The King's Fella ๐Ÿ‡ฌ๐Ÿ‡ง ๐Ÿ‡บ๐Ÿ‡ฆ's Avatar

The King's Fella ๐Ÿ‡ฌ๐Ÿ‡ง ๐Ÿ‡บ๐Ÿ‡ฆ

@thekingsfella.bsky.social

Real person | I follow back all my #Fellas Offensively British Massive metalhead ๐Ÿ‡ฌ๐Ÿ‡ง๐Ÿ‡บ๐Ÿ‡ฆ (please dont put me near a magnet) #NAFO

805 Followers  |  514 Following  |  189 Posts  |  Joined: 19.10.2024  |  2.061

Latest posts by thekingsfella.bsky.social on Bluesky

First 2 make sense but then he snuck that 3rd one in there and thought we wouldn't notice huh...

25.04.2025 10:35 โ€” ๐Ÿ‘ 0    ๐Ÿ” 0    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0

HAMMERTIME!

25.04.2025 10:33 โ€” ๐Ÿ‘ 2    ๐Ÿ” 0    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0

lmaooooo

23.04.2025 05:56 โ€” ๐Ÿ‘ 0    ๐Ÿ” 0    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0

I think the onion has now fully abandoned it's former ironic self and is now focussing on 100% factual reporting.

23.04.2025 05:51 โ€” ๐Ÿ‘ 2    ๐Ÿ” 0    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0

I spent most of sixth form on 5 hours of sleep most nights, can confirm that less sleep = bad in many ways. It's generic because its true, but sleep really is good for you.

22.04.2025 15:42 โ€” ๐Ÿ‘ 0    ๐Ÿ” 0    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0

"Today's court conviction was powered by ChatGPT!"

22.04.2025 11:02 โ€” ๐Ÿ‘ 5    ๐Ÿ” 0    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0
A whistleblower's disclosure details how DOGE may have taken sensitive labor data

A whistleblower's disclosure details how DOGE may have taken sensitive labor data

The IT team met to discuss insider threats - namely, the DOGE engineers, whose activities it had little insight into or control over. "We had no idea what they did," he explained. Those conversations are reflected in his official disclosure.
They eventually launched a formal breach investigation, according to the disclosure, and prepared a request for assistance from the Cybersecurity and Infrastructure Security Agency (CISA). However, those efforts were disrupted without an explanation, Berulis said. That was deeply troubling to Berulis, who felt he needed help to try to get to the bottom of what happened and determine what new vulnerabilities might be exploited as a result.
In the days after Berulis and his colleagues prepared a request for CISAs help investigating the breach, Berulis found a printed letter in an envelope taped to his door, which included threatening language, sensitive personal information and overhead pictures of him walking his dog, according to the cover letter attached to his official disclosure. It's unclear who sent it, but the letter made specific reference to his decision to report the breach. Law enforcement is investigating the letter.

The IT team met to discuss insider threats - namely, the DOGE engineers, whose activities it had little insight into or control over. "We had no idea what they did," he explained. Those conversations are reflected in his official disclosure. They eventually launched a formal breach investigation, according to the disclosure, and prepared a request for assistance from the Cybersecurity and Infrastructure Security Agency (CISA). However, those efforts were disrupted without an explanation, Berulis said. That was deeply troubling to Berulis, who felt he needed help to try to get to the bottom of what happened and determine what new vulnerabilities might be exploited as a result. In the days after Berulis and his colleagues prepared a request for CISAs help investigating the breach, Berulis found a printed letter in an envelope taped to his door, which included threatening language, sensitive personal information and overhead pictures of him walking his dog, according to the cover letter attached to his official disclosure. It's unclear who sent it, but the letter made specific reference to his decision to report the breach. Law enforcement is investigating the letter.

While investigating the data taken from the agency, Berulis tried to determine its ultimate destination. But whoever had exfiltrated it had disguised its destination too, according to the disclosure.
DOGE staffers had permission to access the system, but removing data is another matter.
Berulis says someone appeared to be doing something called DNS tunneling to prevent the data exfiltration from being detected. He came to that conclusion, outlined in his disclosure, after he saw a traffic spike in DNS requests parallel to the data being exfiltrated, a spike 1,000 times the normal number of requests.
When someone uses this kind of technique, they set up a domain name that pings the target system with questions or queries. But they configure the compromised server so that it answers those DNS queries by sending out packets of data, allowing the attacker to steal information that has been broken down into smaller chunks.
"We've seen Russian threat actors do things like this on
U.S. government systems," said one threat intelligence researcher who requested anonymity because they weren't authorized to speak publicly by their employer.
That analyst, who has extensive experience hunting nation-state-sponsored hackers, reviewed the whistleblower's technical claims.

While investigating the data taken from the agency, Berulis tried to determine its ultimate destination. But whoever had exfiltrated it had disguised its destination too, according to the disclosure. DOGE staffers had permission to access the system, but removing data is another matter. Berulis says someone appeared to be doing something called DNS tunneling to prevent the data exfiltration from being detected. He came to that conclusion, outlined in his disclosure, after he saw a traffic spike in DNS requests parallel to the data being exfiltrated, a spike 1,000 times the normal number of requests. When someone uses this kind of technique, they set up a domain name that pings the target system with questions or queries. But they configure the compromised server so that it answers those DNS queries by sending out packets of data, allowing the attacker to steal information that has been broken down into smaller chunks. "We've seen Russian threat actors do things like this on U.S. government systems," said one threat intelligence researcher who requested anonymity because they weren't authorized to speak publicly by their employer. That analyst, who has extensive experience hunting nation-state-sponsored hackers, reviewed the whistleblower's technical claims.

Within minutes after DOGE accessed the NLRB's systems, someone with an IP address in Russia started trying to log in, according to Berulis' disclosure. The attempts were "near real-time," according to the disclosure. Those attempts were blocked, but they were especially alarming. Whoever was attempting to log in was using one of the newly created DOGE accounts - and the person had the correct username and password, according to Berulis. While it's possible the user was disguising their location, it's highly unlikely they'd appear to be coming from Russia if they wanted to avoid suspicion, cybersecurity experts interviewed by NPR explained.
On their own, a few failed login attempts from a Russian IP address aren't a smoking gun, those cybersecurity experts interviewed by NPR said. But given the overall picture of activity, it's a concerning sign that foreign adversaries may already be searching for ways into government systems that DOGE engineers may have left exposed.
"When you move fast and break stuff, the opportunity to ride the coattails of authorized access is ridiculously easy to achieve," said Handorf. What he means is that if DOGE engineers left access points to the network open, it would be very easy for spies or criminals to break in and steal data behind DOGE.
He said he could also see foreign adversaries trying to recruit or pay DOGE team members for access to sensitive data. "It would not surprise me if DOGE is accidentally compromised."

Within minutes after DOGE accessed the NLRB's systems, someone with an IP address in Russia started trying to log in, according to Berulis' disclosure. The attempts were "near real-time," according to the disclosure. Those attempts were blocked, but they were especially alarming. Whoever was attempting to log in was using one of the newly created DOGE accounts - and the person had the correct username and password, according to Berulis. While it's possible the user was disguising their location, it's highly unlikely they'd appear to be coming from Russia if they wanted to avoid suspicion, cybersecurity experts interviewed by NPR explained. On their own, a few failed login attempts from a Russian IP address aren't a smoking gun, those cybersecurity experts interviewed by NPR said. But given the overall picture of activity, it's a concerning sign that foreign adversaries may already be searching for ways into government systems that DOGE engineers may have left exposed. "When you move fast and break stuff, the opportunity to ride the coattails of authorized access is ridiculously easy to achieve," said Handorf. What he means is that if DOGE engineers left access points to the network open, it would be very easy for spies or criminals to break in and steal data behind DOGE. He said he could also see foreign adversaries trying to recruit or pay DOGE team members for access to sensitive data. "It would not surprise me if DOGE is accidentally compromised."

Muskโ€™s DOGE involved in what appears to be a foreign espionage operation and data theft. They also have death threatened US federal whistleblowers and disabled security systems, deliberately allowing Russian IPs to access sensitive US federal government systems.

www.npr.org/2025/04/15/n...

16.04.2025 10:29 โ€” ๐Ÿ‘ 4825    ๐Ÿ” 2624    ๐Ÿ’ฌ 226    ๐Ÿ“Œ 252

Why the chinese owned it in the first place is beyond me, go for "tata" steel in Port Talbot next!

11.04.2025 14:05 โ€” ๐Ÿ‘ 3    ๐Ÿ” 0    ๐Ÿ’ฌ 2    ๐Ÿ“Œ 0

And the rich get even richer....

09.04.2025 17:54 โ€” ๐Ÿ‘ 1    ๐Ÿ” 0    ๐Ÿ’ฌ 1    ๐Ÿ“Œ 0
Post image

Did he just short the entire world?

09.04.2025 17:53 โ€” ๐Ÿ‘ 3    ๐Ÿ” 0    ๐Ÿ’ฌ 1    ๐Ÿ“Œ 0

I will glady take all of the excess beer here in the UK

05.04.2025 10:52 โ€” ๐Ÿ‘ 3    ๐Ÿ” 0    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0

No point in these ones being sent to the scrapyard when replaced by NMH, sending them to Ukraine is the best option.

03.04.2025 15:33 โ€” ๐Ÿ‘ 0    ๐Ÿ” 0    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0

Thereโ€™s so much GOP cope happening today.

โ€œAt least Wisconsin approved voter ID so libs canโ€™t cheatโ€

Wisconsin has required voter ID since 2015.

You spent millions of dollars and got your ass kicked for a rule that already existed and that fundamentally changes nothing.

02.04.2025 15:59 โ€” ๐Ÿ‘ 15664    ๐Ÿ” 2976    ๐Ÿ’ฌ 278    ๐Ÿ“Œ 72

After getting some rest, I am in awe of everyone who continues to lift their voice and speak out. This is a moment for our country, and we must make a choice about the America we want to be.

02.04.2025 16:32 โ€” ๐Ÿ‘ 83844    ๐Ÿ” 10882    ๐Ÿ’ฌ 4274    ๐Ÿ“Œ 597
Video thumbnail

Senator Cory Booker is cooking about NATO more than 14 hours into his filibuster on the Senate floor.

Go Cory!!!!

01.04.2025 13:56 โ€” ๐Ÿ‘ 20342    ๐Ÿ” 3488    ๐Ÿ’ฌ 361    ๐Ÿ“Œ 208

I mean, she isn't wrong no?

31.03.2025 19:40 โ€” ๐Ÿ‘ 10    ๐Ÿ” 0    ๐Ÿ’ฌ 1    ๐Ÿ“Œ 0
Post image

This guy got cnn airtime yesterday

31.03.2025 05:43 โ€” ๐Ÿ‘ 1172    ๐Ÿ” 284    ๐Ÿ’ฌ 53    ๐Ÿ“Œ 29
Post image

Celebrating hurting people because thatโ€™s the brand

30.03.2025 04:08 โ€” ๐Ÿ‘ 11993    ๐Ÿ” 3030    ๐Ÿ’ฌ 652    ๐Ÿ“Œ 195
Post image

Shinzo warned us

29.03.2025 14:39 โ€” ๐Ÿ‘ 0    ๐Ÿ” 0    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0

Money and morally bankrupt actors.

28.03.2025 11:46 โ€” ๐Ÿ‘ 0    ๐Ÿ” 0    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0

One of the most active democrats currently, more must follow his stride, be strong.

28.03.2025 00:32 โ€” ๐Ÿ‘ 7    ๐Ÿ” 0    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0

Any podcast/youtube appearances, media that normal people use??

28.03.2025 00:31 โ€” ๐Ÿ‘ 0    ๐Ÿ” 0    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0
Post image 27.03.2025 18:17 โ€” ๐Ÿ‘ 4661    ๐Ÿ” 1805    ๐Ÿ’ฌ 184    ๐Ÿ“Œ 117
Post image

@theguardian.com Not cool...

27.03.2025 18:25 โ€” ๐Ÿ‘ 0    ๐Ÿ” 0    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0

Intentionally being vague for a mild comedic effect ๐Ÿ˜…

27.03.2025 10:41 โ€” ๐Ÿ‘ 2    ๐Ÿ” 0    ๐Ÿ’ฌ 1    ๐Ÿ“Œ 0

Well, the first one but I didnt want to say lol

27.03.2025 08:16 โ€” ๐Ÿ‘ 3    ๐Ÿ” 0    ๐Ÿ’ฌ 1    ๐Ÿ“Œ 0

Scary...

27.03.2025 08:13 โ€” ๐Ÿ‘ 5    ๐Ÿ” 0    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0
Video thumbnail

The Trump regimeโ€™s secret police continue to kidnap people across the US. Here they kidnapped a PHD Student Rumeysa Ozturk in broad daylight for publishing an article last year, critical of Israelโ€™s war crimes in Gaza.

People across the US have reportedly been tortured by the regime.

27.03.2025 00:15 โ€” ๐Ÿ‘ 2447    ๐Ÿ” 1199    ๐Ÿ’ฌ 240    ๐Ÿ“Œ 151

I think I've seen a design with that shape before...

27.03.2025 08:09 โ€” ๐Ÿ‘ 10    ๐Ÿ” 0    ๐Ÿ’ฌ 2    ๐Ÿ“Œ 0
Post image 26.03.2025 12:41 โ€” ๐Ÿ‘ 61    ๐Ÿ” 10    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0

@thekingsfella is following 18 prominent accounts