Category Archives: Security

Integrity Breach Knocks Vultr Customer Offline: Cloud-Native Censorship by Authoritarians

Tencent, the $700 billion Chinese tech giant, wanted to silence a website that documents censorship on WeChat. The site, FreeWeChat, is run by GreatFire.org and archives posts that disappear from WeChat’s public platform, which means over 700,000 censored posts preserved for journalists and researchers.

One problem: FreeWeChat was hosted on infrastructure outside China so Tencent couldn’t just order it gone.

Instead, they laundered the censorship request, in what we should classify as an integrity breach of the GreatFire hosting provider.

The Attack Chain

Tencent to Gandi (France) to Group IB (Singapore) to Vultr (America).

Vultr’s Trust & Safety team looked at a trademark dispute letter, but Group IB actually said the quiet part out loud:

[FreeWeChat] is displaying articles which are censored/blocked by WeChat official channels.

That’s a data integrity attack.

There was no legal violation.

There was only journalism about censorship.

The complaint that GreatFire was doing its job was dressed up to fool Americans into enabling foreign state censorship.

Vultr Breach

Vultr suspended GreatFire’s servers within days. Then stonewalled for five months. Ignored detailed legal rebuttals. Ignored a letter from 17 human rights organizations. Ignored inquiries from NYU’s Technology Law & Policy Clinic.

On November 28, 2025, they terminated the account “without cause”, a betrayal of trust.

If Vultr believed the trademark claims had merit, they’d have terminated for cause and cited them. Instead they used a generic ToS provision that doesn’t require them to articulate a reason.

Their ToS Section 9(b) gives them the power to terminate with cause for IP violations: “(ii) have infringed or violated any intellectual property right.” If Tencent’s claims had merit, they could have used 9(b). They didn’t. They used 9(a) instead, “no reason”.

It’s a backdoor, it’s a safety gap, designed to foreclose moral accounting. They chose not to choose, which is itself a choice, and the most cowardly one available.

Vultr had leverage over GreatFire’s mission; that leverage came with trust and safety obligations they refused.

Untrustworthy Infrastructure

This is all about infrastructure resilience, data availability.

Authoritarian norms spread not by conquest but by exploiting vulnerabilities. Foreign states see now that American corporate compliance systems are vulnerable, not protective. Send a threatening letter dressed in IP language, and companies are easily breached. The Americans wither and run rather than defend a small customer against attack.

It’s censorship laundering, a targeted integrity breach.

The request gets cleaned through enough intermediaries and legal-sounding language that a Florida tech company processing it claims that censorship is policy and knocks their own customer offline.

The historical parallel isn’t subtle.

Authoritarian regimes have always sought extraterritorial reach by demanding that other countries return dissidents, suppress publications, enforce their speech rules beyond their borders. This cloud-native version just routes through Terms of Service instead of treaties.

What Now

If you’re a Vultr customer: LEAVE NOW, before you are breached.

Tell them why. Integrity breach by China.

If you’re a journalist: this is a clean story about security vulnerability in cloud providers. American tech enforces Chinese censorship, a Tencent complaint about “censored/blocked” content.

If you’re at another hosting provider: check your Trust & Safety processes protect trust and safety. Are you vulnerable to breach by pretextual abuse?

Contact Vultr directly. David Aninowsky and JJ Kardwell are real people who allowed their company to become an instrument of Chinese state censorship. They should have to own that:

  • David Aninowsky, Founder and Executive Chairman: contact
  • JJ Kardwell, CEO: contact

GreatFire has moved FreeWeChat to another provider, a disaster recovery plan for an integrity breach. Vultr remains breached, vulnerable to attack.

Movie Review: Tenet

Functional epistemology buried under broken physics.

I finally watched Tenet, and here’s what I think: obviously the physics are incoherent (everyone surely notices that) but there’s a real thing here too. Nolan replaced an actual working intelligence doctrine mechanism with a broken one because the broken one… is easier to photograph.

After I watched the movie I scanned as many reviews as I could find to see what’s been said. Everyone seems so busy ironing out “how a temporal pincer works” that they apparently don’t notice it’s isomorphic to something that already exists and works better.

I double checked and triple checked but people seem to think there is novel physics here, rather than recognizing a dramatized version of iterative learning with the epistemology stripped out and a cheap cinema trick inserted. It feels a bit like everyone trying to explain the physics of where and how a playing card disappeared after a magician stuffed it up his sleeve.

Nobody so far says: “Hey, this is just like a rehearsal on repeat with a guy walking backwards saying he’s from the future instead of admitting the last rehearsal.” So allow me to be the first?

Consider the simple kill house, which runs in a loop to modify outcomes optimizing for the kill. Team A runs through, takes notes, briefs team B before they go in with knowledge of how it went. The “reversal” is just… the information flowing from experienced team to fresh team. Is that magic? Is one participant really the story independent of the entire system, including outside observers? Compare the kill house to the “temporal pincer” foreknowledge:

  • Neil knows what’s coming because he’s “already experienced it”
  • One attack team proceeds through the event, taking careful notes, and then briefs the second team after it’s over. The second team then reverses direction and proceeds backward from the end, armed with the knowledge of what’s already happened.

Yeah, it’s the same stuff. I see a loop of intelligence doctrine for high stakes insertions that exists already, such as Neptune Spear. The implication for me is that hindsight-through-rehearsal produces exactly the same tactical advantage without requiring any “physics” magic or sleight of hand.

“Special operations forces used life-size models of the Abbottabad compound to practice their plan before executing the operation.” Source: CIA

All reviews drag the reader through a question of whether Neil is actually Max (Kat’s son). To me, this question answers itself because Neil is the kill house sergeant. He’s done all the rehearsals. His foreknowledge isn’t mystical, it’s institutional to the house. He knows what’s coming because he’s run this before, and the “future” he comes from is just the accumulated doctrine of completed iterations.

The emotional weight of sacrifice works because it’s the sergeant model, the guy who’s watched enough runs to know exactly how it ends, and walks into the final operation anyway. This is a Special Operations Master Sergeant who outknows the officers he serves. Nolan even gives a nod to this framing, with a “cavalry” leader wearing a beret barking things like “it’s need to know, and that’s not you”.

The self-fighting-self scene, for me, is therefore a smoking gun. That’s how the Nolan model totally breaks. In a real kill house, you could and would never fight yourself as the iterations inform each other as parts of the whole, they don’t infringe on each other. Nolan however seems to have been grasping for a spectacle, so he literalized a metaphor in a way that destroyed utility.

As Whitehead might say (using his “fallacy of misplaced concreteness”, from Science and the Modern World, 1925), there is an abstraction: “information flows backward from experienced team to fresh team.” And Nolan mistakenly flips that into concretization: “a person literally moves backward through time carrying information.” Even worse, moving backwards brings characters to say “what happened, happened”.

Ugh. The film brings the aesthetics of productive repetition while getting stuck in the ontology of static determinism. Ironic, maybe.

Tenet looks like it’s going to be a feedback loop, constantly pulling threads about changing the past, yet it really isn’t. In a closed block universe, there’s no genuine feedback, only the appearance. The output was always going to be what it was; the “feedback” is theater. Nolan instead could have drawn from kill house governance: a guy acts as the governor of the system, an element that observes outputs and adjusts inputs. It’s a real thing that works today in real life, without needing mysticism.

To be fair the film contains elements of both the coherent version (Neil as governor, integrator) and the incoherent version (self-combat). The figure who seems to “know too much” says “don’t shoot” to save a man from killing his “other” self in a fight, meaning Nolan simply chose not to foreground coherence. He foregrounds the broken mysticism as spectacle (rather than accumulated expertise), surely because that photographs far more easily and cheaply.

Nolan thus made a film about the philosophy of film. Reversed footage became ontology. The camera trick became a theology. Repetition is boring and inherently iterative. Filming a “Deming Cycle” of WWII wisdom about preventing WWIII would be considerably more difficult, even though a more coherent explanation.

Edge of Tomorrow knew this.

So did Groundhog Day.

They showed iterations as reversal. Nolan skipped the lessons, again ironic, and kept only the residue, a guy who “knows things” walks forward going backward. Nolan basically built a theology around a paradox of knowledge from running film backward, ignoring how Deming proved experts can see the future with a chalkboard.

Deming was a member of the five-man Emergency Technical Committee in WWII. He worked with H.F. Dodge, A.G. Ashcroft, Leslie E. Simon, R.E. Wareham, and John Gaillard in the compilation of the American War Standards (American Standards Association Z1.1–3 published in 1942) and taught SPC techniques to workers engaged in wartime production as well as for many years after.

Remembering the Encryption of Painter Rudolph Wacker

The remarkable thing about the paintings of Rudolph Wacker may be how unremarkably good they are (“New Objectivity”).

Sitting with friends the other day, I noticed every single person was saying their favorite painting of a set on the wall was by Wacker.

Winter Landscape, 1934. Rudolf Wacker

I mean, it’s like he had a way of capturing a scene in such an authentic way as to beg the question of why it’s even a scene. It’s a literal depiction of nothing in particular, a pleasing still life “magic of the everyday” that draws you in to wonder why.

During the rise of National Socialism in the 1930s, Rudolf Wacker created encrypted still lifes, which, in a subtle manner, allow us to relate to the abysses and threats of the time.

The Nazis certainly didn’t appreciate his perspective, as they tortured Wacker to death in 1939.

MIT Operationalizes CIA Robotic Insects: Precision Lethality at Paperclip Scale

MIT has materialized what the CIA has wanted since early in the Cold War: deniable, unattributable, precision lethality.

…tiny flying robots could be deployed to aid in the search for survivors trapped beneath the rubble after a devastating earthquake. Like real insects, these robots could flit through tight spaces larger robots can’t reach, while simultaneously dodging stationary obstacles and pieces of falling rubble. So far, aerial microrobots have only been able to fly slowly along smooth trajectories, far from the swift, agile flight of real insects — until now. MIT researchers have demonstrated aerial microrobots that can fly with speed and agility that is comparable to their biological counterparts.

Insect sized robots at MIT, offering autonomous targeted micro lethality. Reminiscent of 2018 Micro Air Vehicle Lab (MAVLab) bird-sized versions. Source: MIT

The “humanitarian” framing is the… beard. All the “cameras and sensors” they mention as “future work” is sheer euphemism. A payload at this scale doesn’t need to be explosive; a guided needle, a directed toxin, a micro-charge at close range even inside of critical infrastructure.

The evolution from surveillance drone to armed drone to precision kinetic strike happened over roughly two decades. In terms of recent Lebanon and Caribbean strikes, we’re talking about people who market the R9X Hellfire (“Ninja”) blades as precision reducing collateral damage — amputation and destruction as humanitarian language.

Same rhetorical pattern here.

The argument that smaller and more precise is more ethical has been the justification for every escalation in targeted killing capability starting even before “Tarzon” (TAllboy, Range and aZimuth ONly) bombs or shoulder-fired mini-nuclear “Davy Crockett” rockets were claimed to be how America should win the Korean War cleanly.

The American racial encoding of this “frontier” weapon named after a genocidal folk hero (M28/M29 Davy Crockett) entered service in May 1961. It was promoted as a “surgical” strike, in photos like this one, where a white soldier poses as a “big dick” who needs soldiers of color to load and unload him. The Crockett rocket fired an “atomic watermelon” with 20 tons radioactive TNT equivalent up to 3 miles away.

This new technology announcement compresses the “precision” death timeline even more significantly because:

  • Scale advantage: A paperclip-weight robot is essentially undetectable. No radar signature. Visual acquisition nearly impossible.
  • Penetration capability: Explicitly designed to go where “traditional quadcopters can’t” — through rubble, gaps, screens, gates, grills, broken windows
  • Autonomous targeting: The saccade movement they’re celebrating mimics how insects localize and identify — that’s targeting behavior, not just navigation

And look at the funding: Office of Naval Research, Air Force Office of Scientific Research. The search-and-rescue framing is a dual-use press release. The money trail tells you the most likely uses and customers.

The CIA failed in the 1970s to get their Insectothopter (let alone robotic birds of Project Aquiline) operational, for precisely the reason this MIT team solved: crosswind instability.

The Insectothopter. Source: CIA Archives

The 1970s robotic dragonfly design couldn’t handle more than a light breeze, an important context for everything MIT just demonstrated:

  • Wind disturbances of >1 m/s handled
  • Aggressive maneuvers with <5cm trajectory deviation
  • Autonomous control (AI) architecture that compresses decision-making to distributed and real-time

Sarah Bergbreiter explicitly notes in the news release by MIT that while the controller still runs externally, they’ve demonstrated onboard execution.

“This work is especially impressive because these robots still perform precise flips and fast turns despite the large uncertainties that come from relatively large fabrication tolerances in small-scale manufacturing, wind gusts of more than 1 meter per second, and even its power tether wrapping around the robot as it performs repeated flips,” says Sarah Bergbreiter, a professor of mechanical engineering at Carnegie Mellon University, who was not involved with this work. “Although the controller currently runs on an external computer rather than onboard the robot, the authors demonstrate that similar, but less precise, control policies may be feasible even with the more limited computation available on an insect-scale robot. This is exciting because it points toward future insect-scale robots with agility approaching that of their biological counterparts,” she adds.

That’s the tell.

External computation means tethered, lab-bound demonstrations with oversight. Onboard computation means operational without oversight. She’s essentially confirming a roadmap to fly around and find out.

Search-and-rescue framing isn’t just cover for academic institutions appropriating funds, it’s how the Lincoln Laboratory gets graduate students to create weapons without moral injury or considering what happened when MIT’s death machines, known as Operation Igloo White, illegally destroyed Cambodia (Operation Menu).

Scene from “Bugging the Battlefield” by National Archives and Records Administration, 1969
Cambodia Genocide Map: US Bombing Points 1965-73, Source: Yale