

assuming you recently took a warm shower, maybe letting cold water run a little bit might help? cold water might cause the plug to shrink a bit and be easier to release
assuming you recently took a warm shower, maybe letting cold water run a little bit might help? cold water might cause the plug to shrink a bit and be easier to release
ah yes, voting, famously known for being the only way humans have ever changed their material circumstances.
now that voting has failed us, the only thing left to do is nothing!
a surprisingly disappointing article from ars, i expect better from them.
the author appears to be confusing “relay attacks” with “cloning” and doesn’t really explain the flow of the attach that well.
really this just sounds like a complicated MitM attack, using the victim’s phone as the “middle” component between the victim’s physical card and the attacker’s rooted phone.
the whole “cloning the UID attack” at the end of the article is irrelevant, NFC payment cards don’t work like that.
if sanders was in first and biden fifth, how were the ones that dropped out losing?
and how many of those that dropped out ended up with some sort of position of power under biden?
you’re also willfully ignoring the fact that the dnc purposefully kept in person voting going during the height of the pandemic
Adam Smith himself has admitted to this shit: https://jacobin.com/2024/07/joe-biden-bernie-sanders-democrats-2020-primary-trump
that’s not at all what is being said here. the DNC had to pull all sorts of undemocratic shenanigans to forcefully prop up biden back in 2020 and we’re still paying the price of having these uninspiring losers as our only options
from your own link, that’s only because she’s the least bipartisan dem in the senate.
govtrack’s “left-right ideology” ranking is flawed, it doesn’t look at the content of the bills at all. in govtrack’s own words the ideology ranking “may be measuring something else, perhaps something more closely related to partisan-ness”.
20 years? more like 5
if this is your first time doing a big trip together, honestly, forget about it being prefect. it won’t be, and that’s ok. trips don’t need to be perfect to be meaningful, in fact, i’ve found the opposite to be true. the more wild and unexpected the adventure is, the more memorable and important it becomes to me.
so I’d say it’s best to keep an idea of things you’d like to see or do, but also be flexible and willing to adapt. traveling with someone that forces everyone to stick to a rigid itinerary is never fun and is a good way to ruin the trip. all it takes is one lost bag or one missed train to throw all your careful planning out the window. better to roll with the punches than self destruct when that happens.
if you’re talking about that recent pic of him floating around with a chain and a bread, that was an AI doctored photo
this kinda shit makes me understand the sovcit stuff a little more, “just send an email with this magic subject text and your rights are secured!”
TLS doesn’t encrypt the host name of the urls you are visiting and DNS traffic is insanely easy to sniff even if you aren’t using your ISPs service.
the hostname of a website is explicitly not encrypted when using TLS. the Encrypted Client Hello extension fixes this but requires DNS over HTTPS and is still relatively new.
open source software getting backdoored by nefarious committers is not an indictment on closed source software in any way. this was discovered by a microsoft employee due to its effect on cpu usage and its introduction of faults in valgrind, neither of which required the source to discover.
the only thing this proves is that you should never fully trust any external dependencies.
yeah silly me for supporting artists with my money but also downloading drm-free copies of things so I can actually exercise a semblance of ownership. but sure, keelhaul me so you can keep your sense of smug superiority.
AI is a tool that is fundamentally based on the concept of theft and plagiarism. The LLM training data comes from artists and creators that did not consent to their work being plagiarized by a hallucinating machine.
it literally explains what they’re for in the product listing:
These labels aid your warehouse operations.
• Categorize inventory, reorder points, product dating or special instructions.
• Apply these labels to pallets, boxes and shelves for easy identification.
• Easy to write on.
zero! i rotate mine counter clockwise
i turn mine so i can find it again if i set it down at a party
they wrote two documents, held two meetings, and moved a task to the “started” column?
we’re cooked bro