#decapsulation
Explore tagged Tumblr posts
Text

beautiful woman in the snow :)
#it's decapsulated brine shrimp eggs raining down from the fry box lol#corydoras habrosus#fishkeeping#fishblr#my post
139 notes
·
View notes
Text
Revolutionizing Integrated Circuit Analysis: Copper Safe Acid Decapsulation and Decap System for IC
Traditional decapsulation methods often risk damaging these delicate components, but copper safe acid decapsulation employs a controlled chemical process that minimizes this risk.
0 notes
Text

IC Counterfeit Testing
We specialize in the detection and verification of counterfeit integrated circuits (ICs) using advanced analytical and non-destructive testing methods. The images provided showcase our testing process, including visual inspection under high magnification, decapsulation, die analysis, and marking permanency tests.
0 notes
Text
Gi, Gn, and Gb interfaces
GPRS (General Packet Radio Service) is a mobile data communication technology that allows users to connect to the internet and other data networks using their mobile phones. To understand how GPRS works, it's important to familiarize oneself with the various interfaces involved. These interfaces act as the communication gateways between different components of the GPRS network. Let's explore three key interfaces: Gi, Gn, and Gb.
Gi Interface The Gi interface serves as the connection point between the GPRS network and external packet-switched data networks such as the internet or ISDN. It's also where the IP address of a device is mapped to an external network address. Key functions at this interface include protocol encapsulation/decapsulation, address translation, and authentication. Since GPRS can support a variety of data networks, the Gi interface is more of a reference point than a standardized interface.
Gn Interface The Gn interface connects different SGSNs within the same PLMN. This interface supports the transmission of user data and signaling information, and is crucial for mobility management. The TCP/IP protocol is used for communication over the Gn interface. For IP-based backbones, the Gn (and Gp) interface employs the GPRS Tunneling Protocol (GTP).
Gb Interface The Gb interface connects the SGSN to the BSS. Through this interface, the SGSN communicates with the BSS and mobile stations to handle packet data transfer, mobility management, and session management. This interface is essential for GPRS network operation. It supports both signaling and traffic information transmission. Frame Relay networks can be used for traffic control between the SGSN and BSS, providing flexibility in network configuration. The Gb interface also supports mobility management functions such as attachment/detachment, security, routing, and activation/deactivation of data connections.
Source: What is Gi, Gn, Gb interface?
0 notes
Text
Mastering PCB Reverse Engineering: A Comprehensive Guide
Circuit boards that have been printed (PCBs) are the foundation of modern electronics. They are everywhere, from your smartphone to your home appliances. PCB reverse engineering is a vital process that allows engineers and hobbyists to understand and replicate these crucial components. In this guide, we'll dive into PCB reverse engineering, exploring its significance, methods, and practical applications.
What is PCB Reverse Engineering?
Reverse engineering a printed circuit board is dissecting it to determine its layout and purpose. The goal is to recreate the board's schematics, layout, and connections. This process of pcb reverse engineering is crucial for repairing, improving, or replicating existing electronic devices. By examining how components are connected, engineers can troubleshoot issues or design compatible replacements.
Why is PCB Reverse Engineering Important?
PCB reverse engineering serves several purposes. It helps in:
Repairs and Maintenance: By understanding the layout and connections, technicians can fix malfunctioning devices.
Legacy Systems: Many older systems have outdated or unavailable documentation. Reverse engineering aids in the upkeep and modernization of these systems.
Security Analysis: It is used to identify vulnerabilities and improve the security of electronic systems.
Innovation: Engineers can learn from existing designs and develop improved versions or entirely new devices.
Methods of PCB Reverse Engineering
There are several methods of pcb reverse engineering. Here are the most common techniques:
1. Visual Inspection
The simplest method involves visually inspecting the PCB. Using a magnifying glass or microscope, you can examine the components and their connections. This method is often the first step in understanding the board's layout.

2. Circuit Tracing
Tracing a circuit entails navigating the PCB's electrical routes. By using tools like continuity testers or multimeters, you can map out the connections between different components. This technique is useful for creating a basic schematic of the circuit.
3. Decapsulation and Microscopy
For detailed analysis, especially in the case of integrated circuits (ICs), decapsulation and microscopy are used. An IC's covering layers must be removed during decapsulation in order to access its interior circuitry. Then, you can use microscopy to look at the circuit's minute features.
4. Software Tools
Reverse engineering can be substantially improved by using contemporary software technologies. Programs like KiCad and Eagle allow you to create digital schematics and layouts from your findings. These tools can also simulate the circuit to ensure accuracy.
Practical Applications of PCB Reverse Engineering
Reverse engineering of PCBs has several applications:
Product Development: Companies use reverse engineering to improve or modify existing products.
Educational Purposes: It helps students and hobbyists understand complex electronic systems.
Competitive Analysis: Businesses analyze competitors' products to understand their design and functionality.
PCB reverse engineering is a powerful technique that opens up numerous possibilities in electronics. Whether you're repairing an old device, analyzing security vulnerabilities, or innovating new technology, understanding how PCBs work is crucial. By mastering pcb reverse engineering, you can unlock the secrets of electronic designs and drive advancements in technology. For anyone involved in electronics, PCB reverse engineering is an invaluable skill. Embrace it to enhance your understanding, solve complex problems, and push the boundaries of what's possible.
0 notes
Text
Tunnel Forwarding: Securing Your Data Transfers
Have you ever worried about the security of your data? With the increasing number of modern network threats, securing your data transfers is becoming more and more important. Today we introduce you to a powerful network transmission technology - Tunneling. This technology not only effectively secures data, but also protects user privacy, which is briefly described below.
Tunneling forwards data through the establishment of a "tunnel" between two network devices to ensure the security of data transmission on the public network. Its core lies in the encapsulation and de-encapsulation of data. First, at the sender's end, the original packet is encapsulated in a new packet containing additional header information that indicates how the data should be transmitted and decapsulated. These encapsulated packets are then encrypted to prevent interception or tampering during transmission. The encrypted packets are transmitted between the sender and receiver through a tunnel, which is usually built over a public network (e.g., the Internet), but whose transmission is secure. Finally, at the receiving end, the packet is first decrypted and restored to its pre-encapsulation state, then decapsulated and restored to the original packet, and finally transmitted to the target device.
Tunnel forwarding has many significant advantages. It provides high security. By encrypting packets, tunnel forwarding effectively prevents data from being intercepted and tampered with. It also provides strong privacy protection. Tunnel forwarding can hide the user's real IP address to protect the user's privacy, and the target server will not be able to track the user's actual location. Tunnel forwarding also helps users to cross geographical restrictions, allowing them to access blocked or restricted content. Currently tunnel forwarding is widely used in scenarios such as virtual private networks (VPNs), remote access and anonymous browsing.
Hopefully, through this article, you have gained a more comprehensive understanding of tunnel forwarding. If you have any questions or need to know more about tunnel forwarding, please feel free to leave a comment and exchange ideas below.
0 notes
Text
Code
sudo tcpdump -lnvX icmp
sudo ip link add vxlan0 type vxlan id 100 dev eth0 local 10.0.1.11 dstport 4789 (This creartes the VXLAN inteface and decapsulates VXLAN traffic using the VXLAN Id supplied in step 5.4)
sudo ip link set vxlan0 up (This ebavles the VXLAN interface vxlan0)
sudo tcpdump -lnvXi vxlan0 icmp _(This captures traffic on the vxlan0)
{ "Version": "2012-10-17", "Statement": [ { "Effect": "Deny", "Action": [ "ec2:CreateTags", "ec2:DeleteTags" ], "Resource": "arn:aws:ec2:::volume/*", "Condition": { "StringNotEqualsIfExists": { "aws:RequestTag/jam_testing": ["yes", "no"] }, "Null": { "aws:RequestTag/jam_testing": "false" } } } ] }
import boto3 from botocore.exceptions import ClientError
def create_table(dynamodb=None): if not dynamodb: dynamodb = boto3.resource('dynamodb') table = dynamodb.create_table( TableName='awsjam_employee', KeySchema=[ { 'AttributeName': 'employee_id', 'KeyType': 'HASH' # Partition key } ], AttributeDefinitions=[ { 'AttributeName': 'employee_id', 'AttributeType': 'N' } ], ProvisionedThroughput={ 'ReadCapacityUnits': 10, 'WriteCapacityUnits': 10 } ) return table
create_table()
Above---- touch dynamodb.py
touch insertrecord.py Below----
import boto3
def insert_record(table_name,employee_id, name, age, salary, city): dynamodb = boto3.resource('dynamodb') table = dynamodb.Table('awsjam_employee') table.put_item( Item={ 'employee_id': employee_id, 'name': name, 'age': age, 'salary': salary, 'city': city } )
insert_record('awsjam_employee', 1, 'John', '30', '20000', 'New York') insert_record('awsjam_employee', 2, 'Peter', '25', '30000', 'New York') insert_record('awsjam_employee', 3, 'Mark', '35', '40000', 'New York') insert_record('awsjam_employee', 4, 'Mary', '40', '50000', 'New York') insert_record('awsjam_employee', 5, 'Jennifer', '19', '60000', 'New York')
import boto3 dynamodb = boto3.resource('dynamodb') table = dynamodb.Table('awsjam_employee') table.update_item( Key={ 'employee_id': 1 }, UpdateExpression='SET salary = :val1', ExpressionAttributeValues={ ':val1': 50000 } )
py import boto3 def delete_item(dynamodb=None): dynamodb = boto3.resource('dynamodb') table = dynamodb.Table('awsjam_employee') response = table.scan() for item in response['Items']: if(int(item['age']) <= 20): resp = table.delete_item(Key={'employee_id': int(item['employee_id'])}) response = table.scan() print(response)
invoke function
delete_item()
aws evidently start-launch --launch SpecialSale --project OriginalGoodsStore --region us-east-2
select B.* from "$REPLACEWITHDATASOURCENAME"."default"."autocustomer" B join "AwsDataCatalog"."vehicles"."$REPLACEWITHDATATABLENAMECREATEDBYCRAWLER" A ON cast(A.policyid as integer)=B.policyid where A.title_status = 'clean vehicle' and A.year = '2007' and A.state='california' and A.brand='chrysler'
aws kinesis list-shards --stream-name *KinesisStreamForJam aws kinesis split-shard --stream-name *KinesisStreamForJam* --shard-to-split shardId-000000000002 --new-starting-hash-key *320854911280625642308916404954512140970 aws kinesis update-shard-count --stream-name *KinesisStreamForJam* --target-shard-count *8* --scaling-type **UNIFORM_SCALING 180
1 note
·
View note
Text
why is my vpn slowing my connection
🔒🌍✨ Get 3 Months FREE VPN - Secure & Private Internet Access Worldwide! Click Here ✨🌍🔒
why is my vpn slowing my connection
VPN bandwidth throttling
VPN bandwidth throttling is a practice employed by some Internet Service Providers (ISPs) to limit the data transfer speeds of users who are utilizing a VPN (Virtual Private Network) service. This is often done in an effort to manage network congestion or prioritize specific types of traffic.
When bandwidth throttling occurs, the user may experience slower connection speeds, which can result in slower download and upload times, decreased streaming quality, and overall less reliable performance. This can be frustrating for users who rely on VPNs for privacy, security, or accessing geo-restricted content.
There are ways to potentially overcome VPN bandwidth throttling. One common method is to switch to a different VPN server that may not be affected by throttling. Additionally, using a reputable VPN service that offers obfuscation or stealth technology can help mask VPN traffic, making it harder for ISPs to detect and throttle.
It is important for users to be aware of the possibility of VPN bandwidth throttling and to choose a VPN provider that is transparent about their practices. Reading reviews, conducting research, and selecting a VPN with a good reputation for providing consistent speeds can help mitigate the impact of bandwidth throttling.
Overall, understanding VPN bandwidth throttling and taking proactive steps to address it can help users maintain a reliable and secure VPN connection for their online activities.
VPN server congestion
VPN server congestion is a common issue that many users encounter when using virtual private networks to secure their internet connection and protect their online privacy. When a VPN server becomes congested, it means that there are too many users connected to the server at the same time, leading to slow connection speeds and potential service disruptions.
There are several reasons why VPN server congestion may occur. One of the main reasons is the overwhelming demand for the VPN service, especially during peak hours when many users are trying to connect simultaneously. This can put a strain on the server's resources, causing congestion and resulting in poor performance for users.
Another reason for VPN server congestion is the physical location of the server. If the server is located far away from the user's actual location, it can lead to higher latency and slower connection speeds, especially if there are too many users connected to that server.
To avoid VPN server congestion, users can try connecting to a different server that is less crowded or closer to their physical location. They can also opt for VPN providers that offer a larger number of servers distributed across various locations to distribute the user load more evenly.
In conclusion, VPN server congestion can be frustrating for users, but understanding the reasons behind it and taking necessary precautions can help alleviate the issue and ensure a smoother and more reliable VPN experience.
VPN encryption overhead
VPN encryption overhead refers to the additional processing and time required to encrypt and decrypt data transmitted over a Virtual Private Network (VPN). While VPNs are essential for securing online communications and protecting sensitive information from interception, the encryption process can introduce latency and reduce overall network performance.
The encryption overhead occurs because VPNs use complex algorithms to scramble data, making it unreadable to anyone without the decryption key. This process involves several steps, including data encapsulation, encryption, transmission, decryption, and decapsulation at the receiving end. Each of these steps adds a certain amount of overhead to the data transmission process.
One of the primary factors influencing VPN encryption overhead is the type of encryption protocol used. Some protocols, such as OpenVPN and IKEv2/IPsec, are known for their strong security features but may introduce higher overhead due to the computational resources required for encryption and decryption. On the other hand, less secure protocols like PPTP may offer lower overhead but compromise on security.
Additionally, the choice of encryption algorithm and key length can also impact overhead. Stronger encryption algorithms like AES (Advanced Encryption Standard) with longer key lengths provide higher levels of security but may require more processing power and time to encrypt and decrypt data, leading to increased overhead.
To mitigate VPN encryption overhead, users can optimize their VPN configurations by selecting protocols and encryption settings that strike a balance between security and performance. They can also choose VPN providers that offer servers with optimized hardware and network infrastructure to minimize latency and ensure smooth data transmission.
In conclusion, while VPN encryption is crucial for protecting sensitive data online, it's essential to be aware of the potential overhead it can introduce and take steps to optimize VPN configurations for better performance.
Network latency with VPN
Network latency can be a common issue when using a VPN (Virtual Private Network). VPNs are essential tools for ensuring online privacy and security by encrypting internet connections and routing them through remote servers. However, the process of data encryption and decryption in VPNs can cause a delay in transmitting data, leading to network latency.
When using a VPN, your data packets travel through the VPN server before reaching the intended destination. This extra distance and the encryption/decryption process can slow down the connection speed, resulting in network latency. The latency can vary depending on factors such as the distance between the user and the VPN server, the server's capacity, and the level of encryption used.
To minimize network latency with VPN, users can choose VPN servers located closer to their physical location to reduce the distance data packets must travel. Additionally, selecting VPN servers with high bandwidth and low user traffic can help improve connection speeds and reduce latency.
It's important to consider the trade-off between security and speed when using a VPN. While strong encryption protocols enhance security, they can also increase network latency. Users can experiment with different VPN protocols and settings to find a balance between security and performance that best suits their needs.
In conclusion, network latency is a common issue that can occur when using a VPN due to the encryption process and data routing through remote servers. By selecting optimal server locations and configurations, users can mitigate latency issues and enjoy a more seamless browsing experience while maintaining privacy and security online.
ISP throttling VPN connections
Title: Understanding ISP Throttling and Its Impact on VPN Connections
Internet Service Providers (ISPs) play a pivotal role in the speed and reliability of our internet connections. However, there are instances where ISPs engage in a practice known as throttling, which can significantly impact VPN (Virtual Private Network) connections.
Throttling refers to the intentional slowing down of internet speeds by an ISP. This practice is often employed to manage network congestion or prioritize certain types of traffic. While throttling can affect various online activities, it can be particularly troublesome for users relying on VPNs.
VPNs are designed to encrypt internet traffic, providing users with enhanced privacy and security. Additionally, VPNs enable users to bypass geographical restrictions and access region-locked content. However, when an ISP throttles internet speeds, VPN connections may experience significant slowdowns, rendering them less effective.
One of the primary reasons ISPs throttle VPN connections is to enforce policies against excessive bandwidth usage. Since VPN traffic is encrypted, ISPs may find it challenging to identify and prioritize specific types of traffic. As a result, they may opt to throttle all encrypted traffic, including VPN connections, to manage network congestion.
Furthermore, ISPs may throttle VPN connections in an attempt to discourage users from circumventing geo-blocking measures. By slowing down VPN speeds, ISPs make it more difficult for users to access content from other regions, thereby preserving licensing agreements and revenue streams for content providers.
To mitigate the impact of ISP throttling on VPN connections, users can employ various strategies. These include choosing VPN providers known for their optimized networks, selecting VPN protocols that are less susceptible to throttling, and utilizing obfuscation techniques to conceal VPN traffic.
In conclusion, ISP throttling can significantly impair the performance of VPN connections, affecting users' privacy, security, and access to online content. Understanding the reasons behind throttling and implementing appropriate measures can help users navigate these challenges and maintain reliable VPN connections.
0 notes
Text
CPHI was successfully concluded in Xiamen
From November 13 to 15, 2023, the 2023 (Autumn) China International Pharmaceutical Machinery Expo was successfully concluded in Xiamen. Nearly 60,000 spectators gathered here. Suzhou Halo attended the exhibition with much equipment, including: capsule/tablet checkweigher, desktop capsule/tablet weight sampling machine, dynamic weight checker, brushless capsule polishing machine, deblister machine, decapsulator, capsule feeding machine. Capsule checkweigher relies on high precision measurement, set the upper and lower limits of the scale which closer to the allowable upper and lower limits of the product. In this way, the proportion of qualified products will be increased, which is conducive to improving production efficiency and reducing raw material costs. SMC desktop capsule/tablet weight sampling machine, it is used for sampling weighing of capsule and tablets, which can help users to effectively monitor the change situation of drug weight in the production process. Desktop capsule/tablet weight sampling machine adopts desktop design, compact and easy to use, simple operation, easy to clean.
Conveyor Checkweigher can be connected with various production equipment or packaging equipment to achieve online weight detection of all forms of packaged drugs such as PVC blister board hose, bottle, box, bag, can, etc., online sorting of drugs according to the pre-set qualification range, and eliminate unqualified products. Brushless capsule polishing machine, adopts brushless mode, completely solve the problems of traditional brush polishing machine, such as unclean polishing, sticky powder polishing dirtier, and brushes are difficult to cleaning.

Read the full article
0 notes
Text
Global IC Trading Group
At Global IC Trading Group, we emphasize a steadfast commitment to quality and unwavering customer satisfaction. Our early investment in a comprehensive inspection process, incorporating advanced technologies like X-Ray, XRF, and Decapsulation, sets us apart as industry pioneers.
0 notes
Text

Advanced IC Package Decapsulation Tools for Precision Analysis
High-quality IC package decapsulation tools designed for accurate and efficient integrated circuit failure analysis and inspection processes.
0 notes
Photo
I abraded this chip after etching away the protective glass layer. Welp. On the plus side, it’s really interesting to see a metal layer ripped up like that.
850 notes
·
View notes
Photo
30 notes
·
View notes
Text
Black boxes are used for packaging integrated circuit (IC) devices so that the chip is shielded from the environment and has a consistent contour for automatic pick and place and PCB design. The chip, supporting lead frame, and connecting components are in the IC package. The most popular material for IC encapsulation is epoxy moulding compound because of its low cost and high performance.
0 notes
Text
A Complete Guide to Understanding the IC Cracking Process
In the world of electronics and technology, the term crack IC refers to a specialized process that involves accessing and deciphering the encrypted data within integrated circuits (ICs). This is a critical skill for various applications, from repairing old equipment to advanced research and development. In this blog, we will explore what it means to crack IC, why it is necessary, and the methods used to achieve it.
What Does It Mean to Crack an IC?
To crack IC means to gain access to the data stored in an IC that is protected by encryption or other security measures. Integrated circuits are found in nearly every electronic device, from household appliances to complex industrial machinery. They often contain valuable programming and data that might be inaccessible due to encryption or obfuscation.
Cracking ICs can involve either retrieving lost data, understanding how a particular chip functions, or even reverse engineering to improve or replicate technology. The need to crack IC arises in several scenarios, including when dealing with discontinued products, recovering data from failed chips, or analyzing competitive technology.
Why Is Cracking IC Necessary?
Here are some common reasons why you might need to crack IC:
Repairing Discontinued Products: Older devices with ICs that are no longer produced can be repaired by accessing the data within the chips. Cracking ICs can provide the necessary information to fix or replace components.
Data Recovery: In cases where important data is lost or corrupted, cracking IC can help recover the information stored within the chip.
Reverse Engineering: For engineers and researchers, cracking IC allows for detailed analysis of how a chip works. This can lead to improved designs or new innovations.
Understanding Competitor Technology: If you are working in a competitive field, crack IC can help you understand and potentially improve upon the technology used by others.
Methods to Crack ICs
Hardware-Based Cracking: This method involves physically accessing the IC to retrieve data. Techniques such as decapsulation, where the chip is carefully opened, and the use of focused ion beams (FIB) to analyze the internal circuits are common.
Software-Based Cracking: Known as non-intrusive attacks, this approach uses software tools to bypass encryption without physically damaging the chip. Techniques include voltage and current attacks, as well as using specialized software to extract data. This method is less invasive and preserves the integrity of the IC but can be more complex and less reliable depending on the chip’s encryption.
Choosing the Right Service for Cracking ICs
When searching for IC-cracking services, take into account the following aspects:
Experience: Choose a provider with a proven track record in cracking ICs. Experience in handling various chip models and encryption methods is crucial for success.
Technology: Ensure the service uses advanced tools and techniques for both hardware and software-based cracking. This ensures accuracy and effectiveness.
Reputation: To ascertain the reliability and quality of the service that the business provides, look for previous evaluations and comments from clients.
Legal Compliance: Confirm that the crack IC services comply with legal regulations to avoid any potential issues.
Understanding how to crack ICs is essential for many professionals working with technology. Whether you need to repair outdated equipment, recover lost data, or conduct research, knowing how to access and interpret the data within an IC can be highly beneficial. By choosing the right techniques and working with experienced professionals, you can successfully navigate the complexities of cracking ICs and achieve your technical goals.
0 notes
Text
𝐋𝐞𝐚𝐯𝐞 𝐚 𝐥𝐢𝐠𝐡𝐭 𝐨𝐧 | 𝐉𝐉 𝐌𝐚𝐲𝐛𝐚𝐧𝐤

𝑖𝑚𝑎𝑔𝑒 𝑓𝑜𝑢𝑛𝑑 𝑜𝑛 𝑝𝑖𝑛𝑡𝑒𝑟𝑒𝑠𝑡
𝐜𝐨𝐧𝐭𝐞𝐧𝐭 : 𝐬𝐦𝐮𝐭
𝐰𝐨𝐫𝐝𝐬: 𝟐.𝟏𝐤
𝐰𝐚𝐫𝐧𝐢𝐧𝐠 : 𝐨𝐫𝐚𝐥 𝐬𝐞𝐱 (𝐟𝐞𝐦𝐚𝐥𝐞 & 𝐦𝐚𝐥𝐞 𝐫𝐞𝐜𝐞𝐢𝐯𝐢𝐧𝐠), 𝐬𝐰𝐞𝐚𝐫𝐢𝐧𝐠, 𝐜𝐡𝐨𝐤𝐢𝐧𝐠, 𝐮𝐧𝐩𝐫𝐨𝐭𝐞𝐜𝐭𝐞𝐝 𝐬𝐞𝐱.
𝐢𝐧𝐬𝐩𝐢𝐫𝐚𝐭𝐢𝐨𝐧 : 𝐥𝐞𝐚𝐯𝐞 𝐚 𝐥𝐢𝐠𝐡𝐭 𝐨𝐧 - 𝐭𝐨𝐦 𝐰𝐚𝐥𝐤𝐞𝐫
𝐫𝐞𝐪𝐮𝐞𝐬𝐭 : @𝐣𝐨𝐧𝐚𝐬𝐤𝐚𝐡𝐧𝐰𝐚𝐚𝐥𝐝 « 𝐨𝐦𝐠 𝐜𝐚𝐧 𝐲𝐨𝐮 𝐩𝐥𝐞𝐚𝐬𝐞 𝐰𝐫𝐢𝐭𝐞 𝐚 𝐣𝐣 𝐢𝐦𝐚𝐠𝐢𝐧𝐞 𝐰𝐡𝐞𝐫𝐞 𝐭𝐡𝐞 𝐫𝐞𝐚𝐝𝐞𝐫 𝐢𝐬 𝐚 𝐩𝐨𝐠𝐮𝐞 𝐚𝐧𝐝 𝐣𝐣'𝐬 𝐛𝐞𝐬𝐭 𝐟𝐫𝐢𝐞𝐧𝐝𝐬 𝐚𝐧𝐝 𝐥𝐢𝐤𝐞 𝐝𝐮𝐫𝐢𝐧𝐠 𝐭𝐡𝐞 𝐚𝐠𝐚𝐭𝐡𝐚 𝐲𝐨𝐮 𝐛𝐨𝐭𝐡 𝐬𝐭𝐚𝐲 𝐚𝐭 𝐣𝐨𝐡𝐧 𝐛'𝐬 𝐡𝐨𝐮𝐬𝐞 𝐚𝐧𝐝 𝐲𝐨𝐮 𝐡𝐚𝐯𝐞 𝐭𝐨 𝐬𝐥𝐞𝐞𝐩 𝐨𝐧 𝐭𝐡𝐞 𝐬𝐚𝐦𝐞 𝐛𝐞𝐝 𝐚𝐧𝐝 𝐭𝐡𝐞𝐫𝐞'𝐬 𝐚 𝐥𝐨𝐭 𝐨𝐟 𝐭𝐞𝐧𝐬𝐢𝐨𝐧 𝐛𝐞𝐭𝐰𝐞𝐞𝐧 𝐭𝐡𝐞𝐦 𝐚𝐧𝐝 𝐬𝐦𝐮𝐭 𝐞𝐧𝐬𝐮𝐞𝐬? 𝐈 𝐥𝐨𝐯𝐞𝐝 𝐩𝐨𝐥𝐢𝐜𝐞 𝐨𝐧 𝐦𝐲 𝐛𝐚𝐜𝐤 𝐬𝐨 𝐦𝐮𝐜𝐡»
𝐚/𝐧 : 𝐨𝐦𝐠𝐠𝐠𝐠 𝐭𝐡𝐢𝐬 𝐰𝐚𝐬 𝐬𝐨 𝐡𝐨𝐭 𝐭𝐨 𝐰𝐫𝐢𝐭𝐞! 𝐢’𝐦 𝐝𝐞𝐟𝐢𝐧𝐢𝐭𝐥𝐲 𝐚 𝐬𝐥𝐮𝐭 𝐟𝐨𝐫 𝐣𝐣 𝐦𝐚𝐲𝐛𝐚𝐧𝐤! 𝐡𝐨𝐩𝐞 𝐲𝐨𝐮 𝐞𝐧𝐣𝐨𝐲!
𝐬𝐮𝐦𝐦𝐚𝐫𝐲 : 𝐲𝐨𝐮 𝐚𝐧𝐝 𝐭𝐡𝐞 𝐠𝐨𝐥𝐝𝐞𝐧 𝐛𝐨𝐲 𝐟𝐢𝐧𝐝 𝐚 𝐰𝐚𝐲 𝐨𝐟 𝐤𝐞𝐞𝐩𝐢𝐧𝐠 𝐲𝐨𝐮 𝐛𝐨𝐭𝐡 𝐰𝐚𝐫𝐦 𝐝𝐮𝐫𝐢𝐧𝐠 𝐚𝐧 𝐡𝐮𝐫𝐫𝐢𝐜𝐚𝐧𝐞...
─── °• ❀ ───
The sky is covered with gray clouds, announcing the imminent arrival of the hurricane. Sitting on the wood railing of the gallery, you enjoy the calm of nature before the storm. The tall grass of the marsh sway to the rhythm of the wind, as if they were dancing.
“It’s gonna be a big one.” A voice says behind you.
You turn your head over your shoulder to see your best friend standing in the door frame, his arms crossed against his bare chest. Sweat still covers his body due to the fact that he and John B took the HMS Pogue out of the water to protect it from the hurricane. A joint in the corner of his mouth, he takes a few steps towards you, placing his hands on the railing on each side of you and presses his chin on your shoulder.
“You’re wearing my hoodie.” JJ says.
“I was cold, and I didn’t bring mine.” You explain, resting your head on his while some of his golden hair tingling your cheek.
“I like seeing you in my clothes.” He whispers to your ear.
You don’t even blush or react; you are used to flirt with JJ, you both do it all the time.
“Maybe I should head home.” You say to him before taking the joint between your fingers to inhale the smoke.
As soon as you’re done talking, torrential rain begins to fall from the sky and the wind start to blow hard.
“Looks like you’re not gonna go home tonight.” JJ smirks, watching the rain fall from the roof.
“Thanks Captain Obvious, don’t know what I would do without you.” You mock him with a wink.
He grunts in the crook of your neck, making you giggle. The rain intensifies and water drops start to fall on your bare thighs. You turn your body and drop with both feet on the gallery, finding yourself caught between JJ and the railing. You accidentally brush your hand against his crotch while you try to grab the phone in his pocket to see the time.
“Whoa baby, you trying to make me hard?” He smirks.
“In your dream, lover boy.” You sigh, pushing him gently to get inside.
The boy passes a hand through his hair; god, you have an effect on him that no other girl has! But he knows the damn rule; no pogue on pogue mackin and he would not risk your friendship just to have a good fuck with you.
Once in the house, you join John B in the kitchen. He is making a sandwich with the few groceries left that are not expired.
“Hey JB, is it okay if I stay until the storm calms down?” You ask while he’s decapsulating a bottle of beer. “My mom isn’t home and my brother can’t come to pick me up.”
“Of course, Y/n/n. I’m not gonna throw you out in the storm.” He giggles.
“Thank John B, you’re the best! And can I borrow a pair of sweatpants? I’m freezing.”
“Yep, check in the last drawer of my dresser.”
You make your way to the back of the house and enter John B’s room. Many Hawaiian shirts and bathing suits lay on the floor, not even fully dried. You take out a pair of grey sweatpants from the drawer and put them on the bed while you take off your shorts. Your back faces the open bedroom door, keeping you from seeing that JJ's eyes land on your butt only covered with black thong. His forearm pressed against the door frame; he can't help but smile stupidly at the sight of you, half-naked and wearing his hoodie. You jump when you hear someone whistle you. Quickly turning your body of 180 degrees, you pull the sweatpants up to your waist, making big eyes to JJ.
“Perv!” You shout to him while he giggles.
“You didn’t close the door, are you into exhibitionism, Y/n?” He smirks.
“And are you into voyeurism?” You reply, making him lose his smirk.
You proudly smile, tying the oversized sweatpants so they can fit you. You put back your worn red converses and walk towards JJ, stopping once you’re standing in front of him in the door frame.
“You enjoyed the view, didn't you?” You ask with a slight mocking grin.
“What makes you believe that?” He says, lifting an eyebrow.
You close the gap between you too, grabbing his shoulders with your hands and putting yourself on your tiptoe so that your mouth is a few inches from his ear.
“The bulge in your pants told me, baby.” You whisper, softly biting his ear before pulling away quickly.
You walk in the corridor smiling victoriously, leaving him alone and speechless. For once, you were the one who had the last word in your little teasing.
***
The power suddenly breaks while you admire Bodhi's Apollo body in the movie Point Break on the tv screen.
“Looks like hurricane Agatha has already began to make damages.” John b says, watching the rain hit the window. “I’m gonna go to bed, you two can sleep in the spare room.”
“Good night JB.” You say to him with a smile.
“Good night, sweetheart.” He says back, leaving you and JJ alone in the living room.
Still lying on the sofa, your head rests on JJ’s lap while he runs his hand through your hair. You put your hand in front of your mouth when you yawn, tired from the day. Slowly getting up and leaving JJ on the sofa, you head to the sink to fill yourself a glass of water.
"I'm going to be in the room." JJ tells you, walking towards the corridor.
You finish your glass of water watching nature go wild outside. Chills run through your body when you see a lightning strike on a tree near the house. You head quickly to the bedroom, banging your thigh against the kitchen table because you can’t see a thing in the darkness. The bedroom is lit up by the flame of a candle lit by JJ who is lying on the bed, shirtless. You subtly bite your bottom lip at the sight of his tanned and muscular body.
“Can you help me hydrate my back? I have a burning sunburn.” You ask, handing him a tube of body lotion.
He nods as he sits on his knees at the end of the bed, grabbing the blue tube. You put yourself in front of him, your back facing him and take off his sweater, keeping it pressed against your chest to cover it.
“You already took off your underwear for me, baby?” He teases you when he sees your naked back.
“You’re unbelievable, Maybank. I just hate wearing them, they are not comfort- Oh shit it’s cold!” You squeak when you feel the cold cream against your burning skin.
Chills run through your body as his hands gently rub your skin. In the mirror in front of you, you observe him concentrate as he applies the lotion on your skin. Your body tenses when his lips start to leave wet kisses along the back of your neck. His hands are now on your ribs, gently touching your skin with the point of his fingers while he continues to kiss your shoulders.
“We should not be doing this JJ…” You whisper trying to be the reasonable one.
“C’mon baby, I know you want it as much as I do.” He groans against your ear, making your head fall back on his shoulder.
“What about the rule?” You sigh, almost no longer controlling your reactions to his touch.
“I’m a rule breaker, baby, I don’t give a fuck about it.” He says, pulling you closer so your back is against his bare chest.
Shivers are sent down your spine when he starts to suck the skin of your collarbone. You take a deep breath with your eyes closed and stop thinking about the consequences for once in your life. You turn to face him, letting his sweater slide down your arms on to the floor. His eyes widen as they look down to your bare breast. Instantly, he grabs you by the waist and slams you on the bed, his body laying over you. His lips join yours for a wet and fiery kiss. Your hands on his neck, you draw him closer to you, feeling the warmth of his skin against yours.
“Don’t make me regret this.” You say, looking deeply in his eyes.
“I’m gonna give you the best fuck of your life, baby girl.” He teases before grabbing you under your knees to push your legs back and wide open.
He unlaces your sweatpants and takes them off at the same time as your thong. His head between your thighs, he kisses your skin and sucks it at a few places. Without any notices, he dips one finger inside you and start to move it back and forth. Your moaning is quickly smothered by his hand on your mouth, preventing sounds from coming out.
“You’re gonna need to keep it low, baby, unless you want John B to join us.” He smirks between your legs.
You roll your eyes and softly bite the palm of his hand with your teeth, making him giggles. His tongue starts to play with your clit while he adds a second finger inside you.
“Fuck JJ…” You moan in a low voice while you clench around his fingers.
“That was just the appetizer baby.” He smirks, grabbing you by the hips to pull you to the end of the bed where you sit, leaning on your hands behind you
Without breaking his gaze from you, he slowly slips his fingers between your lips to make you taste yourself. You lick them and make him smiles arrogantly when you put your hand on his crotch, squeezing it tightly.
“Good girl.” He whispers once you’re done cleaning his fingers from your juice.
You stand up and grab his belt, undoing it while you kiss his jawline. He tilts his head, allowing you the access to his neck where you softly suck his skin, leaving red marks that will probably betray you both tomorrow, but none of you seem to bother with that. You push him over the edge of the bed, making him sit down while you take off his shorts and boxers. He leans back on his hands, staring at you while you get down on your knees to take his shaft in your hand and start to move up and down. He licks his bottom lips and let out a small moan escape when you start to slide your tongue along its length.
“So hard for me, Maybank.” You tease him before wrapping your mouth around the tip of his cock.
One of his hands find his way in your hair, grabbing them to make you take him deeper. You bobble your head over his body and apply more pressure with your hand at the base of his length. JJ’s head fall back when you loosen up your throat and take him all in. He groans, pushing your head with his hand, making you choke slightly on him. He let you pull out and take a breath of air.
“Time for dinner now.” He whispers, grabbing you under your thighs to slam you against the bed for the second time.
He grabs a condom from his pants pocket, but you stop him before he unpacks it.
“I’m on the pill.” You smile, taking the little golden pack and throwing it at the end of the bed.
You grab him lightly by his necklace and kiss him, feeling the little smirk on his lips. JJ opens your legs and start to rub his cock against your clit and over your wet entrance. He pushes into you, making you bite his bottom lip to hold back a moan. He grunts against your lips as he slides back and forth in you, making you moan harder. He places one of his hands on your mouth and wraps the other around your throat. He slightly chokes you, keeping his eyes lock in yours while he starts to pump faster inside you.
“Oh fuck, baby. I’m close.” He groans, unwrapping his hand from your throat to let your breath.
His thumb starts to rub your clit, increasing the tension in your body. Your nails scratch his back, making him grunts. You hit your climax, moaning and biting his hand that is still on your mouth. He trusts his cock deeply inside you a few more times before he cums all over your stomach. JJ withdraws and drops onto the bed next to you.
“So? Do you regret?” He asks you, still breathing heavily.
“It was definitely the best fuck of my life.” You say, turning your face to the side to meet his blue eyes. “We should do it again sometime.”
“I’ve no objection to that.” He smirks before gently kissing your lips. “Now, time to make the dishes.” He adds with a little laugh, grabbing his shirt to clean up his seeds on your bare stomach.

milamaybank’s masterlist
#jj maybank#jj fluff#jj obx#jj smut#jj imagine#jj#jj x y/n#jj x reader#obx jj#jj outer banks#kiara carrera#pope heyward#obx#outer banks#outer banks imagine#obx imagine#outer banks smut#john b routledge#outer banks fic#smut#jj maybank smut#jj maybank x y/n#jj mayback x reader#jj maybank imagine#jj maybank fanfiction
1K notes
·
View notes