
Hello! You can call me Ryn. I don't really post a whole lot, but I reblog things sometimes. This will likely turn into a clusterfuck like all my other social media. My profile picture was drawn by my good friend Maddie! @electriclord
1065 posts
These Bots Aren't Even Being Subtle Anymore.

These bots aren't even being subtle anymore.
More Posts from Captainlavellan
Oh I am so trying this.

Want to collaborate on a Google Doc with Nietzsche, Shakespeare, Dostoyevsky, Dickinson, Dickens and Poe?
Click here. Start typing. Enjoy the hilarity.
Ninja Update: Wanna see something fun? Mention Shakespeare in a sentence and see what happens.
on your post about L, Watari and sleep where are the manga caps from? were those from an adaptation of the canon manga at some point?
They are from the L: One Day chapter of the L: File No. 15 special book that was released with L: Change the WorLd in Japan. The second and only other chapter is L: The Wammy’s House which features a young L just arriving at Wammy’s. Both are from Watari’s point of view and are considered 100% cannon as they are written and drawn by the original Death Note creators.
Here is an english scanlation of L: One Day.
And here is an english scanlation of L: The Wammy’s House for good measure.
This is so amazing I just... xD Bless you /pol/.
Shia LaBeouf’s #HeWillNotDivideUs livestream is up and running again, in a new unknown location.
/pol/ is already at work trying to find it again.




Good hunting, gentlemen.

The claim that Russia “hacked the election” has essentially been totally discredited
From the latest dump by wikileaks
“UMBRAGE The CIA’s hand crafted hacking techniques pose a problem for the agency. Each technique it has created forms a “fingerprint” that can be used by forensic investigators to attribute multiple different attacks to the same entity.
This is analogous to finding the same distinctive knife wound on multiple separate murder victims. The unique wounding style creates suspicion that a single murderer is responsible. As soon one murder in the set is solved then the other murders also find likely attribution.
The CIA’s Remote Devices Branch’s UMBRAGE group collects and maintains a substantial library of attack techniques ‘stolen’ from malware produced in other states including the Russian Federation.
With UMBRAGE and related projects the CIA cannot only increase its total number of attack types but also misdirect attribution by leaving behind the “fingerprints” of the groups that the attack techniques were stolen from.
UMBRAGE components cover keyloggers, password collection, webcam capture, data destruction, persistence, privilege escalation, stealth, anti-virus (PSP) avoidance and survey techniques.”
