![](https://lemmy.dbzer0.com/pictrs/image/9192fa57-2ed6-4fc5-9f17-dfaed93eb96f.jpeg)
![](https://lemmy.ml/pictrs/image/d3d059e3-fa3d-45af-ac93-ac894beba378.png)
Imagine if you played Suika, how you’d look at fruits.
Imagine if you played Suika, how you’d look at fruits.
Canoo if they every exist IRL.
Not a retirement age but to run for public office, I think the candidate should have at least 20 years of median actuarial life expectancy remaining. They need to make long-term decisions so they better be around to see how it goes. Right now this is age 60 for men and age 64 for women. In the future it may go as high as 70. If you really wanted to push it I think 18 years would be symmetrical with childhood. First 18 and “last 18” you can’t be in office.
An app called Lamucal can make them for you, lyrics and all.
An older app (now defunct), can be found on archive.org, called Riffstation, can do the chords.
Once you have a version of your song you can put it in an app called JustChords. This app will store, display, and transpose your songs. It also has a search feature to pull tabs from other sources.
I agree with your criticisms of BitTorrent vs older P2P sharing. The closest successor I know of might be Tribler. I haven’t used it so I don’t know how the uploads are - and it still has many drawbacks/inefficiencies relating to hashing/duplication because it’s torrent-based. But it does contain search, and the ability to share without a website indexing it. It’s kind of like eMule: torrent/tor edition?
It’s safe as long as nobody breaks the rules. If law enforcement or copyright holders really wanted a login they could probably get an invite from somebody. The weak link in security is always going to be a person.
Once they infiltrated a private tracker, they’d either have to hack them or download every torrent they want to and track down the seeders. 90% of the seeders would probably be in a different country so, is it really worth their effort? They’re not going to get the people ripping the shows and movies.
So yes, I think getting caught on a private tracker is possible. Perhaps not probable.
Yeah and those who cake on makeup aren’t trying to mislead me into thinking they’re pretty either. It does also apply to some clothes. Not regular haircuts but certainly hair dying, straightening, and curling. I would apply it to nail extensions and high heels as well. I think it’s pretty fair to put daily full facial shaving into that same category. It’s all clown shoes to me.
I actually dig the Native American, Mongolian, Japanese style. Like a few dark hairs, but mostly smooth. Sometimes it’s just like the mustache tips that get dark. Let it grow.
An OC Rant with some light trolling in the form of toxic masculinity. Sarcastic but with elements of truth.
The question is: why are you shaving? Why are you so afraid of looking like yourself?
When you have a beard, people respect you. They listen when you talk and hold doors open for you. I have a hard time trusting a man with a clean shaved face, because our interaction is starting off with a lie. I feel the same way about makeup and fake eyebrows and plastic surgery.
deleted by creator
In theory, yt-dlp can pull cookies from your browser to get content behind a login.
Tubi has a few gems: Sarah & Duck, Mofy, and Hooray for Huckle. These can be downloaded for offline use (ad-free) using the command line software called yt-dlp. This software has the ability to load your cookies from your web browser, so it may work for some login sites, for example if you just pay for one month.
You can find some stuff searching btdig.com.
I was just wondering if Anonymous mode could be responsible for the false hits on iknowwhatyoudownload.com from my static IP
On the other hand, Gowdiak has not provided the technical details of his findings to Microsoft. The researcher is displeased with the way the tech giant handled his previous PlayReady vulnerability report, saying that his work was mostly ignored. Gowdiak claims Microsoft has now requested additional information on the findings, informing him that the research may be eligible for a bug bounty reward, but the researcher says at this point he is only willing to share the information with the vendor through a commercial agreement.
I’m not super familiar with it but basically that would mean each code base would be an immutable chain, and all edits get appended? Seems like that would be very compatible with torrent seeding, just need to handle the branches. A branching blockchain, is that a block tree?
We need a GitTorrent protocol with DHT. All forks could be one repository, and the identical code shared between them can be cross-seeded.
Do you set up any Immich accounts for family members with shared albums? I’m currently using Piwigo but thinking about migrating to Immich. I wish the Immich app supported individual photo uploads instead of syncing whole albums.
Hahahaha
Somebody has to make the call. There was this dinosaur book for kids in a little free library. It didn’t even have an author or publisher, because it was AI garbage. Full of misspellings, etc. I contemplated throwing it in the trash because I don’t think it should exist. But for some reason I had trouble deciding that for others.
Digitize and delete? Scan straight to OCR and dump the books. One hard drive can store a lot of books.