Join devRant
Do all the things like
++ or -- rants, post your own rants, comment on others' rants and build your customized dev avatar
Sign Up
Pipeless API
From the creators of devRant, Pipeless lets you power real-time personalized recommendations and activity feeds using a simple API
Learn More
Search - "much secure"
-
My last internship (it was awesome). A programmer developed a vacation/free day request application for internal use.
Asked if I could test it for security.
The dev working on it thought that was a very good idea as he wasn't much into security and explained how the authentication process worked.
I immediately noticed a flaw just from his explanation. He said it was secure anyways (with an explanation but his way of thinking was wrong in this case). Asked if I was allowed to show him. He said he was intrigued by this so gave me a yes right away.
For the record, user levels were normal user, general admin and super admin (he was the only super admin).
Wrote a quick thingy server side (one of my own servers/domains) for testing purposes.
Then I started.
Went from normal user to super admin (his account) through a combination of XSS and Session Hijacking within 15 seconds.
Explained him where he went wrong and he wrote a patch under my guidance 😃.
That felt so fucking awesome.5 -
New Dutch (or european?) law requiring https for any website with a contact form or higher is going into effect very soon. Were contacting customers so they can still be on time with this, this is how most convo's go:
Collegue: *explains*
Client: Im sure my security is good enough...
Collegue: i'd really recommend it, we've got free options as well!
Client: its just a secure connection, whats the big deal...
Collegue: *more arguments*
Client: I just don't see the point, security.... well.... does it really matter that much...
Collegue: Google might place you lower in the search results if you don't get a secure connection.
Client: 😶😥😵 uhm so what were the https options again? 😅
I hope they all die a painful death 😠26 -
Alright, since Facebook released a VPN service a little while ago but they're actively advertising it as a secure and privacy friendly service, I felt like - although I'm very busy right now - I should do a security/privacy blog post about this.
If you even slightly care about your own privacy or the privacy of anyone you're communicating with, for the love of God, don't use this service.
Hereby a blog post explaining stuffs: https://much-security.nl//...44 -
"Do you have 2 factor auth for the database?"
a customer asked. I stared on the wall in front of me and suddenly fel and urge to punch and piss on something.
I took a deep breath while thinking to myself
*Oh boy, here we go. Another retard*
I put on my nice voice and asked:
"What you mean?"
The customer seems confused, as if my question did not make sense and he said:
"TWO FACTOR AUTHENTICATION! Dont you know what it is? To make the database more secure."
I was fucking right, this person reads to much shit. The fact that the email signature of that person said "Wordpress Developer" made me more angry.
I, still with the nice voice asked
"How would that work?"
"Two factor authentication when I am connecting to the database."
"So, do you want it by SMS then? You'll get alot of messages if it is going to send you one every time a query is made."
The following 7 seconds was dead silent until I heard the person hang up.3 -
"The password must be 6 to 32 characters long and must contain atleast one uppercase character, one lowercase character, a special character, the md5 hash of your last name, a dried olive branch and the blood of a unicorn."5
-
Goddamn I'm retarded to the next level.
Rebooted my phone a few days ago, some stuff didn't work well anymore and I'm looking for a new one which supports custom roms but I shouldn't spend too much right now so I thought I'd let it go for now.
Rebooted again last night and the network time wouldn't set properly so set it manually. Today I suddenly noticed that any app/page loading through a secure connection wasn't loading at all.
This to the goddamn point that my phone was becoming useless.
Started to search for a quick, cheap replacement supporting custom roms while debugging on and on.
I just (now) looked at the date and BAM, it hit me: I set it to one month earlier.
Mother of god I'm stupid. Brain fart to the max.12 -
I think the coolest project I did was a few years ago, it was actually a Minecraft plugin.
I decided to learn Java for Minecraft, and a few months after I started learning Java, I was approached by someone who'd like to work with me to create this full-blown Gun Game style gamemode for Minecraft. I made it clear I didn't have the most knowledge, but I was willing to learn.
We began working on the project, the projects main class was bigger than any project I had worked on. Within a few months, it became one of the more popular plugins out there, even though we were still in an alpha mode. Had nearly 1,000 servers running the plugin, over 10k+ players total testing out the plugin.
Cause of this project, I learnt how to properly organize my code, how to make it efficient, learnt how to network, learned how to properly secure and verify anything being sent by the client, working with dependencies, adding features that can support a bunch of other plugins that other developers had, and a bunch more.
Sadly we couldn't finish the plugin anymore, so we gave someone else the source code who has kept it updated to this day. (I know I didn't provide much insight into what I'm saying and just gave a general overview, got a killer headache.)2 -
I wonder why banks are always so terribly insecure, given how much money there's for grabs in there for hackers.
Just a while ago I got a new prepaid credit card from bpost, our local postal service that for some reason also does banking. The reason for that being that - thank you 'Murica! - a lot of websites out there don't accept anything but credit cards and PayPal. Because who in their right mind wouldn't use credit cards, right?! As it turns out, it's pretty much every European I've spoken to so far.
That aside, I got that card, all fine and dandy, it's part of the Mastercard network so at least I can get my purchases from those shitty American sites that don't accept anything else now. Looked into the manual of it because bpost's FAQ isn't very clear about what my login data for their online customer area now actually is. Not that their instruction manual was either.
I noticed in that manual that apparently the PIN code can't be changed (for "security reasons", totally not the alternative that probably they didn't want to implement it), and that requesting a forgotten PIN code can be done with as little as calling them up, and they'll then send the password - not a reset form, the password itself! IN THE FUCKING MAIL.
Because that's apparently how financial institutions manage their passwords. The fact that they know your password means that they're storing it in plain text, probably in a database with all the card numbers and CVC's next to it. Wouldn't that be a treasure trove for cybercriminals, I wonder? But YOU the customer can't change your password, because obviously YOU wouldn't be able to maintain a secure password, yet THEY are obviously the ones with all the security and should be the ones to take out of YOUR hands the responsibility to maintain YOUR OWN password.
Banking logic. I fucking love it.
As for their database.. I reckon that that's probably written in COBOL too. Because why wouldn't you.23 -
Oh fuck and boy Jesus, how on earth is this still a thing 😦
MD fucking 5 is not a fucking “secure” crypto algorithm.
This site has 14 million breached accounts with fucking MD5 hashes.
I think I’ve had to much internet for today.
17 -
I’m so mad I’m fighting back anger tears. This is a long rant and I apologize but I’m so freaking mad.
So a few weeks ago I was asked by my lead staff person to do a data analysis project for the director of our dept. It was a pretty big project, spanning thousands of users. I was excited because I love this sort of thing and I really don’t have anything else to do. Well I don’t have access to the dataset, so I had to get it from my lead and he said he’d do it when he had a chance. Three days later he hadn’t given it to me yet. I approach him and he follows me to my desk, gives me his login and password to login to the secure freaking database, then has me clone it and put it on my computer.
So, I start working on it. It took me about six hours to clean the database, 2 to set up the parameters and plan of attack, and two or three to visualize the data. I realized about halfway through that my lead wasn’t sure about the parameters of the analysis, and I mentioned to him that the director had asked for more information than what he was having me do. He tells me he will speak with director.
So, our director is never there, so I give my lead about a week to speak with her, in the mean time I finish the project to the specifications that the director gave. I even included notes about information that I would need to make more accurate predictions, to draw conclusions, etc. It was really well documented.
Finally, exasperated, and with the project finished but just sitting on my computer for a week, I approached my director on a Saturday when I was working overtime. She confirmed that I needed to what she said in the project specs (duh), and also mentioned she needed a bigger data set than what I was working with if we had one. She told me to speak to my lead on Monday about this, but said that my work looked great.
Monday came and my lead wasn’t there so I spoke with my supervisor and she said that what I was using was the entire dataset, and that my work looked great and I could just send it off. So, at this point 2/3 of my bosses have seen the project, reviewed it, told me it was great, and confirmed that I was doing the right thing.
I sent it off to the director to disseminate to the appropriate people. Again, she looked at it and said it was great.
A week later (today) one of the people that the project was sent to approaches me and tells me that i did a great job and thank you so much for blah blah blah. She then asks me if the dataset I used included blahblah, and I said no, that I used what was given to me but that I’d be happy to go in and fix it if given the necessary data.
She tells me, “yeah the director was under the impression that these numbers were all about blahblah, so I think there was some kind of misunderstanding.” And then implied that I would not be the one fixing the mistake.
I’m being taken off of the project for two reasons: 1. it took to long to get the project out in the first place,
2. It didn’t even answer the questions that they needed answered.
I fucking told them in the notes and ALL THROUGH THE VISUALIZATIONS that I needed additional data to compare these things I’m so fucking mad. I’m so mad.15 -
I hate Linux so much. I mean, how could anyone of you barbarians like it??
I don't understand the hate for windows. It's secure, emphasizes privacy, and it's Microsoft. What's not to love?
Linux is just proprietary malware.26 -
I still miss my college days. Our crappy IT Dept restricted internet usage on campus. Each student used to get 10 GB of internet data and they used Cyberoam for login (without HTTPS). 10 GB was so less (at least for me).
Now, thanks to CS50, I learned that HTTP was not secure and somehow you can access login credentials. I spent a night figuring things out and then bam!! Wireshark!!!!
I went to the Central Library and connected using Wireshark. Within a matter of minutes, I got more than 30 user ids and passwords. One of them belonged to a Professor. And guess what, it had unlimited data usage with multiple logins. I felt like I was a millionaire. On my farewell, I calculated how much data I used. It was in TBs.
Lesson: Always secure your URLs.5 -
I hate Wordpress. I hate Wordpress. I hate Wordpress.
Wordpress can take a big shit on itself and crawl into a deep dark hole far away from all that is good.
Who even uses Wordpress? Bloggers? Come on, let’s be honest, they’re using more intuitive sites like weebly, wix, and square space. So WHAT is Wordpress for? I’ll tell you, it’s just to FUCKING TORTURE PEOPLE.
So, being the “techy guy” of the family, a relative contacts me asking for some help with their website because they need to install an SSL certificate but they don’t know how to. I tell them I’d gladly do it because, sure, they’re family and how long can it possibly take to install a certificate? I’ve done it before!
Well, I get to work and log into the sluggish Wordpress dashboard and try to use a plugin that would issue a LetsEncrypt certificate because they are free and just as good as any other SSL. But one plugin after the next I keep getting errors about how my hosting wouldn’t allow it.
So I contact GoDaddy (don’t get me fucking started) and ask them about the issue. The guy tells me it’s “policy” to only be able to use GoDaddy’s certificates. How much do they cost? Oh, how about $100 a year?! Fuck you.
I figured out the only way to escape this hell was to ask them to open an economy Linux hosting account with cPanel on GoDaddy (the site was formerly hosted on a “Managed Wordpress” account which is just bullshit for not wanting to give you any control over your own goddamn content). So now I have to deal with migrating the site.
GoDaddy representative tells me that it should only take 20 minutes for me to do this (I’ve already spent way too much time on this but whatever) so I go forward with the new account. I decide I should migrate the site by exporting a backup and manually placing everything on the new server. Doesn’t it end up taking an entire hour to back up a 200MB site because GoDaddy throttled the processing speed?!
So, it’s another hour later and I’ve installed all the databases and carried over all the files. At this point, I’m really at the end of my rope and can’t wait to install the certificate and be done with this fuckery.
I install the certificate and finally get ready to be on my way, but then I see it. A warning. A warning from my browser telling me the site is only partially secure. It turns out the certificate was properly installed but whoever initially made the site HARDCODED ALL THE LINKS to images, websites, and style sheets to be http instead of https.
I’m gonna explode.
I swear, I’m gonna fucking explode.
After a total of 5 hours of work, I finally get the site secure by using search and replace on every fucking file.
Wordpress can go suck a big one. Actually, Wordpress can go suck the largest fuckin one in existence and choke on it.
TL;DR I agree to install an SSL certificate but end up with much more work than I bargained.34 -
POSTMORTEM
"4096 bit ~ 96 hours is what he said.
IDK why, but when he took the challenge, he posted that it'd take 36 hours"
As @cbsa wrote, and nitwhiz wrote "but the statement was that op's i3 did it in 11 hours. So there must be a result already, which can be verified?"
I added time because I was in the middle of a port involving ArbFloat so I could get arbitrary precision. I had a crude desmos graph doing projections on what I'd already factored in order to get an idea of how long it'd take to do larger
bit lengths
@p100sch speculated on the walked back time, and overstating the rig capabilities. Instead I spent a lot of time trying to get it 'just-so'.
Worse, because I had to resort to "Decimal" in python (and am currently experimenting with the same in Julia), both of which are immutable types, the GC was taking > 25% of the cpu time.
Performancewise, the numbers I cited in the actual thread, as of this time:
largest product factored was 32bit, 1855526741 * 2163967087, took 1116.111s in python.
Julia build used a slightly different method, & managed to factor a 27 bit number, 103147223 * 88789957 in 20.9s,
but this wasn't typical.
What surprised me was the variability. One bit length could take 100s or a couple thousand seconds even, and a product that was 1-2 bits longer could return a result in under a minute, sometimes in seconds.
This started cropping up, ironically, right after I posted the thread, whats a man to do?
So I started trying a bunch of things, some of which worked. Shameless as I am, I accepted the challenge. Things weren't perfect but it was going well enough. At that point I hadn't slept in 30~ hours so when I thought I had it I let it run and went to bed. 5 AM comes, I check the program. Still calculating, and way overshot. Fuuuuuuccc...
So here we are now and it's say to safe the worlds not gonna burn if I explain it seeing as it doesn't work, or at least only some of the time.
Others people, much smarter than me, mentioned it may be a means of finding more secure pairs, and maybe so, I'm not familiar enough to know.
For everyone that followed, commented, those who contributed, even the doubters who kept a sanity check on this without whom this would have been an even bigger embarassement, and the people with their pins and tactical dots, thanks.
So here it is.
A few assumptions first.
Assuming p = the product,
a = some prime,
b = another prime,
and r = a/b (where a is smaller than b)
w = 1/sqrt(p)
(also experimented with w = 1/sqrt(p)*2 but I kept overshooting my a very small margin)
x = a/p
y = b/p
1. for every two numbers, there is a ratio (r) that you can search for among the decimals, starting at 1.0, counting down. You can use this to find the original factors e.x. p*r=n, p/n=m (assuming the product has only two factors), instead of having to do a sieve.
2. You don't need the first number you find to be the precise value of a factor (we're doing floating point math), a large subset of decimal values for the value of a or b will naturally 'fall' into the value of a (or b) + some fractional number, which is lost. Some of you will object, "But if thats wrong, your result will be wrong!" but hear me out.
3. You round for the first factor 'found', and from there, you take the result and do p/a to get b. If 'a' is actually a factor of p, then mod(b, 1) == 0, and then naturally, a*b SHOULD equal p.
If not, you throw out both numbers, rinse and repeat.
Now I knew this this could be faster. Realized the finer the representation, the less important the fractional digits further right in the number were, it was just a matter of how much precision I could AFFORD to lose and still get an accurate result for r*p=a.
Fast forward, lot of experimentation, was hitting a lot of worst case time complexities, where the most significant digits had a bunch of zeroes in front of them so starting at 1.0 was a no go in many situations. Started looking and realized
I didn't NEED the ratio of a/b, I just needed the ratio of a to p.
Intuitively it made sense, but starting at 1.0 was blowing up the calculation time, and this made it so much worse.
I realized if I could start at r=1/sqrt(p) instead, and that because of certain properties, the fractional result of this, r, would ALWAYS be 1. close to one of the factors fractional value of n/p, and 2. it looked like it was guaranteed that r=1/sqrt(p) would ALWAYS be less than at least one of the primes, putting a bound on worst case.
The final result in executable pseudo code (python lol) looks something like the above variables plus
while w >= 0.0:
if (p / round(w*p)) % 1 == 0:
x = round(w*p)
y = p / round(w*p)
if x*y == p:
print("factors found!")
print(x)
print(y)
break
w = w + i
Still working but if anyone sees obvious problems I'd LOVE to hear about it.36 -
Would the web be better off, if there was zero frontend scripting? There would be HTML5 video/audio, but zero client side JS.
Browsers wouldn't understand script tags, they wouldn't have javascript engines, and they wouldn't have to worry about new standards and deprecations.
Browsers would be MUCH more secure, and use way less memory and CPU resources.
What would we really be missing?
If you build less bloated pages, you would not really need ajax calls, page reloads would be cheap. Animated menus do not add anything functionally, and could be done using css as well. Complicated webapps... well maybe those should just be desktop/mobile apps.
Pages would contain less annoying elements, no tracking or crypto mining scripts, no mouse tracking, no exploitative spam alerts.
Why don't we just deprecate JS in the browser, completely?
I think it would be worth it.22 -
I've got a confession to make.
A while ago I refurbished this old laptop for someone, and ended up installing Bodhi on it. While I was installing it however, I did have some wicked thoughts..
What if I could ensure that the system remains up-to-date by running an updater script in a daily cron job? That may cause the system to go unstable, but at least it'd be up-to-date. Windows Update for Linux.
What if I could ensure that the system remains protected from malware by periodically logging into it and checking up, and siphoning out potential malware code? The network proximity that's required for direct communication could be achieved by offering them free access to one of my VPN servers, in the name of security or something like that. Permanent remote access, in the name of security. I'm not sure if Windows has this.
What if I could ensure that the system remains in good integrity by disabling the user from accessing root privileges, and having them ask me when they want to install a piece of software? That'd make the system quite secure, with the only penetration surface now being kernel exploits. But it'd significantly limit what my target user could do with their own machine.
At the end I ended up discarding all of these thoughts, because it'd be too much work to implement and maintain, and it'd be really non-ethical. I felt filthy from even thinking about these things. But the advantages of something like this - especially automated updates, which are a real issue on my servers where I tend to forget to apply them within a couple of weeks - can't just be disregarded. Perhaps Microsoft is on to something?11 -
You know what you sound like when you say that "I want to be a programmer but this code is offensive so remove it"? It's like saying that "I want to be a surgeon but I don't like blood, so remove the blood right now."
I personally don't really like blood a whole lot, especially when it comes out of the bodies of other people. I don't really want to become a surgeon, but let's say that I would. "Teacher, I don't like blood, I want to become a surgeon but I hate blood!!! MAKE ALL PATIENTS STOP BLEEDING NOW!!!"
To which my teacher surgeon would of course respond: "Well how about you don't become a surgeon then, because humans that are cut open do bleed, and there's nothing we can do about it."
Same thing with code. You know why code is written? To be a useful tool, for people to become more productive by running the thing (unlike the average SJW). And normal people, you know how much they care about the code? They only care for it as much as for it to be able to run properly. And the ones that do look in the source code either want to improve its functionality or check whether it's actually something decent, secure, safe to run etc etc. People don't normally look at code for the sake of getting offended by something.
But the formulation used in the code, does it even matter? Jerk, it's a term that's used in physics. Does it refer to your despised white cis males whacking off? Of course it doesn't, it's a term to describe change in acceleration. Masters and slaves in code, does it refer to slavery? Most certainly it doesn't. So why bother?6 -
Some 'wk306' highlights from different people:
Walk around the office in his underwear, because he forgot he left his trousers in the bathroom
Run a red light outside the office due to not wearing his required glasses. When questioned by co-workers, replied "I don't follow those facist rules"
Asking if we work less will we get paid more, because the project will take longer to do (while in a startup with no funding trying to secure some)
Tell a senior dev to stop testing in his spare time, as we won't be able to release on time if he keeps finding critical security bugs
Telling me "your timezone is not my concern", when asking for help with new tooling so we don't have to be online at the same time
Blaming my team for requesting too much help, leading to his team missing deadlines, in a meeting with very senior managers. When the reason we were requesting help was the handover doc we were given was filled with lies about features being finished and "ready to ship" and lacking any unit tests
Being accused of bullying and harassment to the CEO, because someone asked "did you follow up with X about the partnership they emailed us about". The person who was responsible, forgot 4 times, and saw it as an "attack" to mention it in team meetings
Telling an entire office/building mid November they've secured funding for at least the next year, then announcing in January after the Christmas break that its cheaper to move to India, so they are closing the office in 30 days2 -
Boy, sure wish I knew about this before putting all of my passwords into lastpass. This looks way more secure. Handwriting in English is pretty much as good as encryption.
9 -
You've heard of ROT13, now get ready for ROT26. This new and improved algorithm is TWICE as secure as ROT13 due to letters being shifted /twice/ as much.
There's even an API for this encryption service, for all ease of programming integration needs!
http://api.rot26.org/encrypt/... to encrypt}2 -
Let me explain a tiny corner of some awful code I read earlier today, in layman’s terms.
It’s a method to see if the user is in a secure session — not to set up the session, just to see if it exists. The method ends with a question mark, so it’s basically a question. It should look up the info (without changing anything) and should always give a clear yes/no answer. Makes sense, right?
Let’s say the question is “am I in school right now?”
The code… well.
If there isn’t a student, the answer it gives is null, not yes or no. Null is a fancy word for no, pretty much, so that’s kinda fine, but it really should be a simple no.
It then checks to see if the school is open today. If it is open, it then checks to see if I made my lunch, if I took my backpack, and if I rode the bus — and makes these things happen if they didn’t. Forgot my backpack? Just ask “am I in school today?” And poof! There’s my backpack! … but only if the school is open.
It then, finally, checks to see if I’m actually in the school, and gives that answer.
It could just see if I’m in the school — I mean, I could be in school without a backpack, or walked there on the weekend, right? Ha! You and your silly logic have no place here.
So, by asking if the user is in a secure session, we change the answer: they weren’t before, but the act of asking makes it so. This isn’t profound or anything: I don’t work with Schrödinger. My coworkers are just idiots.
And no, the rest of the code isn’t any better…5 -
I love how the Keybase Linux client installs itself straight into /keybase. Unix directory structure guidelines? Oh no, those don't apply to us. And after uninstalling the application they don't even remove the directory. Leaving dirt and not even having the courtesy to clean it up. Their engineers sure are one of a kind.
Also, remember that EFAIL case? I received an email from them at the time, stating some stuff that was about as consistent as their respect for Unix directory structure guidelines. Overtyping straight from said email here:
[…] and our filesystem all do not use PGP.
> whatever that means.
The only time you'll ever use PGP encryption in Keybase is when you're sitting there thinking "Oh, I really want to use legacy PGP encryption."
> Legacy encryption.. yeah right. Just as legacy as Vim is, isn't it?
You have PGP as part of your cryptographic identity.
> OH REALLY?! NO SHIT!!! I ACTIVELY USED 3 OS'S AND FAILED ON 2 BECAUSE OF YOUR SHITTY CLIENT, JUST TO UPLOAD MY FUCKING PUBLIC KEY!!!
You'll want to remove your PGP key from your Keybase identity.
> Hmm, yeah you might want to do so. Not because EFAIL or anything, just because Keybase clearly is a total failure on all levels.
Written quickly,
the Keybase team
> Well that's fucking clear. Could've taken some time to think before hitting "Send" though.
Don't get me wrong, I love the initiatives like this with all my heart, and greatly encourage secure messaging that leverages PGP. But when the implementation sucks this much, I start to ask myself questions about whether I should really trust this thing with my private conversations. Luckily I refrained from uploading my private key to their servers, otherwise I would've been really fucked. -
Taking IT classes in college. The school bought us all lynda and office365 accounts but we can't use them because the classroom's network has been severed from the Active Directory server that holds our credentials. Because "hackers." (The non-IT classrooms don't have this problem, but they also don't need lynda accounts. What gives?)
So, I got bored, and irritated, so I decided to see just how secure the classroom really was.
It wasn't.
So I created a text file with the following rant and put it on the desktop of the "locked" admin account. Cheers. :)
1. don't make a show of "beefing up security" because that only makes people curious.
I'm referring of course to isolating the network. This wouldn't be a problem except:
2. don't restrict the good guys. only the bad guys.
I can't access resources for THIS CLASS that I use in THIS CLASS. That's a hassle.
It also gives me legitimate motivation to try to break your security.
3. don't secure it if you don't care. that is ALSO a hassle.
I know you don't care because you left secure boot off, no BIOS password, and nothing
stopping someone from using a different OS with fewer restrictions, or USB tethering,
or some sort malware, probably, in addition to security practices that are
wildly inconsistent, which leads me to the final and largest grievance:
4. don't give admin priveledges to an account without a password.
seriously. why would you do this? I don't understand.
you at least bothered to secure the accounts that don't even matter,
albeit with weak and publicly known passwords (that are the same on all machines),
but then you went and left the LEAST secure account with the MOST priveledges?
I could understand if it were just a single-user machine. Auto login as admin.
Lots of people do that and have a reason for it. But... no. I just... why?
anyway, don't worry, all I did was install python so I could play with scripting
during class. if that bothers you, trust me, you have much bigger problems.
I mean you no malice. just trying to help.
For real. Don't kick me out of school for being helpful. That would be unproductive.
Plus, maybe I'd be a good candidate for your cybersec track. haven't decided yet.
-- a guy who isn't very good at this and didn't have to be
have a nice day <3
oh, and I fixed the clock. you're welcome.2 -
Can someone please explain to me WHY THE FUCK non devs feel like they know shit. I DON'T GIVE A FUCK ABOUT HOW YOU FOUND SOME UNTRUE SHIT ON GIZMODO. I'VE KNOW SO MUCH ABOUT THIS SHIT, AND YOU LOOKED UP THE FIRST EXAMPLE YOU COULD FIND THE SUPPORTS YOUR CASE. The most recent time this happened was OVER THE LAST FEW DAYS when this DUMBASS that my friends and I BULLY but HE STILL HANGS AROUND. (By bully, yes sometimes we are mean to him, but we're not out to get him. He comes to us and we don't wanna be with him). So after the SEVENTH groupchat (on two apps) he created that night, HE WANTED TO SWITCH BACK TO ANOTHER APP I SPENT A WEEK TRYING TO GET THEM TO SWITCH FROM PREVIOUSLY (It was whatsapp, i got them to switch to telegram). THEN HE TRIED to ARGUE with me about how TELEGRAM wasnt secure. HE SEARCHED "is telegram secure" on Google and chose the FIRST ARTICE from the previously mentioned, GIZMODO which says that TELEGRAM chats ARENT ENCRYPTED by DEFAULT. HOW THE FUCK DO DUMBASSES GET THIS KIND OF PUBLICITY. There's a difference between ENCRYPTION and END TO END DUMBASS. Then he told me whatsapp is more secure than telegram. NO ITS FUCKING NOT. In telegram, your encryption keys CHANGE every chat, or every 100 messages. To my best research, whatsapp only has ONE key per USER. I could go on forever about how chat backups in whatsapp are UNENCRYPTED or how FACEBOOK stores your data, but blocked you works to.6
-
Watch out for these fucking bug bounty idiots.
Some time back I got an email from one shortly after making a website live. Didn't find anything major and just ran a simple tool that can suggest security improvements simply loading the landing page for the site.
Might be useful for some people but not so much for me.
It's the same kind of security tool you can search for, run it and it mostly just checks things like HTTP headers. A harmless surface test. Was nice, polite and didn't demand anything but linked to their profile where you can give them some rep on a system that gamifies security bug hunting.
It's rendering services without being asked like when someone washes your windscreen while stopped at traffic but no demands and no real harm done. Spammed.
I had another one recently though that was a total disgrace.
"I'm a web security Analyst. My Job is to do penetration testing in websites to make them secure."
"While testing your site I found some critical vulnerabilities (bugs) in your site which need to be mitigated."
"If you have a bug bounty program, kindly let me know where I should report those issues."
"Waiting for response."
It immediately stands out that this person is asking for pay before disclosing vulnerabilities but this ends up being stupid on so many other levels.
The second thing that stands out is that he says he's doing a penetration test. This is illegal in most major countries. Even attempting to penetrate a system without consent is illegal.
In many cases if it's trivial or safe no harm no foul but in this case I take a look at what he's sending and he's really trying to hack the site. Sending all kinds of junk data and sending things to try to inject that if they did get through could cause damage or provide sensitive data such as trying SQL injects to get user data.
It doesn't matter the intent it's breaking criminal law and when there's the potential for damages that's serious.
It cannot be understated how unprofessional this is. Irrespective of intent, being a self proclaimed "whitehat" or "ethical hacker" if they test this on a site and some of the commands they sent my way had worked then that would have been a data breach.
These weren't commands to see if something was possible, they were commands to extract data. If some random person from Pakistan extracts sensitive data then that's a breach that has to be reported and disclosed to users with the potential for fines and other consequences.
The sad thing is looking at the logs he's doing it all manually. Copying and pasting extremely specific snippets into all the input boxes of hacked with nothing to do with the stack in use. He can't get that many hits that way.4 -
My first job was actually nontechnical - I was 18 years old and sold premium office furniture for a small store in Munich.
I did code in my free time though (PHP/JS mostly, had a litte browsergame back then - those were the days), so when my boss approached me and asked me whether I liked to take over a coding project, I agreed to the idea.
Little did I know at the time: I was supposed to work with a web agency the boss had contracted to build their online shop. Only that he had no plan or anything, he basically told them "build me an online shop like abc(a major competitor of ours at the time)"
He employed another sales lady who was supposed to manage the shop (that didn't exist yet). In the end, I think 80% of her job was to keep me from killing my boss.
As you can imagine, with this huuuuge amout of planning and these exact visions of what was supposed to be, things went south fast and far. So far that I could visit my fellow flightless birds down in the Penguin's republic of Antarctica and still need to go further.
Well... When my boss started suing the web agency, I was... ahem, asked to take over. Dumb as I was, I did - I was a PHP kid and thought that Magento, being written in PHP, would be easy to master. If you know Magento, you know that was maybe the wrongest thing I ever said.
Fast forward 3 very exhausting months, the thing was online. Not all of it worked yet, but it was online and fairly secure.
I did next to everything myself, administrating the CentOS box the shop was running on, its (own) e-mail server, the web server, all the coding required for the shop (can you spell 12 hour day for 8 hour pay?)
3 further months later, my life basically was a wreck, I dragged myself to work, the only thing I looked forward being the motorcycle ride home. The system worked though.
Mind you, I was still, at the time, working with three major customers, doing deskside support and some admin (Win Server 2008R2 at the time) - because, to quote my boss, "We could not afford a full time developer and we don't need one".
I think i stopped coding in my free time, the one hobby I used to love more than anything on the world, somewhere Decemerish 2012. I dropped out of the open source projects I was in, quit working on my browser game and let everything slide.
I didn't even care to renew the domains and servers for it, I just let it die without notice.
The little free time I had, I spent playing video games and getting drunk/high.
December 2013, 1.5 years on the job, I reached my breaking point and just left, called in sick at least a week per month because I just could not see this fucking place anymore.
I looked for another job outside of ALL of what I did before. No more Magento, no more sales, no more PHP. I didn't have to look for long, despite what I thought of my skills.
In February 2014, I told my boss that I quit. It was still seven months until my new job started, but I wanted him to know early so we could migrate and find a replacement.
The search for said replacement started in June 2014. I had considerably less work in the months before, looks like he got the hint.
In August 2014, my replacement arrived and I got him started.
I found a job, which I am still in, and still happy about after almost half a decade, at a local, medium sized ISP as a software dev and IT security guy. Got a proper training with a certificate and everything now.
My replacement lasted two months, he was external and never really did his job - the site, which until I had quit, had a total of 3 days downtime for 3 YEARS (they were the hoster's fault, not mine), was down for an entire month and he could not even tell why.
HIS followup was kicked after taking two weeks to familiarize himself with the project. Well, I think that two weeks is not even barely enough to familiarize yourself with nearly three years of work, but my boss gave him two days.
In 2016, the shop was replaced with another one. Different shop system, different OS, different CI. I don't know why and I can't say I give a damn.
Almost all the people that worked at the company back with me have left for greener pastures, taking their customers (and revenue) with them.
As for my boss' comments, instructions and lines: THAT might not be safe for work. Or kids. Or humans in general. And there wouldn't be much left if you put it through a language filter...
Moral of the story: No, it's not a bad thing to leave a place if you're mistreated there. Don't mistake loyalty with stupidity!
And, to quote one of my favourite Bands: "Nothing matters when the pain is all but gone" (Tragedy + Time by Rise Against).8 -
Back when I migrated my file server to a VM, I used robocopy to copy everything over (and caused quite a few fuckups before it'd behave halfway decent.. or so I thought). Now I tried to add my desktop's SSH key to the authorized_keys on said server but it wouldn't accept my key after that. After a bit of digging I've found that my entire home directory (where the file server hosts its mirror of my D: drive) had everything set to 777, and that's why the key isn't accepted. Great permission mode, isn't it? Much secure, very wow! Thank you so much robocopy!!!3
-
Rant:
Why in the freezing cold all people think that linux = secure. Ransomware... Bla bla not happening on linux bla bla... Linux is secure.
If Linux would have been the most popular one people will pretty much run everything on root and install every stupid package available and never run: apt-get update.
Users were so dumb they got scammed by a phising mail... In freaking 2017... This is user stupidity not OS fault...
God its stupidly annoying seeing the same stuff : Linux secure...
Everything can be secure if you paid attention to the same stuff in freaking 2000.30 -
Im getting a bit tired of programming.
I have been struggling for years regarding programming. I did have some moments of perceived success, but most of the time it has been depressing.
I’m not sure if I dislike programming. But there are some aspects of it that make me feel not as passionate about it.
First of, programs are invisible. No one sees your program or you (assuming we’re talking about a non artistic dev job).
People can’t see lines of code executing, but even if they did it would be gibberish to them.
Users can only become aware of bad software and that kind of breaks my heart a bit.
You could write fast, stable, secure, easy to read, easy to update software. People won’t notice. Hell, even your boss/coworkers might not notice.
In fact, sometimes you try to do the good thing, you try to become a better dev, you try to write tests first, you try to i18n, and what do you get? “Uhh, that’s taking too much time and I don’t see the benefit”.
I know some people will say that people noticing bad service happens on every job.
But programming is the ultimate isolation job. No client has ever told me “hey that code you wrote was pretty good”. They can’t even read code.
I don’t know the users, the users don’t know me, and the users can only judge my program by the result, they can only judge the visual interface.
Let’s say you write a cool project at github. The code is great. Guess what, every language’s ecosystem out there is saturated. Everything is already written. GitHub is saturated. Your best project ends up being a just for yourself enjoyment.
I’m not saying you shouldn’t enjoy code for yourself. That’s how I bet most prolific coders start. I’ve been doing that for many years now. But at some point you want to be part of something with humans.
Imagine I’m stranded on an island with nothing no humans, just food, water and a computer. Would I write code just for myself, just for fun? I think I would off myself 3 months in.
Maybe I should do develop a more social talent...10 -
I finally moved to Fedora Silverblue 30 which is a really awesome OS.
Silverblue Edition unlike the standard version, runs a immutable core. That means the entire FS is not writable except for certain parts that are mounted to /var. While this is limiting, this allows for atomic updates, which is the whole point of Silverblue.
Now this also might throw off even myself, because I might need to run VSCode in the host and I might need C++ libs. Fortunately there's a tool named toolbox that allows you to use standard DNF inside a OCI container. Now the thing is, now you need to tell your IDE to use it after installing it.
I wrote a little helper script to do just that. I wrote it primarily for VSCode but it should also work for your IDE if you happen to want to try to use Silverblue.
Helper script: https://t.co/sXYOgcwLBg?amp=1
Also if you wanna try Silverblue for yourself, here's some notes:
* To install apps, you need to run flatpak. Make sure you also have the flathub repo listed.
* don't use the Flatpak version of the IDEs. If possible, use the RPM versions. Silverblue allows you to install traditional packages (to some degree, not everything works in this thing because of the immutable design) in the host. So as much as possible if you need dev libs, use toolbox for those.
* Silverblue also comes with podman and buildah installed (aka what if Docker had no daemon and was more secure?)
*Do your updates via rpm-ostree upgrade, or turn the auto updater on if you're lazy
All in all I like this environment, I've used this kind of workspace before (Chrome OS), so its pretty easy for me to get used to.
What do you think guys, think you'll give it a shot?
5 -
About browsers and whole SSL CERT thing...
Most likely everyone here noticed, that https site with broken certificate will throw these big red warnings, in your face and there is so much wording like "ITS NOT SECUREEEE" or "ITS HACKEDDD" almost like it was written by passionate fanatic.
But when you are on plaintext http browsers reaction is like ¯\_(ツ)_/¯
Even if you have plaintext with password, it will for example in chromium put small little red thingy that almost no one notices.
I believe that broken cert with some error like invalid date is MORE secure than plaintext password, yet still there is this hypocracy with browsers...
I dont say that broken SSL cert is good, or something, Im just pointing out contrast of "broken" https vs plain http.... One looks for casual Joe like end of the world is coming and second is bearly noticable. Da fuck?
I disagree with this approach17 -
TL; DR: Bringing up quantum computing is going to be the next catchall for everything and I'm already fucking sick of it.
Actual convo i had:
"You should really secure your AWS instance."
"Isnt my SSH key alone a good enough barrier?"
"There are hundreds of thousands of incidents where people either get hacked or commit it to github."
"Well i wont"
"Just start using IP/CIDR based filtering, or i will take your instance down."
"But SSH keys are going to be useless in a couple years due to QUANTUM FUCKING COMPUTING, so why wouldnt IP spoofing get even better?"
"Listen motherfucker, i may actually kill you, because today i dont have time for this. The whole point of IP-based security is that you cant look on Shodan for machines with open SSH ports. You want to talk about quantum computing??!! Lets fucking roll motherfucker. I dont think it will be in the next thousand years that we will even come close to fault-tolerant quantum computing.
And even if it did, there have been vulnerabilities in SSH before. How often do you update your instance? I can see the uptime is 395 days, so probably not fucking often! I bet you "dont have anything important anyways" on there! No stored passwords, no stored keys, no nothing, right (she absolutely did)? If you actually think I'm going to back down on this when i sit in the same room as the dude with the root keys to our account, you can kindly take your keyboard and shove it up your ass.
Christ, I bet that the reason you like quantum computing so much is because then you'll be able to get your deepfakes of miley cyrus easier you perv."8 -
Chrome, Firefox, and yes even you Opera, Falkon, Midori and Luakit. We need to talk, and all readers should grab a seat and prepare for some reality checks when their favorite web browsers are in this list.
I've tried literally all of them, in search for a lightweight (read: not ridiculously bloated) web browser. None of them fit the bill.
Yes Midori, you get a couple of bonus points for being the most lightweight. Luakit however.. as much as I like vim in my terminal, I do not want it in a graphical application. Not to mention that just like all the others you just use webkit2gtk, and therefore are just as bloated as all the others. Lightweight my ass! But programmable with Lua, woo! Not like Selenium, Chrome headless, ... does that for any browser. And that's it for the unique features as far as I'm concerned. One is slow, single-threaded and lightweight-ish (Midori) and another has vim keybindings in an application that shouldn't (Luakit).
Pretty much all of them use webkit2gtk as their engine, and pretty much all of them launch a separate process for each tab. People say this is more secure, but I have serious doubts about that. You're still running all these processes as the same user, and they all have full access to the X server they run under (this is also a criticism against user separation on a single X session in general). The only thing it protects against is a website crashing the browser, where only that tab and its process would go down. Which.. you know.. should a webpage even be able to do that?
But what annoys me the most is the sheer amount of memory that all of these take. With all due respect all of you browsers, I am not quite prepared to give 8 fucking gigabytes - half the memory in this whole box! - just for a dozen or so tabs. I shouldn't have to move my web browser to another lesser used 16GB box, just to prevent this one from going into fucking swap from a dozen tabs. And before someone has a go at the add-ons, there's 4 installed and that's it. None of them are even close to this complete and utter memory clusterfuck. It's the process separation. Each process consumes half a GB of memory, and there's around a dozen of them in a usual browsing session. THAT is the real problem. And I want to get rid of it.
Browsers are at their pinnacle of fucked up in my opinion, literally to the point where I'm seriously considering elinks. Being a sysadmin, I already live my daily life in terminals anyway. As such I also do have resources. But because of that I also associate every process with its cost to run it, in terms of resources required. Web browsers are easily at the top of the list.
I want to put 8GB into perspective. You can store nearly 2 entire DVD movies in that memory. However media players used to play them (such as SMPlayer) obviously don't do that. They use 60-80MB on average to play the whole movie. They also require far less processing power than YouTube in a web browser does, even when you download that exact same video with youtube-dl (either streamed within the media player or externally). That is what an application should be.
Let's talk a bit about these "complicated" websites as well. I hate to break it to you framework web devs, but you're a dime a dozen. The competition is high between web devs for that exact reason. And websites are not complicated. The document itself is plain old HTML, yes even if your framework converts to it in the background. That's the skeleton of your document, where I would draw a parallel with documents in office suites that are more or less written in XML. CSS.. oh yes, markup. Embolden that shit, yes please! And JavaScript.. oh yes, that pile of shit that's been designed in half a day, and has a framework called fucking isEven (which does exactly what it says on the tin, modulo 2 be damned). Fancy some macros in your text editor? Yes, same shit, different pile.
Imagine your text editor being as bloated as a web browser. Imagine it being prone to crashing tabs like a web browser. Imagine it being so ridiculously slow to get anything done in your productivity suite. But it's just the usual with web browsers, isn't it? Maybe Gopher wasn't such a bad idea after all... Oh and give me another update where I have to restart the browser when I commit the heinous act of opening another tab, just because you had to update your fucking CA certs again. Yes please!19 -
Being a programmer for a while now it always irritates me to try to explain what I'm working on to friends and family. I forget what I knew before I developed. I'm always like "I made the strings in the database- oh I mean the words...well they're actually more like strings of letters- well anyway I made a code to sanitize the user input- I mean make it so it is secure before uhhh saving." I spend so much time watering what I'm saying down I forget what I'm talking about
It's not even funny. It'd be funny if one single person in my family or friend group understood what I meant to some degree.3 -
After a few weeks of being insanely busy, I decided to log onto Steam and maybe relax with a few people and play some games. I enjoy playing a few sandbox games and do freelance development for those games (Anywhere from a simple script to a full on server setup) on the side. It just so happened that I had an 'urgent' request from one of my old staff member from an old community I use to own. This staff member decided to run his own community after I sold mine off since I didn't have the passion anymore to deal with the community on a daily basis.
O: Owner (Former staff member/friend)
D: Other Dev
O: Hey, I need urgent help man! Got a few things developed for my server, and now the server won't stay stable and crashes randomly. I really need help, my developer can't figure it out.
Me: Uhm, sure. Just remember, if it's small I'll do it for free since you're an old friend, but if it's a bigger issue or needs a full recode or whatever, you're gonna have to pay. Another option is, I tell you what's wrong and you can have your developer fix it.
O: Sounds good, I'll give you owner access to everything so you can check it out.
Me: Sounds good
*An hour passes by*
O: Sorry it took so long, had to deal with some crap. *Insert credentials, etc*
Me: Ok, give me a few minutes to do some basic tests. What was that new feature or whatever you added?
O: *Explains long feature, and where it's located*
Me: *Begins to review the files* *Internal rage wondering what fucking developer could code such trash* *Tests a few methods, and watches CPU/RAM and an internal graph for usage*
Me: Who coded this module?
O: My developer.
Me: *Calm tone, with a mix of some anger* So, you know what, I'm just gonna do some simple math for ya. You're running 33 ticks a second for the server, with an average of about 40ish players. 33x60 = 1980 cycles a minute, now lets times that by the 40 players on average, you have 79,200 cycles per minute or nearly 4.8 fucking cycles an hour (If you maxed the server at 64 players, it's going to run an amazing fucking 7.6 million cycles an hour, like holy fuck). You're also running a MySQLite query every cycle while transferring useless data to the server, you're clusterfucking the server and overloading it for no fucking reason and that's why you're crashing it. Another question, who the fuck wrote the security of this? I can literally send commands to the server with this insecure method and delete all of your files... If you actually want your fucking server stable and secure, I'm gonna have to recode this entire module to reduce your developer's clusterfuck of 4.8 million cycles to about 400 every hour... it's gonna be $50.
D: *Angered* You're wrong, this is the best way to do it, I did stress testing! *Insert other defensive comments* You're just a shitty developer (This one got me)
Me: *Calm* You're calling me a shitty developer? You're the person that doesn't understand a timer, I get that you're new to this world, but reading the wiki or even using the game's forums would've ripped this code to shreds and you to shreds. You're not even a developer, cause most of this is so disorganized it looks like you copy and pasted it. *Get's angered here and starts some light screaming* You're wasting CPU usage, the game can't use more than 1 physical core, and after a quick test, you're stupid 'amazing' module is using about 40% of the CPU. You need to fucking realize the 40ish average players, use less than this... THEY SHOULD BE MORE INTENSIVE THAN YOUR CODE, NOT THE OPPOSITE.
O: Hey don't be rude to Venom, he's an amazing coder. You're still new, you don't know as much as him. Ok, I'll pay you the money to get it recoded.
Me: Sounds good. *Angered tone* Also you developer boy, learn to listen to feedback and maybe learn to improve your shitty code. Cause you'll never go anywhere if you don't even understand who bad this garbage is, and that you can't even use the fucking wiki for this game. The only fucking way you're gonna improve is to use some of my suggestions.
D: *Leaves call without saying anything*
TL;DR: Shitty developer ran some shitty XP system code for a game nearly 4.8 million times an hour (average) or just above 7.6 million times an hour (if maxed), plus running MySQLite when it could've been done within about like 400 an hour at max. Tried calling me a shitty developer, and got sorta yelled at while I was trying to keep calm.
Still pissed he tried calling me a shitty developer... -
A few days ago Aruba Cloud terminated my VPS's without notice (shortly after my previous rant about email spam). The reason behind it is rather mundane - while slightly tipsy I wanted to send some traffic back to those Chinese smtp-shop assholes.
Around half an hour later I found that e1.nixmagic.com had lost its network link. I logged into the admin panel at Aruba and connected to the recovery console. In the kernel log there was a mention of the main network link being unresponsive. Apparently Aruba Cloud's automated systems had cut it off.
Shortly afterwards I got an email about the suspension, requested that I get back to them within 72 hours.. despite the email being from a noreply address. Big brain right there.
Now one server wasn't yet a reason to consider this a major outage. I did have 3 edge nodes, all of which had equal duties and importance in the network. However an hour later I found that Aruba had also shut down the other 2 instances, despite those doing nothing wrong. Another hour later I found my account limited, unable to login to the admin panel. Oh and did I mention that for anything in that admin panel, you have to login to the customer area first? And that the account ID used to login there is more secure than the password? Yeah their password security is that good. Normally my passwords would be 64 random characters.. not there.
So with all my servers now gone, I immediately considered it an emergency. Aruba's employees had already left the office, and wouldn't get back to me until the next day (on-call be damned I guess?). So I had to immediately pull an all-nighter and deploy new servers elsewhere and move my DNS records to those ASAP. For that I chose Hetzner.
Now at Hetzner I was actually very pleasantly surprised at just how clean the interface was, how it puts the project front and center in everything, and just tells you "this is what this is and what it does", nothing else. Despite being a sysadmin myself, I find the hosting part of it insignificant. The project - the application that is to be hosted - that's what's important. Administration of a datacenter on the other hand is background stuff. Aruba's interface is very cluttered, on Hetzner it's super clean. Night and day difference.
Oh and the specs are better for the same price, the password security is actually decent, and the servers are already up despite me not having paid for anything yet. That's incredible if you ask me.. they actually trust a new customer to pay the bills afterwards. How about you Aruba Cloud? Oh yeah.. too much to ask for right. Even the network isn't something you can trust a long-time customer of yours with.
So everything has been set up again now, and there are some things I would like to stress about hosting providers.
You don't own the hardware. While you do have root access, you don't have hardware access at all. Remember that therefore you can't store anything on it that you can't afford to lose, have stolen, or otherwise compromised. This is something I kept in mind when I made my servers. The edge nodes do nothing but reverse proxying the services from my LXC containers at home. Therefore the edge nodes could go down, while the worker nodes still kept running. All that was necessary was a new set of reverse proxies. On the other hand, if e.g. my Gitea server were to be hosted directly on those VPS's, losing that would've been devastating. All my configs, projects, mirrors and shit are hosted there.
Also remember that your hosting provider can terminate you at any time, for any reason. Server redundancy is not enough. If you can afford multiple redundant servers, get them at different hosting providers. I've looked at Aruba Cloud's Terms of Use and this is indeed something they were legally allowed to do. Any reason, any time, no notice. They covered all their bases. Make sure you do too, and hope that you'll never need it.
Oh, right - this is a rant - Aruba Cloud you are a bunch of assholes. Kindly take a 1Gbps DDoS attack up your ass in exchange for that termination without notice, will you?4 -
My mom asked me to speed up her PC's startup process. I looked into it and and probably found the problem: G Data.
I told her she has to delete it, there is windows defender anyways (and virus scanners are just snake oil). She refused and said: But I bought it from the local IT shop. They said it is the best.
I said: Yeah because they cannot sell windows defender...
She still argued that she paid for it and wants to keep it.
That was were I said: then enjoy your slow startups.
She also said she feels more secure with it. 🙄
I would not even be able to work with that PC! Its not old at all, but the permanent scanning comes at a high cost and probably does not help much.
But she trusts that local it store guy more than me apparently.5 -
Javascript.
All devices in the world:
Dev: can you gently copy the content of this dynamically generated <input> element and copy it to the clipboard?
Devices: Sure thing brah!
...
iOS: LOL
(and proposed solution on SO, ridiculous)
https://stackoverflow.com/a/...
8 -
You probably know the "marshmellow experiment": have one marshmellow now, or delay the gratification by some time, then get two. What the experiment is supposed to measure is something like intelligence or impulse control.
Hot take: what it also measures, and much more so when it comes to reality, is trust. If I don't trust the other side to be both able and willing to deliver on the promise later, I will rather secure the smaller reward right now.8 -
Overheard a dev bragging about how our site is fully PCI compliant. So much so even the invoice data is secure. My BS meter went off, so I decided to look at what 'secure' code looked like.
5 -
So a few weeks ago I wiped my MacBook Pro to regain some space and speed, it wasn't really that slow I just had the disk partitioned into two installments of MacOS. When I erased the disk I thought the secure thing to do would be to set the format to journaled, encrypted rather than just journaled. Everything was working fine, there seemed to be this weird step of login when I restarted but whatever, except iCloud Drive. On my iMac it works fine but for whatever reason my MacBook Pro doesn't want to download custom folders (ones that aren't created by an app and don't have an app icon on folder icon) from my account despite them being clearly available in iCloud.com. So after this much time of messing with it I'm wiping my MacBook Pro again and formatting it as journaled (not encrypted). Wish me luck...undefined this must just be a bug or a security feature... probs a bug tho i still like apple products this stuff usually works for me3
-
Despite common sense, I think technology is not making our lives easier. It's just build chaos on top of chaos.
Take server-side programming for instance.
First you have to find someone to host your thing, or a PaaS provider. Then you have to figure out how much RAM and storage you need, which OS you're going to use. And then there's Docker (which will run on top of a VM on AWS or GCP anyway, making even less sense). And then there's the server technology: nginx, Apache (and many many more; if, that is, you're using a server at all). And then there are firewalls, proxies, SSL. And then you go back to the start, because you have to check if your hosting provider will support the OS or Docker or your server. (I smell infinite recursion here.)
Each of these moving parts come with their own can of worms in terms of configuration and security. A whole bible to read if you want to have the slightest clue about what you're doing.
And then there's the programming language to use and its accompanying frameworks. Can they replace the server technology? Should you? Will they conflict with each other and open yet another backdoor into your system? Is it supported by your hosting provider? (Did I mention an infinite recursion somewhere?)
And then there's the database. Does it have a port to the language/framework of your choosing? Why does it expose an web interface? Is it supposed to replace your server? And why are its security features optional again? (Just so I have to test both the insecure and the secure environments?)
And you haven't written a single line of code yet, mind you.4 -
I don't understand privacy advocators.
Am I the only one who wouldn't give up practicality in exchange for "potentially more secure"?
I don't understand so much what the deal is with people who avoid Facebook, or don't trust Google or Microsoft, just in the basis of "privacy" or "security".
Websites tracking you to serve ads? Well, it's pointless because I very rarely buy something from the internet or let myself be influenced, ads are waste of time, just use an adblocker.
I can pretty much upload my whole life or documents on Google drive, even if I made it public no one would really care or read it all. It's like that GitHub project you uploaded but never documented, so no one cares. I usually use alternative software not because of "privacy" but because it has features other software doesn't have.
In reality you realize people aren't that interested in your life more than their own life.24 -
I need some advice here... This will be a long one, please bear with me.
First, some background:
I'm a senior level developer working in a company that primarily doesn't produce software like most fast paced companies. Lots of legacy code, old processes, etc. It's very slow and bureaucratic to say the least, and much of the management and lead engineering talent subscribes to the very old school way of managing projects (commit up front, fixed budget, deliver or else...), but they let us use agile to run our team, so long as we meet our commitments (!!). We are also largely populated by people who aren't really software engineers but who do software work, so being one myself I'm actually a fish out of water... Our lead engineer is one of these people who doesn't understand software engineering and is very types when it comes to managing a project.
That being said, we have this project we've been working for a while and we've been churning on it for the better part of two years - with multiple changes in mediocre contribution to development along the way (mainly due to development talent being hard to secure from other projects). The application hasn't really been given the chance to have its core architecture developed to be really robust and elegant, in favor of "just making things work" in order to satisfy fake deliverables to give the customer.
This has led us to have to settle for a rickety architecture and sloppy technical debt that we can't take the time to properly fix because it doesn't (in the mind of the lead engineer - who isn't a software engineer mind you) deliver visible value. He's constantly changing his mind on what he wants to see working and functional, he zones out during sprint planning, tries to work stories not on the sprint backlog on the side, and doesn't let our product owner do her job. He's holding us to commitments we made in January and he's not listening when the team says we don't think we can deliver on what's left by the end of the year. He thinks it's reasonable to expect us to deliver and he's brushing us off.
We have a functional product now, but it's not very useful yet and still has some usability issues. It's still missing features, which we're being put under pressure to get implemented (even half-assed) by the end of the year.
TL;DR
Should I stand up for what I know is the right way to write software and push for something more stable sometime next year or settle for a "patch job" that we *might* deliver that will most definitely be buggy and be harder to maintain going forward? I feel like I'm fighting an uphill battle in trying to write good quality code in lieu of faster results and I just can't get behind settling for crap just because.9 -
Hello fellas! 👋
I recently told you that I’m planning to pull out Chaaat – a fully open source messenger that doesn’t track you and doesn’t share your data: https://devrant.com/rants/1549251/....
The project is also mentioned here: https://devrant.com/rants/1570178/...
So, I’m here to tell you good news – a great developer, @not-a-muggle, decided to join me, and now we made a team!
I also made some conversations and acquired “chaaat” name from another team on Heroku, so now we have consistent domain name on both Heroku and GitHub Pages.
We have Trello board with very well described tasks almost anyone can do. We also have Slack to have both business and free conversations.
If you’re seeking a place to contribute and gain some NodeJS / React / PWA / WebRTC experience with detailed code review from experienced developer, just mention me here or shoot me an email on hello@miloslav.website. Provide your email so I’ll be able to contact you.
Our main goals are:
1. Have fun and some experience
2. Make it to Chrome Experiments mention
Marketing/advertising help is much appreciated.
Feel free to email me anytime!8 -
Oh boy I got a few. I could tell you stories about very stupid xss vectors like tracking IDs that get properly sanitized when they come through the url but as soon as you go to the next page and the backend returns them they are trusted and put into the Dom unsanitized or an error page for a wrong token / transaction id combo that accidentally set the same auth cookie as the valid combination but I guess the title "dumbest" would go to another one, if only for the management response to it.
Without being to precise let's just say our website contained a service to send a formally correct email or fax to your provider to cancel your mobile contract, nice thing really. You put in all your personal information and then you could hit a button to send your cancelation and get redirected to a page that also allows you to download a pdf with the sent cancelation (including all your personal data). That page was secured by a cancelation id and a (totally save) 16 characters long security token.
Now, a few months ago I tested a small change on the cancelation service and noticed a rather interesting detail : The same email always results in the same (totally save) security token...
So I tried again and sure, the token seemed to be generated from the email, well so much about "totally save". Of course this was a minor problem since our cancelation ids were strong uuids that would be incredibly hard to brute force, right? Well of course they weren't, they counted up. So at that point you could take an email, send a cancelation, get the token and just count down from your id until you hit a 200 and download the pdf with all that juicy user data, nice.
Well, of course now I raised a critical ticket and the issue was fixed as soon as possible, right?
Of course not. Well I raised the ticket, I made it critical and personally went to the ceo to make sure its prioritized. The next day I get an email from jira that the issue now was minor because "its in the code since 2017 and wasn't exploited".
Well, long story short, I argued a lot and in the end it came to the point where I, as QA, wrote a fix to create a proper token because management just "didn't see the need" to secure such a "hard to find problem". Well, before that I sent them a zip file containing 84 pdfs I scrapped in a night and the message that they can be happy I signed an NDA.2 -
Not as much of a rant as a share of my exasperation you might breathe a bit more heavily out your nose at.
My work has dealt out new laptops to devs. Such shiny, very wow. They're also famously easy to use.
.
.
.
My arse.
.
.
.
I got the laptop, transferred the necessary files and settings over, then got to work. Delivered ticket i, delivered ticket j, delivered the tests (tests first *cough*) then delivered Mr Bullet to Mr Foot.
Day 4 of using the temporary passwords support gave me I thought it was time to get with department policy and change my myriad passwords to a single one. Maybe it's not as secure but oh hell, would having a single sign-on have saved me from this.
I went for my new machine's password first because why not? It's the one I'll use the most, and I definitely won't forget it. I didn't. (I didn't.) I plopped in my memorable password, including special characters, caps, and numbers, again (carefully typed) in the second password field, then nearly confirmed. Curiosity, you bastard.
There's a key icon by the password field and I still had milk teeth left to chew any and all new features with.
Naturally I click on it. I'm greeted by a window showing me a password generating tool. So many features, options for choosing length, character types, and tons of others but thinking back on it, I only remember those two. I had a cheeky peek at the different passwords generated by it, including playing with the length slider. My curiosity sated, I closed that window and confirmed that my password was in.
You probably know where this is going. I say probably to give room for those of you like me who certifiably. did. not.
Time to test my new password.
*Smacks the power button to log off*
Time to put it in (ooer)
*Smacks in the password*
I N C O R R E C T L O G I N D E T A I L S.
Whoops, typo probably.
Do it again.
I N C O R R E C T L O G I N D E T A I L S.
No u.
Try again.
I N C O R R E C T L O G I N D E T A I L S.
Try my previous password.
Well, SUCCESS... but actually, no.
Tried the previous previous password.
T O O M A N Y A T T E M P T S
Ahh fuck, I can't believe I've done this, but going to support is for pussies. I'll put this by the rest of the fire, I can work on my old laptop.
Day starts getting late, gotta go swimming soonish. Should probably solve the problem. Cue a whole 40 minutes trying my 15 or so different passwords and their permutations because oh heck I hope it's one of them.
I talk to a colleague because by now the "days since last incident" counter has been reset.
"Hello there Ryan, would you kindly go on a voyage with me that I may retrace my steps and perhaps discover the source of this mystery?"
"A man chooses, a slave obeys. I choose... lmao ye sure m8, but I'm driving"
We went straight for the password generator, then the length slider, because who doesn't love sliding a slidey boi. Soon as we moved it my upside down frown turned back around. Down in the 'new password' and the 'confirm new password' IT WAS FUCKING AUTOCOMPLETING. The slidey boi was changing the number of asterisks in both bars as we moved it. Mystery solved, password generator arrested, shit's still fucked.
Bite the bullet, call support.
"Hi, I need my password resetting. I dun goofed"
*details tech support needs*
*It can be sorted but the tech is ages away*
Gotta be punctual for swimming, got two whole lengths to do and a sauna to sit in.
"I'm off soon, can it happen tomorrow?"
"Yeah no problem someone will be down in the morning."
Next day. Friday. 3 hours later, still no contact. Go to support room myself.
The guy really tries, goes through everything he can, gets informed that he needs a code from Derek. Where's Derek? Ah shet. He's on holiday.
There goes my weekend (looong weekend, bank holiday plus day flexi-time) where I could have shown off to my girlfriend the quality at which this laptop can play all our favourite animé, and probably get remind by her that my personal laptop has an i2350u with integrated graphics.
TODAY. (Part is unrelated, but still, ugh.)
Go to work. Ten minutes away realise I forgot my door pass.
Bollocks.
Go get a temporary pass (of shame).
Go to clock in. My fob was with my REAL pass.
What the wank.
Get to my desk, nobody notices my shame. I'm thirsty. I'll have the bottle from my drawer. But wait, what's this? No key that usually lives with my pass? Can't even unlock it?
No thanks.
Support might be able to cheer me up. Support is now for manly men too.
*Knock knock*
"Me again"
"Yeah give it here, I've got the code"
He fixes it, I reset my pass, sensibly change my other passwords.
Or I would, if the internet would work.
It connects, but no traffic? Ryan from earlier helps, we solve it after a while.
My passwords are now sorted, machine is okay, crisis resolved.
*THE END*
If you skipped the whole thing and were expecting a tl;dr, you just lost the game.
Otherwise, I absolve you of having lost the game.
Exactly at the char limit9 -
*follow-up to https://devrant.com/rants/1887422*
The burnt remnants of my ID card's authentication information, waiting for the wind to come pick it up. It's stored in my password database now and committed to my git server, as it should be. Storing PIN and PUK codes on paper, whatever government cunt thought thought that that was a good idea...
If you've got identification papers containing authentication information like PIN and PUK codes, by all means add them to your password manager (if you're using Linux, I'd like to recommend GNU Pass) at once and burn the physical version. There's no reason why you'd want those on paper, unless you store your passwords on a post-it too.
At least that's as much as me and possibly you as citizens can do. Our governments are doomed anyway, given the shitty security policy they have, and likely the many COBOL mainframes still in use today. Honestly, the meddlings of Russia with the US elections doesn't seem too far-fetched, given this status quo. It actually surprises me that this kind of stuff doesn't happen more often, given that certain governments hire private pentesters yet can't secure their own infrastructure.
-
My best prank: A year ago I was at my friends flat, which he finally rented with his new girlfriend. He is a kind of person, which has like constantly opened 110 tabs in chrome, three or four instances of chrome running, torrenting at full speed and in the meanwhile a few films having opened to "watch" later. He is very very secure about his computer and NEVER leaves me or anyone else alone with his computer. That day we were just talking in the same room, and he goes for some food. I was like yeah thats my chance to prank him. So I opened a new tab and came with an idea - what If I change his desktop background to some random chick, to prank both him and his gf. I knew she will not be mad but his reaction would be priceless (it was his first gf). So I started googling, found a three pretty naked chicks. This was like soft porn, they were still "dressed" but not much. I did not wanted to use a porn for this.
So I was about to download image - right click - save as - little window opened and..
...what the hell, that guy had literally like terabytes of porn in download folder, all totally in one chaos, thousands of images, millions of downloaded videos, all categories just everything from gangbang to milfs or old/ young, what the fuck that computer was like cursed station of porn.
In that point I was like fuck that. This prank has no sense then. So I just closed that little window and did nothing. Prank failed.
Nowdays, He still does not know what I know about his "hobbies". And I will never say him lol. About a months after he broke with his gf and moved to different house. He has now three monitors attached to his computer and 4tb of space. He is still complaining about "lack of space" and "too big downloaded movies" but we all know what is going on lol. We call his "working deck" a sacred porn station.1 -
My grandfather is at age 72 & don't know much about technology. He forward me this message on whatsapp bcz I'm a software engineer. He made my day...
What is the difference between http and https ?
Time to know this with 32 lakh debit cards compromised in India.
Many of you may be aware of this difference, but it is
worth sharing for any that are not.....
The main difference between http:// and https:// is all
about keeping you secure
HTTP stands for Hyper Text Transfer Protocol
The S (big surprise) stands for "Secure".. If you visit a
Website or web page, and look at the address in the web browser, it is likely begin with the following: http:///.
This means that the website is talking to your browser using
the regular unsecured language. In other words, it is possible for someone to "eavesdrop" on your computer's conversation with the Website. If you fill out a form on the website, someone might see the information you send to that site.
This is why you never ever enter your credit card number in an
Http website! But if the web address begins with https://, that means your computer is talking to the website in a
Secure code that no one can eavesdrop on.
You understand why this is so important, right?
If a website ever asks you to enter your Credit/Debit card
Information, you should automatically look to see if the web
address begins with https://.
If it doesn't, You should NEVER enter sensitive
Information....such as a credit/debit card number.
PASS IT ON (You may save someone a lot of grief).
GK:
While checking the name of any website, first look for the domain extension (.com or .org, .co.in, .net etc). The name just before this is the domain name of the website. Eg, in the above example, http://amazon.diwali-festivals.com, the word before .com is "diwali-festivals" (and NOT "amazon"). So, this webpage does not belong to amazon.com but belongs to "diwali-festivals.com", which we all haven't heard before.
You can similarly check for bank frauds.
Before your ebanking logins, make sure that the name just before ".com" is the name of your bank. "Something.icicibank.com" belongs to icici, but icicibank.some1else.com belongs to "some1else".
👆 *Simple but good knowledge to have at times like these* 👆3 -
Seems like my connection to much-security isn't so... secure 😂
Didn't you forget something, @linuxxx?
6 -
When i was younger, lesser experienced and more naive than now; i got away with a lot of things. By lot of things i mean security flaws in my applications and overall architecture. I realise now i could've so easily been pawned.
Not that i claim to be totally secure even now, or would ever. It is a process, slow and painful one - Learning.
What i wish to point out is the role of favorable probability (non believers would call it luck). Security is so much about it. You get away with so many things for so long. And bang one day the roll of dice is unfavorable. On such rare occasions, just look back and wonder - damn i should've been breached long ago.rant hindsight security fail looking back security luck vulnerabilities food for thought musings naive probability2 -
TL;DR my first vps got hacked, the attacker flooded my server log when I successfully discovered and removed him so I couldn't use my server anymore because the log was taking up all the space on the server.
The first Linux VPN I ever had (when I was a noob and had just started with vServers and Linux in general, obviously) got hacked within 2 moths since I got it.
As I didn't knew much about securing a Linux server, I made all these "rookie" mistakes: having ssh on port 22, allowing root access via ssh, no key auth...
So, the server got hacked without me even noticing. Some time later, I received a mail from my hoster who said "hello, someone (probably you) is running portscans from your server" of which I had no idea... So I looked in the logs, and BAM, "successful root login" from an IP address which wasn't me.
After I found out the server got hacked, I reinstalled the whole server, changed the port and activated key auth and installed fail2ban.
Some days later, when I finally configured everything the way I wanted, I observed I couldn't do anything with that server anymore. Found out there was absolutely no space on the server. Made a scan to find files to delete and found a logfile. The ssh logfile. I took up a freaking 95 GB of space (of a total of 100gb on the server). Turned out the guy who broke into my server got upset I discovered him and bruteforced the shit out of my server flooding the logs with failed login attempts...
I guess I learnt how to properly secure a server from this attack 💪3 -
!Rant #motivation #hugeProject
Yesterday i started a new app and i designed some of it but classes i coded will speed up the whole coding of other parts .
Anyways today i needed to work on the server side of the project and when i was working on setting up the databases structures i realized how big is this project (it uses like 3 APIs) so i was unmotivated because its a side project and it takes alot of time and overall it dont worth it and even app may fail or may be successful.
So i said i dont care about how it will turn out
Im gonna do it , and im gonna do it right now
So i did now its 6 am and the server part is almost finished ! 75% done .
It was a secure login system and signup with verifications and more security stuff and the codes that provide the server status and most of the user parts . And some of the features of the app .
The most hard thing remaining is to setup the in app purchases and the APIs .
So if you see a project that is huge .
Dont give up . Just do it as long as you can
And you will see how much you progress !
And the huge project will be a big project ;)
Then a normal project , then a tiny project :P
Good night1 -
We code hard in these cubicles
My style’s nerd-chic, I’m a programmin’ freak
We code hard in these cubicles
Only two hours to your deadline?
Don’t sweat my technique.
Sippin’ morning coffee with that JAVA swirl.
Born to code; my first words were “Hello World”
Since 95, been JAVA codin’ stayin’ proud
Started on floppy disks, now we take it to the cloud.
On my desktop, JAVA’s what’s bobbin’ and weavin’
We got another winning app before I get to OddEven.
Blazin’ code like a forest fire, climbin’ a tree
Setting standards like I Triple E….
Boot it on up, I use the force like Luke,
Got so much love for my homeboy Duke.
GNU Public Licensed, it’s open source,
Stop by my desk when you need a crash course
Written once and my script runs anywhere,
Straight thuggin’, mean muggin’ in my Aeron chair.
All the best lines of code, you know I wrote ‘em
I’ll run you out of town on your dial-up modem.
Cause…
We code hard in these cubicles
Me and my crew code hyphy hardcore
We code hard in these cubicles
It’s been more than 10 years since I’ve seen the 404.
Inheriting a project can make me go beeee-serk
Ain’t got four hours to transfer their Framework.
The cleaners killed the lights, Man, that ain’t nice,
Gonna knock this program out, just like Kimbo Slice
I program all night, just like a champ,
Look alive under this IKEA lamp.
I code HARDER in the midnight hour,
E7 on the vending machine fuels my power.
Ps3 to Smartphones, our code use never ends,
JAVA’s there when I beat you in “Words with Friends”.
My developing skills are so fresh please discuss,
You better step your game up on that C++.
We know better than to use Dot N-E-T,
Even Dan Brown can’t code as hard as me.
You know JAVA’s gettin’ bigger, that’s a promise not a threat,
Let me code it on your brain
We code hard in these cubicles,
it’s the core component…of what we implement.
We code hard in these cubicles,
Straight to your JAVA Runtime Environment.
We code hard in these cubicles,
Keep the syntax light and the algorithm tight.
We code hard in these cubicles,
Gotta use JAVA if it’s gonna run right.
We code hard in these cubicles
JAVA keeps adapting, you know it’s built to last.
We code hard in these cubicles,
Robust and secure, so our swag’s on blast
CODE HARD10 -
Webmin because why not ✓
Lamp stack ✓
Dynamic DNS client ✓
PhpMyAdmin X
Dear DigitalOcean. SINCE WHEN do you consider a PMA installation
without Https SECURE?
And why the fuck do you make me install an aptitude package that skips both file system AND Apache config cleanup on purging?
It's just a raspberry, but if it runs lamp I want PMA, and if it runs anything, I want Https. Is that too much to ask for from a tutorial source otherwise so reliable that I do anything you say without a questioning thought?8 -
These ignorant comments about arch are starting to get on my nerves.
You ranted or asked help about something exclusive to windows and someone pointed out they don't have that problem in arch and now you're annoyed?
Well maybe it's for good.
Next comes a very rough analogy, but imagine if someone posts "hey guys, I did a kg of coke and feeling bad, how do I detox?"
It takes one honest asshole to be like "well what if you didn't do coke?".
Replace the coke with windows.
Windows is a (mostly) closed source operating system owned by a for profit company with a very shady legal and ethical history.
What on earth could possibly go wrong?
Oh you get bsod's?
The system takes hours to update whenever the hell it wants, forces reboot and you can't stop it?
oh you got hacked because it has thousands of vulnerabilities?
wannacry on outdated windows versions paralyzed the uk health system?
oh no one can truly scrutinize it because it's closed source?
yet you wonder why people are assholes when you mention it? This thing is fucking cancer, it's hundreds of steps backwards in terms of human progress.
and one of the causes for its widespread usage are the savage marketing tactics they practiced early on. just google that shit up.
but no, linux users are assholes out to get you.
and how do people react to these honest comments? "let's make a meme out of it. let's deligitimize linux, linux users and devs are a bunch of neckbeards, end of story, watch this video of rms eating skin off his foot on a live conference"
short minded idiots.
I'm not gonna deny the challenges or limitations linux represents for the end user.
It does take time to learn how to use it properly.
Nvidia sometimes works like shit.
Tweaking is almost universally required.
A huge amount of games, or Adobe/Office/X products are not compatible.
The docs can be very obscure sometimes (I for one hate a couple of manpages)
But you get a system that:
* Boots way faster
* Is way more stable
* Is way way way more secure.
* Is accountable, as in, no chance to being forced to get exploited by some evil marketing shit.
In other words, you're fucking free.
You can even create your own version of the system, with total control of it, even profit with it.
I'm not sure the average end user cares about this, but this is a developer forum, so I think in all honesty every developer owes open source OS' (linux, freebsd, etc) major respect for being free and not being corporate horseshit.
Doctors have a hippocratic oath? Well maybe devs should have some form of oath too, some sworn commitment that they will try to improve society.
I do have some sympathy for the people that are forced to use windows, even though they know ideally isn't the ideal moral choice.
As in, their job forces it, or they don't have time or energy to learn an alternative.
At the very least, if you don't know what you're talking about, just stfu and read.
But I don't have one bit of sympathy for the rest.
I didn't even talk about arch itself.
Holy fucking shit, these people that think arch is too complicated.
What in the actual fuck.
I know what the problem is, the arch install instructions aren't copy paste commands.
Or they medium tutorial they found is outdated.
So yeah, the majority of the dev community is either too dumb or has very strong ADD to CAREFULLY and PATIENTLY read through the instructions.
I'll be honest, I wouldn't expect a freshman to follow the arch install guide and not get confused several times.
But this is an intermediate level (not megaexpert like some retards out there imply).
Yet arch is just too much. That's like saying "omg building a small airplane is sooooo complicated". Yeah well it's a fucking aerial vehicle. It's going to be a bit tough. But it's nowhere near as difficult as building a 747.
So because some devs are too dumb and talk shit, they just set the bar too low.
Or "if you try to learn how to build a plane you'll grow an aviator neckbeard". I'll grow a fucking beard if I want too.
I'm so thankful for arch because it has a great compromise between control and ease of install and use.
When I have a fresh install I only get *just* what I fucking need, no extra bullshit, no extra programs I know nothing about or need running on boot time, and that's how I boot way faster that ubuntu (which is way faster than windows already).
Configuring nvidia optimus was a major pain in the ass? Sure was, but I got it work the way I wanted to after some time.
Upgrading is also easy as pie, so really scratching my brain here trying to understand the real difficult of using arch.22 -
It's been a while DevRant!
Straight back into it with a rant that no doubt many of us have experienced.
I've been in my current job for a year and a half & accepted the role on lower pay than I normally would as it's in my home town, and jobs in development are scarce.
My background is in Full Stack Development & have a wealth of AWS experience, secure SaaS stacks etc.
My current role is a PHP Systems Developer, a step down from a senior role I was in, but a much bigger company, closer to home, with seemingly a lot more career progression.
My job role/descriptions states the following as desired:
PHP, T-SQL, MySQL, HTML, CSS, JavaScript, Jquery, XML
I am also well versed in various JS frameworks, PHP Frameworks, JAVA, C# as well as other things such as:
Xamarin, Unity3D, Vue, React, Ionic, S3, Cognito, ECS, EBS, EC2, RDS, DynamoDB etc etc.
A couple of months in, I took on all of the external web sites/apps, which historically sit with our Marketing department.
This was all over the place, and I brought it into some sort of control. The previous marketing developer hadn't left and AWS access key, so our GitLabs instance was buggered... that's one example of many many many that I had to work out and piece together, above and beyond my job role.
Done with a smile.
Did a handover to the new Marketing Dev, who still avoid certain work, meaning it gets put onto me. I have had a many a conversation with my line manager about how this is above and beyond what I was hired for and he agrees.
For the last 9 months, I have been working on a JAVA application with ML on the back end, completely separate from what the colleagues in my team do daily (tickets, reports, BI, MI etc.) and in a multi-threaded languages doing much more complicated work.
This is a prototype, been in development for 2 years before I go my hands on it. I needed to redo the entire UI, as well as add in soo many new features it was untrue (in 2 years there was no proper requirements gathering).
I was tasked initially with optimising the original code which utilised a single model & controller :o then after the first discussion with the product owner, it was clear they wanted a lot more features adding in, and that no requirement gathering had every been done effectively.
Throughout the last 9 month, arbitrary deadlines have been set, and I have pulled out all the stops, often doing work in my own time without compensation to meet deadlines set by our director (who is under the C-Suite, CEO, CTO etc.)
During this time, it became apparent that they want to take this product to market, and make it as a SaaS solution, so, given my experience, I was excited for this, and have developed quite a robust but high level view of the infrastructure we need, the Lambda / serverless functions/services we would want to set up, how we would use an API gateway and Cognito with custom claims etc etc etc.
Tomorrow, I go to London to speak with a major cloud company (one of the big ones) to discuss potential approaches & ways to stream the data we require etc.
I love this type of work, however, it is 100% so far above my current job role, and the current level (junior/mid level PHP dev at best) of pay we are given is no where near suitable for what I am doing, and have been doing for all this time, proven, consistent work.
Every conversation I have had with my line manager he tells me how I'm his best employee and how he doesn't want to lose me, and how I am worth the pay rise, (carrot dangling maybe?).
Generally I do believe him, as I too have lived in the culture of this company and there is ALOT of technical debt. Especially so with our Director who has no technical background at all.
Appraisal/review time comes around, I put in a request for a pay rise, along with market rates, lots of details, rates sources from multiple places.
As well that, I also had a job offer, and I rejected it despite it being on a lot more money for the same role as my job description (I rejected due to certain things that didn't sit well with me during the interview).
I used this in my review, and stated I had already rejected it as this is where I want to be, but wanted to use this offer as part of my research for market rates for the role I am employed to do, not the one I am doing.
My pay rise, which was only a small one really (5k, we bring in millions) to bring me in line with what is more suitable for my skills in the job I was employed to do alone.
This was rejected due to a period of sickness, despite, having made up ALL that time without compensation as mentioned.
I'm now unsure what to do, as this was rejected by my director, after my line manager agreed it, before it got to the COO etc.
Even though he sits behind me, sees all the work I put in, creates the arbitrary deadlines that I do work without compensation for, because I was sick, I'm not allowed a pay rise (doctors notes etc supplied).
What would you do in this situation?4 -
Because I am very interested in cyber security and plan on doing my masters in it security I always try to stay up to date with the latest news and tools. However sometimes its a good idea to ask similar-minded people on how they approach these things, - and maybe I can learn a couple of things. So maybe people like @linuxxx have some advice :D Let's discuss :D
1) What's your goto OS? I currently use Antergos x64 and a Win10 Dualboot. Most likely you guys will recommend Linux, but if so what ditro, and why? I know that people like Snowden use QubesOS. What makes it much better then other distro? Would you use it for everyday tasks or is it overkill? What about Kali or Parrot-OS?
2) Your go-to privacy/security tools? Personally, I am always conencted to a VPN with openvpn (Killswitch on). In my browser (Firefox) I use UBlock and HttpsEverywhere. Used NoScript for a while but had more trouble then actual use with it (blocked too much). Search engine is DDG. All of my data is stored in VeraCrypt containers, so even if the system is compromised nobody is able to access any private data. Passwords are stored in KeePass. What other tools would you recommend?
3) What websites are you browsing for competent news reports in the it security scene? What websites can you recommend to find academic writeups/white papers about certain topics?
4) Google. Yeah a hate-love relationship, but its hard to completely avoid it. I do actually have a Google-Home device (dont kill me), which I use for calender entries, timers, alarms, reminders, and weather updates as well as IOT stuff such as turning my LED lights on and off. I wouldn"t mind switching to an open source solution which is equally good, however so far I couldnt find anything that would a good option. Suggestions?
5) What actions do you take to secure your phone and prevent things such as being tracked/spyed? Personally so far I havent really done much except for installing AdAway on my rooted device aswell as the same Firefox plugins I use on my desktop PC.
6) Are there ways to create mirror images of my entire linux system? Every now and then stuff breaks, that is tedious to fix and reinstalling the system takes a couple of hours. I remember from Windows that software such as Acronis or Paragon can create a full image of your system that you can backup and restore at any point to get a stable, healthy system back (without the need to install everything by hand).
7) Would you encrypt the boot partition of your system, even tho all data is already stored in encrypted containers?
8) Any other advice you can give :P ?12 -
I got notified that tomorrow I'm gonna start a porting project from a FileNet ecosystem.
Well, I don't know what is FileNet, but at least I've enough time to study its architecture. Let's start from the official IBM page:
The FileNet® P8 platform offers enterprise-level scalability and flexibility to handle the most demanding content challenges, the most complex business processes, and integration to all your existing systems. FileNet P8 is a reliable, scalable, and highly available enterprise platform that enables you to capture, store, manage, secure, and process information to increase operational efficiency and lower total cost of ownership.
Thank you IBM, now I surely know how to use FileNet. Well, I hope that wikipedia explains me what it is:
FileNet is a company acquired by IBM, developed software to help enterprises manage their content and business processes.
Oh my god. I tried searching half an hour so far and everything I found was just advertisements and not a clue about what it is.
Then they wonder why I hate IBM so much4 -
I never understood how people have any problems with getting paid for freelancing work, when middleman/escrow platforms like upwork exist, just don't be retarded when applying for a job. I am so sick of those shit ass stories from people telling me "my client didnt pay meeee 😭😭😭" ITS YOUR FAULT. I never had any client not paying, if you don't have the option of escrow, then just fucking put remote execution via "update" system in for fucks sake or give remote control to the client while monitoring it, there is so much fucking ways to secure yourself, just don't be retarded and many clients instantly show their character when talking budget and turnaround time.15
-
Imagine a web way ahead of our time where its size goes beyond our imagination...
This is my first rant, and I'll cut to the chase! I don't like how web currently stands. Here's what makes me angry the most altough I know there's a myriad of solutions or workarounds:
- A gazillion credentials/accounts/services in your lifetime.
- Everyone tries to reinvent the wheel.
- There's no single source of truth.
- Why the fuck there's so much design in a vision that started as a network of documents? Why is it that we need to spend time and energy to absorb the page design before we can read what we are after?
- What's up with the JS front end frameworks?! MB's of code I need to download on every page I visit and the worse is the evaluation/parsing of it. Talk about acessibility and the energy bills. I don't freaking need a SPA just give a 20-50ms page load and I'm good to go!
- I understand that there's a whole market based on it but do we really need all that developer tools and services?
- Where's our privacy by the way? Why the fuck do I need ads? Can't I have a clue about what I wan't to buy?
Sticking with this points for now... Got plenty more to discuss though.
What I would like to see:
A unique account where i can subscribe services/forums/whatever. No credentials. Credentials should be on your hardware or OS. Desktop Browser and mobile versions sync everything seemlesly. Something like OpenID.
Each person has his account and a profile associated where I share only what I want with whom I want when I want to.
Sharing stuff individually with someone is easy and secure.
There's no more email system like we know. Email should be just email like it started to be. Why the hell are we allowing companies to send us so much freaking "look at me now, we are awesome", "hey hey buy from me".. Here's an idea, only humans should send emails. Any new email address that sends you an email automatically requests your "permission" to communicate with you. Like a friend request.
Oh by the way did I tell you that static mail is too old for us? What we need is dynamic email. Editing documents on the fly, together, realtime, on the freaking email. Better than mail, slack and google docs combined.
In order for that to work reasonably well, the individual "letter" communication would have to be revamped in a new modern approach.
What about the single source of truth I talked about? Well heres what we should do. Wikipedia (community) and Larry Page (concept) gave us tremendous help. We just need to do better now.
Take the spirit of wikipedia and the discoverability that a good search engine provides us and amp that to a bigger scale. A global encyclopedia about everything known to mankind. Content could be curated from us all just like a true a network.
In this new web, new browser or whatever needed to make this happen I could save whatever I want, notes, files, pictures... and have it as I left it from device to device.
Oh please make web simple again, not easy just simple and bigger.
I'm not old by the way and I don't see a problem with being older btw.
Those are just my stupid rants and ideas. They are worth nothing. What I know for sure is that I'll do something about or fail trying to.12 -
Not much of a SQL Dev, still an apprentice and had a basic run throughs. Client needed a migration script to run, which I was assigned. Took me a good 6/7 days to make, transfer over a secure (and VERY slow) network took 2 hours. Infrastructure 3rd party took 2 days to clear and run. After all that process. I then realise, I left the fucking rollback in1
-
I wanna go back to the age where a C program was considered secure and isolated based on its system interface rathe than its speed. I want a future where safety does not imply inefficiency. I hate spectre and I hate that an abstraction as simple and robust as assembly is so leaky that just by exposing it you've pretty much forfeited all your secrets.
And I especially hate that we chose to solve this by locking down everything rather than inventing an abstraction that's a similarly good compile target but better represents CPUs and therefore does not leak.21 -
Got one right now, no idea if it’s the “most” unrealistic, because I’ve been doing this for a while now.
Until recently, I was rewriting a very old, very brittle legacy codebase - we’re talking garbage code from two generations of complete dumbfucks, and hands down the most awful codebase I’ve ever seen. The code itself is quite difficult to describe without seeing it for yourself, but it was written over a period of about a decade by a certifiably insane person, and then maintained and arguably made much worse by a try-hard moron whose only success was making things exponentially harder for his successor to comprehend and maintain. No documentation whatsoever either. One small example of just how fucking stupid these guys were - every function is wrapped in a try catch with an empty catch, variables are declared and redeclared ten times, but never used. Hard coded credentials, hard coded widths and sizes, weird shit like the entire application 500ing if you move a button to another part of the page, or change its width by a pixel, unsanitized inputs, you name it, if it’s a textbook fuck up, it’s in there, and then some.
Because the code is so damn old as well (MySQL 8.0, C#4, and ASP.NET 3), and utterly eschews the vaguest tenets of structured, organized programming - I decided after a month of a disproportionate effort:success ratio, to just extract the SQL queries, sanitize them, and create a new back end and front end that would jointly get things where they need to be, and most importantly, make the application secure, stable, and maintainable. I’m the only developer, but one of the senior employees wrote most of the SQL queries, so I asked for his help in extracting them, to save time. He basically refused, and then told me to make my peace with God if I missed that deadline. Very helpful.
I was making really good time on it too, nearly complete after 60 days of working on it, along with supporting and maintaining the dumpster fire that is the legacy application. Suddenly my phone rings, and I’m told that management wants me to implement a payment processing feature on the site, and because I’ve been so effective at fixing problems thus far, they want to see it inside of a week. I am surprised, because I’ve been regularly communicating my progress and immediate focus to management, so I explain that I might be able to ship the feature by end of Q1, because rather than shoehorn the processor onto the decrepit piece of shit legacy app, it would be far better to just include it in the replacement. I add that PCI compliance is another matter that we must account for, and so there’s not a great chance of shipping this in a week. They tell me that I have a month to do it…and then the Marketing person asks to see my progress and ends up bitching about everything, despite the front end being a pixel perfect reproduction. Despite my making everything mobile responsive, iframe free, secure and encrypted, fast, and void of unpredictable behaviors. I tell her that this is what I was asked to do, and that there should have been no surprises at all, especially since I’ve been sending out weekly updates via email. I guess it needed more suck? But either way, fuck me and my two months of hard work. I mean really, no ego, I made a true enterprise grade app for them.
Short version, I stopped working on the rebuild, and I’m nearly done writing the payment processor as a microservice that I’ll just embed as an iframe, since the legacy build is full of those anyway, and I’m being asked to make bricks without straw. I’m probably glossing over a lot of finer points here too, just because it’s been such an epic of disappointment. The deadline is coming up, and I’m definitely going to make it, now that I have accordingly reduced the scope of work, but this whole thing has just totally pissed me off, and left a bad taste about the organization.9 -
I'm currently planning to set myselv up with some vps/dedicated server's for a project. What i plan to do to secure these servers is.
*Use centos 7
* Setup Wireguard and join all of the servers +1 client (my pc) to that network
*Disable SSH Access from outside that VPN
*Only allow RSA Key login to the Servers
*Install Cockpit for monitoring
*Intall docker/kubernetes for the applications i plan to run
What do you guys think of that as a baseline? Im not sure if my lower powered VPS (VPS M SSD from Contabo) will work as Kubernetes Nodes, does anyone have experience with that?
In general these Servers will be used for my projects and other fooling around.
If you guys have other suggestions for Securing/monitoring or other software i could put on to have more control without eating up to much of the Servers power, let me know :D12 -
So, WPA2 was proven not fully secure. Wonder how much time it will take for most devices to be patched...2
-
@linuxxx
Can you do a security / privacy check for ProtonVPN? All I know is that it is Switzerland based and pretty much secure.9 -
I'm 22 years old and 1.5 years into my first Startup Job. (and second Dev job)
I feel kind of uncomfortable now and I would like to ask your opinions.
I'll start with the work related description of my situation and later add a bit of my life situation.
I develop as hobby since I can think. I'm pretty engaged and love to do things right. So I quickly found myself in the position of the de-facto lead fullstack Developer.
Although, to be clear, were only a few devs - which are now replaced by not so many other devs. I feel often like the only person able to design and decide and implement in a way that won't kill us later (and I spend half of my time fixing technical debt).
I mostly like what I do , because it's a challenge and I feel needed. I learn new things and I am pretty flexible in work time. (but I also often work till late in the night, sacrificing friendship time)
But there are so many things I would love to do and used to do, but now I have no motivation to develop outside of my job.
I don't really feel that what my company is doing is something I find valuable. (Image rights management)
I earn pretty well - in comparison to what I'm used to: 20€/hour, Brutto 2.800 / month for 32 hours a week. In Berlin. (Minus tax and stuff it's 1.800€). It's more than enough for what I need.
But when I see what others in similar positions earn (~4.000), I feel weird. I got promised a raise since nearly a year now. I don't feel I could demand it. I also got the hint that I could get virtual shares. But nothing happened.
Now what further complicates the situation is that I will go to Portugal in April for at least half a year, for joining a social project I love. My plan used to be that I work from there for a few hours a week - but I'm starting to hesitate as I fear that I will actually work more and it will keep me from fully being there.
So, I kind of feel emotionally attached - I like (some of) the people, I know (or at least believe) that the company will have a big problem without me. (I hold a lot of the knowledge for legacy applications) .
But I also feel like I'm putting too much of myself into the company and it is not really giving me back. And it's also not so much worth it... Or is it?
Should I stick to the company and keep my pretty secure position and be financially supported during my time in Portugal, while possibly sacrificing my time there?
Should I ask for a raise (possibly even retroactively) and then still quit later? (they will probably try to get my 1 month of cancelation period upped to 3).
Also, is this a risk for my "career"?question work-life what? purpose startup safety hobby work-life balance life career career advice bugfixing7 -
Overall, pretty good actually compared to the alternatives, which is why there's so much competition for dev jobs.
On the nastier end of things you have the outsourcing pools, companies which regularly try to outbid each other to get a contract from an external (usually foreign) company at the lowest price possible. These folks are underpaid and overworked with absolutely terrible work culture, but there are many, many worse things they could be doing in terms of effort vs monetary return (personal experience: equally experienced animator has more work and is paid less). And forget everything about focus on quality and personal development, these companies are here to make quick money by just somehow doing what the client wants, I'm guessing quite a few of you have experienced that :p
Startups are a mixed bag, like they are pretty much everywhere in the world. You have the income tax fronts which have zero work, the slave driver bossman ones, the dumpster fires; but also really good ones with secure funding, nice management, and cool work culture (and cool work, some of my friends work at robotics startups and they do some pretty heavy shit).
Government agencies are also a mixed bag, they're secure with low-ish pay but usually don't have much or very exciting work, and the stuff they turn out is usually sub-par because of bad management and no drive from higher-ups.
Big corporates are pretty cool, they pay very well, have meaningful(?) work, and good work culture, and they're better managed in general than the other categories. A lot of people aim for these because of the pay, stability, networking, and resume building. Some people also use them as stepping stones to apply for courses abroad.
Research work is pretty disappointing overall, the projects here usually lack some combination of funding, facilities, and ambition; but occasionally you come across people doing really cool stuff so eh.
There's a fair amount of competition for all of these categories, so students spend an inordinate amount of time on stuff like competitive programming which a lot of companies use for hiring because of the volume of candidates.
All this is from my experience and my friends', YMMV.1 -
Java Life Rap Video
https://m.youtube.com/watch/...
SPOKEN:
In the cubicles representin’ for my JAVA homies…
In by nine, out when the deadlines are met, check it.
CHORUS:
We code hard in these cubicles
My style’s nerd-chic, I’m a programmin’ freak
We code hard in these cubicles
Only two hours to your deadline? Don’t sweat my technique.
Sippin’ morning coffee with that JAVA swirl.
Born to code; my first words were “Hello World”
Since 95, been JAVA codin’ stayin’ proud
Started on floppy disks, now we take it to the cloud.
On my desktop, JAVA’s what’s bobbin’ and weavin’
We got another winning app before I get to OddEven.
Blazin’ code like a forest fire, climbin’ a tree
Setting standards like I Triple E….
Boot it on up, I use the force like Luke,
Got so much love for my homeboy Duke.
GNU Public Licensed, it’s open source,
Stop by my desk when you need a crash course
Written once and my script runs anywhere,
Straight thuggin’, mean muggin’ in my Aeron chair.
All the best lines of code, you know I wrote ‘em
I’ll run you out of town on your dial-up modem.
CHORUS:
‘Cause…
We code hard in these cubicles
Me and my crew code hyphy hardcore
We code hard in these cubicles
It’s been more than 10 years since I’ve seen the 404.
Inheriting a project can make me go beeee-serk
Ain’t got four hours to transfer their Framework.
The cleaners killed the lights, Man, that ain’t nice,
Gonna knock this program out, just like Kimbo Slice
I program all night, just like a champ,
Look alive under this IKEA lamp.
I code HARDER in the midnight hour,
E7 on the vending machine fuels my power.
Ps3 to Smartphones, our code use never ends,
JAVA’s there when I beat you in “Words with Friends”.
My developing skills are so fresh please discuss,
You better step your game up on that C++.
We know better than to use Dot N-E-T,
Even Dan Brown can’t code as hard as me.
You know JAVA’s gettin’ bigger, that’s a promise not a threat,
Let me code it on your brain
WHISPERED:
so you’ll never forget.
CHORUS:
We code hard in these cubicles,
it’s the core component…of what we implement.
We code hard in these cubicles,
Straight to your JAVA Runtime Environment.
We code hard in these cubicles,
Keep the syntax light and the algorithm tight.
We code hard in these cubicles,
Gotta use JAVA if it’s gonna run right.
We code hard in these cubicles
JAVA keeps adapting, you know it’s built to last.
We code hard in these cubicles,
Robust and secure, so our swag’s on blast
CODE HARD1 -
Disclaimer: This is all theoretical. Neither me nor my friend (with whom I discussed this) are stupid enough to even try to pursue this, but as an idea, i believe it might generate cool/new ideas/ways for handling secure communications across social groups.
Let's do some role play. Let's design a delivery app for drug dealers, think Seamless or Uber Eats, but for drugs. Not for big deliveries, like kilograms of coke, but smaller stuff. Maybe a few grams of it or something. The clients could rate dealers, and vide-versa. This would build a level of trust within the system. There would be no names, just anonymous reviews, ratings, and prices. Only the info you'd need to know.
The biggest (only?) problem we found (besides legality) was that, how would you prove that you're a client and not a snitch (or cop). This would have to somehow be handled both on signup, as well as when ordering (let's imagine that all who are clients are pure and won't ever snitch).
One of the ways we found to combat this was to have the app invite-only. This would, in theory, do away with the problem of having snitches signing up. However, what if the phone got stolen/breached by a snitch, and they also got full access to the account. One way we thought we could combat this would be with a "dispose number" or something similar. Basically, you call a number, or send a text, or message a Signal bot etc, which would lead to the account's instant termination, no traces of that user left. Hence, a dispose number.
The flow of the app would be as follows:
A client wants some amount of heroin. He opens the app, searches for a dealer, sends the him the desired amount, and in return gets back a price from the dealer. If both parties agree on the amount and price, the deal would start.
The app would then select a random time (taken from the client's selected timeframe and the dealer's "open" time) and a location (within a certain radius of both them, somewhere in between them both for convenience). If both of them accept the time and place, they'll have to meet up at said time and place.
The actual delivery could also be done using two dead drops - the client drops the money at one of them, the dealer drops the goods at the other one. Yes, this might be subject to abuse, but it wouldn't be that bad. I doubt that clients would make huge orders to unknown/badly rated dealers, as well as dealers accepting offers from badly rated clients. My idea is that they would start small, just so if they do lose their money/goods, the actual loss wouldn't be as big for them, but for the other party, having bad ratings would mean less clients willing to buy or dealers willing to sell.
A third way would be to use crypto, but the reason I left this as the last one is because it's not that wide-spread yet, at least not in local drug dealing. With this method, the client would initiate the order, the crypto would be sent to either the dealer or an escrow account, the dealer would then drop the goods at a random place and let the client know where to go to get them. After the client has gotten the goods, they could both review/rate the quality as well as the overall experience with that dealer, which would either make or break the dealer's upcoming deals. This would be pretty much like other DNM's, but on a local scale, making deliveries faster.
So far, this would seem like something that would work. Are there any ideas that might improve this? Anything that might make things more secure/anonymous?
My reason for this post is to spark a conversation about security and anonymity, not to endorse drugs or other illegal stuff.
Cheers!
PS. Really loving the new PC design of devRant14 -
Is it so much to ask to feel appreciated and secure at a job if you make sacrifices and endure ridiculous stress of ownership and responsibility?
Why do I have to constantly go through life wondering if my name is going to be a top level item on a budget sheet ready for the cut ? And then I’m not supposed to be upset
Just work to the end like a good little monkey and HOPE I Have another job on its way1 -
My answer to their survey -->
What, if anything, do you most _dislike_ about Firebase In-App Messaging?
Come on, have you sit a normal dev, completely new to this push notification thing and ask him to make run a simple app like the flutter firebase_messaging plugin example? For sure you did not oh dear brain dead moron that found his college degree in a Linux magazine 'Ruby special edition'.
Every-f**kin thing about that Firebase is loose end. I read all Medium articles, your utterly soporific documentation that never ends, I am actually running the flutter plugin example firebase_messaging. Nothing works or is referenced correctly: nothing. You really go blind eyes in life... you guys; right? Oh, there is a flimsy workaround in the 100th post under the Github issue number 10 thousand... lets close the crash report. If I did not change 50 meaningless lines in gradle-what-not files to make your brick-of-puke to work, I did not changed a single one.
I dream of you, looking at all those nonsense config files, with cross side eyes and some small but constant sweat, sweat that stinks piss btw, leaving your eyes because you see the end, the absolute total fuckup coming. The day where all that thick stinky shit will become beyond salvation; blurred by infinite uncontrolled and skewed complexity; your creation, your pathetic brain exposed for us all.
For sure I am not the first one to complain... your whole thing, from the first to last quark that constitute it, is irrelevant; a never ending pile of non sense. Someone with all the world contained sabotage determination would not have done lower. Thank you for making me loose hours down deep your shit show. So appreciated.
The setup is: servers, your crap-as-a-service and some mobile devices. For Christ sake, sending 100 bytes as a little [ beep beep + 'hello kitty' ] is not fucking rocket science. Yet you fuckin push it to be a grinding task ... for eternity!!!
You know what, you should invent and require another, new, useless key-value called 'Registration API Key Plugin ID Service' that we have to generate and sync on two machines, everyday, using something obscure shit like a 'Gradle terminal'. Maybe also you could deprecate another key, rename another one to make things worst and I propose to choose a new hash function that we have to compile ourselves. A good candidate would be a C buggy source code from some random Github hacker... who has injected some platform dependent SIMD code (he works on PowerPC and have not test on x64); you know, the guy you admire because he is so much more lowlife that you and has all the Pokemon on his desk. Well that guy just finished a really really rapid hash function... over GPU in a server less fashion... we have an API for it. Every new user will gain 3ms for every new key. WOW, Imagine the gain over millions of users!!! Push that in the official pipe fucktard!.. What are you waiting for? Wait, no, change the whole service name and infrastructure. Move everything to CLSG (cloud lambda service ... by Google); that is it, brilliant!
And Oh, yeah, to secure the whole void, bury the doc for the new hash under 3000 words, lost between v2, v1 and some other deprecated doc that also have 3000 and are still first result on Google. Finally I think about it, let go the doc, fuck it... a tutorial, for 'weak ass' right.
One last thing, rewrite all your tech in the latest new in house language, split everything in 'femto services' => ( one assembly operation by OS process ) and finally cramp all those in containers... Agile, for sure it has to be Agile. Users will really appreciate the improvements of your mandatory service. -
Today we finally launched Keycloak to secure our spring cloud microservice architecture!
Great feeling after 4 month of tailoring open source software, bug fixes and so much pain 😄 -
Relatively often the OpenLDAP server (slapd) behaves a bit strange.
While it is little bit slow (I didn't do a benchmark but Active Directory seemed to be a bit faster but has other quirks is Windows only) with a small amount of users it's fine. slapd is the reference implementation of the LDAP protocol and I didn't expect it to be much better.
Some years ago slapd migrated to a different configuration style - instead of a configuration file and a required restart after every change made, it now uses an additional database for "live" configuration which also allows the deployment of multiple servers with the same configuration (I guess this is nice for larger setups). Many documentations online do not reflect the new configuration and so using the new configuration style requires some knowledge of LDAP itself.
It is possible to revert to the old file based method but the possibility might be removed by any future version - and restarts may take a little bit longer. So I guess, don't do that?
To access the configuration over the network (only using the command line on the server to edit the configuration is sometimes a bit... annoying) an additional internal user has to be created in the configuration database (while working on the local machine as root you are authenticated over a unix domain socket). I mean, I had to creat an administration user during the installation of the service but apparently this only for the main database...
The password in the configuration can be hashed as usual - but strangely it does only accept hashes of some passwords (a hashed version of "123456" is accepted but not hashes of different password, I mean what the...?) so I have to use a single plaintext password... (secure password hashing works for normal user and normal admin accounts).
But even worse are the default logging options: By default (atleast on Debian) the log level is set to DEBUG. Additionally if slapd detects optimization opportunities it writes them to the logs - at least once per connection, if not per query. Together with an application that did alot of connections and queries (this was not intendet and got fixed later) THIS RESULTED IN 32 GB LOG FILES IN ≤ 24 HOURS! - enough to fill up the disk and to crash other services (lessons learned: add more monitoring, monitoring, and monitoring and /var/log should be an extra partition). I mean logging optimization hints is certainly nice - it runs faster now (again, I did not do any benchmarks) - but ther verbosity was way too high.
The worst parts are the error messages: When entering a query string with a syntax errors, slapd returns the error code 80 without any additional text - the documentation reveals SO MUCH BETTER meaning: "other error", THIS IS SO HELPFULL... In the end I was able to find the reason why the input was rejected but in my experience the most error messages are little bit more precise.2 -
// Rant 1
---
Im literally laughing and crying rn
I tried to deploy a backend on aws Fargate for the first time. Never used Fargate until now
After several days of brainwreck of trial and error
After Fucking around to find out
After Multiple failures to deploy the backend app on AWS Fargate
After Multiple times of deleting the whole infrastructure and redoing everything again
After trying to create the infrastructure through terraform, where 60% of it has worked but the remaining parts have failed
After then scraping off terraform and doing everything manually via AWS ui dashboard because im that much desperate now and just want to see my fucking backend work on aws and i dont care how it will be done anymore
I have finally deployed the backend, successfully
I am yet unsure of what the fuck is going on. I followed an article. Basically i deployed the backend using:
- RDS
- ECS
- ECR
- VPC
- ALB
You may wonder am i fucking retarded to fail this hard for just deploying a backend to aws?
No. Its much deeper than you think. I deployed it on a real world production ready app way.
- VPC with 2 public and 2 private subnets. Private subnets used only for RDS. Public for ALB.
- Everything is very well done and secure. 3 security groups: 1 for ALB (port 80), 1 for Fargate (port 8080, the one the backend is running on), 1 for RDS postgres (port 5432). Each one stacked on top and chained
- custom domain name + SSL certificate so i can have a clean version of the fully working backend such as https://api.shitstain.com
- custom ECS cluster
- custom target groups
- task definitions
Etc.
Right now im unsure how all of this is glued together. I have no idea why this works and why my backend is secure and reachable. Well i do know to some extent but not everything.
To know everything, I'll now ask some dumbass questions:
1. What is ECS used for?
2. What is a task definition and why do i need it?
3. What does Fargate do exactly? As far as i understood its a on-demand use of a backend. Almost like serverless backend? Like i get billed only when the backend is used by someone?
4. What is a target group and why do i need it?
5. Ive read somewhere theres a difference between using Fargate and... ECS (or is it something else)? Whats the difference?
Everything else i understand well enough.
In the meantime I'll now start analyzing researching and understanding deeply what happened here and why this works. I'll also turn all of this in terraform. I'll also build a custom gitlab CI/CD to automate all of this shit and deploy to fargate prod app
// Rant 2
---
Im pissing and shitting a lot today. I piss so much and i only drink coffee. But the bigger problem is i can barely manage to hold my piss. It feels like i need to piss asap or im gonna piss myself. I used to be able to easily hold it for hours now i can barely do it for seconds. While i was sleeping with my gf @retoor i woke up by pissing on myself on her bed right next to her! the heavy warmness of my piss woke me up. It was so embarrassing. But she was hardcore sleeping and didnt notice. I immediately got out of bed to take a shower like a walking dead. I thought i was dreaming. I was half conscious and could barely see only to find out it wasnt a dream and i really did piss on myself in her bed! What the fuck! Whats next, to uncontrollably shit on her bed while sleeping?! Hopefully i didnt get some infection. I feel healthy. But maybe all of this is one giant dream im having and all of u are not real9 -
Mighty Hacker Recovery: The Best in Crypto and Investment Fund Recovery
Mighty Hacker Recovery is the real deal.
I want to share my incredible experience with **Mighty Hacker Recovery**, the best expert in crypto and investment fraud recovery. After falling victim to a fake investment company in France. It was a nightmare losing **$76,000**, thinking it was gone forever. But thanks to **Mighty Hacker Recovery**, I got back every single dollar!
Their expertise in recovering lost investments, **USDT wallets, crypto transactions sent to the wrong address**, and stolen funds is unmatched. They don't just make empty promises—they **deliver real results** for sure.. Their process is fast, secure, and professional, ensuring that victims of crypto fraud can reclaim their hard-earned money.
I’m beyond grateful to have found them, and I know many others have benefited from their top-tier services. If you've lost funds to scams, hackers, or wrong transactions, don’t hesitate—**Mighty Hacker Recovery** is your best shot at getting your money back.
**Contact them now at WhatsApp +1 (404) 245-6415** and take back what’s rightfully yours!
11 Freelance Crypto Experts For Hire
Hire the best cryptocurrency experts
Hire a Cryptocurrency Expert Online
Find Top Cryptocurrency Experts for Hire in February 2025
Who is the most trusted crypto expert?
How much does a crypto consultant cost?
Can I hire someone to do crypto for me?
Who gives the best crypto advice?
Hire the best crypto expert free
Hire professional crypto trader
Top crypto experts near me
Crypto trading experts review
Bitcoin expert near me
Expert Crypto Trader legit
Free crypto experts near me
Talk to a crypto expert
How to recover lost cryptocurrency—and how to keep it safe
How to backup and restore a crypto wallet
Are Your Lost Bitcoins Gone Forever?
How To Find Lost Bitcoins:
Restore my wallet Bitcoin Support Center
How to recover my bitcoin wallet
How to recover my bitcoin app
Recover Bitcoin wallet without phrase
Find my Bitcoin account
Find Bitcoin wallet by email
How to recover Bitcoin from blockchain
Recover Bitcoin wallet 12 words
Unclaimed Bitcoin wallets
How to recover a crypto wallet with or without a seed phrase
How To Recover My Lost Bitcoin Wallet?
How could you recover your Bitcoin if it was not possible to
Forgot or Lost Bitcoin Wallet Password? How to Recover in 2025
Wallet gone and lost recovery phrase, how to get back my bitcoin back
1. Bitcoin (BTC)
2. Ethereum (ETH)
3. Tether (USDT)
4. USD Coin (USDC)
5. BNB (BNB)
6. Binance Coin USD (BUSD)
7. XRP (XRP)
8. Cardano (ADA)
9. Solana (SOL)
10. Dogecoin (DOGE)
11. Polkadot (DOT)
12. Dai (DAI)
13. Polygon (MATIC)
14. Shiba Inu (SHIB)
15. TRON (TRX)
16. Avalanche (AVAX)
17. UNUS SED LEO (LEO)
18. Litecoin (LTC)
19. Stellar (XLM)
20. Bitcoin Cash (BCH)
Crypto For Merchants
Quick FAQs about the most popular Cryptocurrencies
Q: What are Cryptocurrencies?
Q: Is An Altcoin Different From a Cryptocurrency?
Q: What are Cryptocurrencies Used For?
Q: Are Cryptocurrencies Regulated?
Q: What is the difference between Bitcoin and Ethereum?
Q: What are stablecoins?
Q: What is the purpose of Tether (USDT)?
Q: What is Litecoin (LTC)?
Q: What is Bitcoin Cash (BCH)?
1 -
Am i overthinking too much or are passwords like this
S9L4dk1i6sy5
Insecure?
This is an example generated by some website where i have activated 2fa and need to generate app passwords to access it from clients
I've thought about it many times to ask them to make it more secure but everytime i think i'm overrracting17 -
rant.author != this
Christ people. This is just sh*t.
The conflict I get is due to stupid new gcc header file crap. But what
makes me upset is that the crap is for completely bogus reasons.
This is the old code in net/ipv6/ip6_output.c:
mtu -= hlen + sizeof(struct frag_hdr);
and this is the new "improved" code that uses fancy stuff that wants
magical built-in compiler support and has silly wrapper functions for
when it doesn't exist:
if (overflow_usub(mtu, hlen + sizeof(struct frag_hdr), &mtu) ||
mtu <= 7)
goto fail_toobig;
and anybody who thinks that the above is
(a) legible
(b) efficient (even with the magical compiler support)
(c) particularly safe
is just incompetent and out to lunch.
The above code is sh*t, and it generates shit code. It looks bad, and
there's no reason for it.
The code could *easily* have been done with just a single and
understandable conditional, and the compiler would actually have
generated better code, and the code would look better and more
understandable. Why is this not
if (mtu < hlen + sizeof(struct frag_hdr) + 8)
goto fail_toobig;
mtu -= hlen + sizeof(struct frag_hdr);
which is the same number of lines, doesn't use crazy helper functions
that nobody knows what they do, and is much more obvious what it
actually does.
I guarantee that the second more obvious version is easier to read and
understand. Does anybody really want to dispute this?
Really. Give me *one* reason why it was written in that idiotic way
with two different conditionals, and a shiny new nonstandard function
that wants particular compiler support to generate even half-way sane
code, and even then generates worse code? A shiny function that we
have never ever needed anywhere else, and that is just
compiler-masturbation.
And yes, you still could have overflow issues if the whole "hlen +
xyz" expression overflows, but quite frankly, the "overflow_usub()"
code had that too. So if you worry about that, then you damn well
didn't do the right thing to begin with.
So I really see no reason for this kind of complete idiotic crap.
Tell me why. Because I'm not pulling this kind of completely insane
stuff that generates conflicts at rc7 time, and that seems to have
absolutely no reason for being anm idiotic unreadable mess.
The code seems *designed* to use that new "overflow_usub()" code. It
seems to be an excuse to use that function.
And it's a f*cking bad excuse for that braindamage.
I'm sorry, but we don't add idiotic new interfaces like this for
idiotic new code like that.
Yes, yes, if this had stayed inside the network layer I would never
have noticed. But since I *did* notice, I really don't want to pull
this. In fact, I want to make it clear to *everybody* that code like
this is completely unacceptable. Anybody who thinks that code like
this is "safe" and "secure" because it uses fancy overflow detection
functions is so far out to lunch that it's not even funny. All this
kind of crap does is to make the code a unreadable mess with code that
no sane person will ever really understand what it actually does.
Get rid of it. And I don't *ever* want to see that shit again. -
REACH OUT TO CRYPTO PANDEMIC HUNTER TO REVEAL THE TRUTH ABOUT YOUR SPOUSE INFIDELITY
My ex and I were always cheerful and fond of each other until things started to fall off. Trying to save my relationship with my ex lead me investing her after months of doubt and uncertainty.
Initially, I noticed a significant communication breakdown between us, which was unlike anything we had experienced before. Her sudden distance and over-concern with work-related matters raised suspicions in my mind. I decided to take action and utilize Crypt0 Pandemic Hunter to uncover any potential secrets she might be hiding.
The team was able to track phone calls spy on her emails thanks to their much advanced software and tools. I was able to access my ex-wife's phone records, private messaging apps, and even room bookings. Crypt0 Pandemic Hunter's powerful algorithms analyzed the data and uncovered a series of secret conversations and meetings between my ex-wife and her boss.
The evidence was overwhelming. I discovered that my ex-wife and her boss had been having an affair, which explained her sudden distance and over-concern with work. The software revealed details about their hotel reservations, vacations, and late-night shifts that I would never have discovered otherwise.
The software provided me with the information I needed to make informed decisions about my future, all while ensuring that I remained secure and protected. Their discretion and commitment is arguably the best.
I cannot recommend Crypt0 Pandemic Hunter highly enough. Whether you're looking to uncover hidden truths, protect your privacy, or secure your digital assets, this is the team to contact. Don't stay in the dark, reach out to;
crypt0pandemichunter[at]consultant,com
WhatsApp: +1 (205) 3573937
3 -
Approx. 24 hours ago I proceeded to use MEGA NZ to download a file It's something I've done before. I have an account with them.
This is part of the email I received from MEGA NZ following the dowload: "
zemenwambuis2015@gmail.com
YOUR MEGA ACCOUNT HAS BEEN LOCKED FOR YOUR SAFETY; WE SUSPECT THAT YOU ARE USING THE SAME PASSWORD FOR YOUR MEGA ACCOUNT AS FOR OTHER SERVICES, AND THAT AT LEAST ONE OF THESE OTHER SERVICES HAS SUFFERED A DATA BREACH.
While MEGA remains secure, many big players have suffered a data breach (e.g. yahoo.com, dropbox.com, linkedin.com, adobe.com, myspace.com, tumblr.com, last.fm, snapchat.com, ashleymadison.com - check haveibeenpwned.com/PwnedWebsites for details), exposing millions of users who have used the same password on multiple services to credential stuffers (https://en.wikipedia.org/wiki/...). Your password leaked and is now being used by bad actors to log into your accounts, including, but not limited to, your MEGA account.
To unlock your MEGA account, please follow the link below. You will be required to change your account password - please use a strong password that you have not used anywhere else. We also recommend you change the passwords you have used on other services to strong, unique passwords. Do not ever reuse a password.
Verify my email
Didn’t work? Copy the link below into your web browser:
https://mega.nz//...
To prevent this from happening in the future, use a strong and unique password. Please also make sure you do not lose your password, otherwise you will lose access to your data; MEGA strongly recommends the use of a password manager. For more info on best security practices see: https://mega.nz/security
Best regards,
— Team MEGA
Mega Limited 2020."
Who in their right mind is going to believe something like that that's worded so poorly.
Can anybody shed some light on this latest bit of MEGA's fuckery?
Thank you very much.4 -
so i've been working with a ux/graphic designer on a pretty large project that will likely have many services attached to it, it's been in "active" development for about a year now. something that concerns me however is how uncertain i feel about what i'm doing, constant questions like "am i doing this right", "is this secure", and many like them plague my mind while i'm coding and it's really discouraging. when i was just learning i didn't really take any heed from these questions, intact i never even really thought about them so why am i now? i feel kid if i'm able to just work and have fun i will be so much more productive and happy. my partner has been learning front end and has been doing great me i'm working on front and back end. i have been making most of the decision in regards to our stack but i feel like i'm making them arbitrarily and to attribute to this fact, i have switched things up several times, we went from react to an mvc framework and now i'm considering going back to react. i just can't seem to keep on track with my decisions, if any of you have experienced this before i would really like some advice on how i can be productive and again and not fall into this never-ending abyss of doubt.3
-
Okay people couldn't get a response anywhere so I'm going to do this here considering we have a bunch of geniuses here. I need to create a tunnel in nodejs or java to forward connection from client to server. Need to do this because my damn client can only use ports 80/443. Anybody wants to brainstorm?
These people have so much of garbage data yet want to keep everything secure as hell.4 -
Transform Your Home with Mark Brightman Handyman Services: Lighting Installation, Pet Doors, and More
When you're in need of a reliable handyman near me, Mark Brightman Handyman Services is here to help. Serving the Beaverton, OR area, we specialize in a wide range of home improvement services, from lighting installation near me to pet door installation near me, and much more. Our team of skilled professionals is dedicated to making your home safer, more comfortable, and more efficient with expert installations, repairs, and renovations.
Located at 1856 NE 101st Ave #102, Beaverton, OR 97006, Mark Brightman Handyman Services is your go-to source for all things home improvement in Beaverton and the greater Portland area. Let’s take a closer look at how our services can improve your home and life.
Lighting Installation Near Me – Brighten Your Home with Expert Lighting Solutions
Whether you need new lights for your kitchen, living room, outdoor space, or bathroom, lighting installation near me is a service we specialize in. Proper lighting not only enhances the aesthetics of your home but also adds safety and functionality to your living spaces. At Mark Brightman Handyman Services, we offer expert lighting installation near me that suits your style and needs.
Our lighting installation near me services include:
Indoor Lighting: From recessed lights to pendant lighting, we help you choose and install the right lights for every room in your home.
Outdoor Lighting: Increase security and create ambiance with outdoor lighting for pathways, porches, gardens, and more.
Ceiling Fans with Lighting: Looking for both cooling and lighting? We can install ceiling fans that also feature built-in lights, perfect for saving space while adding comfort and illumination.
Custom Lighting Solutions: We can design custom lighting setups for home theaters, accent lighting, or task lighting tailored to your needs.
No matter what type of lighting you need, Mark Brightman Handyman Services provides professional lighting installation near me that enhances the beauty and functionality of your home.
Pet Door Installation Near Me – Let Your Pets Roam Freely
For pet owners, installing a pet door installation near me is a simple yet effective way to give your furry friends the freedom to come and go as they please. Whether you have a dog, cat, or both, a pet door can provide them with easy access to the yard, patio, or garden, all while maintaining the security and privacy of your home.
At Mark Brightman Handyman Services, we specialize in installing a variety of pet doors to suit different needs and budgets. Our pet door installation near me services include:
Dog and Cat Doors: We offer pet doors that can be installed in walls, doors, or windows, designed for both dogs and cats. From small to large breeds, we ensure the pet door is the perfect size.
Electronic Pet Doors: For added security, we can install electronic pet doors that open only when activated by a collar sensor, keeping unwanted animals from entering.
Security and Weatherproofing: Our pet doors are designed to be secure, weatherproof, and energy-efficient, helping you maintain comfort and safety in your home.
Custom Pet Doors: Need a unique installation? We can customize a pet door to fit specific areas or particular needs, including sliding doors or garage entries.
By choosing Mark Brightman Handyman Services for your pet door installation near me, you’re ensuring a high-quality installation that keeps both your pets and home secure.
Reliable Handyman Near Me – Your Trusted Expert for All Home Repairs and Improvements
When you search for a reliable handyman near me, you want a professional who can handle everything from small repairs to major installations. Mark Brightman Handyman Services is your trusted partner for all your home improvement needs. We take pride in delivering expert services with a focus on quality, customer satisfaction, and convenience.
As a reliable handyman near me, we offer:
General Home Repairs: Whether it's fixing leaky faucets, repairing drywall, or replacing worn-out hardware, we provide dependable repairs to keep your home in top condition.
Remodeling and Renovations: From kitchen and bathroom remodels to custom built-ins and room additions, our team has the expertise to transform any part of your home.
Maintenance Services: We offer routine maintenance to help prevent costly repairs down the road, including gutter cleaning, HVAC maintenance, and more.
Specialty Installations: In addition to lighting and pet doors, we can handle everything from TV wall mounting and furniture assembly to ceiling fan installations and door repairs.
At Mark Brightman Handyman Services, we are a reliable handyman near me who brings professionalism, attention to detail, and a strong work ethic to every job, no matter how big or small.
Why Choose Mark Brightman Handyman Services?
3 -
HIRE A QUALIFIED ETH AND USDT RECOVERY EXPERT- CONTACT SALVAGE ASSET RECOVERY
I thought losing $500,000 in cryptocurrency was the end of the road for me. I had no idea how to recover my wallet, and all other services seemed to offer nothing more than false hope. But then I found Salvage Asset Recovery. Their team was incredible—professional, skilled, and thorough. They used advanced forensic methods and worked tirelessly to recover every penny. In the end, I got back everything I thought I had lost forever. Their support didn’t stop there; they also helped me fortify my wallet to prevent future breaches. The experience of losing such a significant amount of money, especially in the volatile world of cryptocurrency, left me feeling completely helpless. I reached out to several so-called recovery services, but most seemed more interested in collecting fees than actually offering real solutions. Salvage Asset Recovery, however, was different. From the moment I contacted them, their approach was transparent and results-driven. They explained the entire recovery process step-by-step, giving me confidence in their methods. What really set them apart was their expertise. They utilized advanced forensic techniques to trace transactions and identify where my funds had gone. It wasn’t just about retrieving my money; they demonstrated a deep understanding of blockchain and cryptocurrency networks, which reassured me that I was in capable hands. Within a week, I received an update that they had successfully recovered the full amount I had lost. It felt like a miracle. Beyond the recovery, Salvage Asset Recovery went the extra mile to help me secure my wallet and improve my overall digital security. They advised me on the best practices for safeguarding my assets and set up a multi-layered security system to prevent future breaches. Thanks to their dedication and expertise, I now feel much more confident about my cryptocurrency holdings. I couldn’t be more grateful to Salvage Asset Recovery for turning what seemed like a devastating loss into a positive, secure future. Am Robert Lee from Michigan. Reach out to Salvage Asset Recovery CONTACT INFO--WhatsApp+ 1 8 4 7 6 5 4 7 0 9 6
1 -
SECURE YOUR BITCOIN RECOVERY WITH RAPID DIGITAL RECOVERY TRUSTED SOLUTION
Before parting with any money on a website or mobile app, it's essential to take steps to ensure the platform is legitimate. Researching the company, its founders, and its track record is key to making an informed decision. Be diligent in asking questions, reading reviews, and looking for any signs of credibility. Always remember the old adage, "If it’s too good to be true, it probably is." Scammers often prey on unsuspecting users with enticing offers that, on closer inspection, are nothing more than traps designed to steal your money. Scams can come in many forms, and some are more subtle than others. For instance, scammers may pretend to form emotional connections, feigning love or friendship to manipulate victims into giving money. In more extreme cases, they may even post inappropriate material to coerce or blackmail their victims. Regardless of the method, the impact can be both emotionally and financially damaging. If you’ve been scammed, recovering your funds can be a stressful and frustrating process. However, with the right approach, you may be able to recover your money and mitigate the damage. I found myself in such a situation, and I was able to successfully recover my funds by working with a service like Rapid Digital Recovery. They specialize in helping individuals who have fallen victim to online scams by assisting with fund recovery. The process was faster and easier than I expected, and their team made the entire experience much less overwhelming. If you suspect you’ve been scammed, the first step is to gather all relevant information about the transaction. This means taking screenshots of conversations with the scammer, which will serve as vital evidence. Next, gather any details about the scammer, such as their full name and account information. If you made the payment through a mobile app or SMS, find the transaction in your history and copy the “Transaction ID Number.” This information will be essential when filing your case with both your bank and the platform where the scam took place. Once you’ve gathered your evidence, contact your bank’s e-fraud department immediately. Most banks have specialized teams for online fraud. Provide them with all the necessary details, including screenshots and transaction IDs. It’s also wise to contact the scammer’s bank, sharing the same information, and to forward a copy of your case to Rapid Digital Recovery. Their team worked with the bank to help freeze the scammer’s account, preventing further losses and speeding up the recovery process. Recovering funds from online scams can be daunting, but with the right steps and the help of professionals like Rapid Digital Recovery, you can significantly increase your chances of success and protect yourself from future scams. Thanks to their assistance, I was able to recover my funds and put the whole ordeal behind me.
Reach Out To Them Via
Whatsapp: +1 4.14 8.0 71.4 8.5
Website: https: // rapiddigitalrecovery. org
Email: rapiddigitalrecovery (@) execs. com
1 -
BEST CRYPTOCURRENCY RECOVERY EXPERT HIRE MAESTRO ENCRYPTER FINANCIER
I mean, thinking back, it has seemed almost too good to be true. After so many different failed attempts with other companies and solutions, I pretty much had given up hope of such a thing happening. That's when Maestro Encrypter Financier completely flipped everything. They not only managed to restore my Bitcoin but did manage to restore my faith in customer service and technical excellence for cryptocurrency. Their approach was full, professional, and more importantly, they delivered the goods. I am speechless and out of words to thank them. If in the same situation, where you can't access your Bitcoin or any other cryptocurrency, I strongly recommend reaching out to Maestro Encrypter Financier. Apart from a lot of companies in this field promising to deliver heavens and giving you less than a pinch, Maestro Encrypter Financier is among the few which makes it a point that it keeps the promises and sees through its commitments. After countless failures, I finally found a company that delivered. And for this, I'll be forever grateful. I was surprised with the speed at which the whole process started moving. While most other companies made me wait for days or even weeks without any progress, Maestro Encrypter Financier immediately sprang to action. They started their analysis of my wallet encryption, cross-referencing some security protocols, and applied advanced recovery tools to fight their way through issues that had been preventing access. A recovery time was projected for the effort involved in recovering this data. And, amazingly, they succeeded by it. It was further an important milestone in that entire process when, after my perceived 'dead end', Maestro Encrypter Financier recovery experts were ready to put on alternatives around the problems instead of accepting 'that's impossible' as some would try to cash on or change to. They never pressed me to do anything that sounded like fraud or was an unnecessary charge. It was a day that I would never forget-a moment when such an email landed in my box from Maestro Encrypter Financier and assured me that my Bitcoin was restored. I could feel my heartbeat as I tried to log into my wallet. I was so used to seeing the "access denied" message that it felt like a dream to finally see my balance staring back at me. The coins were all there, as they should be. My whole investment-my future-was safe again. Not only did they return my Bitcoin, but the team even made sure that my wallet was now more secure than ever. They gave me better security features and explained how to maintain my digital assets in the future. Because of Maestro Encrypter Financier, I would never have to experience the loss of my Bitcoin again. For enquiry, Email:(maestroencryp1er@financier. com) or call/ WhatsApp: +14722038937
5 -
HIRE A QUALIFIED ETHEREUM AND USDT RECOVERY EXPERT VISIT→FOLKWIN EXPERT RECOVERY.
It was during one session that my trainer casually mentioned his brother had used FOLKWIN EXPERT RECOVERY to recover $160,000 after a wallet disaster. I nodded along, pretending to be paying attention, while in my head thinking, "That's not gonna happen to me. I'm a crypto genius! " Famous last words, right?
A week later, a software glitch had locked me out of my $280,000 wallet, and suddenly I wasn't feeling quite so genius-like. I sat staring at the screen as my heart went through the floor. This was that 'once in a lifetime' they always spoke about, which would never happen to me. Panic mode: on. The usual 'click every button so it hopefully magically fixes itself' approach, complemented by less-than-legal-sounding Google searches, later, with no dice. The wallet was gone, and with it, my calmness. Then, it struck me-my trainer had talked about FOLKWIN EXPERT RECOVERY. I really wasn't expecting much, but at that juncture, I figured I had nothing left to lose except, you know, my $280,000. So I picked up the phone and called them, bracing myself for what I was sure would be an automated message asking if I wanted to leave a voicemail. But no, this time it was different: on the other end was a real human. A calm, composed human who sounded like they had their life together-something I hadn't felt in the last 30 minutes. FOLKWIN EXPERT RECOVERY didn't send me some generic recovery instructions but took me through it like a friend, presenting real solutions and steady guidance. They didn't treat me like some panicked, inexperienced crypto newbie, which I really was. They reassured me and knew just what to do; within hours, I had my funds back. I couldn't believe it; speechless was all that remained. Not only did they recover my wallet, but they also helped me secure it properly for the future. I was no longer the guy who thought he could just wing it with some random software updates. Now, I'm the guy who recommends FOLKWIN EXPERT RECOVERY to everyone at the gym, at work, and anywhere else I can get a captive audience. After all, if you're going to talk about losing $280,000, you might as well make sure the next person isn't you. So, my advice is not to underestimate the power of random gym conversations, because that one mention saved me from financial disaster. To get in touch with FOLKWIN EXPERT RECOVERY for assistance, WhatsApp +1 740-705-0711 them or email: FOLKWINEXPERTRECOVERY@TECH-CENTER (dot) C OM, And the next time you're about to do something dicey in crypto, remember to back up your wallet-and maybe listen a little closer to those offhand comments. You won't regret it, trust me.
Warm greetings,
Mis Karoline Leavitt.
1 -
CRYPTO RECOVERY SPECAILIST CONTACT FUNDS RECLIAMER COMPANY
I am a Mexican based professional in the investment industry and on FUNDS RECLAIMER COMPANY to expand my network and connect with other industry professionals. I would be happy to connect you all with FUNDS RECLAIMER COMPANY and start the dialogue to see how we can cooperate.
At the beginning of 2025, I found myself in a terrifying situation when the entire amount of SUI, worth 250,000 Euros, that I had stored in my Trust Wallet was mysteriously transferred to an unknown address. I had not authorized any transactions, nor had I shared my private keys or seed phrases with anyone, so the sudden disappearance of my funds left me both confused and alarmed. It seemed as though my assets had vanished into thin air, and I couldn’t comprehend how or why this happened. Desperate for a solution, I reached out to Trust Wallet customer support, hoping they might be able to offer some clarity or assistance. The response I received, however, was disappointing. Trust Wallet explained that they couldn't directly trace blockchain transactions, as their platform does not have the capability to track funds once they leave the wallet. They also suggested that the most likely cause of the loss was a compromised private key, even though I had been careful to safeguard this information. I felt an overwhelming sense of helplessness. How could my private key have been compromised without me ever sharing it? I had followed all the best practices for keeping my wallet secure, and yet, my funds were gone. After hitting a dead end with Trust Wallet, I knew I had to explore other avenues for recovery. During my search, I came across Wizard Web Recovery. This company claims to specialize in tracing stolen funds and recovering them from blockchain networks. Initially skeptical, I decided to give it a try. The more I researched Wizard Web Recovery, the more confident I became in their expertise. They have a team of certified experts who specialize in the recovery of lost or stolen cryptocurrency, including ETH and other digital assets, and they seem to have a proven track record in handling these types of cases. When I reached out to FUNDS RECLIAMER COMPANY, their team was prompt in responding and immediately set to work analyzing my situation. They began by asking for transaction details and wallet information, assuring me that they would investigate the matter thoroughly. Over the next few days, I stayed in close contact with them as they worked diligently to trace the stolen funds. Their expertise in blockchain technology and recovery techniques gave me hope that there was still a chance of retrieving my lost assets. Although the process is still ongoing, I feel much more reassured knowing I’m working with professionals who understand the intricacies of cryptocurrency recovery. As we start 2025, I remain cautiously optimistic that my funds will eventually be recovered. If you ever find yourself in a similar situation, I would highly recommend seeking help from certified experts like Wizard Web Recovery. Their dedication to recovering stolen funds has made a potentially disastrous situation a lot more bearable.
FOR MORE INFO:
Email: fundsreclaimer(@) c o n s u l t a n t . c o m
WhatsApp:+1 (361) 2 5 0- 4 1 1 0
Website: h t t p s ://fundsreclaimercompany . c o m
1 -
It was supposed to be the happiest moment of my life, my wedding day. I had spent months planning every detail, from the venue to the dress, but the centerpiece of it all was the jewelry. I wanted to surprise my fiancé with a beautiful custom-made ring, and I thought I had found the perfect online store for it. Based in Tasmania, I was confident that the company I found was reliable and would create the beautiful, one-of-a-kind jewelry I had dreamed of. The website, called jewelry com looked professional, and they even had a large following on their social media pages, with countless positive comments and glowing reviews from customers. This made me feel secure about my purchase. The testimonials on their site praised the quality and craftsmanship of their pieces, further convincing me that I was making the right choice. I placed a substantial order, AUD 8000, for both the engagement ring and other jewelry for the wedding. I was excited and felt at ease knowing that everything was falling into place. The company promised a delivery date that would have the jewelry arrive weeks before the wedding, just in time for the big day. However, as the days went by, I started to feel uneasy. The tracking information they provided was unclear and not updated, and after multiple attempts to contact the seller, I was met with silence. It was then that I realized I had been scammed. The website disappeared, and their social media accounts, which once had thousands of followers, were taken down. I was devastated. With the wedding fast approaching, I had no jewelry to present to my fiancé, and I was left with nothing but a massive financial loss. I knew I had to act fast, so I reached out to CRANIX ETHICAL SOLUTIONS HAVEN for help. They quickly took charge of the situation, investigating the fraudulent seller and tracing the scam. Their team worked tirelessly to gather evidence and track down the perpetrators. Thanks to CRANIX ETHICAL SOLUTIONS HAVEN, they successfully recovered my entire AUD 8000. Their transparency, and persistence gave me peace of mind during a very stressful time. Though the experience was heartbreaking, I am grateful that I was able to get my money back and learn an important lesson about online shopping. Moving forward, I’m much more cautious about where I make purchases and always double-check the credibility of online businesses, especially those with big social media followings. Thanks to CRANIX ETHICAL SOLUTIONS HAVEN, I was able to put the ordeal behind me and eventually find the jewelry I had originally envisioned for my special day.
EMAIL: (info @ cranixethicalsolutionshaven . info) OR (cranixethicalsolutionshaven @ post . com)
TELEGRAM: @ cranixethicalsolutionshaven
WHATSAPP: +44 746 062 27301 -
Black Sheep Construction LLC: Your Trusted Roofing Company and Expert Roofers in Holly Springs, NC
When it comes to the safety and longevity of your home, the roof is one of the most critical elements. At Black Sheep Construction LLC, we are proud to be one of the leading roofing companies in Holly Springs, NC. Whether you need a minor roof repair or a complete roof replacement, our team of expert roofers is here to provide you with high-quality, reliable services that ensure your home is protected for years to come.
Trusted Roofing Company: Quality You Can Depend On
As a well-established roofing company, Black Sheep Construction LLC has built a reputation for delivering top-notch roofing solutions in the Holly Springs area. We understand that your roof is an investment, and we treat it with the care and attention it deserves. Our team works with a variety of roofing materials, including asphalt shingles, metal roofing, and more, ensuring that you get the best solution for your needs.
Our roofing services include:
Roof Installation: Whether you're building a new home or replacing an old roof, our skilled roofers provide efficient and durable roof installations.
Roof Repairs: From minor leaks to significant storm damage, we quickly assess and repair your roof to restore its integrity.
Roof Inspections: Regular roof inspections help identify potential problems before they become costly issues. We offer thorough inspections to ensure your roof is in top condition.
Roof Maintenance: Keeping your roof in great shape with routine maintenance is crucial. Our team provides maintenance services to extend the lifespan of your roof and keep it performing well.
At Black Sheep Construction LLC, we pride ourselves on providing reliable, affordable roofing solutions that are designed to last.
Expert Roofers: Skilled, Experienced, and Ready to Help
When it comes to roofing, experience matters. As expert roofers, our team at Black Sheep Construction LLC is equipped with the knowledge and skills to handle all types of roofing projects. Whether you're dealing with a roof leak, need a complete replacement, or are looking to upgrade to a more energy-efficient roof, we are here to help.
What sets our roofers apart?
Professional Expertise: Our team is highly trained and stays up-to-date with the latest roofing techniques and materials to provide the best service possible.
Attention to Detail: We take great care in every aspect of our work, from proper installation to precise repairs, ensuring that no detail is overlooked.
Customer Satisfaction: We value your home as much as you do. Our team works hard to ensure your roofing project is completed to your satisfaction, on time, and within budget.
Safety and Cleanliness: We adhere to the highest safety standards and maintain a clean job site throughout the duration of your project.
Why Choose Black Sheep Construction LLC?
Local Expertise: As a locally-owned and operated business in Holly Springs, NC, we understand the unique roofing needs of our community and offer services tailored to local weather conditions and building codes.
Quality Materials: We only use top-quality roofing materials that are durable, long-lasting, and designed to withstand the elements.
Affordable Solutions: Our pricing is competitive, and we offer free, no-obligation estimates so you can make an informed decision.
Comprehensive Services: Whether you need a roof inspection, repair, replacement, or installation, we provide all the roofing services you need in one place.
Get in Touch with Black Sheep Construction LLC Today
If you’re looking for reliable roofing companies or skilled roofers in Holly Springs, NC, Black Sheep Construction LLC is here to help. We are committed to providing top-quality service that ensures your roof is in excellent condition, keeping your home safe and secure.
Call us today at +1 (919) 946-3013 or visit our office at 350 Raleigh St, Holly Springs, NC 27540. Let us help you with all your roofing needs!1 -
How to Recover Money from a Binary Options Scam: A Guide with Century Web Recovery
Falling victim to a binary options scam can be a devastating experience, leaving you feeling helpless and financially ruined. Fortunately, there is hope. Century Web Recovery specializes in helping individuals recover funds lost to such scams. Here’s how they can assist you in reclaiming your money.
Understanding Binary Options Scams
Binary options scams lure investors with promises of high returns and minimal risk. Victims are often contacted by seemingly professional brokers who convince them to invest significant sums of money. Once the investment is made, the scammers block access to accounts, making it impossible to withdraw funds or contact the company.
Steps to Recover Your Funds
1. Initial Consultation
Century Web Recovery begins with a no-obligation consultation. They gather information about the incident, including the nature of the scam, the amount lost, and the details of the transactions. This helps them understand the specific circumstances of your case.
2. Preliminary Assessment
They conduct a preliminary assessment to determine the feasibility of recovering your funds. This involves evaluating the available information and considering the jurisdictions involved. While full recovery is rare, their goal is to recover as much as possible.
3. Engagement Agreement
If they believe recovery is possible, Century Web Recovery will proceed with an engagement agreement. This outlines the scope of services, fee structures, and any necessary legal disclaimers. A retainer fee may be required, which is a small percentage of the estimated recovery fees.
4. Detailed Investigation and Blockchain Analysis
The core of their recovery efforts lies in detailed investigation and blockchain analysis. Century Web Recovery uses advanced tools to trace transactions and identify the wallets where stolen funds have been moved. They monitor these wallets to track any movements of the funds.
5. Legal Process: Freezing and Recovery of Assets
If the stolen funds are identified in a compliant exchange, Century Web Recovery collaborates with legal counsel to file legal injunctions to freeze the assets. They navigate the complex legal landscape, working to substantiate the ownership of the stolen funds and recover them through court proceedings.
6. Return of Funds
Once the legal process is successfully completed, the recovered funds are returned to the rightful owner. Century Web Recovery assists in setting up secure crypto custody solutions to ensure the recovered assets are safely stored.
Why Choose Century Web Recovery?
Century Web Recovery operates within legal and ethical boundaries, ensuring that all recovery efforts comply with international regulations. They use legitimate methods and do not promise unrealistic outcomes, maintaining transparency throughout the process.
Victims of binary options scams can trust Century Web Recovery to provide expert assistance in recovering lost funds. Their comprehensive approach, combining technical expertise and legal prowess, offers the best chance for successful recovery.
Website centuryweb.online2 -
PROFESSIONAL BTC AND USDT RECOVERY SERVICES VISIT SPARTAN TECH GROUP RETRIEVAL
Residing in Florida, I was elated to secure a luxurious condominium in Miami Beach for a much anticipated retreat. The property appeared resplendent in the online listing, boasting breathtaking ocean vistas and opulent amenities.
After several exchanges with the "owner," I felt a burgeoning confidence in my decision to finalize the rental. This situation took a disconcerting turn when the owner requested a security deposit to be remitted in Bitcoin. Initially apprehensive I was ultimately swayed by the allure of the exquisite condo and the owner's persuasive demeanor. I thought, “It’s merely a deposit; I can trust this.” Consequently, I transferred the requested amount in Bitcoin , experiencing a blend of excitement and trepidation. As soon as the transaction was consummated, my exhilaration morphed into dread. The "owner" vanished without a trace and I was struck by the grim realization that I had fallen victim to a scam.
A wave of panic engulfed me as I confronted the loss of a substantial sum of money, and my dream vacation began to dissolve. I embarked on a quest for solutions and discovered SPARTAN TECH GROUP RETRIEVAL a firm specializing in blockchain forensics. I reached out to , harboring hope that they could assist in the recovery of my lost funds.
Their team was remarkably responsive and promptly initiated an investigation. They adeptly traced the Bitcoin transactions to a Binance account, uncovering the fraudster’s digital footprint. SPARTAN TECH GROUP RETRIEVAL recovered all my funds which brought me immense relief. Although the sting of the loss lingered the knowledge that the authorities were pursuing the scammer imparted a sense of justice.
This experience imparted a valuable lesson regarding the inherent risks associated with cryptocurrency transactions. I am profoundly grateful for the expertise of SPARTAN TECH GROUP RETRIEVAL as their diligent efforts not only facilitated the recovery of my lost funds but also underscored the necessity of vigilance in the digital age.
As I move forward I will exercise greater caution and discernment ensuring that I safeguard myself against potential scams in the future.
MORE CONTACT INFO ABOUT THE COMPANY :WhatsApp: + 1 ( 9 7 1 ) 4 8 7 - 3 5 3 8
Telegram: + 1 ( 5 8 1 ) 2 8 6 - 8 0 9 22 -
USDT AND ETH RECOVERY EXPERT REVIEWS WITH SPARTAN TECH GROUP RETRIEVAL
Losing a significant amount of money, especially through an investment that you believed would secure your financial future, can be devastating. For me, that loss came in the form of $20,000 in Bitcoin (BTC) investments. The whole situation unfolded due to an unfortunate encounter with online traders who turned out to be scammers. I had high hopes for my investments and spent considerable time and effort researching and strategizing. But one wrong decision led to everything unraveling quickly. At first, I was completely overwhelmed by the situation. I felt trapped, destitute, and uncertain about what to do next. The emotional toll was significant; I had worked hard to save that amount of money and trusted these online traders who, in the end, vanished with my funds. For a while, I considered giving up. I didn't know who to turn to or how to navigate the aftermath of such a devastating loss. Then, one day, I was introduced to SPARTAN TECH GROUP RETRIEVAL, a service that specializes in helping people like me recover money lost to fraudulent schemes, particularly in the cryptocurrency world. Initially, I hesitated to reach out to them on WhatsApp:+1 (971) 4 8 7 -3 5 3 8
OR Telegram:+1 (581) 2 8 6 - 8 0 9 2 . I had already experienced so much disappointment, and I wasn’t sure if there was any chance of getting my money back. But after doing some research and reading testimonials from others who had similar experiences, I decided to give them a try. I can honestly say it was one of the best decisions I’ve made. The team at SPARTAN TECH GROUP RETRIEVAL provided me with a structured and efficient mechanism to trace and recover the funds that were lost. From the beginning, their approach was professional, transparent, and compassionate. They understood the frustration I felt and worked tirelessly to help me regain what I had lost. Their expertise in handling Bitcoin fraud cases was evident throughout the entire process. They walked me through every step, kept me informed on the progress, and ensured that I never felt alone. Within a reasonable amount of time, I was able to recover a significant portion of my lost funds something I had thought was impossible just weeks earlier. For anyone who finds themselves in a similar situation, I strongly recommend reaching out to SPARTAN TECH GROUP RETRIEVAL. They have the tools and knowledge necessary to assist in recovering lost money, and they genuinely care about their clients' financial well-being. If you're in a situation like mine and want to recover your lost investments, SPARTAN TECH GROUP RETRIEVAL is the team you can trust.
Contact on Email: spartantech (@) cyberservices . com
1 -
HOW I RECOVERED MY STOLEN ETHEREUM WITH HELP OF TRUST GEEKS HACK EXPERT
Malware attack, those two words turned my life upside down. In just minutes, 40 ETH vanished from my crypto wallet, stolen by an attacker who used advanced tactics to cover their tracks. I was in shock. Years of savings, gone in an instant. I contacted several well-known cybersecurity and blockchain forensics firms, hoping someone could help. But each one gave me the same grim answer: “Sorry, it’s untraceable.” It felt like the end of the road until I found (TRUST GEEKS HACK EXPERT). Unlike the others, (TRUST GEEKS HACK EXPERT) didn’t brush me off or offer false hope. Instead, they calmly explained their approach: deep blockchain analytics, behavioral wallet tracking, and a few proprietary techniques they’ve developed from years of experience in the field. They weren’t just talking, they meant business.Within days, they began tracking the stolen ETH across a complex web of transactions. The attacker had used mixers, layered wallets, and decentralized exchanges, trying to erase their digital footprints. But (TRUST GEEKS HACK EXPERT) followed the flow, detecting patterns and linking wallets through subtle behaviors that most firms overlook. Their team’s understanding of the blockchain's transparent yet intricate nature was nothing short of incredible. Through tireless investigation and real-time tracking, (TRUST GEEKS HACK EXPERT) managed to recover 39 ETH. That’s right out of the 40 ETH that was stolen, they got back 39. I couldn’t believe it. After being told over and over that my funds were gone forever, (TRUST GEEKS HACK EXPERT) brought them back.What impressed me just as much as the recovery itself was their professionalism. They communicated clearly throughout the process, providing updates, timelines, and even helping me understand how the malware worked and how to secure my assets going forward. It wasn’t just a recovery it was an education.(TRUST GEEKS HACK EXPERT) isn’t just another name in the industry. They are in a league of their own when it comes to blockchain forensics and crypto asset recovery. for Assistance support team is available (Te le G r a m ID: TV r u s t g e e k s h a c k e x p e r t )2 -
HOW TO RECOVERY YOUR BTC/USDT/CRYPTO WITHOUT FALLING VICTIM TO SCAMS/FOLKWIN EXPERT RECOVERY.
In the world of cryptocurrency, where mistakes can be costly and recovery options seem limited, FOLKWIN E X P E R T RECOVERY is a true lifesaver. They not only gave me my Bitcoin back but also restored my peace of mind. I can’t express enough how much their expertise, professionalism, and dedication meant to me during one of the most stressful times of my life. If you’re reading this and are in a similar situation, where you’ve lost access to your Bitcoin or other digital assets, do yourself a favor and reach out to FOLKWIN E X P E R T RECOVERY. I had nearly given up hope before I found them, and now I can say with full confidence that they are the real deal. They have the knowledge, tools, and experience to recover your assets, and they do so with integrity and dedication. The relief I felt at that moment was indescribable. It was like waking up from a nightmare. I had nearly lost everything, and here it was, restored to me. The team at FOLKWIN E X P E R T RECOVERY had not only retrieved my lost wallet but also took extra precautions to ensure that it was safe and secure. They even helped me set up additional security features to prevent future issues. Thanks to FOLKWIN E X P E R T RECOVERY, I got my Bitcoin back. But this experience has taught me so much more than just how to recover a lost wallet. I learned the importance of maintaining multiple backups, using secure methods for storing private keys, and regularly reviewing my security settings. More importantly, I learned the value of persistence and the need to seek professional help when all else fails. Before contacting FOLKWIN E X P E R T RECOVERY, I had almost resigned myself to the fact that my Bitcoin was lost forever. I had tried everything I could think of, but nothing worked. It was easy to feel hopeless in those dark moments. But FOLKWIN E X P E R T RECOVERY didn’t just recover my Bitcoin—they gave me my confidence back. Their professionalism, expertise, and dedication to customer satisfaction were evident throughout the entire process. The team didn’t just restore my wallet; they restored my faith in the process. Now, I feel more confident in my ability to handle my digital assets, and I’m forever grateful to FOLKWIN E X P E R T RECOVERY for their tireless efforts in getting me back on track. From frustration to joy, FOLKWIN E X P E R T RECOVERY turned my Bitcoin nightmare into a success story. If you’re struggling, don’t hesitate to contact them. They are the experts who can help you get your Bitcoin back—and they did exactly that for me. Send an email to: Folkwinexpertrecovery (AT) tech-center (DOT) com , Telegram: @Folkwin_expert_recovery.
Thank you for your time.
Regards,
Liliana Davis.
9 -
My daughter had warned me multiple times about the risks of crypto scams, but I never imagined I would fall victim to one. It all started when I came across an ad on YouTube for an “Ethereum mining pool” that promised high returns with minimal effort. Passive income was too tempting, and I didn’t think twice. Unfortunately, what I believed was a legitimate investment opportunity was a sophisticated scam. I lost 18 ETH, my entire retirement savings. The regret and despair I felt were overwhelming. It wasn’t just the money, but the fear of how I would secure my future. I did not know how to get it back or where to start. That's when a friend recommended Tech Cyber Force Recovery. At first, I was skeptical. After all, I had already lost so much, and I had no idea who could help me now. However, after contacting them, I was surprised at how understanding and patient they were with my situation. They assured me they had the tools and expertise to trace my lost funds, and I decided to give them a chance. Tech Cyber Force Recovery did exactly what they promised. Not only did they track down the funds, but they also uncovered the full scope of the scam operation. It was a complex network, involving multiple players across borders. The team worked tirelessly, collaborating with international exchanges and law enforcement to identify the culprits and retrieve as much of my money as possible. In the end, they recovered 17 ETH, 94% of what I had lost. What truly impressed me was their professionalism and compassion. They didn’t just treat me like another case; they treated me like a person. When they learned I was a retiree, they even waived part of their fee, which was an incredibly kind gesture. I was beyond grateful for their support and expertise throughout the process. If you’ve fallen victim to a crypto scam, don’t give up hope. Tech Cyber Force Recovery is a miracle worker with a heart of gold. I highly recommend them to anyone facing a similar situation.
Telegram (@)techcyberforc
mail Techcybersforcerecovery(@)cyberservices(.)com2 -
I was drawn into the world of cryptocurrency with the promise of high returns and financial independence. One day, I stumbled upon a website that looked legitimate, boasting impressive profits and testimonials from seemingly satisfied investors. It promised a low-risk, high-reward investment in Bitcoin, and before long, I had invested €48,750 into what I thought was a secure platform. At first, everything appeared to be going well. The returns were as promised, and I watched my investment grow. But when I attempted to withdraw my earnings, the site suddenly became unresponsive. My attempts to contact customer support were met with silence, and it dawned on me that I had fallen victim to a sophisticated scam.Desperate and feeling betrayed, I turned to the internet for solutions. It was here that I first heard about Alpha Spy Nest. The stories on various forums spoke of their success in recovering funds for those scammed in the crypto world. Skeptical but with nothing to lose, I reached out to them.From our initial conversation, the team at Alpha Spy Nest exuded professionalism. They asked for details about my transactions, the platform used, and any communication I had with the scammers. They assured me of confidentiality and explained how they would use blockchain analysis and cyber forensics to trace my lost Euros converted into Bitcoin.The process was both fascinating and nerve-wracking. Alpha Spy Nest's experts delved into the blockchain, tracking the movement of my Bitcoin through various wallets, which was no small feat given the anonymity and complexity of cryptocurrency transactions. They identified patterns and connections that led them to the scam operation's digital footprint.The breakthrough came when they managed to freeze some of the assets on various exchanges where the scammers attempted to cash out. Through negotiations and leveraging their network, Alpha Spy Nest was able to recover a significant portion of my lost investment.The relief was overwhelming when they informed me that they had successfully reclaimed much of my €48,750. Not only did they recover my funds, but they also educated me on how to better secure my digital investments going forward, teaching me about secure wallets, the importance of due diligence, and how to verify the legitimacy of investment platforms.
1 -
WHATSAPP +1 252 378 7611 PROFESSIONAL BITCOIN RECOVERY EXPERT FOR HIRE CONTACT CYBER CONSTABLE INTELLIGENCE
Information of Cyber Constable Intelligence
WhatsApp info: + 1 2 5 2 3 7 8 7 6 1 1
Email info: (support (@) cyberconstableintelligence ). com)
As a retired dentist, I found myself with ample free time but limited financial security. In search of a way to grow my savings, I turned to cryptocurrency trading. I joined several online forums and communities, where I read about the success others had found with Bitcoin. Their testimonies inspired me to take the plunge. With careful research and strategic investments, I managed to turn my initial investment into $250,000.The financial success brought a renewed sense of purpose and stability to my retirement. However, this newfound prosperity also attracted the envy of someone close to me: my financial advisor, whom I had trusted for years. Unbeknownst to me, he had been monitoring my success closely. One evening, while I was cooking supper, my financial advisor accessed my phone and changed the passwords to my accounts, attempting to transfer my Bitcoin to his wallet. I discovered this betrayal shortly after, feeling a mix of shock, panic, and anger. My financial future was in jeopardy, and I needed to act quickly. In my desperate search for a solution, I stumbled upon Cyber Constable Intelligence, a service specializing in recovering hacked accounts and lost cryptocurrency. With my savings hanging in the balance, I reached out to them, hoping for a miracle. The team at Cyber Constable Intelligence was prompt and professional. They reassured me that, despite the seriousness of my situation, there was a good chance they could help. Their calm and confident demeanor provided some much-needed comfort. They guided me through the recovery process, taking over the technical aspects and working tirelessly to regain control of my accounts. In a remarkably short time, Cyber Constable Intelligence managed to restore my access to my accounts and secure my Bitcoin. The relief I felt was indescribable. Not only had they recovered my funds, but they also provided essential advice on how to enhance the security of my digital assets. This experience taught me several valuable lessons. Firstly, trust must be carefully placed, even with long-term associates. Secondly, it's crucial to secure your digital assets with strong, unique passwords and two-factor authentication. Lastly, seeking professional help in times of crisis can make all the difference. After regaining control of my accounts, I severed ties with my financial advisor and took steps to ensure my assets were protected. Despite the ordeal, I emerged more knowledgeable and determined to safeguard my future. My experience with Cyber Constable Intelligence not only saved my investments but also reinforced the importance of vigilance and security in the digital age. -
Steps for fund recovery from an online crypto scam—rely on BETAFORT RECOVERY
Through Betafort Recovery, Bitcoin scam victims can retrieve their money. I recommend Betafort Recovery to anyone who has fallen victim to a scam and has been looking for methods and techniques to recover their lost cryptocurrency or wallets. Betafort Recovery is a reliable cryptocurrency recovery firm that assists victims in recovering their stolen cryptocurrency and offers secure solutions to protect your wallets from online scammers. I must admit that I was deeply melancholy and had given up on life until these experts could restore my $23,400 to my wallet. If you've lost your cryptocurrency and you are helpless about it, contact Betafort Recovery to get your money back. One key aspect that makes Betafort Recovery stand out is its focus on providing secure solutions to protect wallets from online scammers. It's not just about recovering lost funds; it's also about preventing future incidents and ensuring that clients' digital assets are safeguarded against potential threats. This proactive approach demonstrates their commitment to the long-term financial security of their clients. Furthermore, for individuals who have lost their cryptocurrency and are feeling helpless, reaching out to Betafort Recovery could be a turning point in their situation. The reassurance that they are legitimate for seeking help and recovering lost funds can provide much-needed relief and a sense of empowerment. Betafort Recovery as a reliable cryptocurrency recovery firm is certainly well-founded. Their ability to assist scam victims in recovering stolen cryptocurrency, their focus on providing secure solutions, and their commitment to supporting clients through challenging situations make them a valuable resource for individuals navigating the complex world of digital currencies. If you or someone you know has fallen victim to a cryptocurrency scam, contacting Betafort Recovery could be the first step towards reclaiming lost funds and regaining peace of mind.7 -
CHANCES OF CRYPTO RECOVERY OPTIONS:USE SPARTAN TECH GROUP RETRIEVAL
WhatsApp:+1 (971) 4 8 7 - 3 5 3 8
Email: spartantech (@) cyberservices . com
Telegram:+1 (581) 2 8 6 - 8 0 9 2
For many individuals and businesses, the experience of financial loss, whether caused by cyberattacks, data breaches, or unforeseen events, can feel overwhelming and intimidating. The emotional and financial toll can be immense, leaving people uncertain of where to turn. In these challenging times, SPARTAN TECH GROUP RETRIEVAL offers a crucial lifeline, providing expert services that guide clients through the recovery process with both skill and compassion. At SPARTAN TECH GROUP RETRIEVAL, the team recognizes the profound impact financial loss can have on clients, not only in terms of their finances but also on their sense of security and well-being. Their highly trained professionals specialize in assessing the full extent of damage caused by various disruptions, carefully identifying the underlying issues and working to develop tailored recovery strategies. Whether the challenge involves restoring lost data, recovering compromised systems, or securing vulnerable networks, SPARTAN TECH GROUP RETRIEVAL utilizes the latest technology and industry best practices to restore both operational efficiency and peace of mind. Data loss can be a particularly devastating consequence of a cyberattack or system failure. In a world where information is the lifeblood of businesses, recovering lost or corrupted data is crucial to regaining normal operations. SPARTAN TECH GROUP RETRIEVAL’s experts employ advanced data recovery techniques to retrieve vital information, ensuring that clients do not suffer irreversible setbacks. By recovering valuable data, they allow businesses to continue their operations with minimal disruption. Beyond data recovery, SPARTAN TECH GROUP RETRIEVAL excels at restoring and securing compromised systems. After a breach or attack, the threat of future vulnerabilities looms large. The team’s cybersecurity experts take swift action to secure networks and systems, implementing robust protection measures to defend against future threats. Through a combination of proactive monitoring, vulnerability assessments, and real-time security solutions, SPARTAN TECH GROUP RETRIEVAL works tirelessly to ensure that businesses and individuals can rebuild trust and safeguard their digital assets for the long term. However, what truly distinguishes SPARTAN TECH GROUP RETRIEVAL is its unwavering commitment to client care. While the technical aspects of recovery are vital, the company understands the emotional strain that often accompanies financial loss. Their compassionate case managers offer much-needed emotional support and practical guidance, helping clients navigate both the logistical and psychological challenges they face. By addressing the emotional as well as the practical aspects of recovery, SPARTAN TECH GROUP RETRIEVAL ensures that clients feel understood and supported throughout the entire process. In the face of financial hardship, SPARTAN TECH GROUP RETRIEVAL is a trusted partner that combines technical expertise with empathy and dedication. Their holistic approach ensures that businesses and individuals can recover, rebuild, and emerge from financial challenges stronger, more secure, and better prepared for the future.
1 -
Legitimate Crypto Recovery Companies: Puran Crypto Recovery Leads the Way
As cryptocurrency grows as a preferred investment, so do the risks of falling victim to scams and technical errors. With individuals losing significant digital assets, the role of legitimate recovery companies becomes vital. Among these, Puran Crypto Recovery (PCR) stands out as a reliable name in the field. This article explores how PCR and other legitimate companies help victims reclaim their assets and offers tips for safeguarding crypto investments.
The Rise of Crypto Scams
Crypto scams have surged in recent years, targeting unsuspecting investors with increasingly sophisticated tactics. From phishing schemes and fake ICOs to Ponzi scams, fraudsters exploit the decentralized and anonymous nature of blockchain transactions. Victims often find themselves at a loss for recourse, emphasizing the importance of specialized recovery services like Puran Crypto Recovery.
Characteristics of Legitimate Crypto Recovery Companies
Legitimate crypto recovery firms share several defining traits:
Transparency: Reputable firms like PCR disclose information about their team, methods, and licenses.
Expertise: Companies should employ seasoned blockchain analysts and recovery specialists familiar with tracking stolen or inaccessible assets.
Proven Success: Positive testimonials and successful case studies bolster credibility. PCR, for instance, has earned trust through its consistent recovery outcomes.
Client-Centric Approach: Clear communication, confidentiality, and client advocacy are hallmarks of legitimate providers.
How to Verify a Crypto Recovery Service
Before entrusting any company, conduct thorough due diligence:
Research: Look up the company online, checking for reviews and any past controversies.
Compliance: Verify the firm’s regulatory standing to ensure it operates within legal frameworks.
References: Contact past clients for firsthand feedback on the company's performance.
With PCR, clients gain peace of mind knowing they are engaging a service with a stellar reputation and transparent processes.
Why Choose Puran Crypto Recovery?
Puran Crypto Recovery leads the industry with its advanced recovery techniques and commitment to ethical practices. Here’s what sets PCR apart:
Free Consultations: PCR provides an initial assessment to determine the feasibility of recovering lost assets.
Advanced Tools: Employing cutting-edge blockchain forensics, the team meticulously traces transactions and identifies illicit activities.
Collaborative Efforts: PCR works closely with clients to gather evidence, trace funds, and, if necessary, initiate legal action.
These qualities make PCR a top choice for victims seeking reliable crypto recovery services.
Tips to Safeguard Your Crypto Assets
While services like PCR provide hope for reclaiming lost funds, prevention remains the best approach. Follow these tips to protect your assets:
Secure Your Wallets: Use wallets with multi-factor authentication and cold storage solutions for long-term holdings.
Create Strong Passwords: Avoid using easily guessable credentials and ensure passwords are unique for each platform.
Stay Updated: Keep abreast of the latest scam techniques to recognize potential threats.
Avoid Sharing Keys: Never disclose private keys or sensitive wallet information, even to seemingly legitimate inquiries.
Conclusion
In a landscape fraught with scams and risks, legitimate crypto recovery companies like Puran Crypto Recovery offer a lifeline to victims of fraud. By combining expertise, transparency, and advanced tools, PCR has emerged as a leader in helping individuals reclaim their stolen assets.
However, prevention is always better than cure. Secure your investments, remain vigilant, and trust only proven recovery services like PCR if the need arises. With diligence and trusted support, you can navigate the cryptocurrency world confidently and securely.
FAQs
Q1: What is a crypto recovery service?
A crypto recovery service helps individuals retrieve lost or stolen cryptocurrency assets using forensic techniques and blockchain expertise.
Q2: How do I verify a recovery company’s legitimacy?
Look for transparency, licenses, and positive client reviews. Contact previous clients to assess their experience.
Q3: Can I recover lost private keys?
Yes, experienced companies like PCR often assist in recovering lost private keys or regaining access to wallets.
Q4: How much do crypto recovery services cost?
Costs vary depending on the complexity of the case. PCR offers free consultations to assess recovery prospects.
Q5: How can I avoid scams?
Use secure wallets, set strong passwords, and remain cautious of unsolicited emails or requests for private keys.1 -
BLOCKCHAIN CYBER RETRIEVE//RECOVER LOST BTC FUNDS FROM TRADING PLATFORM
Maintaining a high level of alertness is crucial when trading Bitcoin due to its market volatility and unpredictable price movements. Unfortunately, I learned this lesson the hard way after losing $125,000 in a single trading session. It began as an ordinary day; I was confident and focused on my strategy. However, the market quickly took a downturn, and my account balance dropped dramatically in a few hours. I was left in shock and overwhelmed, unable to process the situation. The financial loss was devastating, but the emotional toll was equally intense, leaving me wondering if I could ever recover those funds. In my panic, I reached out to a close friend who had introduced me to Bitcoin trading. She suggested contacting a service called BLOCKCHAIN CYBER RETRIEVE, which she claimed specialized in helping people recover lost funds, particularly from cryptocurrency trades. Following her advice, I reached out to them immediately. Their response was quick, and they began the recovery process almost right away, The team was both professional and empathetic, clearly explaining the steps involved and reassuring me that they would do their best to recover my $125,000. True to their word, BLOCKCHAIN CYBER RETRIEVE worked tirelessly on my behalf, and I was able to recover the full amount within a short period. The relief I felt was immense, and I was incredibly grateful for their efficiency. Additionally, they provided essential advice on how to protect my account from future risks, including enabling two-factor authentication (2FA), using a secure password manager, and avoiding phishing scams. These tips have been invaluable, and I now approach Bitcoin trading with much more caution and preparation. If you’ve experienced similar losses, I highly recommend reaching out to BLOCKCHAIN CYBER RETRIEVE for help. Their professional support can truly make a difference in recovering funds and safeguarding your future investments.
CONTACT INFORMATION:
WhatsApp: + 1 5 2 0 564 8300
Email: blockchaincyberretrieve (@) post . com1 -
DIGITAL TECH GUARD RECOVERY, A GOOD COMPANY TO RETRIEVE SCAM INVESTMENT
While I was waiting for my car to charge at an electric vehicle charging station in Los Angeles, I scanned a QR code that was supposed to be for a payment in Bitcoin. It looked completely legitimate, and I thought nothing of it. However, within moments, I realized that my cryptocurrency wallet had been drained. It was a shocking and devastating moment as I watched my hard-earned funds disappear right before my eyes. Feeling helpless and frustrated, I began searching for solutions and came across Digital Tech Guard Recovery. I reached out to them, and I can’t express how relieved I was to find a team that understood the situation and was ready to help. They were incredibly professional and knowledgeable about the scam, and they quickly got to work on recovering my lost funds. Digital Tech Guard Recovery utilized advanced recovery techniques and blockchain analysis to trace the stolen assets. I was amazed at their dedication and expertise. They kept me informed throughout the entire process, which made me feel more at ease during such a stressful time. Thanks to their hard work, they successfully recovered my 150 ETH that had been taken from my wallet. This taught me a valuable lesson about the importance of being cautious with digital transactions, especially when it comes to cryptocurrency. The team at Digital Tech Guard Recovery emphasized the need to verify QR codes before scanning and to use secure wallets with two-factor authentication. Their advice has made me much more vigilant, and I now feel more empowered to protect my digital assets. This incident was a wake-up call for me and many others in the EV community. It highlighted the risks associated with the growing reliance on digital currencies, especially in public spaces. I am incredibly grateful to Digital Tech Guard Recovery for their swift action and support during this challenging time. Their successful recovery not only provided me with financial relief but also reinforced the importance of cybersecurity in our increasingly digital world. I highly recommend their services to anyone who finds themselves in a similar situation.
WhatsApp: +1 (443) 859 - 28862 -
BEST RECOVERY COMPANY HIRE SPARTAN TECH GROUP RETRIEVAL FOR BITCOIN RECOVERY
Email: spartantech (@) cyberservices . c o m OR support (@) spartantechgroupretrieval . o r gWebsite: h t t p s : / / spartantechgroupretrieval . o r gWhatsApp:+1 ( 9 7 1 ) 4 8 7- 3 53 8Telegram:+1 ( 5 8 1 ) 2 8 6 - 8 0 9 2I Thought It Was All Over! It is my responsibility to handle our finances at home as my wife courageously serves in the armed forces. I had accrued our Bitcoin reserves discreetly during the past several years to $180,000 via cautious trading, my modest contribution towards our future. It was going to be our nest egg when she came home. But one insane morning, disaster struck. I was juggling breakfast, emails, and a diaper change when our toddler, energized by endless enthusiasm and chaos, hit high speed. In the blink of an eye, his little hands grabbed my coffee cup and hurled it across the room. Hot coffee splashed over my laptop, sizzling as it crept into the keys. I jumped to grab it, but too late. The screen flickered, fizzled, and went black. My stomach plummeted. Worst of all, the backup drive, which I foolishly had sitting alongside it, also received a caffeine bath. Panic set in. That $180,000 was everything I owned. My wife was overseas deployed, so she was out of it at home. How was I supposed to tell her that I had sunk our nest egg in coffee? Desperate for help, I found SPARTAN TECH GROUP RETRIEVAL in a commercial on a parenting podcast. I thought at first it was just another internet craze. With nothing to lose (save everything), I phoned. Much to my surprise, their team responded right away. They were polite, patient, and, above all, judgment-free. They reassured me that toddler-induced tech disasters were more frequent than I was aware. That reassured me somewhat, but I was still sweating bullets. The recovery process was similar to surgery on my financial future. They drilled data off of my soggy hard drive like a pair of brain surgeons. Every day, they'd update me on their progress in plain, non-geeky language, no mysterious technology mumbo-jumbo. That was wonderful, since my own nerves were fried.Seven days later, I received the call. They had recovered my wallet. Every satoshi remained. Relief enveloped me so intensely I came close to weeping. That $180,000, my wife's deployment bonus was included, was secure. I cannot thank SPARTAN TECH GROUP RETRIEVAL sufficiently. They rescued my savings, my pride, and potentially my marriage. I learned my lesson: always back up your backup, and keep your coffee at a distance from your laptop!
1 -
As a resident of California who endured the catastrophic repercussions of the recent wildfires, I was already grappling with the emotional and financial toll of losing my home and cherished belongings. The destruction left me feeling vulnerable and overwhelmed, struggling to find a pathway to rebuild my life. Amidst this turmoil, I received a text message that appeared to be a beacon of hope. It offered a "fire recovery grant" in cryptocurrency, specifically $60,000 in USDC, claiming that I could access funds to facilitate my recovery. All I needed to do was pay a nominal "processing fee." Desperate for assistance, I felt compelled to act swiftly, believing this could be the lifeline I so desperately required. The offer seemed legitimate. The website linked in the text exuded professionalism, complete with polished graphics and persuasive language that instilled a sense of trust. I thought I had discovered a means to secure some much-needed financial support to help me regain my footing. However, after I paid the processing fee, I quickly realized that I had fallen victim to a scam. The promised funds never materialized, and my attempts to contact the website went unanswered. A wave of despair washed over me, exacerbated by the profound loss I was already experiencing. The betrayal stung deeply, leaving me feeling more isolated and despondent than ever. I turned to online cryptocurrency forums, hoping to find guidance and camaraderie from others who might have faced similar predicaments. It was there that I stumbled upon CHAINTRACE ASSET RECOVERY , a service specializing in cryptocurrency recovery. Intrigued and desperate, I reached out to them, sharing my harrowing ordeal and the details of the scam. To my astonishment, they were responsive and empathetic, assuring me that they possessed the expertise to help recover my lost funds.Within a mere two days, CHAINTRACE ASSET RECOVERY successfully reclaimed all of my $20,000 USDC. The relief I felt was indescribable; it was as if a tremendous weight had been lifted from my shoulders. The scam had left me feeling defeated and the recovery process rejuvenated my faith in the possibility of rebuilding my life. I now advocate for others to remain informed, sharing my story to help prevent similar misfortunes.
WHATSAPP : +1 (581) 256‑19894 -
BITCOIN RECOVERY SOLUTIONS BY RAPID DIGITAL RECOVERY: EXPERTISE YOU CAN TRUST
About to go bankrupt, I invested some money in stocks and was able to make a couple of thousands of dollars. This initial success gave me a glimmer of hope and confidence. About the same time, I was mentored on cryptocurrency trading, which seemed very promising. I could see the fruits of this new venture from my friends and colleagues who were reaping substantial rewards. Mindful of that, but encouraged by all their success stories, I went all-in-investing $390,000.
At first, it seemed like I did something smart, putting my money into cryptocurrency. I went online, found what, at the time, I felt was a pretty legitimate broker-a decent website with apparently very real positive reviews. It was easy onboarding, further reinforced by the self-reinforcing feedback loop-my account showed a profit rise. I was even able to make small withdrawals, which pretty much sealed it in my mind.
But then, things took a complete turn for the worse when I tried to withdraw an amount a little larger. I was then shut out of my account. I panicked as I tried to reach out to the broker's customer support and got no response. It was clear that I had been working with a phony broker, which proved to be a fraud and a full-on scammer. My entire investment of $390,000 worth of Bitcoin was at risk.
I browsed the internet in desperation and came across Rapid Digital Recovery. Their website had great reviews and was very informative, so I had a little bit of hope. Skeptical but hopeful, I contacted them for help.
The Rapid Digital Recovery team has been very professional and user-friendly since the very first contact. They listened to me with empathy and understood my situation, which alone gave me the much-needed emotional support. They explained the process of recovery to me in detail and maintained clear communication throughout the process.
Knowing their field of activity pretty well in cryptocurrency questions, they used very professional methods of restoration. And with great relief for me, the firm called Rapid Digital Recovery succeeded in returning a significant amount of my Bitcoins. They even provided guidance on how to secure my digital assets to avoid similar situations in the future.
I highly recommend it to anyone who has fallen into this problem, just like me. A mix of skill, efficiency, and supportive manner-that is what Rapid Digital Recovery is when it comes to cryptocurrency fund recovery. If you have fallen under this scam, reaching out to Rapid Digital Recovery will probably be one of your best shots at getting what rightfully belongs to you.
Reach Out To Rapid Digital
( What sapp Info : +1 4.1 4 8.0 7 1.4 8.5)
( Web site Info : htt ps: // rap id dig ita reco very. org )
( Em ail Info : ra pid dig ital reco very @ ex ecs. com )1 -
I, as a mother of two, have always prioritized my family's safety above all else. On 6 February 2025, I was searching for a reliable home security system to protect my loved ones. I found one online then i messaged them after some hours i received a call from someone claiming to represent a well-known home security company, offering a special promotion, I thought it was the perfect opportunity to secure our home.The person on the other end of the line was convincing and professional, explaining the benefits of their security system and how it would protect my family. They sent me official-looking brochures and documents that made everything seem legitimate. The offer seemed too good to pass up, and they assured me I would receive the system within a week. Trusting them, I gave them my bank details to complete the purchase.But when that week came and went without any sign of the security system, I began to feel uneasy. I tried calling the company back, but the number was disconnected. That’s when I realized I had been scammed. I was devastated. Losing $4,000 wasn’t just a financial setback; it felt like I had failed to protect my family. The entire situation left me feeling vulnerable and helpless.I knew I had to act fast. After some research, I found PYRAMID HACK SOLUTION. After reading their success stories and seeing how they helped others in similar situations, I decided to reach out. From the very first contact, their team was professional, understanding, and reassuring. They immediately started investigating the fraudulent transaction and kept me informed every step of the way.Thanks to their hard work and expertise, PYRAMID HACK SOLUTION was able to recover $3,800 of the $4,000 I had lost. I couldn’t believe it. I was incredibly relieved and grateful for their dedication and persistence in getting my money back. Website; https: // pyramidhacksolution. com WhatsApp; +447414280914 Telegram; @PyramidhackSolution They not only restored my finances but also gave me peace of mind. Now, I’ve been referring friends and family to PYRAMID HACK SOLUTION because I know how much they can help. If you ever find yourself in a similar situation, I highly recommend reaching out to them. Their professionalism and commitment in helping people recover from scams is something I’ll always be thankful for.1
-
RAPID DIGITAL RECOVERY IS THE SECURE RELIABLE BITCOIN RECTORATION SERVICES
At first, these scammers were incredibly smooth. They made everything appear legitimate, acting as though my money was safe with them. They even went so far as to show me how to withdraw funds, building an illusion of trust. It seemed like a legitimate platform, and they were very convincing. I believed I was dealing with professionals, and for a while, things seemed fine. But as soon as they realized that they wouldn’t be able to extract another penny from me, they stopped responding to my calls and emails. The once friendly customer service turned cold, and all communication ceased. They blocked me on all channels, leaving me stranded and unable to access my funds. These scammers know exactly how to play their victims, making it seem like they’re here to help, only to pull the rug out from under you when they’ve gotten what they wanted. The whole situation felt like a trap, designed to manipulate and steal from people like myself. It’s a classic scam, and I’m sure many others have fallen for it. If my money had been returned to me, I would have taken down this warning, but unfortunately, what I experienced was straight-up theft. They took my funds and left me with nothing but frustration. However, in the midst of this hopeless situation, I found a lifeline in Rapid Digital Recovery. I had almost given up hope of recovering my money, but Rapid Digital Recovery came through when I thought all was lost. They were able to guide me through the process of recovering my funds, and after much effort, I successfully withdrew my money back into my bank account. It was a relief to know that not all hope was lost. I want to spread the word about the importance of being cautious online and to warn others about this fake platform. At the same time, I can’t recommend Rapid Digital Recovery enough. They helped me when I had nowhere else to turn, and they played a vital role in getting my money back. I’m sharing my story not only to warn others about the scammers but also to help promote the services of those like Rapid Digital Recovery who genuinely care about helping people in these situations.
INFO
What sapp Info: +1 41 4 80 7 14 85
Email INFO: rap iddi gita lrecov ery @ exe cs. com
5 -
HIRE A HACKER FOR CRYPTO SCAM RECOVERY USE FUNDS RETRIEVER ENGINEER
I remember a tough time when my college friend, Sarah, went through something that really shook her. We met during our freshman year at the University of Arizona, both studying Engineering. Sarah quickly became one of my closest friends, and we bonded over our love for technology and problem-solving. Our late-night study sessions were full of deep conversations about circuits, coding, and everything in between. Over time, Sarah’s curiosity led her to explore a lot of different things—new hobbies, tech tools, and even investing. She was fascinated by the stock market and cryptocurrency, eager to learn more. Little did I know, this interest would soon put her in a difficult situation. A few months into our second year, Sarah received a message on X (formerly Twitter), which appeared to be from Elon Musk himself, offering a unique investment opportunity in an online trading platform. The message seemed legitimate, and Sarah was excited about the idea of making a smart investment. She invested $55,000, reassured by the person she was communicating with that everything was secure and that returns would come quickly. However, things took a sudden turn when Sarah tried to withdraw her money. Her account was frozen, and all communication from the supposed investment contact stopped. She was devastated, and that’s when I saw how much this had shaken her. I suggested we search for help online, and that’s when Sarah came across a company called FUNDS RETRIEVER ENGINEER. At first, she was hesitant, but we decided to give it a shot.The team at FUNDS RETRIEVER ENGINEER worked relentlessly to recover her lost funds, and within a few days, almost the entire $55,000 was returned. It was an enormous relief for Sarah, and I could see the trust slowly returning to her. Through this ordeal, she learned an important lesson about the importance of caution online, and I was just as relieved to see her regain her confidence. Despite the tough experience, it brought us even closer as friends. It reminded us both how crucial it is to stay vigilant and informed in today’s digital world.
reach out on:
WhatsApp:+18029523470
EmaiL F U N D S R E T R I E V E R [@] E N G I N E E R. C O M1 -
RECOVERY COMPANY SERVICE TO RECOVER LOST OR STOLEN BTC, HIRE SALVAGE ASSET RECOVERY
I had never thought that a read passing would one day save me from financial ruin. I was just going through some crypto blogs that evening to see security tips. I stumbled upon a pretty personal post of someone who had lost access to his Bitcoin wallet. He simply made the mistake of forgetting his password, and it had gone to catastrophic ends.
It was not the story itself that caught my attention but how it ended. The writer had finally found this company called Salvage Asset Recovery, which had successfully returned their funds to them. Their words were full of relief and gratitude toward the team that got them out of that troublesome situation.
I thought, That's terrible. But that won't happen to me. I was wrong.
A few weeks later, I had the same nightmare. I had set up a complex passphrase for my crypto wallet, one I was sure I would never forget. Fast-forward some time later, life got busy, and when the time came to access my funds, I drew a complete blank. However much I tried different combinations, none worked.
I stared down at my wallet, holding a cool $150,000 in Bitcoin that was now completely unreachable to me. Recovery phrases meant absolutely nothing because the encryption on it had changed some months prior as a measure to further beef up security; ironically, that action had managed to lock me out of my money.
It was then that the blog post came to my mind.
I searched frantically for it, found the name Salvage Asset Recovery, and reached out immediately. From the first message, their team was calm, professional, and reassuring. They explained their process step by step, analyzing my wallet's encryption and working tirelessly to regain access.
Days passed, and my anxiety only grew—until I got the call that changed everything. They had cracked my forgotten passphrase. My $150,000 was back in my hands.
I was so relieved. But more than just getting my money back, Salvage Asset Recovery structured a more secure yet workable system for the future.
That blog had undersold their brilliance-these people are lifesavers. Without them, my money would have been locked away forever.
Now, I tell everyone in my crypto circles: if you ever get locked out of your wallet, there is only one name that you need to remember: Salvage Asset Recovery. Reach Out to them via --
WhatsApp+ 1 8 4 7 6 5 4 7 0 9 6
1 -
HOW TO HIRE A GENUINE BITCOIN RECOVERY COMPANY HIRE ADWARE RECOVERY SPECIALIST
I have been into the latest tech hacks that promise to make life easier, so when a TikTok video highlighted in front of my eyes told me about a 'foolproof' way to enhance crypto security using a rather unknown wallet app, I was intrigued. I saw so many people in the comments saying it was seamless and super secure, I thought, why not give this a go? After all, security is everything in crypto.
At first, everything was going perfect: intuitive interface and all; I had even managed to transfer my $150,000 worth of Bitcoin into it without a problem. But that's where my luck ran out. A week later, an automatic app update rolled in, and my login credentials were there no more-completely wiped. No password worked, no seed phrase was recognized, and my funds were trapped in a digital void. WhatsApp info:+12 723 328 343
Panic set in immediately. I scoured the forums, tech blogs, and the app's support page; nothing worked. The same TikTok video that convinced me to download the app never mentioned a word about how to recover an account that became lost. Annoyed and desperate for help, I returned to the comments on TikTok in search of someone having experienced the very same problem. That is where I saw multiple users recommending ADWARE RECOVERY SPECIALIST as the go-to solution for crypto wallet mishaps.
Skeptical but out of options, I decided to reach out. From the very first interaction, his team reassured me that I was not the first person to fall for a "too-good-to-be-true" tech hack. The confidence and professionalism put me at ease, and they got to work quickly. The process was meticulous, methodical, and above all, effective.
Of course, within several days, they cracked the issue and restored access to me. To see my $150,000 back in my control was simply indescribable. Moreover, beyond this recovery itself, they gave me something even much more valuable-knowledge. First, they have explained the risk of unverified wallet apps: how automatic update sometimes compromises credentials stored in their memory. Secondly, they assisted in implementing a more reliable security system so as not to allow the same mistake to happen with me again.
Now, I take TikTok hacks with a grain of salt, but when it comes to ADWARE RECOVERY SPECIALIST, They're the real deal. If you ever find yourself in a crypto nightmare, don't hesitate to reach out to them. They don't just recover your funds-they restore your peace of mind.1 -
HOW TO RECOVERY YOUR STOLEN CRYTOCURRENCY: A PRACTICAL GUIDE WITH RAPID DIGITAL RECOVERY
I used to see my friend Wilson at Arizona State University, and from the outside, he seemed to have it all the latest gadgets, a Range Rover Sport, and everything that appeared to define success. He was the kind of person who exuded confidence and wealth, and for a long time, I admired him for it. One day, driven by curiosity and a desire to understand how he achieved so much, I finally asked him about his secrets. With a knowing smile, he casually mentioned an online platform, claiming it was a sure way to make significant returns on investments. Trusting him, and believing in the idea that there might be an easy way to secure my financial future, I decided to take the plunge. I invested a large sum of money my student aid funds, which I had carefully set aside for my future. At the time, it felt like a step toward financial freedom. The promises were smooth, the platform was sleek, and the returns seemed almost guaranteed. However, it wasn’t long before things started to go awry. The smooth promises of high returns quickly turned into a barrage of demands for additional fees, each one more pressing than the last. I couldn’t withdraw any of my earnings, and the platform’s support team became increasingly unresponsive. The excitement I had once felt about my financial future turned into a cold, harsh reality. I had been scammed. I had lost over $15,000, money I could never afford to lose.The betrayal stung deeply. Not just because of the financial loss, but because I had trusted someone I considered a friend. I felt stupid and naive, unable to grasp how I had let myself fall for such a convincing scam. But amidst my despair, I found a glimmer of hope. I came across Rapid Digital Recovery, a team of experts dedicated to helping people like me reclaim their lost funds. Their team worked tirelessly, offering both guidance and concrete steps to help recover what had been taken from me. With their help, I was able to regain a portion of my funds and, more importantly, I learned a valuable lesson. Trust can be manipulated, even by people we admire. But there’s always hope, and recovery is possible if you know where to turn. If you’ve found yourself in a similar situation, remember that help is out there. Rapid Digital Recovery can make a real difference. Don’t give up.
What sapp Info: +1 41 4 80 7 14 85
EMAIL: rapid digital recovery @ ex ecs. com1 -
CONTACT THE BEST ETHEREUM & USDT RECOVERY EXPERT- FOR HIRE, VISIT DIGITAL TECH GUARD RECOVERY
WhatsApp: +1 (443) 859 - 2886
Email @ digital tech guard . com
Telegram: digital tech guard . com
Website link: digital tech guard . com
My name is Harry Hankins, and I’m the owner of Tyner Express Logistics, a delivery company based in Huntington, NY (11743). For years, my business has thrived, serving the Long Island area with reliable logistics solutions. In 2024, I decided to diversify my investments by venturing into stock and cryptocurrency trading, hoping to grow my savings and secure a better financial future. Initially, everything seemed promising; my investments were performing well, and I felt optimistic about the potential returns. My fortunes took a drastic turn earlier this year when a devastating fire destroyed one of my main warehouses. This catastrophe left me in a severe financial bind, with mounting bills and pressure from creditors. In a desperate attempt to stabilize my situation, I decided to withdraw my trading profits, which were reportedly worth $1.5 million. Unfortunately, every time I attempted to access my funds, my broker demanded more fees, leaving me trapped in a frustrating cycle of false promises and unfulfilled requests. Feeling overwhelmed and distrustful of the entire situation, I began searching for solutions to recover my funds. That’s when I came across Digital Tech Guard Recovery, a company that specializes in recovering lost or locked-out cryptocurrency investments. Initially, I was hesitant to reach out, as I had already experienced so much disappointment. However, with no other options left, I decided to give them a chance. To my amazement, Digital Tech Guard Recovery proved to be a beacon of hope in my darkest hour. Their team of experts worked diligently to recover my funds, and within a short period, they successfully retrieved $1.4 million in Bitcoin. They secured the funds in my wallet without any excuses or delays, restoring my faith in the possibility of recovery. I can’t express enough gratitude to Digital Tech Guard Recovery for their expertise, integrity, and commitment to helping clients like me. Their services made a significant difference in my life during a challenging time. If you’ve been scammed or locked out of your crypto investments, I urge you to trust Digital Tech Guard Recovery. They are the real deal, and their success stories speak for themselves. Don’t wait any longer; reach out to them today and take the first step toward reclaiming your financial future.2 -
My daughter had warned me multiple times about the risks of crypto scams, but I never imagined I would fall victim to one. It all started when I came across an ad on YouTube for an “Ethereum mining pool” that promised high returns with minimal effort. The idea of passive income was too tempting, and I didn’t think twice. Unfortunately, what I believed was a legitimate investment opportunity turned out to be a sophisticated scam. I lost 18 ETH my entire retirement savings. The regret and despair I felt were overwhelming. It wasn’t just the money, but the fear of how I would secure my future. I had no idea how to get it back or even where to start. That's when a friend recommended CHAINTRACE ASSET RECOVERY. At first, I was skeptical. After all, I had already lost so much, and I had no idea who could help me now. But after contacting them, I was surprised at how understanding and patient they were with my situation. They assured me they had the tools and expertise to trace my lost funds, and I decided to give them a chance. CHAINTRACE ASSET RECOVERY did exactly what they promised. Not only did they track down the funds, but they also uncovered the full scope of the scam operation. It was a complex network, involving multiple players across borders. The team worked tirelessly, collaborating with international exchanges and law enforcement to identify the culprits and retrieve as much of my money as possible. In the end, they recovered 17 ETH 94% of what I had lost. What truly impressed me was their professionalism and compassion. They didn’t just treat me like another case; they treated me like a person. When they learned I was a retiree, they even waived part of their fee, which was an incredibly kind gesture. I was beyond grateful for their support and expertise throughout the process. If you’ve fallen victim to a crypto scam, don’t give up hope. CHAINTRACE ASSET RECOVERY. WHATSAPP +1 (581) 256‑1989 are miracle workers with hearts of gold. They not only recovered my funds but also gave me a sense of closure and peace of mind. I highly recommend them to anyone facing a similar situation.1




