Is there official clarification how firbolg’s Hidden Step interacts with delayed damage/save effects?

The playable Firbolg race from Volo’s Guide to Monsters has the Hidden Step racial feature (emphasis mine):

Hidden Step. As a bonus action, you can magically turn invisible until the start of your next turn or until you attack, make a damage roll, or force someone to make a saving throw. Once you use this trait, you can’t use it again until you finish a short or long rest.

I can see how the text says it works, but there are situations where its wording ends invisibility without you taking any offensive action. That’s really unusual for invisibility effects.

(For example, the spell Booming Blade makes you make a damage roll for the spell later, but it’s not you personally taking new offensive action: it deals damage when a previously-hit opponent moves before the caster’s next turn.)

Therefore my question: Have any errata or developer statements been made that clarify if “passive” delayed damage rolls or saving throws aren’t meant to end Hidden Step?

I’m specifically looking for official statements clarifying this exact kind of interaction. Interpretations based on the text aren’t useful answers because I can already see how the interaction works absent errata, and speculation on the intention aren’t official clarification.

I myself have been unable to find an official statement that clarifies this issue, only this statement, which confirms that you are allowed to cast beneficial spells.

I need a witch (or other) to summon/dominate/find Lightning birds at sea while hidden on a ship [on hold]

The PCs (3 at 3rd level) are on a disabled, abandoned pirate ship at sea in a storm. I want them to have hard encounters that become somewhat predictable and that they can put a stop to, so that they can concentrate on getting out of the situation. My idea is that there is a hidden pirate witch on board that can get a lightning bird to attack once a day, or something, but that she needs to burn incense as a consumable part of the spell. Players smell incense, Lightning bird attacks, players can find source of incense, kill witch.

The trouble is I can’t find a reasonable way to do that in 5e. Familiars can’t attack, dominate beasts requires being able to see it, and I don’t see a summon monster spell except from a demon or something.

The lightning bird (homebrew) says that are associated with being servants or familiars of witchs but that is no good if it can’t attack. Any ideas? Thanks in advance.

Burrowing – Effects on Surprise and Hidden Attacks?

I’m running a campaign that the players are about to encounter several burrowing creatures. The creatures in question do have Tremorsense so they’ll be able to tell where the players are and with good burrowing speed should be capable of ambushing them. I’m just curious about two things:

  1. Can I roll Stealth (or do I even need to) to have them hidden underground before jumping out and attacking. Hopefully causing players to be surprised.
  2. Since they are entirely hidden beneath the ground, does that mean their first strike burrowing out of the ground counts as hidden and gives them advantage?

Is there some hidden worm attached with whatsapp messages that state forward this messgae to 20 people?

Usually I see messages on whatsapp and sometime on some other forums stating that forward this message to Ten or Twenty people and don’t ignore. Apparently, there is nothing visible that could benefit that message writer. But still people write and innocent people do forward it. Yes, sometimes they include links saying click and get recharge which is obviously risky but I am more interested in the one that don’t contain any link or are even voice notes.

Example:

✅ FINAL NOTICE “Dont ignore please read it carefully” Hello, I. Am JUAN CARLOS director of whatsapp, this message is to inform all of our users that we have sold whatsapp to Mark Zuckerberg for 19 billion $ . WhatsApp is now controlled by mark zuckerberg. If you have at least 20 contacts send this sms and logo of your whatsapp will change to a new icon with facebook’s “f” within 24 hours.Forward this message to more than 10 people to activate your new whatsapp with facebook services or else your account will be deleted from new servers. This is the final notice! Hello everyone, it seems that all the warnings were real, the use of WhatsApp cost money from summer 2017. If you send this string to 20 different on your list, your icon will be blue and will be free for you. If you do not believe me see tomorrow at 6 pm ending WhatsApp and have to pay to open it, this is by law This message is to inform all of our users, our servers have recently been very congested, so we are asking you to help us solve this problem. We require our active users to forward this message to each of the people in your contact list to confirm our active users using WhatsApp, if you do not send this message to all your contacts WhatsApp will then start to charge you. Your account will remain inactive with the consequence of losing all your contacts. Message from Jim Balsamic (CEO of Whatsapp ) we have had an over usage of user names on whatsapp Messenger. We are requesting all users to forward this message to their entire contact list. If you do not forward this message, we will take it as your account is invalid and it will be deleted within the next 48 hours. Please DO NOT ignore this message or whatsapp will no longer recognise your activation. If you wish to re-activate your account after it has been deleted, a charge of 25.00 will be added to your monthly bill. We are also aware of the issue involving the pictures updates not showing. We are working diligently at fixing this problem and it will be up and running as soon as possible. Thank you for your cooperation from the Whatsapp team” WhatsApp is going to cost us money soon. The only way that it will stay free is if you are a frequent user i.e. you have at least 10 people you are chatting with. To become a frequent user send this message to 10 people who receive it (2 ticks) and your WhatsApp logo should turn blue.

Forward this message to all WhatsApp contact.

Some other samples are here.

How risky is connecting to a hidden wireless network?

According to something I spotted something in a set of directions for connecting to a hidden wireless network from windows 8 found here (located under Step 1 > “Troubleshoot connection problems” > “How do I connect to a hidden wireless network?”):

A hidden wireless network is a wireless network that isn’t broadcasting its network ID (SSID). Typically, wireless networks broadcast their name, and your PC “listens” for the name of the network that it wants to connect to. Because a hidden network doesn’t broadcast, your PC can’t find it, so the network has to find your PC. For this to happen, your PC must broadcast both the name of the network it’s looking for and its own name. In this situation, other PCs “listening” for networks will know the name of your PC as well as the network you’re connected to, which increases the risk of your PC being attacked. (emphasis added)

I had always believed that hidden wireless networks were actually safer than normal ones, because only those who already know of the network are able to connect to it, so an attacker wouldn’t be able to connect to it to listen to your traffic.

Are hidden networks actually more risky, as the paragraph says, and if so, what measures can be taken to help mitigate the risk?

Also, I know that there are some countries where publicly broadcasting home networks are actually illegal, and hidden networks are the only option for wireless. If broadcasting networks are safer, why are they illegal in some places?

Mount Hidden From Root User

I have a bizarre issue with mount. The root user cannot see a mount that was created by PHP/Apache running a bash script as root.

Steps to recreate the issue:

  • Configure fstab for mount point:

    vim /etc/fstab

    /path_to_shared/resource /path_to_local/folder auto defaults,nofail,nobootwait,bind 0 2

  • Create a Bash Script.

  • Configure Apache to be able to run the bash script as root.
  • In bash script mount the shared resource: mount /path_to_local/folder

Steps to configure apache to be able to run a script as root:

  • visudo
  • www-data ALL=(ALL) NOPASSWD: /path_to_script/script.sh *

When this is done, root is unable to see the contents of the mounted resource (/path_to_shared/resource) inside the mounted folder (/path_to_local/folder).

If I manually run the same command as root, then root is able to see the mount contents. But when the command is run by Apache root is unable to see the contents of the mount, while Apache can see the contents of the mount.

Example #1:

In this example, the Apache User is able to see the contents of the mounted folder it mounted using the bash script.

PHP/Apache get directory list:

scandir(“/path_to_local/folder”)

Shows the contents of /path_to_shared/resource.

Example #2:

In this example, the root user is unable to see the contents of the folder that Apache mounted.

root@server~: ls -al /path_to_local/folder

Shows no folder contents.

Example #3:

In this example, the root user manually runs the mount command. After doing so, the root user can see the mount. This is an example to show that the same command run as root from a command prompt works.

root@server~: mount /path_to_local/folder

root@server~: ls -al /path_to_local/folder

Shows the contents of /path_to_shared/resource.

What saving throw is needed for the Cursed Treasure in the Hidden Shrine of Tamoachan?

Included in the Tales from the Yawning Portal, The Hidden Shrine of Tamoachan adventure has some Cursed Treasure in area 29: “The Tomb of Pelota” (pg. 78)

What kind of saving throw is needed, by which I mean what ability does it use? The adventure text doesn’t say.

Can the PCs make either Strength or Dexterity saving throws because those are the abilities affected by the curse? That doesn’t make much sense, since usually curses are resisted by mental stats…

I never hid my comment on Facebook but it was hidden. Does this happen?

I’ve read many posts about Facebook’s hiding comments feature and have also experienced it first-hand.

My experience is that either OP can hide comments or you can choose to hide a particular person’s comment.

However, is it possible that other people can hide my own comment from myself? I got a notification that someone liked my comment and checked it, and it says “This comment has been hidden” in gray text, despite me having no recollection of having hidden it.

Is this how hiding comments normally works?

Denormalize a binary number with hidden bit

For the binary representation with hidden bit the normalized representation is like the following:

$ $ x = \pm 1.d_1d_2\ldots d_t \cdot \beta^{E}$ $

Considering the following formula the denormalization: $ $ \begin{align} x &= \pm 2^0 + \beta^E \sum_{i=1}^{t} d_i \cdot \beta^{-i} \ &= \pm 1 + \sum_{i=1}^{t} d_i \cdot \beta^{E-i} \end{align}$ $

where: $ \beta$ is the base, $ E$ is the exponent.


If we start from the number $ 0.011$ . If I am right I obtain that:
– the normalized number would be : $ 0.11 \cdot 2^{-1}$
– the normalized with hidden bit would be: $ 1.1 \cdot 2^{-2}$

so using the above formula, if I insert the digits from last number, then I should obtain the first number: $ $ \begin{align} x &= \pm1+1\cdot2^{-2-1} \ & = \pm1 + 2^{-3} \ & = \pm 1 + 0.001 \ & = 1 + 0.001 \ & = 1.001 \end{align}$ $ but it is not the number $ 0.011$ from where I started. So does the error reside in my way of proceeding or the formula given?