Delta Libre Blog //

Welcome to Delta Libre Blog!

Greetings, fellow digital explorer! You've just jacked into Delta Libre, a cozy little wormhole where FLOSS dreams, rebellious code, and digital freedom hold hands and rewrite the rules (probably on a Linux terminal at 3AM).

Here’s where I overthink everything so you don’t have to. From bleeding-edge programming voodoo and galaxy-brain system architectures to the ethical chaos of AI and the glorious mess that is decentralization. we dive deep. The mission? To unplug the Matrix, question the algorithm, and occasionally rant about how JavaScript still kinda sucks.

This card exists for one sacred purpose only:

to publicly declare my undying love for my girlfriend (aka Niusha ). That’s it. No tech, no tips. just pure, romantic overkill. 💘 If you’re here for actual content, head to the blog section in the header before this gets any cheesier.

[STATUS]: Operational.

-- 2025-06-25 03:00 UTC

Coindrop.to me

Blog Posts:

Why I’m Leaving the Royal Classification Society: Six Months of Lessons in Company Red Flags

Posted on 2025-11-02 by Delta

After six months inside the Royal Classification Society, I’ve learned more about corporate red flags than any management course could ever teach. From distrust of expertise to leadership stuck in the 1980s, it’s been a front-row seat to how not to run a company. Now I’m walking away with clarity, and building something new: Zist Digital, an open and ethical alternative built on FLOSS values.

Read Full Post »

For the past six months, I’ve been part of the Royal Classification Society (RCS), a company operating across multiple countries where I helped shape and build systems like RCS NEXUS and Project Posiden ( and its GPL3 ). I joined full of energy and idealism, ready to bring structure, transparency, and a bit of technical sanity to the table.

But, plot twist: turns out I accidentally joined a live demonstration of how not to run an organization. So here we are, six months later, a few dozen "urgent-but-not-that-urgent" meetings richer, and with a PhD in spotting corporate red flags.

🚩 1. A Lack of Transparency Always Costs More Than It Saves

Apparently, “transparency” was considered optional. Like a side dish. Decisions were made behind closed doors, information was selectively shared, and communication was treated like classified intelligence. If you’ve ever played a team game where nobody tells you the rules, that’s what it felt like, except the stakes were higher, and there was always a new "urgent" mystery to solve.

🚩 2. Distrust to Expertise Is the Fastest Way to Kill Innovation

Why hire experts if you’re going to ignore them? Somehow, every suggestion from someone who actually knew their stuff was met with skepticism, as if competence was suspicious. It’s an incredible phenomenon: engineers propose solutions, management stares blankly, and then proceeds to reinvent the wheel using cardboard and wishful thinking. Nothing quite says "we value innovation" like distrusting the very people capable of delivering it.

🚩 3. “International Professionals” Who Haven’t Seen the Modern World in Decades

One of my favorite ironies was watching management brag about being international-level professionals while acting like they were still running a port office in 1983. They were stuck in their old-fashioned marine bubble, convinced that outdated paperwork and blind hierarchy still counted as "leadership." Ethics? In that community, ethics are either a punchline or something offensive to bring up in serious conversation.

🚩 4. Burnout as a Badge of Honor

Working late? Praised. Questioning why? Problematic. Somehow, exhaustion became the main KPI. Because obviously, nothing says productivity like a team running on caffeine, anxiety, and unspoken resentment.

🚩 5. The “Work Harder for Less” Philosophy

Here’s the best part: not only were people expected to be loyal, they were expected to sacrifice their lives for the company. Underpaid, overworked, and constantly reminded that "we’re a family" which apparently means you should ignore your bills, mental health, and personal life because family never quits. In reality, it wasn’t family. It was free labor disguised as loyalty.

🌱 What I’m Taking With Me

I’m walking away with one thing I didn’t expect: clarity. I now know exactly the kind of organization I want to help create. one that doesn’t suffocate its people under layers of ego, confusion, and distrust.

That’s why I’m building something new: Zist Digital. “Zist” means life in Farsi, and that’s the point. It’s a business model based on FLOSS (Free/Libre and Open Source Software) values, designed to foster a clear, open, and healthy environment for people and engineers who actually want to build things that serve society, not just a quarterly report.

A place where expertise is trusted, transparency isn’t negotiable, and burnout isn’t glorified. Basically, the anti-RCS.

Leaving RCS isn’t a loss, it’s an escape from the Matrix. And like any good open-source project, Zist Digital will be a collaborative effort: transparent, ethical, and a little bit rebellious. Because if there’s one thing I’ve learned, it’s that real progress only happens when you stop asking for permission from people who don’t understand what you do.

« Back to All Posts

Cryptocurrencies, Privacy, and Why Monero is the Real Deal

Posted on 2025-10-26 by Delta

Forget Bitcoin hype and Lambo memes—if you care about privacy, freedom, and actually controlling your money, Monero is the one. This post dives into why keeping your finances in your hands matters, compares a few alternatives, and explains why Monero is the only coin that truly respects your freedom in the digital world.

Read Full Post »

Ah, cryptocurrencies. The land of memes, moon dreams, and people pretending they understand economics. Let’s cut the nonsense and talk about what actually matters: privacy, freedom, and not letting every transaction you make become public entertainment.

Most coins are just flashy accounting tricks. Some actually give a damn about your privacy.

  • Monero (XMR) – My obvious favorite. Why? Because it actually protects your privacy. Every transaction is confidential, untraceable, and censorship-resistant. You don’t have to hope the exchange or some nosy third party won’t flag or track you. If you care about controlling your money without anyone poking their nose, Monero is basically the hacker’s dream: quiet, unstoppable, and built for people, not hype.
  • Bitcoin (BTC) – The “OG” of crypto. Open, decentralized, and widely accepted. Problem? Your transactions are like a neon sign flashing your every move. Great for internet history archives, not so much for privacy.
  • GNU Taler – Not really a cryptocurrency. It’s a free-software payment system designed for privacy for users and accountability for merchants. No mining, no speculative coins, just digital payments done right. Problem? It relies on banks, so it’s more like a payment protocol than a cryptocurrency. Useful for experimentation, but not for trading or going “moon.”

Think about it: every time you swipe a card or use a “free” app to pay, someone is tracking you. Every transaction is data they can sell, analyze, or manipulate. Governments can freeze your accounts if they don’t like what you do. Corporations can jack up fees on a whim. Your privacy? Gone the moment you hand over your credit card. Controlling your money isn’t just a “cool hacker flex.” It’s about independence.

That’s why Monero feels like freedom in code: it lets you transact without giving anyone a play-by-play of your life.

Quick Cheat Sheet:

Coin / System Privacy Decentralized My Take
Monero Max Strong Best choice if you want real privacy
Bitcoin Medium Strong Good for adoption, terrible for privacy
GNU Taler User Limited Not a crypto, just a cool payment system

If you care about keeping your money under your control and out of prying eyes, Monero is where it’s at. While everyone else obsesses over Bitcoin prices or Lambo dreams, Monero quietly does its thing: secure, private, and unstoppable.

And hey—if you enjoyed reading this, you can always donate using Monero, Bitcoin, or just buy me a coffee with that old-ass fiat money while it still exists. Your choice, your freedom.

« Back to All Posts

Why Monero is the Hacker’s Dream Currency

Posted on 2025-10-26 by Delta

Forget Bitcoin hype and Lambo memes—if you care about privacy, freedom, and actually controlling your money, Monero is the one. This post dives into why keeping your finances in your hands matters, compares a few alternatives, and explains why Monero is the only coin that truly respects your freedom in the digital world.

Read Full Post »

Ah, cryptocurrencies. The land of memes, moon dreams, and people pretending they understand economics. Let’s cut the nonsense and talk about what actually matters: privacy, freedom, and not letting every transaction you make become public entertainment.

Most coins are just flashy accounting tricks. Some actually give a damn about your privacy.

  • Monero (XMR) – My obvious favorite. Why? Because it actually protects your privacy. Every transaction is confidential, untraceable, and censorship-resistant. You don’t have to hope the exchange or some nosy third party won’t flag or track you. If you care about controlling your money without anyone poking their nose, Monero is basically the hacker’s dream: quiet, unstoppable, and built for people, not hype.
  • Bitcoin (BTC) – The “OG” of crypto. Open, decentralized, and widely accepted. Problem? Your transactions are like a neon sign flashing your every move. Great for internet history archives, not so much for privacy.
  • GNU Taler – Not really a cryptocurrency. It’s a free-software payment system designed for privacy for users and accountability for merchants. No mining, no speculative coins, just digital payments done right. Problem? It relies on banks, so it’s more like a payment protocol than a cryptocurrency. Useful for experimentation, but not for trading or going “moon.”

Think about it: every time you swipe a card or use a “free” app to pay, someone is tracking you. Every transaction is data they can sell, analyze, or manipulate. Governments can freeze your accounts if they don’t like what you do. Corporations can jack up fees on a whim. Your privacy? Gone the moment you hand over your credit card. Controlling your money isn’t just a “cool hacker flex.” It’s about independence.

That’s why Monero feels like freedom in code: it lets you transact without giving anyone a play-by-play of your life.

Quick Cheat Sheet:

Coin / System Privacy Decentralized My Take
Monero 🔒 Max ✅ Strong Best choice if you want real privacy
Bitcoin 🟡 Medium ✅ Strong Good for adoption, terrible for privacy
GNU Taler 🔒 User ⚪ Limited Not a crypto, just a cool payment system

If you care about keeping your money under your control and out of prying eyes, Monero is where it’s at. While everyone else obsesses over Bitcoin prices or Lambo dreams, Monero quietly does its thing: secure, private, and unstoppable.

And hey if you enjoyed reading this, you can always donate ( check the blog home page ) using Monero, Bitcoin, or just buy me a coffee with that old-ass fiat money while it still exists. Your choice, your freedom.

« Back to All Posts

The Internet We Lost: How Peak Capitalism Hijacked Our Playground

Posted on 2025-10-25 by Delta

Remember the Internet before corporations turned it into a surveillance-ad-machine? Back then, curiosity thrived, creativity ran wild, and communities actually mattered. This post explores how peak capitalism hijacked the web and how decentralized platforms can help us take some of it back.

Read Full Post »

Watch the full video on the Internet we lost:

Once upon a time, the Internet was a chaotic playground for hackers, nerds, and weirdos. Curiosity mattered, memes were handcrafted, and your homepage didn’t spy on your every move. Now? Peak capitalism has fully arrived. Corporations centralized control, stuffing every corner of the web with ads, tracking pixels, and algorithmic manipulation designed to make you scroll forever and feed their bottom lines.

Every click you make, every video you watch, every forum post you read has become data for advertisers. Endless feeds hypnotize you, and algorithms decide what you see—or don’t see—making the Internet a giant, meticulously designed attention trap. Creativity, discovery, and freedom have been replaced by engagement metrics and profit margins.

But there’s hope. The digital underground fights back with decentralized, user-controlled platforms:

  • PeerTube – Watch and upload videos without corporate interference, ads, or algorithmic brainwashing. Each instance is controlled by its users.
  • Mastodon – A Twitter alternative where your timeline isn’t dictated by corporate algorithms. Join servers that align with your interests, or even host your own.
  • Pixelfed – Instagram without the creepy tracking. Share photos in a privacy-focused, ad-free environment.
  • DeltaChat – Instant messaging using email, giving you a decentralized, spam-resistant way to chat without Big Tech spying on you.
  • Matrix – A universal, encrypted messaging protocol. Think of it as a hacker’s dream: interoperable, decentralized, and fully open.

Hosting your own blog, Mastodon instance, or PeerTube server is a small but significant rebellion. Each post, video, or message chipped away at corporate control and reminded us that the Internet can still be messy, chaotic, and human again.

Peak capitalism has ruined the Internet for profit, turning curiosity into engagement, exploration into data, and creativity into ads. But decentralized platforms, independent hosting, and community-run services offer a glimpse of the Internet we once had—and the one we can still reclaim.

Control is an illusion; freedom is real.

« Back to All Posts

Apple vs. Europe: When the Walled Garden Meets the Lawnmower

Posted on 2025-10-22 by Delta

Apple is in court again, this time against the European Union, crying that the Digital Markets Act is "stealing" their intellectual property. The Free Software Foundation Europe stepped in to remind everyone that interoperability is not a privilege. It is the right to make your device talk to other devices without begging a trillion-dollar company for permission. The outcome of this case could decide whether we own our technology or just rent it.

Read Full Post »

Apple’s crying to the European Court because the Digital Markets Act wants them to make their devices work with others. They call it “expropriation.” The Free Software Foundation Europe calls it “common sense.” Interoperability means your hardware and software can actually communicate, share data, and function together without a corporate permission slip. It is what makes the digital world open instead of a fenced-off kingdom.

Without interoperability, users end up trapped inside walled gardens that sell freedom at a monthly subscription fee. FSFE stood before the court and said it clearly: “If interoperability can be limited by proprietary restrictions, then the DMA is a joke.” They are fighting to make sure the law actually forces gatekeepers like Apple to open their systems so users can connect what they want, install what they want, and use the tools they choose.

FSFE’s lawyer, Dr. Martin Husovec, hit the point perfectly: “Innovation doesn’t exempt a company from regulation.” Apple has built a beautiful cage and wants credit for the architecture. The DMA is finally telling them they cannot call the bars “features.” This case is not just legal drama. It is a question of digital ownership. Do we own our machines, or do we rent them from corporate landlords?

If FSFE wins, Europe will finally make interoperability real, not just another policy word. Our devices might actually belong to us. If Apple wins, expect more magical dongles, more closed doors, and more “innovation” that breaks what used to work. So, cheer for the hackers in suits. They are fighting for your right to connect without permission.

Stay free. Stay interoperable.

Source: FSFE News: FSFE defends interoperability before the Court of Justice of the European Union

« Back to All Posts

Librephone: Because Your Pocket Deserves Freedom Too

Posted on 2025-10-21 by Delta

The Free Software Foundation just declared open war on the last digital prison: your smartphone. The new Librephone project aims to free every layer of your device, with no secret code, no spyware, and no corporate leash. It's the start of something big, and maybe a little dangerous in the best possible way.

Read Full Post »

For years, we have been preaching about free software. We replaced Windows with GNU/Linux, dumped Chrome for Firefox, and escaped cloud traps like Google Docs for LibreOffice. But there is one device still completely under corporate control: the glowing rectangle in your hand that listens, tracks, and tattles. Yeah, your phone.

Even if you flash LineageOS or ditch Google Play, your phone is still running mystery code buried deep in firmware. The baseband processors, Wi-Fi chips, GPU drivers, all of it. These blobs are like corporate spyware horcruxes. You cannot kill them, you cannot see them, and they are quietly selling your soul to the nearest data broker.

The Free Software Foundation (FSF) finally said “enough.” They have launched Librephone, a campaign to create a mobile platform that is completely free. No binary blobs, no locked firmware, no “trust us bro” code from companies that think privacy is just a cute marketing word.

The project is led by Rob Savoye, the same hacker behind projects like DejaGNU, Gnash, and OpenStreetMap. FSF board member John Gilmore kicked off the funding after realizing that even “open” Android forks like LineageOS still rely on proprietary code. Their goal is to replace every single piece of nonfree software inside the phone, including the baseband, bootloader, and drivers.

Corporations have been beating the freedom out of users for decades. They promise “security updates,” but what they are really securing is their control. They build devices that age faster than bananas, lock bootloaders like state secrets, and turn “updates” into slow-death traps that force you to buy new ones. It is planned obsolescence with better marketing.

Librephone flips that table. The idea is to build phones that actually belong to users. Imagine being able to recompile your firmware, tweak your drivers, and replace your OS without signing your soul to a tech giant. It is the hacker dream phone, one that obeys you instead of a EULA written in microscopic legalese.

Of course, we cannot talk about mobile freedom without mentioning some other freedom fighters in the field. PostmarketOS is one of the most impressive ones. It is basically Alpine Linux re-engineered for phones. Their goal is to make devices last ten years instead of two. Imagine your old phone running mainline Linux instead of collecting dust in a drawer. PostmarketOS is already making that happen, and it is pure hacker energy.

Then there is Libre Mobile OS (LMODroid), a privacy-first Android spin that cuts out every trace of Google’s surveillance network. It is for people who want the flexibility of Android without the constant data leak to Mountain View.

And we cannot forget GrapheneOS. These folks are doing heavy lifting in the security world, hardening Android’s privacy features to levels most companies will never even attempt. Sure, it still runs on Pixel hardware, but it is one of the safest options out there for privacy-conscious users who still need a daily driver.

A while back, I stumbled across something cool. The Parch Linux team was working on a mobile version of their distro. I even saw it running on one of the devs’ phones. It looked slick, like a pure Linux phone made by and for hackers. Sadly, when I checked later, it was gone from their site. Maybe it just needs a little love to come back. If you are reading this and you have time, skills, or a few bucks to spare, maybe we can help revive it. Visit parchlinux and let’s bring that project back to life.

The bottom line is that Librephone is not just about building a new operating system. It is about breaking corporate control over the one device that never leaves your side. It is about giving people back the power to choose what runs on their hardware.

This is not some hip startup revolution. It is the return of real hacking, the kind that flips middle fingers to closed firmware and says, “I will build my own freedom, thanks.” The kind of hacking that makes lawyers sweat and users smile.

The Librephone project will not be fast or easy, but nothing worth doing ever is. Every line of liberated code gets us closer to a future where the word “smartphone” actually means something smart, like respecting the user. So yeah, maybe it is time to flash not just your phone, but the whole idea of who controls it.

Want to join the fun? Jump into #librephone on irc.libera.chat, follow the project at librephone.fsf.org, or just spread the word. Because the revolution will not be downloaded from the Play Store.

Source: FSF: Librephone Campaign

« Back to All Posts

“Dear valued customer, we care about your comfort!”

Posted on 2025-10-19 by Delta

Yeah right. You care so much that you text me in the middle of the night about a “special discount” for car insurance when I don’t even own a damn car.

Iranian phone advertising is not just annoying, it’s a national-level harassment program.
These people don’t stop. They text, they call, they message, they stalk.

Read Full Post »

Yeah right. You care so much that you text me in the middle of the night about a “special discount” for car insurance when I don’t even own a damn car.

Iranian phone advertising is not just annoying, it’s a national-level harassment program.
These people don’t stop. They text, they call, they message, they stalk.
If pigeons could carry phones, they’d train them too.

They have zero respect. None.
They call when I’m asleep.
They call when I’m eating.
They call when I’m literally in another call.
I swear if I ever meet one of those “marketing experts,” I’ll personally read them every one of their stupid messages until they cry.

And I pay for this.
I actually spend money to receive spam from some random shop in Mashhad trying to sell me “organic honey” that’s probably just sugar in disguise.
I didn’t buy my SIM card to be emotionally abused by robots reading scripts.

This isn’t marketing. This is psychological warfare.
You can’t escape.
You block one number, they appear again with a new one like hydras from hell.
“Hello dear user, we have a special offer for you!”
No you don’t. You have problems.

I should have the right to silence.
I should have the right to use my phone without feeling like I owe society an explanation for not wanting “amazing loans with zero interest.”

It’s disgusting.
It’s inhuman.
It’s like the whole system is built on the belief that if you annoy people long enough, they’ll finally buy something just to shut you up.

So here’s a message for all of you advertisers out there:
If I wanted to hear from you, I’d call you myself.
Stop texting me, stop calling me, stop invading my sleep.
I bought my line, I pay for it, and it’s not your playground.

Now if you’ll excuse me, I need to block another number. Again.

« Back to All Posts

The Parrots Who Dared to Speak Freely

Posted on 2025-11-17 by Delta

Because apparently freedom of speech stops where feathers begin.

So here’s the new crime of the century: five parrots in a British zoo started swearing at people. Scandalous. They said bad words, laughed about it, and suddenly everyone lost their minds. The zoo decided to separate them because apparently, freedom of speech stops where feathers begin.

Read Full Post »

Because apparently freedom of speech stops where feathers begin.

So here’s the new crime of the century: five parrots in a British zoo started swearing at people. Scandalous. They said bad words, laughed about it, and suddenly everyone lost their minds. The zoo decided to separate them because apparently, freedom of speech stops where feathers begin.

It’s hilarious. Humans scream about freedom all the time. “We believe in free speech!” they say. But let a parrot say “f*** off” and everyone acts like civilization is collapsing.

What did people expect when they went to a zoo anyway? Disneyland? Did they think the lions would perform a song-and-dance routine about friendship? The parrots were just being honest. They’re in cages. They’re angry, bored, and stuck entertaining strangers who stare at them all day. Of course they’re going to swear. I would too.

And let’s talk about zoos for a second. We call them “wildlife parks” to make ourselves feel better, but they’re really just fancy prisons with gift shops. Animals don’t belong behind glass walls or iron bars. They belong in jungles, skies, and oceans, not in fake plastic “habitats” designed to keep tourists happy. We lock them up for life, then get offended when they don’t act cute enough. That’s cruelty dressed as conservation.

Nature isn’t polite. It doesn’t wear a smile and ask you how your day is. It fights, it bites, it kills. That’s the real world out there, not some cute cartoon version where animals talk about their dreams.

If people can’t handle a few swearing parrots, maybe they should stop going to zoos. Because those parrots aren’t the problem. The problem is us, pretending that freedom is something we actually believe in, while we’re busy deciding which voices are allowed to speak.

Maybe those birds weren’t being rude. Maybe they were just telling the truth in the only language left to them.

Source: Five parrots separated at British zoo after encouraging each other to curse profusely at guests, CBS NEWS

« Back to All Posts

Sudo? More like Sudon’t

Posted on 2025-10-06 by Delta

The intro: when your access-control tool turns into a root access giveaway booth.

Twelve. Years. Of Root Roulette
Imagine this: a tiny bug in the --host option quietly snoozing for over a decade, politely letting users tiptoe past access controls. Twelve years of false confidence in a security fortress made of duct tape and blind faith.

Read Full Post »

The intro: when your access-control tool turns into a root access giveaway booth.

Twelve. Years. Of Root Roulette
Imagine this: a tiny bug in the --host option quietly snoozing for over a decade, politely letting users tiptoe past access controls. Twelve years of false confidence in a security fortress made of duct tape and blind faith.

And Then Came the Chroot Apocalypse
Next came the --chroot option that obscure flag everyone thought was decorative. Instead of isolating environments, it lets a user craft a fake /etc/nsswitch.conf and make sudo load whatever library they want with root privileges. In plain English: Congrats, you're root now even if you weren’t supposed to be.

“You get root! You get root! Everyone gets root!” — sudo, apparently.

Patch Now, Panic Later
The fix: sudo 1.9.17p1. The “p1” stands for please, patch immediately.

Emergency sysadmin rituals now include:
  • apt update && apt upgrade
  • Reviewing /etc/sudoers and removing suspicious entries
  • Locking down world-writable directories before someone locks you out
Lessons Learned (Or Not)
  • Old ≠ Secure. Old just means the bugs have mortgages now.
  • Root privileges are like nuclear launch codes once leaked, no patch will save you.
  • If your job title is “Sysadmin,” therapy is now part of your toolkit.

Final Thoughts
The irony is rich: the tool built to protect root access ended up distributing it like free samples at DEF CON. Next time you type sudo, maybe pause and whisper, “Do I trust you?” Because this month’s answer is simple: Sudon’t.

Source: Local Privilege Escalation via chroot option

« Back to All Posts

Fuzzy Logic, Donuts, and Tears: The Human OS

Posted on 2025-08-26 by Delta

It finally clicked for me the other day when our friend Omid, the gym coach, started preaching about how the human body and mind are basically one big predictable system. He was talking about hormones, stress, protein intake, and mental states like he was reading straight out of a user manual. And that is when it hit me: humans are just biological computers, and we run on fuzzy logic.

Read Full Post »

It finally clicked for me the other day when our friend Omid, the gym coach, started preaching about how the human body and mind are basically one big predictable system. He was talking about hormones, stress, protein intake, and mental states like he was reading straight out of a user manual. And that is when it hit me: humans are just biological computers, and we run on fuzzy logic.

Omid the Prophet of Predictability
According to Omid, if you pump up dopamine you feel motivated. If serotonin drops you feel depressed. If cortisol spikes you are suddenly a rage monster who yells at their microwave for taking too long. It is input → process → output.

That is not free will. That is a badly coded automation script written in meat.

The Wetware Rig
Let’s map it out:
Brain: the CPU, with 86 billion neurons acting like transistors that occasionally get distracted by cat videos.
RAM: short-term memory, barely enough to remember what you walked into the kitchen for.
Hard Drive: long-term memory, where half the files are corrupted and the other half are mislabeled.
Power Supply: food, sleep, caffeine. Unplug any of these and watch the system blue-screen.

This setup is not elegant. It is duct-taped chaos that somehow passes as “consciousness.”

The Operating System: Homo sapiens v1.0
Unlike your laptop, we do not even have the dignity of binary logic. We run on fuzzy logic, the land of “eh, maybe.”

Hungry? Eat.
Hungry but pretending to diet? Do not eat.
Hungry, dieting, but Omid just brought “healthy protein donuts”? Suddenly the decision tree collapses into twenty layers of excuses, shame, and “I’ll just do extra cardio tomorrow.”

Our operating system is a spaghetti mess of “kind of” and “sort of” and “technically.”

Input, Output, and Glorious Bugs
Eyes, ears, nose, touch, taste: input devices. Mouth: output device. Simple enough. Until you factor in bugs like biases, bad drivers, and random firmware updates. Example: “I’m fine” can mean fine, not fine, fine-but-I-want-you-to-suffer, or fine-but-secretly-I-ate-your-protein donut.

This is not communication. This is UDP with 90 percent packet loss.

The Cosmic Joke
The real comedy is that we walk around claiming to have profound, mysterious reasons for our choices. Meanwhile most of our “deep decisions” boil down to: hormones, last night’s sleep cycle, and whether we had coffee. That is not the voice of the universe. That is just a fuzzy logic circuit with bad power management.

Conclusion
So thank you Omid, for breaking my brain and making me realize we are just laptops made of meat. We overheat, we crash, we constantly need reboots, and our decision-making is one long fuzzy-logic fever dream.

The worst part? Computers at least get upgrades. We are stuck on Homo sapiens version one forever, waiting for evolution to push Service Pack Two sometime in the next few hundred thousand years.

Until then I will be defragging my brain with coffee and hoping the garbage collector kicks in tonight so I can sleep.

« Back to All Posts

“Nothing to Hide” and Other Fairy Tales We Tell Ourselves

Posted on 2025-08-19 by Delta

So, you’re a normal citizen. You don’t build bombs in your basement, you don’t run a shadow cartel, you just… exist. Congrats. You’ve unlocked premium status in the great casino of surveillance capitalism. You pay with your data, they cash out with billions, and you smile proudly: “I have nothing to hide.”

Read Full Post »

So, you’re a normal citizen. You don’t build bombs in your basement, you don’t run a shadow cartel, you just… exist. Congrats. You’ve unlocked premium status in the great casino of surveillance capitalism. You pay with your data, they cash out with billions, and you smile proudly:

“I have nothing to hide.”

That’s adorable. Like a goldfish saying, “I have nothing against living in a glass bowl.”

Your Data Is Boring? Perfect.

They don’t need your secrets. They need your habits.

How long you watch a video before swiping away.
What articles make you stop scrolling.
Which keywords make your blood pressure rise.
When you are lonely, angry, hungry, or bored.

All this goes into a profile — a digital voodoo doll of you. And they poke that doll with precision.

How Data Shapes Your Beliefs

This is where it gets fun. Or horrifying. Depends on your caffeine levels.

News feeds are not neutral. If anger keeps you clicking, you will get more outrage. Suddenly, your world looks like a dumpster fire.
Beliefs can be nudged. If you lean slightly one way politically, your feed pushes you harder that way. You don’t notice the slope until you are at the bottom.
Reality gets filtered. You don’t see “the news.” You see your news — a custom bubble that slowly rewires how you think.

The more data they have, the better they know what button to press to keep you hooked. Manipulation is not a sci-fi brain chip. It is millions of tiny nudges every single day.

Why That’s So Bad

You lose agency. You think you chose to read that article or buy that product. In reality, an algorithm knew you would click before you did.
Society fractures. Each person lives in their own curated bubble. No shared reality, just parallel universes fueled by ads and outrage.
Power tilts. Companies and governments don’t need to censor you. They just drown you in whatever narrative they prefer.

So no, your boring cat videos and pizza memes are not harmless. They are training data for the machine that decides what “truth” looks like tomorrow.

FLOSS: The Exit Door

Here’s where FLOSS enters like an awkward superhero in sandals. It doesn’t promise utopia. But it does mean:

You can see what is running on your machine.
You are not forced into being a lab rat by default.
You get to choose whether your tools serve you or their shareholders.

It’s not “free software” like free pizza. It’s “free” like finally having a key to your own house instead of renting a smart fridge that tattles on you.

The Punchline

So yes, keep chanting “I have nothing to hide.” Just remember: goldfish also have nothing to hide. And look how exciting their lives are, swimming in circles, staring at the same castle ornament, waiting for flakes to fall from above.

If that’s freedom, enjoy your bowl. Some of us prefer the ocean.

“Free software is a matter of liberty, not price. To understand the concept, you should think of free as in free speech, not as in free beer.”
— Free Software Foundation

Learn More at : Free Sofware Foundation

« Back to All Posts

life lately: slipping between dreams and silence

Posted on 2025-07-04 by Delta

hi.

lately, i’ve been slipping in and out of nightmares, some while sleeping, some while wide awake.
the kind that leave you frozen.
the kind that don’t need monsters because your own mind knows exactly what to show you.

i’ve been having a hard time talking to people.
like every word feels like too much friction. like the effort of explaining myself costs more than it’s worth.

Read Full Post »

hi.

lately, i’ve been slipping in and out of nightmares, some while sleeping, some while wide awake.
the kind that leave you frozen.
the kind that don’t need monsters because your own mind knows exactly what to show you.

i’ve been having a hard time talking to people.
like every word feels like too much friction. like the effort of explaining myself costs more than it’s worth.
i try. but it gets harder.

humans feel exhausting lately.
too loud, too messy, too complicated for the part of me that just wants stillness.
they disappoint me more than i can say.
not even in dramatic ways, just... emptily.
like promises with no echo.

and all this work, money, crypto, projects...
honestly? it means nothing to me right now.
i used to think building things would bring meaning.
now it all just feels like noise.

none of it feels real.
except her.
my girlfriend. her birthday’s coming up, and it’s the only thing pulling me forward with any clarity.

and that one friend who still sees me. really sees me.

if they weren’t here, i’m not sure what would be.
i’m not saying anything dramatic.
just... i’d be floating.
nothing to hold on to.

sometimes there’s a tear.
sometimes there’s a flood.
but always in silence.
my family must never know. i’m not ready to explain that kind of quiet.

i’ve been talking less. recording more.
just to prove to myself that i still exist.

this post doesn’t really go anywhere.
it’s just a snapshot of a mind trying to stay tethered to a body.

still blinking.
still doubting.
still loving, quietly.


« Back to All Posts

How I’m Slowly Rewriting My Resignation in Bash

Posted on 2025-07-20 by Delta

Working at my current company is a bit like being the only person with a flashlight in a cave full of people who think shadows are real and light is a conspiracy. I shine the beam, they squint and recoil, then confidently suggest I should make it more user friendly.

Read Full Post »

Working at my current company is a bit like being the only person with a flashlight in a cave full of people who think shadows are real and light is a conspiracy. I shine the beam, they squint and recoil, then confidently suggest I should make it more user friendly.

To be fair, the company isn’t evil. They’re not malicious. They’re just catastrophically unqualified to be near anything that runs on electricity. Their grasp of software is on par with a medieval farmer trying to interpret an iPhone — mostly suspicion, mild panic, and the occasional plea for divine intervention.

Their idea of a feature request is something like:
“Make it like Google Docs, but also like Excel, but also can you make it auto-send invoices to Neptune every Tuesday?”
This is not satire. This is my actual life.

They want everything immediately, built flawlessly, based on requirements that were mumbled once in a hallway while someone was looking for coffee. I’m expected to conjure fully-functioning enterprise software from vague vibes and hand gestures.

Every conversation turns into a low-budget therapy session:
“Why isn’t it done?”
Because you change your mind more often than Chrome updates.
“Why is it so complicated?”
Because the universe has rules. And software lives in that universe.
“Can’t you just make it simple?”
Sure. Let me go back in time and personally redesign the entire internet.

Now, for context: I’m not just the tech person. I’m a CEH-certified cybersecurity professional, deep into the Hack The Box penetration testing path. I studied AI at Harvard (yes, online, but the algorithms don’t care). I’m an advocate for software freedom in Iran, a contributor to GUN+Linux and several open-source projects.

And yet... they treat me like the guy who installs Chrome extensions. Like some random junior dev who exists to move buttons three pixels to the left. Using me for frontend tweaks and UI padding is like using an axe to butter toast — pointless, dangerous, and deeply disrespectful to both the axe and the toast.

I talk about long-term architecture, security pipelines, and future-proofing our tech stack. All they want is a shinier dashboard. I bring vision. They bring feedback like:
“Can we make this pop more?”

Cybersecurity? Ironically, that’s the one domain they leave alone. Perhaps because it’s the only area they fear enough not to touch. A lonely island of sanity in a sea of interface fetishism.

But I’ve had enough. Every time I’m underestimated, boxed in, or asked to duct-tape magic onto confusion, I take one more step toward building my own company. A real one. One where cybersecurity is core, software is respected, and engineers aren’t treated like IKEA wrenches.

They don’t know what I see for the future. My horizon is too far for their browser to render.

And when I leave, it’ll be swift. Terminal open. Resignation typed.
Just to remind them one last time what a real professional looks like.

« Back to All Posts

Now Hiring: Coffee-Slaves 2.0

Posted on 2025-07-14 by Delta

Where Your Latte Comes with a Side of Surveillance

Welcome to the dystopian café experience you didn’t ask for. NeuroSpot, a company that clearly thought “Black Mirror” was a business plan, is now turning your local coffee shop into a full-blown surveillance lab. That’s right, AI is now tracking barista productivity, customer behavior, foot traffic, and even satisfaction.

Read Full Post »

Where Your Latte Comes with a Side of Surveillance

Welcome to the dystopian café experience you didn’t ask for. NeuroSpot, a company that clearly thought “Black Mirror” was a business plan, is now turning your local coffee shop into a full-blown surveillance lab. That’s right, AI is now tracking barista productivity, customer behavior, foot traffic, and even satisfaction. In real time.

Because nothing screams “cozy neighborhood café” like cameras watching how long you stare at the scone display.

☕ Your Local Café, Now a Digital Sweatshop

Let’s not sugarcoat this nonsense. This isn’t about “efficiency.” This is about squeezing every last drop of productivity out of human beings until they collapse from the pressure of robotic expectations. Your friendly barista? They’re now just another data point in a spreadsheet.

Did someone take 2 seconds too long to steam the milk? That's a red flag. Did they make eye contact with a customer but fail to flash the neuro-optimized fake smile? Strike two. Did they take a breath to avoid a panic attack mid-shift? Unacceptable performance metrics.

Welcome to the machine, sweetheart. We hope you enjoy your latte while a lifeless algorithm evaluates your emotional impact.

AI Is Now the Manager

That’s right. The system doesn’t just observe. It decides. Who gets the next shift? Who gets cut? Who’s worthy of existing in the capitalist hellscape of low-wage labor? The AI knows. And it doesn’t care that Jamal’s grandma died or that Becky was dealing with a panic attack during the lunch rush.

There is no empathy in ones and zeroes. Only quotas.

“Real-Time Satisfaction” = Emotional Surveillance

NeuroSpot proudly boasts that it can detect customer “satisfaction” in real time. You know what that means, right? It means we’ve crossed into full-on emotion surveillance. Smile wrong and the system will log it. Linger too long and you’ll be flagged.

Feeling anxious? Sad? Tired? That’s a downgrade to the café's performance index.

We are now asking workers to perform happiness on demand, under constant digital scrutiny, just to serve you a f**king Americano.

Ethics? That’s Cute

Why are we doing this? Why are we automating exploitation and calling it innovation?

Because it’s scalable. Because empathy isn’t profitable. Because human dignity has no place in a quarterly report.

This isn’t just unethical. It’s a war against the human spirit.

🔥 Burn the Roast, Not the Workers

We’re building coffee shops that look more like interrogation rooms. If we don’t stop this, there won’t be baristas in five years, just uniformed automatons begging for positive customer sentiment scores.

So next time you sip that overpriced cappuccino, ask yourself:
“Did a real person make this or did the algorithm let them?”

Then tip the barista.
And tell the AI to go f**k itself.

Source: Original linkedin Post

« Back to All Posts

My VPN Works Now and So Does My Ego

Posted on 2025-07-10 by Delta

Remember that guy who sold me the MikroTik router and thought changing the admin password made him some kind of off-brand CIA contractor? Yeah. Still haven’t called him back. Never will. I don’t need him. I needed revenge.

Read Full Post »

Remember that guy who sold me the MikroTik router and thought changing the admin password made him some kind of off-brand CIA contractor? Yeah. Still haven’t called him back. Never will. I don’t need him. I needed revenge.

So, after nuking the router’s config like a war crime and spending hours resurrecting it from the grave I lovingly dug, I decided it was time to make it do something useful. Like tunneling all my traffic through a VPN so I can pretend I live in a functioning society.

First, I set up the L2TP VPN. It said “connected” which, in MikroTik terms, means “I shook hands with the VPN server once and now I think we’re best friends.” But meanwhile, my traffic was still walking around naked in front of the ISP. DNS still snitching. Nothing routed.

Turns out MikroTik will absolutely lie to your face. It’ll say “yes sir, default route is added” and then quietly keep letting your ISP peek through the curtains. So I had to rip out the ISP’s default route like a rotten tooth and staple the VPN route in its place. Manually. Angrily. Without mercy.

I even got to use the GUI, which felt like I was doing surgery with a spoon. Every checkbox I unchecked was an act of personal defiance. Every NAT rule I added was a middle finger to the guy who said “yeah I always change the admin password.”

Eventually, it worked. The internet bent the knee. My IP changed. My DNS stopped talking. My network became a fortress.

And that guy? He’s probably still out there. Still changing passwords like he’s guarding state secrets. Still thinking I’ll come crawling back.

I won’t.
He gave me a puzzle.
I turned it into a hostage situation.
And now the router works for me.

« Back to All Posts

Digital Colonialism: Powered by DRM and VPNs

Posted on 2025-07-04 by Delta

Let me talk about something that’s been eating at me for a while.

A few years ago, I managed to buy a legit copy of a game. Not pirated. Paid real money. Jumped through all the hoops. VPN on, foreign payment gateway, fake address in a random European village. The whole hacker in the matrix experience, just to buy a game like a “normal” human being.

Read Full Post »

Let me talk about something that’s been eating at me for a while.
A few years ago, I managed to buy a legit copy of a game. Not pirated. Paid real money. Jumped through all the hoops. VPN on, foreign payment gateway, fake address in a random European village. The whole hacker in the matrix experience, just to buy a game like a “normal” human being.
It worked. I was excited.
For exactly two days.
Then the account got flagged. Probably the VPN fingerprint. Or maybe they didn’t like my IP location. Or maybe they just woke up cranky that day. Poof. Access revoked. Game gone. No refund. No appeal. Just a polite corporate middle finger and a reminder that I violated the “terms of service.”
And that was the moment it clicked:
If buying a game doesn’t mean I own it, then pirating a game doesn’t mean I stole it.
Ownership in the Age of DRM and Sanctions
Here’s what owning a game used to mean:
You buy the CD or DVD.
You install it.
You play it.
You lend it to a friend if you feel generous.
You uninstall it when your hard drive runs out of space.
You reinstall it five years later for nostalgia.

Now? Here’s what it means:
You buy a license.
You don’t really own the game.
You access it through a platform that tracks everything you do.
If you’re in the wrong country, you’re already violating terms.
If the company changes their policy, you lose access.
If your account gets flagged, too bad.

In countries like mine, just accessing a basic digital service is a daily gamble. Steam is blocked. Epic Games is blocked. Xbox is blocked. Payment systems? Not even an option.
And yet we’re expected to “play fair” in a system rigged against us?
Why Piracy Feels Like Justice
Let me ask you this. If a publisher refuses to sell me the game, deletes my account if I find a workaround, and offers me no legal method to buy their product, and then gets angry when I download it elsewhere, what exactly did I steal?
They didn’t lose a sale.
They didn’t give me a chance to make a sale.
I’m not saying piracy is some noble act of rebellion, but calling it theft feels dishonest. Because when I pirate a game, I don’t take anything. I copy it. The original is still there. The company still has their version. It’s not like I broke into their office and ran off with a server.
This isn’t theft.
It’s duplication, because the system doesn’t give me access to participate any other way.
When Access Is a Privilege, Not a Right
Let’s be real. Most people who pirate aren’t evil masterminds with skull rings and underground bunkers. They’re kids who want to play a game they can’t afford. Or developers who want to learn. Or people in sanctioned countries like mine, where even a free trial requires bending space and time.
And no, we’re not all stealing from hardworking developers. I would love to give my money directly to devs. But I can’t. The industry has made sure of that. Between region locks, card bans, platform restrictions, and surveillance systems that block entire countries from accessing digital stores, we’ve been priced out of the ecosystem by design.
Streaming Services: The New Gatekeepers of Disappointment
And while we’re at it, let’s talk about streaming. Because it’s not just games that are broken. The TV and movie industry looked at piracy, said “We can fix this,” and then proceeded to give everyone a reason to go right back to torrenting.
Remember when Netflix had everything? One subscription, endless binging. It was beautiful. Now? Every studio wants its own throne. You want to watch The Mandalorian? That’s on Disney+. Craving some Ted Lasso? Hello, Apple TV+. Feeling nostalgic for Breaking Bad? Good luck figuring out which service has it this month.
We went from pirating because nothing was available to pirating because everything is scattered across 7 overpriced platforms.
Let’s be honest. Why would I pay the equivalent of half a month’s rent just to access 2–5 decent series per service? Is that value? Or is that just a corporate pickpocketing session with glossy thumbnails?
They want us to pay premium prices, get ads anyway, lose access whenever they feel like it, and pretend like it’s normal. Sorry, but that’s not a streaming service. That’s digital gaslighting.
So yes, streaming is failing. And piracy isn’t just back — it’s thriving. Because when legal options become ridiculous, inconvenient, or downright exploitative, people don’t disappear. They adapt.
How to Pirate, Hypothetically Speaking
For research purposes only, here’s how some people allegedly start their piracy journey.
Step 1: VPN
Because living in Iran means you can’t do anything online without a VPN. Proton or Mullvad are good choices.
And while we’re at it, WireGuard is the new kid on the block — it’s faster, leaner, and more secure than old-school VPN protocols. Most modern VPN providers support it.
Even if you live in a less censored country, a VPN is still about privacy you own — encrypting your traffic, stopping ISPs and corporations from tracking your every move, and keeping your digital life your business.
So yeah, VPNs aren’t just for bypassing blocks. They’re a digital shield for anyone who values privacy.
Step 2: Torrent Client
Install qBittorrent. It’s lightweight, clean, and has no ads. Unlike some others that install 14 toolbars and 3 viruses.
Step 3: Find Your Stuff
Hypothetically, people visit:
1337x.to for torrents
fitgirl-repacks.site for games
Libgen for books
r/Piracy on Reddit for guides, tips, and philosophical debates about whether pirating The Sims is a political act
Step 4: Common Sense Mode
Don’t run random .exe files unless you trust the source. Don’t pay for pirated content, that defeats the whole point. And seed only if you’re brave or know what you’re doing.
Final Thoughts
Look. I’m not saying piracy is perfect. Or even always defensible.
But I am saying this:
If I have no legal path to ownership, then don’t act like I committed a crime when I take the only path that exists.
In a world where buying means renting, and access is denied by invisible borders and billion dollar companies, piracy becomes more than just copying files.
It becomes a language.
A protest.
A workaround.
Sometimes, just plain survival.
Inspired by You Don't Own Your Games – Accursed Farms

« Back to All Posts

Fake AirPods, Real Enlightenment

Posted on 2025-07-03 by Delta

I bought fake AirPods. Not “budget” AirPods. Not “alternative” AirPods. Fake. The forbidden fruit of tech consumerism. I used them for six months. They played music. The battery lasted. Life went on.

Read Full Post »

I bought fake AirPods. Not “budget” AirPods. Not “alternative” AirPods. Fake. The forbidden fruit of tech consumerism. I used them for six months. They played music. The battery lasted. Life went on. The mic? Not great. But guess what? Neither is the mic on my friend’s real AirPods that cost ten times more. So basically, we’re both shouting into overpriced plastic. Today, I casually mentioned my fake AirPods in a conversation. Instant silence. The type of silence people reserve for war crimes or pineapple on pizza. Then came the dramatic gasp. "Fake? Ew. Gross." Like I just licked a subway pole and said it was refreshing. Here’s the part I still don’t get. Why am I expected to pay ten times more for maybe five percent better audio and a case that blinks in a smug Apple-approved way? I don’t need status updates from my earbuds. I need sound. They deliver sound. Mission accomplished. But apparently, that’s not enough. Because we’ve reached a point in late-stage capitalism where your identity is defined not by your values or your actions but by whether the tiny gadget in your ear is officially blessed by a trillion-dollar corporation. Let’s talk about prestige. Not the movie. The illusion. The one where people think owning “the real thing” makes them more real. They treat logos like moral high ground. You bought the original? Amazing. Your character must be spotless. Your soul must be embossed in gold. What’s really funny is that both the real and the fake are often born in the same factory, assembled by the same underpaid workers who didn’t ask to be pawns in your weird flex war. The only difference is the sticker and your ego. Functionality should matter. Efficiency should matter. Making rational decisions with your money should matter. But no. We’d rather go bankrupt to feel superior for five minutes until the next upgrade drops and makes our precious prestige suddenly obsolete. So yes. I own fake AirPods. They work. I sleep fine. And if that bothers someone,
I promise the problem isn’t my earbuds. It’s their existential crisis.

« Back to All Posts

Quantum Computing: Because Waiting is So Last Century

Posted on 2025-07-02 by Delta

So, the brainiacs at the University of Southern California finally did it. They used one of IBM’s fancy 127-qubit quantum computers and solved a puzzle that would make your average classical computer cry itself to sleep. The headline? Quantum machines are exponentially faster.

Read Full Post »

So, the brainiacs at the University of Southern California finally did it. They used one of IBM’s fancy 127-qubit quantum computers and solved a puzzle that would make your average classical computer cry itself to sleep. The headline? Quantum machines are exponentially faster. That means the speed difference doesn’t just grow a little, it explodes like your grandma’s cooking when she forgets the oven is on. They tackled something called Simon’s problem, which is basically a quantum nerd’s version of a Rubik’s Cube.
Spoiler alert: classical computers are stuck trying every combo like a hamster on a wheel, while quantum computers just wave their magic qubits and boom!!! done. And yes, this speedup is unconditional. No smoke and mirrors here. No "maybe if" or "probably when"  just straight up quantum supremacy dropping the mic. Of course, these quantum whizzes didn’t get here by accident. They had to fight off error after error with fancy new tricks to keep those qubits from flipping out. And unlike past claims that sometimes sounded like sci-fi, this is legit proof that quantum computers aren’t just a nerd fantasy anymore. Now, before you start tossing your ancient Windows PC out the window, keep in mind that this tech still has a long way to go before it can do your taxes, play your video games, or find that one file you lost last year. But hey, at least we know the future won’t be stuck running Excel macros forever. So while your Windows XP rig is still chugging along, quantum computers are already somewhere in 2040, laughing and solving problems you didn’t even know existed.

Source: Science Daily

« Back to All Posts

RAR Files and the Art of Wasting Everyone’s Time

Posted on 2025-07-01 by Delta

RAR files suck. Not just in a "mild inconvenience" kind of way, but in a "why are you still a thing" way. Let’s talk about it. First, ZIP files. They're simple, clean, and just work. On Linux, you run unzip and boom, you’re in. On Windows, you double-click and it opens like a folder.

Read Full Post »

RAR files suck. Not just in a "mild inconvenience" kind of way, but in a "why are you still a thing" way. Let’s talk about it. First, ZIP files. They're simple, clean, and just work. On Linux, you run unzip and boom, you’re in. On Windows, you double-click and it opens like a folder. Even macOS plays along. No weird errors. No rituals. Just your files, ready to go. ZIP is the golden retriever of file formats. Loyal, easy-going, always there when you need it. You could probably unzip one on a microwave. Now TAR. Combine it with gzip or bzip2 or xz and you’ve got .tar.gz, .tar.bz2, .tar.xz. These are the Linux power tools. TAR keeps file permissions, symlinks, timestamps, everything. It’s made for real work. You want to back up a server? TAR. You want to send your buddy a meme folder? ZIP. You want to ruin your day and theirs? RAR. Here’s where it gets stupid. RAR is a proprietary format. It’s closed-source. That means if it breaks, you can’t fix it. You just sit there, helpless, while unrar spits out errors and disappointment. And on Linux? You often need the non-free version of unrar. Because apparently, freedom stops mattering once the file has a .rar at the end. It gets better. RAR isn’t natively supported anywhere. Not Windows. Not macOS. Definitely not Linux. You always have to install something extra. It's like the one guest who shows up at your house, eats your food, and then asks you to drive them home. And don’t even get me started on multi-part RAR files. .r00, .r01, .r02... What is this, a file or a math test? I just wanted one folder, not an episode of CSI: File Extraction. So let’s review: ZIP is fast, portable, and plays nice with everyone TAR is powerful, smart, and made for grown-ups RAR is annoying, old, and smells like cracked software from 2006
If you’re sending me RAR files, we’re not friends. Send a ZIP. Be a decent human being.

« Back to All Posts

When You Spend Millions on Firewalls but Karen Resets MFA Over the Phone

Posted on 2025-06-30 by Delta

Scattered Spider is now hijacking airlines and executive accounts using the most advanced hacking tool known to man: a phone call. That’s right. No malware, no exploits, no USBs taped under desks. Just a bored teenager with a LinkedIn tab open and a decent fake voice saying, “Hi, I’m the CFO, I forgot my MFA, help?”

Read Full Post »

Scattered Spider is now hijacking airlines and executive accounts using the most advanced hacking tool known to man: a phone call. That’s right. No malware, no exploits, no USBs taped under desks. Just a bored teenager with a LinkedIn tab open and a decent fake voice saying, “Hi, I’m the CFO, I forgot my MFA, help?” And the help desk, trained for exactly zero seconds in basic skepticism, says, “Of course, Mr. Executive, let me just hand you the keys to the kingdom.” The FBI has issued a warning, which is adorable, considering these companies still haven’t figured out that phone calls from strangers shouldn’t result in privileged access to internal networks. But sure, let’s pretend this is a new threat and not the same old con, just wearing a lanyard this time.

The attackers gather personal data like SSNs and birthdays from the vast ocean of already-leaked information, impersonate execs, and call support lines until someone caves. Once in, they surf through Azure, VMware, CyberArk and more, collecting sensitive data and occasionally sprinkling in some ransomware for flavor. The corporate response? Panic, blame the help desk, patch nothing, and keep buying overpriced closed-source security tools that light up like Christmas trees and stop absolutely nothing. This isn’t even hacking anymore. It’s theatre. It's cosplay. These companies are running billion-dollar infrastructures with the operational maturity of a school group project. Multi-factor authentication? Completely useless if Karen from Tier 1 IT will gladly reset it for the guy who sounds confident on the phone. And yet, they keep treating open-source solutions like they’re radioactive. God forbid anyone use transparent, auditable, community-reviewed software when you can just license another SaaS "zero trust" solution that your attacker can access with a convincing fake cough and a vague mention of being locked out of their Okta account. The moral of the story: your security isn’t a fortress, it’s a cardboard set. And Scattered Spider just blew it over by exhaling.

Source: The Hacker News – FBI Warns of Scattered Spider Attacks

« Back to All Posts

How I Gaslit Myself Into Thinking I Knew Networking.

Posted on 2025-06-29 by Delta

So I bought this MikroTik router from a guy who apparently thinks he works for the CIA. Because instead of, you know, giving me the admin credentials like a normal human being, he changed them. Without telling me. Like it's some sort of top-secret government-issued router and I'm just some civilian who should be grateful it even powers on.

Read Full Post »

So I bought this MikroTik router from a guy who apparently thinks he works for the CIA. Because instead of, you know, giving me the admin credentials like a normal human being, he changed them. Without telling me. Like it's some sort of top-secret government-issued router and I'm just some civilian who should be grateful it even powers on. Naturally, I call him. Politely, of course. By politely I mean aggressively passive-aggressive with just the right sprinkle of “oh wow that’s super helpful of you.” He responds with a calm “yeah I always do that.” Oh okay. Cool. Love that for me. Eventually I manage to log in. Miraculously. I don’t even know how. Probably divine intervention or maybe the router just gave up and let me in out of pity. Once inside, I think hey, let’s clean things up. Tidy the config a bit. Just a quick refresh. Famous last words.

I proceeded to absolutely destroy everything. Firewall rules? Deleted. Bridges? Gone. DHCP server? Obliterated. Every single setting that made the router functional? I deleted like I was speedrunning a disaster. Then, because clearly I hate myself, I restarted it. Guess who can’t access it now. Guess who bricked their router without physically breaking it. Guess who still refuses to call the guy back out of sheer stubbornness and pride. That’s right. Me. Now I’m reading MikroTik documentation like I’m studying for the final boss fight. Watching tutorials by dudes with thick accents and dead eyes. Googling things like “how to un-destroy your MikroTik router because you got cocky and now it’s personal.” I didn’t choose the networking life. The networking life chose violence and dragged me into it.

« Back to All Posts

Freedom, Visas, and Other Absurd Fantasies

Posted on 2025-06-26 by Delta

I was all set to travel to Canada for FSF40 to talk about software freedom, community resilience, and how Iranian techies are basically magicians for building anything under a digital iron curtain. My elevator pitch was ready, bags half-packed, heart full of hope. And then… Middle East happened.

Read Full Post »

I was all set to travel to Canada for FSF40 to talk about software freedom, community resilience, and how Iranian techies are basically magicians for building anything under a digital iron curtain. My elevator pitch was ready, bags half-packed, heart full of hope. And then… Middle East happened

Iran and Israel decided to play "12 Days of Boom" — a festive little exchange of missiles, blackouts, and existential dread. Just to spice things up, someone hit the big red "shut down the internet" button over here, as if that would fix anything besides morale. Now the war seems "over" (whatever that means), and I’m stuck with one tiny, bureaucratic problem: how the hell do I convince a Canadian visa officer that I will come back to Iran? Because, you know, war-torn country + internet censorship + no freedom of movement + government run by religious elders who treat logic like a Western conspiracy = totally the kind of place people rush back to. I mean, who wouldn’t want to return to a homeland where your online activity is monitored more closely than a Tinder chat with Mossad, and your passport is basically a colorful piece of nope at every border? But sure, let me go explain that to the embassy. "Yes sir, I solemnly swear I will return to my blessed theocracy where software freedom means using 15-year-old Linux distros because GitHub is sanctioned." What could go wrong?

« Back to All Posts

Iranian Hackers Maintain 2-Year Access to Middle East CNI via VPN Flaws and Malware

Posted on 2025-06-25 by Delta

Iranian hackers just wrapped up a two-year all-inclusive stay inside a Middle Eastern critical infrastructure network—brought to you by unpatched VPNs, open-source malware, and sheer audacity. From May 2023 to Feb 2025, our guests of honor (aka Lemon Sandstorm, formerly known as Pioneer Kitten—seriously, pick a name) waltzed in via old Fortinet/Pulse bugs.

Read Full Post »

Iranian hackers just wrapped up a two-year all-inclusive stay inside a Middle Eastern critical infrastructure network—brought to you by unpatched VPNs, open-source malware, and sheer audacity. From May 2023 to Feb 2025, our guests of honor (aka Lemon Sandstorm, formerly known as Pioneer Kitten—seriously, pick a name) waltzed in via old Fortinet/Pulse bugs, dropped web shells like confetti, and got comfy with a whole buffet of open-source backdoors: Havoc, MeshCentral, SystemBC, and friends. Yes, Havoc runs in-memory BOFs, pivots like a ballerina, and even registers itself with the C2 like a loyal intern. Built with love in C++ and Go—truly FOSS at its most weaponized.

Victim tried to kick them out in Dec '24. Hackers responded like: "lol ok" and came back through ZKTeco bugs and good ol' spear phishing. Moral of the story? Patch your VPNs, audit your FOSS stack, and maybe don’t use GitHub Gists as a C2 endpoint. Or do. Apparently, it works great.

« Back to All Posts

First Post

Posted on 2025-06-24 by Admin

Hey, world. Delta here. So… we’re in the middle of what feels like digital trench warfare in Iran. For ages, I wanted to start a blog — but let’s be real, procrastination is my default runtime. Today, I finally rage-quit the excuses and booted up Delta Libre.

Read Full Post »

Hey, world. Delta here. So… we’re in the middle of what feels like digital trench warfare in Iran. For ages, I wanted to start a blog — but let’s be real, procrastination is my default runtime. Today, I finally rage-quit the excuses and booted up Delta Libre — a space where I can speak freely, post recklessly, and hopefully not get firewalled into oblivion. If you’re a fellow blogger or digital freedom fighter, let’s connect and build something that even censorship can't grep.

« Back to All Posts

Why I Hate Python (But I’m Trapped in Its Whitespace Hug)

Posted on 2025-06-20 by Admin

python just sucks, thats it. Let me get one thing straight: I don’t dislike Python because it’s a bad language. I dislike Python because it tricked me. It pretended to be my friend. At first, it was all sunshine and print("Hello, world!"). Indentation felt elegant.

Read Full Post »

python just sucks, thats it.

Let me get one thing straight: I don’t dislike Python because it’s a bad language. I dislike Python because it tricked me. It pretended to be my friend. At first, it was all sunshine and print("Hello, world!"). Indentation felt elegant. Lists were easy. No curly braces? Cute! Until I blinked wrong and the whole thing crashed because I mixed tabs and spaces like some kind of syntax war criminal. But still, I endure. Why? Because I work for a company where speed means "deploy it by lunch," not "let’s optimize this loop." They don’t care if my algorithm runs in O(n) or O(n²)—as long as it runs, looks clean, and gets pushed to Git before the coffee cools. Do I want to use Rust? Absolutely. Would I love to refactor everything in Go, just for the thrill of static typing? You bet. But here I am. Writing Python. Every. Single. Day. Like some sort of duct-tape engineer in a startup spaceship held together by pandas, Flask, and broken dreams. Want to build a robust backend? Python. Need to scrape 8 million pages in under 5 minutes? Python. Want to cause a memory leak using just a bad import? Python’s got your back. And don’t get me started on package management. One day it’s pip, the next it’s pipx, then suddenly you’re inside a virtual environment so deep you forget what system you’re even on. “Works on my machine” has never felt more personal. So yes, I hate Python. But it pays the bills. It lets me deliver fast, fake it 'til I make it, and it doesn’t yell at me for not declaring types—because, let’s face it, Python is that chill coworker who doesn’t care what you wear to meetings as long as the report is done. In conclusion: I don’t choose Python. Python chooses me. And like Stockholm Syndrome, I’ve stopped resisting.

« Back to All Posts

Digital Neighborhood Watch 🚨

Not all traffic’s friendly some packets track, some exploit. Here’s my list of the real ones, the rebels, and the ones that should’ve been /dev/null’d yesterday.

The Trusted Collective ( Friends )

FLOSS & FOSS Projects (The Good Stuff)

  • »

    GNU Project

    gnu.org // the root of all software freedom.
  • »

    Free Software Foundation (FSF)

    fsf.org // defenders of user rights and digital ethics.
  • »

    EFF (Electronic Frontier Foundation)

    eff.org // defenders of user rights and digital ethics.
  • »

    Libre Mobile OS

    libremobileos.com/ // De-Googled andriod with TONS of features
  • »

    Parch Linux

    parchlinux-official.vercel.app // Persian Arch or water pitcher, you decide.
  • »

    Tails OS

    tails.boum.org // The absolute gold standard for privacy on the go.
  • »

    qBittorrent

    qbittorrent.org // Clean, powerful, and no bundled malware. See article [DigitalColonialism].
  • »

    WireGuard

    wireguard.com // Modern, simple, and fast VPN protocol.

The Firewall List (Foes & Threats)

  • Apple

    Luxury surveillance with rounded corners.[apple-vs-europe].

  • OpenAI

    centralized AI behind corporate gates.[].

  • Cloudflare

    centralizing the internet behind its proxy.[].

  • Amazon

    surveillance capitalism meets worker exploitation.[].

  • Google (Alphabet)

    data-mining monopoly controlling the web.[].

  • Nvidia

    hardware monopoly pushing proprietary drivers.[].

  • TikTok (ByteDance)

    spyware with dancing filters.[].

  • Meta

    a surveillance empire disguised as social media.[].

  • NeuroSpot

    The company turning cafes into surveillance labs. See article [CoffeeSlaves].

  • Proprietary File Formats (.RAR)

    The past needs to stay in the past. [RARsuck].

  • The Iranian Phone Advertisers

    A national-level harassment program. Blocked and reported. [FuckingAds].

Contact: Establishing a Secure Channel

Got a question, a brilliant idea, or just want to send memes? Slide into my inbox via the channels below, I promise I might respond faster than your Wi-Fi.

Direct Connect_

Email: delta@zist.digital

Matrix ID: delta_fsociety:matrix.org

Telegram: @deltaez

Mastadon delta_fsociety

Alternatively, you can use the form below for general inquiries:

// PGP key available upon request for encrypted communications.