Linus Gabriel Sebastian & Linus Media Group / Linus Tech Tips - Narcissistic corporate shill YouTuber driving his media empire into the ground. KILL COUNT: 2

  • 🐕 I am attempting to get the site runnning as fast as possible. If you are experiencing slow page load times, please report it.
I also think Colin is my new favorite on camera person;
Bad news for you :(

Colin de Graaf is no longer working at Linus Media Group. Just three weeks after they did a Floatplane exclusive "Meet the Team" on Colin too.
Hasn't Okta had the exact same security breach at least twice in the last year?
Not sure about breaches but they did have a devastating outage during the short period where I had to use it. Completely down for almost an entire workday, no communication from them, only help available was via Redditors passing back little scraps of info they had gotten from their account managers.
 
Not sure about breaches but they did have a devastating outage during the short period where I had to use it. Completely down for almost an entire workday, no communication from them, only help available was via Redditors passing back little scraps of info they had gotten from their account managers.

Decided to do a bit of research and found this on Cybersecurity Dive. The article itself does a lot of PR dicksucking for Okta, but it does include a summary of the last couple years that is pretty ugly taken on its own:

In 2022, Okta got hit by a phishing attack, a breach and had its GitHub source code stolen. Last year, a string of attacks hit high-profile customer environments over the summer and a third-party vendor attack exposed health information on nearly 5,000 current and former Okta employees.

Then came the September attack against Okta’s support portal. BeyondTrust, Cloudflare and 1Password all came forward to say they were downstream victims of that attack. And Okta’s early estimations concluded that just 1% of its customer support system clients were impacted.

But by the end of November, Okta concluded all of its customer support clients were affected by the attack.

Here's a post in the Open Source Software Community thread on the 2022 breach. We don't seem to have anything specific on the 2023 attack, but I found an article (behind an account wall, I'll spoiler the full article below) that lays out a lot of the details of it and draws the conclusion that it was also caused by a phishing attack on an Okta employee. The article says that External Data Protection would have prevented this (grain of salt, the article source sells EDP services) which seems to imply that they did all of nothing to improve between the 2022 and 2023 attacks. Sounds like the way our favorite Canuck tech enthusiast would run things. [Totally not a thread tax comment]

Okay, it's a thread tax...

The irony of the following story of this damaging data breach cannot be ignored. But it can be learned from. External data privacy is the missing element to even the most well-regarded cyber security solutions.
In October of 2023, Okta, a leading provider of identity and access management (IAM) solutions was victimized by a data breach. IAM solutions are routinely employed by large enterprises and are regarded as a cornerstone of any cyber or information security practice.
Used to control who is authenticated and authorized to access secure data and resources, IAM systems are relied upon to provide highly secure and configurable access to employees in multiple, disparate locations globally, as well as to third-parties like partners, vendors, and mobile/remote users.
For a company whose entire business model is built atop the promise of keeping data systems secure from unauthorized access to be breached (especially as thoroughly as Okta was) is proof that no organization is safe from being victimized by data breaches – unless or until they address and neutralize the threat posed by unsecured external data privacy.
As is almost always the case with events of this nature, there is more than one vulnerability exploited by threat actors to successfully effectuate these attacks. In fact, there are often a number of failures within different areas of the victim organization’s overall InfoSec strategy which, combined, enable threat actors to achieve their criminal goals, and which make the follow-on consequences of the initial breach far worse over time. For an IAM company like Okta whose customer base is comprised of other leading providers of password encryption, trust management and other cybersecurity solutions providers, then damage rippled outwards causing serious problems for security downstream to organizations that are not even customers of Okta.
Shockingly, nearly all the enormous, costly data breaches and cyberattacks examined by this series share one glaring commonality. It is a consideration all too frequently overlooked by even the most sophisticated InfoSec programs and one which, even in the aftermath of a catastrophic security breach, is still left inadequately addressed. The commonality threading through this and most other cybersecurity failures: inadequate External Data Privacy management or “EDP”.

THE VICTIM ORGANIZATION​

Founded in by a pair of former Salesforce.com employees in 2009 as SaaSure, Okta as it is now known, is a San Francisco-based identity and access management company delivering cloud-based software solutions helping client organizations manage and secure user authentication into web and mobile applications. In 2015, the company raised $75 million in private equity from the venture capital firm Andreesen Horowitz led by the acknowledged godfather of the internet, Marc Andreesen. Other early investors included Silicon Valley VC leaders, Sequoia Capital and Greylock partners. The company went public in 2017 with an initial public offering on the Nasdaq (OKTA), reaching a valuation of more than $6 billion. In March 2021 Okta acquired Auth0 in a $6.5 billion deal. In 2023, Okta bought out security firm, Spera for $130 million.
Okta’s products are used by developers to build identity controls into applications, websites, web services and devices. Many leading cloud or Software as a Service (SaaS) products – serving all manner of industries with enterprise automation platforms for a broad array of business processes – were built with Okta technology. Its product portfolio encompasses ten products under the umbrella of IAM. These include solutions for Single-Sign-On, Universal Directory, API Access Management, Authentication, Advanced Server Access, Multi-Factor- Authentication, Access Gateway, Authentication and Lifecycle Management. These are all critical success factors for any security protocols built into web-based information systems.
Customers of Okta represent a veritable who’s who of organizations with high stakes requirements for cyber security. Industry-leading cloud and cyber security solution providers like 1Password, BeyondTrust and Cloudflare. Telecommunications companies such as Zoom and TMobile. Travel companies like JetBlue, Navan, MGM Resorts, Priceline, and Wyndham Hotels. Financial Services and Fintech giants like Ally Financial, Kiva, Experian and Nasdaq. Technology leaders such as Apple, Hewlett Packard. Media companies like Virgin Media, USA Today and even the FCC. Other industries served include CPG companies, manufacturing companies, healthcare, life sciences, construction and real estate, oil/gas/chemicals companies and retail firms.
Apps research and buyer resource site, AppsRunTheWorld.com provides the following graphical representations of the size and scope of Okta’s customer base by industry, size of customer by number of employees and also by revenue.

<Graphics and charts of Okta client by industry, size, and revenue omitted>

KNOWN FACTS OF THE ATTACKS​

It was October of 2023 when Okta’s data systems were breached. Initially, Okta’s spokesperson reported that there was no unauthorized access to the company’s services or customer data resulting from the intrusion.
Their initial disclosure stated that hackers had gained access to customer support systems and had exfiltrated cookies and session tokens that had the potential to lead to compromise of customer accounts. According to their initial account, a mere 1% of the more than eighteen thousand customer organizations was impacted. However, Okta assured jittery customers that no names or emails had been compromised, that they had taken steps to secure their data, and that law enforcement had been notified.
The situation grew more ominous though when, after several months of review Okta’s Chief Security Officer, David Bradbury shared in a blog post that the threat actors had actually been able to run and download a secure report which contained the names and email addresses of all Okta customer support system users.
Bradbury wrote, “All Okta Workforce Identity Cloud (WIC) and Customer Identity Solution (CIS) customers are impacted except customers in our FedRamp High and DoD IL4 environments (these environments use a separate support system not accessed by the threat actor). The Auth0/CIC support case management system was also not impacted by this incident”. He added further comforting statements explaining that most of the fields in these reports are blank and do not contain user credentials or other sensitive personal data. And that for 99.6% of users included in the corrupted report, full names and email addresses were the only personally identifiable information included in the exposure.
Acknowledging that the risk was now larger than originally reported, Bradbury characterized the risk accurately writing in his post, “While we do not have direct knowledge or evidence that this information is being actively exploited, there is a possibility that the threat actor may use this information to target Okta customers via phishing or social engineering attacks.” It is perhaps wishful thinking to suggest that this possibility was not being actively pursued by the threat actors who breached the system or to any of the myriad criminal enterprises to whom this data is likely to have been sold or shared.
Cybercriminals are most certainly using the data to launch phishing and social engineering attacks on the users affected. In a tacit admission of this reality, Okta recommended its customers employ MFA for their administrators and consider using phishing-resistant authenticators to further enhance their security.

INITIAL CONSEQUENCES​

It is beyond debate that organizations will suffer deep and often lasting reputational damage in the wake of experiencing a breach. It follows naturally that a financial toll is also exacted as a result of being breached. In the case of Okta, both appear to be true. While there are a complex array of factors that exert influence over the stock price of a publicly traded company, the case could certainly be made that this breach played a significant role in generating the trough in the share price of OKTA.

<Chart of tanking stock price omitted>

OKTA had been trading in the $200 to $300/per share range for most of 2020 and 2021. The depth of the fall in share price to below the $100 level occurred at the same time as the initial breach was revealed in October 2023 and the stock’s value has remained in that range since then.
It is also worth noting that the downward trend in the share price seems to have begun in late 2021. Again, many factors are baked into the price of any company’s stock. However, there had been several, less consequential security incidents at Okta leading up to the massive October 2023 breach. On March 9, 2021, a hacker group called “Advanced Persistent Threat 69420” breached the network at an Okta office through a vulnerability in the company’s Verkada camera systems and was able to spy on security footage through this hole. Advanced Persistent Threat 69420 revealed they had gained root shell access to the broader network as a result of the camera hack.
Then again on March 22, 2022, the notorious hacker collective LAPSUS$ posted screenshots of internal Okta systems which Okta concluded were collected during a breach made via a computer used by a third-party vendor. Read More About: External Data Security and Vendor Risk
December 2022 saw Okta’s source code stolen by a hacker who gained unauthorized access to Okta’s GitHub data stores.
Clearly, investors were not rushing for the exits en masse in the wake of these smaller and less egregious breaches. Nevertheless, as is often the case, small breaches lead to larger ones as the information stolen is leveraged by threat actors to mount and deploy further attacks. As the damage grows, so does the negative publicity and erosion of customer confidence. Ultimately, when the “big one” occurs, companies often suffer catastrophic financial consequences. In Okta’s case, this was manifested in a roughly 66% drop in shareholder value.

ATTACK VECTORS AND EDP MANAGEMENT​

Culled from analysis of the Okta breach produced by IT management solutions provider ManageEngine IT Security and IAM solution provider Rezonate, the following methodology and timeline explains how this breach unfolded.
It seems that the intrusion was accomplished by exploiting .HAR files accessed through a seemingly inconsequential incident involving an Okta employee’s laptop. (Rezonate does a great job explaining what HAR files are as well as how – in detailed fashion – they were exploited in this instance.) Using a company-issued laptop, this Okta employee logged into their personal Google profile using the Google Chrome browser. The employee saved their Okta service authentication credentials in the browser of their personal account.
Analysts agree it was highly likely that the initial compromise occurred through a phishing or other social engineering technique aimed at accessing this employee’s personal account.
With the employee’s personal Google account compromised on the Okta-managed laptop, the threat actors were able to inject malware into the broader Okta system. The malware enabled attackers to access Okta’s support systems and exploit the HAR files submitted by Okta customers. The threat actors used this technique to uncover session tokens of Okta customers including other well-known cybersecurity providers such as 1Password, BeyondTrust, CloudFlare and others.
Having gained control over these admin accounts, the hackers sought to make deeper forays into the internal systems of these breached organizations. A sharp-eyed employee at 1Password alerted Okta to unusual activities though and alerted Okta. A few weeks later after a compromise alarm was raised by BeyondTrust, the misused service account was isolated as the problem.
The following is a synopsis of the timeline of the HAR file compromise and data exfiltration that occurred as a result of this breach of Okta systems.
September 29, 2023 – Okta client, 1Password reports suspicious activity to Okta security teams
October 2, 2023 – A second Okta client – BeyondTrust – reports suspicious activity to security teams
October 12, 2023 – A third Okta client makes a report of suspicious activity
October 13, 2023 – BeyondTrust shares an IP address (IOC) with Okta
October 16, 2023 – Okta isolates activities occurring within a service account associated with said suspicious IP address
October 17, 2023 – Initial steps taken by Okta to ameliorate the problem – Compromised service account is disabled and its sessions are revoked. Sessions embedded in HAR files downloaded by threat actor
October 18, 2023 – Okta Security notifies a fourth customer that their data has been compromised
October 19, 2023 – Additional threat actor activity is noticed and Okta revokes more sessions embedded in HAR files downloaded by the hackers
October 19, 2023 – This is also the day Okta announces to all customers that its security had been compromised
October 20, 2023 – The first blog post about the incident (referenced earlier in this paper) is released to the public
Late October through November 2023 – Deeper dive investigations uncover the full scope and broad consequences of the breach. Additional companies are informed and told they should adopt enhanced security measures
November 2023 – Okta releases more detailed information about the breach and confirms that more reports and support cases had been penetrated by the hackers including contact details for all Okta certified users across all customers.
December 2023 – Okta discloses the hackers had successfully downloaded reports including names and emails of all Okta customer support systems users. They warn the information would likely be used to mount phishing attacks.

LONGER TERM CONSEQUENCES​

The long-term consequences of this particularly damaging breach will continue to unfold in the months and years to come. One of the most devastating ramifications of the exposure of so many names, emails, positions and employment data points is the ongoing use and utilization of this information to craft social engineering attacks on all of the organizations whose data was revealed in the initial breach.
According to research produced by University of California Los Angeles (UCLA), the human element was involved in 82% of all breaches analyzed over the last 12 months. There is projected to be one ransomware attack occurring every 11 seconds and by 2025, cybercrime is estimated to reach $10 trillion per year. All three of these statistics are largely enabled by the application of phishing strategies utilizing context clues gathered via the collection of stolen PII from breaches like the Okta breach. What makes Okta’s example more problematic than most is the fact that the data revealed is explicitly related to the cybersecurity practices and protocols of many of the InfoSec industry’s top players.
It is worth noting at this juncture that the names, emails and job roles of those compromised in the Okta attack are likely to be used in conjunction with other PII and specific details about would-be targets. This information is skillfully gleaned by threat actors from numerous sources of unsecured external data. Exploiting external data privacy weakness is the most effective method used by threat actors to craft super-convincing phishing and other social engineering attacks against highly targeted professionals and leaders withing target organizations.
It can be said with a high degree of certainty that threat actors are already building dossiers on the key individuals within the organizations they’re targeting. Using the data stolen from Okta as well as other stolen data and data lawfully obtained from unsecured sources such as public records, data broker companies, people search sites and unrestricted social media sites, detailed profiles are being devised and used to mount exceptionally specific phishing attacks. Further victimizing those who already suffered exposure in this breach and further threatening the health and survival of their respective organizations.
It remains to be seen if Okta’s share price and reputation will ever fully rebound from the damage it sustained as a result of this pernicious attack.

HOW EXTERNAL DATA PRIVACY MANAGEMENT COULD HAVE PREVENTED THIS ATTACK​

In the aftermath of a breach like the Okta breach and the security-centric focus of its many customers/victims, affected individuals – personally and professionally – must now embrace proactive steps to prevent being the next target of threat actors. Even if your organization wasn’t one of the growing list of organizations impacted by the Okta breach (or its customers 1Password, BeyondTrust, and the rest) the chances are high that hackers using the data exposed by this attack will target you next. Although there is no way to fully eliminate the threat, the very best thing one can do to make oneself far less likely to be victimized again is to beef up external data privacy.
Avoiding social engineering attacks and the resulting data breaches depends on securing external data privacy. This means scrubbing the external data of all relevant employees (both internal and third party) from the many sources of PII available. Continuity of engagement when securing external data is the key to being able to quickly remediate any unauthorized data exfiltration. Getting ahead of the hackers and threat actors means removing identifiable information that can be used to generate phishing and other scams from hundreds of data brokers, people search sites and public data sources so that if and when these data are released, they are conspicuous and more quickly removed. Having such practices and processes in place may sound like an insurmountable task. But it is achievable, and it is truly the only way to protect against falling victim. Privacy Bee for Business is a leader in delivering EDP management solutions that are proven effective at reducing the digital attack surface and adding the necessary data privacy layer of protection atop the rest of the traditional information security practices already widely in use.
It is recommended that all organizations avail themselves of these easy to deploy scans and metrics to determine their existing level of vulnerability when it comes to EDP management.
Privacy Bee’s Employee Risk Management (ERM) is an easy but powerful way to get visibility into your External Data Privacy risk. After just a few minutes to load and configure your employees (usually an exported CSV from your HCM software), Privacy Bee automatically begins scanning hundreds of external sources, searching for any exposed privacy risks on each employee. Any discoveries are flagged as an exposure and affect that person’s aggregated Privacy Risk Score.
ERM helps quickly paint a full picture of an organization’s real-time cyber risk from external privacy exposures. This privacy intelligence platform is 100% free for all businesses, powered by Privacy Bee.
Privacy Bee’s External Data Privacy Audit another web-based privacy app for quickly and easily scanning employees PII exposure. This tool set lets you build an extensive audit, identifying privacy exposures and vulnerabilities, then extrapolates potential financial impact across your company. It’s a critical view into risk assessment, operational inefficiencies, emerging cyber risk, and External Data Privacy Management.
The EDPA provides unified employee audits, bringing together real-time dark web monitoring with 24/7 active clear web monitoring (Data Brokers, People Search Sites, paste sites, and more). Delivering a centralized view into public employee exposures, and insight into the tangible financial impact it has within your organization.
Privacy Bee’s Vendor Risk Management (VRM) extends the privacy bubble to targets outside your organization but who may have a degree of access to your sensitive information systems – including software providers and/or contract development resources. This solution evaluates all your vendor/partner organizations for Electronic Data Privacy risks. It then reports simple Privacy Risk Scores on each company, highlighting each vendor’s risk at a glance. Analytics further break vendors down by department, risk tier, and more, with all thresholds fully customizable. While most vendor risk software stops at the report, Privacy Bee VRM keeps going, offering to work with all your 3rd party vendors 1-on-1 to decrease their vulnerabilities, effectively de-risking your company.
While all these (and other) audits and monitoring services are for use at no cost, removing employee PII from all unsafe locations on the net is what reduces the risk and the attack surface. While this is a function your organization could take on as an internal activity, most organizations prefer to outsource the removal service for your employees and vendors identified as at risk to Privacy Bee. Privacy Bee has teams of experts working 24x7x365 to scrub client employees’ PII from all unsafe corners of the internet.
Putting EDP solutions like these in place does more to protect against being victimized by threat actors from the outset. And while they are useful as a restorative, to clean up the messes after a breach has occurred, it is best to deploy them from the outset so as to avoid becoming the next high-profile victim.
Speak with Privacy Bee to discuss the External Data Privacy Management at your company.
 
Only loosely related to LTT, MKBHD is having some small drama right now.

1727182476269.png

For $12 a month you can have a rebranded wallpaper app.
1727182545564.png

People on twitter arent happy, and its a bit of a misstep for someone as clean and corporate as MKBHD
1727182646816.png1727182692297.png
 
Last edited:
Only loosely related to LTT, MKBHD is having some small drama right now.

View attachment 6449862

For $12 a month you can have a rebranded wallpaper app.
View attachment 6449866

People on twitter arent happy, and its a bit of a misstep for someone has clean and corporate as MKBHD
View attachment 6449870View attachment 6449875
I cannot for the life of me imagine downloading a wallpaper app. Then again, I can’t imagine raising a big Twitter stink over a YouTuber making one, either.
 
I cannot for the life of me imagine downloading a wallpaper app. Then again, I can’t imagine raising a big Twitter stink over a YouTuber making one, either.
Who even needs to change their wallpaper that much? You only see it in the middle ground between hitting the display button, and getting onto whatever app you came here for, or the split second time check. I can't imagine being conceited enough to think you're being shoulder surfed so attentively by everyone all the time that you need to constantly have a fresh new "cool" wallpaper. If it was a free app that just randomized your wallpaper from a folder you loaded then at least I could see a modest novelty use case, but paid with subscription services? What the fuck.

I've been using the same wallpaper for like 3 phones now, nobody cares that much. I guarantee you they don't care to the tune of fifty bucks a year. You'd get better dollar value doing pulls in a gacha game.
 
MKB says he's doing it for the artists, and to support the artists who have worked for him. There's many great works on there like orange rectangles, blatant copies of DC logos and such, all claiming copyright 2024 to MKB and his people.

He cares about the artists so much that he's paying them half of the profits - so after taking away 30% for Apple/Google, you've got to halve that again for MKBs cut. So on $50/y, this app to support artists pays out $17.50 I think split amongst all the artists. MKB then pockets $17.50 himself (let's say $15 after hosting costs etc). What a great guy!

On top of that, the tech youtuber couldn't even secure his premium wallpapers. If you get the direct URL to the wallpaper, you can open it in any normal browser.

lol
 

Attachments

  • AstroWithBeef[a].jpg
    AstroWithBeef[a].jpg
    261.3 KB · Views: 27
  • blurry~flowers~2.jpg
    blurry~flowers~2.jpg
    2.1 MB · Views: 27
  • Flowers~2.jpg
    Flowers~2.jpg
    176.6 KB · Views: 27
  • Fluo.jpg
    Fluo.jpg
    2.9 MB · Views: 9
  • Forest~Oracle~II.jpg
    Forest~Oracle~II.jpg
    3.6 MB · Views: 26
  • Fuzz.jpg
    Fuzz.jpg
    538 KB · Views: 35
  • In~Flight.jpg
    In~Flight.jpg
    8.1 MB · Views: 17
  • Astro_7.jpg
    Astro_7.jpg
    1.6 MB · Views: 15
  • Astro_2.jpg
    Astro_2.jpg
    1 MB · Views: 25
  • AdamM~Pixelized~KOII1.jpg
    AdamM~Pixelized~KOII1.jpg
    157.9 KB · Views: 26
  • Astro_10.jpg
    Astro_10.jpg
    2.5 MB · Views: 11
  • Dune_10.jpg
    Dune_10.jpg
    2.4 MB · Views: 15
  • Lava~Cakes.jpg
    Lava~Cakes.jpg
    2.9 MB · Views: 22
  • Mystic~Beach.jpg
    Mystic~Beach.jpg
    4.2 MB · Views: 10
  • 01.jpg
    01.jpg
    709.8 KB · Views: 18
  • abstract~world.jpg
    abstract~world.jpg
    786.2 KB · Views: 18
  • AdamM~Pixelized~Key1.jpg
    AdamM~Pixelized~Key1.jpg
    110 KB · Views: 19
  • Large~Sir.jpg
    Large~Sir.jpg
    675.9 KB · Views: 20
  • Pelican.jpg
    Pelican.jpg
    412 KB · Views: 22
  • Royal~Sunrise.jpg
    Royal~Sunrise.jpg
    1.9 MB · Views: 9
  • This~Bloody~Thing.jpg
    This~Bloody~Thing.jpg
    1.1 MB · Views: 21
  • Touch~Grass.jpg
    Touch~Grass.jpg
    840.1 KB · Views: 25
  • Watchful~Eye.jpg
    Watchful~Eye.jpg
    4.5 MB · Views: 21
  • 12.jpg
    12.jpg
    648.7 KB · Views: 22
  • Athena.jpg
    Athena.jpg
    1.6 MB · Views: 21
  • Fire.jpg
    Fire.jpg
    1.5 MB · Views: 14
  • japan~power.jpg
    japan~power.jpg
    816.6 KB · Views: 21
  • Lavish.jpg
    Lavish.jpg
    735.3 KB · Views: 20
  • Little~Lane.jpg
    Little~Lane.jpg
    4.3 MB · Views: 18
  • Midnight~Watch.jpg
    Midnight~Watch.jpg
    1.1 MB · Views: 16
  • Of~Release.jpg
    Of~Release.jpg
    1.1 MB · Views: 14
  • queen~of~heart~2.jpg
    queen~of~heart~2.jpg
    1 MB · Views: 13
  • Red_Eye.jpg
    Red_Eye.jpg
    443 KB · Views: 12
  • Scarabian~II.jpg
    Scarabian~II.jpg
    971.1 KB · Views: 16
  • Touch.jpg
    Touch.jpg
    880.3 KB · Views: 16
  • wallpaper~2.jpg
    wallpaper~2.jpg
    583.3 KB · Views: 12
  • Witch.jpg
    Witch.jpg
    3.3 MB · Views: 11
  • Acrylic~11.jpg
    Acrylic~11.jpg
    2.2 MB · Views: 14
  • Highway~1.jpg
    Highway~1.jpg
    2.4 MB · Views: 11
  • Lovely~Lumps.jpg
    Lovely~Lumps.jpg
    1.7 MB · Views: 16
  • Nocturne.jpg
    Nocturne.jpg
    1,008.4 KB · Views: 15
  • plants~and~flowers.jpg
    plants~and~flowers.jpg
    1.5 MB · Views: 13
  • Rasp.jpg
    Rasp.jpg
    562.2 KB · Views: 12
  • Spores~II.jpg
    Spores~II.jpg
    2.3 MB · Views: 9
  • Ugly_V.jpg
    Ugly_V.jpg
    1.6 MB · Views: 10
  • wallpaper~3.jpg
    wallpaper~3.jpg
    1.4 MB · Views: 11
  • Be_Cool.jpg
    Be_Cool.jpg
    1.4 MB · Views: 13
  • Crash.jpg
    Crash.jpg
    3.4 MB · Views: 10
  • Dune_12.jpg
    Dune_12.jpg
    2.9 MB · Views: 13
  • Halation.jpg
    Halation.jpg
    1.8 MB · Views: 5
  • Heliocentric.jpg
    Heliocentric.jpg
    812.3 KB · Views: 13
  • Kitsune.jpg
    Kitsune.jpg
    1.4 MB · Views: 17
  • Organic~2.jpg
    Organic~2.jpg
    610.7 KB · Views: 12
  • Patience.jpg
    Patience.jpg
    946.1 KB · Views: 10
  • Ring_Pop.jpg
    Ring_Pop.jpg
    488.8 KB · Views: 11
  • Sasha.jpg
    Sasha.jpg
    421 KB · Views: 7
  • wallpaper~15.jpg
    wallpaper~15.jpg
    662.1 KB · Views: 7
  • Wonderstone.jpg
    Wonderstone.jpg
    621.9 KB · Views: 11
  • Acrylic~4.jpg
    Acrylic~4.jpg
    1.1 MB · Views: 13
  • Art~Nouveau~1.jpg
    Art~Nouveau~1.jpg
    1.7 MB · Views: 6
  • Ascension.jpg
    Ascension.jpg
    519.6 KB · Views: 14
  • Caustics~Hex~2.jpg
    Caustics~Hex~2.jpg
    1.2 MB · Views: 12
  • Cliffs.jpg
    Cliffs.jpg
    1.3 MB · Views: 10
  • Dune_4.jpg
    Dune_4.jpg
    918.5 KB · Views: 11
  • Menta~Latte.jpg
    Menta~Latte.jpg
    530.1 KB · Views: 10
  • Munky.jpg
    Munky.jpg
    835.8 KB · Views: 11
  • Organic~1.jpg
    Organic~1.jpg
    744.4 KB · Views: 14
  • Seaside.jpg
    Seaside.jpg
    2.6 MB · Views: 5
  • Totem.jpg
    Totem.jpg
    451.1 KB · Views: 13
  • Weekender.jpg
    Weekender.jpg
    526.6 KB · Views: 10
  • Acrylic~7.jpg
    Acrylic~7.jpg
    963.2 KB · Views: 10
  • Beachly.jpg
    Beachly.jpg
    2 MB · Views: 8
  • Dragon's~Lily~Pad.jpg
    Dragon's~Lily~Pad.jpg
    3.3 MB · Views: 11
  • Liberty~4K.jpg
    Liberty~4K.jpg
    468.7 KB · Views: 9
  • Ice~and~Sand.jpg
    Ice~and~Sand.jpg
    4.1 MB · Views: 5
  • NZ2_SE_1.jpg
    NZ2_SE_1.jpg
    1.1 MB · Views: 15
  • Teal.jpg
    Teal.jpg
    534.1 KB · Views: 14
  • 08.jpg
    08.jpg
    512.8 KB · Views: 11
  • 13.jpg
    13.jpg
    1 MB · Views: 10
  • City~Hall~4K.jpg
    City~Hall~4K.jpg
    891.9 KB · Views: 15
  • Drama_II.jpg
    Drama_II.jpg
    1.8 MB · Views: 12
  • Drama_X.jpg
    Drama_X.jpg
    945.5 KB · Views: 10
  • Flower~Field~2.jpg
    Flower~Field~2.jpg
    1.6 MB · Views: 14
  • Light[a].jpg
    Light[a].jpg
    227 KB · Views: 14
  • Maybe~We~Are~Fine.jpg
    Maybe~We~Are~Fine.jpg
    630.8 KB · Views: 13
  • Orange.jpg
    Orange.jpg
    748.8 KB · Views: 14
  • Rowhome~44~4K.jpg
    Rowhome~44~4K.jpg
    1.2 MB · Views: 13
  • Stealth.jpg
    Stealth.jpg
    422 KB · Views: 14
  • Art~Nouveau~3.jpg
    Art~Nouveau~3.jpg
    519.1 KB · Views: 13
  • Ashore.jpg
    Ashore.jpg
    1.5 MB · Views: 11
  • Be_Sweet.jpg
    Be_Sweet.jpg
    601.6 KB · Views: 13
  • Dune_9.jpg
    Dune_9.jpg
    3.4 MB · Views: 4
  • Gasoline.jpg
    Gasoline.jpg
    3 MB · Views: 8
  • Kansas~City~Power~and~Light~4K.jpg
    Kansas~City~Power~and~Light~4K.jpg
    784.9 KB · Views: 9
  • More~Than~Human.jpg
    More~Than~Human.jpg
    1.2 MB · Views: 12
  • Rhymes~with~Orange.jpg
    Rhymes~with~Orange.jpg
    1.5 MB · Views: 12
  • Siege.jpg
    Siege.jpg
    608 KB · Views: 11
  • Snow~Town.jpg
    Snow~Town.jpg
    474.7 KB · Views: 8
  • Warm~Sound.jpg
    Warm~Sound.jpg
    552.4 KB · Views: 9
  • Against~Wonder~II.jpg
    Against~Wonder~II.jpg
    1.7 MB · Views: 10
  • Pineapple~Pasture.jpg
    Pineapple~Pasture.jpg
    2.8 MB · Views: 13
  • 93~Penobscot~Building~4k.jpg
    93~Penobscot~Building~4k.jpg
    770.9 KB · Views: 13
  • Brunch.jpg
    Brunch.jpg
    667.2 KB · Views: 12
  • Festive~Phone~Wallpaper~2.jpg
    Festive~Phone~Wallpaper~2.jpg
    170.2 KB · Views: 9
  • Masked.jpg
    Masked.jpg
    1.9 MB · Views: 11
  • Maybe,~Maybe,~Maybe.jpg
    Maybe,~Maybe,~Maybe.jpg
    931.8 KB · Views: 9
  • Seasons~Greetings.jpg
    Seasons~Greetings.jpg
    4.4 MB · Views: 7
  • Traveller.jpg
    Traveller.jpg
    1.9 MB · Views: 4
  • wallpaper~6.jpg
    wallpaper~6.jpg
    1 MB · Views: 5
  • 40_Lux.jpg
    40_Lux.jpg
    501.5 KB · Views: 12
  • AdamM~Pixelized~KOII2.jpg
    AdamM~Pixelized~KOII2.jpg
    157.7 KB · Views: 12
  • Bloomer.jpg
    Bloomer.jpg
    1 MB · Views: 12
  • chevalier.jpg
    chevalier.jpg
    658.2 KB · Views: 8
  • Dark_7.jpg
    Dark_7.jpg
    8 MB · Views: 6
  • Do~You~See~Me.jpg
    Do~You~See~Me.jpg
    1.3 MB · Views: 10
  • Dune_2.jpg
    Dune_2.jpg
    398.3 KB · Views: 8
  • Festive~Phone~Wallpaper~1.jpg
    Festive~Phone~Wallpaper~1.jpg
    175.9 KB · Views: 7
  • look_out.jpg
    look_out.jpg
    641.9 KB · Views: 9
  • Marigold~Garden.jpg
    Marigold~Garden.jpg
    2.8 MB · Views: 8
  • Melted~Halloween.jpg
    Melted~Halloween.jpg
    3.5 MB · Views: 8
  • Power~Lines.jpg
    Power~Lines.jpg
    4.4 MB · Views: 6
  • San~Francisco~~4K.jpg
    San~Francisco~~4K.jpg
    1,016.2 KB · Views: 10
  • Softbox~II.jpg
    Softbox~II.jpg
    875.6 KB · Views: 10
  • Tiers.jpg
    Tiers.jpg
    274.4 KB · Views: 7
  • Turbine.jpg
    Turbine.jpg
    835.1 KB · Views: 9
  • 07.jpg
    07.jpg
    487.1 KB · Views: 10
  • 09.jpg
    09.jpg
    471.5 KB · Views: 12
  • 121~Bolluck~s~Wilshire~4k.jpg
    121~Bolluck~s~Wilshire~4k.jpg
    817.6 KB · Views: 10
  • A~Meditation~II.jpg
    A~Meditation~II.jpg
    1.4 MB · Views: 11
  • Beach[a].jpg
    Beach[a].jpg
    1.9 MB · Views: 9
  • Bloom.jpg
    Bloom.jpg
    621.1 KB · Views: 9
  • Brute.jpg
    Brute.jpg
    878.2 KB · Views: 9
  • Drama.jpg
    Drama.jpg
    1.1 MB · Views: 11
  • Dune_13.jpg
    Dune_13.jpg
    2.4 MB · Views: 8
  • Grump_II.jpg
    Grump_II.jpg
    339.5 KB · Views: 10
  • Organic~3.jpg
    Organic~3.jpg
    596.8 KB · Views: 9
  • Round~One.jpg
    Round~One.jpg
    505.6 KB · Views: 7
  • Rowhome~65~4K.jpg
    Rowhome~65~4K.jpg
    1.2 MB · Views: 7
  • Rudy.jpg
    Rudy.jpg
    453.2 KB · Views: 6
  • Shokunin.jpg
    Shokunin.jpg
    509.5 KB · Views: 8
  • suspicious.jpg
    suspicious.jpg
    839.8 KB · Views: 8
  • Texas.jpg
    Texas.jpg
    386.9 KB · Views: 9
  • To_Dust.jpg
    To_Dust.jpg
    2.6 MB · Views: 10
  • Wolf.jpg
    Wolf.jpg
    324.8 KB · Views: 12
  • 04.jpg
    04.jpg
    931.8 KB · Views: 12
  • AdamM~Pixelized~KOII3.jpg
    AdamM~Pixelized~KOII3.jpg
    157 KB · Views: 12
  • AstroAway[a].jpg
    AstroAway[a].jpg
    383.2 KB · Views: 10
  • Autumnatik.jpg
    Autumnatik.jpg
    318.1 KB · Views: 10
  • Bankrupt!.jpg
    Bankrupt!.jpg
    703.5 KB · Views: 9
  • Bribery.jpg
    Bribery.jpg
    568.3 KB · Views: 9
  • CanyonDay.jpg
    CanyonDay.jpg
    963.8 KB · Views: 9
  • Dune_18.jpg
    Dune_18.jpg
    1.1 MB · Views: 11
  • Hacienda~III.jpg
    Hacienda~III.jpg
    295.5 KB · Views: 10
  • let~it~happen.jpg
    let~it~happen.jpg
    988.4 KB · Views: 10
  • Of~Encore.jpg
    Of~Encore.jpg
    1.2 MB · Views: 8
  • Palace.jpg
    Palace.jpg
    715.2 KB · Views: 7
  • RedRocksMorning.jpg
    RedRocksMorning.jpg
    1.9 MB · Views: 11
  • Rollin.jpg
    Rollin.jpg
    575.4 KB · Views: 9
  • Sleep.jpg
    Sleep.jpg
    772.6 KB · Views: 4
  • Turbo~Mode.jpg
    Turbo~Mode.jpg
    291.3 KB · Views: 11
  • 66~Foshay~4k.jpg
    66~Foshay~4k.jpg
    844.6 KB · Views: 12
  • 70_Pine.jpg
    70_Pine.jpg
    856.3 KB · Views: 14
  • Acrylic~5.jpg
    Acrylic~5.jpg
    1.2 MB · Views: 11
  • Alaska~SE~1.jpg
    Alaska~SE~1.jpg
    863.3 KB · Views: 11
  • Dune_11.jpg
    Dune_11.jpg
    2.6 MB · Views: 5
  • Leombre.jpg
    Leombre.jpg
    1.6 MB · Views: 8
  • NZ_SE_1.jpg
    NZ_SE_1.jpg
    918.1 KB · Views: 9
  • Of~Balance.jpg
    Of~Balance.jpg
    1.1 MB · Views: 9
  • Vault.jpg
    Vault.jpg
    495.7 KB · Views: 8
  • Veins_II.jpg
    Veins_II.jpg
    3.3 MB · Views: 8
  • Walking (2).jpg
    Walking (2).jpg
    7.2 MB · Views: 5
  • wallpaper~22.jpg
    wallpaper~22.jpg
    371.3 KB · Views: 9
  • 22_Coda.jpg
    22_Coda.jpg
    877.7 KB · Views: 9
  • Astro_3.jpg
    Astro_3.jpg
    2.9 MB · Views: 7
  • Citrus~Rings.jpg
    Citrus~Rings.jpg
    2.8 MB · Views: 8
  • Dark_10.jpg
    Dark_10.jpg
    4.9 MB · Views: 8
  • Flowers~4.jpg
    Flowers~4.jpg
    172.4 KB · Views: 5
  • Snowy~Mountain~A.jpg
    Snowy~Mountain~A.jpg
    2.3 MB · Views: 7
  • Spring~II.jpg
    Spring~II.jpg
    584.8 KB · Views: 8
  • Synth.jpg
    Synth.jpg
    3.3 MB · Views: 5
  • Between~Us.jpg
    Between~Us.jpg
    1 MB · Views: 9
  • Colorado~SE~1.jpg
    Colorado~SE~1.jpg
    733.2 KB · Views: 10
  • Coral_4.jpg
    Coral_4.jpg
    362.4 KB · Views: 9
  • More~Than~Human~3.jpg
    More~Than~Human~3.jpg
    900.4 KB · Views: 9
  • Of~Horror.jpg
    Of~Horror.jpg
    1.5 MB · Views: 9
  • Rowhome~30~4K.jpg
    Rowhome~30~4K.jpg
    928.7 KB · Views: 8
  • Startle.jpg
    Startle.jpg
    551.8 KB · Views: 9
  • AdamM~Pixelized~Key2.jpg
    AdamM~Pixelized~Key2.jpg
    109.6 KB · Views: 8
  • Astro_14.jpg
    Astro_14.jpg
    3.5 MB · Views: 6
  • Byakko.jpg
    Byakko.jpg
    1.6 MB · Views: 7
  • CanyonMorning.jpg
    CanyonMorning.jpg
    534.1 KB · Views: 8
  • Clouds.jpg
    Clouds.jpg
    1.5 MB · Views: 7
  • Hacienda~II.jpg
    Hacienda~II.jpg
    325.4 KB · Views: 10
  • Migraine~Aura.jpg
    Migraine~Aura.jpg
    1.7 MB · Views: 8
  • NZ3_SE_1.jpg
    NZ3_SE_1.jpg
    541.9 KB · Views: 12
  • Of~Inertia.jpg
    Of~Inertia.jpg
    917.1 KB · Views: 9
  • Pigeon~Party~2.jpg
    Pigeon~Party~2.jpg
    6.4 MB · Views: 6
  • Rowhome~8~4K.jpg
    Rowhome~8~4K.jpg
    1.2 MB · Views: 10
  • Squeakum.jpg
    Squeakum.jpg
    283.3 KB · Views: 8
  • Warmer.jpg
    Warmer.jpg
    1.4 MB · Views: 8
  • And.jpg
    And.jpg
    678.5 KB · Views: 7
  • Leomina.jpg
    Leomina.jpg
    1.7 MB · Views: 7
  • Pasted~Phone~Wallpaper~3.jpg
    Pasted~Phone~Wallpaper~3.jpg
    757.3 KB · Views: 10
  • Rasp_II.jpg
    Rasp_II.jpg
    249.6 KB · Views: 10
  • Scarlet~Echo.jpg
    Scarlet~Echo.jpg
    1.6 MB · Views: 7
  • Canopy.jpg
    Canopy.jpg
    873.5 KB · Views: 8
  • Division~II.jpg
    Division~II.jpg
    541 KB · Views: 7
  • Edges.jpg
    Edges.jpg
    663.6 KB · Views: 8
  • Hills[a].jpg
    Hills[a].jpg
    1.8 MB · Views: 6
  • Iceland~Mountains.jpg
    Iceland~Mountains.jpg
    5.2 MB · Views: 4
  • life~in~a~pot.jpg
    life~in~a~pot.jpg
    539.5 KB · Views: 9
  • Mint[a].jpg
    Mint[a].jpg
    1.7 MB · Views: 10
  • Of~Growth.jpg
    Of~Growth.jpg
    1.1 MB · Views: 7
  • Pasted~Phone~Wallpaper~1.jpg
    Pasted~Phone~Wallpaper~1.jpg
    826.3 KB · Views: 8
  • Robot~Rock.jpg
    Robot~Rock.jpg
    1,018.8 KB · Views: 7
  • Spores.jpg
    Spores.jpg
    1.7 MB · Views: 9
  • Airport.jpg
    Airport.jpg
    679.4 KB · Views: 14
  • Astro_1.jpg
    Astro_1.jpg
    448 KB · Views: 12
  • Blueberry~Sky.jpg
    Blueberry~Sky.jpg
    820.1 KB · Views: 14
  • blurry~flowers~1.jpg
    blurry~flowers~1.jpg
    1.7 MB · Views: 8
  • Curved~Earth.jpg
    Curved~Earth.jpg
    279.8 KB · Views: 9
  • Getty.jpg
    Getty.jpg
    1.3 MB · Views: 9
  • Metal~Sand~4.jpg
    Metal~Sand~4.jpg
    1.6 MB · Views: 9
  • Murmur.jpg
    Murmur.jpg
    566.7 KB · Views: 10
  • Pigeon~Party.jpg
    Pigeon~Party.jpg
    7.9 MB · Views: 4
  • 1~Thousand~Miles.jpg
    1~Thousand~Miles.jpg
    965 KB · Views: 11
  • 400_Lux.jpg
    400_Lux.jpg
    591.7 KB · Views: 9
  • Alien~Face.jpg
    Alien~Face.jpg
    1.8 MB · Views: 9
  • Aztec.jpg
    Aztec.jpg
    520 KB · Views: 7
  • Basilica~4K.jpg
    Basilica~4K.jpg
    488.2 KB · Views: 9
  • Bigscreen.jpg
    Bigscreen.jpg
    718.1 KB · Views: 9
  • CubesLight[a].jpg
    CubesLight[a].jpg
    480 KB · Views: 7
  • Drama_XI.jpg
    Drama_XI.jpg
    953.1 KB · Views: 8
  • Maybe~All~Is~Well.jpg
    Maybe~All~Is~Well.jpg
    735.9 KB · Views: 7
  • Softbox~III.jpg
    Softbox~III.jpg
    389.2 KB · Views: 7
  • Spells.jpg
    Spells.jpg
    1.4 MB · Views: 8
  • wallpaper~8.jpg
    wallpaper~8.jpg
    526.3 KB · Views: 10
  • 4x5~Morning.jpg
    4x5~Morning.jpg
    6 MB · Views: 7
  • Apterture~II.jpg
    Apterture~II.jpg
    911.2 KB · Views: 8
  • chaos.jpg
    chaos.jpg
    950.3 KB · Views: 9
  • Cloth~Red.jpg
    Cloth~Red.jpg
    301.2 KB · Views: 11
  • Emergency!.jpg
    Emergency!.jpg
    262.7 KB · Views: 9
  • Gateway.jpg
    Gateway.jpg
    1.2 MB · Views: 10
  • Hornet~Eyes.jpg
    Hornet~Eyes.jpg
    3.2 MB · Views: 8
  • Monaco.jpg
    Monaco.jpg
    856.3 KB · Views: 11
  • pattern~of~france.jpg
    pattern~of~france.jpg
    1 MB · Views: 6
  • Santa~Cruz~Morning.jpg
    Santa~Cruz~Morning.jpg
    653.5 KB · Views: 7
  • Thick~As~Thieves.jpg
    Thick~As~Thieves.jpg
    1.3 MB · Views: 8
  • Waterfall.jpg
    Waterfall.jpg
    1 MB · Views: 8
  • And~Then~The~Night.jpg
    And~Then~The~Night.jpg
    884 KB · Views: 8
  • Big~Smile.jpg
    Big~Smile.jpg
    1.3 MB · Views: 8
  • Caustics~Hex.jpg
    Caustics~Hex.jpg
    1.1 MB · Views: 10
  • Cloth~Pearl.jpg
    Cloth~Pearl.jpg
    871.7 KB · Views: 9
  • Effort.jpg
    Effort.jpg
    7.6 MB · Views: 6
  • Look_up.jpg
    Look_up.jpg
    5.7 MB · Views: 3
  • Rain~(AI).jpg
    Rain~(AI).jpg
    428.4 KB · Views: 10
  • Tetra.jpg
    Tetra.jpg
    839 KB · Views: 8
  • Acrylic~10.jpg
    Acrylic~10.jpg
    524.7 KB · Views: 10
  • Aphrodite.jpg
    Aphrodite.jpg
    1.6 MB · Views: 8
  • Byakko~II.jpg
    Byakko~II.jpg
    2 MB · Views: 8
  • Dune_5.jpg
    Dune_5.jpg
    7 MB · Views: 6
  • 03.jpg
    03.jpg
    784.9 KB · Views: 10
  • Chisel.jpg
    Chisel.jpg
    567.6 KB · Views: 9
  • Heliocentric~IV.jpg
    Heliocentric~IV.jpg
    832.6 KB · Views: 10
  • Megatron~Light.jpg
    Megatron~Light.jpg
    462.1 KB · Views: 11
  • Timeless.jpg
    Timeless.jpg
    2.3 MB · Views: 6
  • Dazed.jpg
    Dazed.jpg
    5.4 MB · Views: 6
  • Gallop.jpg
    Gallop.jpg
    368.5 KB · Views: 9
  • Home.jpg
    Home.jpg
    5.7 MB · Views: 6
  • Metal~Sand~3.jpg
    Metal~Sand~3.jpg
    1.5 MB · Views: 8
  • Rockette.jpg
    Rockette.jpg
    402.5 KB · Views: 11
  • 06.jpg
    06.jpg
    770 KB · Views: 7
  • 51~Eastern~Columbia~Building~4k.jpg
    51~Eastern~Columbia~Building~4k.jpg
    1.1 MB · Views: 7
  • Acrylic~3.jpg
    Acrylic~3.jpg
    2.6 MB · Views: 9
  • AdamM~Pixelized~Key3.jpg
    AdamM~Pixelized~Key3.jpg
    109.5 KB · Views: 16
  • Art~Nouveau~2.jpg
    Art~Nouveau~2.jpg
    1,010.9 KB · Views: 12
  • Canary~Yellow.jpg
    Canary~Yellow.jpg
    2.6 MB · Views: 10
  • Coral_2.jpg
    Coral_2.jpg
    510.3 KB · Views: 8
  • Coral_5.jpg
    Coral_5.jpg
    386.9 KB · Views: 10
  • Dark_12.jpg
    Dark_12.jpg
    3.5 MB · Views: 4
  • Dune_16.jpg
    Dune_16.jpg
    2 MB · Views: 8
  • Flowers~3.jpg
    Flowers~3.jpg
    278.9 KB · Views: 12
  • Isolate.jpg
    Isolate.jpg
    6.7 MB · Views: 12
  • Of_Grace.jpg
    Of_Grace.jpg
    1.1 MB · Views: 11
  • Pasted~Phone~Wallpaper~2.jpg
    Pasted~Phone~Wallpaper~2.jpg
    729.3 KB · Views: 11
  • Ringo.jpg
    Ringo.jpg
    289.1 KB · Views: 7
  • Roller~Mobster.jpg
    Roller~Mobster.jpg
    616.5 KB · Views: 6
  • Rowhome~1~4K.jpg
    Rowhome~1~4K.jpg
    666.4 KB · Views: 6
  • Rowhome~38~4K.jpg
    Rowhome~38~4K.jpg
    954.4 KB · Views: 5
  • Rowhome~41~4K.jpg
    Rowhome~41~4K.jpg
    879.8 KB · Views: 8
  • Royale.jpg
    Royale.jpg
    454.5 KB · Views: 9
  • Shredlord~Must~Die.jpg
    Shredlord~Must~Die.jpg
    1.2 MB · Views: 10
  • Shutter.jpg
    Shutter.jpg
    1.4 MB · Views: 7
  • Stark.jpg
    Stark.jpg
    691.8 KB · Views: 6
  • Tower.jpg
    Tower.jpg
    737.7 KB · Views: 8
  • VB.jpg
    VB.jpg
    761.8 KB · Views: 10
  • 05.jpg
    05.jpg
    885.2 KB · Views: 7
  • 10.jpg
    10.jpg
    566.8 KB · Views: 9
  • 11.jpg
    11.jpg
    600.2 KB · Views: 7
  • 112~AIU~Citadel~(AKA~LeVeque~Tower)~4k.jpg
    112~AIU~Citadel~(AKA~LeVeque~Tower)~4k.jpg
    901.6 KB · Views: 13
  • Acrylic~9.jpg
    Acrylic~9.jpg
    1 MB · Views: 11
  • Astro_15.jpg
    Astro_15.jpg
    1 MB · Views: 11
  • Cathedral.jpg
    Cathedral.jpg
    2.7 MB · Views: 12
  • Clay.jpg
    Clay.jpg
    206.6 KB · Views: 10
  • Colony~II.jpg
    Colony~II.jpg
    747 KB · Views: 9
  • Dune_8.jpg
    Dune_8.jpg
    189.4 KB · Views: 9
  • Dune_15.jpg
    Dune_15.jpg
    3 MB · Views: 6
  • Festive~Phone~Wallpaper~3.jpg
    Festive~Phone~Wallpaper~3.jpg
    157.3 KB · Views: 8
  • Flowers~5~Dark.jpg
    Flowers~5~Dark.jpg
    367.7 KB · Views: 7
  • Fluffy~Nasties.jpg
    Fluffy~Nasties.jpg
    7.8 MB · Views: 7
  • Green~Goblin.jpg
    Green~Goblin.jpg
    1.9 MB · Views: 7
  • in~the~countryside.jpg
    in~the~countryside.jpg
    902.2 KB · Views: 10
  • More~Than~Human~2.jpg
    More~Than~Human~2.jpg
    973.6 KB · Views: 8
  • Needle~4K.jpg
    Needle~4K.jpg
    730.1 KB · Views: 9
  • Noreaster.jpg
    Noreaster.jpg
    420.1 KB · Views: 9
  • Of_Lux.jpg
    Of_Lux.jpg
    1.4 MB · Views: 9
  • Pyrogram.jpg
    Pyrogram.jpg
    559.7 KB · Views: 6
  • Salton~Sea.jpg
    Salton~Sea.jpg
    4.6 MB · Views: 6
  • Terra~Orba.jpg
    Terra~Orba.jpg
    531.5 KB · Views: 8
  • Tug~Boat~4K.jpg
    Tug~Boat~4K.jpg
    517.8 KB · Views: 10
  • wallpaper~36.jpg
    wallpaper~36.jpg
    815.8 KB · Views: 7
  • 02.jpg
    02.jpg
    423.6 KB · Views: 5
  • 4x5~Italian~Alps.jpg
    4x5~Italian~Alps.jpg
    2.5 MB · Views: 13
  • Acrylic~8.jpg
    Acrylic~8.jpg
    1.2 MB · Views: 9
  • Aqua~Ember.jpg
    Aqua~Ember.jpg
    1.9 MB · Views: 5
  • Astro_12.jpg
    Astro_12.jpg
    1.4 MB · Views: 7
  • Caustics~Circles.jpg
    Caustics~Circles.jpg
    506.6 KB · Views: 8
  • Dark_8.jpg
    Dark_8.jpg
    3.4 MB · Views: 4
  • Flower~Field~1.jpg
    Flower~Field~1.jpg
    1.5 MB · Views: 6
  • Forward.jpg
    Forward.jpg
    1.3 MB · Views: 5
  • Hacienda.jpg
    Hacienda.jpg
    540.4 KB · Views: 7
  • Ice.jpg
    Ice.jpg
    2 MB · Views: 6
  • Ice_Walk.jpg
    Ice_Walk.jpg
    1.5 MB · Views: 9
  • In~the~Volcano.jpg
    In~the~Volcano.jpg
    2 MB · Views: 9
  • jardin.jpg
    jardin.jpg
    1.6 MB · Views: 12
  • Metal~Sand~1.jpg
    Metal~Sand~1.jpg
    1.2 MB · Views: 9
  • Metal~Sand~2.jpg
    Metal~Sand~2.jpg
    1.6 MB · Views: 10
  • Purple~Skies.jpg
    Purple~Skies.jpg
    892.3 KB · Views: 13
  • Range.jpg
    Range.jpg
    452.5 KB · Views: 12
  • Rowhome~5~4K.jpg
    Rowhome~5~4K.jpg
    768.4 KB · Views: 6
  • Savages.jpg
    Savages.jpg
    654.9 KB · Views: 7
  • Smith~Rock~A.jpg
    Smith~Rock~A.jpg
    2.6 MB · Views: 9
  • snakes~and~flowers.jpg
    snakes~and~flowers.jpg
    474.7 KB · Views: 9
  • Softbox.jpg
    Softbox.jpg
    374.1 KB · Views: 9
  • Terra~Octa.jpg
    Terra~Octa.jpg
    617.1 KB · Views: 7
  • Turbo~Mode~2.jpg
    Turbo~Mode~2.jpg
    274.5 KB · Views: 8
  • Twisted.jpg
    Twisted.jpg
    4.7 MB · Views: 7
  • Ugly.jpg
    Ugly.jpg
    1,007.1 KB · Views: 8
  • Valley~of~Fire.jpg
    Valley~of~Fire.jpg
    1.4 MB · Views: 8
  • vase.jpg
    vase.jpg
    1.3 MB · Views: 5
  • Walking.jpg
    Walking.jpg
    626.1 KB · Views: 6
  • wallpaper~25.jpg
    wallpaper~25.jpg
    503.4 KB · Views: 8
  • watcher.jpg
    watcher.jpg
    991.7 KB · Views: 11
  • Waterfall~A.jpg
    Waterfall~A.jpg
    2.3 MB · Views: 13
  • You~Won't~Believe.jpg
    You~Won't~Believe.jpg
    702 KB · Views: 8
  • 4000_Lux.jpg
    4000_Lux.jpg
    487.9 KB · Views: 5
  • Become.jpg
    Become.jpg
    1.1 MB · Views: 7
  • Biker_4K.jpg
    Biker_4K.jpg
    1.2 MB · Views: 9
  • Buck_II.jpg
    Buck_II.jpg
    949.6 KB · Views: 8
  • Carbide~and~Carbon~Building~4k.jpg
    Carbide~and~Carbon~Building~4k.jpg
    1 MB · Views: 10
  • Cloth~Teal.jpg
    Cloth~Teal.jpg
    637.1 KB · Views: 6
  • Lava[a].jpg
    Lava[a].jpg
    1.7 MB · Views: 8
  • Nosey_II.jpg
    Nosey_II.jpg
    964.9 KB · Views: 7
  • Raunch.jpg
    Raunch.jpg
    668.5 KB · Views: 8
  • RedRocksDay.jpg
    RedRocksDay.jpg
    472.8 KB · Views: 8
  • Sardine.jpg
    Sardine.jpg
    4 MB · Views: 3
  • A~Meditation.jpg
    A~Meditation.jpg
    1.1 MB · Views: 7
  • California~SE~1.jpg
    California~SE~1.jpg
    635.5 KB · Views: 7
  • Pudding~II.jpg
    Pudding~II.jpg
    1.4 MB · Views: 9
  • Rainy~Day~1.jpg
    Rainy~Day~1.jpg
    1.1 MB · Views: 8
  • Say_It.jpg
    Say_It.jpg
    1.6 MB · Views: 9
  • Woolworth~Building.jpg
    Woolworth~Building.jpg
    886.3 KB · Views: 14
  • 103~Tower~Life~Building~4k.jpg
    103~Tower~Life~Building~4k.jpg
    896.4 KB · Views: 11
  • Pudding.jpg
    Pudding.jpg
    336.8 KB · Views: 9
  • Astro_13.jpg
    Astro_13.jpg
    1.5 MB · Views: 4
  • Cart_4K.jpg
    Cart_4K.jpg
    897 KB · Views: 13
  • Ghost~Colours.jpg
    Ghost~Colours.jpg
    2.2 MB · Views: 10
  • The~Dark~Meat.jpg
    The~Dark~Meat.jpg
    1.3 MB · Views: 9
  • Edges_II.jpg
    Edges_II.jpg
    762.1 KB · Views: 8
  • Vacation.jpg
    Vacation.jpg
    556.5 KB · Views: 20
>downloading zip files from the dangerous hacker known as 4chan kiwifarms
I seriously hope you guys don't do this
But seriously, either making a zip file or uploading to mega and sharing the folder would have been better
I mean, no, but I don't want his wallpapers anyway.

Plus, I use Linux, so I'm too smart to be fooled by a simple ZIP virus.
 
If it was a free app that just randomized your wallpaper from a folder you loaded then at least I could see a modest novelty use case, but paid with subscription services? What the fuck.
This is already built-in, at least on iOS (but I’d be shocked if Android doesn’t have something similar, it’s really basic). Just download the pictures you want, add them to an album in your photos app, and set that album as your wallpaper. The phone will switch between them either on a timer or just showing you a new one each time.
 
Back