3.3 C
New York
Thursday, March 27, 2025
Home Blog Page 3799

Large pink cat at Waterloo Station spotlights The Nice Cable Problem



Large pink cat at Waterloo Station spotlights The Nice Cable Problem

An enormous pink cat hologram might be stunning commuters at London Waterloo from Tuesday twentieth August. The hologram is seemingly an effigy of HypnoCat, Recycle Your Electricals’ pink, fluffy mascot, which might be playfully leaping out at commuters, tail a-twitching and eyes a-swirling.

The large, 3-metre-tall pink HypnoCat might be seen pouncing on commuters and mesmerising them as electrical gadgets spiral round him, seemingly highlighting the tech gadgets that he needs everybody to recycle. The state-of-the-art know-how, offered by HyperGram, makes use of the newest holographic know-how, with out the necessity for a display or glasses. 3-D objects float mid-air, making certain that HypnoCat and his message are unimaginable to disregard. He’ll make recycling electricals unmissable for commuters, vacation goers and customers.

The HypnoCat hologram is being launched within the run-up to Worldwide E-Waste Day (October 14th), to encourage individuals throughout the UK to take part in The Nice Cable Problem. This nationwide marketing campaign goals to handle the hundreds of thousands of unused cables mendacity idle throughout houses by urging households, native authorities, retailers, faculties and neighborhood initiatives to collectively recycle 1 million cables. Cables comprise at the least 20% copper and this treasured materials is misplaced perpetually when cables and different electricals are thrown away. Copper is a necessary a part of on a regular basis gadgets we take with no consideration, together with our sensible tech, transport, medical gear and our inexperienced vitality future.

Scott Butler, Govt Director of Materials Focus mentioned, “HypnoCat is out and about and bigger than ever earlier than! Utilizing unbelievable hologram know-how on this distinctive visible approach, we hope he’ll pawsuade many extra individuals to take motion and be a part of us in our recycling efforts within the run as much as Worldwide E-Waste Day.

“Virtually all of us have these previous, forgotten cables stashed away at residence – I’ve a field underneath my mattress of cables I’ve been holding onto ‘simply in case’ however haven’t really utilized in months or are damaged. However by recycling them or donating those who nonetheless work, we are able to repurpose or reclaim that helpful copper at the moment going to waste. The Nice Cable Problem is an easy approach for everybody to make an enormous, collective distinction – by recycling at the least one cable. Most individuals might be stunned at simply how simple it’s to do.”

As a nation of cat lovers, everyone knows that “cats rule” and this cat isn’t any exception – he’ll be distracting commuters, and even a number of canine! Together with his tail twitching impatiently, and his voice booming, he’ll compete with important practice info. Commuters at Waterloo on twentieth – twenty fourth August will discover HypnoCat in 3D beneath the massive practice time info board.

Bailey Younger, Director at DMG mentioned, “Disturbed Media Group, an progressive company on the forefront of immersive experiences, is proud to announce the showcase of its newest undertaking within the UK, HyperGram. Leveraging state-of-the-art 3D holographic know-how developed by our esteemed tech companion, Hypervsn, HyperGram transforms conventional visible storytelling by creating animations that seem to drift in mid-air.

It’s been a pleasure bringing to life Hypnocat which appeared extremely becoming to what we have been attempting to realize this yr. We hope shoppers round London have a extremely pleasing expertise and we look ahead to the outcomes of the marketing campaign!”

How are you going to get entangled in Worldwide E-Waste Day?
Anybody can take part in The Nice Cable Problem and take one small motion to make an enormous distinction. Merely bag up your cables – and another previous, undesirable electricals you discover in your ‘drawer of doom’ – and go to Recycle Your Electricals’ postcode locator to search out your native donation or recycling level.

Materials Focus has created a marketing campaign toolkit to allow native authorities, retailers, faculties and neighborhood initiatives throughout the UK to participate within the problem and assist encourage individuals to recycle their previous cables and different small electricals. If you need extra info then please electronic mail hey@materialfocus.org.uk.

Companions can both:

  • Arrange pop-up cable collections in workplaces, universities, faculties and neighborhood halls, to make it as simple as attainable for workers, college students or residents to recycle their family electricals and cables. The toolkit features a step-by-step information for organising your personal pop-up assortment level (for family electricals solely, not enterprise waste).
  • Assist promote the marketing campaign utilizing Materials Focus’ communication supplies, and lift consciousness {of electrical} waste and encourage people, and native communities, to take motion.

Leverage Coroutines in Android with Concurrency Necessities


Twenty years in the past, simply beginning a desktop pc took a very long time. Purposes usually concerned ready for the pc to carry out some operation, and community entry was usually an afterthought. These instances are lengthy over. Customers now count on their apps to be responsive and network-aware. Fortunately, many instruments can be found to create a majority of these responsive community apps.

In Android, coroutines are the first means for operating code within the background. They’re designed to be straightforward to grasp and simple to make use of. They allow you to—the developer—give attention to your corporation logic whereas letting the working system handle the precise nitty-gritty of balancing system assets.

On this article, Karol Wrotniak walks you thru the speculation of working with coroutines. If you wish to discover this, in addition to community entry and reactive programming, check out Kodeco’s Concurrency & Networking in Android course. This course will set you on the trail to creating quick, responsive Android apps.

Coroutines

A coroutine is a chunk of code that may be suspended and resumed. It’s essential to grasp {that a} coroutine isn’t a thread. But it surely does run on a thread. A coroutine may be resumed on the identical thread because it was suspended or on a distinct one. Check out the next picture:

This is a diagram that shows different threads with various coroutines running on the threads.

Think about that it’s good to go to a number of locations in a metropolis. You are taking a taxi to the financial institution, spend a while there, hire a scooter and go to a restaurant, and eventually, take a bus dwelling. On this case, you’re a coroutine, and the taxi, scooter, and bus are the threads.

Whereas getting issues performed within the financial institution and consuming within the restaurant, you aren’t touring; you’re suspended. The taxi, scooter, and bus don’t want to attend for you. They’ll serve the opposite clients. While you’re able to go, you resume your journey.

In some instances, you possibly can select a number of types of transport. However generally you must use a selected one. For instance, when you’ve got a long-distance journey, you should take a bus. Touring by scooter could be too sluggish. And you’ll’t take a taxi as a result of it’s too costly. Within the metropolis heart, utilizing a scooter throughout rush hour could also be higher, because the bus and taxi can get caught in site visitors jams, inflicting the journey to take longer.

When you possibly can select the type of transport, it doesn’t matter which kind of bus, taxi, or scooter serves you. In coroutines, the sorts of transport are the dispatchers. You’ll be able to select the dispatcher on which the coroutine runs, and the dispatcher offers you a thread with the specified properties. Often, it doesn’t matter which explicit occasion of the thread you get.

There are some instances when it’s good to use a selected type of transport. For instance, you possibly can solely go to the restroom on foot. Attempting to make use of a bus or a taxi is unattainable. And there’s just one occasion of your foot. Equally, there’s just one occasion of the Android predominant thread.

For those who preserve including extra automobiles, buses and scooters to town, the transport will probably be extra environment friendly. However, at a sure level, site visitors jams will seem, and the transport will change into slower.

The town has a restricted variety of automobiles, buses, and scooters. Equally, the variety of threads within the app can be restricted. Threads are heavyweight entities. They use reminiscence to maintain their stack and CPU cycles to run the code.

Then again, the restrict on the variety of duties you employ is way greater. Duties don’t eat any assets like roads or parking areas. Equally, coroutines are light-weight entities. You’ll be able to have hundreds of them within the app concurrently, and it received’t have an effect on efficiency like having hundreds of threads, which might deplete a number of gigabytes of RAM.

Suspending

Suspending is a option to pause a coroutine and resume it later. It’s similar to it can save you a recreation at a checkpoint. You’ll be able to then return to that checkpoint afterward. You’ll be able to have a number of checkpoints and return to any of them in any order.

In Kotlin coroutines, suspending can’t occur at simply anyplace within the code. Coroutines can droop solely at suspension factors. Android Studio has a particular icon on the left facet of the editor that reveals suspension factors. It seems like this:

Suspend Icon

Suspension factors are invocations of suspending features, that are denoted by the droop modifier. As a limitation to coroutines, you possibly can solely name suspending features from one other suspending operate or a coroutine. You’ll get a compilation error in case you attempt to name a suspending operate in a daily operate.

You’ll be able to place the droop modifier on a operate that doesn’t have any suspension factors. The code will compile, however the compiler will set off a warning.

Constructing Coroutines

To start out your first coroutine in your program, you should use one of many coroutine builders. They take a lambda as an argument, describing what code block will run contained in the coroutine. The best instance seems like this:

runBlocking {
  doSuspendableWork() // this can be a suspending operate
}

What’s essential right here is that calling the coroutine builder itself isn’t a suspendable operation. So, you possibly can name it from any operate. The lambda handed to the builder is a suspendable block of code as a way to name suspendable features from it. The builder executes the lambda within the coroutine in some unspecified time in the future sooner or later.

There are three fundamental coroutine builders in Kotlin: launch, async, and runBlocking.

runBlocking

The best is the runBlocking builder. It blocks the present thread till the coroutine completes. There are not any benefits to suspensions on this case. Through the interval when the coroutine is suspended, the thread is blocked. It consumes the assets however doesn’t do any helpful work.

Builders not often use the runBlocking in manufacturing code of actual Android apps. It may be helpful to combine newly-written suspending code with current blocking code, which doesn’t use coroutines, e.g.in a legacy app starting to undertake coroutines. While you write Android initiatives from scratch, this received’t be the case—you’ll write with coroutines from the beginning. Most trendy, widespread Android libraries now use coroutines. Easy console apps are one other reliable use case of a runBlocking.

runBlocking is typically used to name suspending features from unit check strategies. Nonetheless, there’s a devoted runTest builder, which is extra appropriate for testing.

Key Indicators in CloudTrail Logs for Stolen API Keys

0


Aug 20, 2024The Hacker InformationCybersecurity / Cloud Safety

Key Indicators in CloudTrail Logs for Stolen API Keys

As cloud infrastructure turns into the spine of recent enterprises, guaranteeing the safety of those environments is paramount. With AWS (Amazon Internet Companies) nonetheless being the dominant cloud it is vital for any safety skilled to know the place to search for indicators of compromise. AWS CloudTrail stands out as a vital instrument for monitoring and logging API exercise, offering a complete document of actions taken inside an AWS account. Consider AWS CloudTrail like an audit or occasion log for the entire API calls made in your AWS account. For safety professionals, monitoring these logs is crucial, notably relating to detecting potential unauthorized entry, reminiscent of by way of stolen API keys. These methods and lots of others I’ve discovered by way of the incidents I’ve labored in AWS and that we constructed into SANS FOR509, Enterprise Cloud Forensics.

1. Uncommon API Calls and Entry Patterns

A. Sudden Spike in API Requests

One of many first indicators of a possible safety breach is an sudden enhance in API requests. CloudTrail logs each API name made inside your AWS account, together with who made the decision, when it was made, and from the place. An attacker with stolen API keys may provoke numerous requests in a short while body, both probing the account for data or making an attempt to use sure providers.

What to Look For:

  • A sudden, uncharacteristic surge in API exercise.
  • API calls from uncommon IP addresses, notably from areas the place reputable customers don’t function.
  • Entry makes an attempt to all kinds of providers, particularly if they don’t seem to be usually utilized by your group.

Notice that Guard Responsibility (if enabled) will mechanically flag these sorts of occasions, however you must be watching to seek out them.

B. Unauthorized Use of Root Account

AWS strongly recommends avoiding using the foundation account for day-to-day operations because of its excessive degree of privileges. Any entry to the foundation account, particularly if API keys related to it are getting used, is a big crimson flag.

What to Look For:

  • API calls made with root account credentials, particularly if the foundation account just isn’t usually used.
  • Adjustments to account-level settings, reminiscent of modifying billing data or account configurations.

2. Anomalous IAM Exercise

A. Suspicious Creation of Entry Keys

Attackers might create new entry keys to determine persistent entry to the compromised account. Monitoring CloudTrail logs for the creation of recent entry keys is essential, particularly if these keys are created for accounts that usually don’t require them.

What to Look For:

  • Creation of recent entry keys for IAM customers, notably those that haven’t wanted them earlier than.
  • Quick use of newly created entry keys, which may point out an attacker is testing or using these keys.
  • API calls associated to `CreateAccessKey`, `ListAccessKeys`, and `UpdateAccessKey`.

C. Function Assumption Patterns

AWS permits customers to imagine roles, granting them momentary credentials for particular duties. Monitoring for uncommon position assumption patterns is important, as an attacker may assume roles to pivot throughout the surroundings.

What to Look For:

  • Uncommon or frequent `AssumeRole` API calls, particularly to roles with elevated privileges.
  • Function assumptions from IP addresses or areas not usually related along with your reputable customers.
  • Function assumptions which can be adopted by actions inconsistent with regular enterprise operations.

3. Anomalous Knowledge Entry and Motion

A. Uncommon S3 Bucket Entry

Amazon S3 is usually a goal for attackers, provided that it will probably retailer huge quantities of probably delicate knowledge. Monitoring CloudTrail for uncommon entry to S3 buckets is crucial in detecting compromised API keys.

What to Look For:

  • API calls associated to `ListBuckets`, `GetObject`, or `PutObject` for buckets that don’t usually see such exercise.
  • Giant-scale knowledge downloads or uploads to and from S3 buckets, particularly if occurring outdoors of regular enterprise hours.
  • Entry makes an attempt to buckets that retailer delicate knowledge, reminiscent of backups or confidential information.

B. Knowledge Exfiltration Makes an attempt

An attacker might try to maneuver knowledge out of your AWS surroundings. CloudTrail logs might help detect such exfiltration makes an attempt, particularly if the information switch patterns are uncommon.

What to Look For:

  • Giant knowledge transfers from providers like S3, RDS (Relational Database Service), or DynamoDB, particularly to exterior or unknown IP addresses.
  • API calls associated to providers like AWS DataSync or S3 Switch Acceleration that aren’t usually utilized in your surroundings.
  • Makes an attempt to create or modify knowledge replication configurations, reminiscent of these involving S3 cross-region replication.

4. Sudden Safety Group Modifications

Safety teams management inbound and outbound visitors to AWS sources. An attacker may modify these settings to open up further assault vectors, reminiscent of enabling SSH entry from exterior IP addresses.

What to Look For:

  • Adjustments to safety group guidelines that permit inbound visitors from IP addresses outdoors your trusted community.
  • API calls associated to `AuthorizeSecurityGroupIngress` or `RevokeSecurityGroupEgress` that don’t align with regular operations.
  • Creation of recent safety teams with overly permissive guidelines, reminiscent of permitting all inbound visitors on widespread ports.

5. Steps for Mitigating the Threat of Stolen API Keys

A. Implement the Precept of Least Privilege

To attenuate the injury an attacker can do with stolen API keys, implement the precept of least privilege throughout your AWS account. Be sure that IAM customers and roles solely have the permissions essential to carry out their duties.

B. Implement Multi-Issue Authentication (MFA)

Require MFA for all IAM customers, notably these with administrative privileges. This provides a further layer of safety, making it harder for attackers to realize entry, even when they’ve stolen API keys.

C. Commonly Rotate and Audit Entry Keys

Commonly rotate entry keys and be certain that they’re tied to IAM customers who really need them. Moreover, audit using entry keys to make sure they don’t seem to be being abused or used from sudden areas.

D. Allow and Monitor CloudTrail and GuardDuty

Be sure that CloudTrail is enabled in all areas and that logs are centralized for evaluation. Moreover, AWS GuardDuty can present real-time monitoring for malicious exercise, providing one other layer of safety towards compromised credentials. Take into account AWS Detective to have some intelligence constructed on prime of the findings.

E. Use AWS Config for Compliance Monitoring

AWS Config can be utilized to watch compliance with safety greatest practices, together with the right use of IAM insurance policies and safety teams. This instrument might help determine misconfigurations that may depart your account weak to assault.

Conclusion

The safety of your AWS surroundings hinges on vigilant monitoring and fast detection of anomalies inside CloudTrail logs. By understanding the standard patterns of reputable utilization and being alert to deviations from these patterns, safety professionals can detect and reply to potential compromises, reminiscent of these involving stolen API keys, earlier than they trigger vital injury. As cloud environments proceed to evolve, sustaining a proactive stance on safety is crucial to defending delicate knowledge and guaranteeing the integrity of your AWS infrastructure. If you wish to be taught extra about what to search for in AWS for indicators of intrusion, together with Microsoft and Google clouds you may contemplate my class FOR509 working at SANS Cyber Protection Initiative 2024. Go to for509.com to be taught extra.

Discovered this text fascinating? This text is a contributed piece from certainly one of our valued companions. Comply with us on Twitter and LinkedIn to learn extra unique content material we publish.



macos – How do I discover my IP Tackle from the command line?

0


You are able to do the next:

Sort ifconfig or ifconfig -a. This command reveals you the record of interfaces together with their IP and MAC addresses (the latter one provided that relevant). You can even kind ifconfig en0 or ifconfig en1 for the configuration of a selected interface solely (as somebody mentioned of their solutions, en0 is usually the wired Ethernet whereas en1 is the WiFi interface).

Instead, netstat -i will record all interfaces and can present you the IP addresses you could have assigned to every of them.

Usually, when you could have SSH daemon operating on a field, it can hear on all accessible interfaces, ie. you need to use any IP tackle that is configured in your machine to connect with that machine by way of SSH (this, clearly, topic to Firewall guidelines). Should you’re after what the OS calls a Main interface and first IP tackle, you need to use the scutil command like this:

MacBook:~ scutil
> present State:/Community/World/IPv4
 {
  PrimaryInterface : en0
  PrimaryService : C0550F84-5C07-484F-8D62-C8B90DC977D8
  Router : 10.103.4.1
}
> present State:/Community/Interface/en0/IPv4
 {
  Addresses :  {
    0 : 10.103.4.234
  }
  BroadcastAddresses :  {
    0 : 10.103.4.255
  }
  SubnetMasks :  {
    0 : 255.255.255.0
  }
}

Please notice, that the above, regardless that is a command-line command, can also be interactive (so that you run scutil after which enter its personal instructions into it). The primary present command tells you the title of the first interface for the OS (i.e. this would be the one on prime of the record in your System Preferences / Community Preferences window), in addition to the IP tackle of your default router. The second present command takes State:/Community/Interface//IPv4 argument (on this case, en0) and offers you the IP addresses assigned to it. You are on the lookout for the tackle within the Addresses array, the opposite two entries are broadcast addresses and the netmasks.

Hope that helps, but when something will not be clear, let me know.

Cybercrime Rapper Sues Financial institution over Fraud Investigation – Krebs on Safety


Cybercrime Rapper Sues Financial institution over Fraud Investigation – Krebs on Safety

A partial selfie posted by Punchmade Dev to his Twitter account. Sure, that could be a functioning handheld card skimming system, encrusted in diamonds. Beneath which are extra medallions, together with a diamond-studded bitcoin and cost card.

In January, KrebsOnSecurity wrote about rapper Punchmade Dev, whose music movies sing the praises of a cybercrime life-style. That story confirmed how Punchmade’s social media profiles promoted Punchmade-themed on-line shops promoting checking account and cost card knowledge. The topic of that piece, a 22-year-old Kentucky man, is now openly suing his monetary establishment after it blocked a $75,000 wire switch and froze his account, citing an lively regulation enforcement investigation.

With memorable hits resembling “Web Swiping” and “Million Greenback Prison” incomes hundreds of thousands of views, Punchmade Dev has leveraged his appreciable following to hawk tutorials on find out how to commit monetary crimes on-line. However till lately, there wasn’t a lot to help a conclusion that Punchmade was truly doing the cybercrime issues he promotes in his songs.

That modified earlier this yr when KrebsOnSecurity confirmed how Punchmade’s social media handles have been selling Punchmade e-commerce outlets on-line that offered entry to Cashapp and PayPal accounts with balances, software program for printing checks, in addition to private and monetary knowledge on Individuals.

Punchmade Dev’s earlier on-line store (now defunct). His Telegram channel has greater than 75,000 followers.

The January story traced Punchmade’s numerous on-line properties to a 22-year-old Devon Turner from Lexington, Ky. Reached through his profile on X/Twitter, Punchmade Dev stated they weren’t affiliated with the lawsuit filed by Turner [Punchmade’s X account provided this denial even though it has still not responded to requests for comment from the first story about him in January]. In the meantime, Mr. Turner has declined a number of requests to remark for this story.

On June 26, Turner filed a professional se lawsuit towards PNC Financial institution, alleging “illegal discriminatory and tortuous motion” after he was denied a wire switch within the quantity of $75,000. PNC Financial institution didn’t reply to a request for remark.

Turner’s grievance states {that a} follow-up name to his financial institution revealed the account had been closed because of “suspicious exercise,” and that he was now not welcome to patronize PNC Financial institution.

“The Plaintiff is a really profitable African-American enterprise proprietor, who has generated hundreds of thousands of {dollars} together with his companies, has employed 30 plus folks to work for his companies,” Turner wrote.

As reported in January, amongst Turner’s companies is a Lexington entity known as OBN Group LLC (assumed title Punchmade LLC). Enterprise incorporation paperwork from the Kentucky Secretary of State present he additionally ran a file label known as DevTakeFlightBeats Inc.

Turner’s lawsuit alleges that financial institution workers made disparaging remarks about him, suggesting the account was canceled as a result of it might be uncommon for an individual like him to have that type of cash.

A snippet from Turner’s lawsuit vs. PNC.

Extremely, Turner acknowledges that PNC advised him his account was flagged for consideration from regulation enforcement officers.

“The PNC Financial institution customer support consultant additionally defined that there was a be aware on the account that regulation enforcement could be contacted in some unspecified time in the future in time,” the lawsuit reads.

“The Plaintiff, who was not nervous in any respect about regulation enforcement being concerned as a result of nothing unlawful occurred, knowledgeable the PNC Financial institution consultant that this was one huge mistake and requested him what his choices have been,” the grievance states.

Devon Turner, a.ok.a. “Punchmade Dev,” in an undated photograph, sporting a diamond-covered Visa card. Picture: tiktok.com/brainjuiceofficial

Turner’s lawsuit stated PNC advised him they might put a be aware on his account permitting him to withdraw the funds from any department, however that when he visited a PNC department and requested to withdraw your entire quantity in his account — $500,000 — PNC refused, saying the cash had been seized.

“Finally, PNC financial institution not solely refused his request to launch his funds however knowledgeable him that his funds could be seized indefinitely as [sic] PNC Financial institution,” Turner lawsuit recounts.

The Punchmade outlets promoting monetary knowledge that have been profiled within the January story are lengthy gone, however Punchmade’s Instagram account now promotes punchmade[.]cc, which behaves and appears the identical as his older store.

Punchmade’s present store, which DomainTools says was registered to a Lexington, Ky. cellphone quantity utilized by accounts below the title of Devon Turner at a number of on-line retailers.

The breach monitoring service Constella Intelligence finds the e-mail deal with related to Turner’s enterprise OBN Group LLC — obndevpayments@gmail.com — was utilized by a Devon Turner from Lexington to buy software program on-line. That file contains the Lexington, Ky. cell phone quantity 859-963-6243, which Constella additionally finds was used to register accounts for Devon Turner on the retailer Neiman Marcus, and on the house decor and style website poshmark.com.

A search on this cellphone quantity at DomainTools reveals it’s related to two domains since 2021. The primary is the aforementioned punchmade[.]cc. The opposite is foreverpunchmade[.]com, which is registered to a Devon Turner in Lexington, Ky. A replica of this website at archive.org signifies it as soon as offered Punchmade Dev-branded t-shirts and different merchandise.

Mr. Turner included his contact info on the backside of his lawsuit. What cellphone quantity did he go away? Would you consider 859-963-6243?

The closing part of Mr. Turner’s grievance features a cellphone quantity that was used to register a well-liked on-line fraud store named after Punchmade.

Is Punchmade Dev a big-time cybercriminal enabler, as his public personna would have us consider? Or is he some two-bit nitwit who has spent a lot on customized medallions that he can’t afford a lawyer? It’s arduous to inform.

However he definitively has a broad attain: His Instagram account has ~860k followers, and his Telegram channel has greater than 75,000 subscribers, all little question looking for that candy “C@sh App sauce,” which apparently has one thing to do with shifting cryptocurrencies via Money App in a method that financially rewards folks in a position and prepared to open up new accounts.

It’s extremely ironic that Punchmade sells tutorials on find out how to have nice “opsec,” a reference to “operational safety,” which within the cybercriminal context means the flexibility to efficiently separate one’s cybercriminal identification from one’s real-life identification: This man can’t even register a site title anonymously.

A replica of Turner’s grievance is accessible right here (PDF).

For extra on Punchmade, try the TikTok video How Punchmade Dev Bought Began Scamming.

Replace, Aug. 8, 8:49 a.m. ET: A reader identified that Turner additionally lately sued a Mercedes Benz dealership in Illinois, allegedly for promoting him a lemon. In that professional se grievance, Turner included the contact e-mail deal with punchmadedev@gmail.com.