You May Also Like
Ironies of Luck https://t.co/5BPWGbAxFi— Morgan Housel (@morganhousel) March 14, 2018
"Luck is the flip side of risk. They are mirrored cousins, driven by the same thing: You are one person in a 7 billion player game, and the accidental impact of other people\u2019s actions can be more consequential than your own."
I’ve always felt that the luckiest people I know had a talent for recognizing circumstances, not of their own making, that were conducive to a favorable outcome and their ability to quickly take advantage of them.
In other words, dumb luck was just that, it required no awareness on the person’s part, whereas “smart” luck involved awareness followed by action before the circumstances changed.
So, was I “lucky” to be born when I was—nothing I had any control over—and that I came of age just as huge databases and computers were advancing to the point where I could use those tools to write “What Works on Wall Street?” Absolutely.
Was I lucky to start my stock market investments near the peak of interest rates which allowed me to spend the majority of my adult life in a falling rate environment? Yup.
Hey folks, have you ever wondered why trans people face constant accusations of fetishism, sexual predation and child abuse/grooming? Well, today let's talk about stochastic terrorism.
So, first we have to talk about what stochastic terrorism actually is. Remember when there was a conspiracy that there was a pedophile ring operating out of a pizza parlour basement, and a crazed gunman showed up? It's that sort of incitement that stochastic terrorism describes.
It's the demonisation or incitement against a group of people or individuals with the intent that other, unaffiliated parties will act upon it; it's the releasing doctored footage and a shooter show up at Planned Parenthood as a direct result of what he's been led to believe.
So with that in mind, let's talk about Russia's extreme anti-LGBT laws that banned the "promotion" of LGBT lifestyles to children. A move that specifically marked LGBT people as a threat to children, and resulted in neo-nazis meting out vigilante "justice" against gay men.
Groups such as this would lure unsuspecting gay men via dating sites, and brutalise and humiliate them on camera. They did so under the guise of combating child abusers, one group calling themselves "Occupy
Since then we've started a remote web dev company @SquarecatWebDev and been lucky enough to have completed several freelance projects 💻 that have kept us on the road.
In the last few months we've become a huge part of this amazing new Maker community and have found so many new friends from @makerskitchen, @women_make_ and several others! 🥰
We love travelling together (even if I'm only a glorified laptop watcher 😒) but we're both much happier being able to share our ideas outside of our own little bubble and our products have benefitted too!
Here's to another year of nomading with my favourite person and to the Maker community continuing to grow with our help! Maybe one day we'll all get to meet each other ✌️ 💛
Taking Down an Insider Threat
"I had all of the advantages. I was already inside the network. No one suspected me. But they found my hack, kicked me off the network...
...and physically hunted me down."
Many pentests start from the outside, wanting to see how the perimeter might be breached.
This pentest started from the inside. My client wanted to assume they had already been breached, and, if breached, how far could an attacker go.
Could they stop me once I was inside?
So they snuck me in. Disguised me as a new employee. Gave me a work computer, an ID badge, an account in their system... hell, I even had a cubicle w/my assumed name on it.
The only person who knew who I really was was their CISO. Everyone else thought I was Jeremy in Marketing.
During most of the first morning, I completed onboarding, made introductions, and completed menial tasks.
But I had to act quick. I only had a week onsite. I had to hack their network while not raising suspicion.
So I set about it.
You have to understand... most "Internal Pentests" are straight forward. The hard part is breaching the network, but once you're inside, it's a target rich environment. End of Life computers, default passwords, everyone a Local Administrator...