es

Oh My of the Day: George Takei Has Perfect Response For Facebook Troll

George Takei really sucks—and he's proud of it!

The Star Trek legend and Internet darling had the prefect response this week for a Facebook troll trying to bring him down.

He shared a screenshot of the exchange with the caption: "Sorry, couldn't help myself.‪ #‎Trollololollol‬"

BOOM!

Takei is known for his epic Internet takedowns, so mark this one down as another win for Sulu.






es

Girl Texts Guy Insult in an Attempt to Flirt, and Ends up Getting Stonewalled after Some Serious Awkwardness

It all starts with the anything-but-smooth introduction...











es

How is paper made from trees?

Plant-based paper has been used for thousands of years, but exactly how is it created from trees?




es

Pando, the world's largest organism, may have been growing nonstop since the 1st humans left Africa, study suggests

The clonal quaking aspen known as Pando is between 16,000 and 80,000 years old.




es

Our ancestor Lucy may have used tools more than 3 million years ago

An analysis looking at the hand bones of australopithecines, apes and humans reveals that tool use likely evolved before the Homo genus arose.




es

01 – The Internet Musician – Podcast Launch and Describing Your Music

Welcome to the first episode of the Internet Musician Podcast! Show notes for Episode #1: Subscribe to the Internet Musician Podcast with iTunes: The first episode of The Internet Musician Podcast, hosted by indie artist and internet music marketing junkie Brian Hartzog (http://www.brianhartzog.net).  In this introductory episode, Brian introduces himself, his indie music credentials and […]



  • Podcast
  • describe your music
  • internet music promotion
  • music marketing podcast
  • promotion your music on the internet
  • The Internet Musician Podcast

es

05 – How to Choose the Best Band Name for Google

Show notes: In Episode 5 of The Internet Musician Podcast, we talk through the first two stages in my 8-step process to create a music website–including how to choose a band name and how to buy a domain name for your band’s website. Towards the end of the episode, we also examine several band names to […]




es

New FakeCall Malware Variant Hijacks Android Devices for Fraudulent Banking Calls

Cybersecurity researchers have discovered a new version of a well-known Android malware family dubbed FakeCall that employs voice phishing (aka vishing) techniques to trick users into parting with their personal information. "FakeCall is an extremely sophisticated Vishing attack that leverages malware to take almost complete control of the mobile device, including the interception of incoming




es

THN Recap: Top Cybersecurity Threats, Tools, and Practices (Oct 28 - Nov 03)

This week was a total digital dumpster fire! Hackers were like, "Let's cause some chaos!" and went after everything from our browsers to those fancy cameras that zoom and spin. (You know, the ones they use in spy movies? ????️‍♀️) We're talking password-stealing bots, sneaky extensions that spy on you, and even cloud-hacking ninjas! ???? It's enough to make you want to chuck your phone in the ocean.




es

German Police Disrupt DDoS-for-Hire Platform dstat[.]cc; Suspects Arrested

German law enforcement authorities have announced the disruption of a criminal service called dstat[.]cc that made it possible for other threat actors to easily mount distributed denial-of-service (DDoS) attacks. "The platform made such DDoS attacks accessible to a wide range of users, even those without any in-depth technical skills of their own," the Federal Criminal Police Office (aka




es

Canadian Suspect Arrested Over Snowflake Customer Breach and Extortion Attacks

Canadian law enforcement authorities have arrested an individual who is suspected to have conducted a series of hacks stemming from the breach of cloud data warehousing platform Snowflake earlier this year. The individual in question, Alexander "Connor" Moucka (aka Judische and Waifu), was apprehended on October 30, 2024, on the basis of a provisional arrest warrant, following a request by the




es

Malware Campaign Uses Ethereum Smart Contracts to Control npm Typosquat Packages

An ongoing campaign is targeting npm developers with hundreds of typosquat versions of their legitimate counterparts in an attempt to trick them into running cross-platform malware. The attack is notable for utilizing Ethereum smart contracts for command-and-control (C2) server address distribution, according to independent findings from Checkmarx, Phylum, and Socket published over the past few




es

Synology Urges Patch for Critical Zero-Click RCE Flaw Affecting Millions of NAS Devices

Taiwanese network-attached storage (NAS) appliance maker Synology has addressed a critical security flaw impacting DiskStation and BeePhotos that could lead to remote code execution. Tracked as CVE-2024-10443 and dubbed RISK:STATION by Midnight Blue, the zero-day flaw was demonstrated at the Pwn2Own Ireland 2024 hacking contest by security researcher Rick de Jager. RISK:STATION is an "




es

FBI Seeks Public Help to Identify Chinese Hackers Behind Global Cyber Intrusions

The U.S. Federal Bureau of Investigation (FBI) has sought assistance from the public in connection with an investigation involving the breach of edge devices and computer networks belonging to companies and government entities. "An Advanced Persistent Threat group allegedly created and deployed malware (CVE-2020-12271) as part of a widespread series of indiscriminate computer intrusions designed




es

South Korea Fines Meta $15.67M for Illegally Sharing Sensitive User Data with Advertisers

Meta has been fined 21.62 billion won ($15.67 million) by South Korea's data privacy watchdog for illegally collecting sensitive personal information from Facebook users, including data about their political views and sexual orientation, and sharing it with advertisers without their consent. The country's Personal Information Protection Commission (PIPC) said Meta gathered information such as




es

VEILDrive Attack Exploits Microsoft Services to Evade Detection and Distribute Malware

An ongoing threat campaign dubbed VEILDrive has been observed taking advantage of legitimate services from Microsoft, including Teams, SharePoint, Quick Assist, and OneDrive, as part of its modus operandi. "Leveraging Microsoft SaaS services — including Teams, SharePoint, Quick Assist, and OneDrive — the attacker exploited the trusted infrastructures of previously compromised organizations to




es

Cisco Releases Patch for Critical URWB Vulnerability in Industrial Wireless Systems

Cisco has released security updates to address a maximum severity security flaw impacting Ultra-Reliable Wireless Backhaul (URWB) Access Points that could permit unauthenticated, remote attackers to run commands with elevated privileges. Tracked as CVE-2024-20418 (CVS score: 10.0), the vulnerability has been described as stemming from a lack of input validation to the web-based management




es

5 Most Common Malware Techniques in 2024

Tactics, techniques, and procedures (TTPs) form the foundation of modern defense strategies. Unlike indicators of compromise (IOCs), TTPs are more stable, making them a reliable way to identify specific cyber threats. Here are some of the most commonly used techniques, according to ANY.RUN's Q3 2024 report on malware trends, complete with real-world examples. Disabling of Windows Event Logging




es

Malicious NPM Packages Target Roblox Users with Data-Stealing Malware

A new campaign has targeted the npm package repository with malicious JavaScript libraries that are designed to infect Roblox users with open-source stealer malware such as Skuld and Blank-Grabber. "This incident highlights the alarming ease with which threat actors can launch supply chain attacks by exploiting trust and human error within the open source ecosystem, and using readily available




es

The vCISO Academy: Transforming MSPs and MSSPs into Cybersecurity Powerhouses

We’ve all heard a million times: growing demand for robust cybersecurity in the face of rising cyber threats is undeniable. Globally small and medium-sized businesses (SMBs) are increasingly targeted by cyberattacks but often lack the resources for full-time Chief Information Security Officers (CISOs). This gap is driving the rise of the virtual CISO (vCISO) model, offering a cost-effective




es

IcePeony and Transparent Tribe Target Indian Entities with Cloud-Based Tools

High-profile entities in India have become the target of malicious campaigns orchestrated by the Pakistan-based Transparent Tribe threat actor and a previously unknown China-nexus cyber espionage group dubbed IcePeony. The intrusions linked to Transparent Tribe involve the use of a malware called ElizaRAT and a new stealer payload dubbed ApoloStealer on specific victims of interest, Check Point




es

AndroxGh0st Malware Integrates Mozi Botnet to Target IoT and Cloud Services

The threat actors behind the AndroxGh0st malware are now exploiting a broader set of security flaws impacting various internet-facing applications, while also deploying the Mozi botnet malware. "This botnet utilizes remote code execution and credential-stealing methods to maintain persistent access, leveraging unpatched vulnerabilities to infiltrate critical infrastructures," CloudSEK said in a




es

Palo Alto Advises Securing PAN-OS Interface Amid Potential RCE Threat Concerns

Palo Alto Networks on Friday issued an informational advisory urging customers to ensure that access to the PAN-OS management interface is secured because of a potential remote code execution vulnerability. "Palo Alto Networks is aware of a claim of a remote code execution vulnerability via the PAN-OS management interface," the company said. "At this time, we do not know the specifics of the




es

Cybercriminals Use Excel Exploit to Spread Fileless Remcos RAT Malware

Cybersecurity researchers have discovered a new phishing campaign that spreads a new fileless variant of known commercial malware called Remcos RAT. Remcos RAT "provides purchases with a wide range of advanced features to remotely control computers belonging to the buyer," Fortinet FortiGuard Labs researcher Xiaopeng Zhang said in an analysis published last week. "However, threat actors have




es

HPE Issues Critical Security Patches for Aruba Access Point Vulnerabilities

Hewlett Packard Enterprise (HPE) has released security updates to address multiple vulnerabilities impacting Aruba Networking Access Point products, including two critical bugs that could result in unauthenticated command execution. The flaws affect Access Points running Instant AOS-8 and AOS-10 - AOS-10.4.x.x: 10.4.1.4 and below Instant AOS-8.12.x.x: 8.12.0.2 and below Instant AOS-8.10.x.x:




es

Security Flaws in Popular ML Toolkits Enable Server Hijacks, Privilege Escalation

Cybersecurity researchers have uncovered nearly two dozen security flaws spanning 15 different machine learning (ML) related open-source projects. These comprise vulnerabilities discovered both on the server- and client-side, software supply chain security firm JFrog said in an analysis published last week. The server-side weaknesses "allow attackers to hijack important servers in the




es

The ROI of Security Investments: How Cybersecurity Leaders Prove It

Cyber threats are intensifying, and cybersecurity has become critical to business operations. As security budgets grow, CEOs and boardrooms are demanding concrete evidence that cybersecurity initiatives deliver value beyond regulation compliance. Just like you wouldn’t buy a car without knowing it was first put through a crash test, security systems must also be validated to confirm their value.




es

THN Recap: Top Cybersecurity Threats, Tools, and Practices (Nov 04 - Nov 10)

⚠️ Imagine this: the very tools you trust to protect you online—your two-factor authentication, your car’s tech system, even your security software—turned into silent allies for hackers. Sounds like a scene from a thriller, right? Yet, in 2024, this isn’t fiction; it’s the new cyber reality. Today’s attackers have become so sophisticated that they’re using our trusted tools as secret pathways,




es

5 Ways Behavioral Analytics is Revolutionizing Incident Response

Behavioral analytics, long associated with threat detection (i.e. UEBA or UBA), is experiencing a renaissance. Once primarily used to identify suspicious activity, it’s now being reimagined as a powerful post-detection technology that enhances incident response processes. By leveraging behavioral insights during alert triage and investigation, SOCs can transform their workflows to become more




es

Microsoft Fixes 90 New Flaws, Including Actively Exploited NTLM and Task Scheduler Bugs

Microsoft on Tuesday revealed that two security flaws impacting Windows NT LAN Manager (NTLM) and Task Scheduler have come under active exploitation in the wild. The security vulnerabilities are among the 90 security bugs the tech giant addressed as part of its Patch Tuesday update for November 2024. Of the 90 flaws, four are rated Critical, 85 are rated Important, and one is rated Moderate in




es

Iranian Hackers Use "Dream Job" Lures to Deploy SnailResin Malware in Aerospace Attacks

The Iranian threat actor known as TA455 has been observed taking a leaf out of a North Korean hacking group's playbook to orchestrate its own version of the Dream Job campaign targeting the aerospace industry by offering fake jobs since at least September 2023. "The campaign distributed the SnailResin malware, which activates the SlugResin backdoor," Israeli cybersecurity company ClearSky said




es

ANOTHER GREAT GUN GUY PASSES

I was saddened to be told of the recent death of my old friend Ed Lovette. He had a long and distinguished career in military, law enforcement, and the CIA. Ed was a thinking man’s instructor. We took each other’s classes. He went through my LFI-I course back in the day , and about thirty […]




es

THE NEXT TIME AN ANTI-GUNNER SAYS CITIZENS’ RIFLES ARE USELESS AGAINST ARMIES…

…remind them of this. I was recently reading “Andrew Jackson and the Miracle of New Orleans” by Brian Kilmeade and Don Yeager. The War of 1812 was going badly for the Americans. The British had burned the White House, and a huge contingent of British troops was in Louisiana planning to march north in conquest. […]




es

Weeknotes wk0

Another year, another attempt at keeping track of what I’m doing. The weird thing about this site is…




es

Bripe and the world Bripes with you

This is, without doubt, the stupidest coffee device I have ever bought. But I have bought it.




es

Hot takes on an 11 year old game: Mass Effect 2

I completed Mass Effect 2 a couple of days ago for the first time. This article contains spoilers…




es

2022 in Video Games

I’ve played some computer games in 2022. Here are some words about some of them. Final Fantasy 14…




es

Trump Embraces RFK Jr.’s Views on Vaccines, Fluoride

In the waning days of his campaign, former President Donald Trump has further embraced some of Robert F. Kennedy Jr.’s incorrect or controversial views on health, including vaccines and fluoride.

The post Trump Embraces RFK Jr.’s Views on Vaccines, Fluoride appeared first on FactCheck.org.




es

Trump Makes Unsupported Claim About ‘Massive CHEATING’ in Philadelphia

Former President Donald Trump posted to social media an unsupported claim about "massive CHEATING" in Philadelphia, which he claimed had drawn the attention of law enforcement. The Philadelphia Police Department, the Philadelphia district attorney, a Republican city council member and the Pennsylvania Department of State all refuted the claim.

The post Trump Makes Unsupported Claim About ‘Massive CHEATING’ in Philadelphia appeared first on FactCheck.org.




es

Google’s ‘Where to Vote’ Search Result Reflects Quirk of Candidate Surname, Not Bias

Social media users alleged bias against former President Donald Trump when a Google search on Election Day for “where to vote” returned an interactive map to find a person’s polling station when including the word “Harris” but not “Trump.” The reason is because “Harris” is a county in Texas, whereas “Trump” is not a location.

The post Google’s ‘Where to Vote’ Search Result Reflects Quirk of Candidate Surname, Not Bias appeared first on FactCheck.org.




es

2024 Week 36 Notes: Planners Gotta Plan

The new 2024-25 COVID vaccines are available, so FunkyPlaid and I got ours on Friday. Because we went to a pharmacy, my health insurance didn’t cover them, so I had to use funds from my HRA. (We could have waited until our medical provider had appointments, but that would have been late September or early October — and with travel coming up soon, I was unwilling to wait.)

It is bizarre and enraging to see how agencies supposedly dedicated to public health are flailing in this moment. I’m extremely fortunate to have a job that provides health insurance, an HRA, and sick leave, and I can afford KN95 masks and rapid antigen tests. What about people who are uninsured or underinsured?

I know it’s a bummer to read this, but it’s a bigger bummer to try to survive during yet another COVID surge. Let’s take care of our health, for ourselves and for our communities.

Concentrating on

This time of year is Planner Season, when the 2025 planners are released and people like me (and maybe you too) gobble them up and then spend the rest of this year hoping that next year we have lives exciting enough to plan.

Ever the optimist, my planner line-up for 2025 is:

Cultivating

✍???? Drafting two stories, one for performance (I hope ????????) and one for a collection.

???? Still knitting that gift for someone.

???? Food I made that was yummy:

  • Peperonata with peppers from a coworker’s CSA box, plus peppers from our own CSA box. CSA boxes are great!
  • Gluten-free vegan apple crisp. I am not a huge fan of apples in their primary form; I prefer them as a cinnamon delivery device. So this recipe from Minimalist Baker, apples chopped up and baked with oats and sugar? That works.
  • Sliced heirloom tomatoes on toast spread thinly with mayonnaise. Truffle salt if you’re feeling fancy. (I was.)

???????? Learning Italian with Duolingo.

???? The workweek was short because of the holiday on Monday, but also long because of everything. I’m still trying to create better boundaries around that.

Consuming

????️ One of my planner pals shared a sample of Bungukan Kobayashi’s Yagentoshiro Reflex Violet, a dusky blue with iridescent purple shimmer.

???? “girlfriend” by Hemlocke Springs is on repeat on my brain radio.

???? You don’t need to be a Rolling Stones fan to enjoy the “I Can’t Get No Legal Action” episode of the Judge John Hodgman podcast.

???? Still working my way through the crossword puzzle books I’ve hoarded and enjoying the daily Cross|word on Puzzmo. Also, Minute Cryptic is quite humbling.

???? One last episode of “Fargo” to go, then we’ll start the latest season of “Slow Horses”.

???? What I’m reading and quoting:

From “What would an adequate COVID response look like?” by Julia Doubleday:

Right now, state representatives are deliberately avoiding mention of COVID, while propagandizing the safety of infection and/or the end of the pandemic by refusing to mask. It is hard to imagine how successful a pandemic response might be if public officials were actually trying to end the pandemic. We quite literally have public health and political and media figures working to hide three pieces of critical information: public knowledge of the virus, public knowledge of mitigation measures that would reduce viral spread, and public knowledge of the severity of the virus (which would motivate desire to reduce viral spread).

Other links:

One more thing

Today I’m journaling about this quote from Seneca: “Life, if well lived, is long enough.”




es

2024 Week 37 Notes: R&R

Look at this absolutely good girl: my canine sister, Willa.

Concentrating on

Rest, relaxation, and quality time with loved ones! We’re visiting family in Pennsylvania this week and attending a wedding in Kentucky on Friday.

When packing, I restricted myself to three notebooks and three pens because I tend to overpack and then immediately regret as I am schlepping around a stationery store in my backpack.

Cultivating

✍???? Drafting two (very different) stories. I’m looking forward to time off work to let my creative writing brain percolate.

???? Food I made that was yummy:

  • Pork chops in garlic mushroom sauce, with mashed potatoes and salad on the side. I am not a huge fan of pork chops, but I got them in our CSA box, so I looked for a recipe that incorporated other things I am a huge fan of, like garlic and mushrooms.

???????? When my brain is full of Italian, I switch over to music lessons in Duolingo. It’s fun!

???? No.

Consuming

????️ Only three pens means only three inks: De Atramentis Charles Dickens, Sailor Manyo Hinoki, and Robert Oster Sydney Lavender.

???? I heard “White Gloves” by Khruangbin for the first time in a while and forgot how much I enjoy their music.

???? Recently FunkyPlaid and I tried to watch the show “Kaos” and lasted about ten minutes. I had listened to the Pop Culture Happy Hour episode on the show and thought I might enjoy it.

???? No time for games this week. I’m looking forward to some Puzzmo!

???? We started watching “My Brilliant Friend”, the adaptation of Elena Ferrante’s Neapolitan quartet, which I read last year and loved.

???? What I’m reading and quoting:

Some links

One more thing

I was a bit anxious to travel during a COVID surge, so in addition to getting the new vaccine as soon as I could, I invested in a Flo Mask Pro to wear in airports, planes, and any other crowded spaces. I’m so glad I did; it was very comfortable to wear all day, once I got used to how it felt. My glasses didn’t fog up at all, which is a minor miracle. I did get some looks (you know the kind) but that was a small price to pay for a greater chance of avoiding Covid and/or Long Covid. I only saw a handful of other people masked.




es

More inexpensive ebook goodies!


You can now download Peter F. Hamilton's Pandora's Star for only 2.99$ by following this Amazon Associate link. This OneLink will take you to the nearest Amazon site serving your country and you'll see if you can take advantage of this sale.

Here's the blurb:

The year is 2380. The Intersolar Commonwealth, a sphere of stars, contains more than six hundred worlds interconnected by a web of transport “tunnels” known as wormholes. At the farthest edge of the Commonwealth, astronomer Dudley Bose observes the impossible: over one thousand light-years away, a star . . . disappears. Since the location is too distant to reach by wormhole, the Second Chance, a faster-than-light starship commanded by Wilson Kime, a five-times-rejuvenated ex-NASA pilot, is dispatched to learn what has occurred and whether it represents a threat.

Opposed to the mission are the Guardians of Selfhood, led by Bradley Johansson. Shortly after the journey begins, Kime wonders if the crew of the Second Chance has been infiltrated. But soon enough he will have other worries. Halfway across the galaxy, something truly incredible is waiting: a deadly discovery whose unleashing will threaten to destroy the Commonwealth . . . and humanity itself.




es

More inexpensive ebook goodies!


You can now get your hands on the digital edition of Blake Crouch's Upgrade for only 1.99$ by following this Amazon Associate link. This OneLink will take you to the nearest Amazon site serving your country and you'll see if you can take advantage of this sale.

Here's the blurb:

The mind-blowing new thriller from the New York Times bestselling author of Dark Matter and Recursion—currently in development as a motion picture at Steven Spielberg's Amblin Partners

“You are the next step in human evolution.”

At first, Logan Ramsay isn’t sure if anything’s different. He just feels a little . . . sharper. Better able to concentrate. Better at multitasking. Reading a bit faster, memorizing better, needing less sleep.

But before long, he can’t deny it: Something’s happening to his brain. To his body. He’s starting to see the world, and those around him—even those he loves most—in whole new ways.

The truth is, Logan’s genome has been hacked. And there’s a reason he’s been targeted for this upgrade. A reason that goes back decades to the darkest part of his past, and a horrific family legacy.

Worse still, what’s happening to him is just the first step in a much larger plan, one that will inflict the same changes on humanity at large—at a terrifying cost.

Because of his new abilities, Logan’s the one person in the world capable of stopping what’s been set in motion. But to have a chance at winning this war, he’ll have to become something other than himself. Maybe even something other than human.

And even as he’s fighting, he can’t help wondering: what if humanity’s only hope for a future really does lie in engineering our own evolution?

Intimate in scale yet epic in scope, Upgrade is an intricately plotted, lightning-fast tale that charts one man’s thrilling transformation, even as it asks us to ponder the limits of our humanity—and our boundless potential.





es

More inexpensive ebook goodies!


You can now download Sebastien de Castell's Play of Shadows for only 0.99$ by following this Amazon Associate link. This OneLink will take you to the nearest Amazon site serving your country and you'll see if you can take advantage of this sale.

Here's the blurb:

Swordplay, magic, intrigue and friendships stronger than iron: the first volume in the new swashbuckling fantasy series set in the universe of THE GREATCOATS.

Damelas Chademantaigne picked a poor night to flee a judicial duel.

He has precious little hope of escaping the wrath of the Vixen, the most feared duellist in the entire city, until he stumbles through the stage doors of the magnificent Operato Belleza and tricks his way into the company of actors. An archaic law provides a temporary respite from his troubles - until one night a ghostly voice in his head causes Damelas to fumble his lines, inadvertently blurting out a dreadful truth: the city's most legendary hero may actually be a traitor and a brutal murderer.

With only the help of his boisterous and lusty friend Bereto, a beautiful assassin whose target may well be Damelas himself, and a company of misfit actors who'd just as soon see him dead, this failed grandson of two Greatcoats must somehow find within himself the courage to dig up long-buried truths before a ruthless band of bravos known as the Iron Orchids come for his head.

Oh, and there's still that matter of the Vixen waiting to duel him . . .





es

More inexpensive ebook goodies!


For a limited time, you can download Paolo Bacigalupi's Navola for only 5.99$ by following this Amazon Associate link. This OneLink will take you to the nearest Amazon site serving your country and you'll see if you can take advantage of this sale.

Here's the blurb:

From the New York Times best-selling author of The Windup Girl and The Water Knife comes a sweeping literary historical fantasy about the young scion from a ruling-class family who faces rebellion as he ascends to power.

"You must be as sharp as a stilettotore’s dagger and as subtle as a fish beneath the waters. This is what it is to be Navolese, this is what it is to be di Regulai."

In Navola, a bustling city-state dominated by a handful of influential families, business is power, and power is everything. For generations, the di Regulai family—merchant bankers with a vast empire—has nurtured tendrils that stretch to the farthest reaches of the known world. And though they claim not to be political, their staggering wealth has bought cities and toppled kingdoms. Soon, Davico di Regulai will be expected to take the reins of power from his father and demonstrate his mastery of the games of Navolese diplomacy: knowing who to trust and who to doubt, and how to read what lies hidden behind a smile. But in Navola, strange and ancient undercurrents lurk behind the gilt and grandeur—like the fossilized dragon eye in the family’s possession, a potent symbol of their raw power and a talisman that seems to be summoning Davico to act.

As tensions rise and the events unfold, Davico will be tested to his limits. His fate depends on the eldritch dragon relic and on what lies buried in the heart of his adopted sister, Celia di Balcosi, whose own family was destroyed by Nalova’s twisted politics. With echoes of Renaissance Italy, The Godfather, and Game of Thrones, Navola is a stunning feat of world-building and a mesmerizing depiction of drive and will.