Christel...๐Ÿชก's Avatar

Christel...๐Ÿชก

@vendetta20.bsky.social

Les photos ne sont pas les miennes et les auteurs sont citรฉs... Racistes , Antisรฉmites , homophobes Sexisme โ›”๏ธ Pour le reste bienvenue ๐ŸŒน

288 Followers  |  212 Following  |  180 Posts  |  Joined: 06.11.2023  |  2.3406

Latest posts by vendetta20.bsky.social on Bluesky

Post image

รˆ giร  qualcosa aver vissuto, pensato e disputato con se stessi, quand'anche nessuno ne venisse mai a conoscenza.

~ Elias Canetti

06.04.2025 18:50 โ€” ๐Ÿ‘ 43    ๐Ÿ” 10    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0

๐Ÿ’™๐Ÿ’›๐Ÿค๐Ÿ’™๐Ÿคโค๏ธ๐Ÿ‘Œ

19.04.2025 18:19 โ€” ๐Ÿ‘ 1    ๐Ÿ” 0    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0
Post image

๐Ÿ“ธ Ernst Haas - New York City, USA, 1981

19.04.2025 07:49 โ€” ๐Ÿ‘ 15    ๐Ÿ” 3    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0
Post image

๐Ÿ“ธ Eric Kogan

17.04.2025 06:48 โ€” ๐Ÿ‘ 17    ๐Ÿ” 3    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0
Post image

Sophie Moates

26.11.2024 12:46 โ€” ๐Ÿ‘ 119    ๐Ÿ” 18    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0
Preview
Sur TikTok, lโ€™anorexie fait fureur Les nutritionnistes les dรฉtestent. Non pas parce quโ€™ils auraient dรฉcouvert un secret que seuls les professionnels de la santรฉ dรฉtiennent. Pas non plus parce quโ€™en deux trois lignes de codes, un bon marketing et un prix bas, ils auraient rรฉussi ร  faire mieux quโ€™eux aprรจs six ans de mรฉdecine. Si les nutritionnistes les dรฉtestent autant, [โ€ฆ]

Sur TikTok, les comptes faisant la part belle aux troubles du comportement alimentaire pullulent dans l'indiffรฉrence totale du service de modรฉration... charliehebdo.fr/2025...

17.04.2025 15:00 โ€” ๐Ÿ‘ 5    ๐Ÿ” 4    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0
looking across the street at two buildings with trees behind them in a small town.

looking across the street at two buildings with trees behind them in a small town.

16.04.2025 18:04 โ€” ๐Ÿ‘ 277    ๐Ÿ” 35    ๐Ÿ’ฌ 2    ๐Ÿ“Œ 0
Delicate nature from 
morning

Delicate nature from morning

.

La natura delicata del mattino

Click ๐Ÿ“ฒ

09.03.2025 15:39 โ€” ๐Ÿ‘ 149    ๐Ÿ” 38    ๐Ÿ’ฌ 1    ๐Ÿ“Œ 0
Cattedrale....

Cattedrale....

.

Click ๐Ÿ“ฒ Trani

Battuti dal vento

08.04.2025 06:19 โ€” ๐Ÿ‘ 172    ๐Ÿ” 42    ๐Ÿ’ฌ 1    ๐Ÿ“Œ 0

Merci ๐Ÿ™ ๐Ÿ™

17.04.2025 14:13 โ€” ๐Ÿ‘ 1    ๐Ÿ” 0    ๐Ÿ’ฌ 1    ๐Ÿ“Œ 0

Base for a Water Pipe (Huqqa) with Irises (The Met) +  Smallsword. French, ca. 1780โ€“85 (The Met) + Masaki Iehara, Shikizu mondoฬ„ (Color Diagram Question and Answer), Shiga Sinbun Kaisha, Oฬ„tsu, 1876 + Kazuaki Tanahashi, Timeless Spring

Base for a Water Pipe (Huqqa) with Irises (The Met) + Smallsword. French, ca. 1780โ€“85 (The Met) + Masaki Iehara, Shikizu mondoฬ„ (Color Diagram Question and Answer), Shiga Sinbun Kaisha, Oฬ„tsu, 1876 + Kazuaki Tanahashi, Timeless Spring

Inkwell
-collage

16.04.2025 19:20 โ€” ๐Ÿ‘ 85    ๐Ÿ” 12    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0
Post image

00:17 am midnight Japan
in Thursday

16.04.2025 15:16 โ€” ๐Ÿ‘ 123    ๐Ÿ” 23    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0
Post image 16.04.2025 15:25 โ€” ๐Ÿ‘ 128    ๐Ÿ” 22    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0
Post image 16.04.2025 15:39 โ€” ๐Ÿ‘ 132    ๐Ÿ” 36    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0

Non du tout
Mais c'est un peu compliquรฉ en france
Comme partout mais on peut basculer du mauvais cรดtรฉ
Politique ๐Ÿ˜ก๐Ÿ˜ก

16.04.2025 17:09 โ€” ๐Ÿ‘ 1    ๐Ÿ” 0    ๐Ÿ’ฌ 1    ๐Ÿ“Œ 0
Ukr military badge

Ukr military badge

Files

Files

Leak

Leak

In defense of Ukraine Anonymous has released 10TB of leaked data on all businesses operating in Russia, all Kremlin assets in the West, pro-Russian officials, Donald Trump, and more. ๐Ÿ‡บ๐Ÿ‡ฆ #OpRussia

15.04.2025 23:56 โ€” ๐Ÿ‘ 6778    ๐Ÿ” 2363    ๐Ÿ’ฌ 318    ๐Ÿ“Œ 189
A whistleblower's disclosure details how DOGE may have taken sensitive labor data

A whistleblower's disclosure details how DOGE may have taken sensitive labor data

The IT team met to discuss insider threats - namely, the DOGE engineers, whose activities it had little insight into or control over. "We had no idea what they did," he explained. Those conversations are reflected in his official disclosure.
They eventually launched a formal breach investigation, according to the disclosure, and prepared a request for assistance from the Cybersecurity and Infrastructure Security Agency (CISA). However, those efforts were disrupted without an explanation, Berulis said. That was deeply troubling to Berulis, who felt he needed help to try to get to the bottom of what happened and determine what new vulnerabilities might be exploited as a result.
In the days after Berulis and his colleagues prepared a request for CISAs help investigating the breach, Berulis found a printed letter in an envelope taped to his door, which included threatening language, sensitive personal information and overhead pictures of him walking his dog, according to the cover letter attached to his official disclosure. It's unclear who sent it, but the letter made specific reference to his decision to report the breach. Law enforcement is investigating the letter.

The IT team met to discuss insider threats - namely, the DOGE engineers, whose activities it had little insight into or control over. "We had no idea what they did," he explained. Those conversations are reflected in his official disclosure. They eventually launched a formal breach investigation, according to the disclosure, and prepared a request for assistance from the Cybersecurity and Infrastructure Security Agency (CISA). However, those efforts were disrupted without an explanation, Berulis said. That was deeply troubling to Berulis, who felt he needed help to try to get to the bottom of what happened and determine what new vulnerabilities might be exploited as a result. In the days after Berulis and his colleagues prepared a request for CISAs help investigating the breach, Berulis found a printed letter in an envelope taped to his door, which included threatening language, sensitive personal information and overhead pictures of him walking his dog, according to the cover letter attached to his official disclosure. It's unclear who sent it, but the letter made specific reference to his decision to report the breach. Law enforcement is investigating the letter.

While investigating the data taken from the agency, Berulis tried to determine its ultimate destination. But whoever had exfiltrated it had disguised its destination too, according to the disclosure.
DOGE staffers had permission to access the system, but removing data is another matter.
Berulis says someone appeared to be doing something called DNS tunneling to prevent the data exfiltration from being detected. He came to that conclusion, outlined in his disclosure, after he saw a traffic spike in DNS requests parallel to the data being exfiltrated, a spike 1,000 times the normal number of requests.
When someone uses this kind of technique, they set up a domain name that pings the target system with questions or queries. But they configure the compromised server so that it answers those DNS queries by sending out packets of data, allowing the attacker to steal information that has been broken down into smaller chunks.
"We've seen Russian threat actors do things like this on
U.S. government systems," said one threat intelligence researcher who requested anonymity because they weren't authorized to speak publicly by their employer.
That analyst, who has extensive experience hunting nation-state-sponsored hackers, reviewed the whistleblower's technical claims.

While investigating the data taken from the agency, Berulis tried to determine its ultimate destination. But whoever had exfiltrated it had disguised its destination too, according to the disclosure. DOGE staffers had permission to access the system, but removing data is another matter. Berulis says someone appeared to be doing something called DNS tunneling to prevent the data exfiltration from being detected. He came to that conclusion, outlined in his disclosure, after he saw a traffic spike in DNS requests parallel to the data being exfiltrated, a spike 1,000 times the normal number of requests. When someone uses this kind of technique, they set up a domain name that pings the target system with questions or queries. But they configure the compromised server so that it answers those DNS queries by sending out packets of data, allowing the attacker to steal information that has been broken down into smaller chunks. "We've seen Russian threat actors do things like this on U.S. government systems," said one threat intelligence researcher who requested anonymity because they weren't authorized to speak publicly by their employer. That analyst, who has extensive experience hunting nation-state-sponsored hackers, reviewed the whistleblower's technical claims.

Within minutes after DOGE accessed the NLRB's systems, someone with an IP address in Russia started trying to log in, according to Berulis' disclosure. The attempts were "near real-time," according to the disclosure. Those attempts were blocked, but they were especially alarming. Whoever was attempting to log in was using one of the newly created DOGE accounts - and the person had the correct username and password, according to Berulis. While it's possible the user was disguising their location, it's highly unlikely they'd appear to be coming from Russia if they wanted to avoid suspicion, cybersecurity experts interviewed by NPR explained.
On their own, a few failed login attempts from a Russian IP address aren't a smoking gun, those cybersecurity experts interviewed by NPR said. But given the overall picture of activity, it's a concerning sign that foreign adversaries may already be searching for ways into government systems that DOGE engineers may have left exposed.
"When you move fast and break stuff, the opportunity to ride the coattails of authorized access is ridiculously easy to achieve," said Handorf. What he means is that if DOGE engineers left access points to the network open, it would be very easy for spies or criminals to break in and steal data behind DOGE.
He said he could also see foreign adversaries trying to recruit or pay DOGE team members for access to sensitive data. "It would not surprise me if DOGE is accidentally compromised."

Within minutes after DOGE accessed the NLRB's systems, someone with an IP address in Russia started trying to log in, according to Berulis' disclosure. The attempts were "near real-time," according to the disclosure. Those attempts were blocked, but they were especially alarming. Whoever was attempting to log in was using one of the newly created DOGE accounts - and the person had the correct username and password, according to Berulis. While it's possible the user was disguising their location, it's highly unlikely they'd appear to be coming from Russia if they wanted to avoid suspicion, cybersecurity experts interviewed by NPR explained. On their own, a few failed login attempts from a Russian IP address aren't a smoking gun, those cybersecurity experts interviewed by NPR said. But given the overall picture of activity, it's a concerning sign that foreign adversaries may already be searching for ways into government systems that DOGE engineers may have left exposed. "When you move fast and break stuff, the opportunity to ride the coattails of authorized access is ridiculously easy to achieve," said Handorf. What he means is that if DOGE engineers left access points to the network open, it would be very easy for spies or criminals to break in and steal data behind DOGE. He said he could also see foreign adversaries trying to recruit or pay DOGE team members for access to sensitive data. "It would not surprise me if DOGE is accidentally compromised."

Muskโ€™s DOGE involved in what appears to be a foreign espionage operation and data theft. They also have death threatened US federal whistleblowers and disabled security systems, deliberately allowing Russian IPs to access sensitive US federal government systems.

www.npr.org/2025/04/15/n...

16.04.2025 10:29 โ€” ๐Ÿ‘ 4824    ๐Ÿ” 2624    ๐Ÿ’ฌ 226    ๐Ÿ“Œ 252
Post image 16.04.2025 14:24 โ€” ๐Ÿ‘ 81    ๐Ÿ” 24    ๐Ÿ’ฌ 2    ๐Ÿ“Œ 1
A photograph in BW, at night in the avenue between the buildings illuminated by street lamps, in the background a shadow wanders in the silence of the city

A photograph in BW, at night in the avenue between the buildings illuminated by street lamps, in the background a shadow wanders in the silence of the city

Between the lights....
a shadow

My #PhotoOftheDay
#Telling through #photography

#blackandwhitephotography

16.02.2025 15:42 โ€” ๐Ÿ‘ 524    ๐Ÿ” 38    ๐Ÿ’ฌ 11    ๐Ÿ“Œ 0
Post image

#StandWithUkraine๐Ÿ’™๐Ÿ’›๐Ÿ•Š๏ธ

Zelensky tried to lead the world. Instead, he was forced to lead alone

He tells TIME what really happened in the Oval Officeโ€”his first interview since that fight

25.03.2025 06:20 โ€” ๐Ÿ‘ 70    ๐Ÿ” 25    ๐Ÿ’ฌ 3    ๐Ÿ“Œ 0

โœ๏ธโœ๏ธโค๏ธ

16.04.2025 14:12 โ€” ๐Ÿ‘ 2    ๐Ÿ” 0    ๐Ÿ’ฌ 1    ๐Ÿ“Œ 0
Post image

Cosa significa essere al sicuro in tempo di guerra?
Significa vergognarsi
del tuo sorriso
del tuo calore
del tuo sonno tranquillo
dellโ€™acqua pulita

e del caso che ti ha lasciato ancora in vita!
Mio Dio,
non voglio essere poeta in tempo di guerra.

#PoesiedaGaza Hend Joudah

โ€จยฉ๏ธniphisi shortstorโ€ขy๐Ÿฉธ

15.04.2025 06:19 โ€” ๐Ÿ‘ 142    ๐Ÿ” 43    ๐Ÿ’ฌ 10    ๐Ÿ“Œ 2
Post image

A lazy afternoon..

16.04.2025 05:52 โ€” ๐Ÿ‘ 83    ๐Ÿ” 19    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0
Post image 12.04.2025 18:35 โ€” ๐Ÿ‘ 95    ๐Ÿ” 31    ๐Ÿ’ฌ 1    ๐Ÿ“Œ 0
Post image 15.04.2025 17:15 โ€” ๐Ÿ‘ 88    ๐Ÿ” 27    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0
Post image

้ ใ„ๅค•ๆ—ฅ

#art #photo #photography #sky
#sunset
ยฉ๏ธskinskin

15.04.2025 16:53 โ€” ๐Ÿ‘ 83    ๐Ÿ” 11    ๐Ÿ’ฌ 2    ๐Ÿ“Œ 0
Post image 16.04.2025 13:16 โ€” ๐Ÿ‘ 115    ๐Ÿ” 33    ๐Ÿ’ฌ 1    ๐Ÿ“Œ 0
Post image

โ€œI donโ€™t feel that it is necessary to know exactly what I am. The main interest in life and work is to become someone else that you were not in the beginning.โ€

Michel Foucault.

16.04.2025 13:40 โ€” ๐Ÿ‘ 15    ๐Ÿ” 9    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0

๐Ÿฅ‚๐Ÿฅ‚

22.12.2024 13:50 โ€” ๐Ÿ‘ 1    ๐Ÿ” 0    ๐Ÿ’ฌ 1    ๐Ÿ“Œ 0

@vendetta20 is following 19 prominent accounts