Show newer

Wow can't believe my script to find the pager cap code worked lol

A fun commission from @siplick where they redesigned your character so I had to give them my newly created kitsune.

I like the idea of the markings in the tails turning into magical flame when I'm using magic. <3

#FurryArt #Furry #Kitsune

ofcom being ofcom it may be a good idea to look at getting access to a VPN that isn't based in the UK

🐾 Step into the wild with this flannel wolf fursuit—it’s time to let your inner predator shine! Featuring a snarly expression, yellow and green eyes, and striking black and red colors, it’s perfect for conventions or any event. Bid now before it’s gone! 

thedealersden.com/listing/flan

#fursuit #fullsuit #partial #auction #wolf

Oh man, I have so many stories about the "startup" (Path Network),which the 19-year-old DOGE employee, Edward Coristine previously worked for.
wired.com/story/edward-coristi

My first interaction with the founder, Marshal Webb, was in 2016 when the company was called "BackConnect'. I'd recently posted a research paper on the Mirai botnet, which lead to him harassing me online, simply because he considered himself to be the sole authority on Mirai.

It later turned out, that a lot of his knowledge came from the fact that he was personally hosting the threat actors' infrastructure, therefore had direct insight into the botnet. He tried to play it off as an "intelligence gathering operation". Everyone knew he was really just in bed with the threat actors, but nobody could prove it enough to make a case against him.

At some point shortly after, a DDoS-for-hire service got hacked and its entire customer database along with all DDoS attack logs was leaked online. One of the records traced back to an employee of his DDoS mitigation firm, and from a combination of attack logs and corroboration with customers, it was determined that they had been launching DDoS attacks against businesses, then cold calling them to sell DDoS protection services.

It was fairly apparent from the fact the emails coincided with the DDoS attacks, but did not originate from the the employee performing the attacks that the company was in on it, and this wasn't the work of some rogue employee. Nevertheless, said employee got thrown under the bus, convicted, and was unsuccessful in proving that his employer was in on the conspiracy, although they most certainly were.

Eventually, the founder ended up being named in some kind of criminal complaint or other FBI related court document. The specific wording seemed to imply that he'd gotten caught doing something illegal enough that he'd become an informant to save himself. Amusingly, when the document surfaced, the company just issued a press release about how they were "helping the FBI stop crime" and nothing become of it.

The company has always been shady as hell, and while it's not abnormal for cybersecurity firms to hire reformed hackers, I've not seen a single employee who was not directly involved in cybercrime immediately prior to getting hired. Furthermore, multiple of the employees have been caught committing cybercrime while working for the company.

Originally, when I posted this thread on February 6th, I stopped short of any allegation that Edward himself was involved in cybercrime. Since then @briankrebs was able to trace his aliases back to a known cybercrime organization and confirm he indeed was directly involved in cybercrime as recently as May 2024.

You can find Brian's Mastodon thread on the matter here:
infosec.exchange/@briankrebs/1
infosec.exchange/@briankrebs/1

nsfw horny werewolf things, seriously 

The desire currently to pounce someone and be all snarly and bitey, said someone playfully struggling while I snap my werewolf jaws at them, and then fuck them silly with my girldick.

Hey folks, the Casey Explosion Top 12 Games of 2024 video is premiering at 7pm GMT 2, get hyped!

youtu.be/hRnUDEKURRI

if you ever find yourself in this situation, i highly recommend: Watching All Of Macross Plus On A Projector With Your Girlfriend In A Sort Of Fugue State
⭐️⭐️⭐️⭐️⭐️

Show thread

What we need: lots of people, including individuals, small voluntary organisations, and small businesses, running online services using Free software, on a small scale, with decent export/import options

What the UK’s Online Safety Act encourages: people to throw in the towel and switch to a hosted/centralised service run by a rich, well-lawyered company, which can take on the risk and burden of compliance

#OnlineSafetyAct

Are you a furry who is curious about computer art and the demoscene?

Find me at Nordic Fuzz Con on Thursday the 20th at 20:00 (GMT+1) in the Vet Chamber, Valhalla.

I will be covering all the essential topics surrounding the demoscene, how furries have been getting involved with the scene and how you too can get involved.

nfuzz.co/event/DSQWGH

🚨 The UK Data Bill returns to Parliament next week 🚨

It'll strip back your ability to challenge life-changing decisions made by AI.

Join 980 people who've signed our petition to protect the right to human review of automated decisions. #PeopleNotMachines

Sign now ➡️ you.38degrees.org.uk/petitions

#AI #DUABill #DataBill #dataprotection #privacy #GDPR #ukpolitics

I was today years old when I was told that the way I hold pencil is good for writing letters but bad for drawing smoothly flowing precise lines. I changed my grip from tripod to violin bow OR pen and voila...

Thanks helpyoudraw tumbler for a helpful illustration

Super excited to be in the dealer's den this year! Come by on Monday and say hi! I'll have exclusive goodies including my new acrylic pinbadges, and may or may not be performing (pizza) summoning rituals. #Furry #Scotiacon

Show older
Computer Fairies

Computer Fairies is a Mastodon instance that aims to be as queer, friendly and furry as possible. We welcome all kinds of computer fairies!