## Is there official clarification how firbolg’s Hidden Step interacts with delayed damage/save effects?

The playable Firbolg race from Volo’s Guide to Monsters has the Hidden Step racial feature (emphasis mine):

Hidden Step. As a bonus action, you can magically turn invisible until the start of your next turn or until you attack, make a damage roll, or force someone to make a saving throw. Once you use this trait, you can’t use it again until you finish a short or long rest.

I can see how the text says it works, but there are situations where its wording ends invisibility without you taking any offensive action. That’s really unusual for invisibility effects.

(For example, the spell Booming Blade makes you make a damage roll for the spell later, but it’s not you personally taking new offensive action: it deals damage when a previously-hit opponent moves before the caster’s next turn.)

Therefore my question: Have any errata or developer statements been made that clarify if “passive” delayed damage rolls or saving throws aren’t meant to end Hidden Step?

I’m specifically looking for official statements clarifying this exact kind of interaction. Interpretations based on the text aren’t useful answers because I can already see how the interaction works absent errata, and speculation on the intention aren’t official clarification.

I myself have been unable to find an official statement that clarifies this issue, only this statement, which confirms that you are allowed to cast beneficial spells.

## Does a Firbolg’s Hidden Step count as a spell or cantrip?

I am making a Firbolg Druid, and I was wondering if the racial feature Hidden Step (Invisible as a Bonus Action) counts as a Spell or a Cantrip? I can’t find anything that specifically says. I want to possibly use a spell and then use the Hidden Step and move away.

## I need a witch (or other) to summon/dominate/find Lightning birds at sea while hidden on a ship [on hold]

The PCs (3 at 3rd level) are on a disabled, abandoned pirate ship at sea in a storm. I want them to have hard encounters that become somewhat predictable and that they can put a stop to, so that they can concentrate on getting out of the situation. My idea is that there is a hidden pirate witch on board that can get a lightning bird to attack once a day, or something, but that she needs to burn incense as a consumable part of the spell. Players smell incense, Lightning bird attacks, players can find source of incense, kill witch.

The trouble is I can’t find a reasonable way to do that in 5e. Familiars can’t attack, dominate beasts requires being able to see it, and I don’t see a summon monster spell except from a demon or something.

The lightning bird (homebrew) says that are associated with being servants or familiars of witchs but that is no good if it can’t attack. Any ideas? Thanks in advance.

## Burrowing – Effects on Surprise and Hidden Attacks?

I’m running a campaign that the players are about to encounter several burrowing creatures. The creatures in question do have Tremorsense so they’ll be able to tell where the players are and with good burrowing speed should be capable of ambushing them. I’m just curious about two things:

1. Can I roll Stealth (or do I even need to) to have them hidden underground before jumping out and attacking. Hopefully causing players to be surprised.
2. Since they are entirely hidden beneath the ground, does that mean their first strike burrowing out of the ground counts as hidden and gives them advantage?

## Is there some hidden worm attached with whatsapp messages that state forward this messgae to 20 people?

Usually I see messages on whatsapp and sometime on some other forums stating that forward this message to Ten or Twenty people and don’t ignore. Apparently, there is nothing visible that could benefit that message writer. But still people write and innocent people do forward it. Yes, sometimes they include links saying click and get recharge which is obviously risky but I am more interested in the one that don’t contain any link or are even voice notes.

Example:

Forward this message to all WhatsApp contact.

Some other samples are here.

## How risky is connecting to a hidden wireless network?

According to something I spotted something in a set of directions for connecting to a hidden wireless network from windows 8 found here (located under Step 1 > “Troubleshoot connection problems” > “How do I connect to a hidden wireless network?”):

I had always believed that hidden wireless networks were actually safer than normal ones, because only those who already know of the network are able to connect to it, so an attacker wouldn’t be able to connect to it to listen to your traffic.

Are hidden networks actually more risky, as the paragraph says, and if so, what measures can be taken to help mitigate the risk?

Also, I know that there are some countries where publicly broadcasting home networks are actually illegal, and hidden networks are the only option for wireless. If broadcasting networks are safer, why are they illegal in some places?

## Mount Hidden From Root User

I have a bizarre issue with mount. The root user cannot see a mount that was created by PHP/Apache running a bash script as root.

Steps to recreate the issue:

• Configure fstab for mount point:

vim /etc/fstab

/path_to_shared/resource /path_to_local/folder auto defaults,nofail,nobootwait,bind 0 2

• Create a Bash Script.

• Configure Apache to be able to run the bash script as root.
• In bash script mount the shared resource: mount /path_to_local/folder

Steps to configure apache to be able to run a script as root:

• visudo
• www-data ALL=(ALL) NOPASSWD: /path_to_script/script.sh *

When this is done, root is unable to see the contents of the mounted resource (/path_to_shared/resource) inside the mounted folder (/path_to_local/folder).

If I manually run the same command as root, then root is able to see the mount contents. But when the command is run by Apache root is unable to see the contents of the mount, while Apache can see the contents of the mount.

Example #1:

In this example, the Apache User is able to see the contents of the mounted folder it mounted using the bash script.

PHP/Apache get directory list:

scandir(“/path_to_local/folder”)

Shows the contents of /path_to_shared/resource.

Example #2:

In this example, the root user is unable to see the contents of the folder that Apache mounted.

root@server~: ls -al /path_to_local/folder

Shows no folder contents.

Example #3:

In this example, the root user manually runs the mount command. After doing so, the root user can see the mount. This is an example to show that the same command run as root from a command prompt works.

root@server~: mount /path_to_local/folder

root@server~: ls -al /path_to_local/folder

Shows the contents of /path_to_shared/resource.

## What saving throw is needed for the Cursed Treasure in the Hidden Shrine of Tamoachan?

Included in the Tales from the Yawning Portal, The Hidden Shrine of Tamoachan adventure has some Cursed Treasure in area 29: “The Tomb of Pelota” (pg. 78)

What kind of saving throw is needed, by which I mean what ability does it use? The adventure text doesn’t say.

Can the PCs make either Strength or Dexterity saving throws because those are the abilities affected by the curse? That doesn’t make much sense, since usually curses are resisted by mental stats…

## I never hid my comment on Facebook but it was hidden. Does this happen?

My experience is that either OP can hide comments or you can choose to hide a particular person’s comment.

However, is it possible that other people can hide my own comment from myself? I got a notification that someone liked my comment and checked it, and it says “This comment has been hidden” in gray text, despite me having no recollection of having hidden it.

Is this how hiding comments normally works?

## Denormalize a binary number with hidden bit

For the binary representation with hidden bit the normalized representation is like the following:

$$x = \pm 1.d_1d_2\ldots d_t \cdot \beta^{E}$$

Considering the following formula the denormalization: \begin{align} x &= \pm 2^0 + \beta^E \sum_{i=1}^{t} d_i \cdot \beta^{-i} \ &= \pm 1 + \sum_{i=1}^{t} d_i \cdot \beta^{E-i} \end{align}

where: $$\beta$$ is the base, $$E$$ is the exponent.

If we start from the number $$0.011$$. If I am right I obtain that:
– the normalized number would be : $$0.11 \cdot 2^{-1}$$
– the normalized with hidden bit would be: $$1.1 \cdot 2^{-2}$$

so using the above formula, if I insert the digits from last number, then I should obtain the first number: \begin{align} x &= \pm1+1\cdot2^{-2-1} \ & = \pm1 + 2^{-3} \ & = \pm 1 + 0.001 \ & = 1 + 0.001 \ & = 1.001 \end{align} but it is not the number $$0.011$$ from where I started. So does the error reside in my way of proceeding or the formula given?