Yaybahar III Nadiri [music]

Jan. 6th, 2026 07:27 pm
siderea: (Default)
[personal profile] siderea
2026 Jan 6: Görkem Şen (Yaybahar on YT): Yaybahar III Nadiri



The description text:
The essence of gold was rare, he conquered with his virtue, offered his gifts and fell behind the sun...

Dedicated to the soul of my dear friend's father, Nadir Oğuz...
I am surmising that "Nadiri" means "Of Nadir". Yaybahar is the instrument, the artist is its inventor:
The name yaybahar (pronounced /jajba'har/) has Turkish origin. It is a composite of two words: yay means a "string" or a "coiled string" and bahar means the season "spring." According to Gorkem Sen, the name is derived from the idea of a new life or a new beginning. [1]
I assume this is the third one of its kind the artist has made.

Artist's website: https://www.gorkemsen.com/

6,000 curl stickers

Jan. 6th, 2026 10:25 pm
[syndicated profile] daniel_haxx_feed

Posted by Daniel Stenberg

I am heading to FOSDEM again at the end of January. I go there every year and I have learned that there is a really sticker-happy audience there. The last few times I have been there, I have given away several thousands of curl stickers.

As I realized I did not actually have a few thousand stickers left, I had to restock. I consider stickers a fun and somewhat easy way to market the curl project. It helps us getting known and seen out there in the world.

The stickers are paid for by curl donations. Thanks to all of you who have donated!

This time I ordered the stickers from stickerapp.se. They have a rather fancy web UI editor and tools to make sure the stickers become exactly the way I want them. I believe the total order price was actually slightly cheaper than the previous provider I used.

I ordered five classic curl sticker designs and I introduced a new one. Here is the full set:

Die cut curl logo 7.5cm x 2.8cm – the classic “small” curl logo sticker. (bottom left in the photo)

Die cut curl logo 10cm x 3.7cm – the slightly larger curl logo sticker. (top row in the photo)

Rounded rectangle 7.5cm x 4.1cmyes we curl, the curl symbol and my face (mid left in the photo)

Oval 7.5cm x 4cm – with the curl logo (bottom right in the photo)

Round 2.5cm x 2.5 cm – small curl symbol. (in the middle of the photo). My favorite. Perfect for the backside of a phone. Fits perfectly in the logo on the lid of a Frame Work laptop.

Round 4cm x 4cm – curl symbol in a slightly larger round version. The new sticker variant in the set. (on the right side in the middle row in the photo)

The quality and feel of the products are next to identical to previous sticker orders. They look great!

I got 1,000 copies of each variant this time.

The logo

The official curl logo, the curl symbol, the colors and everything related is freely available and anyone is welcome to print their own stickers at will: https://curl.se/logo/

How to get one?

I bring curl stickers to all events I go to. Ask me!

There is no way to buy stickers from me or from the curl project. I encourage you to look me up and ask for one or a few. At FOSDEM I try to make sure the wolfSSL stand has plenty to hand out, since it is a fixed geographical point that might be easier to find than me.

Cut Off (Saiyuki)

Jan. 6th, 2026 09:58 am
[syndicated profile] polyrecsdaily_feed
Cut Off (Saiyuki):

Cut Off, by Eleanor K. shrift: Hot. Wrong. Really hot and really wrong. So freaking hot and wrong.

DOIT: Upcoming Training

Jan. 6th, 2026 05:47 am
[syndicated profile] idighardware_feed

Posted by Lori Greene

DOIT - The Door Opening Industry Training Group has announced the return of Webinar Wednesday in 2026! Check out the upcoming sessions on fire doors, presented live next Wednesday!
[syndicated profile] maia_arson_crimew_feed

Posted by maia arson crimew

Almost two years ago now, in February 2024, a source reached out to me with data on a network of three stalkerware services: SpyX, MSafely and SpyPhone. They had found a publicly accessible reporting tool containing a comprehensive log of all purchases users of the services had made. Having been super busy with various other stories at the time, I put this aside for a few months until I started looking at the MSpy data leak.

Stalkerware operators often sign up to each others' services to scope out their competition or directly copy features, so it wasn't too surprising to find a SpyX email address in the MSpy helpdesk dump. Apparently, someone affiliated with SpyX had signed up to MSpy for two months, demanded a refund shortly after and then tried to charge back for the subscription, alleging credit card fraud. MSpy objected to the dispute and provided their payment processor with a detailed document outlining the SpyX affiliate's behavior. Contained within the document is redacted credit card details, including the name of the cardholder (Xunde Cheng) and their bank (China Construction Bank).

Who runs SpyX?

The contact pages listed on websites operated by SpyX include Hong Kong and UK business registrations—Gbyte Technology Co., Limited and UK Gbyte Technology Co., Limited respectively—with the UK registration listing Xunde Cheng as an officer. A Google search for the Chinese company name listed in the Hong Kong registration (樂數科技有限公司) brings up the corporate website of Gbyte, as well as an entry on the BOSS Zhipin (BOSS直聘) hiring platform.

The BOSS listing and the corporate website both feature some photos of the Gbyte office in the Bao'an District of Shenzhen, with the hiring platform even containing a 360° panoramic image of its inside. Both pages also give us additional background on the company's history: It was founded in 2022 with a focus on "mobile forensics" software for an overseas market, and they ambitiously aim for an IPO within 5–10 years. The company also boasts about 50% of their staff being allocated to R&D, which they conduct together with universities.

A few months after first obtaining the bit of Gbyte data, I mentioned it to a person i was working on a tangentially related story with. Within just a few hours, they came back to me having looked into Gbyte themself, and they were able to gain broader access to Gbyte's stalkerware backends. In addition to the preexisting order data, we now also had copies of all user account data and victim metadata, including plaintext passwords for the stalkerware accounts and iCloud/Google credentials for a large number of victims. None of this data was meaningfully protected by any authentication; simply knowing which API endpoints were being called was enough to get the data. Additionally, another bug granted my source full access to the stalkerware's admin dashboard.

It was finally time for my favorite magic trick: You can often find the people who run spyware in their own spyware data. After a bit of combing through what I was given, I found what seemed to be email addresses belonging to Cheng. Up to this point, I wasn't sure whether that moniker was a pseudonym, but by running his emails through an OSINT research tool I was able to build a profile of the Gbyte founder.

Xunde Cheng (程勋德), aka Joen Chen, born February 1988, lives in Shenzhen and has a bachelor's degree in computer science from Beijing Jiaotong University. Before he started Gbyte, he was already an expert in mobile reverse engineering and forensics, having pioneered much of the technology the SpyX family of stalkerware is based on while working as chief security architect at Wondershare, the company behind utility software like Filmora as well as the Spyzie family of stalkerware.

[Error: Irreparable invalid markup ('<img [...] 2019">') in entry. Owner must fix manually. Raw contents below.]

<p class="syndicationauthor">Posted by maia arson crimew</p><p class="ljsyndicationlink"><a href="https://maia.crimew.gay/posts/fuckstalkerware-8/">https://maia.crimew.gay/posts/fuckstalkerware-8/</a></p><p>Almost two years ago now, in February 2024, a source <a href="https://maia.crimew.gay/contact">reached out to me</a> with data on a network of three stalkerware services: SpyX, MSafely and SpyPhone. They had found a publicly accessible reporting tool containing a comprehensive log of all purchases users of the services had made. Having been super busy with various other stories at the time, I put this aside for a few months until I started looking at the <a href="https://maia.crimew.gay/posts/fuckstalkerware-7/">MSpy data leak</a>.</p> <p>Stalkerware operators often sign up to each others' services to scope out their competition or directly copy features, so it wasn't too surprising to find a SpyX email address in the MSpy helpdesk dump. Apparently, someone affiliated with SpyX had signed up to MSpy for two months, demanded a refund shortly after and then tried to charge back for the subscription, alleging credit card fraud. MSpy objected to the dispute and provided their payment processor with a detailed document outlining the SpyX affiliate's behavior. Contained within <a href="https://maia.crimew.gay/files/posts/fuckstalkerware-8/Chargeback.pdf">the document</a> is redacted credit card details, including the name of the cardholder (Xunde Cheng) and their bank (China Construction Bank).</p> <h2 id="who-runs-spyx%3F" tabindex="-1">Who runs SpyX?</h2> <p>The contact pages listed on websites operated by SpyX include Hong Kong and UK business registrations—<a href="https://www.ltddir.com/companies/gbyte-technology-co-limited/">Gbyte Technology Co., Limited</a> and <a href="https://find-and-update.company-information.service.gov.uk/company/15400579">UK Gbyte Technology Co., Limited</a> respectively—with the UK registration listing Xunde Cheng as an officer. A Google search for the Chinese company name listed in the Hong Kong registration (樂數科技有限公司) brings up the corporate website of Gbyte, as well as <a href="https://www.zhipin.com/gongsi/22e7c28336641c1f1XRz39q8FFQ~.html">an entry</a> on the <a href="https://en.wikipedia.org/wiki/Kanzhun_Limited">BOSS Zhipin (BOSS直聘)</a> hiring platform.</p> <p>The BOSS listing and the corporate website both feature some photos of the Gbyte office in the Bao'an District of Shenzhen, with the hiring platform even containing a 360° panoramic image of its inside. Both pages also give us additional background on the company's history: It was founded in 2022 with a focus on &quot;mobile forensics&quot; software for an overseas market, and they ambitiously aim for an IPO within 5–10 years. The company also boasts about 50% of their staff being allocated to R&amp;D, which they conduct together with universities.</p> <link rel="stylesheet" href="https://maia.crimew.gay/view360/view360.min.css" /> <script src="https://maia.crimew.gay/view360/view360.pkgd.min.js"></script> <div id="viewer" class="view360-container is-16by9"> <canvas class="view360-canvas"></canvas> </div> <script> const spinner = new View360.LoadingSpinner(); const controlBar = new View360.ControlBar(); const viewer = new View360("#viewer", { plugins: [spinner, controlBar], projection: new View360.EquirectProjection({ src: "/img/posts/fuckstalkerware-8/pano.jpg", video: false }), autoplay: { speed: -0.1 } }); </script> <p>A few months after first obtaining the bit of Gbyte data, I mentioned it to a person i was working on a tangentially related story with. Within just a few hours, they came back to me having looked into Gbyte themself, and they were able to gain broader access to Gbyte's stalkerware backends. In addition to the preexisting order data, we now also had copies of all user account data and victim metadata, including plaintext passwords for the stalkerware accounts and iCloud/Google credentials for a large number of victims. None of this data was meaningfully protected by any authentication; simply knowing which API endpoints were being called was enough to get the data. Additionally, another bug granted my source full access to the stalkerware's admin dashboard.</p> <p>It was finally time for my favorite magic trick: You can often find the people who run spyware in their own spyware data. After a bit of combing through what I was given, I found what seemed to be email addresses belonging to Cheng. Up to this point, I wasn't sure whether that moniker was a pseudonym, but by running his emails through an OSINT research tool I was able to build a profile of the Gbyte founder.</p> <p>Xunde Cheng (程勋德), aka Joen Chen, born February 1988, lives in <a class="footnotes__ref" href="https://maia.crimew.gay/posts/fuckstalkerware-8/#hongkong-note" id="hongkong-ref" aria-describedby="footnotes-label" role="doc-noteref">Shenzhen</a> and has a bachelor's degree in computer science from <a href="https://en.wikipedia.org/wiki/Beijing_Jiaotong_University">Beijing Jiaotong University</a>. Before he started Gbyte, he was already an expert in mobile reverse engineering and forensics, having pioneered much of the technology the SpyX family of stalkerware is based on while working as <a href="https://www.secrss.com/articles/12508">chief security architect at Wondershare</a>, the company behind utility software like <a href="https://en.wikipedia.org/wiki/Wondershare_Filmora">Filmora</a> as well as the <a href="https://techcrunch.com/2025/02/27/spyzie-stalkerware-spying-on-thousands-of-android-and-iphone-users/">Spyzie</a> family of <a class="footnotes__ref" href="https://maia.crimew.gay/posts/fuckstalkerware-8/#spyzie-note" id="spyzie-ref" aria-describedby="footnotes-label" role="doc-noteref">stalkerware</a>.</p> <figure> <div> <img src="https://maia.crimew.gay/img/posts/fuckstalkerware-8/xunde.jpg" alt="a photo of a man with glasses giving a talk. he is holding a microphone and standing behind a lectern which says " sdc="" 2019"="" on="" it"="" /> </div> <figcaption>Xunde Cheng gives a talk about mobile forensics at Kanxue's SDC in 2019 (Kanxue, press photo)</figcaption> </figure> <h2 id="spying-from-the-cloud" tabindex="-1">Spying from the Cloud</h2> <p>While at Wondershare, Cheng found ways to bypass the security measures of both iCloud and <a href="https://en.wikipedia.org/wiki/Google_Play_Services">GMS</a>, allowing forensics tools (including data recovery software, law enforcement tooling and stalkerware) access to cloud-synchronized device data with just a user's email and password. SpyX <a class="footnotes__ref" href="https://maia.crimew.gay/posts/fuckstalkerware-8/#patents-note" id="patents-ref" aria-describedby="footnotes-label" role="doc-noteref">makes use of these capabilities</a> to remotely spy on both iOS and Android devices.</p> <p>While a lot of stalkerware software formerly offered this feature for iOS devices, most providers are now unable to keep up with Apple's cat-and-mouse-style API updates, so support has largely been dropped. But SpyX continues to be able to crack iCloud keystores, even on accounts with two-factor authentication. On Android, they are similarly able to crack GMS backups to spy on devices remotely, a capability no other stalkerware service I'm aware of offers, though SpyX does also provide a more traditional application-bound option.</p> <p>Gbyte's trust in Google failing to enforce their various terms of service agreements is further exemplified by their stalkerware services allowing users to register via their Google accounts. This massively inflates their user counts, with roughly 60% of all users in the provided data being signed in this way. If Google were to revoke their access to the <a href="https://en.wikipedia.org/wiki/OAuth">OAuth</a> integration, SpyX would immediately—at least temporarily—lose a large part of their customer base.</p> <p>Ironically, this Google integration (for once) makes it significantly harder for me to find any users of interest in the dataset, as most people are signed up with a personal Gmail rather than their work emails.</p> <h2 id="what-does-gbyte-do%3F" tabindex="-1">What does Gbyte do?</h2> <figure> <div> <img src="https://maia.crimew.gay/img/posts/fuckstalkerware-8/gbyte_office.jpg" alt="three images from inside the Gbyte office. they show desks with computers on them and also a reception desk with their logo on the wall behind it" /> </div> <figcaption>A collage of photos taken inside Gbyte's office in Bao'an District, Shenzhen (Gbyte)</figcaption> </figure> <p>From the photos and info on Gbyte's website, it appears that at least 20 people work for the company, and from BOSS it's known that they were actively hiring for a number of positions a few months ago. At this point, the only known products of theirs are three stalkerware offerings, a vague &quot;mobile forensics&quot; tool offered for the Chinese domestic market, and a foreign-market iOS data recovery tool.</p> <p>From the data obtained so far, I was able to estimate that the SpyX family of stalkerware has netted Gbyte a total of around US$500,000 in revenue since launch. (To me, this does not appear to be enough to sustain a company of that size, especially when half its resources are allocated to R&amp;D. It's probable that they have some other venture as well.)</p> <p>It was right around when I calculated this number that my second source let me know that we had overlooked a key piece of evidence in the admin dashboard: a plaintext GitHub API key that had been available this whole time. The key provided access for what appears to be most of the source code for not just Gbyte's stalkerware and mobile forensics offerings, but also many other of their products, including:</p> <ul> <li>A GPS spoofing app with a paid subscription (ilocationchanger.com), having brought in approximately US$200 in revenue</li> <li>An MMO boosting service (igz.gg, fka igs.gg) with around 15,000 customers</li> <li>A now-defunct Elden Ring rune shop (eldenrings.com, aka eldenshop.com), which appears to use the same backend as igz.gg</li> <li>An AI copywriting and customer support tool (italks.cc), which seems to only be used internally for now</li> <li>The aforementioned three stalkerware services (spyx.com, msafely.com and spyphone.cc), which have around 1.5 million registered users in total</li> <li>The aforementioned Chinese device recovery and forensics tool (gbyte.com.cn)</li> <li>The aforementioned oversea-market device recovery tool (gbyte.com), with around 1,500 customers</li> </ul> <p>Not included is the source code for the backends used to access the iCloud and Google Cloud services, the Android spyware client and some other smaller backend web services. They all appear to be hosted on a Synology NAS at the Gbyte office; based on a port scan, I assume the missing bits of source code are hosted on an SVN server on that NAS.</p> <p>The backends we do have copies of, however, are all very similar to that of the stalkerware, meaning similar vulnerabilities are present. For most of the services mentioned above, data pertaining to orders, revenue, users and/or devices is accessible, often including email addresses, usernames, plaintext passwords, locations, real names and other sensitive information.</p> <h2 id="aftermath" tabindex="-1">Aftermath</h2> <p>Gbyte and Xunde Cheng were contacted about this story before it went live with information on all vulnerabilities found. They did not respond to the request for comment; no vulnerabilities have been patched prior to publication as a result.</p> <p>Due to <a href="https://en.wikipedia.org/wiki/Have_I_Been_Pwned%3F">Have I Been Pwned</a> misunderstanding an embargo I set in 2024, parts of the data this article is based on were already ingested into the services database in the first half of 2025 and some of the breach was covered in a TechCrunch article. A more complete and up-to-date dataset will be provided to Have I Been Pwned upon the publishing of this article and likely ingested as well. To prevent similar incidents from happening again, Have I Been Pwned will no longer receive advance copies of data going forward.</p> <p>An earlier copy of the list of compromised iCloud accounts has been provided to Apple's Targeted Hacks team, and more up-to-date lists of affected Google and Apple accounts will be provided to the respective companies <a href="https://maia.crimew.gay/contact">upon request</a>.</p> <p>The datasets of stalkerware customers/victims and MMO boosting customers will be provided to journalists and researchers <a href="https://maia.crimew.gay/contact">upon request</a> after vetting.</p><p class="ljsyndicationlink"><a href="https://maia.crimew.gay/posts/fuckstalkerware-8/">https://maia.crimew.gay/posts/fuckstalkerware-8/</a></p>
[syndicated profile] dorktower_feed

Posted by John Kovalic

Most DORK TOWER strips are now available as signed, high-quality prints, from just $25!  CLICK HERE to find out more!

HEY! Want to help keep DORK TOWER going? Then consider joining the DORK TOWER Patreon and ENLIST IN THE ARMY OF DORKNESS TODAY! (We have COOKIES!) (And SWAG!) (And GRATITUDE!)

[syndicated profile] dorktower_feed

Posted by John Kovalic

 

(This was originally a bonus strip that ran New Year’s Eve for Dork Tower Patreon backers.)

Most DORK TOWER strips are now available as signed, high-quality prints, from just $25!  CLICK HERE to find out more!

HEY! Want to help keep DORK TOWER going? Then consider joining the DORK TOWER Patreon and ENLIST IN THE ARMY OF DORKNESS TODAY! (We have COOKIES!) (And SWAG!) (And GRATITUDE!)

 

[syndicated profile] oldnewthing2_feed

Posted by Raymond Chen

Commenter Neil Rashbrook pointed out that my original rotation-based algorithm for swapping two blocks of memory inside a larger block did too much rotating. My solution had three rotations, but Neil was able to get it down to two.

The set-up is that we have a large block of memory, and you want to swap two blocks that reside inside that large block. For concreteness, let’s say that it’s A1, A2, B1, B2, C1, C2, D1, D2, D3, E1, and you want to exchange the B’s with the D’s. Neil pointed out that you can start by rotating the BCD block to move the D’s to the front, producing ADBCE; and then rotate the BC block to move the C’s to the front, producing ADCBE.

A1 A2 B1 B2 C1 C2 D1 D2 D3 E1
   
A1 A2 D1 D2 D3 B1 B2 C1 C2 E1
   
A1 A2 D1 D2 D3 C1 C2 B1 B2 E1

There is a symmetric version where you start by swapping the B’s to the end. If you choose to swap the larger block into position first, then the number of swaps is 2n − max(|B|,|D|), which is a improvement over my three-rotation version that performed 2n swaps.

(But still not as good as the n swaps that we developed later.)

The post Swapping two blocks of memory that reside inside a larger block, in constant memory, refinement appeared first on The Old New Thing.

I have returned

Jan. 6th, 2026 08:32 am
[syndicated profile] drawing_prompt_s_feed

drawing-prompt-s:

I hope everyone had a good holiday break!

I have settled in, mostly, to my new home and in a new state. Least favorite part of being a homeowner by far is when contractors and exterminators, etc., look at me and go “oh, don’t worry, the owner will pay for it!” Yeah, buddy, that’s me.

But I have gotten a rhythm on my own again, and with work. I’m like 70% unpacked. I even got back to working on the book since I finally have peace and the time to do it.

That also means we are back, baby! I will probably cut it down to one prompt a day, and then one day a week being an art response once we get rolling again. I think inevitably it is just a lot less overwhelming to go about it that way, for everyone invovled.

I will also probably make a pinned post about LYKOS at some point because I am excited and the fun part of being an admin is I can sprinkle original works over you guys. Sprinkle sprinkle, have some werewolf book.

Do not forget: This page is run off of user prompt suggestions! And art responses! So if there is something you want to see, or something you come up with then send it in! The suggestions are always open (just try not to send it as an ask, but don’t fret if you do, I can get it corrected).

Now back to our regularly scheduled prompts (starting tomorrow, Sunday).


– Prompt Prophet

CodeSOD: No Yes

Jan. 6th, 2026 06:30 am
[syndicated profile] the_daily_wtf_feed

Posted by Remy Porter

It's common to see code in the form of if (false == true). We get a fair bit of it in our inbox, and we generally don't post it often, because, well, it's usually just a sign that someone generated the code. There's a WTF in that, somewhere, but there's not much to say about the code, beyond, "Don't generate code, pass data from backend to frontend instead."

But Nicholas sends us one that shows a little more of interest in it.

if ('N' == 'Y') {
 document.getElementById("USERID").disabled=true;
 document.getElementById("PASSWORD").disabled=true;
}

Again, this is almost certainly being generated by the backend and sent to the frontend. I mean, it might be someone manually disabling a block of code by writing an if that'll never be true, but probably not in this case.

And what this tells us is that the backend is getting inputs, probaly from some sort of option field, and treating them as booleans. Y and N are clearly meant to be "yes" and "no", aka "true" and "false", but we're taking the stringly typed approach on the backend.

For future developers, I reiterate: send data to the frontend, so your 'if' looks more like: if(backendData.userSelectedOption=="Y"), or at the very least if you're going to evaluate the boolean expression, evaluate it on the backend, so the generated code is just if(false).

[Advertisement] BuildMaster allows you to create a self-service release management platform that allows different teams to manage their applications. Explore how!
[syndicated profile] gao_watchblog_feed
The Federal Aviation Administration (FAA) has been trying to hire and train more air traffic controllers, who direct and manage flights. Yet even with about 200,000 applicants over the last several years, FAA remains short staffed. Today’s WatchBlog...
[syndicated profile] dailyfrankie_feed

Hii, thanks so much :D I'm feeling similar lol. Like on one hand, yay for Frankie screen time!! On the other... I'm scared bro. Either way, I know he'll be happy again one day :3

January 2026

S M T W T F S
     123
45678910
11121314151617
18192021222324
25262728293031

i use a lot of these

omg ty for making my site look good

Expand Cut Tags

No cut tags
Page generated Jan. 7th, 2026 12:48 am
Powered by Dreamwidth Studios