Okay, so Kim Dotcom made a post online saying he has information about Palantir being compromised.
I am extremely skeptical of these claims.
My initial post escaped my core audience (as is tradition) so I am going to be a little more verbose and explain stuff.
Compromising a large institution such as Palantir is not something some random guy down the street can do. Palantir is large and has many moving parts. In other words, Palantir does not store all of it's information on one computer and in a crusty old hard drive somewhere.
Palantir (presumably) has data segregated meaning not all data is one place. Different types of data is going to be stored in different locations (in the cloud, or physically on-premise). Hence, a compromise of Palantir which would unveil ALL DATA would require two things:
- Extreme skill
- Extreme patience
This sort of compromise is not something that happens in a day. This sort of compromise is something which would take weeks, months, or maybe even years depending on the objective. Historically, when large compromises toward large institutions occur it is almost exclusively performed by state-sponsored Threat Groups (hackers funded by governments), or in some more rare scenarios, financially motivated Threat Actors (ransomware, extortionists).
If Palantir was compromised, it would be EXTREMELY unusual for a state-sponsored group or financially motivated group to make it exclusive to one individual person. Rarely do state-sponsored Threat Groups notify influencers, or journalists, ... or anyone really of their objectives. They're funded by governments. Governments do not care about clout. IF a state-sponsored group does notify someone, they typically do mass e-mails to journalists (for misinformation, disinformation, or fearmongering, some sort of strategic objective, they don't do it to look cool).
If it was performed by a financially motivated Threat Group they will almost immediately discuss it online in their domain of choice. For example, many Threat Actors who compromise places may sell access on forums such as Exploit, TierOne, or Breached (or whatever is adjacent to Breached). Alternatively, ransomware groups post about it on their personal website to try to extort or intimidate victims. However, no discussion of Palantir has appeared in any of these places.
Okay... so no signs from financially motivated Threat Actors... and it would be really unusual for a state-sponsored Threat Actor to make it exclusive to one person... is there anything else weird about this? Yes.
If Palantir was compromised it would be unusual for ANY group of Threat Actors to notify anyone immediately after a compromise. By notifying Kim Dotcom, or whoever, they're sounding the metaphorical alarm. Palantir is going to immediately order a DFIR (Digital Forensics and Incident Response) and begin an internal audit. Things are going to be locked down. If someone compromised Palantir why would they burn access so quickly? Why would they notify someone so quickly? They're leaving an audit trail.
There is a lot of speculation, little evidence, and things not really making a whole lot of sense.
Is it possible Kim Dotcom is telling the truth? Yes.
Is it likely? No.
Is it possible Kim Dotcom THINKS it's real, but it's NOT real? Yes, that is more likely to be true. It would not surprise me if he is (intentionally, or unintentionally) participating in a misinformation campaign.
Pic unrelated
I am extremely skeptical of these claims.
My initial post escaped my core audience (as is tradition) so I am going to be a little more verbose and explain stuff.
Compromising a large institution such as Palantir is not something some random guy down the street can do. Palantir is large and has many moving parts. In other words, Palantir does not store all of it's information on one computer and in a crusty old hard drive somewhere.
Palantir (presumably) has data segregated meaning not all data is one place. Different types of data is going to be stored in different locations (in the cloud, or physically on-premise). Hence, a compromise of Palantir which would unveil ALL DATA would require two things:
- Extreme skill
- Extreme patience
This sort of compromise is not something that happens in a day. This sort of compromise is something which would take weeks, months, or maybe even years depending on the objective. Historically, when large compromises toward large institutions occur it is almost exclusively performed by state-sponsored Threat Groups (hackers funded by governments), or in some more rare scenarios, financially motivated Threat Actors (ransomware, extortionists).
If Palantir was compromised, it would be EXTREMELY unusual for a state-sponsored group or financially motivated group to make it exclusive to one individual person. Rarely do state-sponsored Threat Groups notify influencers, or journalists, ... or anyone really of their objectives. They're funded by governments. Governments do not care about clout. IF a state-sponsored group does notify someone, they typically do mass e-mails to journalists (for misinformation, disinformation, or fearmongering, some sort of strategic objective, they don't do it to look cool).
If it was performed by a financially motivated Threat Group they will almost immediately discuss it online in their domain of choice. For example, many Threat Actors who compromise places may sell access on forums such as Exploit, TierOne, or Breached (or whatever is adjacent to Breached). Alternatively, ransomware groups post about it on their personal website to try to extort or intimidate victims. However, no discussion of Palantir has appeared in any of these places.
Okay... so no signs from financially motivated Threat Actors... and it would be really unusual for a state-sponsored Threat Actor to make it exclusive to one person... is there anything else weird about this? Yes.
If Palantir was compromised it would be unusual for ANY group of Threat Actors to notify anyone immediately after a compromise. By notifying Kim Dotcom, or whoever, they're sounding the metaphorical alarm. Palantir is going to immediately order a DFIR (Digital Forensics and Incident Response) and begin an internal audit. Things are going to be locked down. If someone compromised Palantir why would they burn access so quickly? Why would they notify someone so quickly? They're leaving an audit trail.
There is a lot of speculation, little evidence, and things not really making a whole lot of sense.
Is it possible Kim Dotcom is telling the truth? Yes.
Is it likely? No.
Is it possible Kim Dotcom THINKS it's real, but it's NOT real? Yes, that is more likely to be true. It would not surprise me if he is (intentionally, or unintentionally) participating in a misinformation campaign.
Pic unrelated
π62π₯°9π€8β€5π―4π₯1
vx-underground
Okay, so Kim Dotcom made a post online saying he has information about Palantir being compromised. I am extremely skeptical of these claims. My initial post escaped my core audience (as is tradition) so I am going to be a little more verbose and explainβ¦
tl;dr big if true
π₯°49π16π«‘7π2β€1
Before my son was born my wife and I read all these books and stuff on babies. We also took these fancy classes.
Literally none of them told us the baby would try to headbutt.
THEIR HEADS HURT. THEY HEADBUTT YOUR FACE
Literally none of them told us the baby would try to headbutt.
THEIR HEADS HURT. THEY HEADBUTT YOUR FACE
π₯°86π31β€12π€―7β€βπ₯4π―2π1π₯1
Meanwhile on X, I volunteered to run TorGuard VPNs social media. They're a big donor to vx-underground.
In one day I got in trouble. I made a joke we're laying off the engineering department and apparently it's not cool to joke about laying people off
In one day I got in trouble. I made a joke we're laying off the engineering department and apparently it's not cool to joke about laying people off
π174β€29π€£20π’10π€―7π5π₯°2β€βπ₯1π±1
> be me
> long day at long day factory
> decide to relax
> open x
> it's the everything app
> click "For You"
> first post
> trans person crying
> say they're burden on family
> say they're being kicked out
> point camera at three bottles of pills
> open all bottles
> take all pills at once
> record their suicide
> x, the everything app
> long day at long day factory
> decide to relax
> open x
> it's the everything app
> click "For You"
> first post
> trans person crying
> say they're burden on family
> say they're being kicked out
> point camera at three bottles of pills
> open all bottles
> take all pills at once
> record their suicide
> x, the everything app
π’172π34π€£31π±10π€―8β€6π6π₯°4π―2π2π€1
I'm currently:
- writing over 500,000,000 lines of code a day
- running 400 different agents
- building 9 different apps
My wife and her boyfriend are so proud of me. What's your excuse?
- writing over 500,000,000 lines of code a day
- running 400 different agents
- building 9 different apps
My wife and her boyfriend are so proud of me. What's your excuse?
π€£195π₯°19π€15π«‘8π5β€3π±1π1
When people ask what I do for a living I have no idea how to explain to them I collect, develop, and reverse engineer malware.
I usually say, "I do stuff with computers".
Then I immediately change the conversation and hide.
I usually say, "I do stuff with computers".
Then I immediately change the conversation and hide.
π€70π₯°24β€8π€£5π3π2
Was surfing the internet and found some kid who is sharing his malware proof-of-concepts online. His work is primarily recycling and recreating existing techniques for him to study or to demonstrate the ideas to others.
Is his code good? No, God no. It is littered with errors, poor naming conventions, and extremely dangerous control flow. I love it him for this, unironically.
This kid having bad code shows he isn't using AI to work. He is legit. He is putting himself out there, demonstrating what he can do (or can't do), and showing he isn't afraid to get criticized.
I love seeing people grind and put in the work. It's the pain that makes you good. Taking shortcuts doesn't achieve anything.
I don't know if it he is on social media stuff, but you're doing good stuff, "CaptMag". Keep putting in work. You'll go far. I see you, gang.
Is his code good? No, God no. It is littered with errors, poor naming conventions, and extremely dangerous control flow. I love it him for this, unironically.
This kid having bad code shows he isn't using AI to work. He is legit. He is putting himself out there, demonstrating what he can do (or can't do), and showing he isn't afraid to get criticized.
I love seeing people grind and put in the work. It's the pain that makes you good. Taking shortcuts doesn't achieve anything.
I don't know if it he is on social media stuff, but you're doing good stuff, "CaptMag". Keep putting in work. You'll go far. I see you, gang.
β€140π₯°9π6β€βπ₯3π3π1π―1π«‘1
vx-underground
Was surfing the internet and found some kid who is sharing his malware proof-of-concepts online. His work is primarily recycling and recreating existing techniques for him to study or to demonstrate the ideas to others. Is his code good? No, God no. It isβ¦
I'm sorry, CaptMag, I love you, dawg, but I audibly laughed when you initialized your unsigned integers (DWORD) to NULL.
If you want to get really technical, NULL on Windows is defined as zero, so it ... sort of ... makes sense, you are technically setting your unsigned integers to zero, but NULL is supposed to indicate an invalid pointer.
I have no idea how your IDE hasn't been screaming at you about this.
If you want to get really technical, NULL on Windows is defined as zero, so it ... sort of ... makes sense, you are technically setting your unsigned integers to zero, but NULL is supposed to indicate an invalid pointer.
I have no idea how your IDE hasn't been screaming at you about this.
β€67π€£26π±7π6π₯°4β€βπ₯3π€©1