It’s time to repent, my friend.
vigilante time
literally don’t see the problem here
yeah how is it legal this retard made it to 27 not understanding the structure of his loan
BIG INCUBATOR DOESN’T WANT YOU TO KNOW THIS ONE WEIRD TRICK

How the Maui fire started
https://thebag.social/media/6fc19d425806487e349c421b22bf43fde5ad0e5a1db162a774f5788ee278f5b4.mp4
I got one a few months ago actually. it works fine but I have VERY modest needs. I used it to help me to identify some data lines and identify their logic levels so that I can safely use my cheap ass logic analyzer on them. It worked for that purpose, and I will continue to use it for similar tasks. I wasn’t troubleshooting analog circuitry or anything though.
Keep in mind just how limited its bandwidth is. I went with the 2C72 to get 70MHz instead of 40MHz but that’s still pretty low. This is the video that convinced me to go with it: https://www.youtube.com/watch?v=puWXEqVQ4Yk
I appreciate yu funni dog
https://thebag.social/media/5b2e857ffdbe2bd0852334369d5d309881b40ee5204cd77948d7f7c57dc9cb4d.mp4
oooohhhhh got a link to that STL? It’d look good next to my shambler
jorvis, show me funni pictures until the morning is gone
You wouldn’t use a toothbrush that you found lying in a mud puddle, and yet you’d still marry a girl who once fell in a mud puddle, curious.
WIP Trench raider Tomoe
Cute horse girl goes over the top (RIP)
Source

Pretty sure I wouldn’t put my daughter on a theme park ride in AD 2023 though, sad state of affairs
having fun is degenerate
trains world entertainment
Downfall attacks target a critical weakness found in billions of modern processors used in personal and cloud computers. This vulnerability, identified as CVE-2022-40982, enables a user to access and steal data from other users who share the same computer. For instance, a malicious app obtained from an app store could use the Downfall attack to steal sensitive information like passwords, encryption keys, and private data such as banking details, personal emails, and messages. Similarly, in cloud computing environments, a malicious customer could exploit the Downfall vulnerability to steal data and credentials from other customers who share the same cloud computer.
hoooooo boyyyyy
I don’t understand the attack well enough to understand if it’s really practical to exploit from one vm into another, but boy that sounds really, really bad.
Of course “a malicious app obtained from an app store […]” is not really surprising since I just always assume there are privilege escalation zero days out there at all times…
I just came up with a lossless text compression algorithm that will revolutionize communication. It’s a simple pattern substitution algorithm that is easy to implement, doesn’t require decompression, and yet is lossless! Example plaintext and compressed text:
“Colour” -> “Color” 16.6% compression (for free with no loss of information!)
“Honour” -> “Honor” 16.6%
“Harbour” -> “Harbor” 14.3%
and so on…
?name=Screenshot_20230826-161101.png
?name=16920364278908821244327927222451.jpg