Silksong actually mentioned but only in a montage of 2025 games and it was one of the few without a specific date, lol
Silksong actually mentioned but only in a montage of 2025 games and it was one of the few without a specific date, lol
Hmm. Maybe you were thinking about elemental mercury vs methyl mercury? That’s a case where the danger (at least through ingestion) depends greatly on the format.
It’s because of the ability to trade items with other players. Any exploit that affected item drops or crafting creates the potential to upend the entire global market in the game, affecting the experience of many other players who might play mostly alone but will often look to the market to trade for items they need.
I didn’t know they’d be able to tap into the Firefox profiling tools, that’s neat! Probably great data to have as they get into debugging of more complex websites.
Femboys are we going out for lunch tomorrow morning at six?
This was an awesome read!
Converted to electric? This thing is incredible.
Oh shit we making beans again?
🫘
I feel the same way. On the one hand, there’s nobody else I’d rather have slap sense into us than one of our closest allies. But average Canadians don’t deserve to be wrapped up in our godawful drama. Here’s hoping they can hit us hard enough to get back on the right track sooner rather than later.
No thank you I am allowing these wild fan theories to beam directly into my skull.
The video game that taught me how good video games could be. I still replay it every few years.
A pair of Lems Chillum shoes. They have a wide toe box and zero drop but still look and act like a real shoe compared to something more “barefoot”. My current daily driver.
This is not the case, but I do still disagree with the “trust me bro” approach to a feature rollout that does send data your somewhere, encrypted or not.
Edit: For those interested, the reason it’s not the same as a backdoor is that the result of the computation done on HE data is itself still encrypted and readable only by the original owner. So you can effectively offload the work of a certain analysis to a server that you don’t actually trust with your keys.
Homomorphic encryption, which allows for analyzing secret data without a decryption step, is actually incredibly cool. It’s a shame the conversation will begin with the fact that they deployed the feature as on by default.
Hey watch it, I’m 70% slime!
Nah, it’s more like a wet baseball. Only 0.02% water by mass. Source
Edit: My bad, you asked about liquid, not just water, so this is less relevant but I’ll leave it as some trivia.
No future issues. But there isn’t that much of the tooth left, I have a crown there which is most of what’s visible. Make sure you look up or have explained to you the steps of the procedure so you aren’t surprised.
So far, we haven’t been able to trace back to the initial compromise vector in the campaigns seen in our telemetry.
They hypothesize that attaching a compromised USB drive to an air gapped system is to blame. That seems to be a well known vector at this point. Does it matter much what tool is used to copy data once it’s in?
Same! I have never considered this but have made plenty of plots where it is now the obvious solution.