vulnerable users

The Signs With // Superpowers

Aries: Fire Manipulation - Users can create, shape and manipulate fire, the rapid oxidation of a material in the exothermic chemical process of combustion, releasing heat, light, and various reaction products, flame being the visible portion of the fire. Depending on the substances alight, and any impurities outside, the color of the flame and the fire’s intensity will be different.

Originally posted by painfulblisss

Taurus: Psychometry - The user obtains historical memories or sensations concerning beings and objects they can observe by their senses. With objects they gain the knowledge including the makers, users, and even those who have on passing used the object, and what has been done with it. With living beings or parts of the body the user learns their general life-history, but doesn’t gain anything of what they were thinking or feeling.

Originally posted by imekova

Gemini: Metamorphosis - User can enhance themselves and others via accelerated evolution process by triggering a bodily recovery system, resetting their genome and upgrading to a better physical form. Upgrading can lead to new physical enhancements. High end wielders of this ability can control the very flow and essence of progressive mutation.

Originally posted by caquitasloves

Cancer: Animal Morphing - The user can transform into animals, as well as use the abilities, traits and appearance/physiology of animals by rearranging their own DNA structure. Some may have this ability from an empty genetic code, allowing them to accept any form from which they have a DNA sample, others may be able to alter their form mentally and change just by seeing and mimicking animal features.

Originally posted by mernolan

Leo: Summoning - The user can transport person, creature, or object of choice by means of Teleportation, Dimensional Travel, Portal Creation or some other way. This may also result from a previous summoning contract, which creates a connection between the summon and summoner. High level users may not be bound by restrictions such as a contract, and can summon anything they want, including powerful beings or “familiar spirits” and often require strong mystic connections to where these entities reside. Users can call upon fairies, angels, demons, or animal spirits, just to name a few. The summoning can backfire, however, leading to any number of misfortunes, such as the summoned person, creature, or item causing harm to the summoner.

Originally posted by boymeetstacos

Virgo: Substance Mimicry - User is or can transform their body completely into fundamental elements, including air, earth, electricity, fire, light, shadow, water, etc. User’s transformed form can be either anatomically identical to their normal form, aside of being made of element, in which case it contains all organs and is somewhat vulnerable to attacks. Alternately user can transform into homogenous matter, without any part of their form being more important than the other.

Originally posted by rosgakori

Libra: Empathy - The user can fully interpret and replicate the emotions, moods, and temperaments of others without reading apparent symptoms, allowing them to understand introverts or discover one emotion is actually hiding another. They can attack someone in a personal and emotional way since they know exactly what emotion is flowing through themselves and can use this knowledge to play against them. Some users may learn to read emotional imprints left into environment or objects. Usually over time, an Empath’s power grows to the point that they can manipulate emotions on others, and possibly use them to empower themselves. User may learn to extend their power over/on vast number of sentient beings or reach extreme distances, even other levels of existence but this may be possible only if the user has emotional link to those they search already in effect.

Originally posted by mattzanimation

Scorpio: Elemental Blast - The user can release their elements/energy over a specific target area causing great damage and/or delivering great shock waves of pure force.

Originally posted by chuckles-hansen

Sagittarius: Wing Manifestation - User has or is able to manifest wings that grow or are attached to the body allowing flight. They may also protect from rear attacks or detach and re-grow for quick getaways.

Originally posted by crazysweetchild

Capricorn: Dimensional Awareness - The user can sense activity in these portals from their own world. They can go so far as to detect the outer reaches of a dimension, even breaking the fourth wall. 

Originally posted by thegreatbentennyson

Aquarius: Intangibility - User is able to move through objects and ignore most physical effects in their way, exact means how this is done vary between slipping partially into other dimensions, being able to make their own particles move between other particles, being non-physical being of energy, vibrating their molecules into a new quantum frequency, etc. Regardless the user is able to ignore most attacks, physical dangers and gravity.

Originally posted by hirule

Pisces: Dream-World Lordship - User has duty and domain over the Dream-World, place where dreams come and go while it advances into the users own hands. User can very well control the Dream-World and the dreams that come and roam around freely, as well as nightmares and daydreams. Also can spy on dreams and come inside dreams as well.

Originally posted by sombraoscura

for the way you said “i love you” prompts

second prompt for @bookmusicalover! #31 for ladynoir except it turned into marichat halfway through and i didn’t realize it until it was almost finished. so that happened. enjoy! i also decided to explore the idea that since kwamis get tired after their powers are used that might leave the miraculous user more vulnerable.

“How about you blast off?”

“Take this!”

The rocket and bandalore exploded as they made contact, sending the hero and akuma flying back. A brick wall greeted Ladybug’s back with vigor, and she groaned as stray debris ricocheted off the suit. Pyrotech was really starting to piss her off. Lucky charm hadn’t worked, she really needed to find a place to recharge Tikki, but there’s not much she could do when someone basically threw a bomb at her.

Ladybug grumbled under her breath, brushing off her suit as she stood, and winced when her fingers hit something tender…and soft. She looked down. There was a tear in her suit; long, diagonal, and right across her ribs. The skin hadn’t broken, but it was rubbed raw and bright pink. It felt so wrong—the suits were supposed to be indestructible. Maybe not when Tikki is already so weak from lucky charm, her mind answered.

“Chat,” she whispered. Her hands hovered over the exposed skin, fearful of what this meant. “Chat Noir!”

His green eyes found hers instantly across the street, pupils narrowing, and she watched them move down to her torso. He took a step towards her, staring at the wound, but his face was suspiciously blank.

There was a tremor moving through her limbs. The transformation had maybe two minutes left, but she couldn’t bring herself to move. All she felt like doing was crying—what had she done? Was Tikki okay? If Ladybug only had a graze, what was her kwami suffering? There were too many questions buzzing through her mind, and she would probably break down right there in the street if Chat Noir echoed back the same panic. It would have been too much emotion to handle.

Instead, he extended his baton, gripped it like a baseball bat, and whipped around to send the akuma flying.

She gasped, her eyes following Pyrotech until golden hair interrupted her view.

“Can you move? Is it bleeding?” he murmured.

Chat Noir knelt next to her, one hand against her ribs while the other cupped her cheek. He had just aggressively batted a man across Paris, yet now he was so gentle with her. The tears finally came, and she reached out to hug him just as her earrings beeped their final warning. That sent Chat into a frenzy.

“Come here, come here.” He gathered her up, their chests flush against each other as she wrapped her arms around his neck and his around her waist. There was no time to position her legs as he started running.

Her chest heaved painfully against his, small jolts of pain striking her wound, as she struggled to breathe through her sobs.

“She—she’s hurt and it’s al—all my f—fault! I can’t—“

“Shhh, Marinette, it’s okay. We’re almost home.”

“H—home?” She opened her eyes.

With one last leap, Chat Noir landed. It looked a lot like her balcony, but she wasn’t completely sure through the tears. His head moved back and forth, soft hair brushing her cheek, and then he knelt to open the hatch. The bed bounced under them and her room glowed as Tikki finally escaped the earrings.

Marinette lunged forward to catch her, and they both hissed as their injuries burned.

“Hey, take it easy!” This was the first time Chat’s voice rose as he dragged Marinette onto his lap, her right shoulder settling against his collarbone.

She blinked quickly to see through her tears, and her breath stuttered when she saw a mirrored wound on Tikki’s body. The cut was black and the area around it a deep purple. So different from a human wound, but Marinette knew without a doubt that Tikki was in pain.

“Oh, Tikki,” she cried. “Tikki, I’m so sorry. I wasn’t thinking about how tired you must be and you still protected me and it’s all my fault and I failed as Ladybug…”

Marinette blubbered out all the apologies that had rattled in her chest since the hit, nuzzling her kwami against her wet cheeks. Tiny paws patted her chin in comfort, but they were weaker than normal.

“I’m okay, Marinette. I just need some cookies,” Tikki whispered.

“Oh, no you don’t.” Cupping his hands over Marinette’s, Chat Noir scooped Tikki up and placed her on a pillow. The pad of one finger stroked the black dot on her head, careful not to scratch. “You’re exhausted and hurt, Tikki. You’ll kill yourselves if you go back out there.”

She sniffed and wiped her eyes. “But you need us. We have to purify the akuma.”

“Of course I need you,” he continued to pet Tikki while his other hand moved to rub Marinette’s back, “but trust that I can handle this one.”

“You shouldn’t have to do it alone. I don’t want you to get hurt,” she murmured.

He laughed. “And why do you think I want you to stay here?”

Fair enough. She closed her eyes, suddenly aware of the ache in her body. “Are you sure?”

“Paw-sitive. Trust me.”

Marinette choked out a laugh. “How are you so calm?”

He sighed and titled her head to settle on his chest. The skin under his suit pulsed in quick, short bursts. “I’m not. When I saw you on the ground you looked so terrified and I just…I pushed my feelings down. You came first.”

The heartbeat under her ear infected her body like an illness. Hers began to beat in unison, and a pleasant tingle overshadowed the ache in her stomach.

“Think of yourself more, kitty.”

His claws racked up and down in soft motions, and her sore muscles thawed under his attention. Tikki was making happy chirping noises on the pillow as his finger curled to rub under her chin. The affection he could hold and show so easily amazed her.

Chat Noir sighed, unaware of how much his actions were affecting her. “I don’t think around you.”

Something we can agree on, her heart whispered. Turning her head, Marinette placed her lips on his chest, over his heart. The suit was smooth on her skin as she kissed it.

“Thank you, Adrien. I love you.”

“You—?” His body shuddered under her lips. “You love me?”

“Yes.” Marinette stretched to kiss his jaw. “You’re amazing.”


AKA The Contention Form or The Way of the Ysalamiri.

He is a fencer. Leverage, position, advantage—they are as natural to him as breathing.

The answer to Form I’s clumsiness, it’s focused on lightsaber-to-lightsaber fights and dealing with single opponents.

Precision combined with a tighter grip on the lightsaber, Makashi practitioners snake through their opponents’ defences, jabbing instead of slashing, deflecting instead of blocking, slowly but surely chipping away even the tougher defences.

It’s the Form of the feints and timing, the only acrobatics in it are meant to distract and confuse.

Positive Aspects: it’s the form that tires the least, strength is not the focus, it’s the swiftness of the wrist. Some compare Form II to a dance because the practitioner strives to move in his/her own rhythm, not bound by predetermined movesets.

Negative Aspects: Form II has two small weaknesses that can be overcome through great skill (its poor blast-deflection and its reduced effectiveness against more than one skilled blade user, as it leaves defence open in ways other enemies can take advantage of), and the most glaring weakness of all: low kinetic power. Because of the weaker swings, blocking and slashing in Form II are only used exceptionally - a strong defence can counter a Makashi slash quite easily and a strong overpowering offence can tear apart a Makashi block and leave its user dangerously vulnerable.

like idk, i’m an old egg and have been around for many “[x-crowd] V.S [y-crowd]” “”fights””, and this kind of shit is like page 1 of the crap massively insecure people will do to validate hatred towards another group by means of using vulnerable users as a target


Top 5 stories in tech this week

Yahoo hack in 2013 left more than 1 billion users vulnerable.

A data breach in August 2013 may have left more than 1 billion Yahoo user accounts vulnerable, according to the company, with a plethora of personal information being released. The information includes names, addresses, emails, dates of birth, hashed passwords, unencrypted and encrypted security questions and telephone numbers. According to Yahoo, the hack did not leak credit card numbers, bank account details or unencrypted passwords, Wired reports. Read more

Uber launched self-driving cars in San Francisco.

Ride-hailing company Uber launched self-driving cars in its hometown of San Francisco on Wednesday. The Volvo XC90 SUVs are not driver-less — similar to Uber’s Ford Fusion self-driving debut in Pittsburgh in September, the self-driving cars in San Francisco will have a safety driver and Uber test engineer onboard. Uber customers who request UberX may be picked up by an autonomous vehicle. Since its debut, Uber has been tangled up in permit issues and has been asked by California regulators to stop its self-driving car service. Read more

Facebook announced it will tackle fake news with new tools.

Facebook has come out with a plan on how it will curb fake news from spreading on the social media platform. Reuters reports that Facebook will make it easier for its 1.8 billion users to flag fake news articles and the social media giant will work with fact-checking websites (e.g. Snopes, the Associated Press and ABC News) to determine if a story is authentic. Disputed articles will be flagged and accompanied by a note detailing why it cannot be promoted. Read more

Obama spoke about Russia’s cyber attacks.

In an interview with the NPR, Obama commented on the role Russian cyber attacks played in the U.S. election, after the White House suggested Russian President Vladimir Putin played a role in the hacks. “I think there is no doubt that when any foreign government tries to impact the integrity of our elections … we need to take action,” Obama said, the Guardian reports. “And we will – at a time and place of our own choosing.” Read more

Twitters cut off access to geospatial intelligence data.

Twitter has cut off access to a social media monitoring tool that was being used by police intelligence centers — also called fusion centers — to gather geospatial intelligence data. “Our long-standing position has been that the use of Twitter data for surveillance is strictly prohibited and we continue to expand our enforcement efforts,” Twitter said in a statement. According to the ACLU, Twitter’s decision affects the 77 fusion centers around the country. The ACLU of California previously discovered through a public records request that the tool, called the Geospatial Analysis Application, allowed for location-based tracking. Read more

follow @the-future-now

Bug that can leak crypto keys just fixed in widely used OpenSSH

External image
Guilherme TavaresA critical bug that can leak secret cryptographic keys has just just been fixed in OpenSSH, one of the more widely used implementations of the secure shell (SSH) protocol.
The vulnerability resides only in the version end users use to connect to servers and not in versions used by servers. A maliciously configured server could exploit it to obtain the contents of the connecting computer’s memory, including the private encryption key used for SSH connections. The bug is the result of code that enables an experimental roaming feature in OpenSSH versions 5.4 to 7.1
“The matching server code has never been shipped, but the client code was enabled by default and could be tricked by a malicious server into leaking client memory to the server, including private client user keys,” OpenSSH officials wrote in an advisory published Thursday. “The authentication of the server host key prevents exploitation by a man-in-the-middle, so this information leak is restricted to connections to malicious or compromised servers.”
The advisory said that anyone using a vulnerable version should update right away. Those who are unable to update should disable roaming by adding the string UseRoaming no to the global ssh_config(5) file or to the user configuration in ~/.ssh/config, or by entering -UseRoaming=no on the command line.
According to a separate advisory from Qualys, the security firm that discovered and privately reported the vulnerability, the information leak can be exploited only after the end user has been successfully authenticated by the server. While that drastically reduces the chances of the bug being exploited in the wild, Qualys researchers held out the possibility that highly determined attackers already may have made use of the bug, possibly by compromising legitimate servers trusted by end users. Such exploits would be useful once attackers had already compromised a targeted server and wanted to ensure continued access in the event the initial entry point had been fixed.
“This information leak may have already been exploited in the wild by sophisticated attackers, and high-profile sites or users may need to regenerate their SSH keys accordingly,” they wrote.
By giving attackers the ability to read the RAM of vulnerable computers, the bug has similarities to the 2014 Heartbleed vulnerability that affected the OpenSSL crypto library. That bug was much more serious because it made it possible for anyone with moderate hacking skills to exploit any website that used OpenSSL. By contrast, the OpenSSH bug can only be exploited after a vulnerable end user connects to a maliciously configured server.
Post updated to add details from Qualys advisory.

Bug that can leak crypto keys just fixed in widely used OpenSSH was originally published on Cyber Parse

Ghoul Lesson 2/?

I. Kagune
kagune is a ghoul’s predatory organs and functions as a weapon and claws.

  • An ukaku kagune is spread out like feathers. It is released from the shoulder and can deliver high-speed attacks. This kagune is suited for short-distance and long-distance attacks.
  • The release of Rc cells for an ukaku-type user is draining and causes a lack of endurance. This is disadvantageous in lengthy battles.
  • Ukaku-type users can overtake bikaku-type users the easiest, and they are most vulnerable against koukaku-type users.

Important Security Update for Yahoo Mail Users

Security attacks are unfortunately becoming a more regular occurrence. Recently, we identified a coordinated effort to gain unauthorized access to Yahoo Mail accounts. Upon discovery, we took immediate action to protect our users, prompting them to reset passwords on impacted accounts.

Based on our current findings, the list of usernames and passwords that were used to execute the attack was likely collected from a third-party database compromise. We have no evidence that they were obtained directly from Yahoo’s systems. Our ongoing investigation shows that malicious computer software used the list of usernames and passwords to access Yahoo Mail accounts. The information sought in the attack seems to be names and email addresses from the affected accounts’ most recent sent emails.

What we’re doing to protect our users

  • We are resetting passwords on impacted accounts and we are using second sign-in verification to allow users to re-secure their accounts. Impacted users will be prompted (if not, already) to change their password and may receive an email notification or an SMS text if they have added a mobile number to their account.

  • We are working with federal law enforcement to find and prosecute the perpetrators responsible for this attack.

  • We have implemented additional measures to block attacks against Yahoo’s systems.

What you can do to help keep your accounts secure

In addition to adopting better password practices by changing your password regularly and using different variations of symbols and characters, users should never use the same password on multiple sites or services.  Using the same password on multiple sites or services makes users particularly vulnerable to these types of attacks.

We regret this has happened and want to assure our users that we take the security of their data very seriously.

For more information, please check our Customer Care help page.

By Jay Rossiter, SVP, Platforms and Personalization Products


This website sometimes fosters an overly familiar atmosphere between and towards relative strangers and its very easy to overstep boundaries and make people feel uncomfortable without even knowing it and I’m aware theres also a lot of younger or vulnerable users on here and maybe in my followers or even mutual lists as well and I just wanna make sure everyones knows that if my following you or reblogging your pics or talking to you in a certain way or even at all or absolutely anything else has ever made you feel uncomfortable then please please please please know youre totally within your rights to call me out on it and please feel free to do so if you ever need or want to.

Your comfort and safety is paramount.