[-] [email protected] 4 points 9 hours ago

I've had a few dreams as a cis male where I was a woman, so basically I reject your premise. However in most dreams I'm not even a character, I'm just the perspective from which the story is experienced.

[-] [email protected] -4 points 1 day ago
[-] [email protected] 2 points 2 weeks ago

I feel like such a poser over here with my Bigelow and Celestial Seasonings.

[-] [email protected] 54 points 2 weeks ago

No barrel means no rifling marks makes the shot untraceable. *taps temple*

[-] [email protected] 1 points 2 weeks ago

Also, I might not be any fun to play Scrabble with. lol

[-] [email protected] 1 points 2 weeks ago

Oh I'm getting lit either way

[-] [email protected] 3 points 2 weeks ago

Finally, some meaningful reform!

[-] [email protected] 5 points 2 weeks ago

"Sa" is an Egyptian hieroglyph meaning "protection", an Arabic measure of volume, a type of Mandaean sacramental bread that is rolled up, and a character in the Javanese script.

[-] [email protected] 5 points 2 weeks ago

That is a mighty fine stick gun!

[-] [email protected] 2 points 2 weeks ago

For one, it sounds like they oppose corrupt courts, so that's a plus!

[-] [email protected] 53 points 2 weeks ago

It's somewhat specific to someone with my type of background; namely growing up in a family of young-Earth creationist, fundamentalist Christians, and learning that things like science and evolution are lies from Satan.

At some point curiosity got the better of me and I realized I didn't even know what evolution even is, so I read up a bit about it. Then a bit more. You know, this actually kind of makes sense. Eventually the rabbit hole led to the existence of God. I remember watching a bunch of debates and expecting the most learned representatives of our Christian tradition to make some really great arguments. And... they... never... did.

[-] [email protected] 1 points 3 weeks ago

The elasticity of demand is not static.

49
submitted 8 months ago by [email protected] to c/[email protected]

I read most of this article trying to determine if I was impacted, so to save you the trouble:

The researchers traced the keys they compromised to devices that used custom, closed-source SSH implementations that didn’t implement the countermeasures found in OpenSSH and other widely used open source code libraries.

view more: next ›

indepndnt

joined 1 year ago