Ok coward
Ok coward
I don’t presume to know your situation or the people you’ve dealt with so I’ll be charitable and imagine you cut your losses and quit similar situations in good faith, but you and I are both ignorant about the lives of others. It seems to me like the behavior you label an abandonment of principle leaves the door open to future redemption of a loved one. That’s worth fighting for. On that ground, I think you should stop sharing this opinion even if it’s true for you. If they don’t want to damn their own mother to a propoganda echo chamber full of malice then I’m rooting for them.
You’re doing great lol. Back in my helpdesk days I loved talking to people who overshared to be helpful.
I think that OP is providing all details they think might be relevant, so whether they a little confused or not they got the spirit and I appreciate it.
Confusingly, there’s actually two similar staves that get mixed up. The helix patterned one with two winged snakes I think you have in mind is called the Caduceus, but the the single wingless version I meant is the staff of Aesculapius (multiple spellings out there).
Go check out the alledged link between the snake wrapped staff that’s used to represent medicine and the treatment for guinea worms. Googling puts that theory with the Ebers papyrus from 1500 BC if it’s true!
Art by Jesper Ejsing in case you want to see the wider frame version!
Low effort speculation:
That’s a vodaphone portugal IP, but this is likely traffic routing though their customer cellular network and not their corporate. It’s possible that someone in PT has a similar username for this service and is fat fingering it. It’s also possible that you’re seeing a tiny sliver of a larger attack.
Spur.us tracks that IP as an egress point for openproxy and windscribe ResIP networks so it’s worth considering that the origin of the authentications you’re seeing may not be Portuguese cellphone but someone hiding behind those services.
Here’s a paper describing the difficulties such a service creates for folks trying to secure accounts with traditional IP reputation based rules. “Resident Evil: Understanding Residential IP Proxy as a Dark Service” https://ieeexplore.ieee.org/document/8835239
Shooting in the dark for how a bad actor would monetize account takeover for this service if this is in fact an attack… They could try to sell your invitation to that private tracker. They could also look to scoop up a bunch of folks to try and blackmail based on what victims are download/seeding. Other more creative options I’m not thinking of might be on the table.
“Nut meat” is a common phrase so I would guess the peanut product is closest, but please stop this line of thought for your own safety.