Tumgik
#identity theft sweep!!
Text
Draco is a racist in the most literal sense. (Well, former – reformed? – racist, that is. He wouldn't identify as one anymore.)
But he'd nonetheless been a racist – literally. He'd subscribed to the Pureblood notion that Wixen and Man are two separate creatures, made distinct by the inherent magic to one and the lack thereof in the other, which made the latter inferior. It'd taken no less than a week of critical thought to rid himself of the philosophy.
Indeed, his stint in Azkaban between his arrest and trial had been rather enlightening. It'd given him the perfect amount of time to grapple with himself, his identity, and the very fiber of the world as he knew it.
In preparation for his hearing, he attempted to shift the blame for his racism from himself. He'd been a child after all. A child very susceptible to the whims and fancies of his parents, as many children are. So, really, it's his parents' faults for impressing upon him their obsession with blood purity, and no one could fault him – sweet, innocent, young Draco – for taking up family business of slur-hurling and the mild torture of innocents.
Yes, he'd be a free man, for sure.
But then he'd unfortunately remembered that his parents had once been children, too. And at what point did the blame shift from them to their own parents, and then the generation before them?
At what point did Draco become responsible for his actions? Was it between second and third year, the transition into teenager-hood? Or was it when he got the mark? Could he blame his parents – his mother who'd begged him not to – for that decision?
What about the cabinet?
What about Dumbledore?
He'd stared at his cell wall for hours, wracking his mind for an answer other than the one he had. None came.
The day of his trial, he resigned himself to a guilty sentence.
But then, of course, Harry Potter had to muck everything up, as he always did – does. Within hours, Draco was not returning to his cell, but standing in front of the Ministry with all of his worldly possessions cradled between his arms.
Well, then.
The next five years were rather boring, full of strife and struggle. He knew poverty for the first time in his life, an experience he never wished to repeat, and despite the horror that was ages 15 through 18, he learned that it had not been rock bottom.
No, rock bottom was much, much worse.
On the bright side, his Wizard upbringing had been good for a few things. For one, his complete ignorance of the concept of sexuality meant that his open homosexuality made him "cutting edge" and "interesting." Secondly, his impeccable aesthetic taste made him hireable.
At 25, he's the most popular stylist at a bougie London salon, and he's made quite the name for himself among the rich housewives of South Kensington. Gone were the days of dumpster diving and petty theft.
Draco Malfoy is, once again, a god among mortals.
And like any god, he is a master of keeping up a facade, which is why he's able to not visibly react when the last person on Earth he wants to see walks through the salon doors.
Harry sodding Potter.
Draco should have anticipated this. Of course, Potter would show up the moment Draco's life was going well – the prick was justice incarnate. He must have a sixth sense for undeserving people experiencing happiness, and like a good hero, he sweeps in to strip the perpetrator of the feeling.
Draco refocuses on the appointment he's in the middle of, thinking invisible thoughts in hopes that it would prevent Potter from spotting him.
As anyone could've predicted, it doesn't work.
"Draco?"
He spares half a glance toward Potter, who stands only a few feet away now, having bypassed the front desk girl. He looks back to the foil in front of him, checking the color.
"Potter."
"What are you doing here?"
He pauses, gives Potter a flat look, and then continues working.
"Oh," Potter says dumbly, "right. But, I mean, um, what are you doing here, like, in, um, this side of London."
It's a lame and fumbled attempt to ask why Draco was in Muggle London, in a Muggle salon, doing a Muggle's hair, and Draco latches on to the opportunity to turn the conversation around.
"What – you think I don't deserve to be here?"
Potter's brow furrows in that familiar way that says he understands that he's just dug himself into a hole, but he hasn't a clue how to un-dig it.
"No," he denies too aggressively. "You know what I mean. I just didn't expect you to work at a place like this."
He winces at his words, and Draco doesn't bother hiding his triumphant smile.
"I'll have you know," Draco's client, a middle aged woman named Siobhan who has that eccentric look that only works on the uber rich, says with a pointed finger at Potter, "that Draco is a very talented young man, and we here are lucky to have his skill. I'm not sure how you two know each other, but I won't stand to have Draco's talents diminished in my presence."
Potter's face turns bright red, and his shoulders shoot up to his ears. "No– I, I– I wasn't trying to–"
"It's all right, dear," Draco says to Siobhan with a hand on her shoulder. "This just shows how far I've come, the success that I've achieved; I won't let others' prejudice stop me."
"Prejudice?!" Ah, there's the outrage that Draco coveted so much when he was younger. It remains unfairly amusing.
Biting back a smirk, he gives Potter a stern look. "If you'll excuse us."
He doesn't wait to for Potter to leave to guide Siobhan to the back wall where the sinks are. Behind him, he can hear Potter awkwardly shuffle out of the salon, and the tin bell above the door announces his departure.
Draco asks one of his coworkers to take over while he has a quick smoke break. Once outside, he allows himself exactly three minutes to panic before straightening his shirt, wiping his tears and heading back inside with his head held high.
If he knows Potter as well as he thinks he does, this won't be the last time they meet. Potter's horribly stubborn like that. So all Draco can do is prepare and hope that the next time Potter shows up, it'll satisfy whatever morbid curiosity he has.
And maybe next time, Draco won't notice how handsome he is.
39 notes · View notes
biblicalhorror · 1 month
Text
I keep seeing posts about how Fig should be the one to run for president instead of Kristen and I could not disagree more tbh.
Fig hates responsibility literally more than anything else. She hates deadlines. She hates structure. Sure, the chaos anarchist might be exactly the energy Aegfort would want running his school, but she's fundamentally incompatible with that kind of position of power. She's charismatic, yes. But a grand majority of the time, she prefers to use her charisma for trickery and deception, not for popularity or politics. She has a very hard time being likeable or impressive as herself, which we see in action during the most recent episode with the note to Riz, or during episode 1 when she convinces Gorgug he was the one to seal the Night Yorb. In fact, a running character theme for her this season has been about how uncomfortable Fig is with herself, whether that's in regard to physically being in her own body or in keeping agreements with herself. Being student body president puts a lot of pressure onto how you the person is perceived, which Fig would absolutely struggle with immensely. (Tbh it would be very funny if she ran as Wanda Childa, though.) Fig is also an extremely loving and caring person, which I think people assume would translate well to a position in politics. But the thing is, Fig intensely cares for her own people. The opposite side of that coin is that she is also very frequently extremely distrusting of random strangers for little to no reason. She is kind, but in the sense of being extremely loyal and protective of her loved ones, not necessarily in the sense of being humanitarian. Frankly, I think the pressure of having that much power over so many of her peers would not be good for her mentally. Not to mention the fact that she actively has the bird cop coming after her for identity theft. The last thing she needs is more visibility.
Kristen, on the other hand, is almost entirely motivated by The Greater Good. She has a very hard time showing up for the people in her life on a day-to-day basis, and she also has a very hard time even caring for herself on a basic level, but she is always looking at the big picture and calling out structural injustices. Her main motivation as a character revolves around fighting against inequitable power structures created by evangelist gods, and she will never fail to put herself directly in the line of danger if it means protecting someone else, especially if she can stand up to some bullies in the process. This is the girl who, without any casting ability, decided to use a cantrip to try and help two souls, one of which was a literal stranger, pass on to the afterlife together in peace. She wants to bring people together more than anything else. Interestingly, she is also not good at facing herself and being perceived. However, unlike Fig, she deals with almost a disconnect between her public persona and her true inner self, which manifests as random chaos to keep other prople at arms length rather than constantly hiding herself behind different disguises. In a way, she's actually a super compelling foil to Fig. Kristen is very bad at being there for the people she's closest to, but she knows how to reach out to strangers and offer community. She knows how it feels to be isolated from her own power due to a disempowering social structure, and she understands grand, sweeping social power arguably more deeply than any of the other bad kids due to her history with all of her various dieties. Kristen, deep down, struggles with seeing herself as a person with agency rather than a conduit for power, and her fear of her power being exploited by a greater being to bring suffering unto others I think actually puts her in kind of the perfect position to be going into politics. She will always be vigilant about making sure there is a voice for the voiceless, and she would not put the needs of the few above the needs of the many. Also, she brings exactly the brand of chaos Aegfort is known for into all of her campaign-related interactions. And thanks to her friends, that might win her the election.
11 notes · View notes
drawnecromancy · 2 months
Note
mistake: What's the worst mistake your OC ever made? What led to them making it? Have they been able to fix it? How have they moved on?
hide: What does your OC hide? Why do they hide it?
For Hélianthe? 🙏
From this ask game ! :)
Okay funnily enough you picked two questions that straight up give you a plot summary of like, half of the book.
Mistake : What's the worst mistake your OC ever made ? What led to them making it ? Have they been able to fix it ? How have they moved on ?
Not checking if it was legal for him to be in Eshda (his assumption is that it is. Legal to exist. In life. As a normal person would assume !), and being incredibly careless, one might even say sloppy, when deciding to just destroy an entire village for the hell of it (and filling a bunch of bottles with blood to have some advance before needing to kill people next time, but that's not really a long-term thing).
In general, the fact that he didn't imagine he'd stay in Eshda for very long, and just assuming he could leave and get away with whatever the fuck he was up to, combined with his general inability to plan for the far future, led him to be pretty fucking stupid. Pro tip, don't murder a little under 100 people if you don't want the rest of the duchy to be suspicious that there might be magic afoot.
He didn't "fix" much, he's been hiding it. Sweeping it under the rug. He's having A Time doing it. Which brings us to our next question --
Hide : What does your OC hide ? Why do they hide it ?
--three things.
One : The massacre.
Two : The fact that he's a vampire.
Three : The fact that he's a mage.
These two things will straight up get him killed. The first one for justice, the second one because being a vampire is illegal in Eshda, the third one because being a mage without a license is also illegal in Eshda and WILL be an aggravating factor for the two other crimes.
So he wants to not die, and Atropa gave him the possible solution of committing identity theft about it, and he's been doing that. For most of the book. It's very fun ! The narration uses his real name to refer to him while everyone else (except Atropa when they're alone) calls him Nielle, which is the fake identity.
6 notes · View notes
digital-corruption · 2 years
Text
... Screw it. Yes, I'm starting a new multi-part fanfic right before episode 10. 🤪
In this version of events, Jake disappeared right before the end of whatever happens without a trace. It is now 5 years later. MC has moved on (?).
Unrecognisable Part 1
⚠️ This fanfic has strong language usage.
⚠️ This fanfic features a**hole!Jake.
------------------------------------------------
“I wish I found the Man Without a Face instead.”
I never thought I'd ever say those words, but as they say, “expect the unexpected.” They also say, “never meet your heroes.” For good reason too.
Where to begin? I'm sure you know the story about Hannah Donfort. Who doesn't by now? It was all over the news and social media. Not a story I enjoyed repeating. Thankfully only a few people knew I was even involved as my name was left out of the news. And of the people I did tell, many claimed I lied for the attention. As if I wanted to be associated with that nightmare? No, thank you.
The only thing that kept me sane was my memories of the people I met along the way, especially HIM. Not many people are aware that the #IAmJake trend and the events surrounding Hannah Donfort were actually connected. Not even the conspiracy theorists were able to make that connection. I suppose it was good in a way - good for HIM. I wouldn’t be able to tell you because before it was even over he disappeared without a trace. Yes, like the Avatar, only he wasn't encased in ice.
To make matters worse, all of our history with him was gone. Even the photo he had sent to Lily and the backup she had saved. As it turned out the photo contained a trojan, which meant he could get to it on any device. Of course the one personal item he volunteered had strings attached. If it wasn’t for the fact Lily had printed a hard copy of the photo, we wouldn't had anything to go on, but even then, it wasn't enough. It’s not like you could identify him from an old photo of his mother. It's not like I could hack into the world’s most sophisticated international facial recognition software and search for matches.
Honestly though, I was pissed, no livid with how he disappeared. At first I was optimistic he would return, but as the days and weeks passed without a word, it was clear it was never going to happen. And as bad as it sounds, there were times I wished he was either dead or captured. The sting of him leaving wouldn't hurt so much then. Something told me he wasn't though. Somehow I knew he got what he wanted and was now in the wind. After a while, I had a friend of mine so a sweep of my computer and phone. Both had so many backdoors open for the right hacker to walk right through any time he felt like it. I was so disgusted with the gall of him. I immediately got a new phone and computer, and didn't touch my old accounts ever again. An absolute fresh slate. No more prying whenever you felt like, Jake. He would have to reach out to me the old-fashioned way.
So when I received the coded email from an unknown sender five years after he disappeared, you could imagine my surprise. I suppose an average person would have deleted it or marked it as spam. I just knew there was something about it though. I looked up all sorts of ciphers and encryptions. I ran it through online parsers. Surely if it was intended for me it wouldn't require too much deciphering, right? What I understood about the highest level of encryptions was they required a key to interpret the information, but I didn't receive anything else so I was baffled for days. Then I remembered that scavenger hunt he had sent me and Lily on, and that dumb phrase he kept repeating.
“You are the key.”
I tried my first name. I tried my last name. I tried them together, I tried them in reverse. I threw in my date of birth for kicks. Nothing. I nearly gave up, but then I saw a video on my feed mention how identity theft can occur from just having your social security number.
Bingo.
The parser confirmed that the decryption worked and returned to me two decimal numbers. At least I had watched enough mystery shows and played enough games to immediately recognise them as GPS coordinates, so you can stop shouting at the page now. (Who hasn't yelled at TV shows for spending more than a second working that out?)
And that is how I ended up at that abandoned building in a faraway city of a country I had never been to before. Then thing is, no one knew I had gone overseas. It wasn't so much of an issue with my work or my family. However, lying to my boyfriend was the hardest. He sincerely thought I was visiting my sick aunt. How was I to explain this to him? That I was chasing down a clue that may or may not lead to this guy I once had feelings for. I figured I'd work out an explanation afterwards. For now, I didn't want the interference, I just wanted to be able to focus on following the clue. I had to admit, as I pryed the boards off a broken window with a disused pipe I had found, I was beginning to have doubts about my interpretation of the message, but what else could it have been?
Even though it was the middle of the day outside, the old office building was dark as little light got past the boards. I had to use my phone to illuminate the hallways as I walked through them. There was only four stories, but when you don’t know what or who you were going to be finding, it felt like a never-ending labyrinth. Still, I carried on while trying to work out the best excuse to give the police if they had found me first and arrested me for trespass. They could speak English, right?
As I entered one of the offices on the third floor, my phone was suddenly knocked out of my hand. Before I could react, I was slammed face first into the wall painfully. Someone grabbed my hand and twisted my arm painfully against my back. Then I heard the click of a gun's safety being disengaged before the muzzle was shoved against my head.
“What the fuck are you doing here!?” a male voice grunted with an European accent.
My mind raced. Had I gotten the message wrong? Was I not the intended recipient? But it was my social security number that was the key! No, it had to have been for me.
“I-I followed the GPS coordinates in the email!” I stammered.
“What email!?” he pressured.
“Can we do this without the gun?” I pleaded.
“No! Answer the fucking question!” he snapped.
“I received an encrypted email from an unknown sender. All it contained though were GPS coordinates for this building!” I explained. “Please, you’re hurting me!”
“I’m hurting you? I'm hurting you?” he stressed. “Fuck! It’s people like you that keep the Nigerian prince scam going! You blindly following that email is going to get me killed! I should just shoot you and leave your body for them to find! Teach them to fuck with me!”
“I don’t understand!” I started to tear up. “You didn’t send me the email?”
“NO!” he yelled. His voice echoed off the walls. “At what point in entering this building did it seem like I wanted guests!?”
He pulled the gun away and shot my phone lying on the floor. The gun had a silencer on it, but the sound of the phone shattering still caused me to jump.
“Now what do I do with you?” he purred. “Do I leave you in the dumpster out the back? Or should I hang your body in the foyer?”
“Please...” I sobbed. “It was just a misunderstanding, ok? I thought you were someone else!”
“Yes, I know. You thought I was... what name did I use again? Oh, that’s right. You thought I was Jake,” he laughed.
My blood ran cold, “Jake?”
He spun me around and slammed me back against the wall. I started to cry out in pain when he smashed his lips against mine. I was in so much shock that all I could do was stare into his icy cold eyes that peered out from underneath his hood. He readjusted his face mask to cover the lower half again.
“What’s wrong? Was that not how you imagined our first kiss?” he chuckled.
I immediately slapped him across the face. “You can’t be...” I mumbled.
“Oh, but I am,” he sneered. “I am Jake!”
170 notes · View notes
Text
New Stelia explanation
New Stelia is the setting of my current lancer campaign. Primarily taking place in the titular mega city, New Stelia is (sorry for the buzzword puke) a retro scifi, decopunk world. Heavily based on Bioshock and New Capenna, New Stelia is a world where mechs have wholly replaced all forms of transport (for the aesthetic). Cars are just Everests, Bartons, etc. Buses are Lafiettes. Big trucks (semis? 14-wheelers) are Hawkins. Fancy cars are the SSC Chrysalis or similar crab chassis mechs. Boats are just really big, aquatic hotdogs. Blimps are also hotdogs but strapped to big balloon. (I have a reasonable number of Lancaster esc mechs)
New Stelia (the city) is built on/in/above a plateau that shields the city from the heavy radioactive gas that covers the flush plains surrounding the city. There are districts that handle the various functions needed for the city but in all honesty I havent fleshed them out at all which is a bit problematic.
Rather than the interstellar origin of the manufactures, IPS-N, SSC, GMS, and HA have altered backstories to fit the world. Much mettling doesn't need to happen for this. Wow IPS-N is speciallied in making lancaster esc mechs instead of starships; HA did have three clone rules and orignate from a old iteration of Union, they just aren't from space. And for HORUS, of course they're here, just more occult (see below).
Another notable change to the setting from the core Lancer one is what an NHP actually is. Rather than just being the technological/digital consciousness of a eldritch entity peaking into this reality from blinkspace, only contained through a black box containment unit that shackles the entity's perception of reality and itself to be vaguely human like; NHP's are ghosts. But like the lighting ghosts from Mob of the Dead (CoD Zombies). They function identically to NHP's on the surface level of interfacing with electronic systems (because yk, lighting ghost) but are summoned from blinkspace through ritual rather than just being found in the field and shipped off to Venus. NHP's can still; be cloned but its more of cutting up the original ghost like a flatworm than copy+paste code. Oh also the Deimos event basically happened but not really; Ra was there, NHP's became more active, etc. but no moon take over and stuff.
To match the prohibition era conflict, New Stelia has a drug sweeping Union territory. A substance called Halo. While blatant theft of concept, this substance has a different origin than the angle juice from New Capenna that I can't say for spoiler reason. Halo is known to produce vivid hallucinations of what feels like other lives, from escaping a collapsing facility to dredging your way through a swamp. Despite the possible horrifying visions, Halo is highly addictive due to its euphoric prolonged effects.
On the top of my head, that's it. I mean sure there are locations outside of New Stelia in various states of livability and purpose but until I write more on them I don't feel inclined to sharing.
2 notes · View notes
swampstew · 10 months
Note
Raven, I have a question since I frequently buy stuff from Etsy. What does arbitration mean in this case? Or class action lawsuit? I don’t understand and am not sure how this will impact me and the stores I support.
(Also had no clue you sell stuff and need to know in order to buy and support my precious family. I love you!)
Hey Blaze, thanks for asking. When using Etsy (as a seller or buyer), you sign an agreement to not participate in a class action lawsuit against Etsy and that they will handle disputes internally. This has been done by giving blanket refunds to customers and taking funds from sellers before actual reviews could be done. This was a real sucker punch for people on Etsy who need to be paid first in order to make their products, plus it sucks when you sell something for $X and then your buyer demands a refund for whatever reason and Etsy will just pluck the money back, no process, no customer support whatsoever (they don't even have a hotline number anymore).
In an attempt to sweep customer service issues under the rug, Etsy has been offering disgruntled buyers no-questions-asked, no-return-required refunds, with funds automatically taken from sellers’ payment accounts.  In order to prevent sellers from bypassing this issue, Etsy has been imposing “Payment reserves” en masse.  This means Etsy outright refuses to pay sellers the money they’ve earned from sales until after the order ships. 
This opt-out clause allows people to be able to participate in lawsuits but because the update was very lowkey and they bury the opt-out information under all the legalese, people tend to not read that bit and aren't aware they have that option. So if they ever try to sue Etsy for whatever reason, Etsy can use that clause to say you have no case. This newsletter was to let people know how to opt-out without having to read the whole damn thing.
There have been a lot of shady things happening on the backend with Etsy the Corporation - including design theft from alibaba/express dupe pages AND drop shipping pages even though Etsy is supposed to be a hand makers marketplace; no customer service at all except online articles; forcing sellers to participate in Etsy ads with no option to opt out and than forcefully taking fees from sales made through clicking on Etsy's forced ad; encouraging sellers to opt into an additional advertisement program to have listings appear higher in searches which NEVER resulted in actual sales; charging sellers for shipping fees per products but not providing any support, material or stamps or anything to justify charging for shipping costs that sellers ate to ship products; if you had 5 items for one listing, Etsy would charge renewal listing fees each time as if it was making a brand new listing each time (it was not); forcing sellers to use a payment service that is infamous for the lawsuits against it for committing fraud; and then the godsdamned star seller program that actually punished sellers for not meeting ridiculous benchmarks every quarter, just a lot of awful shit.
My suggestions - if you use Etsy and have a problem with your item, message the seller directly instead of using Etsy's refund/help program because it will cut out the seller entirely. When using Etsy, check the profiles ratings/reviews for bot reviews or if you see multiple pages selling the exact same items using damn near identical product pictures, and uhhh if anyone you want to support sells anywhere off Etsy use that instead! Some of my Etsy friends have started using Kofi now too!
My Etsy shop is still closed and I put all my online shops and social medias on hiatus to figure some stuff out. The Etsy shit was the straw that broke the camel's back of my online seller's journey so I pretty much sell locally at farmers markets when I have the time. Haven't done a table in a while and I do miss it. I don't want to publicly share that information though because I do value my privacy but I will share that my store was about mental wellness and self care. I made bath products, jewelry, stim toys, and art. Support your small business owners!
4 notes · View notes
blurb-brain · 1 year
Text
Tumblr media
I have not yet tried this for myself but I WILL read about it further, do some more research, wait for a bit more review, and THEN try it out. What is promising is that it can be downloaded and used offline instead of online where the upload-download process is in danger of data mining.
Now, this is not a panacea. The AI arms race is FAST and constantly developing (mid journey can do hands properly now btw). The developers have also chosen not to make this open source in an effort to increase security. This means it can get outdated very quickly. However this is a good place to start and CONTINUE. If you have the skills and/or interest to join projects like these, perhaps this thread is a good place to start.
Some thoughts regarding AI:
I put Artificial Intelligence on an automation spectrum with Fully Handmade/Manually Done/Live Performance/etc on one end and artificial intelligence on the other. Between those lay many tools that reduce human effort, time, and cost. I would then add that as you lose more and more of that, you lose the soul because what is art if not an expression of human soul?
Take music for example. You have a song performed live by singer/s and one instrument or a band or an entire orchestra. Move down one step on that spectrum and suddenly you can fit all those instruments on a keyboard and perform with the singers. The keyboard still requires musicality, physical hand skill to play, and some advance programming of rifts for the different instruments (and some choral, wordless singing) to somehow come in but still. That's a whole lot of people who have suddenly become "unecessary". Then move a step again and all that that keyboard can do can be played on a midi pad. Requires musicality still and a lot more pre-programming but the physical skill set to play it is lesser but still has a live element like during DJ concerts. Step down again and all this can be done on a computer. It can do all the previous but live element is now gone. I thought singers were still safe but with the recent AI on copying a specific person's voice, lyric style, music style, and just overall song style, that's gone too. Congratulations you don't need anyone but one person with an idea. You save a lot of money and can make a lot more than what you invested.
Thanks, we all know that musicians and artists are the jobs that get paid so much that removing them from the equation is anti-gatekeeping (eye-roll & sarcasm).
That is ONE thing I will allow AI, that one person with a half heard melody, a sweeping symphony, an impossible world inside their soul and no idea, time, and money to realize it can have the tools to do so.
But what I find absolutely UNACCEPTABLE is the theft of style, of identity. In art school, realistic drawing is taught in first year. With enough time, anyone can do it. But what sets you apart? Why can a stick figure hyperbolic satire comic be more wildly successful than a painstakingly detailed, scarily accurate painting of an entire city? Why is it also absolutely hilarious for a character painted in the Rembrandt style to be in a pop color, cartoonish grocery? It's about life, the connection, the commiseration, the lenses in which we experience it and the joy in finding something that echoes it exactly. It's so hard to make it big in the arts. We're called starving artists for a reason people. It's not just about technical skill. There's that something more, something about that person specifically, their X-Factor (tm) as they say. To then take that away, filter it down to code, and mass produce it is... it's dehumanizing. It's theft. It's an erasure. And for what? To save money?
What I've seen is that it's the people who struggle to earn a living who's jobs are most easily taken over by automation. Save money, destroy lives I guess. If art is just a commodity for quick money then what is even the point.
This has also given me severe trust issues. Can't trust photos, can't trust videos, can't trust sound bites. Can't trust frikkin anything. I used to think that the Assassin's Creed motto of "Nothing is True, Everything is Permitted" was such an edge Lord, emo phrase to go parading around but the older I get, the more true it becomes and I'm so upset about it.
4 notes · View notes
chasingmidnights · 1 year
Text
Cradle of Life: Part Five
Title: The Triskelion
Tumblr media
Summary: After your father’s death, you’re sent a box of his belongings. Come to find out, one of your father’s enemies is after said belongings so you reach out to a few of your friends for help. 
Warnings: mentions of shooting/guns/gun violence; small mention of alcohol; mentions of character injuries/death (bad guys); car theft/vehicle stunts; and I think that’s it. I apologize if I miss anything but you are responsible for what you read. 
Author's Note: There might be a bit of Fast and Furious inspiration in this part. I just couldn't help myself! I hope you enjoy it!
Wordcount: 2,122 
It didn’t take long before the three of you had landed in Madripoor. You and Rick were dressed to a T and had just entered a party on the upper floor of the Triskelion. When the two of you stepped off of the elevator, you glanced around the expensive looking gala room. The room was quite open and large, with various rare pieces of art on display either on separate display stands or hung on the wall. You couldn’t help but be in awe at the sight before you, you had to hand it to Pierce, he did have good taste in art. In the middle of the room is a red and black Bugatti Chiron, again, you couldn’t help but admire the vehicle on display. You wanted so badly to drive it. The two of you take a few more steps into the room and a waiter approaches you to offer you some champaign. You both take a glass and you walk further into the room, doing your best to blend in. A soft beat of EDM played from where the DJ was positioned, loud enough to hear but not so loud it drowns out the party goers conversations. The two of you found a spot in the room that covered all of the entry points and started to make small talk. 
“So, what’s the plan if this goes south?” Rick nearly whispers, pretending to take a drink of the bubbly beverage. 
You do the same before responding. “I’m still working on it.” 
You notice the bridge across from the Triskelion and begin to walk towards the floor to ceiling window. You were a nutter for even thinking this and were ninety-five percent sure this plan wouldn’t work. And even if it did, it would be a whole other miracle if you all survived. Rick was watching you intently as you thought through your plan. He knew that whatever it was you were thinking, he wasn’t going to like it. His thoughts were confirmed when he saw you glance back at the fancy sports car on display in the middle of the room to only return to the bridge. 
“I know what you’re thinking and the answer is no.” Rick says sternly and close to you. 
You couldn’t help but smirk, Rick knew you all too well. “Well, it might be our only option when Zemo returns.” 
The two of you continued to act as if you belonged at the party, even mingling a little bit. You would introduce yourselves as Evelyn and Rick O’Connell, hoping that the fake name and blonde wig would hide your true identity. Meanwhile, Zemo was making his way towards the lab where the orb is being held. He was trying to be discreet as possible but he wasn’t afraid to use violence if needed. He was hastily making his way and he hoped he looked as menacing as he felt. He had on a purple-maroon striped ski mask on and his long, black coat trailed behind him. When he made it to the lab, he noticed how empty it was and instantly became suspicious. Something wasn’t right. Then, he heard it, the cocking of a gun right behind his head. 
Zemo took in a deep breath before he made a move by turning around and grabbing ahold of the man’s arm. A shot goes off and Zemo punches the man straight in the face, causing him to stumble backwards. Zemo takes this opportunity to knock the gun completely out of his attacker’s hand and sweeps him off of his feet by kicking his feet out from under him. The man falls to the ground, groaning and holding his now broken nose. Zemo kicks the injured man in the side a couple of times causing him to groan more. Helmut Zemo then collects up the attacker’s gun and just as he was about to enter the lab, two more men come around the corner. Helmut shoots them instantly as he backs into the lab, pulling out his other gun and shoots a few more men as they come in from behind. 
When the shooting stops and the men stop coming, Zemo removes his mask. He walks over to the orb and gently takes it off of the stand that it’s on and stuff it in the satchel that he had on him. He goes to leave the lab but before he does, he takes one of his guns and aims it at one of the computers. He releases a couple of rounds before he does the same thing to the other ones, destroying any progress they had on the lab. Once satisfied, Zemo quickly leaves the lab, making sure to grab his mask as he does and stuffs into the satchel with the orb. When he reaches the elevator, he hits the up button and the doors open almost immediately. As he enters the elevator, he presses the button that will take him to the floor that you and Rick are on. 
While Zemo was making his way up to the party, Alexander Pierce had entered the lab. To say he was furious would be an understatement, especially when he realized the orb was gone. 
“What?!” Pierce screams causing some of his men to jump. He then takes a deep breath and takes a moment to calm himself before turning to Brock. “Find them. Whoever did this, I want their head on a stick!” 
“Yes sir.” Brock motions to the men behind him to follow him. 
Once his men are out of the lab, Pierce takes a look around the lab. It’s a complete mess and the orb is gone. “Shit!” 
Zemo had just reached the floor that you and Rick were on and he took a moment to collect himself. He smooths back his hair and takes a deep breath as he adjusts the satchel. When the elevator opens, he steps out and glances around the room to find you and Rick. He finds the two of you off to the side, chatting with another couple. You could feel someone’s eyes on you, so as subtly as you, you peek over your shoulder to find that Zemo is the one staring at you. He nods at you curtly and you return your attention back to the conversation. The other guy, you’d long forgotten his name, was talking about some recent business trip. You wrap your hands around Rick’s arm and interrupt him. 
“Pardon me for interrupting but there’s something that just caught my attention that I would love to show my husband.” You flash him a smile that doesn’t quite reach your eyes. 
“Of course, we can talk later. It was a pleasure meeting you two.” It’s a shame he sounded so sincere. 
Him and Rick shake hands before you’re pulling Rick away to meet Zemo. Rick looks down at you before softly speaking in your ear. “Time to go?” 
“Yup.” You confirm. 
You meet Zemo right next to the Bugatti. “Do you have it?” 
“Of course. But we should leave soon, I’m sure my mess has been discovered by now.” Zemo answers quietly. Just as he was about to speak up again, a shout came from behind him. 
“There!” 
The three of you turn to see Brock and his men. They then begin shooting at you and the three of you duck behind the car. 
“I assume you have a way out of here?” Zemo inquires, holding both of his guns, he then takes a couple of shots at Brock and his men. Rick is doing the same thing. 
“Yeah but you’re not gonna like it.” You reply, causing Zemo to raise an eyebrow. “Get in the car.” You order. 
The two men do as they’re told as the three of you keep getting shot at. You take a moment to tear the bottom portion of your dress so you could move easier and you remove the wig from your head, tossing it to the ground. By tearing your dress, you also had better access to your thigh holster. You remove the small hand gun and you begin shooting as you make your way around to the driver’s side. When you get into the vehicle, you’re relieved to find the keys already in the ignition. You glance over at Rick before starting up the car and revving up the engine. Taking a peek in the rearview mirror, you smirk when you notice Brock’s expression of confusion. 
“What does she think she’s doing?” Brock asks aloud, more to himself than anyone else. 
You then shift the sportscar into drive and build up your speed as much as possible by driving around in a half circle around the room. If people weren’t running from the shoot off from moments ago, they were definitely running to get out of the way now. Before you know it, the car is smashing through the window of the building and is in midair. You swore you could hear the air leave not only your lungs but the others as well. Your grip on the steering wheel is so tight that it’s turning your knuckles white. When the car lands on the pavement of the bridge, it jerks the three of you around and the car loses control for a bit. You do your best to regain control of the vehicle and miraculously, you manage to do so. 
“Holy shit, I can’t believe that just worked!” Rick exclaimed as he tried to steady his breathing. 
As you sped off down the highway, Brock and his men stood at the now broken window, completely stunned. Brock continues to watch you speed off as the car gets smaller and smaller. 
“Follow them.” Brock orders before he turns and leaves his men to go report to Pierce. 
The two men that were beside Brock, glance at each other before looking out towards the bridge. Surely Brock wasn’t serious. 
The three of you were in an abandoned lot waiting for Zemo’s ride to come pick you up. You were on the phone with Jake and he was giving you the information you were wanting. You had the orb in hand and Jake was on speaker phone. 
“Alright, send the file through Jake.” You request and he does what he’s asked. 
“Sending file. Got it yet?” 
“Yes, I’ve got it. Playing it now.” 
The orb responds to the playing track and it begins to glow. Rick and Zemo were off to the side having their own conversation when Zemo takes interest in what’s happening with you and the orb. He walks over to you just as the orb releases a hologram of the world. THe hologram then zooms into Africa, showing glimpses of African wildlife before showing an image of the Mountain of God. The orb then dissipates the images and becomes dull. A thick silence fills the air as you realize where you have to go. 
“Y/n, are you still there?” Jake questions as he brings you out of your thoughts. 
“Yes, I’m still here.” 
“Do you know where to go then?” Jake inquires. 
“I do. We’ll be visiting some old friends in Wakanda.” You answer as you begin to put the orb back into Zemo’s satchel. 
“Wakanda, are you sure?” Jake verifies, making sure he heard you correctly. 
“Positive.” You pause and you begin to think it strange that Jake is questioning you. “Why are you questioning me Jake?” 
A brief moment of silence before he speaks up again. “No reason, no reason.” 
“Alright then. Contact T’Challa to meet us just outside of his village.” You instruct. 
“You got it.” 
You then hang up the phone and look at your partners. 
“So, Wakanda?” Rick inquires, stepping towards you. 
“Yes.” 
Just then, a black town car pulls into the empty lot and comes to a stop a few feet away. Zemo then collects the satchel before heading towards the car. 
“Wakanda it is then.” He says as he’s walking away. He stops when he realizes you and Rick aren’t following him causing him to turn around. “Well, are you two coming or not?” Zemo then continues to walk towards the town car. You and Rick glance over at each other before following suit. 
Jake groans as a gun is shoved into his side just as one leaves Edwin for the same reason. They were being pushed out of the house by Pierce and his men. The two men were then placed inside the back of a prisoner transport. Pierce and Brock were watching as they had their own conversation. 
“Getting into Wakanda won’t be easy.” Brock comments, watching the scene before him. 
“Leave that to me.” Pierce replies before walking towards his own vehicle.
5 notes · View notes
Text
Identity theft: Nairobi grapples with dreadlock theft trend
IN a disconcerting trend sweeping through Nairobi, incidents of dreadlock theft have left victims like Catherine Wambui grappling with a profound sense of loss and violation. Earlier this year, while on a bus in Nairobi, Wambui fell asleep only to awaken and discover a significant portion of her waist-length dreadlocks had been surreptitiously snipped away. ‘I felt like a part of me was ripped…
Tumblr media
View On WordPress
0 notes
hardynwa · 2 months
Text
Nigerian Newspapers: 10 things you need to know Thursday morning
Tumblr media
Good morning! Here is today’s summary from Nigerian Newspapers: 1. The Nigerian Communications Commission, NCC, has ruled out an extension of the February 28, 2024, deadline for the linkage of Subscriber Identity Module cards to National Identification Numbers. As a result, telecommunication companies have been directed to bar 12 million lines which have not been linked to the owners’ NINs after the expiration of the deadline. 2. President Bola Tinubu, on Wednesday, appealed for patience from Nigerians over the current economic hardship in the country, giving the assurance that there was light at the end of the tunnel. The President said he was fully aware and took responsibility for the difficulties Nigerians had been subjected to on account of government policies. 3. The Minister of Information and National Orientation, Mohammed Idris, on Wednesday, said the importation of Premium Motor Spirit, popularly called petrol, into Nigeria has reduced by 50 per cent since the withdrawal of subsidy on the commodity. 4. The military Joint Task Force, North-West Operation Hadarin Daji, said on Wednesday that it neutralised scores of bandits and rescued eight kidnapped victims in Zamfara State. The Information Officer of Operation Hadarin Daji, Lt. Col. Suleiman Omale, stated this in a statement on Wednesday in Gusau. 5. The war against illegal oil bunkering and oil theft received a huge boost on Wednesday as troops of the 6 Division, Nigerian Army, Port Harcourt, uncovered over 40 dugout crude oil wells in Rumuekpe community, Emohua Local Government Area of Rivers State. The troops uncovered the site during a sweep-and-clear operation on the Trans Niger Delta Pipeline. 6. Operatives of the Edo State Police Command have arrested five suspected cultists, Emeka Eke, Chizoba Okolie, Samson Ochonobor, Friday Agbebayo and Julius Eguasa, for engaging in a street fight in Edo State. It was gathered that the suspects, alleged to be members of the Eiye Confraternity, engaged in street fighting at the Ramat Park area over failure to pay monthly dues and attend meetings of Eiye confraternity. 7. Two Binance executives — an American and a British- Pakistani — have been detained on the orders of National Security Adviser, NSA Nuhu Ribadu over alleged involvement in foreign exchange manipulations. It was learnt last night that the Federal Government obtained a Court Warrant to detain the men for 12 days, pending further investigation by the Economic and Financial Crimes Commission, EFCC. 8. An Executive Order to “significantly reduce the cost of drugs and pharmaceutical products” in the country will soon be signed by President Bola Ahmed Tinubu. Health and Social Welfare Minister, Muhammed Pate stated these on Wednesday during the second edition of the Ministerial Press Briefing Series in Abuja. 9. Mobile Network Operators (MNOs) apologised yesterday to their subscribers for the service hitches they have experienced for some days. The MNOs, under the aegis of the Association of Licensed Telecoms Operators of Nigeria, ALTON, blamed the service disruptions on “severe fibre cuts” by contractors. 10. The Federal Government has allayed the fear of job loss with the implementation of the Oronsaye Report. Speaking at the fourth edition of the Ministerial Press Briefing Series in Abuja on Wednesday, Minister of Information and National Orientation, Mohammed Idris, said the implementation of the report would not lead to retrenchment. Read the full article
0 notes
ftechiz · 5 months
Text
10 Real Examples of How Blockchain Is Ruling Over the World.
Tumblr media
From being the base of cryptocurrency, blockchain technology is now transforming various industries across the globe. Now let us take a look at 10 practical manifestations in which power of blockchain prevails. The need for the right blockchain development service company, Blockchain Development Service Company hiring and how to find a good blockchain developer is crucial here. Financial Revolution with Blockchain Development Services: The blockchain technology had a hand in the transformation of the finance sector by ensuring fast, secure, transparent and without any intermediaries to oversee the financial transactions. The emerging blockchain development companies have availed decentralized finance (DeFi), restructuring borrowing, deposit, and investment. Supply Chain Transparency and the Role of the Best Blockchain Development Company: The blockchain ensures transparency, traceability as well as verification of authenticity in supply chains. With blockchain development services, companies can trace a product’s journey from its source to the consumer to guarantee quality and originality. Healthcare Innovation and the Need to Hire Blockchain Developers: Blockchain protects the medical records of patients, enables effective data management and integrity of information in the process. Blockchain is currently becoming popular in the provision of health care. The companies offering the services are ensuring that there are privacy, accuracy, and transparencies when delivering solutions for interoperability. Smart Contracts in Legal Sector Facilitated by Blockchain Development Services: Smart contracts are adopted in the legal field to ensure that there is no need to use middlemen as the deals are automatically performed. Top blockchain development companies bring innovations as they come up with smart, self-enforcing contracts that fit many spheres of life. Identity Verification Solutions Offered by Blockchain Development Companies: The decentralized solution provided by blockchain-enhanced identity verification services reduces identity theft potentialities. In cases whereby trusted entities like banks use a blockchain for building systems for digital ID or secure authentication.
Real Estate Transformation Driven by Blockchain Development Services: The real estate market is interrupted by blockchain technology as it makes property transaction easier, transparent, and fraud free. Specialist companies offer blockchain based solutions for fast and safe property transactions. Asset Tokenization Enabled by the Best Blockchain Development Company: In this respect, best blockchain development companies help turn traditionally illiquid assets such as real estate, gold, stocks, and art into non-fungible tokens, which enable fractional ownership and liquidity. Blockchain in E-Governance and Secure Voting Systems: Blockchain provides a basis for tamper-free e-government systems as well as safe online elections which allow one to eliminate corruption. Blockchain innovators develop solutions for free and fair elections. Energy Sector Optimization through Blockchain Development Services in India: Blockchain technology is used by energy firms in energy trading where they have transparent prices and can trade efficiently. Due to blockchain development services, we have peer-to-peer power exchanges and distributed grid. Entertainment and Copyright Protection Supported by Blockchain Development Services: Content creators are empowered with blockchain as it protects their work as well as ensures fair royalty distribution. They provide forums where IP right owners can be protected. It will now be important to get a choice of the best blockchain development company in this age of unbounded potential of blockchain. Adept blockchain developers are the first key to opening up this revolutionary technology which will herald innovation and a new age change sweeping across sectors of the economy worldwide.
0 notes
ovpwebnetwork · 6 months
Text
FOR IMMEDIATE RELEASE:
November 6, 2023
Media Contact:
Danny Wimmer
Anti-Robocall Multistate Litigation Task Force Issues Warning Letters to Eight VoIP Providers
LANSING – Last week, the Anti-Robocall Multistate Litigation Task Force issued warning letters to eight Voice over Internet Protocol (VoIP) providers that transmit calls across the nation, and appear to continue transmitting suspected illegal robocall traffic on behalf of one or more clients, announced Michigan Attorney General Dana Nessel. Per the warning letters, the targeted VoIP providers do not “appear to have taken sufficient steps … to identify, investigate, and mitigate suspected illegal call traffic that is accepted onto, and transmitted across,” the provider’s network.
The warning letters are “intended to serve as additional notification” to the VoIP providers “about the Task Force’s continuing concerns regarding its call traffic, and to caution” the providers they “should cease transmitting any illegal traffic immediately.” They were issued to the following providers:
All Access Telecom, Inc.,
Lingo Telecom, LLC,
NGL Communications, LLC,
Range, Inc.,
RSCom Business, LLC,
Telcast Network, LLC,
ThinQ Technologies, Inc., and
Telcentris , Inc. dba Voxox.
Attorney General Nessel announced the formation of the Task Force in August 2022. The nationwide Task Force is comprised of 50 attorneys general and was formed to investigate and take legal action against the telecommunications companies responsible for bringing a majority of foreign robocalls into the United States. This bipartisan nationwide Task Force has one goal: to cut down on illegal robocalls.
For any Michigan residents who suspect they may have been the victim of identity theft perpetrated by robocalls or other means, or would like to learn more about how to protect themselves, the Department has guidance for Identity Theft Prevention and Recovery available on its website. The Department has also issued guidance on Michigan’s telemarking laws and the Do Not Call Registry.
Attorney General Nessel has established her own in-state initiative to crackdown on Robocalls. According to the National Consumer Law Center and Electronic Privacy Information Center, over 33 million scam robocalls are made to Americans every day. These scam calls include Social Security Administration fraud against seniors, Amazon scams against consumers, and many other scams targeting all consumers, including some of our most vulnerable citizens. An estimated $29.8 billion dollars was stolen through scam calls in 2021. Most of this scam robocall traffic originates overseas. Since 2019, a substantial reduction in Do Not Call Registry complaints from Michigan residents has been recorded and reported by the Federal Trade Commission (FTC).
Alongside the FTC, Attorney General Nessel announced the nationwide Operation Stop Scam Calls in July of this year, a 50-state law enforcement sweep to crackdown on illegal telemarketing targeting operations responsible for billions of calls to U.S. consumers.
Attorney General Nessel offers the following tips to avoid scams and unwanted calls:
Be wary of callers who ask you to pay by gift card, wire transfer, or cryptocurrency. For example, the Internal Revenue Service does not accept iTunes gift cards.
Look out for prerecorded calls from imposters posing as government agencies. Typically, the Social Security Administration does not make phone calls to individuals.
If you suspect fraudulent activity, immediately hang-up and do not provide any personal information.
Contact our Consumer Protection Team at 877-765-8388.
File a Do Not Call or Text complaint here.
In March of 2023, Nessel won judgments shutting down a massive robocall operation based in Texas. The company’s owners had directed billions of illegal robocalls to people across the country and had bombarded Michigan consumers with more than 42 million robocalls in 2019 alone, including more than 19 million calls to people whose numbers were on the Do Not Call list. A judgement was secured against other parties involved in this scheme in August 2023. Nessel most recently joined a coalition of state attorneys general calling on the Federal Communications Commission (FCC) to clarify the rules requiring telemarketers to obtain consent from a consumer before making robocalls.
Nessel also has joined a multistate lawsuit against Avid Telecom for allegedly initiating and facilitating billions of illegal robocalls to millions of people and violating the Telephone Consumer Protection Act, the Telemarketing Sales Rule, and other federal and state telemarketing and consumer laws. Avid Telecom is alleged to have sent or transmitted more than 7.5 billion calls to telephone numbers on the National Do Not Call Registry.
In 2022, Nessel hosted the Second Annual Robocall Summit along with Ohio AG Dave Yost. The summit highlighted the problem of robocalls, what Michigan has accomplished in its efforts, and discussed tools to help reduce robocall numbers. Also in 2022, Nessel partnered with YouMail, a platform that uses traceback technology to determine the source of robocalls.
In addition, AG Nessel has joined efforts to cut down on unwanted text messages by supporting the FCC’s proposal to require wireless providers to block texts from invalid, unassigned, or unused numbers and from numbers on a Do Not Originate list. This is consistent with the Attorney General’s belief that the FCC’s illegal text message enforcement should be in line with its enforcement of illegal robocalls.
AG Nessel is committed to further reducing the number of illegal robocalls and texts coming to Michigan residents so that they become part of our state’s distant past.
The Michigan Department of Attorney General accepts complaints about robocalls via its online complaint form.
0 notes
sweeping1 · 6 months
Text
Sweeping for Bugs: Protecting Your Privacy and Security in the Digital Age
In today's fast-paced digital world, where technology constantly evolves, ensuring your privacy and security is paramount. One method gaining popularity is "Sweeping for Bugs." This proactive approach involves searching for hidden surveillance devices or bugs that could compromise your personal or professional space. In this article, we will delve into the benefits of Sweeping For Bugs and why it has become a crucial practice in safeguarding sensitive information.
Peace of Mind: Knowing that your home, office, or personal spaces are bug-free provides peace of mind. It eliminates the fear of someone eavesdropping on your private conversations or stealing sensitive data.
Protection from Information Theft: Bugs can be used to gather sensitive information, such as credit card numbers, passwords, or trade secrets. Regular bug sweeps prevent unauthorized access to this information, protecting your identity and business interests.
Maintaining Confidentiality: In professional environments, confidentiality is vital. Sweeping for bugs ensures that confidential meetings and discussions remain private, preserving the integrity of your business and relationships.
Upholding Reputations: Individuals and businesses alike can suffer significant reputational damage if their private conversations or activities are exposed. Bug sweeps help in upholding reputations by preventing malicious surveillance attempts.
Preventing Corporate Espionage: For businesses, especially those involved in high-stakes industries, corporate espionage is a real threat. Regular bug sweeps can thwart attempts by competitors or adversaries to gain access to proprietary information, giving your company a competitive edge.
Legal Compliance: Certain industries, such as healthcare and finance, have strict regulations regarding the protection of client information. Regular bug sweeps ensure compliance with these regulations, preventing potential legal issues and penalties.
Maintaining Technological Vigilance: With the rapid advancement of surveillance technology, staying ahead of potential threats is essential. Regular bug sweeps allow individuals and businesses to maintain technological vigilance and adapt their security measures accordingly.
Detecting Advanced Surveillance Devices: Modern surveillance devices are becoming incredibly sophisticated, making them harder to detect. Bug sweeps employ advanced technology to identify even the most covert and advanced surveillance devices, ensuring comprehensive protection.
Preserving Intellectual Property: Innovation drives progress, but it also attracts intellectual property theft. Companies investing heavily in research and development can preserve their inventions and innovations by ensuring their offices and labs are bug-free, safeguarding their intellectual property from prying eyes.
Securing Sensitive Meetings: High-profile meetings involving executives, government officials, or public figures are often targeted by eavesdroppers. Sweeping for bugs guarantees the security of these crucial discussions, fostering open communication without the fear of leaks.
Protecting Personal Devices: Smartphones, tablets, and laptops can be vulnerable to spyware. Regular bug sweeps extend beyond physical spaces, encompassing electronic devices, ensuring that your digital conversations and activities remain private and secure.
0 notes
techssavvy · 10 months
Text
Cryptocurrency vs. Traditional Banking: The Battle for Financial Dominance
Tumblr media
Introduction:
In the realm of finance, a captivating tango is taking place as cryptocurrencies disrupt the established rhythms of traditional banking. Blockchain-powered cryptocurrencies like Bitcoin and Ethereum have surged onto the scene, sparking intense discussions about the future of monetary transactions. In this blog post, we embark on an exploration of the enthralling interplay between cryptocurrencies and traditional banking, unraveling their distinctive qualities, unparalleled advantages, and the potential implications for the financial landscape.
Decoding Cryptocurrency:
Cryptocurrency, the embodiment of digital ingenuity, represents a new era of currency fueled by cryptographic techniques. Unlike traditional banking, which relies on centralized intermediaries, cryptocurrencies operate within a decentralized network, guided by the innovative power of blockchain technology.
Contrasting Philosophies: Centralization vs. Decentralization
Traditional banking, with its hierarchical structure, revolves around intermediaries that oversee transactions and govern the flow of funds. In stark contrast, cryptocurrencies embrace the ethos of decentralization, fostering direct peer-to-peer transactions on a global scale, liberating financial interactions from the confines of traditional intermediaries.
Transparency and Security:
At the heart of cryptocurrencies lies the ingenious blockchain technology, an immutable ledger that ensures transparency and security. Each transaction, etched in the public ledger, bolsters security and shields against fraud and tampering, creating an impregnable fortress that protects against unauthorized alterations.
Driving Financial Inclusion:
Cryptocurrencies emerge as an equalizing force, enabling financial inclusion for individuals traditionally left on the fringes of the banking world. By embracing cryptocurrencies, people gain access to financial services with the power of a smartphone and internet connectivity, breaking down barriers and empowering underserved communities.
Advantages and Challenges:
Swift Transactions and Global Connectivity:
Cryptocurrencies orchestrate a symphony of rapid and borderless transactions, sweeping away the inefficiencies and exorbitant fees associated with traditional banking. Through their near-instantaneous transfers, cryptocurrencies transcend geographical boundaries, fostering a harmonious symphony of cost-effective global transactions.
Tumblr media
Security and Privacy:
Cryptocurrencies take center stage in prioritizing security through sophisticated cryptographic techniques, fortifying against fraud and identity theft. Moreover, cryptocurrency transactions offer an enchanting veil of privacy, allowing users to control the extent of personal information shared during transactions, nurturing a sense of trust and safeguarding against data breaches and intrusive surveillance.
Navigating Volatility and Regulation:
Cryptocurrencies, known for their captivating volatility, dance to a tune influenced by market speculation. Traditional banking, in contrast, orchestrates a more predictable rhythm through stable financial instruments regulated by established frameworks. Balancing the need for regulations to foster innovation while ensuring consumer protection becomes a key challenge on this ever-evolving stage.
Trust and Adoption:
Traditional banking, an embodiment of financial tradition, basks in the warmth of deep-rooted trust and widespread adoption. Cryptocurrencies, still in their early acts, strive to earn their place on the global stage. However, as public awareness grows and confidence in cryptocurrencies takes root, their magnetic allure as a viable alternative to traditional banking grows stronger.
The Future Landscape:
Cryptocurrencies and traditional banking, in their captivating dance, need not be viewed as adversaries but rather as dance partners moving to a symphony of innovation and stability. Forward-thinking financial institutions are beginning to embrace cryptocurrencies, forging a graceful fusion that marries the advantages of decentralization with the solid foundation and infrastructure of traditional banking.
Conclusion:
The clash between cryptocurrencies and traditional banking unfolds as an enthralling dance, a dynamic interplay between innovation and stability. Cryptocurrencies embody the spirit of decentralization, security, and financial inclusion, while traditional banking provides a bedrock of stability, regulatory frameworks, and established trust. As the future unfolds, a harmonious coexistence between the two realms becomes increasingly feasible, birthing innovative financial solutions that cater to diverse needs and orchestrate a new symphony in the world of finance. The captivating dynamics of this relationship will redefine the future of monetary transactions, creating an everlasting impact where technology and tradition gracefully embrace on the grand stage of finance.
0 notes
masterofd1saster · 11 months
Text
CJ court watch
SCt decided Dubin v. United States, 599 U. S. ___ (2023), an identity theft case, on 8jun23.  Decision was more or less unanimous.  J. Sotomayor wrote for the Court.  Good opinion.  J. Gorsuch had a really smart concurrence.
There is no dispute that petitioner David Fox Dubin overbilled Medicaid for psychological testing. The question is whether, in defrauding Medicaid, he also committed “[a]ggravated identity theft,” 18 U. S. C. §1028A(a)(1), triggering a mandatory 2-year prison sentence. The Fifth Circuit found that he did, based on a reading of the statute that covers defendants who fraudulently inflate the price of a service or good they actually provided. On that sweeping reading, as long as a billing or payment method employs another person’s name or other identifying information, that is enough. A lawyer who rounds up her hours from 2.9 to 3 and bills her client electronically has committed aggravated identity theft. The same is true of a waiter who serves flank steak but charges for filet mignon using an electronic payment method. 
The text and context of the statute do not support such a boundless interpretation. Instead, §1028A(a)(1) is violated when the defendant’s misuse of another person’s means of identification is at the crux of what makes the underlying offense criminal, rather than merely an ancillary feature of a billing method. Here, the crux of petitioner’s overbilling was inflating the value of services actually provided, while the patient’s means of identification was an ancillary part of the Medicaid billing process. 
David Dubin helped his father manage a psychological services company. This company submitted a claim for reimbursement to Medicaid for psychological testing by a licensed psychologist. In fact, however, the claim overstated the qualifications of the employee who actually performed the testing and who was only a licensed psychological associate. This falsehood inflated the amount of reimbursement. Petitioner also changed the date on which the examination occurred.1 Even with the inflation, the total reimbursement was only $338. App. 49. Petitioner was accordingly charged with healthcare fraud, a federal offense under 18 U. S. C. §1347. According to the Government, however, petitioner’s conduct also constituted “[a]ggravated identity theft” under §1028A(a)(1).***
The Government has, by its own admission, wielded §1028A(a)(1) well beyond ordinary understandings of identity theft. One prosecution targeted a defendant who “made a counterfeit handgun permit” for another person, using that person’s real name and at that person’s request. United States v. Spears, 729 F. 3d 753, 754 (CA7 2013) (en banc). Another involved unlicensed doctors who violated the law by “issu[ing] prescriptions that their [actual] patients would then fill at . . . pharmacies.” United States v. Berroa, 856 F. 3d 141, 148, 155–156 (CA1 2017).***
Such is the case here. Section 1028A(a)(1)’s title and terms both point to a narrower reading, one centered around the ordinary understanding of identity theft. This cuts against the Government’s broad reading, which the Government admits bears little relationship to the common understanding of identity theft. In contrast, a more targeted reading accurately captures the ordinary understanding of identity theft, where misuse of a means of identification is at the crux of the criminality. 
Start at the top, with the words Congress chose for §1028A’s title: “Aggravated identity theft.” 118 Stat. 831. This Court has long considered that “‘the title of a statute and the heading of a section’ are ‘tools available for the resolution of a doubt’ about the meaning of a statute.”***
the Government claims that because petitioner’s overbilling was facilitated by the patient’s Medicaid reimbursement number, §1028A(a)(1) automatically applies. Patient names or other identifiers will, of course, be involved in the great majority of healthcare billing, whether Medicare for massages, Hong, 938 F. 3d, at 1051, or for ambulance stretcher services, Medlock, 792 F. 3d, at 706.***
Nor are these implications confined to healthcare. Section 1028A(a)(1)’s predicates include a vast array of offenses, including wire fraud and mail fraud. §1028A(c)(5). The Government’s boundless reading of “uses” and “in relation to” would cover facilitating mail fraud by using another person’s name to address a letter to them.***
If more were needed, a final clue comes from the staggering breadth of the Government’s reading. This Court has “‘traditionally exercised restraint in assessing the reach of a federal criminal statute.’”***
The Government’s reading would sweep in the hour-inflating lawyer, the steak-switching waiter, the building contractor who tacks an extra $10 onto the price of the paint he purchased. So long as they used various common billing methods, they would all be subject to a mandatory two years in federal prison.***
A defendant “uses” another person’s means of identification “in relation to” a predicate offense when this use is at the crux of what makes the conduct criminal. To be clear, being at the crux of the criminality requires more than a causal relationship, such as “‘facilitation’” of the offense or being a but-for cause of its “success.” Post, at 3, 5–6 (GORSUCH, J., concurring in judgment). Instead, with fraud or deceit crimes like the one in this case, the means of identification specifically must be used in a manner that is fraudulent or deceptive. Such fraud or deceit going to identity can often be succinctly summarized as going to “who” is involved.10 
Here, petitioner’s use of the patient’s name was not at the crux of what made the underlying overbilling fraudulent. The crux of the healthcare fraud was a misrepresentation about the qualifications of petitioner’s employee. The patient’s name was an ancillary feature of the billing method employed. The Sixth Circuit’s more colloquial formulation is a helpful guide, though like any rule of thumb it will have its limits. Here, however, it neatly captures the thrust of the analysis, as petitioner’s fraud was in misrepresenting how and when services were provided to a patient, not who received the services.***
JUSTICE GORSUCH, concurring in the judgment. 
Whoever among you is not an “aggravated identity thief,” let him cast the first stone. The United States came to this Court with a view of 18 U. S. C. §1028A(a)(1) that would affix that unfortunate label on almost every adult American. Every bill splitter who has overcharged a friend using a mobile-payment service like Venmo. Every contractor who has rounded up his billed time by even a few minutes. Every college hopeful who has overstated his involvement in the high school glee club. All of those individuals, the United States says, engage in conduct that can invite a mandatory 2-year stint in federal prison. The Court today rightly rejects that unserious position. But in so holding, I worry the Court has stumbled upon a more fundamental problem with §1028A(a)(1). That provision is not much better than a Rorschach test. Depending on how you squint your eyes, you can stretch (or shrink) its meaning to convict (or exonerate) just about anyone. Doubtless, creative prosecutors and receptive judges can do the same. Truly, the statute fails to provide even rudimentary notice of what it does and does not criminalize. We have a term for laws like that. We call them vague. And “[i]n our constitutional order, a vague law is no law at all.” United States v. Davis, 588 U. S. ___, ___ (2019) (slip op., at 1).***
0 notes
energypowersaver · 1 year
Text
Smart Meter Home Display NSW
Tumblr media
Smart meters are a great way to keep track of your energy use and manage your bills. They come with an in-home display (IHD) that shows your usage in real time.
A smart meter can help you understand how your power consumption is changing and can help you change your habits to save money. It also can lead to better billing and pricing options in the future. To know more about Smart Meter Home Display, visit the Energy Power Saver website or call 69650912468.
A smart meter home display NSW is an in-home device that shows energy usage data. It’s an affordable way to stay on top of your electricity usage and costs between 70p and PS1 a year to run.
The smart meter collects your electricity usage data, and then sends it to your energy retailer and electricity distributor over secure and private networks. Your data is then protected by the Australian Government’s National Electricity Law and the Privacy Act 1988.
It can also help you find a better plan to suit your lifestyle and budget. In Victoria, you can use the government’s Victorian Energy Compare service to upload your smart meter data, along with information about your household and current electricity market offers, to find an optimal electricity retail plan.
A smart meter can save you money in two main ways: it can help you choose between flat rates and new flexible electricity pricing, or it can give you access to a time of use tariff that charges different prices for electricity at different times. This type of energy tariff is cheaper during off-peak periods (overnight and on weekends) but more expensive during peak periods.
Smart meters come with an in-home display (IHD) that shows energy consumption at a glance, expressed in pounds and pence. This makes it easier to monitor energy use and identify where you could be wasting electricity.
Smart meter home displays also enable households to take part in demand response programs, which help reduce pressure on the power grid during peak hours. This is an important way for households to save money and reduce the impact of their energy usage on the environment.
Smart meters also eliminate estimated billing as they regularly send readings to your energy supplier, which means you receive accurate bills. If you want to make the most of this technology, you should check with your energy supplier whether they offer an accessible IHD.
Smart meters measure electricity usage in half-hour intervals and send that data to your energy retailer, without you needing to have a meter reader visit your property. This makes it easier to monitor your power consumption and helps you work out ways to reduce your energy use.
Depending on your smart meter, you may be able to see this information through an online site, app or in a home display NSW that is linked to your smart meter. Your energy supplier will provide you with this information, which can save you money on your electricity bill.
Most smart meters in Australia are 'type 4' meters (digital meters) which record and send energy usage data to distributors at least every half hour. This makes it easier for customers to track their power consumption and work out how to reduce their use, especially if they are on time-of-use pricing (TOU).
As more power companies and utilities begin to install "smart" meters that collect energy usage data moment by moment, privacy advocates are warning of the sweeping effects these devices could have on home life. These meter data points paint an intimate picture of what a household does and when: what appliances they use, who comes and goes, what the weather is like.
This information may be used by multiple entities, including network operators and third-party energy management assistance programs that offer their own services to consumers. This could result in a variety of privacy issues, from identity theft to behavior tracking and even surveillance.
These issues can be addressed by implementing privacy engineering technologies such as encryption and privacy notices. The latter will also help ensure that consumers understand how their data is being used and can consent to it. To know more about Smart Meter Home Display, visit the Energy Power Saver website or call 69650912468.
0 notes