Delta Libre Blog //

Welcome to Delta Libre Blog!

Greetings, fellow digital explorer! You've just jacked into Delta Libre – a cozy little wormhole where open-source dreams, rebellious code, and digital freedom hold hands and rewrite the rules (probably on a Linux terminal at 3AM).

Here’s where I overthink everything so you don’t have to. From bleeding-edge programming voodoo and galaxy-brain system architectures to the ethical chaos of AI and the glorious mess that is decentralization — we dive deep. The mission? To unplug the Matrix, question the algorithm, and occasionally rant about how JavaScript still kinda sucks.

This card exists for one sacred purpose only:

to publicly declare my undying love for my girlfriend (aka Niusha ). That’s it. No tech, no tips—just pure, romantic overkill. 💘 If you’re here for actual content, head to the blog section in the header before this gets any cheesier.

[STATUS]: Operational.

-- 2025-06-25 03:00 UTC

Buy Me A Coffee

Blog Posts:

life lately: slipping between dreams and silence

Posted on 2025-07-04 by Delta

hi.

lately, i’ve been slipping in and out of nightmares, some while sleeping, some while wide awake.
the kind that leave you frozen.
the kind that don’t need monsters because your own mind knows exactly what to show you.

i’ve been having a hard time talking to people.
like every word feels like too much friction. like the effort of explaining myself costs more than it’s worth.
i try. but it gets harder.

humans feel exhausting lately.
too loud, too messy, too complicated for the part of me that just wants stillness.
they disappoint me more than i can say.
not even in dramatic ways, just... emptily.
like promises with no echo.

and all this work, money, crypto, projects...
honestly? it means nothing to me right now.
i used to think building things would bring meaning.
now it all just feels like noise.

none of it feels real.
except her.
my girlfriend. her birthday’s coming up, and it’s the only thing pulling me forward with any clarity.

and that one friend who still sees me. really sees me.

if they weren’t here, i’m not sure what would be.
i’m not saying anything dramatic.
just... i’d be floating.
nothing to hold on to.

sometimes there’s a tear.
sometimes there’s a flood.
but always in silence.
my family must never know. i’m not ready to explain that kind of quiet.

i’ve been talking less. recording more.
just to prove to myself that i still exist.

this post doesn’t really go anywhere.
it’s just a snapshot of a mind trying to stay tethered to a body.

still blinking.
still doubting.
still loving, quietly.


How I’m Slowly Rewriting My Resignation in Bash

Posted on 2025-07-20 by Delta

Working at my current company is a bit like being the only person with a flashlight in a cave full of people who think shadows are real and light is a conspiracy. I shine the beam, they squint and recoil, then confidently suggest I should make it more user friendly.

To be fair, the company isn’t evil. They’re not malicious. They’re just catastrophically unqualified to be near anything that runs on electricity. Their grasp of software is on par with a medieval farmer trying to interpret an iPhone — mostly suspicion, mild panic, and the occasional plea for divine intervention.

Their idea of a feature request is something like:
“Make it like Google Docs, but also like Excel, but also can you make it auto-send invoices to Neptune every Tuesday?”
This is not satire. This is my actual life.

They want everything immediately, built flawlessly, based on requirements that were mumbled once in a hallway while someone was looking for coffee. I’m expected to conjure fully-functioning enterprise software from vague vibes and hand gestures.

Every conversation turns into a low-budget therapy session:
“Why isn’t it done?”
Because you change your mind more often than Chrome updates.
“Why is it so complicated?”
Because the universe has rules. And software lives in that universe.
“Can’t you just make it simple?”
Sure. Let me go back in time and personally redesign the entire internet.

Now, for context: I’m not just the tech person. I’m a CEH-certified cybersecurity professional, deep into the Hack The Box penetration testing path. I studied AI at Harvard (yes, online, but the algorithms don’t care). I’m an advocate for software freedom in Iran, a contributor to GUN+Linux and several open-source projects.

And yet... they treat me like the guy who installs Chrome extensions. Like some random junior dev who exists to move buttons three pixels to the left. Using me for frontend tweaks and UI padding is like using an axe to butter toast — pointless, dangerous, and deeply disrespectful to both the axe and the toast.

I talk about long-term architecture, security pipelines, and future-proofing our tech stack. All they want is a shinier dashboard. I bring vision. They bring feedback like:
“Can we make this pop more?”

Cybersecurity? Ironically, that’s the one domain they leave alone. Perhaps because it’s the only area they fear enough not to touch. A lonely island of sanity in a sea of interface fetishism.

But I’ve had enough. Every time I’m underestimated, boxed in, or asked to duct-tape magic onto confusion, I take one more step toward building my own company. A real one. One where cybersecurity is core, software is respected, and engineers aren’t treated like IKEA wrenches.

They don’t know what I see for the future. My horizon is too far for their browser to render.

And when I leave, it’ll be swift. Terminal open. Resignation typed.
Just to remind them one last time what a real professional looks like.

Now Hiring: Coffee-Slaves 2.0

Posted on 2025-07-14 by Delta

Where Your Latte Comes with a Side of Surveillance

Welcome to the dystopian café experience you didn’t ask for. NeuroSpot, a company that clearly thought “Black Mirror” was a business plan, is now turning your local coffee shop into a full-blown surveillance lab. That’s right, AI is now tracking barista productivity, customer behavior, foot traffic, and even satisfaction. In real time.

Because nothing screams “cozy neighborhood café” like cameras watching how long you stare at the scone display.

☕ Your Local Café, Now a Digital Sweatshop

Let’s not sugarcoat this nonsense. This isn’t about “efficiency.” This is about squeezing every last drop of productivity out of human beings until they collapse from the pressure of robotic expectations. Your friendly barista? They’re now just another data point in a spreadsheet.

Did someone take 2 seconds too long to steam the milk? That's a red flag. Did they make eye contact with a customer but fail to flash the neuro-optimized fake smile? Strike two. Did they take a breath to avoid a panic attack mid-shift? Unacceptable performance metrics.

Welcome to the machine, sweetheart. We hope you enjoy your latte while a lifeless algorithm evaluates your emotional impact.

AI Is Now the Manager

That’s right. The system doesn’t just observe. It decides. Who gets the next shift? Who gets cut? Who’s worthy of existing in the capitalist hellscape of low-wage labor? The AI knows. And it doesn’t care that Jamal’s grandma died or that Becky was dealing with a panic attack during the lunch rush.

There is no empathy in ones and zeroes. Only quotas.

“Real-Time Satisfaction” = Emotional Surveillance

NeuroSpot proudly boasts that it can detect customer “satisfaction” in real time. You know what that means, right? It means we’ve crossed into full-on emotion surveillance. Smile wrong and the system will log it. Linger too long and you’ll be flagged.

Feeling anxious? Sad? Tired? That’s a downgrade to the café's performance index.

We are now asking workers to perform happiness on demand, under constant digital scrutiny, just to serve you a f**king Americano.

Ethics? That’s Cute

Why are we doing this? Why are we automating exploitation and calling it innovation?

Because it’s scalable. Because empathy isn’t profitable. Because human dignity has no place in a quarterly report.

This isn’t just unethical. It’s a war against the human spirit.

🔥 Burn the Roast, Not the Workers

We’re building coffee shops that look more like interrogation rooms. If we don’t stop this, there won’t be baristas in five years, just uniformed automatons begging for positive customer sentiment scores.

So next time you sip that overpriced cappuccino, ask yourself:
“Did a real person make this or did the algorithm let them?”

Then tip the barista.
And tell the AI to go f**k itself.

Source: Original linkedin Post

My VPN Works Now and So Does My Ego

Posted on 2025-07-10 by Delta

Remember that guy who sold me the MikroTik router and thought changing the admin password made him some kind of off-brand CIA contractor? Yeah. Still haven’t called him back. Never will. I don’t need him. I needed revenge.

So, after nuking the router’s config like a war crime and spending hours resurrecting it from the grave I lovingly dug, I decided it was time to make it do something useful. Like tunneling all my traffic through a VPN so I can pretend I live in a functioning society.

First, I set up the L2TP VPN. It said “connected” which, in MikroTik terms, means “I shook hands with the VPN server once and now I think we’re best friends.” But meanwhile, my traffic was still walking around naked in front of the ISP. DNS still snitching. Nothing routed.

Turns out MikroTik will absolutely lie to your face. It’ll say “yes sir, default route is added” and then quietly keep letting your ISP peek through the curtains. So I had to rip out the ISP’s default route like a rotten tooth and staple the VPN route in its place. Manually. Angrily. Without mercy.

I even got to use the GUI, which felt like I was doing surgery with a spoon. Every checkbox I unchecked was an act of personal defiance. Every NAT rule I added was a middle finger to the guy who said “yeah I always change the admin password.”

Eventually, it worked. The internet bent the knee. My IP changed. My DNS stopped talking. My network became a fortress.

And that guy? He’s probably still out there. Still changing passwords like he’s guarding state secrets. Still thinking I’ll come crawling back.

I won’t.
He gave me a puzzle.
I turned it into a hostage situation.
And now the router works for me.

Digital Colonialism: Powered by DRM and VPNs

Posted on 2025-07-04 by Delta

Let me talk about something that’s been eating at me for a while.

Let me talk about something that’s been eating at me for a while.
A few years ago, I managed to buy a legit copy of a game. Not pirated. Paid real money. Jumped through all the hoops. VPN on, foreign payment gateway, fake address in a random European village. The whole hacker in the matrix experience, just to buy a game like a “normal” human being.
It worked. I was excited.
For exactly two days.
Then the account got flagged. Probably the VPN fingerprint. Or maybe they didn’t like my IP location. Or maybe they just woke up cranky that day. Poof. Access revoked. Game gone. No refund. No appeal. Just a polite corporate middle finger and a reminder that I violated the “terms of service.”
And that was the moment it clicked:
If buying a game doesn’t mean I own it, then pirating a game doesn’t mean I stole it.
Ownership in the Age of DRM and Sanctions
Here’s what owning a game used to mean:
You buy the CD or DVD.
You install it.
You play it.
You lend it to a friend if you feel generous.
You uninstall it when your hard drive runs out of space.
You reinstall it five years later for nostalgia.

Now? Here’s what it means:
You buy a license.
You don’t really own the game.
You access it through a platform that tracks everything you do.
If you’re in the wrong country, you’re already violating terms.
If the company changes their policy, you lose access.
If your account gets flagged, too bad.

In countries like mine, just accessing a basic digital service is a daily gamble. Steam is blocked. Epic Games is blocked. Xbox is blocked. Payment systems? Not even an option.
And yet we’re expected to “play fair” in a system rigged against us?
Why Piracy Feels Like Justice
Let me ask you this. If a publisher refuses to sell me the game, deletes my account if I find a workaround, and offers me no legal method to buy their product, and then gets angry when I download it elsewhere, what exactly did I steal?
They didn’t lose a sale.
They didn’t give me a chance to make a sale.
I’m not saying piracy is some noble act of rebellion, but calling it theft feels dishonest. Because when I pirate a game, I don’t take anything. I copy it. The original is still there. The company still has their version. It’s not like I broke into their office and ran off with a server.
This isn’t theft.
It’s duplication, because the system doesn’t give me access to participate any other way.
When Access Is a Privilege, Not a Right
Let’s be real. Most people who pirate aren’t evil masterminds with skull rings and underground bunkers. They’re kids who want to play a game they can’t afford. Or developers who want to learn. Or people in sanctioned countries like mine, where even a free trial requires bending space and time.
And no, we’re not all stealing from hardworking developers. I would love to give my money directly to devs. But I can’t. The industry has made sure of that. Between region locks, card bans, platform restrictions, and surveillance systems that block entire countries from accessing digital stores, we’ve been priced out of the ecosystem by design.
Streaming Services: The New Gatekeepers of Disappointment
And while we’re at it, let’s talk about streaming. Because it’s not just games that are broken. The TV and movie industry looked at piracy, said “We can fix this,” and then proceeded to give everyone a reason to go right back to torrenting.
Remember when Netflix had everything? One subscription, endless binging. It was beautiful. Now? Every studio wants its own throne. You want to watch The Mandalorian? That’s on Disney+. Craving some Ted Lasso? Hello, Apple TV+. Feeling nostalgic for Breaking Bad? Good luck figuring out which service has it this month.
We went from pirating because nothing was available to pirating because everything is scattered across 7 overpriced platforms.
Let’s be honest. Why would I pay the equivalent of half a month’s rent just to access 2–5 decent series per service? Is that value? Or is that just a corporate pickpocketing session with glossy thumbnails?
They want us to pay premium prices, get ads anyway, lose access whenever they feel like it, and pretend like it’s normal. Sorry, but that’s not a streaming service. That’s digital gaslighting.
So yes, streaming is failing. And piracy isn’t just back — it’s thriving. Because when legal options become ridiculous, inconvenient, or downright exploitative, people don’t disappear. They adapt.
How to Pirate, Hypothetically Speaking
For research purposes only, here’s how some people allegedly start their piracy journey.
Step 1: VPN
Because living in Iran means you can’t do anything online without a VPN. Proton or Mullvad are good choices.
And while we’re at it, WireGuard is the new kid on the block — it’s faster, leaner, and more secure than old-school VPN protocols. Most modern VPN providers support it.
Even if you live in a less censored country, a VPN is still about privacy you own — encrypting your traffic, stopping ISPs and corporations from tracking your every move, and keeping your digital life your business.
So yeah, VPNs aren’t just for bypassing blocks. They’re a digital shield for anyone who values privacy.
Step 2: Torrent Client
Install qBittorrent. It’s lightweight, clean, and has no ads. Unlike some others that install 14 toolbars and 3 viruses.
Step 3: Find Your Stuff
Hypothetically, people visit:
1337x.to for torrents
fitgirl-repacks.site for games
Libgen for books
r/Piracy on Reddit for guides, tips, and philosophical debates about whether pirating The Sims is a political act
Step 4: Common Sense Mode
Don’t run random .exe files unless you trust the source. Don’t pay for pirated content, that defeats the whole point. And seed only if you’re brave or know what you’re doing.
Final Thoughts
Look. I’m not saying piracy is perfect. Or even always defensible.
But I am saying this:
If I have no legal path to ownership, then don’t act like I committed a crime when I take the only path that exists.
In a world where buying means renting, and access is denied by invisible borders and billion dollar companies, piracy becomes more than just copying files.
It becomes a language.
A protest.
A workaround.
Sometimes, just plain survival.
Inspired by You Don't Own Your Games – Accursed Farms

Fake AirPods, Real Enlightenment

Posted on 2025-07-03 by Delta

I bought fake AirPods. Not “budget” AirPods. Not “alternative” AirPods. Fake. The forbidden fruit of tech consumerism. I used them for six months. They played music. The battery lasted. Life went on. The mic? Not great. But guess what? Neither is the mic on my friend’s real AirPods that cost ten times more. So basically, we’re both shouting into overpriced plastic. Today, I casually mentioned my fake AirPods in a conversation. Instant silence. The type of silence people reserve for war crimes or pineapple on pizza. Then came the dramatic gasp. "Fake? Ew. Gross." Like I just licked a subway pole and said it was refreshing. Here’s the part I still don’t get. Why am I expected to pay ten times more for maybe five percent better audio and a case that blinks in a smug Apple-approved way? I don’t need status updates from my earbuds. I need sound. They deliver sound. Mission accomplished. But apparently, that’s not enough. Because we’ve reached a point in late-stage capitalism where your identity is defined not by your values or your actions but by whether the tiny gadget in your ear is officially blessed by a trillion-dollar corporation. Let’s talk about prestige. Not the movie. The illusion. The one where people think owning “the real thing” makes them more real. They treat logos like moral high ground. You bought the original? Amazing. Your character must be spotless. Your soul must be embossed in gold. What’s really funny is that both the real and the fake are often born in the same factory, assembled by the same underpaid workers who didn’t ask to be pawns in your weird flex war. The only difference is the sticker and your ego. Functionality should matter. Efficiency should matter. Making rational decisions with your money should matter. But no. We’d rather go bankrupt to feel superior for five minutes until the next upgrade drops and makes our precious prestige suddenly obsolete. So yes. I own fake AirPods. They work. I sleep fine. And if that bothers someone,
I promise the problem isn’t my earbuds. It’s their existential crisis.

Quantum Computing: Because Waiting is So Last Century

Posted on 2025-07-02 by Delta

So, the brainiacs at the University of Southern California finally did it. They used one of IBM’s fancy 127-qubit quantum computers and solved a puzzle that would make your average classical computer cry itself to sleep. The headline? Quantum machines are exponentially faster. That means the speed difference doesn’t just grow a little, it explodes like your grandma’s cooking when she forgets the oven is on. They tackled something called Simon’s problem, which is basically a quantum nerd’s version of a Rubik’s Cube.
Spoiler alert: classical computers are stuck trying every combo like a hamster on a wheel, while quantum computers just wave their magic qubits and boom!!! done. And yes, this speedup is unconditional. No smoke and mirrors here. No "maybe if" or "probably when" just straight up quantum supremacy dropping the mic. Of course, these quantum whizzes didn’t get here by accident. They had to fight off error after error with fancy new tricks to keep those qubits from flipping out. And unlike past claims that sometimes sounded like sci-fi, this is legit proof that quantum computers aren’t just a nerd fantasy anymore. Now, before you start tossing your ancient Windows PC out the window, keep in mind that this tech still has a long way to go before it can do your taxes, play your video games, or find that one file you lost last year. But hey, at least we know the future won’t be stuck running Excel macros forever. So while your Windows XP rig is still chugging along, quantum computers are already somewhere in 2040, laughing and solving problems you didn’t even know existed.

Source: Science Daily

RAR Files and the Art of Wasting Everyone’s Time

Posted on 2025-07-01 by Delta

RAR files suck. Not just in a "mild inconvenience" kind of way, but in a "why are you still a thing" way. Let’s talk about it. First, ZIP files. They're simple, clean, and just work. On Linux, you run unzip and boom, you’re in. On Windows, you double-click and it opens like a folder. Even macOS plays along. No weird errors. No rituals. Just your files, ready to go. ZIP is the golden retriever of file formats. Loyal, easy-going, always there when you need it. You could probably unzip one on a microwave. Now TAR. Combine it with gzip or bzip2 or xz and you’ve got .tar.gz, .tar.bz2, .tar.xz. These are the Linux power tools. TAR keeps file permissions, symlinks, timestamps, everything. It’s made for real work. You want to back up a server? TAR. You want to send your buddy a meme folder? ZIP. You want to ruin your day and theirs? RAR. Here’s where it gets stupid. RAR is a proprietary format. It’s closed-source. That means if it breaks, you can’t fix it. You just sit there, helpless, while unrar spits out errors and disappointment. And on Linux? You often need the non-free version of unrar. Because apparently, freedom stops mattering once the file has a .rar at the end. It gets better. RAR isn’t natively supported anywhere. Not Windows. Not macOS. Definitely not Linux. You always have to install something extra. It's like the one guest who shows up at your house, eats your food, and then asks you to drive them home. And don’t even get me started on multi-part RAR files. .r00, .r01, .r02... What is this, a file or a math test? I just wanted one folder, not an episode of CSI: File Extraction. So let’s review: ZIP is fast, portable, and plays nice with everyone TAR is powerful, smart, and made for grown-ups RAR is annoying, old, and smells like cracked software from 2006
If you’re sending me RAR files, we’re not friends. Send a ZIP. Be a decent human being.

When You Spend Millions on Firewalls but Karen Resets MFA Over the Phone

Posted on 2025-06-30 by Delta

Scattered Spider is now hijacking airlines and executive accounts using the most advanced hacking tool known to man: a phone call. That’s right. No malware, no exploits, no USBs taped under desks. Just a bored teenager with a LinkedIn tab open and a decent fake voice saying, “Hi, I’m the CFO, I forgot my MFA, help?” And the help desk, trained for exactly zero seconds in basic skepticism, says, “Of course, Mr. Executive, let me just hand you the keys to the kingdom.” The FBI has issued a warning, which is adorable, considering these companies still haven’t figured out that phone calls from strangers shouldn’t result in privileged access to internal networks. But sure, let’s pretend this is a new threat and not the same old con, just wearing a lanyard this time.

The attackers gather personal data like SSNs and birthdays from the vast ocean of already-leaked information, impersonate execs, and call support lines until someone caves. Once in, they surf through Azure, VMware, CyberArk and more, collecting sensitive data and occasionally sprinkling in some ransomware for flavor. The corporate response? Panic, blame the help desk, patch nothing, and keep buying overpriced closed-source security tools that light up like Christmas trees and stop absolutely nothing. This isn’t even hacking anymore. It’s theatre. It's cosplay. These companies are running billion-dollar infrastructures with the operational maturity of a school group project. Multi-factor authentication? Completely useless if Karen from Tier 1 IT will gladly reset it for the guy who sounds confident on the phone. And yet, they keep treating open-source solutions like they’re radioactive. God forbid anyone use transparent, auditable, community-reviewed software when you can just license another SaaS "zero trust" solution that your attacker can access with a convincing fake cough and a vague mention of being locked out of their Okta account. The moral of the story: your security isn’t a fortress, it’s a cardboard set. And Scattered Spider just blew it over by exhaling.

Source: The Hacker News – FBI Warns of Scattered Spider Attacks

How I Gaslit Myself Into Thinking I Knew Networking.

Posted on 2025-06-29 by Delta

So I bought this MikroTik router from a guy who apparently thinks he works for the CIA. Because instead of, you know, giving me the admin credentials like a normal human being, he changed them. Without telling me. Like it's some sort of top-secret government-issued router and I'm just some civilian who should be grateful it even powers on. Naturally, I call him. Politely, of course. By politely I mean aggressively passive-aggressive with just the right sprinkle of “oh wow that’s super helpful of you.” He responds with a calm “yeah I always do that.” Oh okay. Cool. Love that for me. Eventually I manage to log in. Miraculously. I don’t even know how. Probably divine intervention or maybe the router just gave up and let me in out of pity. Once inside, I think hey, let’s clean things up. Tidy the config a bit. Just a quick refresh. Famous last words.

I proceeded to absolutely destroy everything. Firewall rules? Deleted. Bridges? Gone. DHCP server? Obliterated. Every single setting that made the router functional? I deleted like I was speedrunning a disaster. Then, because clearly I hate myself, I restarted it. Guess who can’t access it now. Guess who bricked their router without physically breaking it. Guess who still refuses to call the guy back out of sheer stubbornness and pride. That’s right. Me. Now I’m reading MikroTik documentation like I’m studying for the final boss fight. Watching tutorials by dudes with thick accents and dead eyes. Googling things like “how to un-destroy your MikroTik router because you got cocky and now it’s personal.” I didn’t choose the networking life. The networking life chose violence and dragged me into it.

Freedom, Visas, and Other Absurd Fantasies

Posted on 2025-06-26 by Delta

I was all set to travel to Canada for FSF40 to talk about software freedom, community resilience, and how Iranian techies are basically magicians for building anything under a digital iron curtain. My elevator pitch was ready, bags half-packed, heart full of hope. And then… Middle East happened

Iran and Israel decided to play "12 Days of Boom" — a festive little exchange of missiles, blackouts, and existential dread. Just to spice things up, someone hit the big red "shut down the internet" button over here, as if that would fix anything besides morale. Now the war seems "over" (whatever that means), and I’m stuck with one tiny, bureaucratic problem: how the hell do I convince a Canadian visa officer that I will come back to Iran? Because, you know, war-torn country + internet censorship + no freedom of movement + government run by religious elders who treat logic like a Western conspiracy = totally the kind of place people rush back to. I mean, who wouldn’t want to return to a homeland where your online activity is monitored more closely than a Tinder chat with Mossad, and your passport is basically a colorful piece of nope at every border? But sure, let me go explain that to the embassy. "Yes sir, I solemnly swear I will return to my blessed theocracy where software freedom means using 15-year-old Linux distros because GitHub is sanctioned." What could go wrong?

Iranian Hackers Maintain 2-Year Access to Middle East CNI via VPN Flaws and Malware

Posted on 2025-06-25 by Delta

Iranian hackers just wrapped up a two-year all-inclusive stay inside a Middle Eastern critical infrastructure network—brought to you by unpatched VPNs, open-source malware, and sheer audacity. From May 2023 to Feb 2025, our guests of honor (aka Lemon Sandstorm, formerly known as Pioneer Kitten—seriously, pick a name) waltzed in via old Fortinet/Pulse bugs, dropped web shells like confetti, and got comfy with a whole buffet of open-source backdoors: Havoc, MeshCentral, SystemBC, and friends. Yes, Havoc runs in-memory BOFs, pivots like a ballerina, and even registers itself with the C2 like a loyal intern. Built with love in C++ and Go—truly FOSS at its most weaponized.

Victim tried to kick them out in Dec '24. Hackers responded like: "lol ok" and came back through ZKTeco bugs and good ol' spear phishing. Moral of the story? Patch your VPNs, audit your FOSS stack, and maybe don’t use GitHub Gists as a C2 endpoint. Or do. Apparently, it works great.

First Post

Posted on 2025-06-24 by Admin

Hey, world. Delta here. So… we’re in the middle of what feels like digital trench warfare in Iran. For ages, I wanted to start a blog — but let’s be real, procrastination is my default runtime. Today, I finally rage-quit the excuses and booted up Delta Libre — a space where I can speak freely, post recklessly, and hopefully not get firewalled into oblivion. If you’re a fellow blogger or digital freedom fighter, let’s connect and build something that even censorship can't grep.

Why I Hate Python (But I’m Trapped in Its Whitespace Hug)

Posted on 2025-06-20 by Admin

python just sucks, thats it.

Let me get one thing straight: I don’t dislike Python because it’s a bad language. I dislike Python because it tricked me. It pretended to be my friend. At first, it was all sunshine and print("Hello, world!"). Indentation felt elegant. Lists were easy. No curly braces? Cute! Until I blinked wrong and the whole thing crashed because I mixed tabs and spaces like some kind of syntax war criminal. But still, I endure. Why? Because I work for a company where speed means "deploy it by lunch," not "let’s optimize this loop." They don’t care if my algorithm runs in O(n) or O(n²)—as long as it runs, looks clean, and gets pushed to Git before the coffee cools. Do I want to use Rust? Absolutely. Would I love to refactor everything in Go, just for the thrill of static typing? You bet. But here I am. Writing Python. Every. Single. Day. Like some sort of duct-tape engineer in a startup spaceship held together by pandas, Flask, and broken dreams. Want to build a robust backend? Python. Need to scrape 8 million pages in under 5 minutes? Python. Want to cause a memory leak using just a bad import? Python’s got your back. And don’t get me started on package management. One day it’s pip, the next it’s pipx, then suddenly you’re inside a virtual environment so deep you forget what system you’re even on. “Works on my machine” has never felt more personal. So yes, I hate Python. But it pays the bills. It lets me deliver fast, fake it 'til I make it, and it doesn’t yell at me for not declaring types—because, let’s face it, Python is that chill coworker who doesn’t care what you wear to meetings as long as the report is done. In conclusion: I don’t choose Python. Python chooses me. And like Stockholm Syndrome, I’ve stopped resisting.

Context

Welcome to Delta Libre — because apparently the world desperately needed another place where someone pontificates about tech, open-source, and digital freedom like it’s the second coming of sliced bread

Here, I’ll dive deep into programming paradigms you probably forgot, rant about AI like a grumpy robot overlord, and question why we’re all still using Python despite its passive-aggressive whitespace demands.

If you enjoy snark, eye-rolls, and the occasional existential crisis about the future of technology, congrats — you found your tribe. Prepare for a digital journey that’s equal parts enlightening and “Did they really just say that?”

A hacker doesnt deliberately destroy data or profit from his activities. " — Kevin Mitnick

Contact: Establishing a Secure Channel

Got a question, a brilliant idea, or just want to send memes? Slide into my inbox via the channels below – I promise I might respond faster than your Wi-Fi.

Direct Connect_

Email: delta.fsociety@tutamail.com

Matrix ID: delta_fsociety:matrix.org

Telegram: @delta_ez

Alternatively, you can use the form below for general inquiries:

// PGP key available upon request for encrypted communications.