

{"id":1824,"date":"2012-12-13T17:24:53","date_gmt":"2012-12-13T22:24:53","guid":{"rendered":"http:\/\/rud.is\/b\/?p=1824"},"modified":"2017-03-27T09:43:18","modified_gmt":"2017-03-27T14:43:18","slug":"the-fing-corollary","status":"publish","type":"post","link":"https:\/\/rud.is\/b\/2012\/12\/13\/the-fing-corollary\/","title":{"rendered":"The &#8216;fing&#8217; Corollary"},"content":{"rendered":"<p>Back in 2011, @joshcorman <a href=\"http:\/\/blog.cognitivedissidents.com\/2011\/11\/01\/intro-to-hdmoores-law\/\">posited &#8220;HD Moore&#8217;s Law&#8221;<\/a> which is basically:<\/p>\n<blockquote><p><em>Casual Attacker power grows at the rate of Metasploit<\/em><\/p><\/blockquote>\n<p>I am officially submitting the &#8216;fing&#8217; corollary to said law:<\/p>\n<blockquote><p><em>Fundamental defender efficacy can be ascertained within 10 &#8216;fings&#8217;<\/em><\/p><\/blockquote>\n<p>The tool &#8216;fing&#8217; : <a href=\"https:\/\/www.domotz.com\/\">http:\/\/overlooksoft.com\/fing<\/a> : is a very lightweight-yet-wicked-functional network &#038; services scanner that runs on everything from the linux command line to your iPhone. I have a permanent &#8216;sensor&#8217; always running at home and have it loaded on every device I can. While the fine folks at Overlook Software would love you to death for buying a fingbox subscription, it can be used quite nicely in standalone mode to great effect.<\/p>\n<p>I break out &#8216;fing&#8217; during tedious meetings, bus\/train\/plane rides or trips to stores (like Home Depot <smaller>[<i>hint<\/i>]<\/smaller>) just to see who\/what else is on the Wi-Fi network and to also get an idea of how the network itself is configured.<\/p>\n<p>What&#8217;s especially fun at\u2014um\u2014*your* workplace is to run it from the WLAN (iOS\/Android) to see how many hosts it finds on the broadcast domain, then pick pseudo-random (or just interesting looking) hosts to see what services (ports) are up and then use the one-click-access mechanism to see what&#8217;s running behind the port (especially browser-based services).<\/p>\n<p>How does this relate to HD Moore&#8217;s Law? What makes my corollary worthy of an extension?<\/p>\n<p>If I use &#8216;fing&#8217; to do a broadcast domain discovery, select ten endpoints and discover at least one insecure configuration (e.g. telnet on routers, port 80 admin login screens, highly promiscuous number of ports) <strong>you should not consider yourself to be a responsible defender<\/strong>. The &#8220;you&#8221; is a bit of a broad term, but if your multi-millon dollar (assuming an enterprise) security program can be subverted internally with just &#8216;fing&#8217;, you really won&#8217;t be able to handle metasploit, let alone a real attacker.<\/p>\n<p>While metasploit is pretty straightforward to run even for a non-security professional, &#8216;fing&#8217; is <em>even easier<\/em> and should be something you show your network and server admins (and developers) how to use on their own, even if you can&#8217;t get it officially sanctioned (yes, I said that). Many (most) non-security IT professionals just don&#8217;t believe us when we tell them how easy it is for attackers to find things to exploit and this is a great, free way to show them. Or, to put it another way: &#8220;<em>demos speak louder than risk assessments<\/em>&#8220;.<\/p>\n<p>If &#8216;fing&#8217; isn&#8217;t in your toolbox, <em>get it in there<\/em>. If you aren&#8217;t running it regularly at work\/home\/out-and-about, <em>do so<\/em>. If you aren&#8217;t giving your non-security colleagues simple tools to help them be responsible defenders: <em>start now<\/em>.<\/p>\n<p>And, finally, if you&#8217;re using &#8216;fing&#8217; or any other simple tool in a similar capacity, drop a note in the comments (always looking for useful ways to improve security).<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Back in 2011, @joshcorman posited &#8220;HD Moore&#8217;s Law&#8221; which is basically: Casual Attacker power grows at the rate of Metasploit I am officially submitting the &#8216;fing&#8217; corollary to said law: Fundamental defender efficacy can be ascertained within 10 &#8216;fings&#8217; The tool &#8216;fing&#8217; : http:\/\/overlooksoft.com\/fing : is a very lightweight-yet-wicked-functional network &#038; services scanner that runs [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":true,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"activitypub_content_warning":"","activitypub_content_visibility":"","activitypub_max_image_attachments":3,"activitypub_interaction_policy_quote":"anyone","activitypub_status":"","footnotes":""},"categories":[3],"tags":[],"class_list":["post-1824","post","type-post","status-publish","format-standard","hentry","category-information-security"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>The &#039;fing&#039; Corollary - rud.is<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/rud.is\/b\/2012\/12\/13\/the-fing-corollary\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"The &#039;fing&#039; Corollary - rud.is\" \/>\n<meta property=\"og:description\" content=\"Back in 2011, @joshcorman posited &#8220;HD Moore&#8217;s Law&#8221; which is basically: Casual Attacker power grows at the rate of Metasploit I am officially submitting the &#8216;fing&#8217; corollary to said law: Fundamental defender efficacy can be ascertained within 10 &#8216;fings&#8217; The tool &#8216;fing&#8217; : http:\/\/overlooksoft.com\/fing : is a very lightweight-yet-wicked-functional network &#038; services scanner that runs [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/rud.is\/b\/2012\/12\/13\/the-fing-corollary\/\" \/>\n<meta property=\"og:site_name\" content=\"rud.is\" \/>\n<meta property=\"article:published_time\" content=\"2012-12-13T22:24:53+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2017-03-27T14:43:18+00:00\" \/>\n<meta name=\"author\" content=\"hrbrmstr\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"hrbrmstr\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/rud.is\\\/b\\\/2012\\\/12\\\/13\\\/the-fing-corollary\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/rud.is\\\/b\\\/2012\\\/12\\\/13\\\/the-fing-corollary\\\/\"},\"author\":{\"name\":\"hrbrmstr\",\"@id\":\"https:\\\/\\\/rud.is\\\/b\\\/#\\\/schema\\\/person\\\/d7cb7487ab0527447f7fda5c423ff886\"},\"headline\":\"The &#8216;fing&#8217; Corollary\",\"datePublished\":\"2012-12-13T22:24:53+00:00\",\"dateModified\":\"2017-03-27T14:43:18+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/rud.is\\\/b\\\/2012\\\/12\\\/13\\\/the-fing-corollary\\\/\"},\"wordCount\":485,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/rud.is\\\/b\\\/#\\\/schema\\\/person\\\/d7cb7487ab0527447f7fda5c423ff886\"},\"articleSection\":[\"Information Security\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/rud.is\\\/b\\\/2012\\\/12\\\/13\\\/the-fing-corollary\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/rud.is\\\/b\\\/2012\\\/12\\\/13\\\/the-fing-corollary\\\/\",\"url\":\"https:\\\/\\\/rud.is\\\/b\\\/2012\\\/12\\\/13\\\/the-fing-corollary\\\/\",\"name\":\"The 'fing' Corollary - rud.is\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/rud.is\\\/b\\\/#website\"},\"datePublished\":\"2012-12-13T22:24:53+00:00\",\"dateModified\":\"2017-03-27T14:43:18+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/rud.is\\\/b\\\/2012\\\/12\\\/13\\\/the-fing-corollary\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/rud.is\\\/b\\\/2012\\\/12\\\/13\\\/the-fing-corollary\\\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/rud.is\\\/b\\\/2012\\\/12\\\/13\\\/the-fing-corollary\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/rud.is\\\/b\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"The &#8216;fing&#8217; Corollary\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/rud.is\\\/b\\\/#website\",\"url\":\"https:\\\/\\\/rud.is\\\/b\\\/\",\"name\":\"rud.is\",\"description\":\"&quot;In God we trust. All others must bring data&quot;\",\"publisher\":{\"@id\":\"https:\\\/\\\/rud.is\\\/b\\\/#\\\/schema\\\/person\\\/d7cb7487ab0527447f7fda5c423ff886\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/rud.is\\\/b\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":[\"Person\",\"Organization\"],\"@id\":\"https:\\\/\\\/rud.is\\\/b\\\/#\\\/schema\\\/person\\\/d7cb7487ab0527447f7fda5c423ff886\",\"name\":\"hrbrmstr\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/i0.wp.com\\\/rud.is\\\/b\\\/wp-content\\\/uploads\\\/2023\\\/10\\\/ukr-shield.png?fit=460%2C460&ssl=1\",\"url\":\"https:\\\/\\\/i0.wp.com\\\/rud.is\\\/b\\\/wp-content\\\/uploads\\\/2023\\\/10\\\/ukr-shield.png?fit=460%2C460&ssl=1\",\"contentUrl\":\"https:\\\/\\\/i0.wp.com\\\/rud.is\\\/b\\\/wp-content\\\/uploads\\\/2023\\\/10\\\/ukr-shield.png?fit=460%2C460&ssl=1\",\"width\":460,\"height\":460,\"caption\":\"hrbrmstr\"},\"logo\":{\"@id\":\"https:\\\/\\\/i0.wp.com\\\/rud.is\\\/b\\\/wp-content\\\/uploads\\\/2023\\\/10\\\/ukr-shield.png?fit=460%2C460&ssl=1\"},\"description\":\"Don't look at me\u2026I do what he does \u2014 just slower. #rstats avuncular \u2022 ?Resistance Fighter \u2022 Cook \u2022 Christian \u2022 [Master] Chef des Donn\u00e9es de S\u00e9curit\u00e9 @ @rapid7\",\"sameAs\":[\"http:\\\/\\\/rud.is\"],\"url\":\"https:\\\/\\\/rud.is\\\/b\\\/author\\\/hrbrmstr\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"The 'fing' Corollary - rud.is","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/rud.is\/b\/2012\/12\/13\/the-fing-corollary\/","og_locale":"en_US","og_type":"article","og_title":"The 'fing' Corollary - rud.is","og_description":"Back in 2011, @joshcorman posited &#8220;HD Moore&#8217;s Law&#8221; which is basically: Casual Attacker power grows at the rate of Metasploit I am officially submitting the &#8216;fing&#8217; corollary to said law: Fundamental defender efficacy can be ascertained within 10 &#8216;fings&#8217; The tool &#8216;fing&#8217; : http:\/\/overlooksoft.com\/fing : is a very lightweight-yet-wicked-functional network &#038; services scanner that runs [&hellip;]","og_url":"https:\/\/rud.is\/b\/2012\/12\/13\/the-fing-corollary\/","og_site_name":"rud.is","article_published_time":"2012-12-13T22:24:53+00:00","article_modified_time":"2017-03-27T14:43:18+00:00","author":"hrbrmstr","twitter_card":"summary_large_image","twitter_misc":{"Written by":"hrbrmstr","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/rud.is\/b\/2012\/12\/13\/the-fing-corollary\/#article","isPartOf":{"@id":"https:\/\/rud.is\/b\/2012\/12\/13\/the-fing-corollary\/"},"author":{"name":"hrbrmstr","@id":"https:\/\/rud.is\/b\/#\/schema\/person\/d7cb7487ab0527447f7fda5c423ff886"},"headline":"The &#8216;fing&#8217; Corollary","datePublished":"2012-12-13T22:24:53+00:00","dateModified":"2017-03-27T14:43:18+00:00","mainEntityOfPage":{"@id":"https:\/\/rud.is\/b\/2012\/12\/13\/the-fing-corollary\/"},"wordCount":485,"commentCount":0,"publisher":{"@id":"https:\/\/rud.is\/b\/#\/schema\/person\/d7cb7487ab0527447f7fda5c423ff886"},"articleSection":["Information Security"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/rud.is\/b\/2012\/12\/13\/the-fing-corollary\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/rud.is\/b\/2012\/12\/13\/the-fing-corollary\/","url":"https:\/\/rud.is\/b\/2012\/12\/13\/the-fing-corollary\/","name":"The 'fing' Corollary - rud.is","isPartOf":{"@id":"https:\/\/rud.is\/b\/#website"},"datePublished":"2012-12-13T22:24:53+00:00","dateModified":"2017-03-27T14:43:18+00:00","breadcrumb":{"@id":"https:\/\/rud.is\/b\/2012\/12\/13\/the-fing-corollary\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/rud.is\/b\/2012\/12\/13\/the-fing-corollary\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/rud.is\/b\/2012\/12\/13\/the-fing-corollary\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/rud.is\/b\/"},{"@type":"ListItem","position":2,"name":"The &#8216;fing&#8217; Corollary"}]},{"@type":"WebSite","@id":"https:\/\/rud.is\/b\/#website","url":"https:\/\/rud.is\/b\/","name":"rud.is","description":"&quot;In God we trust. All others must bring data&quot;","publisher":{"@id":"https:\/\/rud.is\/b\/#\/schema\/person\/d7cb7487ab0527447f7fda5c423ff886"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/rud.is\/b\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":["Person","Organization"],"@id":"https:\/\/rud.is\/b\/#\/schema\/person\/d7cb7487ab0527447f7fda5c423ff886","name":"hrbrmstr","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/i0.wp.com\/rud.is\/b\/wp-content\/uploads\/2023\/10\/ukr-shield.png?fit=460%2C460&ssl=1","url":"https:\/\/i0.wp.com\/rud.is\/b\/wp-content\/uploads\/2023\/10\/ukr-shield.png?fit=460%2C460&ssl=1","contentUrl":"https:\/\/i0.wp.com\/rud.is\/b\/wp-content\/uploads\/2023\/10\/ukr-shield.png?fit=460%2C460&ssl=1","width":460,"height":460,"caption":"hrbrmstr"},"logo":{"@id":"https:\/\/i0.wp.com\/rud.is\/b\/wp-content\/uploads\/2023\/10\/ukr-shield.png?fit=460%2C460&ssl=1"},"description":"Don't look at me\u2026I do what he does \u2014 just slower. #rstats avuncular \u2022 ?Resistance Fighter \u2022 Cook \u2022 Christian \u2022 [Master] Chef des Donn\u00e9es de S\u00e9curit\u00e9 @ @rapid7","sameAs":["http:\/\/rud.is"],"url":"https:\/\/rud.is\/b\/author\/hrbrmstr\/"}]}},"jetpack_featured_media_url":"","jetpack_shortlink":"https:\/\/wp.me\/p23idr-tq","jetpack_likes_enabled":true,"jetpack-related-posts":[{"id":3871,"url":"https:\/\/rud.is\/b\/2016\/01\/07\/paths-to-discovery-how-to-keep-tabs-on-your-home-network\/","url_meta":{"origin":1824,"position":0},"title":"Paths To Discovery: Mapping Your Home Network","author":"hrbrmstr","date":"2016-01-07","format":false,"excerpt":"Gone are the days when one had a single computer plugged directly into a modem (cable, DSL or good ol' Hayes). Even the days when there were just one or two computers connected via wires or invisible multi-gigahertz waves passing through the air are in the long gone by. Today\u2026","rel":"","context":"In &quot;Cybersecurity&quot;","block_context":{"text":"Cybersecurity","link":"https:\/\/rud.is\/b\/category\/cybersecurity\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/rud.is\/b\/wp-content\/uploads\/2016\/01\/maxresdefault.jpg?fit=1200%2C675&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/rud.is\/b\/wp-content\/uploads\/2016\/01\/maxresdefault.jpg?fit=1200%2C675&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/rud.is\/b\/wp-content\/uploads\/2016\/01\/maxresdefault.jpg?fit=1200%2C675&ssl=1&resize=525%2C300 1.5x, https:\/\/i0.wp.com\/rud.is\/b\/wp-content\/uploads\/2016\/01\/maxresdefault.jpg?fit=1200%2C675&ssl=1&resize=700%2C400 2x, https:\/\/i0.wp.com\/rud.is\/b\/wp-content\/uploads\/2016\/01\/maxresdefault.jpg?fit=1200%2C675&ssl=1&resize=1050%2C600 3x"},"classes":[]},{"id":24738,"url":"https:\/\/rud.is\/b\/2025\/04\/05\/a-critical-analysis-of-iceraid\/","url_meta":{"origin":1824,"position":1},"title":"A Critical Analysis of ICERAID","author":"hrbrmstr","date":"2025-04-05","format":false,"excerpt":"ICERAID (iceraid[.]us) presents itself as a \"GovFi protocol\" that purportedly delegates intelligence gathering tasks from law enforcement to citizens. According to their materials, it rewards users with cryptocurrency tokens for capturing and uploading images of alleged \"criminal illegal alien activity\" and other suspected criminal behavior to their platform. The platform\u2026","rel":"","context":"In &quot;Cybersecurity&quot;","block_context":{"text":"Cybersecurity","link":"https:\/\/rud.is\/b\/category\/cybersecurity\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":24309,"url":"https:\/\/rud.is\/b\/2025\/02\/03\/when-checks-and-balances-fail-the-states-role-in-preserving-constitutional-order\/","url_meta":{"origin":1824,"position":2},"title":"When Checks and Balances Fail: The State&#8217;s Role in Preserving Constitutional Order","author":"hrbrmstr","date":"2025-02-03","format":false,"excerpt":"Today, my Senator \u2014 Susan Collins \u2014 failed in her oath and duty to uphold the Constitution. She voted for the appointment of a traitor to head national intelligence, and is supporting someone for director of the Office of Management and Budget (OMB) who openly wants to dismantle the foundations\u2026","rel":"","context":"In &quot;Commentary&quot;","block_context":{"text":"Commentary","link":"https:\/\/rud.is\/b\/category\/commentary\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":6945,"url":"https:\/\/rud.is\/b\/2017\/11\/03\/i-for-one-welcome-our-forthcoming-new-robots-txt-overlords\/","url_meta":{"origin":1824,"position":3},"title":"I, For One, Welcome Our Forthcoming New robots.txt Overlords","author":"hrbrmstr","date":"2017-11-03","format":false,"excerpt":"Despite my week-long Twitter consumption sabbatical (helped --- in part --- by the nigh week-long internet and power outage here in Maine), I still catch useful snippets from folks. My cow-orker @dabdine shunted a tweet by @terrencehart into a Slack channel this morning, and said tweet contained a link to\u2026","rel":"","context":"In &quot;R&quot;","block_context":{"text":"R","link":"https:\/\/rud.is\/b\/category\/r\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/rud.is\/b\/wp-content\/uploads\/2017\/11\/andy-kelly-402111.jpg?fit=1080%2C720&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/rud.is\/b\/wp-content\/uploads\/2017\/11\/andy-kelly-402111.jpg?fit=1080%2C720&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/rud.is\/b\/wp-content\/uploads\/2017\/11\/andy-kelly-402111.jpg?fit=1080%2C720&ssl=1&resize=525%2C300 1.5x, https:\/\/i0.wp.com\/rud.is\/b\/wp-content\/uploads\/2017\/11\/andy-kelly-402111.jpg?fit=1080%2C720&ssl=1&resize=700%2C400 2x, https:\/\/i0.wp.com\/rud.is\/b\/wp-content\/uploads\/2017\/11\/andy-kelly-402111.jpg?fit=1080%2C720&ssl=1&resize=1050%2C600 3x"},"classes":[]},{"id":24705,"url":"https:\/\/rud.is\/b\/2025\/03\/15\/call-to-action-state-department-power-grab\/","url_meta":{"origin":1824,"position":4},"title":"Call To Action: State Department Power Grab","author":"hrbrmstr","date":"2025-03-15","format":false,"excerpt":"(Re-posted from 47 Watch). The State Department, under the stewardship of Secretary Marco Rubio, has just dropped a bombshell determination that's about as subtle as a foghorn in a library. You can\/should review the Federal Register notice before continuing. There is a markdown formatted version of this on the 47\u2026","rel":"","context":"In &quot;Commentary&quot;","block_context":{"text":"Commentary","link":"https:\/\/rud.is\/b\/category\/commentary\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":2728,"url":"https:\/\/rud.is\/b\/2013\/09\/28\/obamacare-jobs-r-d3\/","url_meta":{"origin":1824,"position":5},"title":"Visualizing &#8220;ObamaCare-related&#8221; Job Cuts","author":"hrbrmstr","date":"2013-09-28","format":false,"excerpt":"UPDATE: Added some extra visualization elements since this post went live. New select menu and hover text for individual job impact detail lines in the table. I was reviewing RSS feeds when I came across this story about \"ObamaCare Employer Mandate: A List Of Cuts To Work Hours, Jobs\" over\u2026","rel":"","context":"In &quot;Charts &amp; Graphs&quot;","block_context":{"text":"Charts &amp; Graphs","link":"https:\/\/rud.is\/b\/category\/charts-graphs\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/rud.is\/b\/wp-content\/uploads\/2013\/09\/oc-snap.png.png?fit=945%2C660&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/rud.is\/b\/wp-content\/uploads\/2013\/09\/oc-snap.png.png?fit=945%2C660&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/rud.is\/b\/wp-content\/uploads\/2013\/09\/oc-snap.png.png?fit=945%2C660&ssl=1&resize=525%2C300 1.5x, https:\/\/i0.wp.com\/rud.is\/b\/wp-content\/uploads\/2013\/09\/oc-snap.png.png?fit=945%2C660&ssl=1&resize=700%2C400 2x"},"classes":[]}],"jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/rud.is\/b\/wp-json\/wp\/v2\/posts\/1824","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/rud.is\/b\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/rud.is\/b\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/rud.is\/b\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/rud.is\/b\/wp-json\/wp\/v2\/comments?post=1824"}],"version-history":[{"count":0,"href":"https:\/\/rud.is\/b\/wp-json\/wp\/v2\/posts\/1824\/revisions"}],"wp:attachment":[{"href":"https:\/\/rud.is\/b\/wp-json\/wp\/v2\/media?parent=1824"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/rud.is\/b\/wp-json\/wp\/v2\/categories?post=1824"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/rud.is\/b\/wp-json\/wp\/v2\/tags?post=1824"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}