I play video games in Japanese and call it "studying" ¯\_(ツ)_/¯ English | Polski | 日本語 = OK
Last active 4 hours ago
Don't wanna be here? Send us removal request.
Text

sorry to have to tell you this but if a stranger comes to your inbox or slides in your DMs asking you for your money with some sob story, no matter how tragic and convincing the story is, they are a scammer — especially if the story is obviously copied and pasted, formatted in the exact same way as the other 100 bots in your inbox
15K notes
·
View notes
Text
fantasizing every day about quitting my job and doing absolutely nothing
#fantasizing about quitting my job because it's a constant drain on my mental health#but idk what else I'd do#haha
4K notes
·
View notes
Text
people are once again in my notes debating whether it's, like, morally okay to be reading and even enjoying smut popularized on tiktok and I have to say it's really making this passage hit extra hard

from Hi'ilei Julia Kawehipuaakahaopulani Hobart's Cooling the Tropics
#sometimes I wonder why humankind as a whole seems allergic to just... letting themselves enjoy life#I thought it might be the catholicism but it seems to go beyond religion
7K notes
·
View notes
Text
we seriously need to stop conceding to the personhood trap when it comes to abortion rights. is a fetus a person? thats a spiritual question. i dont care about the answer. should another person dictate what someone can do with their body? simple answer: no.
#the way I explained it to my mom: if I needed a kidney transplant (and would die without it)#and she was a viable donor#the government -still- can't force her to give her kidney to me#whether the fetus is a person or not shouldn't factor into the question at all#because we've already agreed that the government -shouldn't- get to dictate what we do with out bodies
50K notes
·
View notes
Text
I used to be mad about "whole language" reading approaches in theory but now I work with school-age kids and I am mad about it in practice.
#I've been listening to a podcast about this and it's so fucking wild#what do you mean they don't teach phonics in America?#what do you mean they don't teach kids how to SPELL?#what the hell are you guys doing over there
48K notes
·
View notes
Text
me writing fictional couples: oh wow…. the tenderness, the devotion, the romance
me irl:
116K notes
·
View notes
Text
Listen, I can understand Clair Obscur's devs' decision not to have a minimap of any sort for ✨immersion✨, but with my incredible ability to get lost even on a straight path I can already tell it's going to add up to at least 10 hours of gameplay of me going in circles
#I know about the lamps#I somehow still manage to get lost#lovely game but I can't help but question some UI decisions#clair obscur: expedition 33
7 notes
·
View notes
Text
It's really funny watching people on Reddit lose their shits over Clair Obscur's QTE-based battle system. "It's turn-based for people who don't like turn-based games!" bro it's literally the Paper Mario battle system
#tell me you never play turn based games without telling me you never... you get the idea#clair obscur: expedition 33
4 notes
·
View notes
Text
I literally hate every job in the world. I don’t want them. I don’t want ANY of them!
57K notes
·
View notes
Text
Cybercriminals are abusing Google’s infrastructure, creating emails that appear to come from Google in order to persuade people into handing over their Google account credentials. This attack, first flagged by Nick Johnson, the lead developer of the Ethereum Name Service (ENS), a blockchain equivalent of the popular internet naming convention known as the Domain Name System (DNS). Nick received a very official looking security alert about a subpoena allegedly issued to Google by law enforcement to information contained in Nick’s Google account. A URL in the email pointed Nick to a sites.google.com page that looked like an exact copy of the official Google support portal.
As a computer savvy person, Nick spotted that the official site should have been hosted on accounts.google.com and not sites.google.com. The difference is that anyone with a Google account can create a website on sites.google.com. And that is exactly what the cybercriminals did. Attackers increasingly use Google Sites to host phishing pages because the domain appears trustworthy to most users and can bypass many security filters. One of those filters is DKIM (DomainKeys Identified Mail), an email authentication protocol that allows the sending server to attach a digital signature to an email. If the target clicked either “Upload additional documents” or “View case”, they were redirected to an exact copy of the Google sign-in page designed to steal their login credentials. Your Google credentials are coveted prey, because they give access to core Google services like Gmail, Google Drive, Google Photos, Google Calendar, Google Contacts, Google Maps, Google Play, and YouTube, but also any third-party apps and services you have chosen to log in with your Google account. The signs to recognize this scam are the pages hosted at sites.google.com which should have been support.google.com and accounts.google.com and the sender address in the email header. Although it was signed by accounts.google.com, it was emailed by another address. If a person had all these accounts compromised in one go, this could easily lead to identity theft.
How to avoid scams like this
Don’t follow links in unsolicited emails or on unexpected websites.
Carefully look at the email headers when you receive an unexpected mail.
Verify the legitimacy of such emails through another, independent method.
Don’t use your Google account (or Facebook for that matter) to log in at other sites and services. Instead create an account on the service itself.
Technical details Analyzing the URL used in the attack on Nick, (https://sites.google.com[/]u/17918456/d/1W4M_jFajsC8YKeRJn6tt_b1Ja9Puh6_v/edit) where /u/17918456/ is a user or account identifier and /d/1W4M_jFajsC8YKeRJn6tt_b1Ja9Puh6_v/ identifies the exact page, the /edit part stands out like a sore thumb. DKIM-signed messages keep the signature during replays as long as the body remains unchanged. So if a malicious actor gets access to a previously legitimate DKIM-signed email, they can resend that exact message at any time, and it will still pass authentication. So, what the cybercriminals did was: Set up a Gmail account starting with me@ so the visible email would look as if it was addressed to “me.” Register an OAuth app and set the app name to match the phishing link Grant the OAuth app access to their Google account which triggers a legitimate security warning from [email protected] This alert has a valid DKIM signature, with the content of the phishing email embedded in the body as the app name. Forward the message untouched which keeps the DKIM signature valid. Creating the application containing the entire text of the phishing message for its name, and preparing the landing page and fake login site may seem a lot of work. But once the criminals have completed the initial work, the procedure is easy enough to repeat once a page gets reported, which is not easy on sites.google.com. Nick submitted a bug report to Google about this. Google originally closed the report as ‘Working as Intended,’ but later Google got back to him and said it had reconsidered the matter and it will fix the OAuth bug.
11K notes
·
View notes
Text
146K notes
·
View notes
Text
Made the worst brownies ever created just now
150K notes
·
View notes
Text
At first I thought Conclave (the movie) having a fandom was a joke, then I watched it and now I Understand
3 notes
·
View notes