DeltaRich's Avatar

DeltaRich

@deltarich.bsky.social

Crazy cat lady of two living in the Midwest. I like flower gardening, genealogy, and birdwatching. Just trying to cope like everyone else. I'm a boomer. Deal with it.

214 Followers  |  271 Following  |  28 Posts  |  Joined: 12.11.2024  |  2.4432

Latest posts by deltarich.bsky.social on Bluesky

Post image

Release the Epstein files.

02.11.2025 18:05 β€” πŸ‘ 146    πŸ” 102    πŸ’¬ 10    πŸ“Œ 8

AARP eligible

11.07.2025 00:25 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0

Maybe MC Hammer type parachute pants. Not really hippie attire though.

23.06.2025 20:44 β€” πŸ‘ 1    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0

It's the never-ending chaos that wears on us. Every single day.

23.06.2025 19:34 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0
Post image

Like this maybe, only tie-dyed.

23.06.2025 19:27 β€” πŸ‘ 1    πŸ” 0    πŸ’¬ 1    πŸ“Œ 0

Well that's weird.

30.04.2025 23:44 β€” πŸ‘ 1    πŸ” 0    πŸ’¬ 1    πŸ“Œ 0

They probably think they can still go to KMart. Or Sears. Or Montgomery Ward.

30.04.2025 23:20 β€” πŸ‘ 3    πŸ” 0    πŸ’¬ 1    πŸ“Œ 0
Post image

Here's a map

16.04.2025 15:03 β€” πŸ‘ 3    πŸ” 1    πŸ’¬ 0    πŸ“Œ 1
A whistleblower's disclosure details how DOGE may have taken sensitive labor data

A whistleblower's disclosure details how DOGE may have taken sensitive labor data

The IT team met to discuss insider threats - namely, the DOGE engineers, whose activities it had little insight into or control over. "We had no idea what they did," he explained. Those conversations are reflected in his official disclosure.
They eventually launched a formal breach investigation, according to the disclosure, and prepared a request for assistance from the Cybersecurity and Infrastructure Security Agency (CISA). However, those efforts were disrupted without an explanation, Berulis said. That was deeply troubling to Berulis, who felt he needed help to try to get to the bottom of what happened and determine what new vulnerabilities might be exploited as a result.
In the days after Berulis and his colleagues prepared a request for CISAs help investigating the breach, Berulis found a printed letter in an envelope taped to his door, which included threatening language, sensitive personal information and overhead pictures of him walking his dog, according to the cover letter attached to his official disclosure. It's unclear who sent it, but the letter made specific reference to his decision to report the breach. Law enforcement is investigating the letter.

The IT team met to discuss insider threats - namely, the DOGE engineers, whose activities it had little insight into or control over. "We had no idea what they did," he explained. Those conversations are reflected in his official disclosure. They eventually launched a formal breach investigation, according to the disclosure, and prepared a request for assistance from the Cybersecurity and Infrastructure Security Agency (CISA). However, those efforts were disrupted without an explanation, Berulis said. That was deeply troubling to Berulis, who felt he needed help to try to get to the bottom of what happened and determine what new vulnerabilities might be exploited as a result. In the days after Berulis and his colleagues prepared a request for CISAs help investigating the breach, Berulis found a printed letter in an envelope taped to his door, which included threatening language, sensitive personal information and overhead pictures of him walking his dog, according to the cover letter attached to his official disclosure. It's unclear who sent it, but the letter made specific reference to his decision to report the breach. Law enforcement is investigating the letter.

While investigating the data taken from the agency, Berulis tried to determine its ultimate destination. But whoever had exfiltrated it had disguised its destination too, according to the disclosure.
DOGE staffers had permission to access the system, but removing data is another matter.
Berulis says someone appeared to be doing something called DNS tunneling to prevent the data exfiltration from being detected. He came to that conclusion, outlined in his disclosure, after he saw a traffic spike in DNS requests parallel to the data being exfiltrated, a spike 1,000 times the normal number of requests.
When someone uses this kind of technique, they set up a domain name that pings the target system with questions or queries. But they configure the compromised server so that it answers those DNS queries by sending out packets of data, allowing the attacker to steal information that has been broken down into smaller chunks.
"We've seen Russian threat actors do things like this on
U.S. government systems," said one threat intelligence researcher who requested anonymity because they weren't authorized to speak publicly by their employer.
That analyst, who has extensive experience hunting nation-state-sponsored hackers, reviewed the whistleblower's technical claims.

While investigating the data taken from the agency, Berulis tried to determine its ultimate destination. But whoever had exfiltrated it had disguised its destination too, according to the disclosure. DOGE staffers had permission to access the system, but removing data is another matter. Berulis says someone appeared to be doing something called DNS tunneling to prevent the data exfiltration from being detected. He came to that conclusion, outlined in his disclosure, after he saw a traffic spike in DNS requests parallel to the data being exfiltrated, a spike 1,000 times the normal number of requests. When someone uses this kind of technique, they set up a domain name that pings the target system with questions or queries. But they configure the compromised server so that it answers those DNS queries by sending out packets of data, allowing the attacker to steal information that has been broken down into smaller chunks. "We've seen Russian threat actors do things like this on U.S. government systems," said one threat intelligence researcher who requested anonymity because they weren't authorized to speak publicly by their employer. That analyst, who has extensive experience hunting nation-state-sponsored hackers, reviewed the whistleblower's technical claims.

Within minutes after DOGE accessed the NLRB's systems, someone with an IP address in Russia started trying to log in, according to Berulis' disclosure. The attempts were "near real-time," according to the disclosure. Those attempts were blocked, but they were especially alarming. Whoever was attempting to log in was using one of the newly created DOGE accounts - and the person had the correct username and password, according to Berulis. While it's possible the user was disguising their location, it's highly unlikely they'd appear to be coming from Russia if they wanted to avoid suspicion, cybersecurity experts interviewed by NPR explained.
On their own, a few failed login attempts from a Russian IP address aren't a smoking gun, those cybersecurity experts interviewed by NPR said. But given the overall picture of activity, it's a concerning sign that foreign adversaries may already be searching for ways into government systems that DOGE engineers may have left exposed.
"When you move fast and break stuff, the opportunity to ride the coattails of authorized access is ridiculously easy to achieve," said Handorf. What he means is that if DOGE engineers left access points to the network open, it would be very easy for spies or criminals to break in and steal data behind DOGE.
He said he could also see foreign adversaries trying to recruit or pay DOGE team members for access to sensitive data. "It would not surprise me if DOGE is accidentally compromised."

Within minutes after DOGE accessed the NLRB's systems, someone with an IP address in Russia started trying to log in, according to Berulis' disclosure. The attempts were "near real-time," according to the disclosure. Those attempts were blocked, but they were especially alarming. Whoever was attempting to log in was using one of the newly created DOGE accounts - and the person had the correct username and password, according to Berulis. While it's possible the user was disguising their location, it's highly unlikely they'd appear to be coming from Russia if they wanted to avoid suspicion, cybersecurity experts interviewed by NPR explained. On their own, a few failed login attempts from a Russian IP address aren't a smoking gun, those cybersecurity experts interviewed by NPR said. But given the overall picture of activity, it's a concerning sign that foreign adversaries may already be searching for ways into government systems that DOGE engineers may have left exposed. "When you move fast and break stuff, the opportunity to ride the coattails of authorized access is ridiculously easy to achieve," said Handorf. What he means is that if DOGE engineers left access points to the network open, it would be very easy for spies or criminals to break in and steal data behind DOGE. He said he could also see foreign adversaries trying to recruit or pay DOGE team members for access to sensitive data. "It would not surprise me if DOGE is accidentally compromised."

Musk’s DOGE involved in what appears to be a foreign espionage operation and data theft. They also have death threatened US federal whistleblowers and disabled security systems, deliberately allowing Russian IPs to access sensitive US federal government systems.

www.npr.org/2025/04/15/n...

16.04.2025 10:29 β€” πŸ‘ 4828    πŸ” 2627    πŸ’¬ 227    πŸ“Œ 252
Video thumbnail

MAGA idiots have been tricked into surrounding Tesla dealerships nationwide, their presence alone is deterring potential buyers and collapsing sales.

Psyop successful πŸ‘

15.04.2025 08:53 β€” πŸ‘ 7971    πŸ” 1499    πŸ’¬ 855    πŸ“Œ 312

This is why I ordered a new laptop from Costco last week. We saw it coming.

08.04.2025 17:34 β€” πŸ‘ 3    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0
Video thumbnail

Right on to this man for speaking truth to power. I was just talking to my buddy about this.

Let me just add: the reason Black folks need to sit this one out (for now). In large numbers, cops see us as a threat and escalate. Trust meβ€”you don’t want to give Trump a reason to declare martial law.

06.04.2025 04:12 β€” πŸ‘ 2589    πŸ” 645    πŸ’¬ 200    πŸ“Œ 83

Religious people just gleefully threw poor people to the wolves. I want no part of religion.

26.02.2025 18:27 β€” πŸ‘ 1    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0
Preview
Day Five of the Trump-Musk Treasury Payments Crisis of 2025: Not β€œRead Only” access anymore If you are a current or former career Bureau of the Fiscal Service Employee, especially if you’re a legacy IT programmer with years of experience and especially if you are a COBOL programmer currently...

EMERGENCY PIECE: Previous reports that Musk's DOGE programmers only have "read only" access is inaccurate. I can confirm what @wired.com first reported at 1 AM today that they have Read & WRITE access with a source in BFS referring to this as "apocalyptic"

www.crisesnotes.com/day-five-of-...

04.02.2025 12:41 β€” πŸ‘ 2928    πŸ” 1500    πŸ’¬ 95    πŸ“Œ 196
Post image

These are the clowns Congress refuses to stop.

03.02.2025 13:41 β€” πŸ‘ 36634    πŸ” 14581    πŸ’¬ 2139    πŸ“Œ 1232

I block anyone who posts a link to the bird place. No exceptions.

02.02.2025 23:17 β€” πŸ‘ 2    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0

This is the kind of shit that really freaks me out.

28.01.2025 17:26 β€” πŸ‘ 57    πŸ” 6    πŸ’¬ 4    πŸ“Œ 0

Trying to get some traction on Bluesky as I move from X any reposts of my pub research /work much appreciated @matthew-wright.bsky.social

01.01.2025 22:30 β€” πŸ‘ 138    πŸ” 90    πŸ’¬ 7    πŸ“Œ 3

Watching so many people having spent money to go to the inauguration, and then Trump canceling it because he’s worried about the pictures and small crowds, is a perfect picture of his whole relationship with his supporters.

They give and give, he takes and takes.

19.01.2025 03:38 β€” πŸ‘ 19470    πŸ” 3234    πŸ’¬ 878    πŸ“Œ 149

Vile.

08.01.2025 17:40 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0

That's a message.

01.01.2025 19:54 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0
Preview
Mark Cuban Says 'This Is Single-Payer': How His Healthcare Model Could Transform The U.S. Healthcare System Billionaire entrepreneur Mark Cuban has been vocal about reshaping the U.S. health care system for years. During recent appearances on podcasts Fishbowl with Jules Terpak and Ground Truths with Dr. Er...

finance.yahoo.com/news/mark-cu...

31.12.2024 20:54 β€” πŸ‘ 18540    πŸ” 3763    πŸ’¬ 794    πŸ“Œ 280
Video thumbnail

THIS FLEW UNDER THE RADAR

Members of the German neo-Nazi political group AfD plan to attend Trump’s inauguration.

They’ve actively been engaging with U.S. conservatives & trying to capitalize on Trump’s momentum. Keep an eye on this, especially in light of Elon’s newly discovered support of AfD.
🧡

23.12.2024 22:27 β€” πŸ‘ 8052    πŸ” 4657    πŸ’¬ 565    πŸ“Œ 538

No backbone whatsoever.

16.12.2024 16:39 β€” πŸ‘ 1    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0

Straightforward to me!

10.12.2024 18:31 β€” πŸ‘ 3    πŸ” 1    πŸ’¬ 0    πŸ“Œ 0
Video thumbnail

Lee Jae-myung, Leader of South Korea's Democratic Party, live-streamed himself scaling the walls of the National Assembly to bypass military barricades so that he could vote to overturn the President's martial law.

03.12.2024 16:55 β€” πŸ‘ 53133    πŸ” 10681    πŸ’¬ 900    πŸ“Œ 1732
Video thumbnail

Elders are also protesting, despite the violence of the Moscow backed government and the risk of mass arrests. The younger protestors are shielding them from the water cannons and rubber bullets. All of Georgia remains defiant. #GeorgiaProtests

30.11.2024 22:06 β€” πŸ‘ 9104    πŸ” 2393    πŸ’¬ 188    πŸ“Œ 166

They don't seem inclined to correct their course even though their ratings are crashing.

03.12.2024 14:37 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0
Post image 01.12.2024 01:28 β€” πŸ‘ 835    πŸ” 242    πŸ’¬ 26    πŸ“Œ 8

Blocked!

27.11.2024 01:28 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0

@deltarich is following 19 prominent accounts