Chairman Musk
TerribleTortoise
- 8 Posts
- 28 Comments
Put some gold chains on that guy and he would be the Mr T of opossums.
TerribleTortoise@lemmy.worldto
politics @lemmy.world•Lauren Boebert Tries to Evict a ‘Guy’ From Ladies Room in Capitol
161·1 year ago“Lauren Boebert makes woman feel threatened and unsafe in the women’s bathroom.”
This needs a “reticulating splines” step.
TerribleTortoise@lemmy.worldto
Funny@sh.itjust.works•Those cats were fast as lightening back in 1974. People have slowed down since then.
37·1 year agoNew Zealand was not Kung Fu fighting. As was foretold in prophecy.
TerribleTortoise@lemmy.worldto
Global News@lemmy.zip•A rare polar bear showed up on the shores of Iceland. Police shot it
33·1 year agoWe can all agree that it’s a tragedy that this animal died.
The other consideration is that polar bears are amongst the most relentless and vicious predators around. A polar bear around an inhabited area is very much a serious safety threat. Iceland doesn’t have any animal predators and therefore also wouldn’t have the trained people or equipment necessary to deal with neutralizing and relocating this bear.
I would have liked to have seen the animal safely moved. But I suspect there’s more context to this story that we don’t have beyond the headline.
TerribleTortoise@lemmy.worldto
Privacy@lemmy.ml•Question for those knowledgeable about alternative web protocols (gopher, gemini, etc): Would it be possible to create a tool that translates http sites to those formats, on demand?
17·1 year agoThe simple answer is yes.
It’s possible to encode or tunnel anything over any protocol.The next question is why isn’t it done more?
- http has basically become the defacto internet protocol for all media content. This has resulted in a lot of other protocols from becoming blocked due lack of support or due to firewall rules.
- efficiency. http (and all the other protocols it runs atop) have become highly optimized for doing what it does. To layer something like http over another protocol, would certainly be possible but it would likely be slower, less responsive and lack a lot of the niceties that make http work as well as it does.
For the above reasons it’s actually more common to see other protocols run on top of http. This is especially common to prevent blocking and censorship by making the traffic look like normal http traffic when it may actually be private messaging apps, file transfers, VPN, etc.
TerribleTortoise@lemmy.worldto
No Stupid Questions@lemmy.world•What knot(s) should I use to secure this?
8·1 year agoIf you want to be able to trim off the ends, I suggest a double fisherman’s instead (aka the double overhand stopper) with both strands (hold them together while you tie and treat them as a single strand).
https://www.animatedknots.com/double-overhand-stopper-knot
With either knot, after you trim, you can melt the ends of the elastic cord. It will “mushroom” a bit, which will also prevent the tips from creeping into the knot and coming loose.
TerribleTortoise@lemmy.worldto
No Stupid Questions@lemmy.world•What knot(s) should I use to secure this?
7·1 year agoA flat overhand bend in the elastic cord is what I recommend: https://www.animatedknots.com/flat-overhand-bend-knot
Justification:
Simple, not bulky, reasonably secure against shaking loose, and relatively easy to untie.As suggested in another comment, a double figure eight could be used as well. It will be more bulky and a bit less likely to come loose.
TerribleTortoise@lemmy.worldto
Cool Guides@lemmy.ca•A cool guide to different types of forksEnglish
1·2 years agoOf all the fork shapes, the table fork seems the least useful for its named purpose.
TerribleTortoise@lemmy.worldto
Asklemmy@lemmy.ml•Any way to hide posts by a certain user?
9·2 years agoIf you’re using Sync there’s an option called “filter user”. Post dot menu / filter / user.
TerribleTortoise@lemmy.worldto
Asklemmy@lemmy.ml•What did you get told as a child that you realised was a lie as you got older?
1·2 years agoI can only speak to my own experience, but maybe?
Also, I lied about being American and participated in this thread anyways.
TerribleTortoise@lemmy.worldto
Asklemmy@lemmy.ml•What did you get told as a child that you realised was a lie as you got older?
37·2 years agoThat chocolate milk comes from brown cows.
When I discovered the truth, I learned an important lesson about betrayal.
TerribleTortoise@lemmy.worldto
[Dormant] moved to !historyphotos@piefed.social@lemmy.world•Experimental Soviet jeep with a mounted anti-tank gun for airdrop with paratroopers, WW2, 1943 or 1944?English
9·2 years agoClearly they are two tactile unicycles. /s
TerribleTortoise@lemmy.worldto
Canada@lemmy.ca•Galen Weston calls Loblaw boycott 'misguided criticism', says grocer not responsible for higher prices
69·2 years agoI’d like to hear him deliver a detailed analysis of how sky rocketing food prices has no bearing on Loblaws record setting corporate profits.
The addAddress call may just be configuring the local side of the VPN. It’s hard to know without looking at the rest of the code.
The general workflow when establishing a VPN connection is:- open a socket to the destination VPN service (ProtonVPN, or whatever suspect service).
- configure parameters such as DNS, split tunneling, and which networks to route over the VPN (generally everything from your local system, except the VPN connection itself).
- update the local routing so traffic starts flowing over the VPN.
addAddress may just be part of the configuration. A very cursory search suggests that OpenVPN may be being used as the underlying VPN implementation framework (not uncommon).
That would be a highly specific casual conversation!





The tilde (~) means that path is located in the per-user home directory. The default behaviour is for user home directories to be only accessible by that specific user.
The encryption you’re referring to is likely specific to Firefox Sync (i.e. syncing your FF settings, history, etc. across devices). Sync is end-to-end encrypted. But I’m not surprised that it’s unencrypted on disk.