܀𓂃 Kaori Fujisawa ‎𓈒𓏸𑁍
@layla1988.bsky.social
420 followers 320 following 4.1K posts
Forensic and Litigation Consulting Paralegal Anti-Money Laundering Counter Fraud, Risk Compliance and Audit Analyst Criminal Intelligence Analyst Junior Cyber & Electronic Warfare Modeling & Simulation Engineer Electronic Warfare Test Engineer
Posts Media Videos Starter Packs
Pinned
layla1988.bsky.social
I respect everyone's different political positions, beliefs, political ideas, and I will listen
—I disapprove of what you say, but I will defend to the death your right to say it.
Reposted by ܀𓂃 Kaori Fujisawa ‎𓈒𓏸𑁍
zackwhittaker.com
This one's a wild/messy one: Cyber giant F5, which serves most of the Fortune 500, said unknown government hackers had 'long term' access to its network:

• stole source code, some customer data
• accessed undisclosed vulns in BIG-IP
• DOJ allowed F5 to delay public notice citing national security
Cyber giant F5 Networks says government hackers had 'long-term' access to its systems, stole code and customer data | TechCrunch
The company, which provides cybersecurity defenses to most of the Fortune 500, said the DOJ allowed it to delay notifying the public on national security grounds.
techcrunch.com
layla1988.bsky.social
He’s trying to turn victimhood into proof of virtue, as if right-wing violence is reactive and left-wing violence ideological.

Listening to him talk is utterly meaningless.

You learn nothing from it.

All day long, it's just toddlers cognitive manipulation to fool the voters.
layla1988.bsky.social
“Political violence is mostly from the left.” (unsupported assertion) —Left bad, right misunderstood.”
That’s emotional framing, not reasoning — designed for automatic agreement, not thought.
atrupar.com
Vance: "Political violence, it's just a statistical fact that it's a bigger problem on the left. If you had, god forbid, somebody on the left who was assassinated, I'm sure you could find one person who would maybe celebrate it, but the fact that it became mainstream to celebrate Charlie's death..."
layla1988.bsky.social
Use spam filters / fraud alerts — both on phones (SMS spam filtering) and through your bank/credit card provider
layla1988.bsky.social
Check URLs closely — fake sites often use slightly misspelled or odd domain names.
Never share your OTP / one-time passwords in response to unsolicited messages. Even if the OTP is asked to “verify” something, it may be used to enhance fraud.

www.wsj.com/tech/cyberse...
Exclusive | Chinese Criminals Made More Than $1 Billion From Those Annoying Texts
Messages seeking payment for unpaid tolls or postage fees prompt victims to hand over credit-card information, which gangs use to buy gift cards and luxury goods.
www.wsj.com
Reposted by ܀𓂃 Kaori Fujisawa ‎𓈒𓏸𑁍
campuscodi.risky.biz
-California regulates AI
-UK Crypt-Key goes live
-Taiwan warns of "abnormal" social media accounts
-China offers reward for Taiwan's psychological warfare unit
-Australia, UK publish annual cyber threat reports
-SonicWall SSLVPN mass-compromise
-Another surveillance provider exposed (Cyber WAP)
Reposted by ܀𓂃 Kaori Fujisawa ‎𓈒𓏸𑁍
agreenberg.bsky.social
For the latest episode of Hacklab, we carried out one of the more fun and stressful hacking experiments of my career: We hacked a casino card shuffler to help me cheat in a game of poker against unsuspecting players in Vegas. www.youtube.com/watch?v=JQ20...
I Cheated At Poker By Hacking A Casino Card Shuffling Machine | Hacklab | WIRED
YouTube video by WIRED
www.youtube.com
Reposted by ܀𓂃 Kaori Fujisawa ‎𓈒𓏸𑁍
agreenberg.bsky.social
A lot of this data, such as the T-Mobile leak, is now encrypted thanks to the researchers' work. But all of it was obtained from a single dish on the roof of a building in San Diego. These findings are based on just 15% of geostationary satellite signals over the US and Mexico.
Reposted by ܀𓂃 Kaori Fujisawa ‎𓈒𓏸𑁍
agreenberg.bsky.social
Most striking to me was that the data included phone calls and text messages from several US and Mexican phone carriers. Remote cell towers connect to core carrier networks via satellite, relaying conversations via space—sometimes with no encryption.
Reposted by ܀𓂃 Kaori Fujisawa ‎𓈒𓏸𑁍
agreenberg.bsky.social
Researchers pointed a satellite dish at the sky for 3 years and monitored what unencrypted data it picked up. The results were shocking: They obtained thousands of T-Mobile users' phone calls and texts, military and law enforcement secrets, much more: www.wired.com/story/satell... 🧵👇
Satellites Are Leaking the World’s Secrets: Calls, Texts, Military and Corporate Data
With just $800 in basic equipment, researchers found a stunning variety of data—including thousands of T-Mobile users’ calls and texts and even US military communications—sent by satellites unencrypte...
www.wired.com
layla1988.bsky.social
You can condemn threats and still defend speech. What’s dangerous is when those in power only remember the First Amendment when they’re out of office. That’s not principle — that’s convenience.

So many people only care about the First Amendment when they aren't in power.
layla1988.bsky.social
The real test of a free society isn’t how it treats speech it likes — it’s how it handles speech it hates.

Protecting the First Amendment isn’t about defending cruelty or chaos; it’s about preventing whoever’s in charge from defining those terms to silence dissent.
layla1988.bsky.social
It’s not limited to one ideology. Across the spectrum, once power shifts hands, speech suddenly looks less like a right and more like a liability. That’s the hypocrisy of conditional principle — freedom for me, restraint for thee.
layla1988.bsky.social
People champion the First Amendment when it protects their dissent — and rediscover “reasonable limits” the moment they hold authority.
layla1988.bsky.social
no matter how well a constitution is constructed, It will not insure freedom and prosperity unless it is supported by a moral, virtuous population.
politico.com
EXCLUSIVE: Thousands of leaked messages show leaders of Young Republican groups joking about gas chambers, slavery and rape in a private Telegram chat.

Inside rising GOP leaders’ racist chats — obtained by POLITICO and spanning more than 7 months👇
‘I love Hitler’: Leaked messages expose Young Republicans’ racist chat
Thousands of private messages reveal young GOP leaders joking about gas chambers, slavery and rape.
www.politico.com
layla1988.bsky.social
It signals that they see morality as performance, not conviction.
That’s the essence of moral decay—when what’s right becomes negotiable, and what’s expedient becomes acceptable.
layla1988.bsky.social
When political operatives — people entrusted with public authority — joke about genocide, rape, and racism, they’re normalizing cruelty and contempt.
politico.com
EXCLUSIVE: Thousands of leaked messages show leaders of Young Republican groups joking about gas chambers, slavery and rape in a private Telegram chat.

Inside rising GOP leaders’ racist chats — obtained by POLITICO and spanning more than 7 months👇
‘I love Hitler’: Leaked messages expose Young Republicans’ racist chat
Thousands of private messages reveal young GOP leaders joking about gas chambers, slavery and rape.
www.politico.com
layla1988.bsky.social
Not a single word about the true core.
It appears to be testing the intelligence of its peers.
layla1988.bsky.social
Geant4’s gamma→μ+μ implementation and the Bethe–Heitler modelling for muon pairs are known to require careful validation (and different physics lists / model choices can change rates). Which Geant4 version and physics models were used? Were alternate physics lists tested?
layla1988.bsky.social
Their Geant4 model is central to interpretation (pair production vs meson-decay contributions, angular/energy spectra).
layla1988.bsky.social
Are claimed “orders-of-magnitude” imaging speedups driven by a best-case yield estimate,

or do they include realistic inefficiencies (detector acceptance, collimation losses)?
layla1988.bsky.social
The paper quotes yields and directional fluxes — but I want the full uncertainty budget: statistical errors, systematic uncertainties (detector efficiencies, threshold effects, dead time), and uncertainties from background subtraction.
layla1988.bsky.social
@physorg_com Cosmic-ray muons form a non-negligible background. How was cosmic background measured/subtracted (control runs, off-beam windows, shielding comparisons)? Provide raw counts and statistical significance of the muon excess over background.