This seems very good. 3 mana 4/4 deathtouch with a very scary ability (the prepared spell) seems strong to me.
TehPers
- 0 Posts
- 1.7K Comments
TehPers@beehaw.orgto
Programming@programming.dev•Why I Built JADEx Instead of Switching to KotlinEnglish
2·2 days agoWtf?
TehPers@beehaw.orgto
Programming@programming.dev•Why I Built JADEx Instead of Switching to KotlinEnglish
1·3 days ago(Clojure is (parentheses (diluted with (Java))).)
TehPers@beehaw.orgto
Politics@beehaw.org•Pam Bondi will not appear at scheduled House hearing on Epstein files, DoJ saysEnglish
6·3 days agoSo what they’re essentially saying is that if I commit a crime and get subpoenia’d for it, then as long as I’m no longer committing that crime, I can safely ignore the subpoenia.
Got it. I’ll keep that in mind if it ever comes up.
TehPers@beehaw.orgto
Gaming@beehaw.org•"The $60 Billion Gaming Scam Nobody Talks About" by mrixrtEnglish
7·3 days agoWhile I can’t speak to the amount itself (somehow the industry as a whole settled on 30%), I do think it’s fair to say that Steam, the App Store, and the Play Store aren’t just payment processors. They also are platforms for users to discover new software/games, and they do a lot of advertising for developers. I can agree with the fee being too high, but I don’t think it’s fair to compare it with PayPal, which only processes the payments.
Ball Lightning is in Standard, it’s in Foundations.
Assuming SOA is like the original Strixhaven archive cards (and I’d be shocked if it weren’t), Berserk won’t be standard legal.
In the original Strixhaven set, being reprinted in STA didn’t make a card legal in standard. Instead, standard legal cards (from other sets) were reprinted below rare, and cards not already legal in standard were reprinted as rare or above.
Notably, SOA includes Monstrous Rage at uncommon. It would be standard legal if it weren’t banned. The set may have been designed and finalized before it was banned, resulting in it appearing at all as an uncommon in SOA.
Isn’t that end step trigger a free sacrifice every turn? This seems like it’d fit into aristocrat-style decks. Only shame is that gaining life means you can’t get the free sacrifice, which might honestly be a pretty big downside.
TehPers@beehaw.orgto
Technology@beehaw.org•Your RAM Has a 60 Year Old Design Flaw. I Bypassed It.English
9·3 days agoShe’s literally just doing her own version of the MrBeast face. It’s not even that unique. Half the people I watch on YouTube slap their face in their thumbnail, and I don’t watch clickbaity slop.
Just install DeArrow, enable thumbnails through it if needed, and move on.
TehPers@beehaw.orgto
Technology@beehaw.org•Apple's chips are winners, but Windows fails help it mostEnglish
2·3 days agoFor roughly the price of a single 9800x3d*, you can buy a complete laptop with a long lasting battery and decent enough specs for web browsing, video playback, and basic office work. It’s unfortunately one of the better devices on the market at that price, especially accounting for the battery life.
*Edit: okay the processors came down in price. Fine, the cost of a kit of decent DDR5 memory, then.
Apple selling a ‘repairable’ and low-end device just looks like a recession indicator to me.
One of the few, I take it?
TehPers@beehaw.orgto
Technology@beehaw.org•Apple sued for allegedly scraping 70 million YouTube videosEnglish
231·3 days agoThe lawsuit says Apple did more than just link to content. It claims Apple got around YouTube’s protections to download and use videos directly. The creators argue this breaks the Digital Millennium Copyright Act, which bans getting past systems meant to protect copyrighted material.
Nah they can lose that lawsuit fuck that. Not about to see DMCA section 1201 used to block everyone from using a YouTube video ever in any other content.
TehPers@beehaw.orgto
Programming@programming.dev•I had asked a question regarding how could phones get possibly hacked, and this was the response I got. Is this a suitable forum for discussing about hacking and internet security ??English
5·3 days agoA quick search might answer your question, but at its core, it treats people as the vulnerability rather than anything software related.
This card had me cracking up when i saw swords, but the ETB feels surprisingly balanced (if not a bit slow).
TehPers@beehaw.orgto
Programming@programming.dev•I had asked a question regarding how could phones get possibly hacked, and this was the response I got. Is this a suitable forum for discussing about hacking and internet security ??English
4·3 days agoPeople talk about security here occasionally, though there are places to discuss it. Also, bugs are the most common source of vulnerabilities (though social engineering is a much more common type of attack), so the response seems reasonable to me.
Regarding hacking, for white hat I believe there are communities, though I’d imagine there’s overlap with cybersecurity communities. I don’t know of, nor would I recommend, anything black hat.
TehPers@beehaw.orgto
Technology@beehaw.org•Men Are Buying Hacking Tools to Use Against Their Wives and FriendsEnglish
2·3 days agoAgreed. Not only are harassment and abuse not new, but using actual hacking tools to do it is old news too. Maybe the article is just trying to bring it back to attention.
TehPers@beehaw.orgto
Programming@programming.dev•how do you fit guitar practice into a dev schedule?English
4·3 days agohow do you fit guitar practice into a dev schedule?
working as a web dev, 8+ hours at a keyboard. by evening my hands are tired and i just want to zone out.
been trying to do 20 min before work instead. it’s not much but it’s consistent. any other devs who play — how do you manage it?
TehPers@beehaw.orgto
Technology@beehaw.org•Linux kernel maintainers are following through on removing Intel 486 supportEnglish
2·3 days agoMy point was more along the lines of online being impractical. Sure, you can still connect to servers running old software (in which case kernel updates aren’t useful to you anyway), but anything with modern security or software is going to just not run at all on it, whether because the software is too heavy for the processor or because it simply was not compiled for it (and cannot be).
Point is, I think we both agree that the only reasonable usecase for these processors is offline or on a separate network (LAN/tunneled/etc).
TehPers@beehaw.orgto
Technology@beehaw.org•Linux kernel maintainers are following through on removing Intel 486 supportEnglish
3·4 days agoWhat kind of security risk are you at running a 486? You can barely handle the TLS handshake. Modern malware would just brick your system the same way any other modern software would.
TehPers@beehaw.orgto
Technology@beehaw.org•Intel trapped in Elon's reality distortion fieldEnglish
2·4 days agoIf money is speech, then taxes clearly violate the first amendment. In fact, any kind of payment does.
Therefore, I should not have to pay taxes either. It’s not like the rich do, anyway.
TehPers@beehaw.orgto
Technology@beehaw.org•Tech companies are cutting jobs and betting on AI. The payoff is far from guaranteedEnglish
9·4 days agoThe only bet I see here is on large-scale financial decline. If they expected to see any kind of major productivity boosts in the future, they’d be hiring everyone they can.

The output of a model isn’t speech protected by the 1st amendment, so this lawsuit is dumb. It’ll of course waste time and money though.