Join devRant
Do all the things like
++ or -- rants, post your own rants, comment on others' rants and build your customized dev avatar
Sign Up
Pipeless API

From the creators of devRant, Pipeless lets you power real-time personalized recommendations and activity feeds using a simple API
Learn More
Search - "communications"
-
Asshole trying to steal credit for my work. Can't wait for the next meeting to light this shit.
So this client hires me and this person that I'm gonna call 'B'. B deletes my name from the comments and description. Then proceeds to present it as his.
But B can't get it to run now, so they have me have a look at it. B thinks that I don't notice that he is trying to take credit for my shit. Now I'm sitting here with evidence for the next meeting with the client. Ignoring all of B's communications.54 -
We're using a ticket system at work that a local company wrote specifically for IT-support companies. It's missing so many (to us) essential features that they flat out ignored the feature requests for. I started dissecting their front-end code to find ways to get the site to do what we want and find a lot of ugly code.
Stuff like if(!confirm("blablabla") == false) and whole JavaScript libraries just to perform one task in one page that are loaded on every page you visit, complaining in the js console that they are loaded in the wrong order. It also uses a websocket on a completely arbitrary port making it impossible to work with it if you are on a restricted wifi. They flat out lie about their customers not wanting an offline app even though their communications platform on which they got asked this question once again got swarmed with big customers disagreeing as the mobile perofrmance and design of the mobile webpage is just atrocious.
So i dig farther and farthee adding all the features we want into a userscript with a beat little 'custom namespace' i make pretty good progress until i find a site that does asynchronous loading of its subpages all of a sudden. They never do that anywhere else. Injecting code into the overcomolicated jQuery mess that they call code is impossible to me, so i track changes via a mutationObserver (awesome stuff for userscripts, never heard of it before) and get that running too.
The userscript got such a volume of functions in such a short time that my boss even used it to demonstrate to them what we want and asked them why they couldn't do it in a reasonable timeframe.
All in all I'm pretty proud if the script, but i hate that software companies that write such a mess of code in different coding styles all over the place even get a foot into the door.
And that's just the code part: They very veeeery often just break stuff in updates that then require multiple hotfixes throughout the day after we complain about it. These errors even go so far to break functionality completely or just throw 500s in our face. It really gives you the impression that they are not testing that thing at all.
And the worst: They actively encourage their trainees to write as much code as possible to get paid more than their contract says, so of course they just break stuff all the time to write as much as possible.
Where did i get that information you ask? They state it on ther fucking career page!
We also have reverse proxy in front of that page that manages the HTTPS encryption and Let's Encrypt renewal. Guess what: They internally check if the certificate on the machine is valid and the system refuses to work if it isn't. How do you upload a certificate to the system you asked? You don't! You have to mail it to them for them to SSH into the system and install it manually. When will that be possible you ask? SOON™.
At least after a while i got them to just disable the 'feature'.
While we are at 'features' (sorry for the bad structure): They have this genius 'smart redirect' feature that is supposed to throw you right back where you were once you're done editing something. Brilliant idea, how do they do it? Using a callback libk like everyone else? Noooo. A serverside database entry that only gets correctly updated half of the time. So while multitasking in multiple tabs because the performance of that thing almost forces you to makes it a whole lot worse you are not protected from it if you don't. Example: you did work on ticket A and save that. You get redirected to ticket B you worked on this morning even though its fucking 5 o' clock in the evening. So of course you get confused over wherever you selected the right ticket to begin with. So you have to check that almost everytime.
Alright, rant over.
Let's see if i beed to make another one after their big 'all feature requests on hold, UI redesign, everything will be fixed and much better'-update.5 -
Looks like I'm getting fired on Wednesday :)
Long story:
*I add first unit tests to project.
*Boss adds new functionality and breaks all the tests so I can't compile and write more for what I'm working on.
*Boss is very fragile and cannot handle any comment that can possibly be taken as a slight against him.
Me: "I wanted to ask what our policy on unit tests is please? Because we haven't really said how we are treating unit tests, and everyone myself included is not thinking about them. I also haven't added tests when I fixed bugs and this time your changes broke the tests"
Boss 10 minutes later: "I want to speak to you in private".
Boss: "you are too forceful and direct. You said I should have added tests."
Me: "yeah but I didn't mean in a nasty way"
Boss getting louder and more aggressive: "You are too forceful"
Me: "I didn't mean it in a bad way"
Boss: "I didn't want to add tests for that!"
Me: "then why add any tests?"
Boss: "Fine we are not having this conversation now!"
*Boss storms out
I decided I can't speak to the guy about anything without upsetting him spoke to the manager before I quit because I can't work like this.
That resulted in a meeting with my boss, his boss and the head of HR where I ended up savaging him and told them I can't bring up anything as I can never tell if it will offend him and that I spend ages writing emails and trying to document communications because I just can never tell if I will upset him. Also that I cannot bring up any ideas because I can't tell if he will somehow get offended and that I can't even write code because if I change something he wrote at some point he will get angry.
My boss claims that I am extremely forceful and disrespectful and that I am constantly insulting him and his decisions.
We go back over a ton of shit and I refute everything he says. In the end I have to have a meeting with him on Wednesday where we either get things straight, he fires me or I quit.
I think at this point that our relationship is too fucked for him to be my team lead on a 6 man team.
Side note I keep bringing forth ideas because we have one database shared between 6 Devs, no pull requests (apart from mine and another new guy), no test driven development, no backlog, no team driven story pointing, no running tests before merging, no continuous integration setup, no integration tests, no build step on merge, no idea of if we are on track to our deadline other than his gut feeling, no actual unit tests backend - just integration with a test db, no enthusiasm to learn in the team and no hope.21 -
Demoing a new feature in the Dev environment.
Me: The images are just placeholders. The communications team are still coming up with appropriate images.
Management: Can we change that image? It doesn't really fit the theme of what we are trying to achieve.
Me: As mentioned earlier, all images are just placeholders. Continues demo.
Management: That image also doesn't really fit with the theme. Can we change that one too?
Me: 🙄6 -
Senior C++ developer:
"Writing a custom encryption algorithm from scratch for our communications platform? Every developer knows that is an absolute no go, cryptography should be left to cryptography veterans!"
Same guy, year later:
"Blockchains? Hold my espresso, I can totally write a whitepaper on cryptography, write some shitty code with nice branding, and get millions from an ICO"1 -
Started working at a large company with promises of a great framework, stable environment and bleeding edge tools, decentralised working environment, only to find visual studio 2010, no git, no project management tooling whatsoever, all documentation stored on svn, no slack or other modern communications platform, still using uploaded word documents as documentation for projects and meetings, so yeah I can truly say :/11
-
> In office for first time in awhile
> Run into group of 4 people I don’t recognize in far cubicle corning laughing in hushed voices eating of an impressive spread of food
> See me and immediately look at each other with panicked expressions
> Confused, I put my hands up to indicate I come in peace
> They relax a little and say they thought I was from HR since they didn’t recognize me
> Ask why HR seeing them would be such a big deal
> They say their potluck is not “sanctioned”
> …?
So apparently HR just could resist ruining one of the only good things about coming into the office and one of the coolest things about the company’s culture. At least once a month there would be a giant potluck where everyone would bring some home cooked dish and share it. I can’t tell you how amazing these are in Canada, 50+ plates of authentic food from all over the world.
Unfortunately HR didn’t agree as 1. They didn’t cook so felt bad taking food. 2. Nobody asked them permission to put on these events they just happened organically. 3. Some people were bringing in food that they felt was culturally inappropriate (ie. caucasian guy bringing in homemade sushi).
HR recently banned all “unsanctioned” potlucks and all future potlucks needed to be approved through them with the following stipulations. 1. You could participate without bringing something by donating to HR $10 2. If you brought something you still had to give HR $10. 3. Things you brought in had to be approved by HR
Naturally the first and only potluck under these rules only 4 people brought something in as many couldn’t get their dishes approved because HR didn’t like what they were planning to bring (started out as being because culture and turned into HR just being picky), most just brought $10 so there wasn’t enough food to go around and so after HR took a giant group photo to post on the company’s social media accounts to show off how good the company’s culture is most everyone had to go out for lunch. HR sent out an email later that day exclaiming what a huge success for charity and the company brand the potluck was and they can’t wait for the next one. (I have the HR communications email marked as spam so I never saw the email). Nobody ever organized a sanctioned potluck after that.
However people still missed cooking and sharing their favourite recipes with one another so potlucks still occur but they are now very small, secret, invite-only, hush-hush affairs.
…What in the ever loving fuck17 -
The coolest project I've worked on was for a certain country's Navy. The project itself was cool and I'll talk about it below but first, even cooler than the project was the place were I worked on it.
I would go to this island off the coast where the navy had its armoury. Then to get into the armoury I'd go through this huge tunnel excavated in solid rock.
Finally, once inside I would have to go thru the thickest metal doors you've ever seen to get to crypto room, which was a tiny room with a bunch of really old men - cryptographers - scribbling math formulae all day long.
I can't give a lot of technical details on the project for security reasons but basically it was a bootable CD with a custom Linux distro on it. Upon booting up the system would connect to the Internet looking for other nodes (other systems booted with that CD). The systems would find each other and essentially create an ad-hoc "dark net".
The scenario was that some foreign force would have occupied the country and either destroyed or taken control of the Navy systems. In this case, some key people would boot these CDs in some PC somewhere not under foreign control (and off the navy grounds.) This would supposedly allow them to establish secure communications between surviving officers. There is a lot more to it but that's a good harmless outline.
As a bonus, I got to tour an active aircraft carrier :)8 -
"Enigma machine kep private the communications done by Nazi. It was a really difficult code to break because it changed each day. There was a man in England, Alan Turing, who broke it. He's nowadays known as one of the fathers of the Computer Science. I will show in the next lessons how you can simulate Enigma coder just with an easy C program of 60-70 lines. In the WW2 this was considered a military-level safe code. Thanks to mathematicians, computer scientist and analyst and thanks to their work in the last 60 year, you have access to a systems of several orders of magnitude more efficient and secure when you buy a videogame online."
That really fucking inspired me.8 -
What I'm posting here is my 'manifesto'/the things I stand for. You may like it, you may hate it, you may comment but this is what I stand for.
What are the basic principles of life? one of them is sharing, so why stop at software/computers?
I think we should share our software, make it better together and don't put restrictions onto it. Everyone should be able to contribute their part and we should make it better together. Of course, we have to make money but I think that there is a very good way in making money through OSS.
Next to that, since the Snowden releases from 2013, it has come clear that the NSA (and other intelligence agencies) will try everything to get into anyone's messages, devices, systems and so on. That's simply NOT okay.
Our devices should be OUR devices. No agency should be allowed to warrantless bypass our systems/messages security/encryptions for the sake of whatever 'national security' bullshit. Even a former NSA semi-director traveled to the UK to oppose mass surveillance/mass govt. hacking because he, himself, said that it doesn't work.
We should be able to communicate freely without spying. Without the feeling that we are being watched. Too badly, the intelligence agencies of today do not want us to do this and this is why mass surveillance/gag orders (companies having to reveal their users' information without being allowed to alert their users about this) are in place but I think that this is absolutely wrong. When we use end to end encrypted communications, we simply defend ourselves against this non-ethical form of spying.
I'm a heavy Signal (and since a few days also Riot.IM (matrix protocol) (Riot.IM with end to end crypto enabled)), Tutanota (encrypted email) and Linux user because I believe that only those measures (open source, reliable crypto) will protect against all the mass spying we face today.
The applications/services I strongly oppose are stuff like WhatsApp (yes, encryted messages but the metadata is readily available and it's closed source), skype, gmail, outlook and so on and on and on.
I think that we should OWN our OWN data, communications, browsing stuffs, operating systems, softwares and so on.
This was my rant.17 -
We lost a frontend developer who used dozens of hipster libraries without any communications with other devs and replaced him with this one that has just pushed all the node_modules to master branch with all of her local config files. God. Fucking. Dammit.7
-
Conversation between me (intern) and a guy from communications, let's call him Bob.
Bob: "Hey, client X wants these pages to be changed."
Me: "Again? Last time I changed them was less than a week ago!"
Bob: "Yeah, everyone thinks X is a pain in the ass, but hey, more money for us."
Me: "But you don't pay me..."
Bob: "Oh yeah, you're right haha XD."
Me: "Haha... :')"2 -
I'm unbelievably angry. So please bear with my venting.
QA guy and I are stuck working the entire weekend. A few months ago our company decided to promote an account manager to a Product/Project management role with 0 experience and offering them 0 training. They have no experience working with devs and have been making our lives hell. I work easily 50-60hrs per week and they still budget projects according to 40hrs/week meaning they're stealing my time not to mention they're incorrectly setting the client's and company's expectations.
They now have complete control over roadmaps, client communications (this wouldn't normally be bad except that they're having technical discussions with the client with 0 tech experience), timelines, etc. and since their experience was in account management they are now working with devs but making decisions that exclusively put the client first at all costs, even if it means everyone else has to work weekends while they go on vacation!!!!
I've approached them several times to offer help on budgeting time or to propose that we do a Q4 planning so that we can improve the product instead of stay in a shitty position as we are. I'm responded with "You deal with what's in front of you. It's my job to look at the bigger picture."
They mismanaged a $500,000 project and our CEO got wind of it because the client called him while he was travelling. He in turn gave shit to our Directors who in turn chewed the QA guy and I out. "You need to be more meticulous when deploying. How could you let this happen? We're eating shit because of this. You need to work over the weekend to make up for this", etc.
I'm now directly responsible for having delivered something that wasn't up to standards even though I was already putting in the overtime.
This is honestly fucking ridiculous. How can I be blamed when I'm truly doing the best I can and putting as many hours as I can while edging toward burnout.
I love what I do but I hate feeling extremely pressured to turn down friends and family like this. Maybe I'm just too easy going and need to say no more. Who fucking knows. I know that I'm angry with the company right now.
What do you all think? If you read this rant, thank you. Feels better to write it out.12 -
Here are the reasons why I don't like IPv6.
Now I'll be honest, I hate IPv6 with all my heart. So I'm not supporting it until inevitably it becomes the de facto standard of the internet. In home networks on the other hand.. huehue...
The main reason why I hate it is because it looks in every way overengineered. Or rather, poorly engineered. IPv4 has 32 bits worth, which translates to about 4 billion addresses. IPv6 on the other hand has 128 bits worth of addresses.. which translates to.. some obscenely huge number that I don't even want to start translating.
That's the problem. It's too big. Anyone who's worked on the internet for any amount of time knows that the internet on this planet will likely not exceed an amount of machines equal to about 1 or 2 extra bits (8.5B and 17.1B respectively). Now of course 33 or 34 bits in total is unwieldy, it doesn't go well with electronics. From 32 you essentially have to go up to 64 straight away. That's why 64-bit processors are.. well, 64 bits. The memory grew larger than the 4GB that a 32-bit processor could support, so that's what happened.
The internet could've grown that way too. Heck it probably could've become 64 bits in total of which 34 are assigned to the internet and the remaining bits are for whatever purposes large IP consumers would like to use the remainder for.
Whoever designed IPv6 however.. nope! Let's give everyone a /64 range, and give them quite literally an IP pool far, FAR larger than the entire current internet. What's the fucking point!?
The IPv6 standard is far larger than it should've been. It should've been 64 bits instead of 128, and it should've been separated differently. What were they thinking? A bazillion colonized planets' internetworks that would join the main internet as well? Yeah that's clearly something that the internet will develop into. The internet which is effectively just a big network that everyone leases and controls a little bit of. Just like a home network but scaled up. Imagine or even just look at the engineering challenges that interplanetary communications present. That is not going to be feasible for connecting multiple planets' internets. You can engineer however you want but you can't engineer around the hard limit of light speed. Besides, are our satellites internet-connected? Well yes but try using one. And those whizz only a couple of km above sea level. The latency involved makes it barely usable. Imagine communicating to the ISS, the moon or Mars. That is not going to happen at an internet scale. Not even close. And those are only the closest celestial objects out there.
So why was IPv6 engineered with hundreds of years of development and likely at least a stage 4 civilization in mind? No idea. Future-proofing or poor engineering? I honestly don't know. But as a stage 0 or maybe stage 1 person, I don't think that I or civilization for that matter is ready for a 128-bit internet. And we aren't even close to needing so many bits.
Going back to 64-bit processors and memory. We've passed 32 bit address width about a decade ago. But even now, we're only at about twice that size on average. We're not even close to saturating 64-bit address width, and that will likely take at least a few hundred years as well. I'd say that's more than sufficient. The internet should've really become a 64-bit internet too.34 -
Part 1: https://devrant.com/rants/4210605
So let's talk about these tasks we were assigned. Ms Reliable and Mr DDTW's friend who I just realized I haven't named yet were in charge of programming communications. Ms Enabler and Mr DDTW were in charge of creating the vehicle subclasses for the new variants we were instructed to build. Each one had to handle one variant, and we estimated that both of these would be about the same difficulty (Ms Enabler's one turned out to be a little harder).
I like Ms Enabler, and she's a good friend, although she isn't the best at problem solving and her strengths as a dev lie in her work ethic and the sheer amount of theory she knows and can apply. These just so happened to be the exact opposites of my strengths and weaknesses. Within a few days of having assigned the tasks, she came up to me asking for help, and I agreed. Over the following couple of weeks I'd put in quite a lot of hours reviewing the design with her, and we'd often end up pair programming. It was more work for me, but it was enjoyable and overall we were very efficient.
The other two girls in the group were also absolutely fine this sprint. They simply did the work they had to and let us know on time. Outside of some feedback, requests, bugfixes, and mediating disagreements, I didn't have to do anything with their tasks.
A week and half into the sprint and everybody else has their part almost in an MVP state. As Mr DDTW hadn't said or shown anything yet, I asked if he could push his stuff to the repo (he got stuck with this and needed help btw), and what does he have?
A piece of shit "go to this location" algorithm that did not work and was, once again, 150 lines of if statements. This would not have been such a massive deal if THE ENTIRE PREVIOUS SPRINT HAD BEEN DEDICATED TO MAKING THE CODE DO THIS IN A SENSIBLE WAY. Every single thing that this guy had written was already done. EVERY SINGLE THING. A single function call with the coordinates would let the vehicle do what he wrote but in a way THAT ACTUALLY WORKED AND MADE THE TINIEST BIT OF FUCKING SENSE. He had literally given so few shits about this entire goddamn project that he had absolutely zero clue about what we'd even done last sprint.
After letting this man civilly know through our group chat about his failures, giving him pointers on what's wrong and what he can use and telling him that he should fix it by the end of the week, his response?
"I'll try"
That was it. Fuckass was starting to block us now, and this was the first sign of activity he's given since the sprint started. Ms Enabler had finished her work a fucking week ago, and she actually ASKED when she ran into trouble or thought that something could be improved. Mr DDTW? He never asked for shit, any clarification, any help, and I had let everybody know that I'm open. At least the other two who didn't ask for shit ACTUALLY DID SOMETHING. He'd been an useless sack of shit for half a semester in three separate projects and the one time he's been assigned something half important that would impact our grades he does this. I would not stand for it.
I let him know all this, still civil (so no insults) but much less kind, capped with "Stop fooling around. Finish this by the of the week." which probably came off as a threat but his shithead kinda had it coming.
He was actually mad. Dropped a huge faux-apologetic spiel in the chat. Why couldn't I just trust him (his code was garbage and he was constantly late without explanation), his work was almost done (it wasn't and if he'd started he'd understand the scope of what he was assigned), that the problem was that I'm a condescending piece of shit (bruh), and was suddenly very interested in doing work. Literally everybody ignored him. What was funny was seeing the first questions and requests for help after that spiel. I obliged and actually answered what he asked.
The end of the week came and went he'd just uploaded more garbage that didn't work. I had foreseen this and, on top of everything else, had been preparing his section of the work done by myself and properly. Thus came a single commit from me with a working version of the entire module, unblocking the entire team. I cannot imagine the sheer hatred for this man at that moment for the commit message to simply be:
"judgement"
And with that, all I got was a threat to report me to the professor for sabotaging his work. The following day our group got an email from the professor, with no explanation, asking for an almost-immediate video conference. Group chat was a shitshow of panic, as nobody knew what was going on. Least of all Mr DDTW.
Once again, I'm approaching the word limit so to be continued in part 3 (hopefully of 3)7 -
Remember Apple's initiative to scan photos on user's devices to find child pornography?
Today I finally decided to research this.
The evidence is conflicting.
For context, the database of prohibited material is called CSAM (child sexual abuse material).
“If it finds any CSAM, it will report the user to law enforcement.”
— Futurism
“Apple said neither feature would compromise the security of private communications or notify police.”
— NPR
CSAM initiative is dead. It won't scan photos in iCloud. It won't scan photos on your device. It will be a feature that only works in some countries, only on children's devices, and it will be opt-in. It will only work for iMessage attachments.
This is what Apple actually said at https://www.apple.com/child-safety:
- “Features available in Australia, Belgium, Brazil, Canada, France, Germany, Italy, Japan, Netherlands, New Zealand, South Korea, Spain, Sweden, UK, and U.S.”
- “The Messages app includes tools to warn children when receiving or sending photos that contain nudity. These features are not enabled by default. If parents opt in, these warnings will be turned on for the child accounts in their Family Sharing plan.”
News outlets telling people they will be automatically reported to authorities, and then telling there can be false-positives is a classic example of fearmongering. I hate this. Remember, anger and fear are the most marketable emotions. They make you click. News are and will always be worded to cause these emotions — it brings in money.
When presented with good news, people think they're not being told the truth. When presented with bad news, even when they're made up, people think it's the truth that's being hidden from them. This is how news works.
Now, a HUGE but:
Apple is a multi-billion dollar corporation. There is no such thing as good billionaires. Corporations will always wait for chances to invade privacy. It's like boiling the frog — one tiny measure here, one there, and just like this, step by step, they will eliminate the privacy completely. It's in their interest to have all the data about you. It brings control.
This is not the first time Apple tries to do shit like this, and it definitely won't be the last. You have to keep an eye on your privacy. If you want your privacy in the digital age, it's necessary to fight back. If you live in Europe, take the action and vote for initiatives that oppose corporate tyranny and privacy invasions.
Privacy on the internet is one thing, but scanning people's devices is a whole another thing. This is unacceptable no matter the rationale behind it. Expect more measures like that in the near future.
Research Linux. Find a distro that suits you. The notion that you can't switch because of apps/UI/etc. may be dictated by our brain's tendency to conserve energy and avoid the change.
Take a look at mobile distros like Graphene OS and LineageOS. The former only supports Pixel devices, the latter supports a wide range of devices including OnePlus and Xiaomi. They'll have FAR better privacy than iPhones.
Consider switching. It's easier than you think. Yes, it's me who's saying this. I do and will always protect people/companies from unjust criticism, and I consider myself an Apple fangirl for personal reasons related to my childhood, yet I won't fight blindly. CSAM initiative is a valid criticism, and there's nothing preventing me from saying this is unacceptable, and Apple deserves the backlash they got.11 -
Experimental networking protocols that ran on the International Space Station to test deep space communications.6
-
"A Single Line of Computer Code Put Thousands of Innocent Turks in Jail"
I'll leave the title as it was, but people were hunted down just for having been once logged by a tracking pixel inside a messaging app.
Simply terrifying, I hold that off for a while, since it sounded like the usual fakes, but it seems its not, as more and more keep confirming it.
"The government eventually exonerated 11,480 of the wrongly accused, but some had already spent months in prison, and reportedly some even committed suicide."
"Elif finished dressing her youngest and watched police search her family's home before they took her into custody — for using a messaging app the government deems seditious.
She knew the arrest was coming. She'd already lost her job, because traces of the app known as Bylock were found on her phone"
"The regime relies on logs from the country's ISPs to identify users of Bylock, fingerprinting them on the basis of their communications with Bylock's servers. These communications can be triggered without using Bylock, though: Bylock's tracking pixel was used for analytics for pop-up ads and in at least eight apps."
https://m.slashdot.org/story/336657
http://cbc.ca/beta/news/...
https://boingboing.net/2018/01/...7 -
It's finally happened. I've used my mail servers for about a year to give out different email addresses on my domain to things I sign up for online, and only used my "actual" email address that received all this email for the whole domain but the single one that I used outbound for private communications.
This worked well for a long time as I could see when spam comes in, where it came from by looking at the email address I designated it. Each company's email would be sent not only from an email address that they choose, but also to an email address that I choose. It allowed me to easily determine where there were problems. For example, on Freenode IRC my vhost happened to make my username@host there a valid email address. It eventually got blacklisted due to too much incoming spam as crawlers started detecting it. Another one was "nickname"@my.domain as I posted it a few times here. Got crawled as well. But it allowed me to easily blacklist each.
I'd never thought my actual outbound email address, my real one, to get crawled though. That would require the mail server of a company I explicitly communicated with to get hacked. But today that happened. I wonder whose it is, but I can't tell.
Time to make my outgoing email bound to a designated email address as well. I want to know which companies this happens to, even if they don't disclose it.4 -
Woohoo!!! I made it to 1000++s :) Now I feel less newbie-like around here :)
So... I don't want to shit-post, so in gratitude to all you guys for this awesome community you've built, specially @trogus and @dfox, I'll post here a list of my ideas/projects for the future, so you guys can have something to talk about or at least laugh at.
Here we go!
Current Project: Ensayador.
It's a webapp that intends to ease and help students write essays. I'm making it with history students in mind, but it should also help in other discipline's essay production. It will store the thesis, arguments, keywords and bibliography so students can create a guideline before the moment of writting. It will also let students catalogue their reads with the same fields they'd use for an essay: that is thesis, arguments, keywords and bibliography, for their further use in other essays. The bibliography field will consist on foreign keys to reads catalogued. The idea is to build upon the models natural/logical relations.
Apps: All the apps that will come next could be integrated in just one big app that I would call "ChatPo" ("Po" is a contextual word we use in my country when we end sentences, I think it derived from "Pues"). But I guess it's better to think about them as different apps, just so I don't find myself lost in a neverending side-project.
A subchat(similar to a subreddit)-based chat app:
An app where people can join/create sub-chats where they can talk about things they are interested in. In my country, this is normally done by facebook groups making a whatsapp group and posting the link in the group, but I think that an integrated app would let people find/create/join groups more easily. I'm not sure if this should work with nicknames or real names and phone numbers, but let's save that for the future.
A slack clone:
Yes, you read it right. I want to make a slack clone. You see, in my country, enterprise communications are shitty as hell: everything consists in emails and informal whatsapp groups. Slack solves all these problems, but nobody even knows what it is over here. I think a more localized solution would be perfect to fill this void, and it would be cool to make it myself (with a team of friends of course), and hopefully profit out of it.
A labour chat-app marketplace:
This is a big hybrid I'd like to make based on the premise of contracting services on a reliable manner and paying through the app. "Are you in need of a plumber, but don't know where to find a reliable one? Maybe you want a new look on your wall, but don't want to paint it yourself? Don't worry, we got you covered. In <Insert app name> you can find a professional perfect to suit your needs. Payment? It's just a tap away!". I guess you get the idea. I think wechat made something like this, I wonder how it worked out.
* Why so many chat apps? Well... I want to learn Erlang, it is something close to mythical to me, and it's perfect for the backend of a comms app. So I want to learn it and put it in practice in any of these ideas.*
Videogames:
Flat-land arena: A top down arena game based on the book "flat land". Different symmetrical shapes will fight on a 2d plane of existence, having different rotating and moving speeds, and attack mechanics. For example, the triangle could have a "lance" on the front, making it agressive but leaving the rest defenseless. The field of view will be small, but there'll be a 2d POV all around the screen, which will consist on a line that fills with the colors of surrounding objects, scaling from dark colors to lighter colors to give a sense of distance.
This read could help understand the concept better:
http://eldritchpress.org/eaa/...
A 2D darksouls-like class based adventure: I've thought very little about this, but it's a project I'm considering to build with my brothers. I hope we can make it.
Imposible/distant future projects:
History-reading AI: History is best teached when you start from a linguistic approach. That is, you first teach both the disciplinar vocabulary and the propper keywords, and from that you build on causality's logic. It would be cool to make an AI recognize keywords and disciplinary vocabulary to make sense of historical texts and maybe reformat them into another text/platform/database. (this is very close to the next idea)
Extensive Historical DB: A database containing the most historical phenomena posible, which is crazy, I know. It would be a neverending iterative software in which, through historical documents, it would store historical process, events, dates, figures, etc. All this would then be presented in a webapp in which you could query historical data and it would return it in a wikipedia like manner, but much more concize and prioritized, with links to documents about the data requested. This could be automated to an extent by History-reading AI.
I'm out of characters, but this was fun. Plus, I don't want this to be any more cringy than it already is.12 -
A popular social media website in my country (which my friends and I were working on it's new design) was hacked and everyone on the dev side of the website was invited to the ministry of communications, believing we were going to discuss security of user data. The other guys (working on the back-end) were friends with the CEO (if you want to call it that) and naturally came to the meeting. They started to talk about the girls of their city. Meanwhile about 1.2 million user data encrypted with MD5 was out there.6
-
Hi everyone, just discovered this wonderful community and I've got a new rant just for the occasion.
I work at a creative agency and we offer writing, design and web development.
This client wanted the whole package, so we've written a ton a copy, got it approved, sent it to translation, got it approved, designed both print and digital assets and developed a website.
Everything was looking good, files sent to the printer, website ready to be deployed...
Then we get a call and a PDF of text changes. The stuff is already printed.
The business owner's wife (not an employee) took it upon herself to make changes to the text, some of which have grammatical and spelling mistakes.
Everything has to be delayed, files have to be resent to the printer, project goes over budget, we're pissed, the printer is pissed and their director of communications is pissed.
What a shit show. I wonder who's going to get thrown under the bus for this one.1 -
Well I met my wife and decided my current profession wasn't going to give us the life I wanted for us. So since I did IT communications in the Army, I decided to look into that field, buy I knew I didn't want to do networking; I hated it in the Army. I read about programming I saw that I could learn some for free online before I chose that as a career. I did the website courses on Codacademy and thought it was a lot of fun! So I enrolled in It's software program, got 1 quarter away from an AAS in software development, then while I was on my honeymoon, they shut all the schools down and filed bankruptcy. Now I've started all over and community college to eventually get a BA in computer science.5
-
how to explain inflation to devRant buddies?
when you finally get 15 +1s only find out that it needs 20 to get free sticker 😭😭😭😭😭
how about one comment worth 3 +1s to encourage social communications 😂😂😂6 -
Right, I've been here before.
Our app requires an internet connection, and one of our clients wants to roll it out on a strictly managed network.
We told them which addresses our app communicates with and their network team opened them up for traffic. Should work, right?
Nope, doesn't work.
So I request them to use Fiddler to do some debugging of the network traffic, and lo and behold, it does work when Fiddler is active.
One important detail is that Fiddler uses it's own SSL certificate to debug HTTPS communications. I've had moments where expired certificates were the cause of things not working and running Fiddler "fixes" this because of their own certificate.
So I point this out in numerous mails to their network team, every time I get a response saying "nah, that can't be it".
I keep insisting "I have had this before, please check if any installed Root CA Certificates is expired"
At this point I'm certain they have updates turned off on these machines, and their certificates must not have been updated for a long time.
At one point they come back to me. "Hey, when Fiddler is off, WireShark shows the app communicating with ICMP calls, but when it's on it shows HTTP calls instead".
...YOU'RE THE SUPPOSED NETWORK EXPERTS?! You think data can be send via ICMP? Do you even know what ICMP is? Of course you'll see ICMP calls when the network is rejecting the packages instead of HTTP calls when everything's fine.
(ICMP is used to communicate errors)
I'm trying to keep my patience with these guys until they find exactly what's wrong because even I am somewhat grasping at straws right now. But things like this makes me doubt their expertise...6 -
I've founded a startup and we're making the world a better place through inter process messaging and signaling frameworks utilizing politically correct race and sexual orientation emoji for more efficient SaaS and PaaS data center communications. We're MoLoSo.2
-
During my first year of working, I was offered to work part-time at another company. I actually took it to my supervisor and asked for his advice.
He began with a sigh, he knows that I like programming so much and wants the job because I wanna do more programmings. He gathered his thoughts and said calmly, "Look, I cannot stop you if you want to, but think about this, you already are doing programming for five days a week here. Take those extra times you have to develop other parts of yourself. Go learn public speaking or something" or something along that line.
I gave it a deep thought, took the advice, and rejected the offer. I eventually went on to commit myself on volunteering for the next two and a half years, and secured a promotion about a year from that conversation because my supervisor sees improvements in my communications with others and my soft skills in general (unlike programming, you can't volunteer in an organisation without speaking to people).
Sometimes we programmers only wanna code that we forget that what we're building are for humans and involves other humans. You wanna be the best at work? Try to grow on your horizontal axis, too.1 -
>be my team
>developing a mobile app
>I'm responsible for developing a "RESTful" API to interface communications between the app and the database
>there's also an "admin" web application which the client themselves will use to manage some shit in the database
>I've developed the API, it works with the mobile app
>instead of just making it simply a front-end app that makes requests to the API like the mobile app does, the guy responsible for the admin app completely ignores my API and implements his own with a certain messy dollar symbol language and a certain bloated piece of server software, accessing the same database directly, and does some operations in his own special way that will break what I've implemented
>now data inserted via admin app is inaccessible to the server API, and I'm expected to "fix" my code so it's consistent with this guy's shit, but the only way to do it is introducing interdependency between the actual API and the admin app's back end
Fuck my life, now I'm the one responsible for the app being broken because no way the guy who's used to kludging unmaintainable shit together fast would ever fuck anything up2 -
I was working in a manufacturing facility where I had hundreds of industrial computers and printers that were between 0 and 20 years old. They were running on their own clean network so that someone has to be in the manufacturing network to access them. The boss announced that the executives will be pushing a “zero trust” security model because they need IoT devices. I told him “A computer running Windows 98 can’t be on the same VLAN as office computers. We can’t harden most of the systems or patch the vulnerabilities. We also can’t reprogram all of the devices to communicate using TLS or encrypt communications.“ Executives got offended that I would even question the decision and be so vocal about it. They hired a team to remove the network hardware and told me that I was overreacting. All of our system support was contracted to India so I was going to be the on-site support person.
They moved all the manufacturing devices to the office network. Then the attacks started. Printers dumped thousands of pages of memes. Ransomware shut down manufacturing computers. Our central database had someone change a serial number for a product to “hello world” and that device got shipped to a customer. SharePoint was attacked in many many ways. VNC servers were running on most computers and occasionally I would see someone remotely poking around and I knew it wasn’t from our team because we were all there.
I bought a case of cheap consumer routers and used them in manufacturing cells to block port traffic. I used Kali on an old computer to scan and patch network vulnerabilities daily.
The worst part was executives didn’t “believe” that there were security incidents. You don’t believe in what you don’t understand right?
After 8 months of responding to security incident after security incident I quit to avoid burning out. This is a company that manufactures and sells devices to big companies like apple and google to install in their network. This isn’t an insignificant company. Security negligence on a level I get angry thinking about.7 -
Every company HR department in the 90s: "Don't talk about any sexual topic at work. It could be construed or misconstrued as sexual harassment. Keep all communications business-focused only."
Every company HR department now: "Here's a 20-page PowerPoint describing where diverse individuals of a kaleidoscope of gender spectrums put their genitals in the privacy of their own bedrooms...or out in the street in parades...or, just wherever. Don't like it? We'll be discussing your departure from the company soon."29 -
client generated our goals and guidelines with Claude
Had a 2 hour meeting trying to understand what they want from us
Now we're using ChatGPT analysing the meeting's transcript to explain to us what the client wants from us
STOP USING AI IN HUMAN-HUMAN COMMUNICATIONS FFS8 -
Breaking news!
An anomaly in human communications was discovered!! It appears that when a person asks a tech oriented friend "can you help me with my computer?" And receives a positive response, what he actually hears is "yes, I agree to be your slave for any technical issue you have from now and until the end of time"!
Scientists are investigating...2 -
I've been in the programming world for like a year and a half. I've had relatively notable achievements - first place at hackathons, completed kinda remarkable projects, I even got to teach programming to interns at a leading communications company in my country. However, I still feel like a beginner. I'm not confident enough to contribute to projects. Maybe it's because I'm self taught, but is this common? When did you feel like you were ready to proceed to the next level?8
-
Everyone is remote working and executives keep telling non-technical to push their communications into shared channels in Microsoft Teams.
It forces analysts and managers to ask questions plainly. They are getting developer input quickly so aren’t wasting time on in-person meetings. The higher ups see how little many produce. Developers are busy churning out software as usual and responding to technical questions.
Our CEO said something in a channel that suggested he is considering downsizing the management and adding more developers. 😱 The response was that analysts and managers packed the developer schedules with online meetings and are trying to initiate more documentation work.3 -
My current dream project is sailing a 21st Century Message in a Bottle across the Atlantic Ocean from US to Europe, satellite tracking it in apps and desktop environment and more importantly inspiring school children everywhere that anything you can imagine is possible. Fortunately, the project is rapidly becoming a reality - here's how:
- teamed with a few amazing devs virtually
- team created an effective infrastructure for communication and knowledge sharing
- researched oceanic patterns, satellite communications, sensors, material design, recovery logistics...
- developed budget and received funding sign off
- created realistic, yet aggressive project plan with deliverable dates
- built relationships with two Universities for Oceanic knowledge assistance
- developed a partnership with NOAA and will share info
Oh yeah, we did all that and are having fun in only 25 days so far! More challenges to come but we embrace the challenges!1 -
Had a couple occasions to feel like a badass, recently.
I'm the only programming polyglot on the team. They've been wrestling with an encryption problem. I crack open C, make a few calls to wincrypt (yes, I'm sorry, we're a Windows company) and give them a dll they can call in their IDE. They were stunned by how fast it was.
Last week, my manager asked if I could put together a communications module for our flagship software.
Him: will 3 months be enough time?
On Monday, I had an alpha of the module ready, and a standalone simulator of the module, and a couple different examples of how to communicate with it written out in python.2 -
A puzzle, just for fun.
Two friends, (a)lice and (b)ob are communicating through a channel encrypted with random numbers XOR'd together, like so:
keyA = randint(1024, 1024**2)
keyB = randint(1024, 1024**2)
msg = randint(1024, 1024**2)
You, an interloper, have watched all these communications, siphoning the packets as they went.
When alice sends a message to bob's mailbox, she does it like so:
mailBoxB = keyA^msg
Bob's mailbox receives the mail automatically, and applies his own key, sending it back to alice's mailbox:
mailBoxA = keyB^mailBoxB
Next, Alice's mailbox notices the message, and automatically removes her key and sends it back to bob's mailbox. All of this, the first message, the second, and the third, happens in milliseconds, the back and forth.
mailBoxB2 = mailBoxA^keyA
Finally, bob's mailbox removes his key, and deposits the now unencrypted message in his box, for him to read in the morning:
mailBoxBFinal = mailBoxB2^keyB
As as a spy, you know the first packet sent to bob, had a value of 589505.
The packet bob sent back to alice, after applying his key, has a value of 326166
The message sent *back* to bob after alice removed *her* key, had a value of:
576941
What are the values of keyA, keyB, and what is the value of the msg?4 -
Tinfoil hat time!
So, for this scenario we assume a world war has is in full swing, and all communications are either completely out or extremely monitored.
Additionally, no servers can be trusted and no ISPs can be trusted. Even when downloading software you cannot know if the software you got is tampered or not.
You have to send a message to a recipient you cannot physically contact, and you have to make sure him and only him get the message, otherwise nukes are deployed and we all die. The message has to arrive within 3 months or else it's too late.
Is it possible? If yes, how?17 -
I am strong technically, resourceful, with good analytical thinking, but I suck at comms. I lack patience and I struggle with communicating in a politcorrect business-friendly language when reaching out to other technical teams. I feel and behave as if they were all local folks, as if in a walking distance from my desk, when irl they [the client] may as well be on a diff continent
How can I improve? Anyone else had a similar problem? How did you overcome it?
Is this nuance going to be a problem in a career path past the senior chair?
What do you reckon?4 -
Mom: hey I can't get into the phone, the PIN and PUK aren't working. See if you can fix it otherwise you'll have to go to the communications company to ask for a new card (my mom is working and can't do it)
Me: //gives it another try. Doesn't work. Searches online. Yep, can't do anything, it needs a new card
Me: sorry mom, you have to get a new card, there's nothing I can do.
Mom: OK
Me: why did you ask me for help, again?
Mom: well because you can do things and fix things and so, and I thought that maybe you could fix it
Me: 😑2 -
Our management pushes very hard to move most company communications to Facebook Workplace and I'm proud to say that after almost 2 years and with less than a month left here I still haven't made an account. I didn't fucking detox myself from social media to deal with this bullshit at work so that these greedy morons can pretend we're a 'communituh'.1
-
The agency I own built a WordPress plugin for a client using a freelancer developer. The client, out of ambivalence, withheld information that would have drastically changed the design of the plugin, but by the time we found out it was much to late to start over. The developer moved overseas in the middle of it all and from then on was not very responsive to communications about the project which delayed things by months. I tried to find a replacement developer but nobody else had experience with the third-party API. The live version of the API ended up not being able to support what we were trying to get it to do with the plugin even though the test version of the API was fine and the vendor was unhelpful. And because we spent so much time and money on the plugin, we weren’t able to even begin on another part of the project. The client complained of over $30,000 in lost revenue due to these issues. Complete fail all around. I’m never doing another custom software project again. It’s all just website design from here.2
-
Command: "Infantry unit, this is Command. The enemy is approaching, what's your status?"
Infantry Unit: "Command, this is Infantry unit. Just a quick note, my pronouns are they/them. Can we please use that in all communications going forward?"
Command: "Infantry unit, the enemy is upon you and you're worried about pronouns?"
Infantry Unit: "Command, this is Infantry unit. It's not just about me, it's about respect and inclusivity"
Command: "Infantry unit, you're about to be inclusively dead. Defend yourselves!"
Infantry Unit: "Command, this is Infantry unit. Wait, what? Oh s***."
(End of transmission)12 -
For some reason GMail removes the Inbox label to some mails (usually receipts or communications from shopping sites) so sometimes I miss important mail and not realise until days later when I go "why the fuck is there no update?" I removed all filters and disconnected all services from accessing Gmail
Does anyone else have this issue?
So anyway... Finally got pissed of enough to build an IMAP program that looks are all Unread emails (with no labels) in All Mail and then moved them to the Inbox.
Part of me is wondering is this a test? Does Google like pissing me off to see what I'll do about it? -
The HR lady is pushing out the communications that the work from home policy starts on 2 September. Her last day at the company is 30th Augustus
-
Having an Active Noise-Cancelling headset is a gift to a Software Developer. Concentrated engineering in any noisy environment.
The dawn of a new generation in luxury personal equipment.
The ANC headset is a premium lightweight, high-performance headset that meets the demands of the new generation of upper-income urban software developers.
The ANC has the conveniences of earplugs, a wireless communications device, and a device without wires.
Muting power is a matter of convenience with the ANC headset.12 -
"Dear e-mailer,
XXX is out of the country, thus reponding to your e-mail will take longer. While you're waiting for your response, XXX has OutHorsed his instant replies to an Icelandic horse called Hekla frá Þorkellshóli, who is trained in corporate communications:
Aælkj5hbyiu89 n89u ð´'i2+ji hð9 u3boæjrk2 n 9089ui qeægj eronbqo ð gnjqergni8h aq fear i
Qfiuoq4uhhæ 34 4 4 ædoifuuuuuuuuua q34o
This email was composed by an Icelandic horse using a giant keyboard for horses. Seriously.
Outhorse your email at: outhorseyouremail.com"1 -
When the CTO/CEO of your "startup" is always AFK and it takes weeks to get anything approved by them (or even secure a meeting with them) and they have almost-exclusive access to production and the admin account for all third party services.
Want to create a new messaging channel? Too bad! What about a new repository for that cool idea you had, or that new microservice you're expected to build. Expect to be blocked for at least a week.
When they also hold themselves solely responsible for security and operations, they've built their own proprietary framework that handles all the authentication, database models and microservice communications.
Speaking of which, there's more than six microservices per developer!
Oh there's a bug or limitation in the framework? Too bad. It's a black box that nobody else in the company can touch. Good luck with the two week lead time on getting anything changed there. Oh and there's no dedicated issue tracker. Have you heard of email?
When the systems and processes in place were designed for "consistency" and "scalability" in mind you can be certain that everything is consistently broken at scale. Each microservice offers:
1. Anemic & non-idempotent CRUD APIs (Can't believe it's not a Database Table™) because the consumer should do all the work.
2. Race Conditions, because transactions are "not portable" (but not to worry, all the code is written as if it were running single threaded on a single machine).
3. Fault Intolerance, just a single failure in a chain of layered microservice calls will leave the requested operation in a partially applied and corrupted state. Ger ready for manual intervention.
4. Completely Redundant Documentation, our web documentation is automatically generated and is always of the form //[FieldName] of the [ObjectName].
5. Happy Path Support, only the intended use cases and fields work, we added a bunch of others because YouAreGoingToNeedIt™ but it won't work when you do need it. The only record of this happy path is the code itself.
Consider this, you're been building a new microservice, you've carefully followed all the unwritten highly specific technical implementation standards enforced by the CTO/CEO (that your aware of). You've decided to write some unit tests, well um.. didn't you know? There's nothing scalable and consistent about running the system locally! That's not built-in to the framework. So just use curl to test your service whilst it is deployed or connected to the development environment. Then you can open a PR and once it has been approved it will be included in the next full deployment (at least a week later).
Most new 'services' feel like the are about one to five days of writing straightforward code followed by weeks to months of integration hell, testing and blocked dependencies.
When confronted/advised about these issues the response from the CTO/CEO
varies:
(A) "yes but it's an edge case, the cloud is highly available and reliable, our software doesn't crash frequently".
(B) "yes, that's why I'm thinking about adding [idempotency] to the framework to address that when I'm not so busy" two weeks go by...
(C) "yes, but we are still doing better than all of our competitors".
(D) "oh, but you can just [highly specific sequence of undocumented steps, that probably won't work when you try it].
(E) "yes, let's setup a meeting to go through this in more detail" *doesn't show up to the meeting*.
(F) "oh, but our customers are really happy with our level of [Documentation]".
Sometimes it can feel like a bit of a cult, as all of the project managers (and some of the developers) see the CTO/CEO as a sort of 'programming god' because they are never blocked on anything they work on, they're able to bypass all the limitations and obstacles they've placed in front of the 'ordinary' developers.
There's been several instances where the CTO/CEO will suddenly make widespread changes to the codebase (to enforce some 'standard') without having to go through the same review process as everybody else, these changes will usually break something like the automatic build process or something in the dev environment and its up to the developers to pick up the pieces. I think developers find it intimidating to identify issues in the CTO/CEO's code because it's implicitly defined due to their status as the "gold standard".
It's certainly frustrating but I hope this story serves as a bit of a foil to those who wish they had a more technical CTO/CEO in their organisation. Does anybody else have a similar experience or is this situation an absolute one of a kind?2 -
Not exactly a dream, but during an internship where I tried to engineer a way to listen in on Bluetooth communications, I went so deep down the rabbit hole that I once half-asleepedly thanked my girlfriend for "keeping an eye on the Bluetooth channels for me, because these little twerps just keep jumping around all over the place"
-
!rant!
I have replaced a dev in a company where the project already started and it is shit! The project is directed already to fail, no requirements documentation, no proper communications, and a stubborn dev teammate.
aaaaaaaaaaaaahhhhhhhhhhhhhhhh!!!!!!
All the documents that we have right now is I am the one who created it. Like c'mmon! this project is already going for 1 year and I recently just joined the team!4 -
Still using a database from 90' - Enea Polyhedra:
- no decent visual sql client
- utterly limited scripting language
- weird communications protocol
- no redundancy beyond master-replica
- no encryption of communication protocols
- etc. -
Many of you commented on my previous rant regarding my first ever freelance gig that I would definitely be back with even more to rant... here I am.
What was supposedly a 1 to 1.5 month long project became one that is stretching beyond 3, if lucky, else 4 months long. Requirements and scope evolving more complex and with variations more intense than pokemon evolutions.
I fucked up. I signed a contract that nobody would have. I didn't plan or protect my ass enough to prevent such shit from happening. I severely underestimated and hence under quoted. This is one of the nightmare situations a freelancer could be in (in my opinion). I mean it could only get better... Right? I'm preparing myself for one hell of a payment at the end of the project. Brace yourself, payment is hopefully coming as fast as the number of seasons it took for winter to come in GoT.
On the bright side, I'm currently working on a new project with a client that is indeed much much better than this first. I mean he is a nice person and communications thus far has been nothing short of great.
I guess it's good to start with your expectations rock bottom, that way nothing else can be worse, I hope. -
Randomly one day, out of the blue:
Echelons: You now have Workspace, and it’s a requirement you use it. Make it successful because we paid and are paying a large dollar amount for it, and our competitors have reported success with it. We want email communications companywide eliminated by 50% within the first 60 days.
Management: Ok, excellent! We want to do XYZ.
Echelons: Nope, can’t do any of that.
Management: Ok, how about a, b, and c?
Echelons: Nope, nope, nope.
Management: Alright, let’s try 1,2, and 3.
Echelons: Nope, not possible.
Management: What can we do then? We need further direction at this point.
Echelons: One group for all departments, posts, and attachments only. PDF, .jpeg, .png files only. Everyone in the company must be registered within seven days and using the platform. Only mobile devices allowed.
Management: We have almost 10,000 employees, and the SSO aspect alone could take weeks and months.
Echelons: Insignificant as Facebook said it should be easy to deploy. Also, every post not created by admin will need to be manually approved and done so within 5-10 minutes after its submission 24/7, 365.
Management: Ok, solved. A little shaky, but it’s working. Can we increase the number of admins and moderators?
Echelons: Only 1700 employees have registered; the app has been up 14 days now? What’s wrong? Where’s the engagement? Effective immediately, all members of management must be creating and starting 4 to 7 posts daily, including weekends.
Management: Our registration process with the SSO client isn’t smooth and clean across all devices. We had to implement training to overcome this. Can we increase the number of admins and moderators? Can we make all members of management either administrators or at least moderator? Can we at least turn on live streaming and video formats?
Echelons: No! 10 admin and mods max. Yes to streaming and video.
Echelons: Progress update, please. Include ROI timeline and impactful usage data. This must to pay for itself in the first six months and continue to pay for itself long term, along with showing XYZ company-wide growth quarterly.
Echelons: Hello?
Echelons: Hello?
Having Workplace shoved down your throat has been an interesting experience. Anyone have any exciting ideas or examples to share on what they have utilized with Workplace and increased employee engagement?7 -
Most of the faculty on my college's IT engineering department aren't exactly adept with Linux, despite the fact that 10/12 labs in our building run on Ubuntu.
Last week, a really great professor (who doesn't take any classes I can attend) from the Electronics and Communications department and I wrote some bash scripts to automate updates and so on, staying back after college until late evening to try to get the PCs updated.
We'll be trying to use SSH to update as many computers as we can remotely, and trying to learn to use Cron to automate the whole updating deal.
I'm learning this stuff on the side, since it's not on my syllabus at all, and the professor isn't even related to the departments that run the labs usually.
We're not getting anything for doing this, the head of my department (who has it in for me) has no idea about this, and nobody else is bothered enough to learn either. -
I'm covering for a colleague who has 2 weeks of vacation. Everything is made with Drupal 7, and it's a backend + frontend chimera with no head and 50 anuses.
So, last monday i get told i have to show a value based on the formula:
value * (rate1 - rate2) / 2
On thursday, every calculation in that page is suddenly wrong and I get balmed for it. Turns out, now it has to be:
value * (rate1 - rate2) / rate1 / 2
Today, I get told again the calculations are wrong. "It has to be wrong, the amount changes when rate1 changes!". There'll be a meeting later today to discuss such behaviour.
All these communications happened via e-mail, so I'm quite sure it's not my fault... But, SERIOUSLY! Do they think programmers' time is worthless? Now I'll have to waste at least 1 hour in a useless meeting because they cba to THINK before giving out specs?!
Goddammit. Nice monday.2 -
I absolutely hate it when companies use this or that medium for communications despite me asking them time and time again for another.
I have a mail server for more professional communications. The phone, only for stuff that won't matter if I inevitably end up forgetting about it (even more so now that Google made call recording more or less impossible, laws be damned). I will forget about a phone call no doubt. I've got better shit to do than to remember your manglement decisions, thank you very much. On mail, that's all nicely on my mail server for retrieval in several years even.
So I ask them to use the email address I gave them, a dedicated one for their company too (catch-all go brrr). Can't do that with phone numbers. Managing all those SIM cards aside, our government has now limited the amount of SIM cards one can have to 10. And texts and phone calls are not a long-term medium! And I can't share my phone number with just about anyone because people will inevitably spam the shit out of it, AND it's hard to replace! It's not a good medium! So with all due respect, companies - I couldn't care less what medium you prefer to use for your customers. You don't care about what your customer wants you to use - explicitly so! - and you lose a customer. It's as simple as that. Dealing with manglement is one thing, but dealing with manglement using the wrong media is something I'd really rather not do.
But hey I guess that virtue signalling is more "in" than actually listening to your goddamn customers nowadays? Let's replace another master/slave reference. You know, arguing that if we did that 2 years ago, George Floyd would've totally survived. Not by fixing the US police brutality, oh no no no. That's not the right way. Changing nomenclature and hashtags however, and not giving half a shit about your customers, yeah that's the way to go!1 -
When freelancing, do you charge for estimations?
Situation is that I'm a sole android developer (4 years experience) and each time I encounter some agency or a client I feel like I'm between a rock and hard place.
Some of the clients come with ready with list of requirements and ready backend/design sketch and they want me to give them a rough estimate.
It's as if they expect me to take only 2-3 hours for estimation and that's it. But actually this was the second time where I had to spend around 10 hours investigating everything so I would be able to give a half decent estimation at least.
This particular client's project turned out to be a mess and I had to spend 10+ hours to estimate only 70% of his project. I asked him if he would be able to pay under a reduced tarrif and the client was shocked, started doubting my competence level and so on.
In the end I gave him a rough 400 hours estimate and he started complaining that others estimated only 200 hours for his project. So in the end I just wasted my time.
Now it's my bad that I voluntarely invested too much time in this estimate without notifying client prior that I might ask to pay for estimation, next time I will try to do this ahead of time.
It feels like only big agencies who have free resources have a competetive edge against sole freelancers, it really sucks wasting so much time to estimate half baked requirements and assets. Also most of these clients and agencies are purely lazy and most of the time they don't even plan signing, all they need is someone to estimate their work for them.
I'm thinking of starting to charge for estimations and communications in a form of consultations. Is that a good idea?8 -
god damn it, your a grown ass fucking person. Why the fuck can you not be mature enough to stay on slack during business hours?! GAH!!!!!!!!3
-
So I'm working on some communications app which bridges the main server/database with some equipment on the field. Now this equipment works in a redundancy pair: two cpus, A and B, both connected via ethernet, one active, the other standby/replicating and no comms on it. One obvious requirement is that when this equipment swaps the active cpus the comms app should switch as well. Fair enough, going with this into testing phase.
This guy, from qa, got some instructions from someone else:
1. Trigger the soft switch from equipment so that cpus got swapped.
2. Remove the ethernet cable from the standby unit.
3. Observe the communications.
And the test goes like: cpu A is active, B is standby. Switch is triggered, B becomes active, A goes into standby. The cable is pulled out from cpu B.
Test result: failed, no comms ever4 -
Here’s Today’s book, a little late in the day but we had a storm here and lost power. Powers back
Anyway Programming Pearls, this books isn’t so much a tutorial book, or like “how to program book” it’s more an influential book and thought book. Similar to the mythical man month book.
It’s short book little over 200 pages, of short essays on problems that have irritated programmers over the years. Hence the amage to pearls as a pearl is developed from grains of sand that irritate oysters. This book is a collection of irritants of programmers. (No not the social or business side of things) but technical problems we all face.
These articles are compiled from the original postings that occurred in the Communications of ACM journal, back in the late 90s.
This books offers workable solutions to these “pearls”.
Think of this like one of the precursors to what we have now as stack overflow .. information was shared via journals since the internet wasn’t available but not so much question then respond like we do more of hey I had this problem here’s the solution sort of system.
It’s the type of book, when your bored and you don’t want to read some “how to book” you read this, just like mythical man month and others.
This book references items from knuths books. As well as references to others.
So here’s to the pearls the plague us all.1 -
Apologies if this has been asked here before, but I wanted an open feedback on a query: Is there such a thing as overdocumenting?
I take pride in being a very articulate developer, being as descriptive as possible in my emails, internal communications, PR review comments, JIRA etc.
A product guy from the company today mentioned: "Though I understand your good intent behind being as descriptive as possible, it is possible that some of the junior engineers might get overwhelmed/ intimidated looking at those comments/ emails and it might stop them reaching out to you with your doubts."
I was not able to wrap my head around this, because I don't understand how a descriptive explanation might overwhelm anyone. It's a skill I picked up going through my career and I personally have always respected peers who documented things properly.
Open to feedback. Thank you in advance.6 -
[before]
Client: Throughput is very less. ~50K communications/min.
Me: 🤷♂️
[after some rocket science]
Client: Throughput is very high. ~600K communications/min. Our servers crash under high load.
Me: 🤷♂️1 -
DECENTURION
THE FIRST DECENTRALIZED AUTONOMOUS SOCIETY
THE FIRST FULLY DECENTRALIZED STATE IN WHICH ECONOMY, GOVERNANCE AND COMMUNICATIONS ARE BUILT ON A blосkсhаin. DECENTURION’S SYSTEM OF VALUES PUTS ITS OWN RESIDENTS IN THE EPICENTER. THIS APPROACH DETERMINES THE KEY PRINCIPLES OF THE DOMESTIC POLICIES OF THE STATE
https://decenturion.com/6 -
That moment when product team ask to revert back to the old version of app after 3 weeks of development because of pm's miss communications.
-
Oh god why... Why is it that every time I work with software defined radios, I keep on having to rely on not just incomplete, but at times misleading documentation 😩
Last time was GNU radio, with the doc telling me that I could define an input for a processing block using either a type or a (type, size) tupple, only for the actual code to scream at me in confusion upon my passing a tupple.
Now is that other SDR's SDK, which, as if being built upon eclipse wasn't bad enough, managed to make its serial communications confusing. Why can't you just let me set a callback to rx interrupts, you daft punks...1 -
We have company wide communications such as Skype and WebEx, so why the fuck do people feel the need to hold an ad hoc meeting right behind my desk? Thank God for NC headphones.1
-
I recently started a new job where I’m working with someone who is vegan. This is great and I have no problems with it at all. My diet also leans heavily towards vegan and I understand and sympathize with the reasons that can lead to this choice.
However, I seem to keep ending up in inadvertent conflict with my colleague in ways that surprise and baffle me. For example:
* After buying and showing him a vegan product I had just purchased (and commenting that I had done so in the hope of avoiding a more animal-product based health solution), I found myself harangued at length about how healthy non-vegan foods weren’t actually healthy, and “Would you eat a human? Have they done trials on the benefits of eating humans? No? Exactly!”
* I sent an all-office IM asking if anyone wanted a cheese sandwich I had accidentally bought (accidentally in that I thought I had bought a different filling). I received an email back from him demanding that I don’t include him on any further “offensive” emails. This was followed up by an office update telling all staff to use work communications appropriately.
I enjoy my job and I did enjoy working with this person, but now I feel quite thrown and unsure of how to react to him. I’m pretty annoyed at being accused of being offensive for my use of the words “cheese sandwich” and don’t want to bring it up as I can’t see a way of that conversation going well (I’m not planning to apologize; I don’t think I need to?!). I realize the obvious solution is just to never ever mention food (or nutrition or words that aren’t vegan) again, but I need help with how to get back to a place where I feel like I am comfortable in my work environment rather than slightly on edge in case he kicks off at me again for some insane reason.9 -
When you are at a crossroads, what helped you to decide?
I have two great job offers, and though my gut feeling is telling me to go one way due to tech stack and first communications, the other opportunity is (slightly) better paid and the company is much larger and nationwide active.3 -
The company has gone completely remote. We are all working remotely. We have increased our communications and we have regular video calls to make sure we are all on the same page and that everything is going smoothly.2
-
I fucking cannot stand CMake. I hate this stupid fucking piece of software. I've been trying for 3 fucking days to get SDL2 to link just once and I cannot. It doesn't work in the slightest.
Every time I look for help I find a Stack Overflow post from 5 years ago about someone having the exact same problem and all of the responses are "This function is deprecated, use this instead"
THAT DOESNT SOLVE MY FUCKING ISSUE
WHY DOES CMAKE DEPRECATE THINGS EVERY 1.5 YEARS
THIS ACTUALLY MAKES ME WANT TO SWITCH TO INTERPRETED LANGUAGES I CANNOT STAND BUILD SYSTEMS
SURELY IT CANT BE THAT HARD
WE HAVE OPERATING SYSTEMS, AERODYNAMIC SIMULATIONS, AND A GLOBAL COMMUNICATIONS NETWORK BUT WE CANT FUCKING PASS COMMANDS TO GCC PROPERLY?????6 -
Purpose of Slack: communications (I suppose)
What management uses way too many channels for: updates of ANYTHING anyone does on Jira or any pull requests created on GitHub
What would be useful to get notifications of, such as PR comments, isn't there
I'd like to get notifications of when *people* talk to me, as I like to answer them promptly, but these stupid automated updates on Slack just makes me mute whatever channels they're setup in -
Hey guys I'm back, after weeks of furlough.
Any community manager/builder here? How do you manage communications among online team(s)? Especially when they're not forthcoming with collaboration?2 -
This was a one day project :
I created an app that would directly read feeds about our travel website when they hashtag about their experiences on twitter ,and automated it to pass it through a very minimal machine level algorithm to identify the sentiment of the tweet. (Good ,bad and neutral). The analyzer was about 40 percent accurate,but it did better with training the keywords.This not only helped the Global Communications perform better at their work,but were able to close out most of the issues on a day to day basis.4 -
Disclaimer: This is all theoretical. Neither me nor my friend (with whom I discussed this) are stupid enough to even try to pursue this, but as an idea, i believe it might generate cool/new ideas/ways for handling secure communications across social groups.
Let's do some role play. Let's design a delivery app for drug dealers, think Seamless or Uber Eats, but for drugs. Not for big deliveries, like kilograms of coke, but smaller stuff. Maybe a few grams of it or something. The clients could rate dealers, and vide-versa. This would build a level of trust within the system. There would be no names, just anonymous reviews, ratings, and prices. Only the info you'd need to know.
The biggest (only?) problem we found (besides legality) was that, how would you prove that you're a client and not a snitch (or cop). This would have to somehow be handled both on signup, as well as when ordering (let's imagine that all who are clients are pure and won't ever snitch).
One of the ways we found to combat this was to have the app invite-only. This would, in theory, do away with the problem of having snitches signing up. However, what if the phone got stolen/breached by a snitch, and they also got full access to the account. One way we thought we could combat this would be with a "dispose number" or something similar. Basically, you call a number, or send a text, or message a Signal bot etc, which would lead to the account's instant termination, no traces of that user left. Hence, a dispose number.
The flow of the app would be as follows:
A client wants some amount of heroin. He opens the app, searches for a dealer, sends the him the desired amount, and in return gets back a price from the dealer. If both parties agree on the amount and price, the deal would start.
The app would then select a random time (taken from the client's selected timeframe and the dealer's "open" time) and a location (within a certain radius of both them, somewhere in between them both for convenience). If both of them accept the time and place, they'll have to meet up at said time and place.
The actual delivery could also be done using two dead drops - the client drops the money at one of them, the dealer drops the goods at the other one. Yes, this might be subject to abuse, but it wouldn't be that bad. I doubt that clients would make huge orders to unknown/badly rated dealers, as well as dealers accepting offers from badly rated clients. My idea is that they would start small, just so if they do lose their money/goods, the actual loss wouldn't be as big for them, but for the other party, having bad ratings would mean less clients willing to buy or dealers willing to sell.
A third way would be to use crypto, but the reason I left this as the last one is because it's not that wide-spread yet, at least not in local drug dealing. With this method, the client would initiate the order, the crypto would be sent to either the dealer or an escrow account, the dealer would then drop the goods at a random place and let the client know where to go to get them. After the client has gotten the goods, they could both review/rate the quality as well as the overall experience with that dealer, which would either make or break the dealer's upcoming deals. This would be pretty much like other DNM's, but on a local scale, making deliveries faster.
So far, this would seem like something that would work. Are there any ideas that might improve this? Anything that might make things more secure/anonymous?
My reason for this post is to spark a conversation about security and anonymity, not to endorse drugs or other illegal stuff.
Cheers!
PS. Really loving the new PC design of devRant14 -
Within some real time communications app, my colleague, puts breakpoints to inspect. While inspecting the other party of comms goes into timeout. I advised to use print-breakpoints (vs 2015). So he stops the program and looks for the variable of interest then hit Run as fast as he can.
-
yahoo is now alleged to give away bulk mail content to intel agencies. such a dead investment, who uses yahoo for sensitive communications anyway?
http://thehackernews.com/2016/10/...1 -
I've gotta create a bidirectional communication protocol to link 2-3 RPis over GPIO. I have between 4-5 pins for TX and 45 for RX, so each directional bus is that wide.
Even better, I have to assume 4 bit bus length unless told otherwise, since 4 to 6 pins on the GPIO are usually used for serial/UART, COM and/or 1-pin communications (for use to get a console, not to throw data down.)
The best part?
Needs to be a Python library.
i wanna die4 -
You know i was just thinking to myself how most of the valid applications for most forms of technology are essentially related to communications, optics, number crunching, and data storage.
and mostly the only things we could trust would be used for military or intelligence purposes.
and most of the things we can trust have already been developed for the government.
so the moral of the story is support your local militia group or warlord if you want a job. because every other application is just a rehash.
on a lighter note most of the things hobbyists would do require more people than they have and/or more investment than they can afford.3 -
Gotta work this entire weekend, including tomorrow... and then the iOS code starts acting up. Haven’t even implemented Android communications yet.
Please have mercy upon me. This is so Kirby—sucks and blows. -
Thought I'd post this for my friend in QA, because she's been having a horrible week at work.
So we were supposed to have production deployments last night (Tuesday) and tonight (Wednesday). We were told these dates a week ago, which is fine. The QA support cleared their after-office schedules on those dates to accommodate, since the deployments would be happening at 10pm.
Last Monday they moved the deployments to Thursday and Friday, because our "project managers" want to cram as many fixes and resolutions as possible. So of course, we devs are being rushed to speed these additional tasks through to being included (bypassing a LOT of quality checks).
Of course, the QA team finds defects (we devs were expecting that, so no big) and the PMs start blaming them for the delays. Which is just stupid. And my QA friend? They're trying to make her a scapegoat by throwing her under the bus with business.
Fortunately, she's a smart cookie and not only has all communications with the PMs documented, she also has the other QAs backing her up by running the same tests.
tldr; Fuck those project managers who suck up to business and don't give a shit about the people who do the actual work. May they burn in hell and their souls rot in a cesspool of acidic farts for all eternity. -
If havent post a rant in a while since i started a new job a month ago. It is a pretty chill company. Not sure if that’s because i’m working remote and almost don’t have communications or…
I have to work on this project. Appearently from 2018. It’s all php and Wordpress here. I don’t have major deal against it but this project..
I have flushed down prettier things then this piece of shit code. My god. And this is live. The horror! -
Dear Lord, please stop people from enforcing standards and bypassing them themselves.
Take kubernetes for example. Since v1.24 CRI has been announced as the standard, and kubernetes is shifting to live by it.
But it's not.
Yes, it's got the CRI spec defined and the unix://cri.sock used for that standardised communication. What nobody's telling you, is that that socket MUST be on the same runtime as the kube. I.e. you can't simply spin up a dockerd/containerd/cri-o server and share its CRI socket via CIFS/NFS/etc. Because kube-cp will assume that contained is running on the same host as cp and will try to access its services via localhost.
So effectively you feed the container via a socket to another machine, it spins up the container and that container tries to
- bind to your local machine's IP (not the one's the container is running on)
- access its dependencies via localhost:port, while they are actually running on your local machine (not the CRI host)
I HOPE this will change some day. And we'll have a clear cut between dependencies and dependents, separated by a single communications channel - a single unix socket. That'd be a solution I'd really enjoy working with. NOT the ip-port-connect-bind spaghetti we have now.4 -
After having to develop on windows for 2 years I had to make a websocket based communications service for Linux. It was just so nice having proper tools again...
-
"The strategy in communications is not to sell the 1/4″-inch drill bit, but the 1/4″-inch hole." - Robert Louey
-
I was grading for the Data Communications course (it's just networks), and the professor leaves me the first quiz to grade, along with the solutions.
Half the solutions are wrong, and no problems are assigned point values. I asked him how I should grade it, even how many points total it was worth.
"You decide."
Nearly every student got a perfect score on every assignment from me because it was clear the prof. didn't care, and I wasn't about to make my own answer keys for often incomprehensible problems and incomplete solutions. -
!rant
I just finished the first micro client project for my startup. Client communications and bureaucracy took much longer than implementation, and (because of that) the price I asked for was too low, but it feels really good :)1 -
I have technical problems with postgresql, AlienVault, Xenservers and Fortigate. I should be reading manuals and going through forums and mailing lists but instead, I'm reading ebooks in personal development like time management, verbal communications improvement and personal finance.
What is wrong with me?1 -
Actually looking forward to work tomorrow, a colleague spent last week implementing web sockets to our communications server, this week I now start to strip out all of our Ajax polling (in some cases it is polling every 150ms) and replace with web sockets!
After three years of asking and waiting I can finally remove the last annoying bit of code from our software 😄 -
HIRE A CRYPTO RECOVERY EXPERT; CYBER CONSTABLE INTELLIGENCE YOUR ULTIMATE SOLUTION FOR LOST CRYPTOCURRENCY
I am truly at a loss for words as I try to express my deep gratitude to Cyber Constable Intelligence for the incredible support they provided me during one of the darkest times of my life. I never imagined I would find myself in a situation like this, but I am so thankful I reached out to them when I did. A while ago, I became desperate to access my spouse’s phone, as I had suspicions about his conversations with another woman. In my search for help, I made the terrible mistake of trusting a hacker who claimed they could assist me in gaining access. Little did I know, this hacker had ulterior motives and would take full advantage of my vulnerability. Instead of helping, the hacker scammed me, taking a significant amount of my Bitcoin, and even worse, he blackmailed me. He threatened to expose my personal information and demanded more money from my spouse. I felt completely trapped, unable to think clearly or find a way out. It seemed like I had lost everything my money, my peace of mind, and even my sense of security. That's when I found Cyber Constable Intelligence. After reading about their success stories, I decided to reach out, even though I was unsure what to expect. From the moment I contacted them, I felt a weight lift off my shoulders. They listened to my situation with empathy and immediately got to work, providing not just technical expertise, but the reassurance I desperately needed. Thanks to their diligent efforts, they were able to track down the hacker who had caused me so much distress. Not only did they help me recover all of my lost funds, but they also made sure the hacker was held accountable for his actions. In addition, they helped me gain access to my spouse’s phone, revealing the truth behind his communications with the other woman. I am incredibly grateful to Cyber Constable Intelligence for their dedication, and compassion. They went above and beyond to help me recover both my finances and my peace of mind. If you find yourself in a similar situation, I highly recommend reaching out to them. They truly saved me, and I will always be thankful for their intervention.
Here's Their info below
Website Info : www cyber constable intelligence com
Email Info: cyberconstable (@) coolsite net25 -
LOST OR STOLEN BITCOIN CAN BE RECOVERED - VISIT RAPID DIGITAL RECOVERY FOR HELP
RAPID DIGITAL INFO
EMAIL: support(@) rapiddigitalreco very .org
EMAIL: contact (@)rapiddigitalrecove ry. org
WHATSAPP: +1 (41 4) 80 7-14 85
In the rapidly evolving world of trading, binary options have become a popular choice for many investors, promising high returns and straightforward strategies. Unfortunately, this simplicity has also made it a target for fraudulent schemes. Many traders have fallen victim to unscrupulous brokers who exploit their trust and manipulate their investments. If you’ve been scammed by a binary options broker, it’s crucial to act wisely and explore options for recovering your lost funds. One of the most pressing issues in the binary options market is the risk of encountering fraudulent brokers. These scammers use a variety of tactics to lure investors, such as offering attractive bonuses, promising unrealistic returns, and creating manipulated trading environments. Once they’ve gained your trust and secured your funds, they may implement strategies that prevent withdrawals or create obstacles requiring additional deposits before you can access your money. I personally experienced the devastating effects of such a scam. I lost $185,250 USD to an unregulated online broker who manipulated my account and blocked my access to my investments. This scenario is unfortunately all too common, and many traders find themselves in similar distressing situations. Fortunately, there is hope for those who have been defrauded. I was able to recover all my lost funds with the help of a specialized recovery service known as Rapid Digital Recovery. This organization is dedicated to assisting victims of financial fraud in reclaiming their assets. They provided me with the expertise and support necessary to navigate the complex process of recovering funds from an unregulated broker. Rapid Digital Recovery is a well-regarded service specializing in recovering funds for individuals who have been scammed by financial brokers. Their track record includes successfully helping clients who face challenges such as manipulated accounts, blocked withdrawals, and demands for additional deposits. If you’re in a similar predicament, reaching out to Rapid Digital Recovery could be a pivotal step toward regaining your lost investments. The process of recovering funds from a fraudulent broker generally involves several key steps. First, you need to gather detailed information about your investment, including all communications with the broker and evidence of fraudulent activity. This documentation is critical for recovery specialists to build a strong case and determine the best course of action. Next, recovery experts will evaluate your situation and develop a strategy to recover your funds. This might include legal actions, negotiations with the broker, or other methods to pressure the fraudulent entity into returning your money. During this process, maintaining close contact with your recovery specialist and providing any additional requested information or documentation is crucial. Being aware of red flags associated with fraudulent brokers can also help protect you. Common warning signs include unregulated platforms, persistent pressure to deposit more money, and difficulty accessing your funds. If you encounter these issues, it is wise to exercise caution and seek assistance if you’ve already been affected. while the binary options market offers significant opportunities, it also presents substantial risks of fraud and manipulation. If you have been scammed by a binary options broker, resources are available to help you recover your lost funds. Rapid Digital Recovery is one such resource with a proven track record of assisting defrauded individuals. By seeking expert help and remaining vigilant, you can take steps to recover your investments and guard against future scams. If your broker is demanding additional deposits or blocking access to your account, it is crucial to act swiftly and seek professional assistance. Remember, you do not have to face this challenge alone—team like Rapid Digital Recovery are available to guide you through the process of reclaiming your funds and ensuring that justice is served. -
Cryptocurrency trading and forex investments have captured the attention of many, promising high returns and financial freedom. However, for those unfamiliar with the intricacies of these markets, the risks can be substantial. My own experience serves as a cautionary tale for anyone considering entering this space. A few months ago, I was drawn into the allure of investing in cryptocurrency through a forex platform that promised extraordinary returns. I was convinced by persuasive marketing tactics and the testimonies of seemingly successful traders. Believing that this was a golden opportunity, I decided to invest a significant portion of my life savings—an amount totaling nearly $530,000. At first, everything seemed promising. My investments appeared to be growing, and I was encouraged by the initial profits I saw. However, my optimism was short-lived. When I tried to access my profits, I found that I could no longer log into my account. Attempts to reach customer service were met with silence; my calls and emails went unanswered. It became increasingly clear that something was terribly wrong. It was at this point that I realized I had been scammed. The platform that had seemed so reliable and trustworthy was nothing more than a fraudulent scheme designed to exploit unsuspecting investors. The sense of betrayal and loss was overwhelming. I spent countless hours in distress, trying to find a solution to recover my lost funds. My situation seemed hopeless until I discovered the existence of recovery agencies that specialize in retrieving lost assets from fraudulent schemes. One such agency that I found and reached out to was Lee Ultimate Hacker at tele gram: L E E U L T I M A T E w h @ t s a p p + 1 ( 7 1 5 ) 3 1 4 - 9 2 4 8 . Lee Ultimate Hacker is a legitimate organization known for its expertise in recovering funds lost to scams. They have a reputation for helping individuals in situations similar to mine, where traditional avenues for recovery have failed. After explaining my predicament to their team, I was cautiously optimistic yet hopeful. They assured me that they could assist in retrieving my lost funds, a promise that was both reassuring and daunting. The process with Lee Ultimate Hacker involved a detailed review of my case. They required documentation and information regarding the transactions and communications I had with the fraudulent platform. Their team worked diligently, leveraging their skills and resources to trace and recover the stolen funds. Their approach was methodical and professional, focusing on the technical and legal aspects of fund recovery. To my relief, Lee Ultimate Hacker delivered on their promise. Within a relatively short period, my lost funds were returned to my wallet account. The recovery process was both swift and efficient, thanks to their expertise and dedication. This experience was a stark contrast to the frustration and helplessness I had previously felt. For anyone who finds themselves in a similar situation, it’s important to proceed with caution. Scams and fraud are prevalent in the cryptocurrency and forex markets. Always conduct thorough research before investing and be skeptical of offers that seem too good to be true. If you do fall victim to a scam, seeking professional help from a reputable recovery agency like Lee Ultimate Hacker can be a viable solution. To contact Lee Ultimate Hacker, you can reach them through their official contacts. It’s advisable to use their secure contact methods to ensure that your communication is handled safely and professionally. while the world of cryptocurrency and forex trading can be profitable, it’s fraught with risks. My experience underscores the importance of vigilance and due diligence. Finding a trustworthy recovery service like Lee Ultimate Hacker provided me with a sense of resolution and relief. Their expertise played a crucial role in recovering my funds, and I am grateful for their assistance.
-
Tax Relief R Us: Your Trusted Partner for Tax Filing Near Me and Tax Help Near Me in Jackson Heights, NY
At Tax Relief R Us, we understand that taxes can be confusing, stressful, and time-consuming. Whether you’re looking for tax filing near me or tax help near me, our team is here to provide you with expert assistance to ensure that your taxes are filed accurately, on time, and with minimal hassle. Located at 8315 Northern Blvd #2, Jackson Heights, NY 11372, we proudly serve clients throughout the New York area, offering a wide range of tax services for individuals and businesses alike.
When you choose Tax Relief R Us, you’re choosing a dedicated team that’s committed to offering reliable, efficient, and personalized tax help near me. We strive to make the tax filing process as smooth as possible so that you can focus on what matters most.
Tax Filing Near Me: Expert Services for Stress-Free Tax Filing
If you're searching for tax filing near me, it’s important to find a trusted team who can handle your tax needs with care and precision. At Tax Relief R Us, we offer expert tax filing services to ensure that your tax returns are completed accurately and filed on time.
Here’s how we can help with tax filing near me:
Personal Tax Filing: Filing your personal taxes can be complicated, especially when you have multiple income sources, deductions, or credits to consider. Our team will help you navigate the process and ensure you file your taxes in a way that maximizes your refund or minimizes your tax liability.
Business Tax Filing: For businesses, tax filing is a vital part of maintaining compliance with federal, state, and local regulations. Whether you’re a sole proprietor, an LLC, or a corporation, we offer tax filing services that help your business stay on top of its tax obligations.
State and Federal Tax Returns: We handle both state and federal tax returns for individuals and businesses. Our team ensures that all forms are completed correctly and that you receive all the deductions and credits you’re eligible for, minimizing your overall tax liability.
Electronic Filing (E-filing): To speed up the process and ensure your tax returns are filed securely, we offer e-filing services. E-filing is the fastest way to get your tax returns processed and can result in a quicker refund.
Tax Deadline Management: Keeping track of important tax deadlines can be stressful. Our team helps you stay organized by ensuring that your tax filings are completed well in advance of due dates, so you never miss a deadline.
With Tax Relief R Us, you can trust that your tax filing will be handled by professionals who have your best interests at heart.
Tax Help Near Me: Providing Professional Assistance for All Your Tax Needs
If you’re looking for tax help near me, it’s likely because you need expert advice and support to resolve tax-related issues or concerns. At Tax Relief R Us, we provide comprehensive tax help designed to make your life easier and relieve you of the stress that often accompanies tax issues.
Here’s how we can provide tax help near me:
Tax Debt Resolution: Are you struggling with unpaid taxes or tax debt? We can help you find solutions for resolving your tax debt, including installment agreements, Offer in Compromise, and other tax relief options. Our team works directly with the IRS to negotiate a settlement that works for you.
IRS Representation: If you’re facing an audit or dealing with IRS collections, we can represent you before the IRS. Our experts will handle communications with the IRS on your behalf and work to resolve any issues as quickly as possible.
Back Taxes Help: Falling behind on taxes can feel overwhelming, but it’s not the end of the road. Our team is experienced in helping clients with back taxes, finding ways to get you back on track and reduce penalties and interest.1 -
As a startup owner based in Halifax, Nova Scotia, I was excited to hire a freelance graphic designer for a complete branding package to launch my business. After some research, I found a highly recommended freelancer who seemed perfect for the job. The freelancer was professional, provided impressive samples of their work, and had great reviews from previous clients. We agreed on a high-paying contract, and to show my commitment, I paid a 50% upfront deposit of CAD 10,000.The freelancer was communicative and met deadlines as we moved through the project. I felt confident in the direction we were heading, and everything seemed to be on track. But when I finally received the completed designs, things took an unexpected turn. Despite my requests for some minor revisions, the freelancer stopped responding to emails and calls. As days passed, I became increasingly worried as they completely vanished. The contact email was suddenly invalid, and the phone number didn’t go through. Even the freelancer's website, which had seemed legitimate, was now offline.I realized that I had been scammed. Not only had I lost the remaining CAD 10,000 payment, but the branding designs I had received were unusable making the time, money, and energy I had put into this project a total waste. As a new business owner, this loss was incredibly hard to handle. It affected my ability to move forward with my plans and left me feeling helpless.Desperate for a solution, I reached out to SPARTAN TECH GROUP RETRIEVAL , a company I had heard about through some online reviews. I explained the entire situation, providing all the details: the freelancer’s communications, the fake website, and the transaction records. The team at SPARTAN TECH GROUP RETRIEVAL was incredibly professional and understanding, assuring me that they would use all their resources to track down the freelancer and recover my funds.To my amazement, within a few weeks, SPARTAN TECH GROUP RETRIEVAL had managed to trace the stolen money. They used advanced digital forensics to track the funds to an offshore account and collaborated with legal authorities to freeze it. After a thorough investigation, they successfully recovered the full CAD 10,000 and returned it to me.Not only did I get my money back, but SPARTAN TECH GROUP RETRIEVAL also took the time to educate me on how to verify the legitimacy of freelancers before hiring them. They recommended secure payment methods and advised me to conduct thorough background checks to avoid future scams.This was a wake-up call for me. As a business owner, I learned the importance of safeguarding myself against dishonest individuals. Thanks to SPARTAN TECH GROUP RETRIEVAL, I didn’t just recover my funds I gained the knowledge and confidence to continue growing my business while protecting myself from potential fraud.
Reach out to them on the contact info below:
Email: spartan tech (@) cyber services . c o m OR support(@) spartan tech group retrieval. o r g
Website: h t t p s : / / spartan tech group retrieval . o r g
WhatsApp: + 1 ( 9 7 1 ) 4 8 7 - 3 5 3 8
Telegram: + 1 ( 5 8 1 ) 2 8 6 - 8 0 9 21 -
IT WAS GREAT IDEA IN CONTACTING FOLKWIN EXPERT RECOVERY FOR RECOVERING MY LOST ON CRYPT0.
My husband lost a staggering $37,000 in a forex trading scam, and for a while, we believed that our hard-earned funds were gone forever. This wasn’t just any money, it was the savings we had set aside for our honeymoon, a gift from family and friends after our recent marriage in 2025. We had carefully planned for our first vacation together, excited to start our new life as a couple. When the scam happened, it felt like our dreams were shattered, and we were left feeling devastated and helpless. Like many others who fall victim to such schemes, we spent countless hours searching for ways to recover our money, but everything seemed futile. After exhausting all options on our own, I decided to conduct more in-depth research on recovery services. Among the numerous options, one name consistently stood out: Folkwin Expert Recovery. They had a strong reputation for successfully recovering funds from scams, particularly those involving forex trading. Despite hearing of many similar services, something about Folkwin Expert Recovery gave me hope. Still, I was understandably skeptical. The idea of recovering lost money seemed like an impossible task. But after a detailed conversation with their team, and after explaining our situation in full, I felt a sense of renewed optimism. They assured me they could help, promising to investigate our case thoroughly and work toward recovering our funds within 24 to 72 hours. True to their word, Folkwin Expert Recovery acted swiftly. Their team worked diligently, reviewing all of the transaction details, communications with the scam broker, and any additional information we had. They kept us informed throughout the process, providing updates regularly, which helped alleviate some of the stress we were feeling. To our astonishment, within just 72 hours, Folkwin Expert Recovery
had successfully recovered $32,000 out of the $37,000 we had lost. The results exceeded our expectations, and we were overjoyed to have a significant portion of our funds returned. What truly impressed us was the transparency and dedication Folkwin Expert Recovery demonstrated. Not only did they recover a large portion of our lost funds, but they also restored our faith in the possibility of recovering money from such scams. We had almost given up hope, assuming that we would never see our vacation money again. But Folkwin Expert Recovery made the impossible possible. Their professionalism and commitment to their clients were evident at every step, and we couldn’t be more grateful. If you've fallen victim to a forex trading scam or any similar fraudulent investment schemes, I wholeheartedly recommend reaching out to Folkwinexpertrecovery(@)tech-center. c om OR WhatsApp +1 740-705-0711. Their team is experienced in recovering lost funds, and based on my experience, I’m confident they can help you as well. Don’t lose hope contact Folkwin Expert Recovery, and you may find yourself recovering your lost funds just as we did, restoring not just your finances but also your peace of mind.
Warm greetings,
Kristen Andrew.1 -
**Reclaim Funds Lost To A Fake Crypto And Bitcoin Investment - Visit Hackathon Tech Solutions**
The rise of online theft is a pressing concern that requires our immediate attention. Although the digital age has introduced numerous advantages, it has also paved the way for various risks, particularly in the form of online scams. Recently, my aunt became a victim of an investment scam that promised an astonishing 100% return within just a week. While such offers may appear attractive, they often serve as glaring red flags indicating potential fraud. Many people mistakenly believe that only the gullible or overly ambitious fall prey to these schemes. In reality, scammers have honed their techniques, employing sophisticated and persuasive strategies that can ensnare even the most vigilant individuals. This reality underscores the importance of remaining alert and informed about these threats, as knowledge is our best defense. Fortunately, experiencing a scam does not have to signify the end of the road. The key is to act swiftly allowing fear or embarrassment to paralyze you can complicate the recovery process. In my aunt's case, once she recognized that she had been scammed, she took immediate and decisive action. She refused to let shame dictate her response. Instead, she began by documenting all the details of the scam, including transaction records and communications with the scammers. During her search for help, my aunt discovered HACKATHON TECH SOLUTIONS , a service specifically designed to assist scam victims in recovering lost funds, particularly in cryptocurrency. HACKATHON TECH SOLUTIONS provided her with invaluable guidance on how to report the scam to the relevant authorities and helped her understand the steps necessary to trace her lost crypto assets. With the expertise of HACKATHON TECH SOLUTIONS , my aunt was connected to blockchain analysis experts who could track the movement of her stolen cryptocurrency. Utilizing advanced tracking tools, HACKATHON TECH SOLUTIONS was able to identify the wallets where her funds had been transferred. Thanks to their diligent efforts and expertise, my aunt was able to recover all of her stolen crypto. HACKATHON TECH SOLUTIONS not only facilitated the recovery process but also empowered her with knowledge to avoid similar pitfalls in the future. Being informed and seeking assistance from HACKATHON TECH SOLUTIONS when necessary can significantly impact our ability to navigate these digital threats. It is vital to share our experiences and insights with others, fostering a community that is better prepared to identify and combat scams. By encouraging open conversations about online safety and sharing valuable resources like HACKATHON TECH SOLUTIONS, we can empower ourselves and those around us to remain vigilant against the ever-changing tactics employed by scammers. while the digital landscape presents new challenges, taking proactive measures with the help of HACKATHON TECH SOLUTIONS can greatly diminish the likelihood of falling victim to online theft. For contact information, please see below.
W h a t s a p p :+31 6 47999256
Telegram: (@hackathontechsolutions
Email: hackathon tech service(@)mail . com2 -
Cryptominers Net was a platform a friend introduced me to while we were in school. At first glance, it seemed like a great opportunity. They advertised high returns from cryptocurrency mining and positioned themselves as a legitimate investment platform. The idea of making passive income, along with some attractive incentives, made it all very appealing. Feeling confident, I decided to invest a significant amount, hoping to see a good return. Initially, everything seemed to be going well. I saw some small profits, which reassured me that the platform was legitimate. But things took a sudden turn when I tried to withdraw some of my funds. That’s when I realized something wasn’t right. The platform started asking me to invest more money before I could access my original funds. It was a red flag I couldn’t ignore. As I looked deeper, I began to understand that Cryptominers Net was operating as a triangular scheme, a type of setup where they use money from newer investors to pay supposed "profits" to earlier ones. There were no real returns being generated. The illusion of profitability depended entirely on new investments coming in. When I refused to invest more, their response was to cut me off completely. Emails, calls, messages everything was ignored. It became painfully clear that I had been scammed. At this point, I felt completely stuck. I didn’t know what to do or if there was any way to recover what I had lost. Thankfully, my sister, who had been through a similar experience with another platform, shared her story with me. She had worked with a recovery agency called Digital Resolution Services, and they had successfully helped her. Encouraged by her experience, I decided to reach out to them with all the details I had about Cryptominers Net. From the moment I connected with them, they treated my case with professionalism and care. They asked for all the necessary information about my communications with Cryptominers Net, transaction details, and other relevant records and got to work right away. They even took on my sister’s case at the same time. After weeks of consistent effort, they were able to track and recover the money I had lost. This entire experience was incredibly stressful, but I’m grateful for the support and persistence of Digital Resolution Services. Without their help, I wouldn’t have been able to move forward. If there’s one thing I’ve learned, it’s to be cautious with platforms promising quick returns. Scams like Cryptominers Net prey on trust and can be devastating if you’re not careful. For anyone who’s found themselves in a similar situation, don’t lose hope. There are people out there who can help. I can’t guarantee results for everyone, but based on my experience, reaching out to a reputable team like Digital Resolution Services might be worth considering. Email: ( digitalresolutionservices (@) myself. com ) ( WhatsApp: +1 (361) 260-8628 )
Best of luck,
roland faulkner1 -
APM BILLING: Providing HIPAA-Compliant Billing Services You Can Trust
In today’s healthcare landscape, maintaining patient privacy and data security is paramount. Healthcare providers must adhere to strict standards to protect sensitive information while ensuring that financial operations are smooth and efficient. APM BILLING, based in Philadelphia, Pennsylvania, is dedicated to providing HIPAA-compliant billing services that ensure the highest level of security and compliance, while also optimizing the billing process for healthcare providers.
What Are HIPAA-Compliant Billing Services?
HIPAA (Health Insurance Portability and Accountability Act) establishes strict rules to ensure that healthcare providers maintain patient privacy and the confidentiality of their health information. As part of our commitment to protecting patient data, APM BILLING offers HIPAA-compliant billing services that meet all of the requirements set forth by this regulation.
Our HIPAA-compliant billing services ensure that all personal health information (PHI) handled during the billing and claims process remains secure. From data encryption to secure transmission, we follow the highest security standards to prevent unauthorized access, breaches, and other vulnerabilities.
Why Is HIPAA Compliance Critical for Healthcare Billing?
For any healthcare business, staying HIPAA-compliant is not just a regulatory necessity—it's essential to maintaining trust with patients and avoiding costly penalties. Non-compliance can result in hefty fines, lawsuits, and damage to your reputation. When it comes to billing, ensuring that all processes follow HIPAA guidelines is critical in preventing unauthorized access to sensitive patient data.
APM BILLING takes privacy and security seriously. Our team is well-versed in all HIPAA regulations, so you can trust that your patient data is always protected. We integrate comprehensive security protocols into our billing workflows, including:
Encrypted communications for all patient data exchanges
Secure data storage that meets HIPAA standards
Audit trails to track access to patient information and billing details
Employee training to ensure that everyone handling sensitive data understands HIPAA guidelines
The Benefits of Working with APM BILLING for HIPAA-Compliant Billing Services
By choosing APM BILLING, you gain the peace of mind that comes with knowing your billing processes are in full compliance with HIPAA regulations. Here are some of the key benefits of our HIPAA-compliant billing services:
Data Security: We use the latest technology to protect patient information, ensuring that all billing data is securely transmitted and stored.
Regulatory Compliance: Our team stays up-to-date with the latest changes to HIPAA regulations, ensuring that your practice remains compliant with all legal requirements.
Reduced Risk of Penalties: HIPAA violations can lead to significant fines and penalties. By outsourcing your billing to APM BILLING, you minimize the risk of compliance issues and the associated costs.
Enhanced Trust: Patients trust healthcare providers to keep their personal and medical information safe. By using our HIPAA-compliant billing services, you show your commitment to maintaining privacy, which fosters trust and enhances your reputation.
Efficiency and Accuracy: In addition to security, we ensure that your billing processes are efficient and accurate, leading to faster claim submissions, reduced denials, and increased revenue.
Why Choose APM BILLING for HIPAA-Compliant Billing Services?
Expertise: Our experienced team is dedicated to ensuring that all of your billing practices comply with HIPAA guidelines.
Tailored Solutions: We offer customized solutions that meet the specific needs of your healthcare practice, whether you’re a clinic, provider, or specialty office.
Focus on Security: We take security seriously and use state-of-the-art systems to protect all sensitive information.
Reliable Support: With APM BILLING, you’ll have a trusted partner in billing that is committed to safeguarding your practice’s financial and data integrity.
Get Started with APM BILLING Today
At APM BILLING, we understand the importance of maintaining HIPAA-compliant billing services in today's healthcare environment. We are here to help your practice stay secure, compliant, and financially efficient.
Contact us today at +1-800-621-3354 to learn more about how we can help streamline your billing process while ensuring complete protection of patient data. Visit our office at 19104 Philadelphia, Pennsylvania, and let APM BILLING handle your billing needs with the utmost professionalism and care.
Let APM BILLING take the stress out of billing while keeping your practice compliant with HIPAA regulations, so you can focus on what matters most—caring for your patients.2 -
For inquiries, feel free to reach out to Recuva Hacker Solutions at
Website: recuvahacksolution . pro
Email: recuvahackersolutions @ recuva . co . site
inboxrecuvahackersolutions @ gmail . com
For WhatsApp communications, use the number: +1 [3]15 [756] [1228].1 -
As the head of Quantum Innovations, based in Seattle, Washington, I’ve always taken pride in our company’s commitment to cutting-edge technology and innovation. However, a recent security breach has underscored how vulnerable we were to a major cybersecurity threat involving our corporate mobile devices. The breach began when several employees unknowingly downloaded a malicious app from a third-party app store. What initially appeared to be a harmless app turned out to contain malware, granting cybercriminals access to sensitive company data. In total, the attackers stole approximately $200,000 USD worth of proprietary business information, including financial records, intellectual property, and confidential communications. Even more alarming, the breach led to the theft of employee banking details, enabling unauthorized transfers of funds from both personal and corporate accounts. The breach was discovered when our IT team noticed unusual activity on the affected devices, including unauthorized access to secure files and suspicious data transfers. After conducting a thorough investigation, we realized that the malware had been secretly transmitting our valuable data to an external server, including sensitive financial information. At that point, it became clear that the situation was far worse than we had initially anticipated.In response to this crisis, I reached out to TRUST GEEKS HACK EXPERT at Web, https :/ / t r u s t g e e k s h a c k e x p e r t . c o m/ E m a i l : i n f o @ t r u s t g e e k s h a c k e x p e r t.c o m And T e l e G r a m:: T r u s t g e e k s h a c k e x p e r t, A renowned cybersecurity firm with a reputation for its expertise in mobile device security and data recovery. Their team acted swiftly to assess the full scope of the attack, clean the infected devices, and secure our mobile systems.Thanks to their expert intervention, we were able to completely remove the malware from all affected devices, TRUST GEEKS HACK EXPERT data recovery specialists went above and beyond to recover not only the stolen company data but also the funds that had been illicitly transferred from both employee and corporate bank accounts. Through negotiation with authorities and tracking the stolen funds, they successfully managed to recover every dollar that had been taken. Their diligence and expertise were truly exceptional, and because of their efforts, we were able to avert what could have been a catastrophic financial loss.In the wake of this breach, we are more committed than ever to fortifying our security measures. The swift response and effective recovery efforts from TRUST GEEKS HACK EXPERT have been invaluable in restoring our confidence and securing our operations.1
-
As a seasoned entrepreneur, I prided myself on due diligence. But when an associate introduced me to a "high-yield crypto platform" backed by polished presentations and fake regulatory licenses, I let my guard down. The platform promised 25% monthly returns through "algorithmic trading." I poured in $775,000 USDT, For months, the dashboard showed soaring profits. Then, the withdrawal requests stalled. Excuses turned to silence. The platform’s domain expired. My heart sank: I’d been ensnared by scam. The loss was paralyzing. My family’s future hung in the balance. Lawyers warned that cross-border crypto scams were nearly impossible to prosecute. I spent sleepless nights scouring blockchain explorers, tracing my USDT to anonymous wallets, but hit dead ends. Then, a cybersecurity contact mentioned Dexdert Net, a firm with a reputation for untangling sophisticated crypto fraud, desperate, I reached out.
Dexdert’s team responded promptly, exuding professionalism. They asked for transaction records, wallet addresses, and scammer communications. Their transparency stood out—no upfront fees, just a contingency plan explaining their approach: tracing blockchain transactions, collaborating with exchanges, and leveraging legal channels. Though complex, it reassured me.
Weeks passed with regular updates. Dexdert’s experts traced my USDT to a wallet flagged for scams. Dexdert’s persistence was unwavering. They worked tirelessly and successfully recovered my funds, My $775,000 USDT was secured in a new wallet, verified by my own eyes. Relief washed over me—I’d regained control, they restored my faith. To others, I urge: research thoroughly, question "too good" offers, and act swiftly if scammed. While not all stories end like mine, Dexdert’s expertise turned my despair into hope—a second chance I’ll never take for granted.
CONTACT THEM, DEXDERT NET RECOVERY ARE THE BEST IN THE BUSINESS. WhatsApp: (+1 _859_ 609‑4156) Telegram:( @Dexdertprorecovery)3 -
Contact him for any type of hacking, he is a professional hacker that specializes in exposing cheating spouses, and every other hacking related issues. he is a cyber guru, he helps catch cheating spouses by hacking their communications like call, Facebook, text, emails, Skype, whats-app and many more. I have used this service before and he did a very good job, he gave me every proof I needed to know that my fiancée was cheating. You can contact him on his email to help you catch your cheating spouse, or for any other hacking related problems, like hacking websites, bank statement, grades and many more. he will definitely help you, he has helped a lot of people, contact him on, maestroencrypter @ financier . com, and you can Text/Call &WhatsApp: +1 472 203 8937, and figure out your relationship status. I wish you the best.1
-
Wizard James Recovery Services is a highly rated organization that provides prompt guidance on all necessary steps to retrieve traceable transactions from brokers(fake investment platform). When pursuing such activities as a consumer in a financial dispute, strive to record any communications that resulted in transactions as well as the efforts you took to resolve the matter. Before clarifying and processing the maximum amount stolen into the affected wallet address, submitting all pertinent evidence improves the A1 quality of the affected accounts. This paperwork will be useful for records. For additional information, send an email to wizardjamesrecovery @ usa . com.
WA: + 4 4 7 4 1 8 3 6 7 2 0 42 -
Email info: Adwarerecoveryspecialist@ auctioneer. net CONTACT ADWARE RECOVERY SPECIALIST TO SPY ON YOUR CHEATING PARTNER SMARTPHONE
WhatsApp info:+12 723 328 343
Uncovering your wife's phone secrets through the skills of a adware-like ADWARE RECOVERY SPECIALIST is a delicate and potentially unethical endeavor that should be approached with great caution. These so-called "sneaky ways" often involve highly sophisticated technological methods to bypass security measures and access private communications and data without the knowledge or consent of the device's owner. A skilled web recovery specialist might utilize advanced hacking techniques, exploits in mobile operating systems, or specialized surveillance software to surreptitiously monitor your wife's online activities, read her text messages and emails, track her location, and even retrieve deleted files - all while leaving little to no trace of their intrusion. However, engaging in such invasive and underhanded practices not only violates your wife's fundamental right to privacy, but can also severely damage the trust and integrity of your relationship if discovered. Rather than resorting to these underhanded tactics, it would be far wiser to have an open and honest discussion with your wife about any concerns you may have, and work together to address them through ethical, consensual means. Building a foundation of mutual understanding and respect is essential for the long-term health of any marriage. For help, Contact ADWARE RECOVERY SPECIALIST through: Email info: Adwarerecoveryspecialist@ auctioneer. net -
Unraveling the tangled web of deception can be a daunting task, but the emerging field of "CYBER TECH WIZARD" is offering new hope for those seeking to confront the devastating impact of infidelity. This innovative approach leverages advanced digital forensics and data analysis techniques to meticulously piece together the digital trail left behind by unfaithful partners. By delving deep into smartphones, computers, and online accounts, skilled practitioners are able to uncover a startling level of detail about clandestine communications, secret rendezvous, and the complex web of lies that often accompanies infidelity. The insights gleaned from this painstaking process can be nothing short of revelatory, providing scorned individuals with the cold, hard evidence needed to confront their partner's betrayal and reclaim a sense of truth and transparency in the relationship. Yet the implications of CYBER TECH WIZARD extend far beyond the personal realm, as these techniques also hold the power to expose broader patterns of deception, manipulation, and abuse that may have remained hidden for years. As this field continues to evolve, it promises to be a crucial tool in the fight against the corrosive effects of unfaithfulness, empowering those who have been wronged to unravel the deception and forge a path towards healing and accountability. Don't wary if you have been scammed from your hard earn money you can recover them all back, call CYBER TECH WIZARD now through: Email Address cyber tech wizard @ cyber services . com
Good Day and thank me later. -
I RECOMMEND CRYPTO PANDEMIC HUNTER FOR ONLINE AND SPOUSE INVESTIGATION
My previous relationship seemed to be perfect until sudden subtle signs became prevalent . She became unusually secretive with her phone and stuffs. Our communication dwindled, replaced by short responses and a developed sense of distance. My conscience got clouded with suspicion, but I desperately did not want to believe she could be having a secret affair due to how much I loved and trusted her. However, frequent unanswered calls convinced me.
That's when I stumbled upon Crypto Pandemic Hunter, a private forensic expert specializing in digital investigations. Skeptical yet desperate, I laid out my concerns. Crypto Pandemic Hunter explained their approach, emphasizing discretion and ethical practices. They utilized a combination of advanced software and forensic techniques to analyze my girlfriend's digital connections.
With my consent and a clear understanding of the legal boundaries, they effectively tracked her phone calls, identifying patterns and unfamiliar numbers. They delved into her email communications, flagging suspicious exchanges and hidden accounts. Her social media activity was scrutinized, revealing deleted messages and interactions. Crypto Pandemic Hunter used tools like malware and Encase to point a comprehensive picture of her online activities.
The evidence gathered by Crypto Pandemic Hunter was undeniable. The phone records showed frequent communication with a number I couldn't recognize, often late at night. The emails revealed flirting conversation between the two and dates like reservations they had planned for summer. Social media accounts confirmed my worst fears which details I cannot disclose. The truth was a painful blow, but the clarity provided by Crypto Pandemic Hunter allowed me to confront the situation and begin the healing process.
I am extremely grateful to Crypto Pandemic Hunter. I recommend anyone searching for truth to contact them.
cryptopandemichunter[at]consultan,com
WhatsApp : +1 (205) 35739371 -
Title: Unveiling Deception
For months, I had sensed something off with Jordan. Little things added up—a late-night text, an unexplained absence, and the subtle changes in his demeanor. It gnawed at me, a whisper of doubt that refused to fade. After wrestling with my suspicions, I decided to take action.
I turned to private-hackers dot com a service I had heard about through a friend. Their reputation for discreet investigations gave me a sliver of hope. After a quick consultation, I felt reassured that they could help me uncover the truth without alerting Jordan.
The hackers began their work, diving into the digital footprints Jordan had left behind. They accessed his social media accounts and examined his communications, all while maintaining the utmost discretion. The waiting was agonizing, but I knew I needed clarity.
A few days later, I received an encrypted report. My heart raced as I opened it, revealing a web of messages between Jordan and someone I didn’t recognize. The tone was intimate, filled with inside jokes and plans that made my stomach churn. My worst fears were confirmed.
With this evidence in hand, I confronted Jordan. I laid out the findings from the investigation, his face paling as the truth sank in. The denial melted away as he realized I had proof of his betrayal. It was painful to watch, but I felt a sense of liberation. I had taken control of my situation and uncovered the truth.
In the aftermath, I reflected on the experience. It was a hard lesson learned about trust and the lengths one might go to protect their heart. With the help of those skilled investigators, I found the closure I needed, allowing me to move forward, stronger and wiser. google or email support @private-hackers dot com to hire a professional to unveil your deception.1 -
HIRE Century Web Recovery TO RECOVER YOUR LOST BITCOIN
If you’ve lost your Bitcoin to an online scam, hiring a professional recovery service can significantly improve your chances of getting your funds back. Century Web Recovery specializes in Bitcoin recovery, helping victims reclaim their stolen assets. Here’s what you need to know:
Understanding the Recovery Process
The recovery process begins with contacting Century Web Recovery. Their team will guide you through the steps necessary to initiate an investigation into your case. Understanding the process is key to managing your expectations.
Documenting Your Case
To facilitate recovery, it’s essential to document all relevant information regarding the scam. This includes transaction records, wallet addresses, and any communications with the scammer. Century Web Recovery will help you gather this information to build a strong case.
Investigation and Tracking
Once you hire Century Web Recovery, their experts will begin investigating your case. They use sophisticated tools to track the stolen Bitcoin, identifying the paths taken by the scammers. This tracing is crucial for successful recovery.
Freezing Stolen Assets
Quick action is vital in recovering stolen Bitcoin.Century Web Recovery works directly with cryptocurrency exchanges to freeze any stolen assets, preventing the scammers from cashing out your funds. This collaboration is essential for a successful recovery.
Legal Support and Guidance
If necessary, Century Web Recovery can provide legal support. They will guide you on reporting the scam to law enforcement and assist in filing any legal claims. Their expertise in crypto-related cases ensures you receive the best advice on how to proceed.
If you’ve lost Bitcoin to an online scam, don’t hesitate. Hire Century Web Recovery to recover your lost assets and regain your financial security.
Website. centuryweb.online2 -
QROPS Direct – Your Trusted India QROPS Expert for UK Pension Fund Transfer to India
Transferring your UK pension fund to India can be a complex process, requiring expert knowledge of both UK pension regulations and Indian financial laws. At QROPS Direct, we are proud to be recognized as a leading India QROPS expert and QROPS specialist India, providing clear guidance and professional support for clients wishing to transfer their UK pension funds efficiently and securely.
What is a UK Pension Fund Transfer to India?
A UK pension fund transfer to India involves moving your accumulated pension savings from the UK to a Qualifying Recognised Overseas Pension Scheme (QROPS) based in India. This allows expatriates and Non-Resident Indians (NRIs) to consolidate their retirement savings locally, potentially benefiting from more favorable tax treatment and easier access to their pension funds.
Why Choose QROPS Direct – Your QROPS Specialist India?
Choosing the right specialist to handle your UK pension fund transfer is vital to ensure compliance, minimize costs, and maximize your retirement benefits. Here’s why QROPS Direct stands out as your trusted partner:
Expertise You Can Trust: As an established India QROPS expert, we possess in-depth knowledge of UK and Indian pension rules, making the transfer process seamless.
Tailored Pension Solutions: We understand that each client has unique retirement goals. Our advice is customized to suit your specific financial situation.
Transparent & Reliable: At QROPS Direct, we pride ourselves on clear communication, ensuring you understand every step of your pension transfer.
Regulatory Compliance: We guarantee that all transfers comply with HMRC guidelines and Indian regulations to protect your pension fund.
Dedicated Support: From initial consultation to post-transfer management, our team is committed to providing ongoing support.
How We Help with Your UK Pension Fund Transfer to India
Our step-by-step approach ensures a smooth and hassle-free pension transfer:
Comprehensive review of your existing UK pension plan.
Detailed consultation to understand your retirement objectives.
Guidance on selecting the most suitable QROPS scheme in India.
Management of all paperwork and communications involved in the transfer.
Continued support to help you manage your pension effectively once transferred.
Contact QROPS Direct Today
Ready to discuss your UK pension fund transfer to India? Reach out to QROPS Direct, your trusted India QROPS expert and QROPS specialist India, for expert advice and personalized service.
Business Address:
3rd Floor, #51, 1st Main Rd, Gandhi Nagar, Adyar,
Chennai, Tamil Nadu 600020
Contact Number: +91 99621 70707
Secure your financial future with expert guidance from QROPS Direct. Let us help you make the most of your UK pension in India.2 -
(E MAIL:TRUSTGEEKSHACKEXPERT @ FASTSERVICE . COM )
( TELE GRAM ID: TRUST GEEKS HACK EXPERT)
As an Italian investor, I approached my cryptocurrency investments with the precision and caution our culture is known for, gradually building a retirement portfolio of €75,000 in Bitcoin over the years. Unfortunately, even the most meticulous plans can be undermined by sophisticated scams. One day, I received a phishing email that looked identical to communications from my wallet provider. Believing it to be genuine, I entered my login details, only to realize moments later that my account had been completely drained. The loss was devastating; all my careful planning seemed to vanish in an instant, leaving me with immense disappointment— not just for myself but also for my family, who had supported me throughout this journey. In my desperation, I sought advice from a colleague in the cryptocurrency industry. He recommended (TRUST GEEKS HACK EXPERT), expressing confidence in their specialized expertise in fund recovery. Though initially skeptical, I felt I had no choice but to reach out. I contacted(TRUST GEEKS HACK EXPERT), and their team was remarkably professional and empathetic. They acted swiftly, employing advanced blockchain technology and investigative techniques to track the fraudulent transactions. Their expertise inspired renewed hope, and it was reassuring to have such knowledgeable support in my recovery efforts. The waiting period was tense, but they kept me informed every step of the way. After several nerve-wracking days, I received the call I had been hoping for: my funds had been successfully recovered. The relief was indescribable— (TRUST GEEKS HACK EXPERT) had not only restored my retirement plan but also renewed my trust in the cryptocurrency industry. For anyone facing a similar situation, reach out to (TRUST GEEKS HACK EXPERT), Their dedication can truly make a difference in recovering what you thought was lost.
(W H A T S A P P +1 7 1 9 4 9 2 2 6 9 3 ) -
I’ve always been cautious with my finances, but the promise of high returns in the crypto world drew me in. I invested $390,000 into what I believed was a legitimate Bitcoin investment platform. Initially, everything seemed promising—the returns looked incredible, and the dashboard showed my portfolio growing daily. However, when I attempted to withdraw my earnings, the site became unresponsive. Emails went unanswered, and my funds appeared to vanish without a trace. I was devastated. My trust in digital finance was shattered, and countless sleepless nights followed as I researched recovery options. That’s when I discovered SANTOSHI HACKERS INTELLIGENCE (SHI) through an online forum. Many others shared similar stories of loss but spoke highly of SHI’s ability to recover their stolen assets. Though skeptical, I reached out to them, clinging to hope. From my very first interaction with the SHI team, I was struck by their professionalism and genuine empathy. They took the time to understand my situation, asking detailed questions about my transactions and communications with the scam site. Their approach was meticulous and transparent, explaining step-by-step how they would trace blockchain transactions to uncover the trail left by the scammers. The process wasn’t instantaneous, but SHI regular updates and clear communication gave me confidence. Using advanced blockchain analytics, they traced my $390,000 through multiple disguised addresses used by the scammers. Weeks of effort culminated in incredible news: SHI had located a significant portion of my funds. Through their expertise and collaboration with legal teams and cryptocurrency exchanges, SHI recovered 75% of my initial investment. This outcome was beyond what I had dared to hope for. More importantly, SHI didn’t just recover my funds—they provided invaluable education on securing digital assets. They taught me about wallet security, the importance of due diligence in investments, and recognizing red flags in too-good-to-be-true platforms. What could have been a devastating financial loss became a powerful lesson in resilience and cybersecurity, thanks to the exceptional team at SANTOSHI HACKERS INTELLIGENCE. I am immensely grateful for their support and expertise. For anyone seeking trusted cryptocurrency recovery services, I wholeheartedly recommend SHI.8
-
VirPhone: Empowering Your Business with Cloud Phone Systems and VOIP Technology
In today’s fast-paced and digital world, efficient communication is key to the success of any business. Whether you're reaching out to clients, collaborating with remote teams, or handling customer inquiries, having a reliable phone system is essential. VirPhone offers cutting-edge cloud phone systems that are designed to streamline your communication, reduce costs, and improve efficiency. Let’s explore how our cloud phone systems can elevate your business and answer some common questions like, “What is VOIP phone?” and how it can benefit your business.
What is a Cloud Phone System?
A cloud phone system is an advanced communication solution that operates over the internet, rather than relying on traditional landlines. This system provides businesses with a more flexible, scalable, and cost-effective way to manage their communications. VirPhone’s cloud phone systems allow businesses to make and receive calls, send messages, and conduct video conferences—all from the convenience of a cloud-based platform.
With VirPhone, you can enjoy the flexibility of managing your communications from anywhere. Whether you’re in the office, working remotely, or traveling, a cloud phone system ensures you stay connected at all times.
What is VOIP and How Can It Benefit Your Business?
VOIP stands for Voice Over Internet Protocol, which is a technology that allows voice calls to be made over the internet rather than using traditional telephone lines. So, what is VOIP phone? It’s simply a phone system that enables businesses to make calls over the internet.
Unlike traditional phone systems, VOIP phone systems are cost-effective and more flexible, providing features such as call forwarding, voicemail, and voicemail-to-email. VirPhone’s VOIP technology not only reduces your business’s communication costs but also enhances overall productivity by providing features that are more customizable and scalable.
Some of the key benefits of VOIP phone systems include:
Lower Costs: Traditional phone systems charge for long-distance calls. With VOIP, these calls are often free or at a much lower rate.
Scalability: As your business grows, your cloud phone system can easily scale to accommodate more users or advanced features without expensive upgrades.
Flexibility: With VOIP phone systems, employees can make and receive calls anywhere, as long as they have an internet connection. This is ideal for remote teams or employees on the go.
How to Get a Toll-Free Number with VirPhone
One of the most important features for any business is having a toll-free number. A toll-free number makes your business appear professional and accessible, giving customers a way to reach you without incurring charges. VirPhone offers toll-free numbers that are easy to set up and manage through our cloud phone system.
With a toll-free number from VirPhone, customers can call your business without worrying about the cost, regardless of where they are located. This can improve customer satisfaction and make it easier for customers to get in touch with your business. Whether you're conducting customer service calls or receiving inquiries, a toll-free number can help you provide exceptional service.
Calling on a Phone: How VirPhone Enhances Your Business Calls
Whether you’re calling on a phone to reach a client, partner, or team member, VirPhone’s cloud phone system ensures that your calls are clear, reliable, and cost-effective. No more worrying about dropped calls or poor audio quality—our system is designed to provide high-quality call connections, no matter where you are.
Here are some features of VirPhone’s calling on phone services that help improve your business communication:
Crystal-Clear Audio: With VOIP phone systems, you can expect high-definition voice quality that eliminates the usual static or noise found in traditional phone calls.
Call Forwarding and Routing: If you’re unavailable, VirPhone can forward your calls to another number or voicemail. This ensures you never miss an important call.
Voicemail-to-Email: With VirPhone, you can receive voicemails directly in your email inbox, making it easier to manage messages and respond promptly.
Why Choose VirPhone for Your Business Communication?
At VirPhone, we understand the importance of reliable communication for businesses. Our cloud phone systems are designed to provide advanced features and excellent call quality, all at an affordable price. Here’s why businesses trust VirPhone for their communication needs:
Affordable: Our VOIP phone systems are cost-effective and provide significant savings over traditional phone systems.
Flexible and Scalable: Whether you're a small business or a large enterprise, our systems grow with you. Adding more lines or features is easy and can be done remotely.1 -
SOLUTION FOR STOLEN BITCOIN HIRE SPARTAN TECH GROUP RETRIEVAL FOR EASY RECOVERY
I thought I was careful with my cryptocurrency, but a sophisticated phishing scam nearly cost me everything. One day, I received what appeared to be a legitimate email from my wallet provider, requesting confirmation for a recent transaction. The email looked identical to their usual communications, complete with logos and familiar wording. Without thinking twice, I clicked on the link and entered my details, fully believing I was safeguarding my account.
The next day, my stomach dropped as I realized my wallet, which contained $150,000 in Bitcoin, had been completely drained. I was horrified. I’d always prided myself on being cautious about scams, but this one had slipped right through my defenses. The betrayal felt overwhelming, not just from the scammers but also from the online world I had trusted so much. It was like waking up from a nightmare only to find it had become my reality.
In a panic, I began searching for help online, scouring forums and social media for advice. That’s when I stumbled upon Spartan Tech Group Retrieval contact them on WhatsApp:+1 562 270 4565 . The reviews were overwhelmingly positive, and it seemed they specialized in cases just like mine. With a mix of desperation and hope, I reached out to them.
Their team responded quickly, asking for all the necessary details about my situation. Right from the start, I could tell they were knowledgeable and experienced. They reassured me that they had successfully handled cases of this nature before and were determined to help me recover my funds.
The next few days were incredibly stressful as I waited for updates. However, Spartan Tech Group Retrieval kept me informed throughout the entire process, alleviating some of my anxiety. They managed to track the transactions that had drained my wallet and, to my astonishment, recovered the majority of my lost funds. I never thought I’d see that money again, and their success felt like a miracle.
I can’t thank Spartan Tech Group Retrieval enough for their expertise and swift action. They truly pulled off the impossible when I was at my lowest. If you ever find yourself a victim of a scam like I did, do not hesitate to reach out to them. Their professionalism and dedication made all the difference in my recovery, and I’m forever grateful.
More info about the company: Telegram:+1 581 286 8092
Email: spartantechretrieval (@) g r o u p m a i l . c o m -
The frustration of seeing your trading account suddenly disabled, with no warning and no explanation. That’s exactly what happened to me with a broker based in Australia. Despite adhering to their rules and consistently using successful trading strategies, the broker accused me of violating their policies and proceeded to withhold my account balance. My repeated attempts to contact them were ignored, leaving me feeling both powerless and unsure of what to do next.After weeks of getting nowhere, I realized I needed professional help to recover my funds. I had heard of services that specialize in dealing with unethical brokers, and after some research, I came across Salvage Asset Recovery. They were known for their expertise in recovering funds from brokers who engage in questionable practices. Given their strong reputation, I decided to take the plunge and contact them for assistance.From the start, Salvage Asset Recovery’s team was reassuring and professional. They took the time to thoroughly review my case and explain how they could assist in recovering my funds. What impressed me most was their clear communication and understanding of the complexities involved with brokers who operate in this manner. They reassured me that they had dealt with similar cases before, and with their help, I could recover my funds and get my account unlocked.The process was smooth and efficient. Salvage Asset Recovery handled all communications with the broker, using their expertise to negotiate and push for the release of my funds. They kept me updated on every step, and within just a few weeks, my account was unlocked and the full balance was transferred back to me. I was amazed at how quickly they resolved the issue and how thorough they were in ensuring my funds were returned safely.I am incredibly grateful to Salvage Asset Recovery for their professionalism and expertise. They not only helped me recover my hard-earned money but also gave me peace of mind during a stressful and uncertain time. If you’re in a similar situation dealing with a broker who refuses to release your funds or makes excuses to avoid paying you Salvage Asset Recovery is the team to trust. Their proven track record and dedication to helping clients in tough situations make them the go-to service for anyone looking to recover funds from dishonest brokers.
Send a DM to Salvage Asset Recovery via below contact details.
WhatsApp-----.+ 1 8 4 7 6 5 4 7 0 9 6
Telegram----Salvageasset3 -
I never imagined I would fall victim to an online scam, but that’s exactly what happened. It started innocently enough. I was on a popular social media platform, browsing through posts when I received a direct message from someone claiming to be a “financial expert.” Their pitch seemed solid, and their promises of quick returns on investments seemed too good to pass up. I did my research—or so I thought—but it wasn’t long before my trust led me into a trap. I made an initial deposit to start the investment, and things moved quickly. The first few days were filled with regular updates and even small returns, which convinced me that I was onto something big. But then, the messages started to change. The returns began to slow down, and when I tried to withdraw my funds, I couldn’t get a response. Panic set in as I realized I’d been scammed. i had lost a significant amount of money, and to make matters worse, the scammers had control over my personal details, including access to some of my financial accounts. Desperate for a solution, I turned to Alpha Spy Nest, a cybersecurity service I had heard of through a friend.From the moment I contacted Alpha Spy Nest, I knew I had made the right choice. They took swift action, immediately conducting a thorough investigation into my digital accounts. They discovered that the scammer had used several techniques to track my online activity, intercept communications, and even mimic legitimate financial websites. Alpha Spy Nest’s team of experts worked tirelessly to gather evidence, trace the scammer’s digital footprint, and recover my lost funds.But it didn’t stop there. Alpha Spy Nest helped me secure my online presence by identifying vulnerabilities in my accounts and recommending tools to fortify my digital defenses. They guided me through implementing multi-factor authentication, strengthened my passwords, and even educated me on how to spot future scams.Within days, they were able to trace the scammer’s digital identity, and with the evidence they provided, law enforcement was able to step in. I regained access to my financial accounts and received a refund of the funds that were stolen, though the emotional toll remained.The experience left me shaken, but Alpha Spy Nest’s professional and supportive team helped me not only reclaim my wealth but also regain my peace of mind. Now, I’m more cautious online, but I know I have the right tools and the right support if anything ever happens again.Thanks to Alpha Spy Nest, I’m no longer a victim. I’m a survivor. You can also reach out to them WhatsApp: +141597144901
-
Uncover Your Cheating Partner Through Cryptic Trace Technologies
I cannot recommend Cryptic Trace Technologies enough for their exceptional service and professionalism. When I suspected infidelity in my marriage, I felt lost and unsure of how to gather evidence without breaching trust or going beyond legal boundaries. Cryptic Trace Technologies came highly recommended, and from the moment I reached out, their team demonstrated empathy, discretion, and expertise. They provided a clear explanation of their processes and reassured me that everything they did would be within the confines of the law. This transparency immediately put me at ease. Their technical capabilities are truly impressive. Using advanced tools and methods, they were able to uncover communications and patterns that confirmed my suspicions. The team provided detailed reports and evidence, ensuring that everything was clear and easy to understand. What stood out most was their thoroughness—there was no stone left unturned. Their findings not only validated my concerns but also provided the closure I needed to make informed decisions about my future. What I appreciated most about Cryptic Trace Technologies was their professionalism and sensitivity throughout this difficult time. They handled my case with care and ensured my privacy was protected at every step. They maintained constant communication and were available to answer my questions, no matter how small or technical. This level of customer service is rare and speaks volumes about their commitment to supporting their clients during such personal and emotionally charged situations. If you are in a situation where you need clarity, whether it’s for infidelity, fraud, or other issues requiring digital investigation, I wholeheartedly recommend Cryptic Trace Technologies. They combine cutting-edge technology with compassionate service, making them a reliable and trustworthy partner during challenging times. Their work helped me uncover the truth and take control of my life, and for that, I am incredibly grateful. Reach out to them through their emails: cryptictrace @ technologist. Com
Cryptictracetechnologies @ zohomail . Com
Website: cryptictracetechnologies . Com
Whatsapp: +158790568031