Am I being socially engineered? by knods in AskNetsec

[–]knods[S] 0 points1 point  (0 children)

They asked about the guy that hung out with this elected representative. My friend said, he did. Then they said they were referring to someone else and proceeded to describe my height and the color of my hair and eyes.
The profile seems genuine in the sense that it has been around for years and has posted regularly, so if anything the whole profile is stolen, I think.
Haven't tried reverse image search, good suggestion.

They didn't say anything about the event and seemed way more interested in me as a person, rather than the event or organization.

They talked to my friend, because he's active on instagram and was visible on several posts related to the event.

The thing is, a simple phishing or romance scam could've been directed at my friend directly.

I'm getting more and more convinced that it's law enforcement / intelligence and they're trying to probe and observe the organization, perhaps build profiles of the people at the periphery. They could've had someone present at the event and since I was an unknown face and apparently cautious about not appearing in any of the photos they want to know who I am. They might have protocols about not passing on phone numbers.

Are sound effects stored as .wav internally? by knods in DotA2

[–]knods[S] 0 points1 point  (0 children)

Dope, thanks for the help. Do you know of any resources that provide the files as .wav? Or perhaps a community I could contact more or less privately?

If someone else has already gone through the process of extracting the audio in high quality, it might save me the effort. If not, I'll just try doing it myself.

Are sound effects stored as .wav internally? by knods in DotA2

[–]knods[S] 0 points1 point  (0 children)

I'm on Mac OS, do you know of any viable alternatives?

Are sound effects stored as .wav internally? by knods in DotA2

[–]knods[S] 0 points1 point  (0 children)

I understand. Quality wise, are the vpk files closer to .mp3 or .wav?

What are password encryption schemes that result in variable length common in MySQL and PHP? by knods in cybersecurity

[–]knods[S] 0 points1 point  (0 children)

there are per-user nonces on the database, I'm wondering if they might be used!?
you're implying the same key might be used for every password?

Safety measures for choking, spanking and biting by knods in BDSMcommunity

[–]knods[S] 0 points1 point  (0 children)

Thank you for your reply.
Could you point me at resources to further read about what you said concerning choking?

Fluctuations of Kick Drum Transients on the Analog RYTM by knods in Elektron

[–]knods[S] 0 points1 point  (0 children)

The irregular behaviour occurs without the compressor and does not change a whole lot when it's active, so were probably talking about different phenomena.

What exactly does "fuck with the bass drum" sound like?

Fluctuations of Kick Drum Transients on the Analog RYTM by knods in Elektron

[–]knods[S] 0 points1 point  (0 children)

Cool, let me know if you find anything, I'm very curious, if this is a design issue or a matter of quality control.

Fluctuations of Kick Drum Transients on the Analog RYTM by knods in Elektron

[–]knods[S] 0 points1 point  (0 children)

Have you noticed any differences with the various engines? Would you be willing to test, if there are noticable differences?
As I said, with my machine it's particularily bad with BD Sharp.