In the eye of our creators, we are all donuts.
Probably all of them, at one time or another.
Look, we can more than one here, m'kay?
Now do it in ASCII
Smoking a small brisket this weekend, having some friends over. Kinda stoked for it.
How bout u?
Seems to be the AskLemmy community, and you've already found us!
Just kidding. Also curious about AMA community.
Just kidding again. Not really.
Hey, what's up?
Try to budget for this:
Roll coal! (Ptui.)
From the thumbnail you'd think he was wearing Vanceface. Zoom in, remain unconvinced.
It's a distinction without a difference, I guess.
Plus 1 for a refurb or gently used Dell Latitude series. My daily beater for the last 5 or 6 years has been a pre-2020 Dell Latitude 7390 13". Works really well with the *bian distros I've run on it, decent battery life, OK mic and speakers.
I've had to replace the battery once, and the keyboard once (which I damaged myself by applying a small amount of Coca Cola).
Refurb ThinkPads are also great, but they have a high resale value.
Stone of Flock is just as useful for disarming traps. It even handles Grim and Disintegration traps effectively.
Really it was Dec 21 2012 when MIT researchers observed Herbertsmithite exhibiting a quantum spin liquid behavior, and observing a new kind of magnetism for the first time. The observation caused a cascade of quantum probabilities to collapse, wherein our timeline has begun to "zipper" with the timeline for a quantum lineage of opposing spins. The two timelines will annihilate each other at the end of the Unixtime Epoch on Jan 19 2038 at 03:14:47 UTC.
This was communicated to me by the Enonoki who built Gobekle Tepe. They telepathically influenced the jitter in my screen refresh rate and metasyntactically programmed the information into my RNA, to be unlocked as a core memory by Wifi 6 resonance.
I have no specific basis to say so, but I distrust browser-based password managers on the principles of separation of function and mitigating risk. Strong my credentials in a browser just feels hinky, even with a master password. Too obvious of an attack vector. Rather, I use the KeepassDX variant with its MagicKeyboard feature. When I'm presented with a login prompt, I can use the keyboard switcher to launch KeepassDX, unlock my vault, and select the credentials entry. Then I can switch back to the browser (or app) and have MagicKeyboard enter the credentials for me.
It's a few more taps than just that, but it's a straightforward workflow that should mitigate leakage from my usual keyboard, clipboard snooping, and any hypothetical attacks against the in-browser vault workflow.
Plus, I know where my credentials are stored, can apply 2FA, and even back up the vault file to offline archives.
It works for me. "Cool story bro," I guess, is my point.