I am the keymaster.
5.6K posts

I am the keymaster.
@commilingus
they/them; BLM; falterious maximus, always glorious; under no pretext; free palestine;






last year was tough but i never fell for the dubai chocolate stuff

Avoidant people should date Avoidant people ( No disrespect intended) Don't ruin the nervous system of emotional, anxious people who communicate and love with all they have.



I take edibles before bed & on rare occasion I’ll smoke a bowl cuz it feels nice. Im far from being anti-pot, but man, I find people like Seth Rogan who make being high the totality of their personality just repulsive. Like yea man, you love being high. Cool. We get it…













another W facebook marketplace find this chair retails at almost $2k got it for 75


@robjpalmer have you tried walking around like you're 75% water? like literally. like you're a bag of skin filled with water inside how would that change every movement of yours? - walking along - rolling in your sleep - sitting down - standing up - fucking even every damn movement

For some mathematicians, it's not just the coffee they drink, but the mug they drink it in.






















If you use a personal phone/laptop for your work, pay very close attention to this little detail. Iran attackers wipe 200k devices at a company called Stryker. Within those devices appears to be employees PERSONAL devices. The attackers used the company’s MDM software, which is basically IT management software running on everything. It’s an incredibly attractive backdoor to an attacker. I successfully targeted MDM software for several Red Team engagements. It’s… lots of fun :) Anyway, a lot of companies require you to install their MDM software on your personal devices before you can access resources like Corp email. It’s used to keep devices updated, lock things down if they get stolen, etc. The company often promises that they won’t access personal data, erase any personal data, etc. But this is often ONLY POLICY. If a bad actor gains access to the MDM tool, as was the case here, then anything can happen. People should be aware of these risks. I refused to run MDM software on any of my personal devices. The company needs to provide me with hardware if they want that. I personally isolate all corp devices to their own network too. If an adversary can get into the corp laptop, then can then get inside my network… there have been cases of it happening in the past.





