Normální zobrazení

Received before yesterday

Security researchers claim Persona, the provider behind Discord's UK age verification 'experiment', performs '269 individual verification checks' on user data, including those for terrorism and espionage

20. Únor 2026 v 18:45

Discord's age verification rollout has been met with... shall we say, dismay by many users of the platform, with many hunting for a better, more privacy-focused alternative.

The news was even less well-received when Discord informed some UK users that they may be part of an "experiment" with an age verification provider called Persona, the lead investor of which, in its most recent rounds of capital funding, was a venture fund co-founded and directed by none other than Peter Thiel.

You know, the co-founder of Palantir, a surveillance technology firm that's been hitting headlines recently for working on apps to help track targets of the US government's deportation efforts. And claims that it may compile databases from the private information of US citizens. Naturally.

Discord later said that it had concluded testing with Persona's platform. Anyway, security and private data concerns around Persona's data verification efforts have been spreading, and now three security researchers say they've discovered a Persona frontend that was exposed to the open internet on a US government-authorised server (via Rage).

Quoting directly from the researcher's blog, the team says its work was supposed to be a "passive recon investigation," which quickly turned into "a rabbit hole deep dive into how commercial AI and federal government operations work together to violate our privacy every waking second."

"We didn’t even have to write or perform a single exploit, the entire architecture was just on the doorstep," claims the team.

Person typing on a laptop with red and blue lighting

(Image credit: Westend61)

"53 megabytes of unprotected source maps on a FedRAMP government endpoint, exposing the entire codebase of a platform that files Suspicious Activity Reports with FinCEN, compares your selfie to watchlist photos using facial recognition, screens you against 14 categories of adverse media from terrorism to espionage, and tags reports with codenames from active intelligence programs.

"2,456 source files containing the full TypeScript codebase," the blog continues. "Every permission, every API endpoint, every compliance rule, every screening algorithm. Sitting unauthenticated on the public internet. On a government platform no less."

Beyond the astonishing thought that such data could be accessed so easily, it certainly seems like Persona operates more deeply than anyone would reasonably expect. The researchers say that the full verification program performs 269 individual verification checks across 14 check types, including "SelfieSuspiciousEntityDetection".

"What makes a face 'suspicious?'", say the researchers. "The code doesn't say. The users aren't told."

The process for verifying your age on Discord using Death Stranding

(Image credit: Future)

What we're often told, however, is that age verification is in our best interests, in an effort to prevent children from watching harmful content. Still, it doesn't take a genius to realise that there's a whole lot more value in facial recognition data than simply verifying that someone's old enough to view adult material.

How much of this leak applies to Discord's earlier testing is unclear. However, it's an excellent example of why privacy advocates have been vocally uncomfortable with the idea of current digital age verification methods, and why you should be very, very picky about who you hand your data over to. If, let's be honest, anyone at all.

Cloudflare says DDoS attacks have multiplied to 1.7x last year's count and at points there's been about one attempt every second

3. Prosinec 2025 v 15:00

If you thought the AI industry deals with big numbers—millions of tokens, giga-zigga-exa-flexa-FLOPs (a very real metric, I tell you)—wait until you hear about the internet. That thing has been taking an absolute beating over the last year. We've seen very visible effects of this with various memorable outages, but now we've also got some numbers to put to it, in the form of "hyper-volumetric" DDoS attacks.

Giant content delivery network (CDN) Cloudflare has released some somewhat troubling stats and info regarding the past year of distributed denial of service (DDoS) attacks. These are essentially attacks that attempt to flood a target service with packets of data to overload and overwhelm it and prevent it from doing the work it's actually meant to be doing, such as providing an internet connection to customers or displaying webpages.

According to Cloudflare, DDoS attacks are up 170% to 36.2 million in 2025 compared to 2024. To zoom in a little, the company says that in the third quarter of 2025, it "mitigated an average of 3,780 DDoS attacks every hour." That's 63 DDoS attacks each minute, or about one every second.

Not every DDoS attack is a noteworthy one, of course, but there have been a few noteworthy ones over the past few months. In particular, a few were highlighted by Cloudflare over the last couple of months as consecutive record breakers (woo?).

A Cloudflare chart showing DDoS attack statistics for 2023, 2024, and 2025.

(Image credit: Cloudflare)

In the weeks leading up to September there was a DDoS attack that attempted to flood its target with 11.5 Tbps of data. Then, in late September, there was one that topped this with an attempt to flood its target with 22.2 Tbps of data, which equated to 10.6 billion packets of data per second. And then there was one in early October that saw a new record 29.6 Tbps flung at its target. These attacks each lasted less than a minute.

Those small timeframes are a real problem if you don't have automated defenses in place: "most attacks, 71% of HTTP DDoS and 89% of network-layer, end in under 10 minutes. That's too fast for any human or on-demand service to react. A short attack may only last a few seconds, but the disruption it causes can be severe, and recovery takes far longer."

We've seen how long it can take for simple mistakes to be cleaned up and service to be restored. Cloudflare's recent outage, for instance, was caused by a double-sized file propagating throughout the network. This likely happened quite quickly, but it took hours for service to be restored to full, normal functionality.

To simplify probably far too much, DDoS attacks are generally defended by figuring out which packets of data coming in are illegitimate and then simply not processing them. Cloudflare's defenses seem to have done a good job at this, given these big attacks were defended.

CHONGQING, CHINA - JULY 29: In this photo illustration, a person holds a smartphone displaying the logo of Cloudflare Inc. (NYSE: NET), an American web infrastructure and website security company, with the company's cloud logo visible in the background, on July 29, 2025 in Chongqing, China. (Photo illustration by Cheng Xin/Getty Images)

(Image credit: Cheng Xin via Getty Images)

But as Cloudflare's quarterly and yearly stats show, the number and the scale of these attacks seems to be exponentially increasing. According to Krebs on Security, linked previously, the Aisuru botnet responsible for the latest record-breaking DDoS attack apparently caused widespread internet disruption in the US simply due to attempted DDoSing, that's all without the attack succeeding.

A botnet, if you weren't aware, is like a hivemind of connected computers that are usually connected together unbeknownst to their users. All the systems can, at the behest of the attacker(s) in control of the botnet, be prompted to dish out some packets of data that, when combined with all the packets from other computers in the secret network, makes for a giant mass. A mass that barrages a target with, say, 29.6 terabytes per second of data. In "distributed" fashion, ergo, "distributed denial of service."

In other words, lovely stuff to help us sleep at night. It does make me hope my PC isn't some kind of sleeper agent. I'll keep my side-eye firmly planted on its suspiciously unassuming chassis, just in case.

We Have Never Been More 12 Years Old

We Have Never Been More 12 Years Old

On Monday, we reached all-time-high levels of being 12 years old when several government social media accounts shared a deluge of Trump-themed Halo memes. Unfortunately, today those in the halls of power have raised the bar again, making their past selves look downright 13 in comparison.

Now we’ve got White House Deputy Press Secretary Kush Desai and the Department of Homeland Security weighing in, both of whom provided comments on the memes to freelance journalist and Aftermath pal Alyssa Mercante. Desai centered his response around the supposed end of the console wars, which should only matter to you if you died in the 90s while arguing about who’d win in a fight between Mario and Sonic and now haunt the playground you were crawling around on to this day:

“Yet another war ended under President Trump's watch—only one leader is fully committed to giving power to the players, and that leader is Donald J. Trump. That’s why he’s hugely popular with the American people and American Gamers."

(With loud reactionaries, maybe, but with normal people caught in a tornado of tariffs, almost certainly not.)

The Department of Homeland Security’s media team decided to go the openly racist and xenophobic route, because of course they did:

"We will reach people where they are with content they can relate to and understand, whether that be Halo, Pokemon, Lord of the Rings, or any other medium. DHS remains laser focused on bringing awareness to the flood of crime that criminal illegal aliens have inflicted on our country. We aren't slowing down."

Then we have the crown jewel in today’s gold-embossed propeller hat: Vice President JD Vance casually referencing the dumbest, most disingenuous Twitch drama yet during an appearance on New York Post’s Pod Force One podcast. Speaking about his own dog, Atlas, Vance voiced his opinion on CollarGate:

“I kind of obsessively trained him,” Vance said of Atlas. “You could see this: He sits on command, he stays on command. He has this command, place, which is basically if I snap my finger and point, he will run to that place and lay down."

"You don't have to zap him like Hasan [Piker]?" asked the show’s host, Miranda Devine.

"Not like Hasan Piker?” Vance replied in a voice that anyone should be disqualified from running for public office simply for possessing. “ No. No electrocution of dogs here."

"How disgusting is that? What does that tell you about a person?" said Devine, whose unquenchable appetite for boot needs to be studied.

"Well, I think that tells you that they're bad people,” said Vance, 12, who nonetheless possesses the baby brain of someone who was born yesterday. “If you can actually cause suffering to an innocent animal, you're probably the kind of person who doesn't worry about suffering in people as well. And that's been my experience: If you mistreat dogs, that's almost 100 percent a sign that you're gonna be a really terrible person."

Tell that to the 40 million low-income Americans about to lose SNAP benefits. I’m sure they’ll agree with you that the truest measure of a man is his dog, rather than his proclivity for aiding and abetting mass immiseration. Also, I bet JD Vance’s dog hates him, too.

On the upside, while we’ve never been more 12 years old than we are today, we could not possibly become even more 12 tomorrow. I’m sure this is it, and soon everyone will be grownups again.

❌