Skip Navigation
InitialsDiceBearhttps://github.com/dicebear/dicebearhttps://creativecommons.org/publicdomain/zero/1.0/„Initials” (https://github.com/dicebear/dicebear) by „DiceBear”, licensed under „CC0 1.0” (https://creativecommons.org/publicdomain/zero/1.0/)BI
BingBong @sh.itjust.works
Posts 0
Comments 68
Funniest answer wins!
  • This is the correct answer. But we can do one shell and a tube by tearing a scallop off the back of the tube. With the front (still circular and structurally sound) you scrape everything off. The seashell can be used at the end to scrape out the tube .

    Now just need to get the three seashell folks to adopt the tube shell.

  • PDFs
  • I've been in hiring discussions where word doc is looked down on since the candidate is not thinking about how to protect their data from manipulation.

    This ladies take is dumb as hell, or as others have mentioned because her company changes applicants information.

  • In search for a good VPN
  • The proton client for Linux has improved recently. I use it on PopOS. As to your first point I agree. I landed with Proton specifically because it was cheaper to do it and email rather than separate services.

  • 2.9 billion hit in one of the largest data breaches ever — full names, addresses and SSNs exposed
  • Identity theft monitoring services always scare me. It seems like you are dumping a huge amount of information into a single system and just hoping the vendor is secure. I have access to one but refuse to put much information in. Is this mindset incorrect?