The Cooper Temple Clause - Who Needs Enemies?
https://music.youtube.com/watch?v=rtAWY39I3DE
WordAll #745 completed in 32s
🟩🟩🟩🟩 👈 perfect game!
wordall.xyz
Wordle 1,016 4/6*
🟨⬛⬛🟨⬛
🟨🟨⬛🟨⬛
🟩🟩🟩⬛⬛
🟩🟩🟩🟩🟩
https://www.nytimes.com/games/wordle/index.html
#Worldle #800 (31.03.2024) 1/6 (100%) (cheated)
🟩🟩🟩🟩🟩🎉
🧭⭐🚩🔤🗣️👫🪙
La palabra del día #815 4/6
⬜🟩⬜⬜🟨
⬜🟩🟨⬜⬜
⬜🟩🟨🟨⬜
🟩🟩🟩🟩🟩
Le Mot (@WordleFR) #812 5/6 (pentacul)
⬛⬛🟨⬛⬛
⬛🟩⬛🟨🟨
⬛🟩⬛🟩🟩
⬛🟩⬛🟩🟩
🟩🟩🟩🟩🟩
Framed #751 (yes, I have seen it, I don't know why it took me so long to guess it. I didn't really watch anything yesterday. I've still got a stinker of a cold but the cough has improved somewhat. I pretty much got home, cooked, ate and slept for 10 hours which seems to have done me some good because I feel snotty but nowhere near as ill. I am grateful to have being able to do that. I didn't even have a glass of wine with my meal. I read some more about the XZ affair. Which on the face of it seems technical and boring but has the makings of a spy thriller. XZ is compression algorithm, primarily used in open source computer systems. Open source systems are used everywhere. XZ was heroically maintained and updated by one person until a couple of years ago. Then someone with the handle JiaT75 helped maintain the underlying source code. Which isn't, by itself, unusual people often volunteer their skills for fun or indirectly for profit (at a minimum having successful contributions looks good on a CV or resume). JiaT75 was anonymous, which isn't that unusual or by itself suspicious. There are legitimate reasons for privacy. But they inserted backdoors, in a reasonably sophisticated, slow and methodical, way, into the software; it wasn't a backdoor into XZ itself - it was a backdoor in something that very indirectly uses XZ. It was a deliberately convoluted and tangential way of gaining access to computers in a covert way. Done in reasonably methodical and slow way over a two year period. There are very smart individuals and groups out there capable of such things. There are also state actors. Governments trying to gain access to computers for intelligence gathering purposes. JiaT75 sounds like a Chinese name but then that's just a username and it could be misdirection. It''s quite a big deal, and no doubt a lot of people, governments included, are trying to work out how they are affected or if they were affected. There's not much evidence the backdoors were used but there wasn't much evidence they existed until a week ago*.)
🎥 🟥 🟥 🟥 🟥 🟥 🟩
* A somewhat technical rundown:
https://gist.github.com/thesamesam/223949d5a074ebc3dce9ee78baad9e27