![](https://lemm.ee/pictrs/image/9234da36-4e1a-45c1-9696-fd4f3cc4bf26.webp)
![](https://lemmy.world/pictrs/image/0943eca5-c4c2-4d65-acc2-7e220598f99e.png)
So hard to understand ><
So hard to understand ><
Here’s what you said in this thread:
“Sterile and similar to specimens.”
Bruh those are your thoughts and words. No normal people think like that. What the fuck?
The only people who think “female” is incel language are terminally-online no-life losers who desperately need to go outside.
If you seriously think “female” is incel langauge then you need to touch grass. Get off the internet for a while.
I sense a pattern here. And it’s not the pattern of someone who touches grass regularly.
You should test that theory by going outside ;)
IPFS is great, but also so difficult to get it right
Web 3.1, this time with realistic use cases!
… keep being insulted by reality, then?
Well, you’d need to make a video-hosting site in the first place. And you need to host all the videos even if you use IPFS if you don’t want to provide a bad experience, so you don’t escape any of the problems of hosting a video-hosting website. IPFS has its own challenges it adds over regular video-hosting site challenges.
So, it’s not really worth it.
Usage: ./malware [OPTIONS]
Options:
-h, --help Display this help message and exit.
-i, --infect Infect target system with payload.
-s, --spread Spread malware to vulnerable hosts.
-c, --configure Configure malware settings interactively.
-o, --output [FILE] Save log output to a file.
-q, --quiet Quiet mode - suppress non-critical output.
Advanced Options:
-a, --activate [CODE] Activate advanced features with code.
-b, --backdoor [PORT] Open backdoor on specified port.
-m, --mutate Evade detection by mutating code.
Description:
Malware toolkit for educational purposes only.
Use responsibly on authorized systems.
Examples:
./malware -i Infect local system with default payload.
./malware -i -s Infect and spread to other systems.
./malware -a ACTCODE -b 1337 Activate advanced features and open backdoor.
./malware -q -o output.log Run quietly, save logs to 'output.log'.
Most likely because of the “2” in “2FA”
Except that you should use Prettier for formatting instead of ESLint. That said, semicolons are useless noise
Should’ve written the malware in Go, smh
Oh, we’re promoting our open source web UI now? Well, ngl, mine’s kinda lean; it’s Leanish!
Many subreddits require up to 100 karma to post in them, so your first few weeks using Reddit would be a grind for karma until you reach a comfortable threshold.
It puts a small icon next to your name on your awarded post/comment.
That’s all.
Third-party apps were forbidden from accessing the feature, as it was exclusive to their inner GraphQL API.
I doubt that, it’s against site-wide rules
It wouldn’t work on posts with more than 50 comments, unfortunately. That’s something the back-end has to offer.
… unless the client decides to proxy all calls and make its own aggregate…
Or use a client with a blur setting
Incidentally, certain sorts have more porn than others. Active has less, hot has more, and that’s probably due to the fact that it’s stupid to comment on porn posts. With timed sorts, you can also get some sorts with more or less of it.
Mention Sync, just for fun
“An ex-Netflix engineer’s take on piracy; in a YouTube drama near you”