thunder-shadow
thunder-shadow
axtumn
3K posts
solarballs fanfiction writer | 22F | i delete posts a lot
Don't wanna be here? Send us removal request.
thunder-shadow · 5 hours ago
Text
me: oh cool, a new thing to enjoy! can we just enjoy this please?
my brain: we must become obsessed
me: why?
my brain: because without this content, we will die
me: *nodding* without this content, we will die
565 notes · View notes
thunder-shadow · 18 hours ago
Text
Tumblr media
i got a love (and i know that it's all mine) by thunder_shadow - SolarBalls (Web Series) https://archiveofourown.org/works/65255548
here have more jupixturn fantasy au 😘 hehe it's fun writing these three again
3 notes · View notes
thunder-shadow · 1 day ago
Text
uranus being the one to unintentionally give jupiter the idea of keeping the asteroid belt in place is KILLINGGG me
15 notes · View notes
thunder-shadow · 2 days ago
Note
What is your favorite Rocky, Giant, Moon and Dwarf. And Why.
favorite rocky is earth!! I’ve just loved him from the start idk whyyy
favorite giant is uranus bc he reminds me of me and I want to squish his face and put him in a box and keep him forever
favorite moon is between Titania and Luna tbh,,, Luna bc I really like how he’s personified in the show, and same for Titania (she also reminds me of me funnily enough)
favorite dwarf?? I don’t really think about them a lot but I’d say Pluto just bc he’s the only one I really DO think abt lol
11 notes · View notes
thunder-shadow · 2 days ago
Note
Hi! I know I invade your ask box a lot, but I had another question. Is it ok if I make art for one of your fics? I just got a concept in my mind for it and really want to make something. Only if that’s ok with you of course!
hiii :D I don’t mind at all, fanart will always make me ludicrously happy haha 💖💖💖💖
3 notes · View notes
thunder-shadow · 2 days ago
Text
also uranus saying “the rocky planets become the rocky tombstones” he’s been making bad jokes his entire life the moon one was just him having fun 😭😭😭😭
I LOVE HIM SM 😭😭😭😭
41 notes · View notes
thunder-shadow · 2 days ago
Text
Tumblr media Tumblr media
this man has been yearning for billions of years somebody save him
54 notes · View notes
thunder-shadow · 2 days ago
Text
Tumblr media Tumblr media
same thing different fonts
41 notes · View notes
thunder-shadow · 2 days ago
Text
Tumblr media
every so often I come across a song that I think fits a very specific interpretation of a character that is not canon and it’s all I can think about for like an hour
5 notes · View notes
thunder-shadow · 3 days ago
Text
Tumblr media
would you?
93K notes · View notes
thunder-shadow · 3 days ago
Text
Tumblr media
one year ago today i uploaded my first solarballs fic!!!
236 fics and 1.4m words later and I'm still here XD
6 notes · View notes
thunder-shadow · 3 days ago
Text
Cybercriminals are abusing Google’s infrastructure, creating emails that appear to come from Google in order to persuade people into handing over their Google account credentials. This attack, first flagged by Nick Johnson, the lead developer of the Ethereum Name Service (ENS), a blockchain equivalent of the popular internet naming convention known as the Domain Name System (DNS). Nick received a very official looking security alert about a subpoena allegedly issued to Google by law enforcement to information contained in Nick’s Google account. A URL in the email pointed Nick to a sites.google.com page that looked like an exact copy of the official Google support portal.
As a computer savvy person, Nick spotted that the official site should have been hosted on accounts.google.com and not sites.google.com. The difference is that anyone with a Google account can create a website on sites.google.com. And that is exactly what the cybercriminals did. Attackers increasingly use Google Sites to host phishing pages because the domain appears trustworthy to most users and can bypass many security filters. One of those filters is DKIM (DomainKeys Identified Mail), an email authentication protocol that allows the sending server to attach a digital signature to an email. If the target clicked either “Upload additional documents” or “View case”, they were redirected to an exact copy of the Google sign-in page designed to steal their login credentials. Your Google credentials are coveted prey, because they give access to core Google services like Gmail, Google Drive, Google Photos, Google Calendar, Google Contacts, Google Maps, Google Play, and YouTube, but also any third-party apps and services you have chosen to log in with your Google account. The signs to recognize this scam are the pages hosted at sites.google.com which should have been support.google.com and accounts.google.com and the sender address in the email header. Although it was signed by accounts.google.com, it was emailed by another address. If a person had all these accounts compromised in one go, this could easily lead to identity theft.
How to avoid scams like this
Don’t follow links in unsolicited emails or on unexpected websites.
Carefully look at the email headers when you receive an unexpected mail.
Verify the legitimacy of such emails through another, independent method.
Don’t use your Google account (or Facebook for that matter) to log in at other sites and services. Instead create an account on the service itself.
Technical details Analyzing the URL used in the attack on Nick, (https://sites.google.com[/]u/17918456/d/1W4M_jFajsC8YKeRJn6tt_b1Ja9Puh6_v/edit) where /u/17918456/ is a user or account identifier and /d/1W4M_jFajsC8YKeRJn6tt_b1Ja9Puh6_v/ identifies the exact page, the /edit part stands out like a sore thumb. DKIM-signed messages keep the signature during replays as long as the body remains unchanged. So if a malicious actor gets access to a previously legitimate DKIM-signed email, they can resend that exact message at any time, and it will still pass authentication. So, what the cybercriminals did was: Set up a Gmail account starting with me@ so the visible email would look as if it was addressed to “me.” Register an OAuth app and set the app name to match the phishing link Grant the OAuth app access to their Google account which triggers a legitimate security warning from [email protected] This alert has a valid DKIM signature, with the content of the phishing email embedded in the body as the app name. Forward the message untouched which keeps the DKIM signature valid. Creating the application containing the entire text of the phishing message for its name, and preparing the landing page and fake login site may seem a lot of work. But once the criminals have completed the initial work, the procedure is easy enough to repeat once a page gets reported, which is not easy on sites.google.com. Nick submitted a bug report to Google about this. Google originally closed the report as ‘Working as Intended,’ but later Google got back to him and said it had reconsidered the matter and it will fix the OAuth bug.
10K notes · View notes
thunder-shadow · 3 days ago
Text
not to be insensitive but some of the salem witch trials were so funny bitches like “i saw her at the devils sacrament!!!” girl... what were YOU doing at the devils sacrament 👀
509K notes · View notes
thunder-shadow · 3 days ago
Text
every writing tip article and their mother: dont ever use adverbs ever!
me, shoveling more adverbs onto the page because i do what i want: just you fucking try and stop me
243K notes · View notes
thunder-shadow · 3 days ago
Text
they invented a new low just for me
13K notes · View notes
thunder-shadow · 3 days ago
Text
legitimately my first feminist awakening as a ten year old child was realizing that girls were expected to respect “boy stuff” but boys were never expected to respect “girl stuff”
127K notes · View notes
thunder-shadow · 3 days ago
Text
Tumblr media Tumblr media Tumblr media Tumblr media Tumblr media
THE GOOD PLACE (2016 - 2020) I 3.07 - A Fractured Inheritance
16K notes · View notes