The fraud will continue until morals improve.
What an absolute pancake. I would be tempted to block him for that heresy. š¤£
All the models are wrong, but itās difficultāmaybe impossibleāto know how far off the models are until they become historical data.
I hope he asked why youāre downloading Ubuntu instead of Debian.
Tile technician, I guess. 
I support this plan.
Bump technician. 
I would have eaten that like a savage, too. I bet it was unbelievably good.
Toilet technician. 
Well, the recipe sounds good.
Is there someone besides me I can blame for this? 
āYou fucking doorknobs.ā āDagztagz
Merry Christmas, Nostards!
Things are pretty twisty these days.
The status threshold for targets of relatively sophisticated attacks appears to be going down.
The most recent violence illustrates the trend well enough, because of a few standout events: assassination attempt on a president, assassinations of state-level politicians, and assassinations of political activists.
Those three events are a trend of similar resources invested to attack lower and lower profile figures.
There are also some instances of streamers and YouTubers with small enough followings that the story never went beyond local news being attacked in relatively well thought-out ways, which are easily replicated.
Lastly, in a more general sense, itās smart practice to reassess oneās threat model after relatively small events, such as getting a raise. Because even small changes can change your value as a target or who might consider you a target.
A threat model assessment doesnāt have to be a big deal. It can be a simple thing, depending on whatās changed, andāat the endāit may be perfectly reasonable to do nothing different.
Youāre gonna marry a lurker.
The fastest way to #compromise someone isnāt a zero day exploit. Itās their own mouth.
https://untraceabledigitaldissident.com/verbal-opsec-how-to-talk-without-leaking-your-mind/
Target the user, not the tech. An ages old tactic that still works.
Nice printer. šš¼
Emotional? Clearly not a bot.
Took a quick look through the code and I didn't find anything regarding user input (y/n keep running): https://github.com/bitcoinknots/bitcoin/blob/5f8256608fc41c7b72a01a54e9a06ba509a61c8f/src/validation.cpp#L4458
Related issue: https://github.com/bitcoinknots/bitcoin/issues/29
Looks like it does stop validating blocks if it's expired, which probably seems odd, but might be useful to a clueless node runner?
nostr:npub1xtscya34g58tk0z605fvr788k263gsu6cy9x0mhnm87echrgufzsevkk5s has expired iOS software so he understands it well!
You are correct.
The override is manually applied to the configuration. The dialogue only states the software is out of date. Good correction.
Good information here.
nostr:note1mxrjl79ugyk66cuu0l9dqnwkadclspcx739cg9f52xl748sy5e2qvsquak
Canāt send fat zaps on Bumble.
The idea that LLMs and agentic programming would not improve developer productivity seems bananas to me.
However, Iām a hardware guy, not a software guy. So maybe Iām uninformed. š¤·š½āāļø
The government often behaves a lot like the mafia.
Can barely build them on earth, right now. š¤£






