I’m fiddling around in XNA instead of making progress on the beta update because I’m a big dumb
have some chill algorithmic beats
I’m fiddling around in XNA instead of making progress on the beta update because I’m a big dumb
have some chill algorithmic beats
In 2020, Robert Kuciemba, a woodworker in San Francisco was infected with covid by a co-worker after his Nevada-based Victory Woodworks transferred a number of sick workers to the San Francisco site for a few months.
Through the proceedings of the case it turns out that the employer knew some employees might be sick but they transferred them anyway and ignored a San Francisco ordinance in place at the time to quarantine suspected covid cases.
Kuciemba was subsequently infected and he then infected his wife, who ended up in ICU on a ventilator.
The California Supreme Court just ruled against Kuciemba on the basis that a victory, while, in the court's words, "morally" the right thing to do, would create "dire financial consequences for employers" and cause a "dramatic expansion of liability" to stop the spread of covid.
There’s a few stunning details to note in this case. First, the court agreed that there is no doubt the company had ignored the San Francisco health ordinance. In other words, they accepted the company had broken the law. And then concluded “yeah, but, capitalism.”
Secondly, the case was so obviously important to the struggle between capitalism and mass infection that the US Chamber of Commerce, the largest business lobbying organisation got involved and helped the company with its defence. Remember, this is a tiny company in a niche industry. The involvement of the biggest business lobbyists in the country tells us a lot about the importance of the principle they knew was at stake.
Thirdly, the defence of the company is very telling. They said “There is simply no limit to how wide the net will be cast: the wife who claims her husband caught COVID-19 from the supermarket checker, the husband who claims his wife caught it while visiting an elder care home."
Well, exactly. Capitalism couldn’t survive if employers were liable for covid infections contracted in the workplace, and the ripple effect of those infections. And they know it.
This case is something of a covid smoking gun, revealing what we always suspected but had never seen confirmed in so many words: the public health imperative of controlling a pandemic virus by making employers liable for some of that control is, and always must be, secondary to capitalist profit.
This ruling is also saying out loud what has been obvious to anyone paying attention for the last two years: employers don’t have a responsibility to keep your family safe from covid. You have that responsibility. And if you give a family member covid that you caught at work and they get sick or die – even if it was a result of law-breaking by your employer – that’s on you buddy.
It is the same old capitalist story: the shunting of responsibility for ills that should be shared across society, including employers in that society, onto individuals.
This ruling essentially helps codify workplace mass infection and justifies it as necessary for the smooth functioning of capitalism.
This is not new. This is where the ‘just a cold’ and the ‘mild' narrative came from. It came from doctors and healthcare experts whose first loyalty was to capitalism. Not to public health. To money, not to lives. Abetted by media who uncritically platformed them.
While this ruling tells us little that we couldn’t already see from the public policy approach of the last two years, it is revealing (and to some extent validating) to see it confirmed by the highest law of the land in the United States.
On May 3rd, Google released 8 new top-level domains (TLDs) -- these are new values like .com, .org, .biz, domain names. These new TLDs were made available for public registration via any domain registrar on May 10th.
Usually, this should be a cool info, move on with your life and largely ignore it moment.
Except a couple of these new domain names are common file type extensions: ".zip" and ".mov".
This means typing out a file name could resolve into a link that takes you to one of these new URLs, whether it's in an email, on your tumblr blog post, a tweet, or in file explorer on your desktop.
What was previously plain text could now resolve as link and go to a malicious website where people are expecting to go to a file and therefore download malware without realizing it.
Folk monitoring these new domain registrations are already seeing some clearly malicious actors registering and setting this up. Some are squatting the domain names trying to point out what a bad idea this was. Some already trying to steal your login in credentials and personal info.
This is what we're seeing only 12 days into the domains being available. Only 5 days being publicly available.
What can you do? For now, be very careful where you type in .zip or .mov, watch what website URLs you're on, don't enable automatic downloads, be very careful when visiting any site on these new domains, and do not type in file names without spaces or other interrupters.
I'm seeing security officers for companies talking about wholesale blocking .zip and .mov domains from within the company's internet, and that's probably wise.
Be cautious out there.
A malicious actor sets up a page with an auto-downloader squatting on a domain name that matches a common zip file name like photos DOT zip. This website is set up to start an auto downloader upon being visited, downloading a zip file with the same name as the URL which contains malicious software (virus, worm, keylogger, etc).
Scenario.
Someone you know well sends you an email or text with promised photos attached. The email even reads something like this.
Because .zip is now a TLD, that plain text is automatically formatted into a link to malicious actor's website without them having to send you anything.
Folk with family with iPhones or iPads that are sent multiple photos in one go might be familiar with iCloud's tendency to automatically compile them into zip file for the sender and less savvy tech users have trouble NOT doing that.
These same less savvy users, or even just someone just not thinking in the moment, will click that .zip link, not realizing it isn't the the same as clicking on the promised attachment.
They download a file that matches the name they expected. They open it because they were expecting that file and it's from a trusted source. Except the file they downloaded isn't the one that was sent by their trusted source and now they have malware.
Another Scenario.
An IT person tries to send you an email with instructions on how to resolve a problem with a commonly used filename like install-repair DOT zip or to install new software like microsoft-office DOT zip.
The email may start with instructions of where to go get the legitimate file to do the install or repair, but now a line later in the instructions is also has a link to a .zip URL. A user, already frazzled by IT problems, may click it to ensure they have the right file. Again, they download malicious code from a squatting website or it prompts them with a fake login and now the squatting website has stolen their login credentials for a legitimate site. All due to an expected email from a trusted source.
Above you can see microsoft-office DOT zip is already out there with a fake Microsoft login screen waiting to steal your credentials.
These risks are already out there now because the TLD has been activated.
Plain text on old post are already being resolved into links to the new websites.
Here you can see a tweet from 2021, long before .zip was a domain name, now resolves that plan text into a clickable link. You'll start seeing this everywhere, and malicious actors do not have to lift a finger to send it to you.
Yes, a lot of users aren't going to click that, but a lot of folk will. Whomever is squatting on photos DOT zip domain name has made a one time payment to have access to anyone that ever sees that file name typed out.
In an example of an existing squatter site, clientdocs DOT zip is exactly one such pre-setup .zip domain name that initiates an automatic download. This one may be harmless, but the set ups are already out there and waiting to catch folk.
It's an unnecessary and risky can of worms that's been opened up.
Holy Unforced Errors, Batman.
is to add
||zip^
||mov^
to your My Filters tab in Ublock Origin. reblog to save a life
This series is my pride and joy. Would anyone be interested in a little book of these fairies plus the sketches of the fairies that never came to be? There’s a handful.
I’ve already made calendars of them and have prints so IDK if that’s too much weapon fairy stuff haha
Encounter: the Flower Fairies are done putting up with monoculture golf course lawn culture