

What, exactly, did we expect from someone named “fuckwit_mcbumcrumble”…? lol


What, exactly, did we expect from someone named “fuckwit_mcbumcrumble”…? lol
I think I remember Wis doesn’t kill you at 0, but you go fully insane and lose control of your character. But that might just be older versions and not 5th ed rules. I feel like I recall something about going into a coma if Int hits zero, maybe that is new rules for mental stats…?
Just because they can, doesn’t mean they will. They are saving it, Baby doesn’t get many spell slots so they gotta make them count.
Str or Dex at 0 = death in RAW. Granted this uses Agility instead of Dex, so I have no idea what established system (if any) they are using, but my guess is this is what above commenter is referencing.
Hell, even my 3d printer connects to a computer via USB B, if you want/need to connect directly to it.
They just now put it together because Ruffalo is starting to look like Bernie. That hair tho, lol.


I feel like you are suggesting they would decompress the file over USB from the computer after it is transferred, and not use the phone to decompress it after it is transferred… Once it is transferred to the phone, just use the phone to decompress it.
I liked it briefly, but it fell off for me. I feel like there needs to be an area to go to, or missions to pick up, or something that is a higher difficulty. I feel like a mid-range quality ship and weapon will do everything in the game without issue, and when you continue to get upgrades and suddenly everything the game has to throw at you poses so little of a challenge you could afk while being shot at with little issue… Well, it didn’t hold my attention anymore unfortunately. I really want to like it more than I do.


Amazing, thank you for the in-depth (but simple enough) explanation!


OH. So like, it’s a situation where the “lock” has 2 keys, one that locks it and one that unlocks it. You keep the “unlock” key on your person and never let it out of your sight, but let the “lock” key just gets distributed and copied anywhere because all it can do is LOCK the door, and it really doesn’t matter who locks the door so long as only you can unlock it.
That is very interesting. I still don’t quite understand how it technically works, because I thought if you encrypt something with a key, you could basically “do it backwards” to get the original information… This is probably due to getting simplified explanations of encryption though that makes them analogous to a basic cipher (take every letter, assign it to a number, add 10, convert back to new letter - can’t be read unless someone knows or figures out the “key” is 10) and now it is obvious that it is significantly more complex than that…
But I am much more confident that I understand the ‘mechanics’ of it, so thank you for the explanation!


Considering they don’t want your address or name, how the hell would that work anyway? This had to be a joke…


I find the best way to torment Linux ISOs is using the live environment exclusively to:
Now, before you ask, yes, you absolutely could do all of this in a VM, but I’ve found it is more tormenting if there is real actual hardware wasted and/or at risk of damage. Linux is the natural enemy of consumerism, so buying a 12 pack of flash drives just to do this on a thinkpad over and over until the thinkpad dies really hurts the linux ISO to their core.


Okay, but like, if the carrier sees all your texts, don’t they also receive the public keys and can then also decrypt the messages?? I’m genuinely curious how this works. The more I think about it, the more I am convinced I don’t understand how any encryption works because the intended recipient needs the key to decrypt it, and if I’m giving them that key, but my traffic is also being watched… doesn’t whoever wants to snoop get the key too??
I feel like I have to be missing something because this just sounds like having an encrypted flash drive that you leave out in the open for someone else to grab, but it has the password written on the side of it in sharpie.
Oh cool. Thank you for the info. I hear people talking about RISC-V a lot, but was nearing the parks and rec meme of “I don’t know and am too afraid to ask”, lol.
Are the processors good? Like, does performance compare to the alternatives? (I’m assuming these are alternatives to like an ARM based SOC?)
That is unlikely to be the lesson the players learn… More likely they get frustrated and decide either TTRPGs are not for them, or that the DM “sucks”.
For the my layperson friend reading over my shoulder… erm, why?
Sounds good in theory, but imo it is SO much harder (and/or so much less fun) to run a campaign when you have less than no idea what the fuck the party is going to be doing next session…
I feel like you gotta know the party a little bit… If they aren’t the type to talk their way out of a problem, then the monologue has to happen from some relative safety instead of within arms reach of the not-paralyzed barbarian. Hold person exists. Magic Mouth. Message. Hell, a big ol’ balcony above the party.
Else you gotta have a back-up plan like fallout where the players get the information from a journal or something - maybe it isn’t as clearly laid out and it’s harder to follow the breadcrumbs but the party isn’t just lost in the wind looking for the next guy to punch.
I don’t know if this counts, but grease. Especially pepperoni grease, the orange stuff. I will just run my finger through it and lick it off, or sop it up with bread of some kind (garlic knots are great for this).