friendica.eskimo.com

How To Become A Hacker: A Step-By-Step Guide

33 3
Fun background info: Trusted Representatives don't actually carry their shard of the key (to prevent exactly this scenario), they have (iirc) a keycard which allows them to access the secure storage medium where their different pieces are stored.
to prevent exactly this scenario


I'd love to be in the group that brainstormed this exact scenario

6
Every software system worth its salt should have safeguards against Nokia nunchuck attacks.
This entry was edited (4 days ago)
4

I don't get what the others are talking about, there is nothing after this, even through scribe or on an archive.org snapshot made recently

Taking him down would put the fear into the rest and, hopefully, get some intel on the other keyholders through the IRC backchannels.
You probably have an extension which removes the "Friend link" query param from the URL
This entry was edited (4 days ago)
1

I started reading and though this was someone who had lost their marbles, by target 2 I was hooked.

And next to his original, fully erect penis, was another one. Identical. Bio-engineered, apparently. He struck a pose.


Poetry.

This entry was edited (4 days ago)
4
These, after do many decades, are still stupid funny. I can't help but picture an ugly 13 year old male desperate for companionship but not receiving any.
This entry was edited (2 days ago)
Shoreline, WA, USA