Welcome to Friendica.Eskimo.Com
Home of Censorship Free Hosting

E-mail, Web Hosting, Linux Shell Accounts terminal or full remote desktops.
Sign Up For A Free Trial Here
Please tell your friends about federated social media site that speaks several fediverse protocols thus serving as a hub uniting them, hubzilla.eskimo.com, also check out friendica.eskimo.com, federated macroblogging social media site, mastodon.eskimo.com a federated microblogging site, and yacy.eskimo.com an uncensored federated search engine. All Free!
the art of life is not to let the doors that have slammed shut
distract us from the doors that have just opened
Lost in Translation: Will der Iran wirklich Israel auslöschen?
Iran und Israel verbindet eine tiefe Feindschaft. Doch stimmt das Narrativ der Vernichtungsdrohung? Eine Analyse zeigt: Übersetzungsfehler spielen eine wichtige Rolle.Luca Schäfer (heise online)
Sensitive content
U.S. Joins War On Iran
DEAR FRIENDS. IF YOU LIKE THIS TYPE OF CONTENT, SUPPORT SOUTHFRONT WORK :Odysee
foxnews.com/opinion/gregg-jarr…
static-assets-1.truthsocial.co…
GREGG JARRETT: Trump's deployment of National Guard is justified despite knee-jerk judicial roadblock
We're in the middle of a legal power struggle between Trump and California Gov. Newsom as judge blocks deployment of National Guard troops sent to quell anti-ICE riots in Los Angeles.Gregg Jarrett (Fox News)
Fight the Proscription of Palestine Action
crowdjustice.com/case/palestin…
Palestine Action has instructed lawyers who will fight against the Home Secretary's attempt to ban our movement.
Contribute to the legal fundraiser to help us stop the proscription.
Fight the Proscription of Palestine Action
A direct action network crowdfunding to fight proscriptionCrowdJustice
usatoday.com/story/money/food/… via @usatoday
Kraft Heinz, General Mills to remove all artificial dyes from food products
Kraft Heinz and General Mills announced Tuesday that they plan to remove artificial dyes from their food products by the end of 2027.Mary Walrath-Holdridge (USA TODAY)
the heiress of the Heinz company married John Kerry the democrat bigwig
Blog post on the topic: Broken Fediverse
battlepenguin.com/tech/the-bro…
written by @djsumdog
Good summary of the situation. Also glad that he mentioned alternatives like Nostr
The Broken Fediverse
When Elon Musk originally bought Twitter, a number of people moved over to Mastodon. There were a lot of misunderstandings around how Mastodon works....battlepenguin.com
xianc78 reshared this.
🤙🏻 from the nostrverse
Do you have a npub / nostr profile as well?
Yes
npub1hrjtmuryqz82hxzpvv5ulrcxxgrw42afax8n7d9cnnz0zrrq44tqpv3ft3
UK activists punished for destroying Israeli weapons facilities, with Huda Ammori and Max Geller
youtu.be/odphRht6aok?si=hTY4G6…
#ElectronicIntifada #PalestineAction #HudaAmmori #MaxGeller #Palestine #DirectAction #activism
UK activists punished for destroying Israeli weapons facilities, with Huda Ammori and Max Geller
We speak to to returning guests Huda Ammori and Max Geller from Palestine Action.Actionists, as members of the direct action group call themselves, deliberat...YouTube
Gary Hill likes this.
Actionists released after they shut down Shenstone's Israeli weapons factory — all in a day's work
Source: https://x.com/Pal_action/status/1862245804343230812
Gary Hill likes this.
Interview with Israeli dissidents taking action for Palestine
youtu.be/y3Ga4DiV7eM?si=u83-0r…
#PalestineAction #activism #Palestine
Interview with Israeli dissidents taking action for Palestine
To mark a year of genocide in Gaza, we publish this powerful interview with two Israeli dissidents who took part in a Palestine Action siege of the Elbit HQ....YouTube
Gary Hill likes this.
they are not really concerned about Iranian sleeper cells
it is just another fear bomb they throw into society to destabilize it, the communist pathway to power
Palestine Action keeps winning
presstv.ir/Detail/2024/12/21/7…
#PalestineAction #activism #Palestine
Palestine Action keeps winning
In today’s show, we’ll be exploring how Palestine Action’s activities have struck another costly blow against the Israeli arms manufacturer, Elbit Systems.PressTV
Gary Hill likes this.
BREAKING: Palestine Action Scotland destroyed the electricity supply to Leonardo's Edinburgh weapons factory, disrupting the production of laser targeting systems for Israel's F-35 fighter jets.
Source: Pal_action on x/twitter
Gary Hill likes this.
After an action and subsequent correspondence, Hinks Haulage will refuse to take work from Israel's biggest weapons producer and Howmet Aerospace, suppliers of F-35 fighter jet parts.After their quick response to our campaign, they are now no longer a target.
--- Pal_action on x/twitter
Gary Hill likes this.
Huda Ammori | Free Political Prisoners | 20 September 2024
youtu.be/mJLldwhc3A4?si=baZlwo…
Huda Ammori | Free Political Prisoners | 20 September 2024 | Defend Our Juries
Juries are a microcosm of democracy. Permitted to hear the evidence, they regularly acquit those who act to protect life. Oil and arms industry lobbyists are...YouTube
Gary Hill likes this.
Clerk: Moldable Live Programming for Clojure
Clerk takes a Clojure namespace and turns it into a notebook.clerk.vision
An IT security guy at a place I once worked said the executives were the biggest security vulnerability the company had because they wanted what they wanted and didn't care much about security. I think that's what tool Maersk down a few years ago - some exec installed malware that spread to the entire network.
"they normally put big all caps bold red warning if the person is a VIP, eg C suite, so they get VIP service - ie anything goes."
Okay, why is every right winger allowed to criticize Israel all of a sudden?👈🏻
Star Of Remphan Or Seal Of Solomon?
Alex Jones Reveals The True Origin Of Modern Israel's So-Called Star Of David
Not sure. It certainly was not acceptable to criticize them a few years ago.
If I remember correctly, Alex Jones tip toed around the Israel issue for about a decade. I have seen earlier videos where he had criticisms.
Mohammad Marandi on Western Propaganda
youtu.be/AzrFiLo4y6A?si=CsrSPq…
#MohammadMarandi #propaganda #WesternMedia #Iran
From Truth to Propaganda: Mohammad Marandi Accuses Democracy Now of Echoing U.S.-Israel Agenda
As tensions escalate between Israel and Iran, Iranian analyst Mohammad Marandi exposes how Western media — even so-called progressive outlets like Democracy ...YouTube
Abdul-Salam praises great sacrifices made by Iran's leadership in deterring "Israel"
SANAA, June 24 (YPA) - Head of the Sanaa negotiating delegation, Mohammed Abdul-Salam, praised the great stance and sacrifices made by Iran's leadership, people, and army during the 12-day war with the Israeli enemy.In a post on X, he emphasized thatاحسن (Yemen Press Agency)
UPDATE: NARA has taken this down/rescinded, and stated that it had "many inaccuracies."
This is NOT GOOD. #archives "
Restricted-Access Federal Facility, Effective July 7, 2025
Effective July 7, 2025, the National Archives at College Park, MD, will become a restricted-access federal facility with access only for visitors with a legitimate business need. It will no longer be open to the general public." archives.gov/college-park
The National Archives at College Park, Maryland
We hold permanent records created by Federal agencies that include: Textual records from civilian agencies Army unit records dating from WW1 Navy unit records dating from WW2 Still pictures Electronic records Cartographic and architectural holdings …The National Archives at College Park, Maryland
forbidden secrets of ancient X11 scaling technology revealed
People keep telling me that X11 doesn’t support DPI scaling, or fractional scaling, or multiple monitors, or something. There’s nothing you can do to make it work. I find this surprising. Why doesn’t it work? I figure the best way to find out is try the impossible and see how far we get.
I’m just going to draw a two inch circle on the screen. This screen, that screen, any screen, the circle should always be two inches. Perhaps not the most exciting task, but I figure it’s isomorphic to any other scaling challenge. Just imagine it’s the letter o or a button we wish to draw at a certain size.
I have gathered around me a few screens of different sizes and resolutions. My laptop screen, and then a bit to the right a desktop monitor, and then somewhere over that way a nice big TV. Specifically:
$ xrandr | grep \ connected
eDP connected primary 2880x1800+0+0 (normal left inverted right x axis y axis) 302mm x 189mm
DisplayPort-0 connected 2560x1440+2880+0 (normal left inverted right x axis y axis) 590mm x 334mm
DisplayPort-1 connected 3840x2160+5440+0 (normal left inverted right x axis y axis) 1600mm x 900mm
I think I just spoiled the ending, but here we go anyway.
I’m going to draw the circle with OpenGL, using a simple shader and OBT. There’s a bunch of not very exciting code to create a window and a GLX context, but eventually we’re going to be looking at the shader. This may not be the best way to draw a circle, but it’s my way. For reference, the full code is in circle.c.
<span class=tp>void</span> main<span class=st>(</span><span class=st>)</span>
<span class=st>{</span>
float thick <span class=op>=</span> radius <span class=op>/</span> <span class=nm>10</span>;
<span class=kw>if</span> <span class=kw>(</span>abs<span class=cm>(</span>center<span class=op>.</span>y <span class=op>-</span> gl_FragCoord<span class=op>.</span>y<span class=cm>)</span> <span class=op><</span> thick<span class=op>/</span><span class=nm>2</span><span class=kw>)</span>
thick <span class=op>=</span> <span class=nm>2</span>;
float pi <span class=op>=</span> <span class=nm>3</span><span class=op>.</span><span class=nm>14159</span>;
float d <span class=op>=</span> distance<span class=kw>(</span>gl_FragCoord<span class=op>.</span>xy<span class=op>,</span> center<span class=kw>)</span>;
float angle <span class=op>=</span> atan<span class=kw>(</span>gl_FragCoord<span class=op>.</span>y <span class=op>-</span> center<span class=op>.</span>y<span class=op>,</span> gl_FragCoord<span class=op>.</span>x <span class=op>-</span> center<span class=op>.</span>x<span class=kw>)</span>;
angle <span class=op>/=</span> <span class=nm>2</span> <span class=op>*</span> pi;
angle <span class=op>+=</span> <span class=nm>0</span><span class=op>.</span><span class=nm>5</span>;
angle <span class=op>+=</span> <span class=nm>0</span><span class=op>.</span><span class=nm>25</span>;
<span class=kw>if</span> <span class=kw>(</span>angle <span class=op>></span> <span class=nm>1</span><span class=op>.</span><span class=nm>0</span><span class=kw>)</span> angle <span class=op>-=</span> <span class=nm>1</span><span class=op>.</span><span class=nm>0</span>;
float amt <span class=op>=</span> <span class=kw>(</span>thick <span class=op>-</span> abs<span class=cm>(</span>d <span class=op>-</span> radius<span class=cm>)</span><span class=kw>)</span> <span class=op>/</span> thick;
<span class=kw>if</span> <span class=kw>(</span>d <span class=op><</span> radius <span class=op>+</span> thick && d <span class=op>></span> radius <span class=op>-</span> thick<span class=kw>)</span>
fragment <span class=op>=</span> vec4<span class=kw>(</span>rgb<span class=cm>(</span>angle<span class=cm>)</span><span class=op>*</span>amt<span class=op>,</span> <span class=nm>1</span><span class=op>.</span><span class=nm>0</span><span class=kw>)</span>;
<span class=kw>else</span>
discard;
<span class=st>}</span>
I got a little carried away and made a pretty color wheel instead of a flat circle.
The key variable is radius
which tells us how many pixels from the center the circle should be. But where does the shader get this from?
glUniform1f(0, radius);
Okay, but seriously. We listen for configure events. This is the X server telling us our window has been moved or resized. Something has changed, so we should figure out where we are and adjust accordingly.
<span class=kw>case</span> ConfigureNotify<span class=op>:</span>
<span class=st>{</span>
XConfigureEvent <span class=op>*</span>xev <span class=op>=</span> <span class=kw>(</span><span class=tp>void</span> <span class=op>*</span><span class=kw>)</span>&ev;
<span class=tp>int</span> x <span class=op>=</span> xev<span class=op>-></span>x;
<span class=kw>for</span> <span class=kw>(</span><span class=tp>int</span> i <span class=op>=</span> <span class=nm>0</span>; i <span class=op><</span> <span class=nm>16</span>; i<span class=op>++</span><span class=kw>)</span> <span class=kw>{</span>
<span class=kw>if</span> <span class=cm>(</span>x <span class=op>>=</span> screen_x<span class=bi>[</span>i<span class=bi>]</span> && x <span class=op>-</span> screen_x<span class=bi>[</span>i<span class=bi>]</span> <span class=op><</span> screen_w<span class=bi>[</span>i<span class=bi>]</span><span class=cm>)</span> <span class=cm>{</span>
float r <span class=op>=</span> screen_w<span class=bi>[</span>i<span class=bi>]</span> <span class=op>/</span> screen_mm<span class=bi>[</span>i<span class=bi>]</span> <span class=op>*</span> <span class=nm>25</span><span class=op>.</span><span class=nm>4</span>;
<span class=kw>if</span> <span class=bi>(</span>r <span class=op>!=</span> radius<span class=bi>)</span> <span class=bi>{</span>
radius <span class=op>=</span> r;
<span class=bi>}</span>
<span class=kw>break</span>;
<span class=cm>}</span>
<span class=kw>}</span>
width <span class=op>=</span> xev<span class=op>-></span>width;
height <span class=op>=</span> xev<span class=op>-></span>height;
<span class=st>}</span>
Getting closer. The numbers we need come from the X server.
XRRScreenResources <span class=op>*</span>res <span class=op>=</span> XRRGetScreenResourcesCurrent<span class=st>(</span>disp<span class=op>,</span> root<span class=st>)</span>;
float screen_mm<span class=st>[</span><span class=nm>16</span><span class=st>]</span> <span class=op>=</span> <span class=st>{</span> <span class=nm>0</span> <span class=st>}</span>;
float screen_w<span class=st>[</span><span class=nm>16</span><span class=st>]</span> <span class=op>=</span> <span class=st>{</span> <span class=nm>0</span> <span class=st>}</span>;
float screen_x<span class=st>[</span><span class=nm>16</span><span class=st>]</span> <span class=op>=</span> <span class=st>{</span> <span class=nm>0</span> <span class=st>}</span>;
<span class=tp>int</span> j <span class=op>=</span> <span class=nm>0</span>;
<span class=kw>for</span> <span class=st>(</span><span class=tp>int</span> i <span class=op>=</span> <span class=nm>0</span>; i <span class=op><</span> res<span class=op>-></span>noutput; i<span class=op>++</span><span class=st>)</span> <span class=st>{</span>
XRROutputInfo <span class=op>*</span>info <span class=op>=</span> XRRGetOutputInfo<span class=kw>(</span>disp<span class=op>,</span> res<span class=op>,</span> res<span class=op>-></span>outputs<span class=cm>[</span>i<span class=cm>]</span><span class=kw>)</span>;
screen_mm<span class=kw>[</span>j<span class=op>++</span><span class=kw>]</span> <span class=op>=</span> info<span class=op>-></span>mm_width;
<span class=st>}</span>
j <span class=op>=</span> <span class=nm>0</span>;
<span class=kw>for</span> <span class=st>(</span><span class=tp>int</span> i <span class=op>=</span> <span class=nm>0</span>; i <span class=op><</span> res<span class=op>-></span>ncrtc; i<span class=op>++</span><span class=st>)</span> <span class=st>{</span>
XRRCrtcInfo <span class=op>*</span>info <span class=op>=</span> XRRGetCrtcInfo<span class=kw>(</span>disp<span class=op>,</span> res<span class=op>,</span> res<span class=op>-></span>crtcs<span class=cm>[</span>i<span class=cm>]</span><span class=kw>)</span>;
screen_w<span class=kw>[</span>j<span class=kw>]</span> <span class=op>=</span> info<span class=op>-></span>width;
screen_x<span class=kw>[</span>j<span class=op>++</span><span class=kw>]</span> <span class=op>=</span> info<span class=op>-></span>x;
<span class=st>}</span>
It’s somewhat annoying that physical width and virtual width are in different structures, and we have to put the puzzle back together, but there it is.
Some more code to handle expose events, the draw loop, etc., and that’s it. A beautiful circle sized just right. Drag it over onto the next monitor, and it changes size. Or rather, it maintains its size. Send it over to the next monitor, and same as before.
Time for the visual proof. A nice pretty circle on my laptop. Another circle on my monitor. And despite the 4K resolution, a somewhat pixely circle on my TV. Turns out the hardest part of this adventure was trying to hold an uncooperative tape measure in place with one hand while trying to get a decent, or not, photo with the other.
We were so close to perfection. Somebody at the factory screwed up, and my TV is actually 66.5” wide, not the claimed 63 inches. So if we learn anything today, it’s that you shouldn’t use a consumer LG TV for accurately measuring the scale of structural engineering diagrams, at least not without further calibration.
The good news is we’ve done the impossible. Even better, I didn’t mention that I wasn’t actually running this program on my laptop. It was running on my router in another room, but everything worked as if by MIT-MAGIC-COOKIE-1. Alas, we are still no closer to understanding why people say this is impossible.
Anyway, I think the point is we should probably ignore the people who can’t do something when they tell us we can’t do it either. I woke up this morning not knowing precisely how to draw a scaled circle, having never done so before, but armed with a vague sense that surely it must be possible, because come on of course it is, I got it working. And now look at me, driven insane by the relentless stare of three unblinking eyes.
With my new knowledge, I also wrote an onscreen ruler using the shape extension. Somewhat tautological for measuring the two inch circle, but in the event anyone asks, I can now tell them my terminal line height is 1/8”, and yes, I measured.
Forbidden secrets of ancient X11 scaling technology revealed
Link: flak.tedunangst.com/post/forbi…
Discussion: news.ycombinator.com/item?id=4…
DragonForce Ransomware Cartel are claiming credit for attacks on Marks and Spencer, Co-op and Harrods and say more victim orgs are coming bloomberg.com/news/articles/20…
M&S Cyber Attack: ‘DragonForce’ Hacking Gang Takes Credit for UK Retail Attacks
The UK supermarket chain Co-op said hackers were able to access and extract customer data from one of its systems during a recent cyberattack.Ryan Gallagher (Bloomberg)
I'm going to make this the new ongoing megathread for DragonForce Ransomware Cartel's attack on UK retailers as they're all connected.
Why it matters: these are some of the UK's largest retailers, think Target or some such in a US sense.
Prior threads
M&S: cyberplace.social/@GossiTheDog…
Co-op: cyberplace.social/@GossiTheDog…
Harrods:
cyberplace.social/@GossiTheDog…
Kevin Beaumont (@GossiTheDog@cyberplace.social)
Attached: 1 image Co-op Group have shut down some systems due to a cyber incident, however retail stores are still trading uninterrupted (which is core to their business).Cyberplace
The individuals operating under the DragonForce banner are using social engineering for entry.
Defenders should urgently make sure they have read the CISA briefs on Scattered Spider and LAPSUS$ as it's a repeat of the 2022-2023 activity.
Links: cisa.gov/sites/default/files/2…
cisa.gov/sites/default/files/2…
I would also suggest these NCSC guides on incident management: ncsc.gov.uk/collection/inciden…
and effective cyber crisis comms: ncsc.gov.uk/guidance/effective…
Co-op Group have now admitted a significant amount of member (customer) information has been stolen by DragonForce Ransomware Cartel, saying they "accessed data relating to a significant number of our current and past members" - around 20 million people. The Membership database, basically. That includes home addresses and phone numbers etc.
Up until now Co-op hadn't even used the words cyber or threat actor, referring to an "IT issue" and "third party" in comms.
bbc.co.uk/news/articles/crkx3v…
Co-op DragonForce cyber attack includes customer data, firm admits
The firm previously said there was "no evidence that customer data was compromised".Joe Tidy (BBC News)
for someone who is unfamiliar with the UK retail market, do you happen to know if Co-op is at all related to the Swedish company Coop that suffered from a major ransomware attack a couple of years ago?
bbc.com/news/technology-577075…
Swedish Coop supermarkets shut due to US ransomware cyber-attack
Some 500 stores are forced to close due to the ripple effects of a major cyber attack in the US.Joe Tidy (BBC News)
New by me - breaking down the attacks on UK highstreet retailers
doublepulsar.com/dragonforce-r…
DragonForce Ransomware Cartel attacks on UK high street retailers: walking in the front door
The individuals operating under the DragonForce banner and attacking UK high street retailers are using social engineering for entry. I think it’s in the public interest to break down what is…Kevin Beaumont (DoublePulsar)
Regarding IOCs around the UK retailer activity - there’s loads doing the rounds, and they’re almost all not useful.
Eg hundreds of dynamic VPN IPs from 2022. If you google them you’ll find them on vendor blogs from years ago for Scattered Spider - people are recycling in panic and passing around in panic.
Don’t hunt on random IOCs. IP addresses change. Strengthen foundational controls. Review sign in logs for abnormal activity etc.
Orgs need to review their password reset process, share awareness to individuals who conduct password reset requests (IT helpdesk).
No IOC will help you identify social engineering activity.

UK cyber security at private firms tends to be very poor on average but social engineering remains the hacker's most effective tool.
Slack and Teams access in particular seems like a large attack vector. I believe the Twitter hack a few years back - when it was Twitter - was facillitated by superuser creds being pinned to a slack channel.
One of M&S’ biggest suppliers have said they have reverted to pen and paper for orders due to M&S lacking IT.
Additionally, M&S staff are raising concern about how they will be paid due to lack of IT systems.
M&S are over a week into a ransomware incident and still don’t have their online store working.
bbc.com/news/articles/cvgnyplv…
M&S supplier back to pen and paper after cyber attack
What's going on behind the scenes in the aftermath of the cyber attack on M&S.Emma Simpson (BBC News)
Rebuilding business is prioritised by importance. If the online shop is a small side hustle compared to the brick&mortar ones (or is much slower), then it’s lower priority.
Communicating the current status and expected progress is better, builds trust.
Wages usually are handled as lump payment, i.e. the same sum as last mont - and corrected later when the HR systems are back online.
The incidence response team should cover IT forensics, BCM and communication.
Mr. Rumbold is sure going to be busy…
Here's the ITV News report anyhoo, logline: "ITV News understands the the ongoing cyberattack faced by the supermarket has worsened since Friday, impacting the ordering system, drivers and warehouse staff."
Sunday Times has a piece looking into ransomware incident at Marks and Spencer. It's pretty good, goes into their contain and eradicate focus.
"By shutting down parts of the IT estate, Higham’s team had worked to prevent the attack from spreading, but had also stopped parts of its digital operations from functioning. This was considered a worthy trade-off."
One error in the article - lack of recovery doesn't mean no ransomware paid. Paying is not quick restoration.
Icare4America reshared this.
Big Game Ransomware: the myths experts tell board members
There’s a piece in The Sunday Times today about the DragonForce ransomware incident at Marks and Spencer which caught my eye. It’s a great piece, e.g. it looks at M&S containing the threat to…Kevin Beaumont (DoublePulsar)
Great NCSC piece by @ollie_whitehouse
I’d add - block by Entra policy specifically High risk logins (below is too FP prone), and SOC monitor them. SOC playbook = account probably compromised. How?
Sky News quote a source in M&S head office saying Marks and Spencer have no ransomware incident plan so they are making it up as they go along apparently, with staff sleeping in the office and communicating via WhatsApp.
M&S dispute this, saying they have robust business continuity plans.
news.sky.com/story/amp/mands-h…
M&S 'had no plan' for cyber attacks, insider claims, with 'staff left sleeping in the office amid paranoia and chaos'
A source describes chaotic scenes - as hackers continue to hold the High Street company to ransom.Tom Cheshire (Sky News)
Beware phony IT calls after Co-op and M&S hacks, says UK cyber centre
The NCSC urges firms to check IT help desk "password reset processes" as hackers target retailers.Joe Tidy (BBC News)
Co-op Group appear to be trying to course correct with their cyber incident comms.
They’re calling it a cyber incident now, and have put a statement on the front page of their website, along with an FAQ. They haven’t yet emailed members (they should). Edit: they’ve started emailing members.
Co-op shops stop taking card payments amid cyber attack
Stores display handmade signs to warn customers they can only pay in cash after hackers hit retailerDaniel Woolfson (The Telegraph)
Co-op Group are redirecting supplies from their urban stores to remote and island locations due to stock shortages.
The article mentions their EDI platform is suffering “technical issues”. retailgazette.co.uk/blog/2025/…
Co-op reroutes stock to rural stores amid cyber attack disruptions - Retail Gazette
The Co-op is redirecting food and drink supplies to stores in rural and remote areas in a bid to protect isolated communities from shortages following a serious cyber attack.Georgia Wright (Retail Gazette)
I just did a Shodan Safari on Co-op - basically all their Windows and Linux systems in their core DCs at network boundary are down, it's not just EDI. It's been like that for just under a week, prior to that things were still online.
I feel really bad for them as it's a great org. Also their CEO is basically the only one who stood up like this for trans people.
telegraph.co.uk/business/2025/…
Co-op boss vows to ‘protect trans people to the end’
Interview: Shirine Khoury-Haq says non-binary people bring a ‘massive business benefit’Hannah Boland (The Telegraph)
If you're wondering about Marks and Spencer - I just did a Shodan Safari of their network boundary, Palo-Alto GlobalProtect VPN remote access access is still offline, 15 days later.
Online orders are still not working, and the store stock checker is disabled now.
Co-op pauses deliveries of non-essential items amid cyber attack - Retail Gazette
Co-op has paused its orders of non-essential products amid the fallout from its cyber attack.Eloise Hill (Retail Gazette)
M&S online shopping outage enters third week
Marks & Spencer enters the third week of its ecommerce platform suspension today (9 May), as the retailer continues to battle a cyber-attack.Sabina Weston (Drapers)
The Grocer reports 4 regional Co-ops, who aren’t part of Co-op Group, are suffering stock shortages as they are supplied by Co-op Group.
They expect customers to start to see availability issues on shelves in the coming days.
thegrocer.co.uk/news/co-op-soc…
Co-op societies hit by availability issues amid cyberattack
Midcounties Co-op, Heart of England Co-op and Lincolnshire Co-op have all confirmed disruption to the supply of food to storesAlice Leader (The Grocer)
For orgs looking for defence tips for the attacks on UK retailers, this blog from 2022 about the UK teenagers in LAPSUS$ has relevance.
As a plot twist - not documented anywhere online, but LAPSUS$ first attacks in 2021 were against UK high street retailers.
microsoft.com/en-us/security/b…
DEV-0537 criminal actor targeting organizations for data exfiltration and destruction | Microsoft Security Blog
The activity we have observed has been attributed to a threat group that Microsoft tracks as DEV-0537, also known as LAPSUS$. DEV-0537 is known for using a pure extortion and destruction model without deploying ransomware payloads.Microsoft Threat Intelligence (Microsoft Security Blog)
Hack rocks Marks & Spencer bureau de change
M&S bureau de change staff are being forced to use pen and paper to serve customers. The travel money desks are also unable to accept card payments in some cases.John-Paul Ford Rojas (This Is Money)
Co-op Group have provided some more detail about what it’s doing about remote lifeline stores (ones where they’re the main/only retailer on an island):
“From Monday, 12 of the most remote lifeline stores will receive treble the volume of available product, and another 20 lifeline stores will get double the volume.” bbc.com/news/articles/c071e7x8…
Co-op cyber attack: Islanders facing empty shelves say 'get the people fed'
The picturesque island of Islay in the Western Isles is dealing with the real world impacts of the major supermarket hack.Paul Ward and Lorna Gordon (BBC News)
Home
Explore exciting job opportunities at M&S across various sectors: In-Store, Digital & Tech, Clothing, Food, Support, and Logistics. Be part of Britain's best-loved brand, championing sustainability, inclusion, and innovation.jobs.marksandspencer.com
Fears 'hackers still in the system' leave Co-op shelves running empty across UK
U.K. retailer the Co-op is still having trouble with keeping grocery shelves stocked as it continues to respond to an attempted cyberattack that forced it to shut down some systems two weeks ago.Alexander Martin (The Record)
Allianz leads cyber cover for M&S ransomware attack
The Willis-brokered coverage also includes the Willis CyXS facility.Abbie Day (Insurance Insider)
This ITV News report linking the Co-op and M&S breaches to SIM swapping is not accurate, no source given. itv.com/news/2025-05-12/sim-sw…
They also have a report today saying Co-op stores are restocked, which is also not accurate - that one is sourced from Co-op, but obviously doesn’t stack up to looking in Co-op stores.
If anybody is wondering, all of Marks and Spencer's Palo-Alto GlobalProtect VPN boxes are still offline, 3 weeks later. Pretty good containment method to keep attackers out.
Co-op's VDE environment is still down, too.
cyberplace.social/@GossiTheDog…
Kevin Beaumont (@GossiTheDog@cyberplace.social)
Attached: 1 image M&S use Palo-Alto GlobalProtect for VPN, they took all the endpoints offline days ago (usually first stage containment for ransomware/extortion groups).Cyberplace
M&S says personal customer data stolen in recent cyber attack
The retail giant is still not taking online orders following a cyber attack three weeks ago.Michael Race & Joe Tidy (BBC News)
Co-op's AGM is this weekend, and M&S yearly results and investor contact are next week.
Gonna be awkward for different reasons, e.g. Co-op is member (customer) owned, so the people's data Co-op had stolen are effectively the shareholders and are invited.
CI Coop secures local supplies amid stock shortages
Bosses expect "steady improvements each day", after a cyber attack leads to empty shop shelves.Caitlin Klein (BBC News)
The Grocer reports Nisa and Costcutter are running out of fruit & veg, fresh meat and poultry, dairy products, chilled ready meals, snacks and desserts.
Nisa and Costcutter are supplied by Co-op Wholesale, which is dependent on Co-op Group.
“It’s really poor. I feel bad for them but what makes it worse is their hush-hush mentality about it. There’s no proper level of communication and we get random updates.”
Co-op Wholesale claim there are no problems. thegrocer.co.uk/news/nisa-and-…
Nisa and Costcutter hit by Co-op cyberattack stock shortages
In communications sent to retailers, the symbol groups listed products that were either ‘temporarily unavailable’ or ‘out of stock’ as a result of supplier issuesAlice Leader (The Grocer)
Co-op Group have told their suppliers that "systemic-based orders will resume for ambient, fresh, and frozen products commencing Wednesday 14 May". They say forecasting system will still be impacted.
thegrocer.co.uk/news/co-op-to-…
Co-op to get systems back on track after cyberattack
As the Co-op turns orders back online, it has warned suppliers that it is unable to provide ‘accurate product forecasting ahead of Wednesday’s orders’Alice Leader (The Grocer)
M&S cyber insurance payout to be worth up to £100mn
UK retailer to file big claim as it admits for first time that some customer data was stolen in recent hackLaura Onita (Financial Times)
Co-op Group say they have exited containment and begun recovery phase theguardian.com/business/2025/…
Marks and Spencer are still in containment
If you want figures for your board to set expectations in big game ransomware incidents, Co-op containment just over 2 weeks, M&S just over 3 weeks so far - recovery comes after.
In terms of external assistance, Co-op have Microsoft Incident Response (DART), KPMG and crisis comms. M&S have CrowdStrike, Microsoft, Fenix and crisis comms.
Co-op cyber-attack: stock availability in stores ‘will not improve until weekend’
Group in ‘recovery phase’ and working closely with suppliers after customers complain of empty shelvesSarah Butler (The Guardian)
The threat actor at Co-op says Co-op shut systems down, which appears to have really pissed off the threat actor. This was the right, and smart, thing to do.
While I was at Co-op we did a rehearsal of ransomware deployment on point of sale devices with the retail team, and the outcome was a business ending event due to the inability to take payments for a prolonged period of time. So early intervention with containment was the right thing to do, 100%.
bbc.co.uk/news/articles/cwy382…
'They yanked their own plug': How Co-op averted an even worse cyber attack
The revelation - from the criminals responsible - explains why the Co-op is getting back to business faster than M&S.Joe Tidy (BBC News)
M&S have finally told staff that data about themselves was stolen: telegraph.co.uk/business/2025/…
You may notice I said they had staff data stolen on May 9th in this thread.
M&S staff data stolen by hackers in cyber attack
Employees’ email addresses and full names have been taken by hackers, sources claimMatthew Field (The Telegraph)
For the record, the tools listed in this article aren't used by Co-op.
computing.co.uk/news/2025/secu…
The link in the article to Vectra Cognito AI has a Coop Sweden logo on it, and the Coop Sweden CISO is named. Coop Sweden is different company. Coop Sweden went on to have a ransomware attack that crippled the org, including point of sale, so I don't think it's a good sales point. Same with Silverfort.
Google AI has ingested the article and now uses it to claim Co-op Group use the tools.
Here are the cyber tools Co-op used to help defeat its recent ransomware attack
Computing research has identified the security tools and partners the Co-op used to stop last month’s cyberattack in its tracks.www.computing.co.uk
M&S chief executive faces £1.1mn pay hit after cyber attack
Stuart Machin’s awards set to shrink after UK retailer’s share price drops following disclosure of sweeping hackLaura Onita (Financial Times)
The Times reports M&S were breached through a contractor and that human error is to blame. (Both M&S and Co-op use TCS for their IT Service Desk).
The threat actor went undetected for 52 hours. (I suspect detection was when their ESXi cluster got encrypted).
M&S have told the Times they had no “direct” communication with DragonForce, which is code for they’re using a third party to negotiate - standard practice.
M&S looks to be moving to reposition their incident as a third party failure, which I imagine will help redirect some of the blame (they present their financial results during the week to investors): bbc.co.uk/news/articles/cpqe21…
Both M&S and Co-op outsourced their IT, including their Service Desk (helpdesk), to TCS (Tata) around 2018, as part of cost savings.
M&S hackers believed to have gained access through third party
The retailer has been struggling to get its services back to normal after a cyber-attack in April.Emma Simpson (BBC News)
There's nothing to suggest TCS itself have a breach btw.
Basically, if you go for the lowest cost helpdesk - you might want to follow the NCSC advice on authenticating password and MFA token resets.
I've put a 3 part deep dive blog series coming out probably next week called Living-Off-The-Company, which is about how teenagers have realised large orgs have outsourced to MSPs who follow the same format of SOP documentation, use of cloud services etc. Orgs have introduced commonality to surf.
M&S Hong Kong not responding to Privacy Commissioner's Office after online customer data breach
The Office of the Privacy Commissioner for Personal Data says M&S Hong Kong has not informed it of a recent customer data leak, nor responded to its enquiries.Tom Grundy (Hong Kong Free Press HKFP)
"Cyber analysts and retail executives said the company had been the victim of a ransomware attack, had refused to pay - following government advice - and was working to reinstall all of its computer systems."
Not sure who those analysts are, but since DragonForce haven't released any data and M&S won't comment other than to say they haven't had any "direct" contact with DragonForce, I wouldn't make that assumption.
There's also a line in the article from an cyber industry person saying "if it can happen to M&S, it can happen to anyone" - it's ridiculous and defeatist given Marks and Spencer haven't shared any technical information about how it happened, other than to tell The Sunday Times it was "human error"
The Air Safety version of cyber industry would be a plane crashing into 14 other planes, and industry air safety people going "Gosh, if that can happen to British Airways it could happen to anybody!"
Tomorrow it’s one month since Marks and Spencer started containment, it’s also their financial results day.
Online ordering still down, all recruitment stopped, Palo-Alto VPNs still offline.
TCS have been linked to the Marks and Spencer breach, at least in part.
M&S cyber-attack disruption to last until July and cost £300m
Customers have been unable to order online for almost a month due to the cyber-attack.Lucy Hooker (BBC News)
The NCA has confirmed on the record that the investigation into the M&S and Co-op hack is focused on English teenagers. I could toot the names of the people I think they’ll pick up, but won’t.
bbc.co.uk/news/articles/ckgnnd…
M&S and Co-op hacks: Scattered Spider is focus of police investigation
The National Crime Agency tells the BBC how it is trying to find the culprits of the M&S and Co-op hacks.Joe Tidy (BBC News)
This stuff is brilliant. Based on e-paper and runs on Zigbee.
And they can raise the prices between you picking things off the shelf and going through the checkout and you'll have no proof that it was offered at a lower price.
Has been done since the ransomware incident.
pssscht. Like that would ever happen lol
bbc.com/news/technology-577075…
Swedish Coop supermarkets shut due to US ransomware cyber-attack
Some 500 stores are forced to close due to the ripple effects of a major cyber attack in the US.By Joe Tidy (BBC News)
e-paper price labels are apparently extremely common in mainland Europe. The UK is extremely slow to adopt things like this.
*In theory*, during an incident, the labels would remain as-is until they receive a new price. So TAs would specifically need to target the pricing database prior to wiping.
TCS has a security incident running around the M&S breach.
Interestingly the source claims TCS aren't involved in Co-op's IT - which is categorically false, they took over most of it while I worked there, including the helpdesk, and my team (SecOps) after I left.
ft.com/content/c658645d-289d-4…
Tata Consultancy Services carries out internal probe into M&S hack
Indian IT company investigating whether it was gateway used by criminals to access retailerChris Kay (Financial Times)
Insurance Insider say Co-op Group have no cyber insurance policy.
It’s got the insurance industry hard as they think they can ambulance chase other orgs with it.
insuranceinsider.com/article/2…
M&S attacks could be the key to winning new cyber business
While M&S had a cyber policy in place, Co-op and Harrods did not, Insurance Insider revealed.Abbie Day (Insurance Insider)
DragonForce actors target SimpleHelp vulnerabilities to attack MSP, customers
Ransomware actor exploited RMM to access multiple organizations; Sophos EDR blocked encryption on customer’s networkSophos News
While Co-op have restored every customer facing system and internal systems like recruitment and remote working, M&S still don't even have recruitment back.
I'm reliably told they paid the ransom, so they'll be target #1 basically forever with other ransomware groups now due to resiliency woes and willingness to pay.
bbc.co.uk/news/articles/c23mz5…
M&S boss's pay hits £7m before cyber attack chaos
Stuart Machin's money is not affected by the IT disruption but it will be considered for next year's pay.BBC News
M&S staging walk-in recruitment open days amid cyberattack disruption
M&S suspended online recruitment, along with clothing and home orders, after hackers took control of its systems in a cyberattack in AprilSteve Farrell (The Grocer)
This Daily Mail piece about security leaders thinking work-from-home means they will be crippled is horseshit, I'm not linking it.
They've taken a survey about how security people think their businesses couldn't survive ransomware, and linked it to working from home. WFH isn't the problem: business IT and resilience being built on quicksand is the problem.
Looks like a product of the "a good lie contains as much truth as possible" school.
The connection to WFH is spurious; but only two thirds sounds low for "We don't really understand our problems; but they are probably apocalyptic".
The 'WFH' allegations seem in especially bad faith given the suspected entry point for the M&S compromise: the outsourced helpdesk.
Those guys are even more compliant labor than work-not-from-home employees, so the Daily Heil isn't going to say anything; but lack even the (informal; but in practice often at least reasonably effective) "does the IT person you just poked recognize who is interrupting with a password question?" ID verification step with onsite workers and onsite IT.
It wouldn't be the whole story either, but it's just as true.
Co-op say they have largely completed recovery, and have removed the cyber attack banner and statement from their website
retailgazette.co.uk/blog/2025/…
I think they did a great job. They do call it a "highly sophisticated attack", which, frankly.. isn't true and may come out in open court later if the suspects are ever caught.
6 weeks from containment to "near full" recovery, for statto nerds like me who track this stuff.
Co-op nears ‘complete recovery’ from cyber attack - Retail Gazette
Co-op has said it’s in a “much stronger position” as store deliveries return to normal following its cyber attack.Aoife Morgan (Retail Gazette)
M&S had their ransomware incident communicated via internal email - from the account of a staff member who works for TCS.
The way TCS work is you give them accounts on your AD.
bbc.co.uk/news/articles/cr58pq…
M&S hackers sent abuse and ransom demand directly to CEO
The criminals told the retailer's boss he could make things "fast and easy" if he complied with their demands.Joe Tidy (BBC News)
Marks and Spencer have started partial online shopping again.
For statto nerds, around 7 weeks from containment to partial recovery
bbc.co.uk/news/articles/c4gevk…
M&S restarts online orders after cyber attack
The return of online shopping marks a key milestone for the retailer, which has struggling to get services back to normal.Michael Race (BBC News)
TCS have told shareholders their systems were not compromised in the hack of M&S.
As an explainer here (not in the article): TCS IT systems weren't compromised. Their helpdesk service (they're AD admins at M&S) was used to gain access to M&S. They manage M&S IT systems.
reuters.com/business/media-tel…
Latest Marks and Spencer update is pretty crazy.
M&S haven't been able to supply sales data - so the British Retail Consortium (BRC) - used by the UK government as as economic indicator - basically made up figures for M&S and didn't tell people they had done this.
telegraph.co.uk/business/2025/…
Retail lobby group accused of M&S cyber cover-up
British Retail Consortium published ‘made-up’ sales figures following attack on high street giantHannah Boland (The Telegraph)
I'd be very curious to know what the breakdown is between TCS dropping the ball and lying about it and M&S/Co-op not actually insisting on adequate procedure.
It's not terribly uncommon for people to only care about time-to-resolution with some lip service to user satisfaction when it comes to helpdesk metrics; and tacitly discourage things that are slow and unpleasant like hassling people for ID, at least until that becomes a visibly terrible idea.
"M-SThrowaway" might indicate M&S?
Or is that too obvious or deliberate obfuscation? 🙂🤷♂️
as someone who has been subjected to Tata on multiple occasions going back over a decade?
This isn't nearly spicy enough. I don't even describe them as a 'body shop' because they'd gladly route you to a corpse and try to charge extra for '24x7 coverage.'
When one employer did a basic security audit of their helpdesk services, Tata failed so severely that the contract was pulled for cause before the audit was even completed. They moved it all back in-house.
The root problem here isn't that TCS are shockingly bad (they are, just about everyone knows that).
The root problem is that "management decisions" constantly overrule those that raise concerns about their service and tell any remaining internal IT and security staff to "deal with it as best you can."
I'm very much of the view that, yes, the outsourced provider can be the cause of an incident, they can provide a shockingly bad service, they can cost your business millions of pounds. But the decision to continue to use them when you already know this is a real possibility - that's a decision by senior management within the company. That's on you.
Interesting. I don't have the background on this specific attack, but I'm reminded of the Target credit card theft. An HVAC company near me was the point of entry for the attackers; they had high-access keys to Target's intranet because they install and maintain shopping-mall-grade HVAC and can remote-override it for maintenance and schedule reasons (nation-scale chain stores with giant footprints save not-inconsequential money on things like "Don't power up the HVAC to normal capacity on days nobody is here").
They had the keys on the same machine running their webserver.
(Meanwhile, Target actually did get an SEC slap-on-the-wrist for one specific thing: the HVAC intranet piece wasn't firewalled from the financial transactions and cash register source code pieces).
Marks and Spencer’s CEO says half of their online ordering is still offline after their ransomware incident, they hope to get open in next 4 weeks.
They are also rebuilding internal systems and hope a majority of that will be done by August.
Lesson: mass contain early. M&S didn’t. Co-op did.
17 and two 19 year old teens picked up over Co-op and M&S hacks, and a 20 year old woman.
Pretend to be surprised.
bbc.com/news/articles/cwykgrv3…
Four arrested in connection with M&S and Co-op cyber attacks
Three men and one woman - aged between 17 and 20 - have been arrested in London and the midlands.Joe Tidy (BBC News)
. @briankrebs has broken the story that the key member (and teenager) of LAPSUS$ runs Scattered Spider
krebsonsecurity.com/2025/07/uk…
UK Charges Four in ‘Scattered Spider’ Ransom Group
Authorities in the United Kingdom this week arrested four alleged members of "Scattered Spider," a prolific data theft and extortion group whose recent victims include multiple airlines and the U.K. retail chain Marks & Spencer.krebsonsecurity.com
Co-op finally admitted the entire membership database was stolen
I had this in the thread months ago, they originally tried to deny it entirely then tried to say ‘some’ data was accessed when they knew it was the whole thing.
bbc.co.uk/news/articles/cql0pl…
Co-op boss says sorry to 6.5m people who had data stolen in hack
In her first interview since the attack, Co-op's chief executive said she was "incredibly sorry" to customers.Joe Tidy (BBC News)
Personally I think Co-op did a really good job getting out of that situation and minimising impact.
I definitely think if you have a LAPSUS$ style advanced persistent teenagers situation, tilt towards open and honest comms as those kids will use secrecy against ya. It’s 2025, it’s okay to say you got hacked, people largely understand. Also, in IR, lawyers are usually stuck in 1980 advice - it’s just advice, they ain’t yo boss.
It’s 2025, it’s okay to say you got hacked, people largely understand.
Probably the most damning indictment of the entire computing industry that I've seen for a long time.
I don't disagree at all. But this absolutely should not be the case and wouldn't be if we weren't still building core infrastructure around ideas that were known to be bad by the mid 1980s.
The people arrested as part of the Co-op and M&S hack investigation have been released on bail.
nation.cymru/news/four-people-…
Previously when this happened with LAPSUS$, they just continued hacking stuff.
Four people bailed after arrests over cyber attacks on M&S, Co-op and Harrods
Four young people who were arrested for their suspected involvement in the damaging cyber attacks against Marks & Spencer, the Co-op and Harrods, have been bailed.Emily Price (Nation.Cymru)
at this point I'm much more surprised when someone over 25 gets picked up for hacking stuff, I think some dude was helping gangs smuggle drugs into Rotterdam via hacking into the port logistical systems, they were like 41 with kids, that was way more unexpected to me lol
occrp.org/en/project/narcofile…
Inside Job: How a Hacker Helped Cocaine Traffickers Infiltrate Europe’s Biggest Ports
Europe’s commercial ports are top entry points for cocaine flooding in at record rates. The work of a Dutch hacker, who was hired by drug traffickers to penetrate port IT networks, reveals how this type of smuggling has become easier than ever.OCCRP
At least the companies used sophisticated defense in depth.
“The BBC later discovered from the criminals that the company disconnected the internet from IT networks in the nick of time to stop the hackers from deploying ransomware and so causing even more disruption.
"Shortly after Co-op announced it had been attacked, luxury retailer Harrods said it too had been targeted and had been forced to disconnect IT systems from the internet to keep the criminals out.”
If it is the case then the leaders of businesses like M&S who outsource these services to the lowest cost providers should also be held to account
It’s typical of British business management to know the cost of technology but not the value of it
In other words, their wetware was targeted.
"Our staff is our most valued asset. We depreciate on it."
The term 'user' in "no TCS systems or users compromised" could be more interesting to argue on in a civil liabilities case.
If a TCS staff member falls for social engineering (even if the action they take is within an assigned M&S tenant account...), is that not the same as a TCS user being compromised?
Anyway... I'm sure that statement won't at all be like rubbing salt in M&S's wounds.
wasn't there some event, maybe 5 years ago, that meant a lot of WFH? Or did I hallucinate those times.
Is it suddenly a problem now or this is the same RTO bullshit being peddled?
Want to guess how much of my IT leadership career has been focused on building in-house expertise and dialing back the presence of MSPs?
Enough that it's made for a pretty good living...
when I got my business degree, one of my management profs said that the instant you outsource, you give up control. To the service provider, you move from income to liability on the balance sheet because you now are costing them money, and to eke out any profit they need to cut costs related to providing service to you.
Thus you get all this *gestures vaguely*
"paints a ticking timebomb" - bit of a mixed metaphor, could be "paints a target" or "plants a ticking timebomb" ? 😎
The shortsightedness of outsourcing everything is undeniable though!
I would love for IT to publish accident investigation reports in the same way as aviation.
No blame, no liability, no finger pointing, just lessons for everyone to learn and hopefully avoid the same.
(I know there have been some like the Irish Health Service that were excellent.)
yeah, breach the "low cost" IT outsourcer - whose staff feel little connection or affinity with the corporate customer - and *bingo* you hit the jackpot 🎰 with multiple corporate accounts to ransom.
How's that "low cost IT outsourcing" looking now?
1. Personnel is not allowed to store passwords.
2. Must use unique passwords for every service.
3. Passwords must rotate every X days.
4. Only sanctioned apps are allowed.
5. No password manager is sanctioned or installed by default.
I recall it was a "TCS_80_ip" list in Entra Id marked "Trusted"/"MFA exempt" that contained 80 ranges from /15 to /24...
Yet happily pivoting through 3 layer deep RDP to get to a system to manage
“we aren’t a computer company, so off to India / China / Vietnam / Philippines / etc for all this non-core-business shit”
…
“Why company not run without computers? Who did this?”
to be fair, IIRC, Coop Sweden went down because their payment provider used Kaseya.
So, it was ransomware on a fourth party, nothing Coop Sweden had any direct control over
The quote
> They torched shareholder value
made me laugh
they have no idea what the Coop is
Just glad some of the lessons sank in....
the thieves could probably show up at the AGM and present themselves as a member, since they have access to all the information the Co-Op has on it's membership...number, address, etc.
Short of checking govt. ID or requiring a hard copy of the meeting invite that was mailed to their address. Even then, the thieves might've gotten away with that too.
Incident response specialists the world over wince into their keyboards.
This is another object lesson in how not to do it. It'll be taught to students in future.
I can only hope this data breach is the kick up the arse needed to abolish the common practice of using date of birth as an (immutable!) security password. Once it’s public knowledge it’s beyond useless… it’s a liability. Especially in banks.
I will not be holding my breath on this one.
I was on holidays in Brodick (Arran, Scotland) last sunday, I can confirm the Co-op was low on products, with only potatoes available as fresh vegetables 😬
I though it was because it was a sunday late afternoon, but reading your thread it was clearly linked to the cyber incident
Co-op cyber attack leaves island shop shelves empty
The attack has disrupted deliveries to island communities where Co-op is one of the biggest retailers.BBC News
Not sure if it is related, but M&S shuttered a flag-ship store without notice and earlier than planned on May 7th.
🔗 Marks and Spencer suddenly closes Aberdeen’s flagship St Nicholas branch after more than 80 years in city centre pressandjournal.co.uk/fp/news/…
They've now admitted it -
BBC News - Personal customer data stolen in M&S cyber attack
bbc.com/news/articles/c62v34zv…
M&S says personal customer data stolen in recent cyber attack
The retail giant is still not taking online orders following a cyber attack three weeks ago.Michael Race & Joe Tidy (BBC News)


Well, that's an easy one. Just say that you are calling regarding the reported problem with Outlook.
On the one hand you have a ~90% Chance, that the called person had.a Problem in the last Week, and on the other hand will hand you over the username as well as the password immediately.
I'm somewhat surprised, that this had not been tried earlier.
Edit: Done
Huh, might also explain why some of the shelves were so bare at my local yesterday.
(Also, it was a Bank Holiday Monday, but still)
While in #BandQ today, the staff said they'd been having "some IT Issues like M&S"
Not sure if this was the staff just making a parallel of "generic IT issues" or if there has been some incident they haven't admitted yet
Can also confirm, from several years ago, that sometimes there is also an Executive Assistant with a flag in some systems to ‘call on behalf of’ C-Suite/VPs.
It’s like a privilege escalation on people exploit 🤣😂
The cult of “it’s an exec!” and thus able to bypass normal protocols has always made me cry - especially seeing as how they’re the ones with access to the juicy stuff and (usually) have low IT literacy and awareness.
Often, when I’ve worked with an org to help strengthen the help desk, the push back has been from the service desk management (scared that they’ll been seen as impeding the exec in the course of Important Work). Usually asking the question “would you rather be responsible for an extra 60 seconds on a call, or for the entire company being breached?” helps them to see the light.
The other source of friction is from the admin assistants of the execs who seem even more entitled than the execs themselves. An appeal to vanity (“we have to be extra careful when you call in because you’re in a very privileged position”) can work wonders.
Every time I’ve spoken directly with said execs and explained exactly why they are going to be asked to positively ID themselves for any interaction they have been 100% supportive.
This is basically the plan for most businesses in reality.
It's fine to talk about stuff being "widely known best practice," but when IT shows up with big expenses for backups and security, the MBA's always decide it's more important to rightsize the headcount and operate lean. Many IT departments report up through an MBA and not a technical person, and many IT people are terrible at communicating risk dramatically enough to get money.
The thing that gets me is that the two statements are probably true for the people who said them. The Security group may have wargamed and prepared for malware attacks, and done so in a way that no one else in the technical stack even noticed happening (beyond some new agent installs being requested). So when the attack comes, the Security plan swings into action and no one outside of Security knows what it is or has practiced it.
This is high visibility. Executives step in to make Declarations, complicating the response. This is an incident big enough to need sub-commands to track various workflows, reporting up to a rotating incident command. Everyone wants to help, the workflows aren't well defined yet, and people help on their own authority (thanks to Command not having a clear picture yet and guiding where help would be good) and maybe make things worse in a few spots.
We had a plan.
It is chaos.
Both are true.
@ollie_whitehouse
Do egress filtering (esp. for servers) with alerting.
If there is unknown communication, then you have either a misconfiguration or a problem.
Keep critical IT infrastructure (network, firewalls, SAN/NAS, virtualisation, backups) separated from Active Directory.
Do not couple internet-facing systems (including VPN and M365) with your local AD.
I agree with most of your arguments. (In fact, the only one I take exception with is comparing ransomware with climate change. Ransomware is a much more real and urgent problem.) Those are pretty much arguments I've used myself when advising customers hit by ransomware not to pay.
But, ultimately, it's the company's decision. Even if the company makes the wrong decision, the government shouldn't be the one who decides for them.
See also this:
coveware.com/blog/2025/4/29/th…
"Decryption tools are worse than they’ve ever been."
The organizational structure of ransomware threat actor groups is evolving before our eyes
The Ransomware-as-a-service (RaaS) model has not recovered from law enforcement disruption, and the entrance of novice actors along with non-Russian state-linked cybercriminals has led to uncertain outcomes for victims.Bill Siegel (Coveware: Ransomware Recovery First Responders)
When the first indication appears, shut everything down. I have seen banks do this, and watched tellers calmly tell customers "I'm sorry, but the system is temporarily shut down" and start from there.
If the breach is stopped quickly enough, you may have a chance.
Also, what about off site storage, that would not be accessible to the attacker?
Ultimately, the decision is a risk management decision, to evaluate as quickly as you can
"Travelex aren’t alone. When I covered the Capita ransomware, they paid quietly paid"
maybe delete one of the "paid"s
Inside the M&S meltdown: 3am meetings and £40m a week in lost sales — The Times and The Sunday Times
Stuart Machin had been looking forward to a long weekend. It was Easter Saturday and the chief executive of Marks & Spencer had retired to his south London home for the evening, after a long day inspecting the aisles of his local M&S branch — somethi…apple.news
Unknown drone attack targets Taji Camp in Baghdad, Iraq
Multiple explosions were heard in the Iraqi capital, Baghdad, particularly at Camp Taji, a military installation used by Iraqi and the US-led coalition forces.Al Mayadeen English (Unknown drone attack targets Taji Camp in Baghdad, Iraq)
A. prepare defenses?
B. attack first?
C. do what the enemy wanted before they get a chance to do it?
Sensitive content
YUINA Ema #結菜えま
Sensitive content
Sensitive content
Xi to attend gathering marking 80th anniversary of victory against Japanese aggression, fascism - China Military
Chinese President Xi Jinping will attend a gathering marking the 80th anniversary of the victory in the Chinese People's War of Resistance Against Japanese Aggression and the World Anti-Fascist War.eng.chinamil.com.cn
You can follow us in other languages. Visit our website for more information wordsmith.social/protestation/…
Social
English– @protestation@friendica.eskimo.comFrançais– @protestation@social.trom.tf– @protestation@mastodon.social
Deutsch– @protestation@friendica.opensocial.space
Português– @protestation@mastodon.acc.sunet.se– @protestation@friendicarg.nsupdate.info
Quotes– @protestation@embers.social– @protestation@freeradical.zone
Hamas' Al-Qassam Brigades execute complex ambush on zionist force in Gaza
Hamas' Al-Qassam Brigades execute complex ambush on zionist force in Gaza
Al-Qassam Brigades, the military wing of the Islamic Resistance Movement (Hamas), announced on Tuesday that its fighters carried out a complex ambush targeting a Zionist force entrenched inside a house south of Khan Younis in the southern Gaza Strip.www.saba.ye
#gaza #palestinian #children #palestine #civilians #siblings #parents #children #loss #suffering #pain #deaths #killings #endisraelswarcrimes #stopisrael #childmurder
This Palestinian boy was #MurderedbyIsrael yesterday.
Workers and students in Manchester and Bradford speak out against Iran war, Palestine Action ban - World Socialist Web Site
wsws.org/en/articles/2025/06/2…
Workers and students in Manchester and Bradford speak out against Iran war, Palestine Action ban
Ahmed, a rail worker, told WSWS, “The attack on Iran is totally unjustified, it’s also a total threat to democracy… Before we know it, we won’t be able to protest.”World Socialist Web Site
reshared this
Nanook reshared this.
Acabo de enterarme que Willyrex ha vuelto a las andadas y ahora se ha metido en el tema de las IAG.
Ahora tengo todavía más ganas de que pete la burbuja para que este se vuelva a estampar por una mierda tecnológica.
500 Years of Indigenous Resistance – Gord Hill
The history of the colonization of the Americas by Europeans is often portrayed as a mutually beneficial process, in which ”civilization” was brought to the Natives, who in return shared their land and cultures.Working Class History | Shop
AI training, per se, is now considered "fair use" and Constitutionally protected in the U.S.
news.bloomberglaw.com/ip-law/a…
Anthropic Wins Right to Use Copyrighted Books to Train AI Models
Anthropic PBC convinced a California federal judge that using copyrighted books to train its generative AI models qualifies as fair use.Annelise Levy (news.bloomberglaw.com)
if ai training is fair use, and whatever ai produces is effectively public domain...
i feel like this is the best path to completely destroy copyright once and for all
la respuesta de Irán al ataque
inicial de Netanyahu el mundo
occidental se posicionara con
ellos. No ha sido así, y no lo ha
sido gracias a la visibilización y
la movilización que ha hecho la
gente de todo el mundo al ver el
genocidio. Ahora es mucho más
difícil para Israel y EEUU que la
gente les apoye en su deriva
belicista. La difusión y la presión
de la gente, funciona. Sigamos
haciéndolo. ¡Viva Palestina libre!
delighted to announce that my new zine "The Secret Rules of the Terminal" is out today!!
You can get it for $12 USD here: wizardzines.com/zines/terminal
The reason this zine is called "The Secret Rules of the Terminal" is that I learned more useful things while writing this zine than when writing any other zine, even though I've been using the terminal every day for 20 years.
It really left me feeling like the terminal is full of hidden secrets -- because "the terminal" is made up of so many different pieces, there's no single terminal manual you can read!
Here's the table of contents (which as a bonus shows the components of the terminal!)
Cool cover! The middle woman looks a lot like Franka:
A federal judge sides with Anthropic in lawsuit over training AI on books
Link: techcrunch.com/2025/06/24/a-fe…
Discussion: news.ycombinator.com/item?id=4…
A federal judge sides with Anthropic in lawsuit over training AI on books without authors' permission | TechCrunch
The ruling isn't a guarantee for how similar cases will proceed, but it lays the foundations for a precedent that would side with tech companies over creatives.Amanda Silberling (TechCrunch)
Audio: Trump’s attack on Iran is ‘unconditional surrender’ to Israel
Narrated version: Shunning the US intelligence consensus, Trump and top principals rely on Israeli fraud to bomb Iran.Aaron Maté (Aaron Mate)
« Iran, US, France: faire entendre la voix des peuples » - QG TV
What comes next, as war escalates?
How can Iran counter a US-Israeli assault aimed at its destruction?The Electronic Intifada
Sensitive content
QUE RETENIR DES 12 JOURS DE CONFRONTATION ENTRE L’IRAN ET ISRAËL ?
Infos Brutes- 24/06/25La confrontation inédite entre l’Iran et Israël aura duré près de deux semaines, marquant une rupture majeure dans la dynamique régionale. Le cessez-le-feu, initié par les États-Unis, témoigne de la volonté israélienne d’éviter une désavantageuse guerre d'usure. Cette initiative reflète en réalité un signal d'essoufflement d’Israël. Mais que nous enseignent réellement ces douze jours d’échanges de frappes ?
- Sur le plan politique interne iranien
L’attaque israélienne, justifiée par le prétexte nucléaire, n’a pas affaibli la République islamique. Au contraire, elle a consolidé la cohésion nationale. Face à l’agression, le peuple iranien a resserré les rangs autour du régime, démontrant que la capacité de résistance d’une Nation repose avant tout sur l’unité de son peuple.
- Sur le plan technologique – Iran
L’Iran a pu tester grandeur nature ses missiles balistiques à longue portée. Au-delà de la démonstration de puissance, c’est une opportunité d’ajustement technique. L’expérience de terrain servira à perfectionner ces armes, à les rendre plus précises et potentiellement plus dissuasives à l’avenir.
- Sur le plan technologique – Israël
La supériorité technologique israélienne, longtemps considérée comme un acquis, a été sérieusement mise à rude épreuve. Malgré la présence du Dôme de Fer, des systèmes avancés de défense antimissile et la puissance de son aviation, les missiles iraniens ont percé les « rideaux de protection » et atteint des cibles stratégiques, ébranlant la confiance dans ces boucliers.
- Sur le plan tactique – #Israël
Des décennies d’assassinats ciblés de scientifiques iraniens n’auront pas empêché l’Iran de maîtriser la technologie nucléaire. Les bombardements israéliens, en partie aveugles, n’ont pas détruit les capacités et le savoir-faire nucléaires de l’Iran. La centrale nucléaire de Bushehr n'a pas été touchée et l'incertitude demeure sur l'efficacité des frappes sur les infrastructures souterraines. Pire encore, le stock d'uranium hautement enrichi dissimulé ne finira pas de hanter Tel-Aviv.
- Sur le plan #géopolitique
L’image d’invincibilité d’Israël en sort affaiblie. Pour la première fois, un État souverain a revendiqué et exécuté des frappes en profondeur sur le territoire israélien avec un lourd bilan humain et des dégâts considérables. Cette brèche stratégique aura un impact durable sur la perception de la superpuissance militaire d'Israël.
- Sur le plan tactique – Iran
L’Iran s’attellera désormais à renforcer considérablement ses systèmes de défense aérienne. L’investissement dans des technologies hypersoniques et furtives deviendra une priorité, tout comme la dissimulation accrue des infrastructures militaires stratégiques pour renforcer sa dissuasion et sa capacité de projection.
- Sur le plan de la retenue iranienne
Malgré sa capacité à infliger des dégâts considérables, l’Iran a fait preuve de retenue stratégique. Il aurait pu viser la centrale nucléaire de Dimona ou les installations de dessalement, provoquant une catastrophe humanitaire et écologique. Ce choix délibéré de ne pas franchir certaines lignes rouges montre une volonté de ne pas provoquer une guerre totale.
Bien que la Russie et la Chine aient ouvertement condamné les frappes israéliennes, leur soutien concret se veut plus discret. La présence de scientifiques russes sur certains sites iraniens suggère une collaboration étroite dans le nucléaire et le militaire. Les missiles iraniens devenus subitement performants prouvent l'efficacité de la coopération militaire et technologique avec la Russie, la Chine, la Corée du Nord et le Pakistan.
- Sur le dossier #nucléaire
La situation ramène paradoxalement le dossier nucléaire iranien à son point de départ: la voie diplomatique. L’Iran se retrouve en position de force pour relancer les négociations avec ses conditions ou, au contraire, accélérer discrètement sa transition vers le nucléaire militaire, s'il est considéré par Téhéran comme seule garantie de sécurité face à des menaces existentielles.
- Sur le plan militaire israélien
Habitué à affronter des groupes non étatiques comme le Hezbollah ou le Hamas, Israël découvre les limites de sa stratégie face à un État organisé, disposant de moyens balistiques conséquents. L’option militaire perd de son attractivité stratégique, et la confiance dans les systèmes d’alerte précoce et de défense est sérieusement entamée.
- Sur le plan des pertes humaines et matérielles
Malgré une communication strictement contrôlée par Tel-Aviv, de nombreux observateurs remettent en question le bilan humain en raison de l’ampleur des dégâts. L'étendue des destructions à Haïfa, Tel-Aviv ou Beersheba , associée aux indemnisations civiles et au coût des interceptions, pèsera lourdement sur l'économie israélienne, même avec le soutien américain.
- Sur le plan de la politique intérieure israélienne
#Netanyahou a momentanément renforcé sa position en détournant l’attention de ses ennuis judiciaires et à se maintenir au pouvoir. Mais l’opinion publique, d’abord favorable à l’attaque, pourrait basculer face aux limites révélées par la riposte iranienne. La paix avec les voisins s'imposera désormais comme une option crédible.
- Sur le rapport de force régional
Cette confrontation aura des effets durables sur l’équilibre régional. Les États arabes observeront avec attention la capacité d’un État comme l’Iran à tenir tête militairement à Israël. Cela pourrait redessiner les alliances, refroidir certaines normalisations diplomatiques, et réactiver des dynamiques de dissuasion nucléaire au #Moyen-Orient.
- Sur le plan du droit international
L’agression israélienne contre l’ #Iran, sans justification reconnue par le droit international, viole la Charte des Nations unies. Pourtant, les États occidentaux n’ont ni condamné cette action ni rappelé les principes de souveraineté. En invoquant une « guerre préventive » — non reconnue juridiquement — pour justifier l’attaque, ils valident un double standard. Or selon leur propre définition, les États qui ne respectent pas le droit international sont qualifiés d'«États voyous».
Chaque message de Van der Leyen est une raison de quitter l'UE
Commentaire peu politiquement correct de Hal Turner, qui a posté cette chose imprimée par la Présidente (non élue) de la C.E. : "La Gauleiter Ursula von der Führer annonce simultanément que l'Iran ne doit jamais se doter de la bombe (même s'il n'existe aucune preuve qu'il tente d'en fabriquer une), et affirme que le droit international doit être respecté et que l'Iran doit s'engager dans une solution diplomatique crédible.
Ceci après que l'Iran a déjà été bombardé sans déclaration de guerre à deux reprises au cours des dix derniers jours, sans mentionner toutes les frappes aériennes qu'il a subies, ses hôpitaux et ses ambulances délibérément ciblés, et après avoir tenté de négocier uniquement pour que les autres parties bombardent leurs diplomates et attaquent leur territoire pendant les négociations.
C'est une chose pour von der Leyen d'être un serpent nazi, une escroc corrompu et une menteuse congénitale, mais ici, avec son message, nous atteignons de nouveaux sommets de schizophrénie."
like this
Emmanuel Florac, alexandrehedan and mishal like this.
Emmanuel Florac reshared this.
est-ce vraiment étonnant?
fr.wikipedia.org/wiki/Programm…
un lanceur d'alerte israélien a fait 18 ans de prison et maintenant il lui est interdit de quitter le territoire ( voir sur investig'action)
les médias main stream aux mains des milliardaires s'alignent sur Israël et les médias publics ne font pas mieux(il n'y a plus de distanciation comme le faisait Charles Anderlin), seuls quelques médias indépendants et privés (comme la dépêche par exemple) ont un autre regard
alexandrehedan likes this.
Mais comme l'UE, les milliardaires serrent trop fort et toujours les mêmes. Ils sont en train de scier les forces vives, les enthousiasmes, les dynamiques sociétales dont ils se repassaissent, en vrais vampires qu'ils sont. Et ça va les tuer, pour peu qu'on les aide un peu à se péter la gueule.
alexandrehedan likes this.
Israelis are flocking to Cyprus like it was promised to them in a 3,000 year old book. Cypriots are freaking out about the loss of sovereignty as Zionists buy up huge chunks of real estate, in case they lose occupied Palestine. It could be a matter of time until Cypriots are forced out of their homes into concentration camps and called "antisemites" for objecting. The world let Zionists get away with this once so don't doubt it would let it happen a second time.
councilestatemedia.uk/p/countr…
Country that broke 962 ceasefires breaks another one...
You never guess which country I'm talking about...Ricky Hale (Council Estate Media)
Péonia on X: La prophétie de Todd sur la guerre en Ukraine: pourquoi la Russie a déjà gagné et pourquoi l'Europe s'autodétruit.
via Strategic Culture
📍Il y a des voix qui, dans le grand fracas de l’histoire, murmurent des vérités que personne ne veut entendre. Et puis, il y a celle d’Emmanuel Todd. Historien, démographe, essayiste, Todd n’est pas un commentateur ordinaire. C’est l’homme qui, en analysant les taux de mortalité infantile et les structures familiales, a prédit l’effondrement de l’Union soviétique alors que tous la croyaient éternelle. Un « détective de la démographie » capable de discerner les fissures profondes sous la surface des empires.
Aujourd’hui, cette voix s’exprime à nouveau, avec une clarté brutale qui ébranle nos certitudes. Dans une récente interview explosive accordée à la presse germanophone, Todd ne mâche pas ses mots. Le sujet est la guerre en Ukraine, mais son analyse va bien au-delà du champ de bataille. Elle parle de nous. De notre avenir. Sa thèse, simple et terrifiante, est la suivante : la Russie a gagné la guerre, et l’Occident, perdu dans un labyrinthe d’illusions, ne s’en est même pas rendu compte.
Il ne s’agit pas de l’opinion d’un « idiot utile » du Kremlin, comme il s’attend lui-même à être qualifié. C’est le diagnostic implacable d’un médecin observant son patient – l’Europe – s’infliger des blessures mortelles, persuadé de lutter pour son salut. C’est un voyage au cœur des ténèbres de notre époque, une analyse que nous devons avoir le courage d’écouter.
📍Le choc de la normalité : un voyage à Moscou
Pour comprendre le raisonnement de Todd, il faut commencer par là : Moscou. Invité à une série de conférences, l’intellectuel français s’attendait à trouver une capitale assiégée, écrasée par les sanctions et le poids d’une guerre totale. Au lieu de cela, il a vécu ce qu’il appelle un « choc de normalité ».
Imaginez la scène. Les rues grouillent de vie, les regards rivés sur les smartphones. Les magasins sont pleins, les paiements s’effectuent par carte bancaire, les trottinettes électriques filent comme à Paris. Todd relève un détail presque comique, mais révélateur : « La grande différence, c’est que tous les escalators et ascenseurs fonctionnaient. » Ce n’est pas l’image d’un régime au bord de l’effondrement. C’est celle d’un pays qui a absorbé le choc, s’est réorganisé et continue de vivre.
Cette « normalité » n’est pas anecdotique, mais constitue le premier pilier de sa thèse. Alors que l’Ukraine mène une guerre existentielle pour sa survie, pour la Russie, il s’agit d’une opération stratégique qui, malgré un coût humain terrible, n’a pas déstabilisé le cœur du système. Les sanctions, selon Todd, ont même eu un effet paradoxal : elles ont contraint Poutine à mettre en œuvre des mesures d’autarcie économique et à renforcer des liens commerciaux alternatifs, des politiques qu’il n’aurait jamais pu imposer en temps de paix. La Russie s’est adaptée.
📍L’Occident, en revanche, semble avoir perdu le contact avec la réalité.
L’Apocalypse comme révélation : la défaite de l’Amérique et le déclin de l’Occident
Quand Todd affirme que la Russie a gagné la guerre, il ne parle pas d’un défilé triomphal à Kiev. Son analyse est stratégique. L’objectif premier des États-Unis, explique-t-il, était d’utiliser l’armée ukrainienne comme un intermédiaire pour infliger une défaite stratégique à Moscou, l’affaiblir et provoquer son effondrement. Ce plan a échoué.
Consciente de l’impossibilité de faire plier la Russie sur le terrain, l’Amérique a changé de cap et déclaré une guerre commerciale ouverte à la Chine. Pour Todd, c’est là le véritable tournant. C’est le début de l’Apocalypse, non pas au sens de la fin du monde, mais dans son acception biblique originelle : une « révélation ». La guerre en Ukraine a mis au jour une vérité cachée : la puissance américaine n’est plus absolue.
Les arsenaux se vident, la capacité de production militaire est en difficulté, et le contrôle du système financier mondial commence à vaciller.
Dans ce grand jeu, l’Europe est la véritable victime, la véritable perdante. Ses dirigeants, de Macron à Merz, s’agitent, promettent des armes, prononcent des discours enflammés, mais n’ont aucun poids dans la conduite de la guerre. « Ils sont les marionnettes des Ukrainiens et des Américains », assène Todd, « mais ils n’ont pas encore compris que la guerre est perdue. » Ils fournissent armes et argent, mais sont exclus des décisions importantes. Ils rêvent de poursuivre une guerre que d’autres ont déjà décidé d’abandonner.
📍L’envie de suicide : le psychodrame d’une Europe à la dérive
C’est ici que l’analyse de Todd devient plus sombre et plus inquiétante. Observant l’Europe de l’extérieur, il perçoit les signes d’une pathologie profonde, une sorte de folie collective qu’il décrit par une expression glaçante : « une soif de suicide » (Sehnsucht nach Selbstmord).
Il ne s’agit pas d’une exagération, mais d’un diagnostic étayé par des décisions politiques qui semblent inexplicables, sinon comme des actes d’automutilation :
• Des sanctions contre la Russie qui ont porté bien plus de préjudice à l’industrie européenne qu’à l’industrie russe.
• La décision de l’Allemagne d’abandonner l’énergie nucléaire en pleine crise énergétique, qualifiée d’« absurde » par Todd.
• Le renoncement volontaire au gaz russe bon marché, pilier de la compétitivité industrielle allemande, sans plan B durable.
Pour Todd, ce n’est pas de la politique. C’est une « maladie des classes dirigeantes », une élite qui a perdu tout sens des réalités et des responsabilités, prisonnière d’un moralisme abstrait qui la pousse à prendre des décisions contraires à ses propres intérêts vitaux. C’est un continent qui, sous couvert de défendre des valeurs pacifistes, prolonge une guerre sanglante. Un paradoxe révélateur d’une profonde crise identitaire.
📍L’ombre de l’Allemagne : le danger que nous refusons de voir
Si l’Europe est la grande perdante, l’Allemagne en est le cœur problématique. L’analyse de Todd sur le rôle de l’Allemagne est peut-être la partie la plus originale et la plus alarmante de son entretien. Selon lui, l’Allemagne a perdu sa souveraineté. Le silence assourdissant de ses institutions et de ses médias sur le sabotage de Nord Stream en est la preuve la plus flagrante. « L’Allemagne est à nouveau un pays occupé », affirme-t-il, « et sa véritable capitale est Ramstein », la plus grande base aérienne américaine en Europe.
Mais c’est l’avenir qui l’inquiète le plus. L’idée, portée par le nouvel establishment politique allemand (incarné par Friedrich Merz), de construire « l’armée la plus puissante d’Europe » est perçue par Todd comme un acte d’« irresponsabilité historique ». Pourquoi ? Parce que, contrairement à la France ou à la Grande-Bretagne, l’Allemagne dispose d’un immense potentiel industriel. Si ce potentiel était mis au service d’un réarmement massif, la perception de la menace en Europe changerait radicalement.
Todd rappelle un fait historique que l’Occident semble vouloir oublier : l’Allemagne est responsable de la mort de 25 millions de Russes pendant la Seconde Guerre mondiale. Que l’Allemagne, plus que quiconque, envisage aujourd’hui de se réarmer contre la Russie est un fait qui ne passe pas inaperçu à Moscou. Face à ce qu’elle perçoit comme une menace existentielle, la doctrine militaire russe prévoit le recours à des armes nucléaires tactiques.
Le scénario cauchemardesque de Todd va encore plus loin. Il craint que, sous couvert d’un antifascisme de façade, l’Allemagne n’adopte des méthodes illibérales contre la dissidence interne, à l’image de l’AfD. Sa vision est terrifiante : une Europe où, bientôt, les Français et les Polonais pourraient redouter davantage les Allemands que les Russes.
La fin de la mondialisation et le retour de l’histoire.
Tout cela – la guerre, la crise européenne, le réarmement allemand – ne sont pas des événements isolés. Ils sont les symptômes d’un processus bien plus vaste : la fin de la mondialisation. Le mythe d’un monde plat, sans frontières, où les cultures sont interchangeables et où seul le marché compte, s’effondre sous nos yeux.
Le Brexit, Trump et le succès des forces populistes en Europe ne sont pas des accidents, mais la preuve que les peuples veulent redevenir eux-mêmes. « Il s’avérera que les gens sont très différents », affirme Todd. « Les Italiens sont italiens, et les Français sont français. » Cette « implosion de la mondialisation » est la deuxième Apocalypse, la deuxième révélation : le retour des nations, avec leurs identités, leurs intérêts et leurs peurs ancestrales. Et cela, prévient-il, pourrait conduire à l’effondrement de l’Union européenne.
Qu’est-ce que cela signifie pour l’avenir ? Cela signifie que la Russie ne fait plus confiance à l’Occident et ne croit plus aux traités. Poutine, selon Todd, poursuivra ses objectifs stratégiques : la conquête de toute l’Ukraine orientale jusqu’au Dniepr, y compris Odessa, pour sécuriser la flotte russe, et la neutralisation complète de ce qui reste de l’État ukrainien.
Les thèses d’Emmanuel Todd sont dérangeantes.
Provocatrices. Pour beaucoup, inacceptables. Mais la question n’est pas de savoir si elles nous plaisent. La question est : et s’il avait raison ? Et si, avec notre présomption morale et notre aveuglement stratégique, nous étions les artisans de notre propre ruine ? Ignorer son analyse est un luxe que nous ne pouvons peut-être plus nous permettre.
strategic-culture.su/news/2025…
#géopolitique #impérialisme #guerre
xcancel.com/Galadriell__/statu…
La Profezia di Todd sulla Guerra in Ucraina: Perché la Russia ha già Vinto e l’Europa si Autodistrugge
Ci sono voci che, nel grande frastuono della storia, sussurrano verità che nessuno vuole ascoltare. E poi c’è la voce di Emmanuel Todd. Storico, demografo,…Strategic Culture Foundation
fanch_301 likes this.
piaille.fr/@DionyZack/11473898…
+
revolutionpermanente.fr/377-00…377 000 disparus à Gaza : un rapport basé sur des données de Tsahal dévoile l'ampleur du génocide
Un rapport publié par Harvard révèle que d'après les données fournies par Tsahal, environ 377 000 Gazaouis auraient disparu entre octobre 2023 et juin 2025. Un chiffre glaçant, qui confirme l'ampleur du génocide en cours à Gaza.Axel Justo (Revolution Permanente)
like this
Carter Braxton likes this.
www.pyongyangtimes.com.kp
Articles about politics, economy, culture, history, sports, tourism in DPRKwww.pyongyangtimes.com.kp
Give the clown the Nobel Peace
Channel 12: “Netanyahu was preparing to strike 15 Iranian targets –Trump stopped him”
To maintain the ceasefire
Prize
Le très regretté Bernard Stiegler explique dans cette vidéo que la prolétarisation c'est le moment où le savoir est externalisé dans des machines, et où l'opérateur devient un prolétaire asservi par le propriétaire de la machine.
files.mastodon.social/cache/me…
like this
Laurent Espitallier and gr_perso like this.
Emmanuel Florac reshared this.
If you're making music that can even obliquely be considered "protest music," I'd love to help you get it out there by mixing and mastering for cheap (or even free, depending on your financial circumstances).
Art made by conscientious people is very good for the world.
I've already mixed and mastered one protest song from a mutual here on fedi. 😀 Allow me to help, if you need. Send me a DM or find my email from my website.
Lyon abandonne Microsoft office pour renforcer sa « souveraineté numérique » - Next
La Ville de Lyon va progressivement remplacer la suite Microsoft par des logiciels bureautiques libres, dont « Only Office pour la bureautique, ainsi que Linux et PostgreSQL pour les systèmes et bases de données ».
next.ink/brief_article/lyon-ab…
Lyon abandonne Microsoft office pour renforcer sa « souveraineté numérique » - Next
La Ville de Lyon va progressivement remplacer la suite Microsoft par des logiciels bureautiques libres, dont « Only Office pour la bureautique, ainsi que Linux et PostgreSQL pour les systèmes et bases de données ».Next
like this
Carter Braxton, Pacomm, Anne, redj 18, didié nietzsche / A Limb, Greg A. Woods and Laurent Espitallier like this.
Pacomm reshared this.
like this
Carter Braxton and Anne like this.
Pacomm likes this.
Well, here's a piece of good news! The #Coop is going to boycott #Israel over the #GazaGenocide.
Support the Co-op, folks!
mailchi.mp/palestinecampaign/t…
Here's confirmation from the Jewish chronicle.
thejc.com/news/uk/co-op-to-sto…
Co-op to stop stocking Israeli goods after pressure from activist members
The supermarket has banned goods from Russia, Iran Yemen and Israel, due to its ‘commitment to peace’Jane Prinsley (The Jewish Chronicle)
Nanook likes this.
Our socials: fediverse.blog/~/ActaPopuli/fo…
Follow us on social
(main) @actapopuli@friendica.vrije-mens.org
(backup) @actapopuli@friendica.rogueproject.org
Wir veröffentlichen den Maskenbericht (ohne Paywall 🤓) !
Seit Monaten hält das Gesundheitsministerium den Sudhof-Bericht zu Jens Spahn, den Corona-Masken und den offenbar verschwendeten Milliarden geheim. Das Argument? Verschlusssache.
Die Masken-Affäre muss vollständig aufgeklärt werden. Die Öffentlichkeit hat das Recht zu erfahren, ob die Vorwürfe der Milliardenverschwendung begründet sind oder nicht, deswegen veröffentlichen wir den Bericht.
Lest hier rein: fragdenstaat.de/dokumente/2716…
Bericht der Sachverständigen Beraterin Dr. Margaretha Sudhof
"Maskenbericht" Januar 2025 Schwärzungen durch das BundesgesundheitsministeriumFragDenStaat
IRGC Commander Xenophon
in reply to GolfCartLady ⛳️ • • •