fubo

joined 1 year ago
MODERATOR OF
[–] fubo@lemmy.world 7 points 5 hours ago

Blahblahrians!

[–] fubo@lemmy.world 2 points 2 days ago

Anyone with even one level in monk automatically counters this with an Ānāpānasati save.

[–] fubo@lemmy.world 2 points 2 days ago

Trade is ancient. Consider: People have been ordering products from abroad, relying on promises and reputations, since the days of Ea-nāṣir. It's always depended on trust, which is why we still know the name Ea-nāṣir.

[–] fubo@lemmy.world 7 points 2 days ago (5 children)
[–] fubo@lemmy.world 14 points 2 days ago

As a reminder, helping the Antichrist bring about the end times does not earn them a spot in heaven, but rather in the lake of fire that burns with sulfur.

[–] fubo@lemmy.world 36 points 4 days ago

If only free & consensual sex counts, Donald Trump is a virgin.

[–] fubo@lemmy.world 4 points 5 days ago (5 children)
[–] fubo@lemmy.world 3 points 5 days ago

"Tim Kaine in the membrane, Tim Kaine in the brain"?

[–] fubo@lemmy.world 3 points 1 week ago

Merely being in the same room as his stinky ass might very well suffice.

[–] fubo@lemmy.world 9 points 1 week ago (22 children)
[–] fubo@lemmy.world 17 points 1 week ago

Because he misses having threesomes with Jeffrey and Ivanka?

[–] fubo@lemmy.world 1 points 1 week ago (5 children)
 

Similar to the previous campaign TAG reported on, North Korean threat actors used social media sites like X (formerly Twitter) to build rapport with their targets. In one case, they carried on a months-long conversation, attempting to collaborate with a security researcher on topics of mutual interest. After initial contact via X, they moved to an encrypted messaging app such as Signal, WhatsApp or Wire. Once a relationship was developed with a targeted researcher, the threat actors sent a malicious file that contained at least one 0-day in a popular software package.

[...]

In addition to targeting researchers with 0-day exploits, the threat actors also developed a standalone Windows tool that has the stated goal of 'download debugging symbols from Microsoft, Google, Mozilla and Citrix symbol servers for reverse engineers.' The source code for this tool was first published on GitHub on September 30, 2022, with several updates being released since. On the surface, this tool appears to be a useful utility for quickly and easily downloading symbol information from a number of different sources. Symbols provide additional information about a binary that can be helpful when debugging software issues or while conducting vulnerability research.

But the tool also has the ability to download and execute arbitrary code from an attacker-controlled domain. If you have downloaded or run this tool, TAG recommends taking precautions to ensure your system is in a known clean state, likely requiring a reinstall of the operating system.

[...]

As part of our efforts to combat serious threat actors, TAG uses the results of our research to improve the safety and security of Google’s products. Upon discovery, all identified websites and domains are added to Safe Browsing to protect users from further exploitation. TAG also sends all targeted Gmail and Workspace users government-backed attacker alerts notifying them of the activity and encourages potential targets to enable Enhanced Safe Browsing for Chrome and ensure that all devices are updated.

 

Some folks in my area grow this plant. It seems really dangerous.

Brugmansia produces anticholinergic toxins that can cause permanent neurological damage. It's closely related to the Datura genus, also known as jimsonweed, devil's snare, or loco weed.

It's kinda pretty, but it baffles me that it's so popular as a front-yard ornamental plant. If your child or dog eats a flower from this plant, they will probably have a bad trip that they may never recover from.

So why grow it? Are you sure nobody you care about will ever stick it in their mouth?

No trolling. This actually baffles me.

 

First up, here are some things you can expect:

  • a new type of token (at least done as a cohesive theme)
  • a card that can activate to copy enchantments
  • Adventures on a new permanent type
  • an artifact that has two different artifact subtypes normally associated with artifact tokens
  • a creature type from Alpha gets a draft archetype
  • fairy tale Sagas
  • multiple legendary Foods
  • a new card with a lobotomy effect
  • a creature with two triggers, one for artifacts entering the battlefield and one for enchantments
  • a new mechanic that batches together three items that have been in the game since Alpha but never batched before

Next, here are some rules text that will be showing up on cards:

  • “If a permanent entering the battlefield causes a triggered ability of a permanent you control to trigger, that ability triggers an additional time.”
  • “Look at the top twenty cards of your library.”
  • “it produces three times as much of that mana instead.”
  • “Sacrifice all Reflections you control.”
  • “Creatures you control with +1/+1 counters on them have all activated abilities of all creature cards exiled with CARDNAME.”
  • “have base power and toughness 4/4 and flying.”
  • “exile up to one other non-Fox creature”
  • “Land creatures you control”
  • “Whenever you tap an untapped creature an opponent controls,”
  • “X is 2 plus the number of cards in your graveyard that are instant cards, sorcery cards, and/or have an Adventure.”

Here are some creature type lines from the set:

  • Creature – Mouse
  • Creature – Rabbit Unicorn
  • Creature – Faerie Shapeshifter
  • Creature – Elf Fox Knight
  • Creature – Giant Archer
  • Creature – Plant Wurm
  • Creature – Elemental Raccoon
  • Legendary Creature – Rat Noble
  • Legendary Creature – Vedalken Scout
  • Legendary Creature – Human Warlock Bard

Finally, here are some names in the set:

  • Candy Grapple
  • Charming Scoundrel
  • Food Fight
  • Protective Parents
  • Scream Puff
  • Stroke of Midnight
  • A Tale for the Ages
  • Three Blind Mice
  • Three Bowls of Porridge
  • Up the Beanstalk
 

Just now, loading the page https://lemmy.world, I saw a different user's main page. The page loaded in light mode (I use dark) with the username of /u/froodloop in the top right. Then a moment later, it refreshed into my expected main page with my username in top right. This went past too quickly to get a screenshot, but it was reminiscent of some of the bugs that were happening in the old websocket code.

 

Here's one from almost a year ago that is still live today.

If you have [[Muldrotha]] out, you should be able to cast a creature from your graveyard once per turn. But if you have a creature with Evoke in your graveyard — such as [[Mulldrifter]] — Arena allows you to repeatedly cast it for its Evoke cost. This shouldn't be allowed, since Evoke doesn't change the timing of when you're allowed to cast a spell.

view more: next ›