Tesla bankruptcy?

3 Likes

They cut a ton of cost, they made that profit the old-fashioned way by getting lean and firing everyone.

1 Like

I agree with @kimcicle…lets see that 10-Q to see what happened.

There’s some question marks on the street. The Q-A session was hand-picked questions. Musk has a reputation of cherry picking what he wants you to hear. I’m not convinced without seeing the whole picture.

2 Likes

Even if you think they went super lean and fired enough people, the other numbers just don’t add up at all.

  1. Q3 2019 revenues went down by 8% versus Q3 2018.
  2. Net income on a GAAP basis was down 54% YoY.
  3. Free cash flow was down by 58% YoY.
2 Likes

Yeah I read the brief and I’m watching the wall st reaction and I don’t get it. Something is amiss here. Pondering some lotto puts for next week…the problem is that this stock is unbelievably volatile and subject to huge swings based on PR/BS.

TSLA is a bigger gamble with volatility than going to MGM Detroit and tossing a hundo into a Double Diamond Deluxe.

3 Likes

I’ve done both. MGM was way more fun!

3 Likes

One of these days I’ll take a road trip across OH and check it out. Last time I was up there I crossed the bridge to go to the temporary casino in Windsor before Caesars was built, and way before Detroit got casinos. The incentive isn’t there anymore with casinos around every corner, and Atlantic City the same distance away the opposite direction with more variety.

3 Likes

Everybody jumped to conclusions after reading ā€œSurprise profit in Q3.ā€

2 Likes

Not saying this will make the numbers make sense 100% but some of the profits were also from realizing all the FSD money they collected. Without any ā€œrealā€ FSD features shipped before Smart summon, they couldn’t never put the FSD monies collected on their revenue sheets. Now that smart summon is out in the wild, they can and they did.

1 Like

Yes sir, it a costly gamble alright:

3 Likes

The funny part is I don’t think I’ve seen an article saying short sellers made 1,5bn when it was sliding from 400 down sub 200.

3 Likes

Agree with @mp11477 and @kimcicle that we need to see the 10-Q: quite a bit that doesn’t fit the narrative. I’m sure someone will remind me that I expected then to be insolvent by Labor Day (after they were within a week of BK in the past year), but I’ve also said I just spot bubbles, I can’t say when they’ll pop. One of many reasons I don’t make short bets (I also think it’s ungentlemanly, the only ā€œpositiveā€ outcome is you make money when the shareholders lose.)

Quite a few of the most vocal shorts went all-in and got crushed this week.

Could be worse: you could have sold your house for $1.8M, gone all-in on crypto, and had AT&T ā€œCustomer Serviceā€ twiddle their thumbs while SIM scammers emptied you out:

https://twitter.com/wyatt_privilege/status/1187426849351225344?s=21

4 Likes

O. M. G.
That’s unbelievable

1 Like

That AT&T is that bad? Puhleeze.

That poor plaintiff was deprived of losing his $1.8M in crypto the old fashioned way?
Either by wild swings in valuation OR by losing the $9 USB key the private key was on.

2 Likes

At&t is indeed this bad, but this story is unbelievable. Smells.

2 Likes

SIM-swap hacks like this have been rampant for years. App-based or ubi-key 2FA for any financial application.

1 Like

I don’t blame you for being skeptical, but when you are good at social engineering (or have a stack of cash to bribe the guy at the cell phone store) you can make off with $2.4 million in bitcoin.

Nine people were charged with crimes related to stealing more than $2.4 million in cryptocurrency by hijacking victims’ mobile phone numbers. Stealing mobile phone numbers, also known as SIM hijacking, typically involves hackers posing as their victim in order to transfer a phone number from one device to another. Once an attacker is granted access to the phone number, they can bypass two-factor authentication that relies on one-time codes delivered via SMS messages.

2 Likes

:point_up_2:t2::point_up_2:t2:

  • Don’t use the same password (or pattern) for more than one site/service. Use a password manager. I don’t know my password for 99% of my accounts anywhere, they’re all randomly generated. Change them twice a year whether you need to or not.
  • Register with ā€œAm I p0wnedā€ to get notified when a site with your email/password gets hacked (and which provides and dumb enough to store your password in plain-text or a simple 2-way hash). SIM swaps require access to your email (which they could have for months) and social engineering. Often they’ll wait until a site gets hacked and start checking those accounts against email services to see what works. They’re playing a LONG game.
  • Use App based 2FA or a hardware key everywhere you can. There are other 2FA attack vectors but SMS is better than nothing, non-SMS is better than SMS, hardware keys are the best choice.
  • Lock your cell phone account with an extra-extra password (usually you have a login to the app/website, a pin to transact, and a separate password to port your number). Usually has to be done in person with photo id.

Half the cell phone stores are dealers and not corporate stores: they don’t work for your carrier and have access to 99% of the same tools/information. It’s audited but if Bozo got paid $1000 to SIM swap you and his payor took $1.8M in bitcoin it’s gone-gone. Put the thief in jail but you can’t recover it even though asset forfeiture. :wave:t2::money_with_wings::wave:t2::money_with_wings:

It’s still more likely you lose the private key or move it to a USB drive that goes bad. I’m waiting for the eventual Winklevoss murder/suicide for that very reason.

2 Likes

Boom…

2 Likes