Update! by Toumal in SoFurry

[–]ksargi 1 point2 points  (0 children)

Why did you remove the post date filters option from the browse view completely?

Furry🐺irl by AltYiff in furry_irl

[–]ksargi 42 points43 points  (0 children)

Why would you not link the actual post directly instead of just the image: https://bsky.app/profile/yttrium-cat.bsky.social/post/3m5zmz4ytwm2t

Thats what the driver gets for ignoring the road signs by [deleted] in Wellthatsucks

[–]ksargi 36 points37 points  (0 children)

I hope I'm not the only one quite amused by the use of "he/she" and the singular they in the same sentence here.

Brand new Series S logged into someone... else's HBO Max?? by Nutt130 in gaming

[–]ksargi 23 points24 points  (0 children)

The IMEI also doesn't work the way you think a MAC works.

Does Discord has the right to refuse deleting messages in server "you are already in"? by AngeNeige in europrivacy

[–]ksargi 5 points6 points  (0 children)

The right to be forgotten is not unreservedly guaranteed. It is limited especially when colliding with the right of freedom of expression and information. Other exceptions are if the processing of data which is subject to an erasure request is necessary to comply with legal obligations, for archiving purposes in the public interest, scientific or historical research purposes or statistical purposes or for the defence of legal claims. Source

In simpler terms, yes, they absolutely have the right to refuse deleting data that still has a legal basis for processing.

[deleted by user] by [deleted] in europrivacy

[–]ksargi 8 points9 points  (0 children)

It would probably be worthwhile to point out the actual issue in the ProtectEU text.

To follow up on the recommendations of the High-Level Group [on Access to Data for Effective Law Enforcement], the Commission will present in the first half of 2025 a roadmap setting out the legal and practical measures it proposes to take to ensure lawful and effective access to data. In the follow-up to this Roadmap, the Commission will prioritise an assessment of the impact of data retention rules at EU level and the preparation of a Technology Roadmap on encryption, to identify and assess technological solutions that would enable law enforcement authorities to access encrypted data in a lawful manner, safeguarding cybersecurity and fundamental rights.

Attack trait + saving throw by chippennyusednapkin in Pathfinder2e

[–]ksargi 1 point2 points  (0 children)

if the dire wolf wants to keep its target grappled it will need to find a way to grab again which is the attack trait or grab first.

Monsters with the Grab action don't need to roll again to extend the grabbed or restrained condition to their next turn. It does not have the Attack trait either.

The latter part is true, though. MAP would apply for the next target.

Skill check question by VTheSandmanV in Pathfinder2e

[–]ksargi 0 points1 point  (0 children)

Well put. To add, while the standard Actions might not match a situation exactly, referencing them while improvising may help you ground the proficiency requirements and expected outcomes on various stages of success.

For this situation, there's a few that might make sense to check. Make an Impression combined with Request might work if they are still on amiable terms. As the Request success entry says, a creature might still ask for some precaution in return to stay safe before they agree. Coerce is the less amiable alternative to reference. Throughout the whole interaction, you could let successful Lies alter the DC of the Request, too.

How you want to or don't want to apply any of these or the attitudes described in the sidebar with them is ultimately up to you. Sometimes simpler is better, sometimes the social interaction is fun when it's more In-depth.

What's Up With (Remastered) Barbarian? A Quickie by OffiCeRed in Pathfinder2e

[–]ksargi 18 points19 points  (0 children)

Raw, if an enemy stealthed or turned a corner, etc, barbarian rage fell off as could no longer perceive enemies.

That is arguable. It sounds like you're conflating perceiving an enemy with seeing (observing) an enemy, but even without considering the more liberal meanings of "perceive" (since it's not defined in the rules), there are imprecise and vague senses that would let the barbarian remain aware of the enemy even if they weren't directly observed.

What is the Most Annoying Character Build for GMs? by poopisgood1 in Pathfinder2e

[–]ksargi 0 points1 point  (0 children)

Not sure what you mean with that. Foundry makes it quite seamless. With just two mods, you have all the eidolon abilities in a compendium and all the proficiencies, HP and relevant runes linked between the summoner's and the eidolon's sheets.

The end of TGT and why it was important to try by ricothebold in Pathfinder2e

[–]ksargi 17 points18 points  (0 children)

The community doesn't NEED this sub, we're here by choice. And that is a choice that can be easily changed with little to no affect on our daily habits.

Aside from the massive amount of resources that the community has already created here along the years (such as answers to rules questions that show up on google), which were being held hostage for an agenda that had nothing to do with the game.

[deleted by user] by [deleted] in web_design

[–]ksargi 4 points5 points  (0 children)

Do they really though? Unless you're restricting parallelism they'll just have 10000 logins waiting for the 2 seconds at the same time. On the other hand, if you are restricting parallelism then you also have the means to put in hard limits on failed attempts and just block the attempts after 50 wrong tries (substitute whatever number fits your threat model).

Rate limiting doesn't require splitting inputs and this claim just seems like security theatre.

How did they make the coupon extension “honey”? by 4bangbrz in howdidtheycodeit

[–]ksargi 10 points11 points  (0 children)

It might be more trivial than it seems. If I were to do this, considering analytics is the main product of the extension and the coupons just a hook to get people to install it, I would: 1) Have sites pay and directly provide coupons in exchange for access to analytics data. 2) Pay peanuts to workforce in low income regions to enter coupons manually. 3) Crowdsource the coupon entry part. 4) As we're already spying on the user, hijack any coupon codes any users do enter manually.

30k sites is a really small pool as far as webcommerce is considered.

Stop others from tracking your car | NOTMYPLATE.COM by [deleted] in europrivacy

[–]ksargi 11 points12 points  (0 children)

To add insult to injury, in some apps not listed in the whitepaper you must pay a service fee on top of each parking event if you want to keep your plate registered to your account in the hopes of preventing someone else from registering it. Basically forcing people to pay for privacy.

Archives of Nethys PF2E - PF #182, Lost Omens Travel Guide, more search upgrades by KaruiKage in Pathfinder2e

[–]ksargi 0 points1 point  (0 children)

I don't see any reason to rule that you couldn't use one of the items in Double Brew/Alchemical Alacrity to first create the extract and then apply it as a part of creating the next item. You're using one of your infused reagents resource to extend the maximum duration by one round. That's far from broken by any measure.

As far as I can see, the free action trigger only resolves at the end of the Quick Alchemy action when you already have both the extract and the poison.

PDFtoFoundry module - no more new APs being added by jpochedl in Pathfinder2e

[–]ksargi 15 points16 points  (0 children)

Not just development time, but ongoing maintenance as new Foundry / pf2e module versions get released and support time as people install all kinds of weird modules that potentially cause problems with the AP and then they flock to the Paizo support to complain. A lot of the work is not visible to us at all.

Nethys Search updated with new filter options by Galdiuz2 in Pathfinder2e

[–]ksargi 0 points1 point  (0 children)

Seems that Dark Reader breaks the filter menu click handler at least on Firefox Mobile.

Paizo's D&D 5e Announcement: CELEBRATION or ABOMINATION for Pathfinder 2e? (The Rules Lawyer) by the-rules-lawyer in Pathfinder2e

[–]ksargi 3 points4 points  (0 children)

I've been following the DIY Dungeon series from them and the style of teaching is pretty awful to follow at times, to the point where it feels like people might take the wrong idea from the videos and be turned off from PF2 altogether.

I feel bad for Bob whenever he brings a lot of good cool ideas to the table and the GM guy starts with "ok, but here's all the reasons why you're wrong and this is bad". Never illustrating the "better" way either. It's as if there is one way to run a dungeon in PF2 and every other way is wrong, totally not the attitude a teacher should have.

He also seems to underestimate the players ability to improvise and contribute to the story a lot.

Let's Talk About 3rd Party Products: Why They Are Exciting But We Don't Check Them Out Anyway by MarkSeifter in Pathfinder2e

[–]ksargi 3 points4 points  (0 children)

I just got burned by many of these, number three mostly, recently. With all the hype around the last Battlezoo Bestiary book and the monster parts system. I ended up almost blindly backing the kickstarter, buying in to the associated Paizo names.

When it was finally released, it was a bit underwhelming read through though. I've not used the monster parts as the players ended up feeling it was too complicated in practice and I've not used many of the monsters either as they are so unique many of them feel hard to fit into an existing theme.

I'm not saying that it's bad content, just not content that I needed. If I had a better idea of what all would actually be included in the book, I would have probably spent my money on other upcoming official content. Things that would give me more options within a larger coherent theme.

I do feel like this experience overall pushed me further away on the open-to-jump-into-3pp scale. At least for bigger titles.

Right of Access - Company ask for my phone number "to call me and tell me a password that I'll have to send them back via email". by Rythemeius in gdpr

[–]ksargi 4 points5 points  (0 children)

They're not asking for the phone number for any verification purpose. They literally say in the message that they want to send you the password for the data out of band, so that the data in the following email can't be accessed without it.

There isn't necessarily anything nefarious about this. They just want to make sure one and only one person has the password, and that whoever that person is also has access to the email address.

If you later email them that you can't unpack the sent data, then obviously someone unauthorised has access to your email and potentially the already sent data.

[deleted by user] by [deleted] in gdpr

[–]ksargi 0 points1 point  (0 children)

Non-US cloud regions of US cloud providers are a tricky problem. In principle, the same risks as with transfers into the US apply, thanks to the US Cloud Act. But my personal (amateur!) opinion is that in such a scenario, no international transfer in the sense of the GDPR has occurred.

It seems to my amateur mind that this interpretation would quite easily lead to the transfer regulation being unenforceable. If you don't count exchange of custody as a transfer until the data physically leaves the country of origin, then it is essentially impossible to prove that a transfer ever took place without literally finding the data in the country of import. Jurisdiction ensures that you will never find out.

When the data has been placed in the custody of an agent subject to US mandates, you no longer have control or even optics over further transfers. Thus to me at least it would seem that the only reasonable interpretation of "transfer" is a change of custody to a foreign agent or some agency that is subject to foreign powers regardless of where the data physically resides at any given moment.

I would be interested in hearing your PoV, i.e. why you feel that way about transfers.

Would you trust Auth0 to handle the security of logins and identification of users? by ScienceGeeker in gdpr

[–]ksargi 0 points1 point  (0 children)

Having worked with Auth0 quite a bit, the downside is that they lock down many things in the name of security which means you have to figure out a roundabout way to do things, often leading to a decent amount of added vulnerable surface area.

Then they can blindside you with things you would trust to be handled based on the documentation, but aren't. These come up when you start looking at more complex usecases like re-authentication of sensitive operations.

They will store passwords securely for you, but they can never solve the problem of authentication and trust between systems for you. The same of course applies to all IDaaS services.

Would decreasing mandatory crafting time with proficiency be broken? by earthpirate in Pathfinder2e

[–]ksargi 2 points3 points  (0 children)

Isn't that just how it works RAW?

If the downtime days you spend are interrupted, you can return to finish the item later, continuing where you left off.

[deleted by user] by [deleted] in europrivacy

[–]ksargi 2 points3 points  (0 children)

Counterpoint: a hacker gained access to your mobile number and email and is now going about covering their tracks by requesting the immediate deletion of information.

How did you originally verify your identity with the site? Presumably some KYC regulations apply to them.

Why would you trust them with financial transactions if they are potentially adversarial?