Being a despot sucks. International sanctions keep you from being able to import Game of Thrones DVDs or yellow cake uranium. No one ever tells you that there's food on your face and the anguished cries from your nation's gulags keep you and the rest of your family from getting a good night's rest. When you're not busy threatening the world with nuclear annihilation and when even having your enemies torn apart by dogs doesn't make you smile, it's time to melt away and take a vacation – get outta yer secretive nation!
Oh, if you happen to be from North Korea, you'll likely want to do it with a Brazilian passport.
According to Reuters, the despotic family of North Korean strongman Kim Jong Il attempted to leave their humanitarian crisis of a nation to visit western countries using illegally obtained Brazilian passports. It was long rumored that the Kims had been using forged travel documents for years to venture into the west in search of rest, relaxation and all of the shit that we don't want them to have because they're a terrible family doing horrendous things to millions of people. But up until now, no one, at least outside of the intelligence community, had ever seen any proof of it. That all changed this week when security sources provided Reuters with a photocopy of passports with Kim Jong Un and Kim Jong Il's photos in them. Unsurprisingly, the Brazilian government doesn't have much to say on the matter.
I'd love to show you photographs of the passports, but I can't – we don't have the right to use the images. But Reuters does. You can check them out by clicking this link.
Image via pixabay
A team of computer scientists, psychologists and neuroscientists used eye-tracking and fMRI to measure how users perceived security warnings, such as warnings about app permissions and browser warnings about insecure pages and plugin installations.
Konrad Rieck has data-mined the nine top security conferences, compiling a decade-by-decade list of the papers most often cited in the presentations delivered at these events: top of the pile is Random Oracles are Practical: A Paradigm for Designing Efficient Protocols (Sci-Hub mirror), from the 1993 ACM Conference on Computer and Communications Security. Rieck has […]
A former executive from the data-mining dark operator Cambridge Analytica ‘visited Julian Assange in February last year and told friends it was to discuss what happened during the US election,’ the Guardian reported today. Brittany Kaiser worked as a director there until not long ago, and is reported “to have channelled cryptocurrency payments and donations […]
The human eye is a powerful thing, but it’s not so great at seeing in the dark or around tight spaces, which is partially why most of us struggle with unplugging drains, cleaning under the fridge, and other hard-to-reach jobs. This 1080p HD Waterproof WiFi Wireless Endoscopic Camera, however, gives you the flexibility necessary to get […]
Macs are undeniably some of the most versatile computers on the market, but they can do so much more than what their stock apps allow. For those looking to get the most out of their Mac hardware, the Pay What You Want 2018 Super Mac Bundle features 10 of the industry’s top apps, including photo editors and […]
Salesforce has reinvented the way companies manage customer information, close deals, and ultimately drive revenue, so it should come as no surprise that it’s one of the more valuable skills you can list on your resume today. In fact, according to research from Burning Glass, this platform is now the 7th most in-demand software skill, beating out […]