Also for that same module, is it able to integrate it in a broader campaign. I expanded the lore and why the players got here with extra quests, fluff and mystery and they only reached said dungeon at 2nd session only.
Also the way a PC died due to a rat bite that could only be cured by magic (5e of this module is ironically harsher than the 3.5) as he was losing max HP every 24H.
As the players expressed dislike with that character the owning player was willing to go for a new character and I had planned a big drama scene where the players exit in emergency the dungeon and try to rally the nearet village where there's a priestessd and happens that I could match the rolls so he would die in the priestess hands.
But I made the mistake to allow them to spend the night to get their 3rd level which would have allowed the druid to get his cure illnesses spell botching the set up.
Happens that I decided to exploit the fact that all other character the previous days made an offering to Beshaba to curse that character and force rolls during night (and try to find a way to make the new character come into play).
How it unfolded :
- they were sleeping and it was the bard's turn for watch
- the bard was a follower of Tharizdun and was about to sacrifice the dieing character as said character was agonizing
- the new character was a Kara-turian enforcer that was chasing a yokai (he didn't knew) that used other people as disguise, made it happen that the yokai choose the dieing character "by coincidence" appearance
- the yokai being chased opens a portal while hiding to the dungeon
- the new character litteraly pops through a Wild Magic portal that pushed away the bard and tries to bash the old character as the old character runes on his skin glow a last time as he dies and repels everybody
- made the new character pop naked as I wasn't paying attention to what the player was saying when he was listing his inventory
I just want to point out that for years Microsoft told us to abandon WinForms and jump on WPF. Now we're years later and Winforms keeps getting new features.
This is at best another forensic tool (unlocking the TPM of a locked laptop/phone for prosecution) and at worst a red herring for security flag.
- Clone a passport -> why cloning if you can issue new ones - getting risked being detected while using a clone (2 entries in 2 different countries, and you also need to look like the person) not to mention you have to destroy the passport
- Phone enclaves -> see above
- Crypto -> Hardware wallets should be kept on eye as badly as your normal wallet
- SIM Cards -> Swapping is faster, or if you're the the gov, just an intercept warrant will do the trick
- Laptops -> see above
- EMV Chips -> If you have those skills and money, I don't think you'll lose time on cloning credit/debit cards
> - Clone a passport -> why cloning if you can issue new ones - getting risked being detected while using a clone (2 entries in 2 different countries, and you also need to look like the person) not to mention you have to destroy the passport
Well... not really. ICAO compliant passports do not require storing a photo embedded in the chip, as long as you can forge the physical part of the passport (or obtain blanks) you just need the digital certificates from a "donor" passport of John Doe, print "John Doe" and his personal data (birth day/place, nationality, issuance/expiry data) on the human readable and MRZ fields, but crucially the photo of the person using the forgery.
Also, there are no centralized, cross country stores of entry/departure. Lots of places don't even register it for visa-free border crossings.
Some national ID documents, e.g. the Croatian national ID card "osobna iskaznica", do store a photo embedded in the chip, so that indeed restricts a forgery from being used by a non-lookalike.
> ICAO compliant passports do not require storing a photo embedded in the chip
That's completely on the issuing country then, though, just like they e.g. might choose to not use dynamic chip authentication, which also makes the passport subject to trivial chip cloning.
I wouldn't be surprised if some e-border gates reject travel documents that don't support chip authentication or don't have a digital version of the photo covered by the issuer signature.
Well... not really, from the viewpoint of a bank. Look, now the user can extract the key that the bank TOTP app carefully keeps, and transfer it to another (rooted) device, or use without a phone at all, meaning that this app is no longer a "something unclonable that you have" authentication factor. From a risk management and compliance perspective, that's a contract breach: the bank is legally obliged to store that secret securely, so that the user is guaranteed to complain if it could have been used by someone else.
Works for me. I always start a new context and be as concise as possible. The AI totally gives me 3 ways. Safe marshalling first and then deriving on the memcopy
In US, rear underrun has been required for longer than I knew about these things. Considering miles travelled and risk and limited funds, side underrun funds are better spent on other safety items.
WITH [WITH] AS (
SELECT [AS], [IN], [ON]
FROM [UNION]
WHERE [AND] = [OR]
),
[OUTER] AS (
SELECT [LEFT], [RIGHT], [FULL]
FROM [CROSS]
WHERE [INNER] = [OUTER]
),
[GROUP] AS (
SELECT COUNT(*) AS [HAVING]
FROM [ORDER]
GROUP BY [GROUP]
HAVING COUNT(*) > 1
)
SELECT
[WITH].[AS],
[OUTER].[LEFT],
[GROUP].[HAVING]
FROM
[WITH]
JOIN
[OUTER]
ON
[WITH].[IN] = [OUTER].[RIGHT]
LEFT JOIN
[GROUP]
ON
[WITH].[ON] = [GROUP].[HAVING]
WHERE
[WITH].[AS] = [OUTER].[LEFT]
AND
([GROUP].[HAVING] IS NULL OR [GROUP].[HAVING] > 1)
ORDER BY
[WITH].[AS] ASC;
Also the way a PC died due to a rat bite that could only be cured by magic (5e of this module is ironically harsher than the 3.5) as he was losing max HP every 24H. As the players expressed dislike with that character the owning player was willing to go for a new character and I had planned a big drama scene where the players exit in emergency the dungeon and try to rally the nearet village where there's a priestessd and happens that I could match the rolls so he would die in the priestess hands.
But I made the mistake to allow them to spend the night to get their 3rd level which would have allowed the druid to get his cure illnesses spell botching the set up.
Happens that I decided to exploit the fact that all other character the previous days made an offering to Beshaba to curse that character and force rolls during night (and try to find a way to make the new character come into play).
How it unfolded : - they were sleeping and it was the bard's turn for watch
- the bard was a follower of Tharizdun and was about to sacrifice the dieing character as said character was agonizing
- the new character was a Kara-turian enforcer that was chasing a yokai (he didn't knew) that used other people as disguise, made it happen that the yokai choose the dieing character "by coincidence" appearance
- the yokai being chased opens a portal while hiding to the dungeon
- the new character litteraly pops through a Wild Magic portal that pushed away the bard and tries to bash the old character as the old character runes on his skin glow a last time as he dies and repels everybody
- made the new character pop naked as I wasn't paying attention to what the player was saying when he was listing his inventory
- I let them handle the big mess
reply