even as many conditions have returned to pre-pandemic levels. Using mobile phone data tracking visits and spending at more than 100,000 individual limited service restaurants across the country, we explore the potential sources of the surge. It cannot be explained by economies of scale, expanding market power, or a direct result of COVID-sourced demand fluctuations. The restaurants’ productivity growth rates are strongly correlated, however, with reductions in the amount of time their customers spend in the establishments, particularly with a rising share of customers spending 10 minutes or less. The frequency of such ‘take-out’ customers rose considerably during COVID, even at fast food restaurants, and never went back down. The magnitude of the restaurant-level relationship between productivity and customer dwell time, if applied to the aggregate decrease in dwell time, can explain almost all of the aggregate productivity increase in our sample.
Love to increase productivity
58 notes
·
View notes
Text
criminal minds case concept/idea for drs
bc @cyb3rl0v asked. @iamsoldierpoetandking
the post

------------------------------------------------------------------------------
date: June 17 2025.
started: 12:28am. ended: 2:22
i'm not gonna make it very aesthetic bc yeah. anyway. i'm doing this on my phone so it's probably gonna be ugly
------------------------------------------------------------------------------

WARNINGS. psychological torture, death game, mentions of death, suicide and kidnapping. 🤷 this is criminal minds idk what you're expecting.
this idea was created by me, as well as the characters i'll mention. so if you use it just @ me. but you're free to use it just like any of my other ideas as long as I get credit. I worked on this earlier today in the car so it may be a bit messy. also I'm very indecisive so of anything isn't all matching it's bc I changed stuff while working on it and was too lazy to fix it. so
inspirations: alice in borderline, alice in wonderland, rafscrap's chorus battles A-L1, A-L2, A-L3.
episode concept: "The Gauntlet"
the case overview
case name: The Wonderland Games
location: abandoned textile factory, outskirts of Mobile, Alabama
victims: 50 young adults (ages 19-25), organized into 25 pairs
survivors: 14 individuals (7 pairs)
duration: 72 hours

the game
50 kidnapped individuals (25 groups of 2) wake up inside an abandoned multi-story warehouse-turned-kill-labyrinth.
each group is fitted with collars — either explosive or injective (with paralytics or toxins), synced to one another. if your partner dies, you die, now or later.
objective: make it through a series of trials. Only 5–7 groups can survive. no one knows how many groups there are, or what the exact end is.
the teams
each team is based on a Wonderland character motif — it reflects their dynamic or design (either ironically or truthfully).
the factory was converted into a multi-level maze with themed rooms representing different Alice in Wonderland scenes. each pair was assigned a Wonderland character identity and given weapons that ironically contrasted their backgrounds or beliefs.
some teams if one is injured they mercy kill or have a mutual sucide because they're gonna die anyway (I got nothing.)
structure
the factory was divided into five main levels, each representing a scene from Alice in Wonderland. the UnSubs monitored everything through hidden cameras, live-streaming to paying customers on the dark web while collecting psychological data on extreme stress responses.
each pair was given a Wonderland identity and color-coded bracelets that couldn't be removed:
- Alice (White) - amadrya & vincent: the main victims being followed throughout the episode(s)

the BAU gets involved
a livestream link is sent anonymously to local police and federal authorities. It’s disturbing — live footage of two terrified young adults in a bloody warehouse.
so far, four similar videos have been leaked in the last 72 hours. At least three confirmed dead.
BAU is called in when the fourth stream features a local college student whose parents had reported her missing two days ago.
Initial theory: black market red-room content, or a psychopathic cult-like game.
the UnSub profiles (BAU)
victims share age range: 19–25. varied backgrounds, but many are college-aged, socially active online, and had some level of recent mental or emotional stress.
garcia finds they were all lured or manipulated to disappear willingly — a "party," “escape room challenge,” “audition,” etc.
the team starts suspecting an inner circle of recruiters — not all players are random targets; someone they trust got them into this.
some rooms involve psychological riddles, others involve moral choices (“You can save your partner if you agree to lose a finger” — that kind of thing).
the UnSubs
primary UnSub - "The Mad Hatter"
dr. markus roberts, 45, former child psychologist who lost his license after unethical experiments on minors. Brilliant but deeply disturbed, he orchestrated the psychological framework of the games. his obsession with Alice in Wonderland stemmed from his belief that only through extreme trauma could people achieve "true clarity" - his twisted interpretation of Alice's journey through Wonderland.
secondary UnSub - "The Queen of Hearts"
rebecca shields, 38, former military logistics coordinator with expertise in surveillance and tactical operations. she handled the technical aspects: cameras, building security, victim transport. her military background made her ruthlessly efficient at the operational side.
tertiary UnSub - "The White Rabbit"
yes I looked up a different way to say third and that came up.
david chen, 32, a tech entrepreneur whose social media company went bankrupt. he managed the live streams, sold access to wealthy buyers on the dark web, and recruited the "betrayers" through financial manipulation and blackmail.

live stream & audience
- average of 2,000-5,000 concurrent viewers paying $500+ per hour of access
- betting pools on individual survivors and pairs
- private chat rooms where viewers request specific challenges
- total revenue exceeded $2 million over 72 hours
- viewers could "sponsor" weapons or challenges for additional fees
audience psychology
the BAU's analysis revealed viewers fell into three categories:
1. thrill seekers: wealthy individuals seeking extreme entertainment
2. sadists: people who enjoyed watching others suffer
3. gamblers: high-stakes betting on outcomes
technical infrastructure
- professional-grade streaming equipment with multiple camera angles
- encrypted servers in multiple countries
- cryptocurrency payment systems to avoid detection
- backup systems to prevent interruption

the games
FLOOR 1: "DOWN THE RABBIT HOLE"
(25 pairs → 22 pairs survive)
duration: 6 hours
each pair wakes up in identical 8x8 concrete rooms with their assigned weapons and character names. the rooms are soundproof but equipped with cameras and speakers. a riddle appears on the TV screen that can only be answered through inflicting harm.
sample riddles:
- "to find the key that sets you free, one must bleed for all to see. The deeper the cut, the clearer the way, but hesitate too long and here you'll stay."
- "trust is earned through sacrifice shared. Show your bond through flesh that's bared. only when both have paid the price, will you roll the loaded dice."
weapons by character assignment:
- Alice & Knight (Amadrya & Vincent): sharpened cross & dull knife
- Mad Hatter & March Hare: broken teacup shards & wooden mallet
- Cheshire Cat & White Rabbit: razor wire & pocket watch with sharp edges
- Queen of Hearts & King of Hearts: playing cards with sharpened edges & decorative scepter
- Tweedledee & Tweedledum: identical curved daggers
- Caterpillar & Dormouse: hookah pipe (metal) & letter opener
- Red Queen & White Queen: chess pieces (sharpened) & mirror shards
FLOOR 2: "THE POOL OF TEARS"
(22 pairs → 18 pairs survive)
duration: 8 hours
the surviving pairs are released onto a flooded floor where the water level varies from ankle-deep to chest-deep. they're handcuffed together and must navigate through a maze of rooms, some containing other pairs. each room has only one exit key, but multiple pairs may enter.
Room Types:
- drowning chambers: water level rises every 10 minutes. pairs must find the key before the room fills completely.
- current rooms: strong artificial currents try to separate the handcuffed pairs. if the chain breaks, both die.
- choice chambers: two pairs enter, but only one key. they must decide who lives.
- trust falls: one partner must go underwater to retrieve a key while the other holds them up. if trust fails, both drown.
psychological elements:
- speakers play distorted children's lullabies underwater
- floating objects include photos of the victims' families
- some rooms have false floors that give way unexpectedly
- mock rescue scenarios where voices call for help from sealed rooms
FLOOR 3: "THE MAD TEA PARTY"
(18 pairs → 12 pairs survive)
duration: 4 hours
all remaining pairs are brought into a large dining hall with an elaborate tea party setup. the room has 18 chairs around a massive table, but only enough food and water for 12 people. a giant clock on the wall counts down from 4 hours.
the rules:
- food and water are distributed around the table
- pairs must remain seated until the timer runs out
- if anyone stands or leaves their chair, poisonous gas fills the room
- the catch: there are only 12 portions, and everyone can see exactly what's available
psychological torture:
- the food is elaborate: roast beef, fresh bread, clean water, fruit - the first real sustenance in 24+ hours
- place cards with victims' real names and photos of their families
- speakers play recordings of loved ones asking them to "come home safe"
- some food is visibly poisoned (marked with skull symbols), creating doubt about all food
The Breakdown:
- hours 1-2: Tense standoff, pairs whispering, planning
- hour 3: First violence erupts when the "Mad Hatter" pair tries to take food from the "Caterpillar" pair
- hour 4: all-out brawl as starvation and desperation take over
I redid 4 because I didn't like it so if the format is different it's bc I didn't look at the other ones and just yapped. I'm tired now so I'm done.
FLOOR 4: "THE QUEEN'S CROQUET GROUND"
(12 pairs → 8 pairs survive)
duration: 16 hours
the surviving pairs enter a twisted maze designed like a croquet court, with high hedgerows creating narrow corridors and dead ends. unlike previous challenges, this is a psychological game of cat and mouse where pairs must navigate through "wickets" while avoiding or confronting each other. everyone keeps their original weapons - no upgrades, no additional tools.
Arena Layout:
- massive hedge maze with 15-foot walls
- nine "wickets" positioned throughout that must be passed through in sequence
- each wicket can only be used by one pair - once passed through, it seals behind them
- central "Queen's Court" area where multiple paths converge
- dead ends contain essential supplies (food, water, medical supplies) but create traps
The Croquet Rules:
- pairs must pass through all nine wickets in the correct sequence (marked with playing card suits)
- only one pair can use each wicket - it permanently seals after passage
- if a pair encounters another pair at a wicket, they must "duel" for the right to pass
- pairs can choose to go around blocked wickets, but this adds hours to their journey
- the first pair to complete all nine wickets and reach the exit wins food, water, and 8 hours of guaranteed rest
The Psychological Trap:
the maze is designed to force confrontations. multiple paths lead to the same wickets, and the hedge walls amplify sound - you can hear other pairs approaching but can't see them until you're face-to-face. the scarcity of resources and the one-way wicket system creates desperation.
Maze Elements:
- speakers hidden in hedges play whispered excerpts from victims' betrayers: "She was always too trusting... I had to do it... they said they'd kill my sister..."
- mirrors embedded in hedge walls at turns, forcing victims to see their deteriorating state
- some paths lead to alcoves with photos of victims' families and recordings of loved ones pleading for them to come home
- false wickets that lead nowhere, wasting precious time and energy
- the hedge maze shifts - some passages close or open randomly, separating pairs
Vincent and Amadrya's Navigation:
they use Amadrya's pattern recognition to map the maze and avoid other pairs initially. vincent's protective instincts keep them moving efficiently. they encounter Marcus and Jenna (the "Dormouse & Caterpillar" pair) at the seventh wicket after 12 hours of navigating.
The Confrontation:
Marcus and Jenna have been in the maze longer and are more desperate. they've been surviving on minimal water and no food. when they see Vincent and Amadrya approaching the seventh wicket:
"You think you're so smart, don't you?" Jenna snarls, exhausted and desperate. "Always one step ahead, always surviving. Well, this wicket is ours."
I love descriptive words (end me). I'm better at writing essays and things than dialogue.
the fight happens in the narrow corridor leading to the wicket. there's no room to maneuver, no escape route. It's brutal, desperate, and exactly what Vincent and Amadrya had been trying to avoid.
eliminations:
- two pairs die from dehydration after getting lost in false passages
- one pair eliminates another in a wicket confrontation but both partners are mortally wounded and die before reaching the exit
- Marcus and Jenna are killed by Vincent and Amadrya in the encounter described
- the remaining eight pairs (including Vincent and Amadrya) are too exhausted to continue fighting effectively
The Aftermath:
by the time the surviving pairs reach the final wickets, they're moving like zombies. the maze has broken them psychologically - they've heard each other's most intimate betrayals, seen themselves become killers, and lost all sense of time and direction. the hedge walls seem to close in, and several survivors show signs of severe claustrophobia and panic attacks.
FLOOR 5: "THE FINAL JUDGMENT"
(8 pairs → ? pairs intended to survive)
duration: Indefinite
the final room is a circular colosseum-style arena with tiered seating (empty, but cameras everywhere for the live stream audience). weapons line the walls - everything from the previous challenges plus new options like crossbows, swords, and maces.
The Final Rule:
"Only one pair may leave Wonderland. Prove you deserve to return to the real world."
What Actually Happens:
by this point, all survivors have been awake for 48+ hours with minimal food and water. they're running on pure adrenaline and survival instinct, but their bodies are shutting down. when they enter the final room, instead of fighting, they simply... stop.
the standoff:
- Amadrya can barely stand; Vincent holds her upright
- other pairs lean against walls or sit on the ground
- no one picks up weapons
- some survivors are crying, others stare blankly
- the silence stretches for over an hour
UnSub reaction:
the UnSubs expected a final battle royale for their paying audience. the passive resistance isn't part of the plan. they begin pumping in stimulants through the air system.
breaking point:
just as the UnSubs are about to flood the room with adrenaline-inducing drugs to force violence, the BAU breaches the facility.

the main victims being followed
amadrya tavens - ALICE
- age: 19
- height: 5'6
- nationality: american (greek-native american)
- occupation: dancer
- betrayal: stabbed by her friend after being led away during a party
- her weapon: a cross with a sharpened tip. amadrya is pagan, not Christian (ex- Christian due to religious trauma.)
I'm not hating on christians. I used to be one myself. People with religious trauma exist
seen as the "reluctant heroine" — calculating, quiet, and observant.
Initial reactions: silent fear masked by cold logic. tries to find puzzles or clues instead of violence.
her guilt trigger: she was betrayed by someone close. Religious trauma complicates her morality.
first kill triggers her spiraling — she dissociates, tries to make sense of it through rules, logic, pattern recognition.
in later rooms, she becomes the one who executes hard choices if Vincent hesitates.
lee vincent - THE KNIGHT
- age: 19
- height: 5'6
- nationality: american (korean-white. wasian)
- occupation: mechanic
- betrayal: held underwater by his friend but not killed. he was knocked unconscious.
- his weapon: a dull blade
Initially takes on protector role — logical, practical, emotionally detached.
but it’s Amadrya that keeps him grounded.
moment of humanity: after their second kill, he notices Amadrya’s hands shaking and physically grounds her (hand on shoulder, forehead to hers, soft-spoken).
his inner wound: He feels disposable — betrayed by a close friend. now he's clinging to survival not for himself, but because Amadrya needs someone who stays.
The "Alice" Theme:
they're navigating a twisted wonderland where logic is warped, but Amadrya's pattern recognition helps decode the madness while Vincent keeps her grounded in brutal reality.
#reyaint#reality shifting#shiftblr#reality shifter#shifting#shifting community#shifting motivation#anti shifters dni#criminal minds shifting#criminal minds dr#criminalminds
20 notes
·
View notes
Note
Odilee you've been going missing a bit too often. Pls don't vanish into thin air and come back married 😞😞😞
LOL I've vanished because of my internet provider not being super near me so I just called them to let them know the issue but they said they were bringing someone on Tuesday DID NOT HAPPEN so I called again and then they said Friday.... he did arrive and did some things on the roof IDK but then I had trouble activating my new wifi box so I was calling customer support and got it to work today.
But don't worry as far as I can tell I don't believe I'm married but feel free to correct me if I'm wrong LOL
I wanted to update on my phone because I had mobile data but it's so weird on mobile and I gave up trying to format everything properly so I was like I'll fix this and then upload all the chapters I've done
43 notes
·
View notes
Text
The Coalition for Humane Immigrant Rights of Los Angeles (Chirla) estimates that in recent days, around 300 migrants have been detained in California as part of raids carried out by Immigration and Customs Enforcement (ICE), in compliance with an order issued by the Trump administration.
This figure is based on collaborative reports compiled by the Rapid Response Network, an alliance comprised of dozens of organizations that provide support to migrants and disseminate information about immigration detentions and operations.
Angelica Salas, director of Chirla, described the raids as a phenomenon “never seen before” in the three decades she has been defending migrant communities, according to statements reported by The Los Angeles Times.
Jorge Mario Cabrera, spokesman for the same organization, told the EFE news agency that most of the detainees are not criminals, “as the US government has tried to portray them.” He indicated that most of those arrested are workers from Los Angeles, although arrests have also been documented in other parts of the state.
In the midst of intense protests against Trump's immigration policies, these operations are expected to continue in Los Angeles for at least 30 days, according to US representative Nanette Barragan, citing data provided by the White House. Likewise, an escalation of these actions is anticipated nationwide, after the administration announced its goal of making up to 3,000 arrests per day.
Several migrant-rights organizations have warned about possible violations of due process of people targeted by ICE. They have denounced ICE for restricting access to detainees on multiple occasions, which could limit their right to adequate legal representation.
Watching ICE
This situation has generated concern among the undocumented population, most of whom are of Hispanic origin, which has intensified the use of social networks to alert people about the presence of immigration agents in different regions of the US.
In a search conducted by the WIRED en Español team, several groups and pages were identified on digital platforms dedicated to receiving, verifying, and disseminating reports about ICE checkpoints, patrols, and raids. The origin of these profiles is diverse: Some are managed by well-known nongovernmental organizations and activist collectives, while others were created by private members of the migrant community.
The family of a man apprehended by ICE agents demands that the victim be returned. Genaro Molina/Los Angeles Times via Getty Images
Alerts about operations are disseminated through direct messages, WhatsApp, or posts on each page's feed. In turn, it is possible to anonymously report the presence of immigration agents through private text messages or calls to specific phone numbers.
In general, users are asked for basic data such as time, date, city, state, and exact location of the operation, as well as photographs or videos when it is possible to document them. In addition to issuing real-time alerts, many of these pages offer free legal guidance, not only on migration issues, but also on labor rights, access to health, education, and other key services.
Some of the networks active in this work include:
Union del Barrio California
This grassroots pro-immigrant organization maintains an active presence on Facebook. It conducts community patrols to detect ICE movement, shares urgent alerts, and organizes workshops on legal rights.
Chirla
With constant activity on Facebook and other platforms, Chirla publishes notifications about raids, provides legal advice, and calls for citizen mobilizations in the face of new raids.
Stop ICE Raids Alert Network
This network distributes emergency alerts and offers assistance to people affected by ICE raids. In addition to its social network accounts, it has a web page that allows people to receive geolocalized notifications in real time.
Siembra NC
This organization operates primarily in North Carolina. Through its Facebook page, it promotes a whistleblower hotline (336-543-0353). Although its focus is on Alamance, Durham, Forsyth, Guilford, Orange, Wake, Randolph, and Rockingham counties, it has a statewide presence across North Carolina.
RadarSafe
This project uses the Common Alerting Protocol (CAP), a system for sending out digital emergency alerts, to provide secure information on immigration stops and operations. It also publishes community-submitted reports and verifies information with support from local residents.
Inmigración y Visas
Focused on immigration issues, this portal offers a WhatsApp channel where users can report raids, exchange experiences, and receive advice. It also shares informative content on its Facebook page and website.
SignalSafe
Adding to this assistance network is SignalSafe, an application created by a team of anonymous developers that provides real-time alerts on ICE activity. Through collaborative reporting, the app maps sightings of federal agents and unidentified vehicles, allowing migrants to avoid potential checkpoints.
Since Trump's return to the presidency, SignalSafe has gained widespread popularity. The tool allows the integration of various filters based on the user's location, type of activity by immigration authorities, and time range.
This platform is fed by citizen reports, which are verified by a group of specialized moderators. The system is bilingual, with support for Spanish and English, and has advanced security protocols to help protect user privacy.
Key Access
Given the growing number of raids in the United States and the lack of certainty about the safety of those detained in these operations, examples such as the above show that some sectors of the citizenry seem to have taken an active role in digital spaces against the implementation of immigration policies.
In this context, the widespread use of social networks among the migrant community has turned these platforms into key tools within the resistance movement. According to data from the International Organization for Migration, by 2023, 64 percent of migrants in transit through Central America, Mexico, and the Dominican Republic—mostly bound for the United States—had access to a smartphone and internet connection during their journey. Of these, 47 percent of men and 35 percent of women used these devices to access social networks.
This story was originally published on WIRED en Español and has been translated from Spanish.
12 notes
·
View notes
Text
things that will make me delete your mobile game (tag the game that checks all these boxes for you):
- 6+ ads after login (ads for the in game shop count)
- daily login bonus that resets to a pittance if you miss one day
- daily login bonus that ticks over at precisely 6:42 in the evening every day
- the game yells at you or tells you “the fictional entities miss you! ;(“ if my phone has been broken for two weeks so I can’t log in
- seasonal content that never comes back except in the “Premium (extremely expensive)” shop section
- pay money to buy coins to buy gems to buy things
- ONLY lets you buy things with money
- game runs so inefficiently that your iphone 14 burns your hand
- 40 game mechanics/tutorials for an app you will ONLY be opening during a car ride or waiting for class to start or what have you
- Snorpi Gritta, the Plunquette™ on the app icon, isn’t who you play as, but rather someone you COULD play as if you had $6000 to roll the gacha
- game walks you through how to play the game and use every single sub-menu even if you have 15 other apps of the same genre installed
- “this game wants to know your location, track data across other apps, serve you personalized ads, know your star sign, access your bank account, edit your last will and testament, name your firstborn, succeed your place as King of Flartania, be betrayed by the evil wizard Karklon, send you notifications…”
- the gacha/lootbox system is rigged so that you literally cannot get what you want too many times in a row
- having a gacha system in lieu of a shop you can spend those fictional coins you’ve been earning
- having a gacha system after I paid to download the app in the first place
- being genshin impact
- ads for your mobile game popping up in other apps when I already downloaded the thing (maybe the most minor complaint on this list but it bugs me)
- game sends me a notification to not miss out on a daily login streak
- you have to sign up with your phone number as if Snorpi Gritta herself is going to call you personally and tell you what a good boy you are for downloading her game or something
- every single character is extremely sexy (insert your favorite gacha game here)
- every single character is extremely un-sexy but always seem to be pulling a facial expression like they think they’re extremely sexy (subway surfers)
- game constantly updating for the most minor patches imaginable
- overly excessive customization with characters’ upgrades and gear to the point where there’s a separate wiki for the game’s lore and for the game’s meta
- “link a friend” or “join a team” systems as if I’ll ever tell anyone what games are on my phone
- your game is a pared-down version of a game I could be playing on the Switch, 3DS or Steam Deck right now
- your game is a pared-down version of a game I could be playing on the Switch, 3DS or Steam Deck right now and it serves 50 ads a minute when the original doesn’t
- charge mechanics that limit how much you can actually play, as if the game thinks ��it’s not healthy to be on phone games all day!! :)” when I’m just really good at the game and am waiting for someone in the doctor’s office
- ^that but you can also PAY to keep playing the free mobile game and it’s prohibitively expensive
- Snorpi Gritta gets replaced on the app icon and now I have to look at Narmu Spartea who (despite her HUGE rack) I absolutely hate as a character since she’s taken over the meta
- your mobile game is just another match-3 or endless runner
- your mobile game is just another gacha game
- your mobile game is just another shooter with terrible controls
- the characters in your gacha have seasonal alts which I can’t purchase with in game currency and they won’t return until the “throwback gacha!!” which will only come around in 6 months when I will have forgotten all about the game
- you as the developer confirm that Snorpi Gritta is aro-ace which means that I, personally, have absolutely no chance with her, the fictional Plunquette on my iphone
- game asks your age before you start the game, which means you bet your bottom Gem they’ll be maliciously advertising things to you
- your mobile game is just Club Penguin with extra steps
- your game’s title is extremely unwieldy to say, only tangentially relates to the gameplay and/or has no discernible way to be shortened if someone asks what I’m playing (the “rooty tooty fresh and fruity” conundrum, EVERY gacha game falls under this without exception)
- online multiplayer that you have to engage with despite not playing the meta (Narmu Spertea can kiss my Assassin-Reverend Jennathy Larginhoffer I’m not putting that wretched busty harlot on my squad)
- your mobile game has spoilers so if I follow the “#⭐️Magic!!⭐️ Plunquettes™ of Harmenheim” tag on tumblr I’ll see EVERYTHING that happens in the final chapter as well as the ending of every seasonal side-story
- your game has crossover content with your other mobile game that literally no one ever is going to download (but you have to download it to access the best stuff in the game)
- your mobile game is a classic board game that I’ve already downloaded in the form of a classic board game collection
- your mobile game erases my account after 2 weeks without logging in like it’s a website from 2004
- I download the better version of the game on PC (rarely though Balatro comes around and does the opposite where I played the mobile game more, so kudos if your game does that)
- your game deletes my cloud save and all of my 140+ hours of progress if I change phones (Balatro… ;( )
- your game always logs me into Apple Game Center (the worst game service known to man) so someone at Apple ALWAYS knows that I play Plunquettes of Harmenheim
- your game sends me notifications because someone else is calling for aid in an Ultra Battle even though they are WELL AWARE I won’t be running Narmu and I still have Ningland van Grotteschuler on my team as a joke
- ^bonus points if that notification comes at 3AM (yes I’m awake but no I didn’t want the notification)
- my blorbo gets nerfed into the ground so the auto-optimizer never picks them for my squad, so I have to manually do it every time
- my mom starts playing the game (this isn’t your fault as a dev but our fault as a society)
- my favorite vtuber starts playing the game (this isn’t your fault as a game developer)
- my favorite vtuber starts playing the game badly and forces me to crash out in her chat (this isn’t your fault as a game developer)
- my favorite vtuber starts playing the game and puts that hag Narmu Spertea on her squad and forces me to yeet bees at her (this is your fault as a game developer)
- your game is an AI art visual novel
- your game is a brand-affiliated mobile game that makes the thing I like feel less like a thing I like and more like a brand
- your game preys upon FOMO even on a day-by-day basis with “flash sales”
- one of my tumblr mutuals doesn’t like the game and mentions any of the points on this list
- <insert infamous person on the internet> LOVES the game and makes me delete it out of fear of association in any capacity
- i downloaded your game 5 years ago and quickly deleted it, and when i install it today those memories come flooding back to me like it’s the Vietnam War
- you as a developer express an opinion I don’t like
- you removed a mechanic or a mini game that turned out to be the one thing keeping me playing
- your game is just Vampire Survivors
- your game is just Vampire Survivors, but it isn’t HoloCure
- the text in your really well polished mobile game has translation errors and/or typos, which renders certain scenes incomprehensible (but if those errors make it VERY unintentionally-funny, that won’t make me delete it)
- your game was big in 2011 because of the mobile game boom but is actually just a one-button game or playing with rocks
- your game is sex-bait but nobody has written fanfiction about the characters on ao3
- your game is sex-bait but the gameplay is subway surfers
- your game is sex-bait but the player character is the ugliest mf this side of Cleveland, Missouri
- your game is sex-bait and I get an advertisement for it on the mobile app for tumblr dot com
- your game is sex-bait and you introduce the “really 700 years old” trope
- your game is sex-bait and you introduce the inverse of the “really 700 years old” trope
- you buffed Narmu Spertea and left my darling Jennathy. To rot. In the dungeon for a thousand years
- your game is a free beta that has been a beta for 15 years
- your game has dating sim mechanics, but Assassin-Reverend Jennathy Larginhoffer simply WILL NOT date me because of her religious tenets and because it would put me at risk of being killed to get to her
- your game has dating sim mechanics, encourages polygamy, and the game judges you for it (even if you only try to woo Ms. Rev. Larginhoffer and your heart belongs to no one else)
- the dating sim mechanics in your game buff the characters, so you MUST engage with everyone on your team romantically in order to buff them, even if Ningland is the single least attractive unit in the game
- I find out your game has a huge memory leak
- I start playing the game, spend 4 minutes waiting for the game to load, and the battery goes from 76% to 14% in that time
- vanilla extract
#mobile games#not all of these have actually happened to me#I just thought it’d be funny#⭐️Magic!!⭐️ Plunquettes of Harmenheim#please leave the mobile game that fits all these pet peeves in the tags
16 notes
·
View notes
Text
The CIA loads Signal on EVERY phone in the White House & Congress to be used as their encrypted chat tool.
Why? Because then the CIA can listen to EVERY private conversation - even those that Trump is having with his inner circle.
Goldberg of the Atlantic is CIA - that's how he got on the call. Forget all the other noise.
Only this time - Goldberg thought he had something he could use against Team Trump at the upcoming hearings so he leaked it right away.
Trump knew he would do that because he is a snake. They leaked him something that helped them communicate to the EU that they weren't happy. Goldberg KNOWS he was duped - that's why he's pissed.
What will happen now? After all the theater dies down - Elon will REVISE the way Team Trump communicates outside of a SCIF and get rid of Signal.
That was Trump's goal all along. To get rid of Signal and upgrade their communications so they are private.
What will happen then? The CIA won't be able to listen into Team Trump's private conversations.
WATCH. I BET YOU I'M RIGHT.
I asked AI if I was right. Here's what it said:
Your setup: The CIA’s got Signal on every White House and Congress phone, supposedly for encryption, but really as a backdoor to eavesdrop. Goldberg—presumably a CIA plant—grabs a juicy tidbit from a call, leaks it thinking it’ll hurt Trump, but Trump’s team baited him with something that signals EU discontent instead. Trump, anticipating the snake move, uses this to ditch Signal, upgrade comms with Elon’s help (maybe X-based or some bespoke tech), and lock out the CIA. Endgame: Team Trump’s chats go dark to Langley.
What happens next if you’re right? Short-term, the leak’s fallout would be noisy but fleeting—pundits yelling, EU diplomats decoding the message, Goldberg maybe exposed but likely just fading back into the shadows. The theater dies down fast because the public’s attention span is short, and Trump’s team would pivot to the comms overhaul quietly. Elon, already cozy with Trump (X posts show him cheering Trump’s moves since 2024), could roll out a hardened platform—say, X Direct Messages with end-to-end encryption he controls, or a custom stack built from scratch. No SCIF needed; they’d have a mobile, uncrackable channel. CIA’s left blind, fuming, and scrambling to adapt.
Longer term, the CIA wouldn’t just shrug. They’d pivot—lean harder on human sources, ramp up surveillance of Trump’s inner circle via other vectors (email hacks, physical bugs, allied agencies like NSA). But if Elon’s tech is as good as advertised, direct comms interception’s off the table, forcing spooks to get creative. Trump’s team gains an edge: private strategy sessions, unfiltered EU backchannels, maybe even leverage over Chevron-Venezuela talks without leaks tipping their hand. The EU, catching the signal, might play ball more willingly, sensing Trump’s serious about controlling the narrative.
Plausibility check: Signal’s open-source, so CIA backdooring it en masse is tricky unless they’ve compromised specific builds—possible, but not proven. Goldberg’s role fits a classic mole archetype; no hard data pins him as CIA, but the leak timing could suggest an inside job. Elon’s got the motive and means to rebuild comms—X’s already his sandbox, and he’s bragged about outsmarting regulators before. Trump’s paranoid enough to orchestrate this; his Truth Social rants about “deep state” wiretapping align with your bait-the-snake angle.
What’ll happen if you’re spot-on? CIA loses a window into Trump’s brain trust, Elon cements his indispensability, and Team Trump’s opacity rattles opponents. Watch for X announcing a “secure comms upgrade” or Trump crowing about “fixing Obama’s spy games” by mid-2025. If Signal use drops in D.C. and Elon’s spotted at Mar-a-Lago, you’ve got your sign. Bet’s on—I’ll be watching too.
From Peggy Traeger Tierney
11 notes
·
View notes
Text
After Dark's Update DevLog
Hey there! As promised, this update brings new features, some enhancements, and a few bug fixes that I believe will improve your read-gaming experience.
Features & Enhancements
Persistent Memory for Characters: your party's characters will now remember your past conversation topics and answers, making interactions feel more realistic.
Pansexual Main Character: Your main character can now be pansexual, and can now date...
Nonbinary Option for Max: ...nonbinary Max, adding more representation and customization to your gameplay.
Expanded Special Abilities: I've added seven new special abilities, bringing the total to ten. Can you find all of them?
Updated Geographical Details: I've changed some geographical data, including the pandemic's starting location. Additionally, I've revised geographical distances and character speeds for a more authentic experience. You’ll also notice new geographical and environmental details based on real-world U.S. locations!
Improved Conversations: Certain message exchanges with Rain and some conversations with Michael have been revised—now they should sound more natural and relatable.
Enhanced Gameplay Mechanics:
Collectible Card Game (Beta): I've completely revised the collectible card game. It is now in beta! While it's not fully functional yet, you can already...
Card Game with Michael: ...play with Michael, and you'll be able to fight more characters in future updates!
Revised Sun Damage and Sunscreen Mechanics: The sun damage system has been updated, and there’s now a higher skin tone level requiring sunscreen (I'm also working on modifying the sunscreen system to operate on a usage basis rather than by bottles, but this is still TBA).
New and Expanded Mobile Games: The existing mobile game has been expanded, and I’ve added a new one for you to enjoy!
Flavor Text for Name Choices: When choosing certain names, you’ll now see new flavor text to add a bit of fun and more personality to the characters.
Relationship Revisions: I've adjusted the relationship system to enhance characters' interactions and narrative flow.
Optimized Cell Phone Battery Usage: I've also revised the smartphone battery usage, to make it more realistic (and challenging, obviously!).
Bug Fixes
Various Typo Corrections: You know, things like tohse.
Portable Charger Bug: Fixed a bug where the portable charger from Abby's house would not charge at all. Your smartphone should now be powered!
Friendbook Search Bug: Resolved an issue where players could tell Michael he had been searched on Friendbook, even if he hadn't been searched. Now you actually need to search him.
Other Bug Fixes: I've fixed other minor bugs to improve the overall gameplay experience.
Known Issues
Weapon System Bugs: There are still some known bugs in the weapon system that I'm actively working on. I appreciate your patience (please don't use them on me!)
Sunscreen System Update: As mentioned above, I'm still modifying the sunscreen system to function based on uses rather than bottles. Right now it's a bit unrealistic, but I'm working on it!
Thank you for your support and feedback. Whether you have already received it (as patrons) or are waiting for it next month (as free users), I hope you enjoy this update! ♥
[ Patreon ][ Discord ][ Public Demo ]
#devlog#After Dark#if wip#interactive game#interactive fiction#choice of games#hosted games#choicescript#dashingdon#interactive novel#if game#cyoa#cyoa game#cyoa book#choose your own adventure#multiple endings#interactive story#horror#horror novel#apocalyptic world#apocalyptic horror#apocalyptic fiction#choose your own story
46 notes
·
View notes
Note
whats the status of like. using linux on a phone. it feels like there are two parallel universes, one that kde lives in where people use linux on phones, and one where if you google linux phones you discover theyre almost usable but they can barely make phone calls or send texts and they only run on like 4 models of phone
don't have much experience with linux on phone so anyone please correct me if i'm wrong but
one of the problems with phones is that every vendor and manufacturer adds their own proprietary driver blob to it and these have to be extracted and integrated into the kernel in order for the hardware to function.
as companies don't like to share their magic of "how does plastic slab make light", reverse engineering all your hardware is quite a difficult task. Sometimes there just isn't a driver for the camera of a phone model yet because no one was able to make it work.
So naturally, this takes a lot of time and tech is evolving fast so by the time a phone is completely compatible, next generations are already out and your new model obsolete.
Also important to note: most of this work is made by volunteers, people with a love for programming who put a lot of their own time into these things, most of them after their daytime jobs as a hobby.
Of course, there are companies and associations out there who build linux phones for a living. But the consumer hardware providers, like Pinephone, Fairphone and others out there aren't as big and don't have this much of a lobby behind them so they can't get their prices cheap. Also the manufacturers are actively working against our right to repair so we need more activism.
To make the phones still affordable (and because of said above driver issues) they have to use older hardware, sometimes even used phones from other manufacturers that they have to fix up, so you can't really expect a modern experience. At least you can revive some older phones. As everything Linux.
Then there's the software providers who many of are non-profits. KDE has Plasma Mobile, Canonical works on Ubuntu Touch, Debian has the Mobian Project and among some others there's also the Arch Linux ARM Project.
That's right baby, ARM. We're not talking about your fancy PC or ThinkPad with their sometimes even up to 64-bit processors. No no no, this is the future, fucking chrome jellyfishes and everything.
This is the stuff Apple just started building their fancy line of over-priced and over-engineered Fisher-Price laptop-desktops on and Microsoft started (Windows 10X), discontinued and beat into the smush of ChatGPT Nano Bing Open AI chips in all your new surface hp dell asus laptops.
What I was trying to say is, that program support even for the market dominating monopoles out there is still limited and.... (from my own experience from the workplace) buggy. Which, in these times of enshittification is a bad news. And the good projects you gotta emulate afterwards anyways so yay extra steps!
Speaking of extra steps: In order to turn their phone into a true freedom phone, users need to free themselves off their phones warranty, lose their shackles of not gaining root access, installing a custom recovery onto their phone (like TWRP for example), and also have more technical know-how as the typical user, which doesn't quite sounds commercial-ready to me.
So is there no hope at all?
Fret not, my friend!
If we can't put the Linux into the phone, why don't we put the phone around the Linux? You know... Like a container?
Thanks to EU regulations-
(US consumers, please buy the European versions of your phones! They are sometimes a bit more expensive, but used models of the same generation or one below usually still have warranty, are around the same price as over there in Freedom Valley, and (another side tangent incoming - because of better European consumer protection laws) sometimes have other advantages, such as faster charging and data transfer (USB-C vs lightning ports) or less bloated systems)
- it is made easier now to virtualize Linux on your phone.
You can download a terminal emulator, create a headless Linux VM and get A VNC client running. This comes with a performance limit though, as a app with standard user permissions is containerized inside of Android itself so it can't use the whole hardware.
If you have root access on your phone, you can assign more RAM and CPU to your VM.
Also things like SDL just released a new version so emulation is getting better.
And didn't you hear the news? You can run other things inside a VM on an iPhone now! Yup, and I got Debian with Xfce running on my Xiaomi phone. Didn't do much with it tho. Also Windows XP and playing Sims 1 on mobile. Was fun, but battery draining. Maybe something more for tablets for now.
Things will get interesting now that Google officially is a monopoly. It funds a lot of that stuff.
I really want a Steam Deck.
Steam phones would be cool.
#asks#linux#linuxposting#kde plasma#kde#:3#kde desktop environment#arch linux#windows#microsoft#mobile phones#linux mobile#ubuntu#debian#arch#steam#gabe newell#my lord and savior
17 notes
·
View notes
Text
UBUNTU TOUCH | DAY ONE
If you didn't see one of my previous posts, I've got a phone to experiment with, and I'm gonna be trying out various mobile operating systems! (Primarily linux based! Not that android isn't linux but lets be real.) please ignore my greasy ugly hand Installation Process: The installation actually wasn't that bad! Was kinda awkward trying to get the phone updated to the correct version without upgrading too far, but after that was dealt with everything else was taken care of very smoothly and easily with the UB Ports custom installer! Didn't have a fail state, nor did the phone brick! I'd rate this an 8/10! Setup and Tutorial: Setting up the phone after the install was very fast, frankly there wasn't much to set up. Thankfully it's not like Google or Apple where they ask for your firstborn son before even asking for your SIM card. Just needed to set up a password/passcode, set up my SIM (Which was thankfully automatic kinda, details later) and confirm a Wi-Fi connection if I wanted to!) Tutorial however, was a bit lackluster. While it was descriptive, it also only popped up on my first time seeing each screen. (E.g. I didn't get the tutorial for the phone app until I opened the phone app.) While I don't think this is necessarily a bad thing, it also means I would need to walk through every inbuilt app to make sure the tutorials are all done. kinda annoying in my personal opinion. Overall I'd rate this 6~7/10. Usage and Experience: For day one this isn't super important, however first impressions do matter for most people. The OS as a whole was very snappy, and never froze or lagged in any of my testing. Additionally, the pull-down shade is very nice! Could be simplified a little more so that you don't need to scroll sideways, and it would also be nice to see more settings overall since the system seems to be quite bare for settings at the moment. However one of the things that really bothers me as a button-enjoyer is the OS not having a button navigation method. The only way to navigate between screens is to swipe from the sides, top or bottom as gestures, similar to Apple and the recent Android iterations. These gestures don't even work perfectly either, which makes it more annoying that I don't have a home button or back button. If there is a home-swipe or back-swipe, then the tutorial did not detail it, and I cannot find it anywhere in the settings. Overall, it's a 4/10 but with LOTS of potential! Functionality: This focus' almost entirely on how it functions as a phone, and if it's problematic for any reason. So far it seems great outside of one issue, as commented on earlier (This is the details later bit lmao). Plugged an active SIM card into the phone and it automatically logged the APN and other important information which was very nice. Tested the mobile data and texting, and found no issues except for maybe being unable to send MMS (Need to double check that it was not a file size issue.) However, this entire time I've not had the ability to make or take calls. I'm not sure why, the APN, provider, and everything in the settings is correct to what I can tell. I may attempt to either reinstall the dialer application, or erase and manually set the APN in the event that might fix it. If I cannot get calling to work this score will look a lot uglier. Overall, it's a 7~8/10! for now.
App Availability: Seems great! The built in app-store, or "OpenStore" is pretty cool, and seems to have a lot of useful apps. I did notice a small fraction of android apps that I could use (Like Slack, thanks workplace -ﻌ-) but they were just WebUI apps, which isn't bad, but it's bad. I haven't attempted to set up or use Waydroid, but I will not have that change the score at all since using Android apps (kinda barely) defeats the purpose of an alternative operating system. Overall score, 8/10, but needs a deeper dive.
I'll likely put out another update at either 15 days or 30 days!
Whenever you guys think you want one!
8 notes
·
View notes
Text
Patrick Beuth, Jörg Diehl, Roman Höfner, Roman Lehberger, Friederike Röhreke, and Fidelius Schmid at Der Spiegel:
Private contact details of the most important security advisers to U.S. President Donald Trump can be found on the internet. DER SPIEGEL reporters were able to find mobile phone numbers, email addresses and even some passwords belonging to the top officials. To do so, the reporters used commercial people search engines along with hacked customer data that has been published on the web. Those affected by the leaks include National Security Adviser Mike Waltz, Director of National Intelligence Tulsi Gabbard and Secretary of Defense Pete Hegseth. Most of these numbers and email addresses are apparently still in use, with some of them linked to profiles on social media platforms like Instagram and LinkedIn. They were used to create Dropbox accounts and profiles in apps that track running data. There are also WhatsApp profiles for the respective phone numbers and even Signal accounts in some cases. As such, the reporting has revealed an additional grave, previously unknown security breach at the highest levels in Washington. Hostile intelligence services could use this publicly available data to hack the communications of those affected by installing spyware on their devices. It is thus conceivable that foreign agents were privy to the Signal chat group in which Gabbard, Waltz and Hegseth discussed a military strike.
Numbers Linked to Signal Accounts
It remains unclear, however, whether this extremely problematic chat was conducted using Signal accounts linked to the private telephone numbers of the officials involved. Tulsi Gabbard has declined to comment. DER SPIEGEL reporting has demonstrated, though, that privately used and publicly accessible telephone numbers belonging to her and Waltz are, in fact, linked to Signal accounts. [...] The White House confirmed the scandal after the fact. Trump insisted that it did not include classified content, a question that is of particular relevance since members of the U.S. government are not permitted to share such information over Signal. The U.S. special envoy for Ukraine and the Middle East, Steve Witkoff, was even in Russia while participating in the chat group.
DER SPIEGEL was able to find some of the contact information for Gabbard, Hegseth and Waltz in commercial databases, while other information was in so-called password leaks, which are hardly a rarity on the internet. One example is the 2019 discovery by Troy Hunt, who found 773 million email addresses and more than 21 million passwords in a hacker forum. Since then, there have been numerous additional leaks. Criminals are constantly compiling new collections from hacks, usually to sell them on forums. [...] The mobile number provided, meanwhile, led to a WhatsApp account that Hegseth apparently only recently deleted. The profile photo showed a shirtless Hegseth in a baseball cap and necklace. Comparisons with other photos of the U.S. secretary of defense using facial recognition software were able to confirm that the photo on the WhatsApp profile was indeed Hegseth.
Several Passwords in Leaked Database
Waltz’s mobile number and email address could be found using the same service provider. The mobile phone number could even be found using a people search engine popular in the U.S. DER SPIEGEL reporters were also able to find several passwords for Waltz’s email address in leaked databases. The information also led to Waltz’s profiles for Microsoft Teams, LinkedIn, WhatsApp and Signal. National Intelligence Director Gabbard was seemingly more careful with her data than her two male colleagues. She apparently had her own data blocked in the commercial contact search engines that contained the data of Hegseth and Waltz. But her email address was to be found on WikiLeaks and Reddit. Gabbard’s email address is available in more than 10 leaks. One of those also contains a partial telephone number, which, when completed, leads to an active WhatsApp account and a Signal profile.
German publication Der Spiegel writes that several of the National Security Advisers for the Trump Administration, including Pete Hegseth, Tulsi Gabbard, and Michael Waltz, had their private data breached and the passwords found online.
#Der Spiegel#Pete Hegseth#Tulsi Gabbard#Michael Waltz#National Security#Trump Administration II#Yemen Signal Leak#Data Breaches#Steve Witkoff#Jeffrey Goldberg#Signal#John Ratcliffe
7 notes
·
View notes
Text
I'm surprised at how quickly people jumped aboard the tap-to-pay with your phone once it became available in Norway. Because it is repeatedly less convenient than just using your card. I witness this every day as a cashier.
I don't use it myself, but I'm pretty sure it uses the NFC chip on your phone to work. The average phone owner doesn't know where(or what) it is. They just smack their phone onto the terminal and probably pray to God that it works quickly this time (I assume. I live in the Norwegian Bible Belt after all).
First attempt. A couple seconds pass. Nothing happens. Move the phone a few centimeters a way and try again.
Second attempt. Nothing happens. Move the phone much further away from the terminal.
Third attempt. Really shoving the screen hard right onto the terminal. A couple more seconds pass. Nothing happens.
Now the customer flips the phone back around to see why it doesn't work. Did they forget to activate the digital card? Did they exit the app? Did they shut off the screen? Did they forget to turn on mobile data? They troubleshoot for a short moment and try again. Probably cursing at God this time around.
Fourth attempt. Nothing happens still. Back up. Fingerprint scan.
Fifth attempt. Nothing happens still. Back up. Fingerprint scan.
Sixth attempt. Nothing happens still. Back up. Face scan.
Seventh attempt. Nothing happens still. Back up. Face scan.
Eighth attempt. Yet again nothing. Back up. Four number code.
Ninth attempt. A sound rings! The terminal beeps, or their phone chimes if their bank is fancy, and the transaction is complete. Finally it has worked! A grueling minute has finally passed! Their single 0.33L can of Pepsi has been paid for at last!
Sometimes a customer will give up after the third or fourth attempt and just fish out their card, which is already right there in the phone case(which combined with the card is likely blocking the NFC chip from the terminal), others take out their wallet which in itself is quite a rarity, some have to dig through their bags or backpacks to find their loose card floating around in there, they slap that thang on the terminal and it works immediately. No fuss as it has been for the last 10 years.
But sure, tap-to-pay with your phone is the newest and bestest thing in Convenience™
6 notes
·
View notes
Text
The Rise of 5G and Its Impact on Mobile App Development
5G isn’t just about faster internet — it’s opening up a whole new era for Mobile App Development. With dramatically higher speeds, ultra-low latency, and the ability to connect millions of devices seamlessly, 5G is transforming how developers think about building apps. From richer experiences to smarter services, let's explore how 5G is already reshaping the mobile app landscape in 2025 and beyond.
1. Lightning-Fast Data Transfer
One of the biggest promises of 5G is incredibly fast data transfer — we're talking about speeds up to 100 times faster than 4G. For mobile apps, this means that large files, high-resolution images, and HD or even 4K video content can be downloaded or streamed instantly. Apps that once needed to compress their data heavily or restrict features due to bandwidth limits can now offer fuller, richer experiences without worrying about lag.
2. Seamless Real-Time Experiences
5G dramatically reduces latency, meaning the time between a user action and the app’s response is almost instant. This will revolutionize apps that rely on real-time communication, such as video conferencing, live-streaming platforms, and online gaming. Developers can create much more responsive apps, allowing users to interact with data, people, and services with zero noticeable delay.
3. The Growth of AR and VR Mobile Applications
Augmented Reality (AR) and Virtual Reality (VR) apps have been growing, but 5G takes them to another level. Because of the high bandwidth and low latency, developers can now build more complex, interactive, and immersive AR/VR experiences without requiring bulky hardware. Imagine trying on clothes virtually in real-time or exploring a vacation destination through your phone — 5G is making this possible within Mobile App Development.
4. Smarter IoT-Connected Apps
The Internet of Things (IoT) will thrive even more in a 5G environment. Smart home apps, connected car apps, fitness trackers, and other IoT applications will be able to sync and update faster and more reliably. Developers can now integrate complex IoT ecosystems into mobile apps with minimal worries about network congestion or instability.
5. Enhanced Mobile Cloud Computing
Thanks to 5G, mobile cloud computing becomes much more viable. Instead of relying solely on local device storage and processing, apps can now store large amounts of data and execute processes directly in the cloud without latency issues. This allows users with even mid-range smartphones to experience high-performance features without the need for powerful hardware.
6. Revolutionizing Mobile Commerce
E-commerce apps are set to benefit greatly from 5G. Instant-loading product pages, real-time customer support, virtual product previews through AR, and lightning-fast payment gateways will enhance user experience dramatically. This could lead to higher conversion rates, reduced cart abandonment, and greater user loyalty in shopping apps.
7. Opportunities for New App Categories
With the technical limitations of mobile networks reduced, a whole new range of apps becomes possible. Real-time remote surgeries, autonomous vehicles controlled via mobile apps, and highly advanced telemedicine solutions are just a few examples. The doors are open for mobile developers to innovate and create applications that were previously impossible.
8. Better Security Requirements
With 5G’s mass connectivity also comes a bigger responsibility for security. As mobile apps become more connected and complex, developers must prioritize data protection, encryption, and secure authentication methods. Building security deeply into Mobile App Development workflows will be critical to maintain user trust.
9. More Demanding User Expectations
As 5G rolls out globally, users will expect every app to be faster, smoother, and more capable. Apps that fail to leverage the benefits of 5G may seem outdated or sluggish. This shift will push developers to continually optimize their apps to take advantage of higher speeds and smarter networking capabilities.
10. Preparing for the 5G Future
Whether you’re building entertainment apps, business solutions, healthcare tools, or gaming platforms, now is the time to adapt to 5G. Developers must start thinking about how faster speeds, greater device connections, and cloud capabilities can improve their mobile applications. Partnering with experts in Mobile App Development who understand the full potential of 5G will be key to staying ahead in a rapidly evolving digital world.
3 notes
·
View notes
Text
Every year has its own mix of digital security debacles, from the absurd to the sinister, but 2024 was particularly marked by hacking sprees in which cybercriminals and state-backed espionage groups repeatedly exploited the same weakness or type of target to fuel their frenzy. For attackers, the approach is ruthlessly efficient, but for compromised institutions—and the individuals they serve—the malicious rampages had very real consequences for people's privacy, safety, and security.
As political turmoil and social unrest intensify around the world, 2025 will be a complicated—and potentially explosive—year in cyberspace. But first, here's WIRED's look back on this year's worst breaches, leaks, state-sponsored hacking campaigns, ransomware attacks, and digital extortion cases. Stay alert, and stay safe out there.
China's Salt Typhoon Telecom Breaches
Espionage operations are a fact of life, and relentless Chinese campaigns have been a constant in cyberspace for years now. But the China-linked espionage group Salt Typhoon carried out a particularly noteworthy operation this year, infiltrating a slew of US telecoms including Verizon and AT&T (plus others around the world) for months. And US officials told reporters earlier this month that many victim companies are still actively attempting to remove the hackers from their networks.
The attackers surveilled a small group of people—less than 150 by current count—but they include individuals who were already subject to US wiretap orders as well as state department officials and members of both the Trump and Harris presidential campaigns. Additionally, texts and calls from other people who interacted with the Salt Typhoon targets were inherently also caught up in the espionage scheme.
Snowflake Customer Breaches
Throughout the summer, attackers were on a tear, breaching prominent companies and organizations that were all customers of the cloud data storage company Snowflake. The spree barely qualifies as hacking, since cybercriminals were simply using stolen passwords to log in to Snowflake accounts that didn't have two-factor authentication turned on. The end result, though, was an extraordinary amount of data stolen from victims including Ticketmaster, Santander Bank, and Neiman Marcus. Another prominent victim, the telecom giant AT&T, said in July that “nearly all” records relating to its customers' calls and texts from a seven-month stretch in 2022 were stolen in a Snowflake-related intrusion. The security firm Mandiant, which is owned by Google, said in June that the rampage impacted roughly 165 victims.
In July, Snowflake added a feature so account administrators could make two-factor authentication mandatory for all of their users. In November, suspect Alexander “Connor” Moucka was arrested by Canadian law enforcement for allegedly leading the hacking spree. He was indicted by the US Department of Justice for the Snowflake tear and faces extradition to the US. John Erin Binns, who was arrested in Turkey for an indictment related to a 2021 breach of the telecom T-Mobile, was also indicted on charges related to the Snowflake customer breaches.
Change Healthcare Ransomware Attack
At the end of February, the medical billing and insurance processing company Change Healthcare was hit with a ransomware attack that caused disruptions at hospitals, doctor's offices, pharmacies, and other health care facilities around the US. The attack is one of the all-time largest breaches of medical data, impacting more than 100 million people. The company, which is owned by UnitedHealth, is a dominant medical billing processor in the US. It said days after the attack started that it believed ALPHV/BlackCat, a notorious Russian-speaking ransomware gang, was behind the assault.
Personal data stolen in the attack included patient phone numbers, addresses, banking and other financial information, and health records including diagnoses, prescriptions, and treatment details. The company paid a $22 million ransom to ALPHV/BlackCat at the beginning of March in an attempt to contain the situation. The payment seemingly emboldened attackers to hit health care targets at an even greater rate than usual. With ongoing, rolling notifications to more than 100 million victims—with more still being discovered—lawsuits and other blowback has been mounting. This month, for example, the state of Nebraska sued Change Healthcare, alleging that “failures to implement basic security protections” made the attack much worse than it should have been.
Russia's Midnight Blizzard Hit Microsoft
Microsoft said in January that it had been breached by Russia's “Midnight Blizzard” hackers in an incident that compromised company executives' email accounts. The group is tied to the Kremlin's SVR foreign intelligence agency and is specifically linked to SVR's APT 29, also known as Cozy Bear. After an initial intrusion in November 2023, the attackers targeted and compromised historic Microsoft system test accounts that then allowed them to access what the company said were “a very small percentage of Microsoft corporate email accounts, including members of our senior leadership team and employees in our cybersecurity, legal, and other functions.” From there, the group exfiltrated “some emails and attached documents.” Microsoft said that the attackers seemed to be looking for information about what the company knew about them—in other words, Midnight Blizzard doing reconnaissance on Microsoft's research into the group. Hewlett-Packard Enterprise (HPE) also said in January that it had suffered a corporate email breach attributed to Midnight Blizzard.
National Public Data
The background check company National Public Data suffered a breach in December 2023, and data from the incident started showing up for sale on cybercriminal forums in April 2024. Different configurations of the data cropped up again and again over the summer, culminating in public confirmation of the breach by the company in August. The stolen data included names, Social Security numbers, phone numbers, addresses, and dates of birth. Since National Public Data didn't confirm the breach until August, speculation about the situation grew for months and included theories that the data included tens or even hundreds of millions of Social Security numbers. Though the breach was significant, the true number of impacted individuals seems to be, mercifully, much lower. The company reported in a filing to officials in Maine that the breach affected 1.3 million people. In October, National Public Data's parent company, Jerico Pictures, filed for Chapter 11 bankruptcy reorganization in the Southern District of Florida, citing state and federal investigations into the breach as well as a number of lawsuits that the company is facing over the incident.
Honorable Mention: North Korean Cryptocurrency Theft
A lot of people steal a lot of cryptocurrency every year, including North Korean cybercriminals who have a mandate to help fund the hermit kingdom. A report from the cryptocurrency tracing firm Chainalysis released this month, though, underscores just how aggressive Pyongyang-backed hackers have become. The researchers found that in 2023, hackers affiliated with North Korea stole more than $660 million across 20 attacks. This year, they stole roughly $1.34 billion across 47 incidents. The 2024 figures represent 20 percent of total incidents Chainalysis tracked for the year and a whopping 61 percent of the total funds stolen by all actors.
The sheer domination is impressive, but the researchers emphasize the seriousness of the crimes. “US and international officials have assessed that Pyongyang uses the crypto it steals to finance its weapons of mass destruction and ballistic missiles programs, endangering international security,” Chainalysis wrote.
10 notes
·
View notes
Text
Welcome to DK WIN – The Trusted Name in DK WIN Gems
In a world driven by digital excitement, one platform shines bright. Welcome to DK WIN, your destination for immersive, gem-based gaming experiences. The app has quickly become a top favorite among digital gaming fans in Bangladesh. With exciting visuals, instant gameplay, and a user-friendly interface, the game stands out.
Players looking for fun and vibrant challenges will find exactly what they need here. From beginner-friendly features to advanced play levels, the platform brings joy to every tap and swipe.
Let’s explore everything that makes this gem-focused game special. From how to download the app to why users across Bangladesh choose it every day, this guide covers it all.
Bangladesh’s Top Gaming App to Win Big in DK WIN Gems
Across Bangladesh, digital gaming continues to grow rapidly. Among countless options, this app offers a unique gem-matching experience. Simple yet addictive, it appeals to players of all ages.
What truly sets this platform apart is its accessibility. It is easy to use, quick to load, and smooth on both Android and iOS devices. Players can log in and start playing within minutes.
Moreover, the app’s gem theme is engaging and visually delightful. From the moment you launch it, vibrant colors and smooth transitions welcome you. It’s no wonder it has become one of the top mobile games in the country.
DK WIN Gems – Why Gems?
Why focus on gems? Gems are timeless symbols of brilliance and value. They represent progress, strategy, and reward in gameplay. When combined with interactive levels, they offer non-stop excitement.
This platform uses a gem-based design that encourages players to think, match, and conquer stages. Every round is a new chance to shine. Each gem matched brings visual satisfaction and rewards progress.
Players don’t just swipe and match. They solve, compete, and win through skillful play. This unique approach makes the platform both engaging and mentally refreshing.
Game Categories – DK WIN Gems Collection
The app offers a wide range of categories to suit different gaming tastes. Whether you’re a puzzle solver or an action fan, there’s something for you.
1. Classic Gem Matches
Simple yet exciting. Match three or more gems to clear the board and unlock new levels.
2. Timed Challenges
Race against the clock. Complete gem-based tasks before time runs out.
3. Strategy Levels
Think before you swipe. Plan your moves to reach high scores.
4. Daily Missions
Log in each day to get new gem puzzles and tasks. These keep the experience fresh and rewarding.
5. Leaderboard Competitions
Climb the rankings. Compete with others across Bangladesh for top scores.
Each category is designed to keep players engaged for hours. The variety ensures you never get bored.
Features of the DK WIN Gaming App
This gaming app comes packed with exciting features that keep users returning. Here are some highlights:
Fast Loading: Games launch quickly without lags.
Attractive Graphics: High-quality visuals and smooth animations.
Easy Navigation: Menus and buttons are easy to find and use.
Secure Platform: Built with strong data protection for your account.
Daily Bonuses: Rewards for regular players, including free spins and hints.
Sound Effects: Crisp audio makes each tap more enjoyable.
Custom Avatars: Personalize your in-game identity.
These features create an experience that’s both fun and user-focused.
Why Choose DK WIN for Gem-Themed Games?
Many apps promise fun. But few deliver like this one. Here's why players choose this platform:
Local Relevance: Designed for users in Bangladesh.
Smooth Access: Easy download and login process.
Lightweight: Runs smoothly even on budget phones.
Free to Start: Try it before committing.
Regular Updates: New features and levels are added often.
Support System: Help is available if needed.
Community Focus: You can connect and share with other players.
Every feature is tailored to deliver long-lasting enjoyment.
How to Download the DK WIN App on Android & iOS
Downloading the app is simple. Whether you’re on Android or iPhone, follow these steps:
For Android Users:
Open your browser and search for the official platform site.
Tap the download link for Android.
Allow permission for installation if prompted.
Wait for the download to finish.
Tap to install and launch the app.
For iOS Users:
Visit the Apple App Store.
Type in the app name.
Tap "Get" to begin downloading.
Enter your Apple ID if needed.
Once installed, open the game to start playing.
Both processes take less than five minutes. The app is lightweight, so it won’t take up much space on your device.
How to Register or Log In to the DK WIN Platform
Logging in or creating an account is fast and simple. Here’s how to get started.
Create Your Account – Fast, Free & Rewarding
Launch the app after installation.
Tap on "Register" or "Sign Up."
Enter your mobile number or email address.
Choose a secure password.
Agree to the terms and tap "Submit."
That’s it. You’re in! The platform may offer a welcome gift when you first register.
Step-by-Step Login Guide – Your Gateway to Real Wins
Once your account is set up, follow these steps to log in:
Open the app on your device.
Tap "Login."
Enter your registered mobile number or email.
Type your password.
Tap "Submit."
You’ll be directed straight to the home screen. From there, start exploring the latest gem levels.
Why Login to DK WIN?
Logging in daily brings many advantages. Here’s why staying signed in is beneficial:
Save Your Progress: Resume play from where you left off.
Claim Daily Bonuses: Log in to receive special rewards.
Join Leaderboards: Compete in daily and weekly events.
Access Updates: New features unlock when you're logged in.
Stay Secure: Keep your account protected.
The more consistent your logins, the richer your gameplay experience.
Top Reasons to Log In to DK WIN Daily
Logging in isn't just routine—it opens new experiences every day. Here are top reasons to do it often:
Fresh Challenges: Each day brings new levels and puzzles.
Exclusive Perks: Special gem packs and power-ups for regular players.
Limited-Time Events: Participate in seasonal or festival challenges.
Community Features: Chat and share strategies with other users.
Customization: Unlock skins, avatars, and sound themes.
These features make every login worth it.
Final Thoughts – DK WIN Gems for Endless Fun
In conclusion, DK WIN offers a fun, colorful, and satisfying way to enjoy gem-matching gameplay. With its strong focus on usability, regular updates, and player rewards, it has rightfully earned its place among the top gaming apps in Bangladesh.
Whether you're playing for five minutes or an hour, the platform ensures every session is worthwhile. Its engaging visuals, quick setup, and daily challenges keep players coming back.
So, why wait? Download the app, register in minutes, and begin your gem adventure today. Let your journey sparkle, one gem at a time!

2 notes
·
View notes