Pretium part 4: Geological controls + Strathcona resignation letter

Ivor Jones’ technical report uses the wrong geological controls.  When Pretium expanded the bulk sampling program, it went out of its way to trace and excavate the Cleopatra vein.  The Contact Mill in Montana confirmed that the vein has grades above 80g/t.  The issue is that the Cleopatra vein’s geological controls are completely different than those used for the resource estimate.  Pretium’s technical reports were not updated to reflect this.

Continue reading

Pretium part 1: Free cash flow analysis

So far, the Brucejack mine has yet to generate free cash flow.  Without needing to get too fancy, simply looking at Pretium’s cash flow is enough to see that Pretium’s shareholders will likely be wiped out or diluted close to zero eventually.  Pretium may have extreme difficulty in coming up with the $423M+ needed to refinance its credit facility on or before December 2019.

Click here for the Google Sheet.

Continue reading

Pretium part 2: Dr. Simon Dominy describes Brucejack’s geology

In this post, I’ll describe my opinion as to the correct geological model for Pretium’s flagship Brucejack mine.  A lot of it is based on a paper that Dr. Simon Dominy published (with Isobel Clark) about something called conditional modelling (draft version with working images, final version).  The paper uses the Brucejack project as an example and deviates from the Pretium party line in many ways.  One important deviation is that Dominy seems to (unintentionally) analyze sample tower data that wasn’t disclosed to the public, suggesting that the unreleased data is material to understanding Brucejack’s geology.

One key implication of (what I think is) the correct geological model is that the amount of economic gold in the Brucejack deposit is significantly below what the Ivor Jones resource model estimated.  In the diagram above:

  1. It was originally thought that the blue/teal areas would be worth mining.  This is what the resource model and feasibility study predicted before the first bulk sampling program.
  2. However, all of the economic gold at Brucejack is concentrated in ultra-high grade veins like the Cleopatra and 615 Lateral (E-W) veins.  If you simply compare the area of the red regions versus the blue regions, you can see that the tonnage involved is much, much lower.  While the veins are very high grade (e.g. the second bulk sample mill results found grades of over 80g/t for Cleopatra material), the higher grade does not fully offset the massive reduction in tonnage.

Unfortunately, Pretium does not disclose the lithological information (rock type) associated with drill results.  So, there is no way to independently estimate Brucejack resources.

Continue reading

The AMD bear raid from Viceroy + CTS-Labs + YLZ, volume V

It turns out that I missed other parts of CTS’ old website from January 2018.  The Management Team section from January has a different story than the one from March.

Secondly, I should own up to some of my mistakes in covering CTS Labs.

  1. AMD has confirmed the vulnerabilities.  I originally thought that perhaps (A) CTS Labs was rehashing known issues or (B) they didn’t have the technical chops to find security vulnerabilities.  I was wrong.  AMD’s story differs from CTS Labs in other respects though.  CTS Labs has suggested that the vulnerabilities may take months to fix.  AMD states: “AMD is working on PSP firmware updates that we plan to release in the coming weeks.”  *AMD’s blog post is not entirely clear about when fixes for the Promontory chipset will be available.
  2. Apparently CTS Labs (via its PR consultant) is claiming that Yaron Luk-Zilberman (YLZ) no longer actively manages NineWells Capital.  It’s unclear to me as to when that occurred since YLZ’s name appears on a March 8, 2018 SEC filing for NineWells.  Regardless, it wouldn’t be accurate for me to equate YLZ with NineWells.

Continue reading

CTS Labs is a lie (The AMD bear raid from Viceroy + CTS-Labs + NineWells, volume IV)

While CTS’ predecessor Flexagrid is registered with the Israeli government, I could not find a business registration for CTS Labs.  This is because CTS Labs and Flexagrid are the ‘same’ company.  According to the archive.org history of the CTS Labs website, Flexagrid “became” Catenoid Security which implicitly became CTS-Labs.  Flexagrid was founded in 2013.  The charlatans have been claiming that CTS Labs was founded in January 2017, which is a lie.

Less importantly:

  1. The Business Wire press release has a 302 temporary redirect on it that makes the press release impossible to read (live link, archive.org link).  Effectively, Business Wire has retracted the press release.  (EDIT 2:48PM: Well I was wrong.  The redirect is no longer in place.)
  2. In 2016, Uri Farkas registered a number of domains that seem like SEO spam.  The websites are filled with Amazon affiliate links.  The domain registrations suggest that Uri and Ilia Luk-Zilberman (of CTS Labs) were involved in a 2016 venture involving low-quality cookie cutter websites.  This is the kind of startup business an unemployed person might try if they can’t get a job in the IT security field.  The affiliate marketing game requires a completely different skillset compared to IT security and is easier to get into (even teenagers can do it).  Uri and/or Ilia are a little sleazy because two or more of the websites are written under fake names.

Continue reading

The AMD bear raid from Viceroy + CTS-Labs + NineWells, volume III

Two developments:

  1. It looks like Fraser John Perring has told different facts to Reuters and Vice Motherboard.  Reuters says that Perring received the report on Monday March 12.  Vice Motherboard says that Perring received the report last week, which would be March 4 to 10.
  2. CTS Labs has released a “Clarification About the Recent Vulnerabilities“.  It turns out that all 4 named vulnerabilities are only relevant AFTER an attacker has gained control of the system (“An attacker would only need to be able to run an EXE with local admin privileges on the machine”).  I don’t see how the severity of these vulnerabilities would differ much from BIOS rootkit attacks that have existed for years.  For example, the Vault 7 documents released by Wikileaks revealed that the CIA developed malware (‘evil software’) to spy on computers.  In 2017, Intel Security released a patch to detect such software embedded into the BIOS.  Viceroy Research did not write an obituary on Intel.
    • Earlier speculation from myself and others on CTS’ research seems to be misguided.  CTS Labs is not rehashing vulnerabilities that work without having control of the system (e.g. BadUSB).  CTS Labs is presumably alleging novel flaws (although they don’t seem to be actually claiming that their discoveries are novel).

Continue reading