Is there a lore explanation why each setting might have different deities?

As far as I know, the multiverse of D&D 5E consists in different worlds all residing in the Material Plane, but the rest of the planes (Transitive Planes, Inner Planes, Outer Planes…) are shared between them.

Is there a lore explanation why each setting might have different deities? Since deities exist in planes other than the Material Plane, shouldn’t those deities be the same in every setting?

What might attract a demon(ess) to become BFFs with a mortal?

My players got into an interesting philosophical debate about the nature of Fiends that, in a rather roundabout way, boiled down to the question of Nature vs. Nurture — does Fiendish blood make one innately and irredeemably evil, or can a herculean effort ultimately move the needle towards selflessness?

As these things go, the discussion concluded with a harebrained scheme: to become “besties” with a demon.

I know that by 5e’s cosmology, the answer is clearly, “No. Evil outsiders is as Evil outsiders does.” But the campaign is nearing its end, and if anyone has a shot of pulling this off, well, you could do worse than a 19th level bard with his reputation on the line!

I’m looking for suggestions on what our intrepid idealist might do to both attract, capture, and then consume the attention of one or more “friends in low places”, and any guidance on what kind of notice this might garner from other interested parties — slaying jealous rival fiends seems sure to come up, but would these extraplanar exploits garner any recognition from the upper planes?

What could our dear, deluded bard offer that a demoness couldn’t lie, steal, or slaughter for herself?

Phishing attempt?? – EML attachment from a “trusted source” might be urgent and important, or malware / phishing

I don’t usually feel competent enough to ask decent questions, let alone answer one here. But, this is rather urgent, so please be patient with me:

I CANNOT tell if the “secure encrypted message” I got in an email from a “state agency” was genuine or malware! I was somewhat (reluctantly) expecting an email from that department and their email signature appeared genuine. Unfortunately, they may or may not have attached that file, which purportedly contained the message body as an *.EML “secure attachment message”.

I couldn’t open the secure message attachment, which was the first clue of something amiss. (I also do NOT want to call them, and then have them read me the message, which would trigger a conversation I’m not prepared for, without first knowing what the message was about.)

As I started working hard to open the attachment. As I failed and researched more, my findings appeared more and more ominous. I will keep this question UPDATED with any missing details.
SUMMARY:

  • Received seemingly valid email from a known state agency, known person, known division I do business with.
  • Plain text message body:
    “Please find the attached.” [?? Odd wording –> “‘FIND‘ the attached” ??]
  • The [real] message was attached, encrypted, and only viewable by the email recipient that it was addressed to. The attachment then had to be opened by the email client, (Gmail-web). I’ve done this before once or twice, so it is a pain, but not unheard of.
  • Email ATTACHMENT was then “viewed in a an NEW WINDOW” in Chrome and Vivaldi with similar if not the same results: https://mail.google.com/mail/u/0/?????????????..[etc.]/: WHICH SAID:

[ERROR MESSAGE FROM GOOGLE MAIL:]
“You are viewing an attached message. COMPANY Mail can’t verify the authenticity of attached messages. Your document has been completed”

“VIEW COMPLETED DOCUMENTS:”
[LINK GOES TO: https://www.notion.so/(KNOWN_AGENCY_-_GUID)/]

“Ms. [known person]”
“[Known State Agency]”

  • After clicking on the link from the popup shown above, it opened a new TAB in my email browser’s page at this URI: https://www.notion.so/(KNOWN_AGENCY_-_GUID)/ which said the following:

“[KNOWN STATE AGENCY]”
“This PDF is password protected ,”   “[KNOWN PERSON] sent you an important vital file to review.”

“REVIEW FILE HERE:”
[LINK GOES TO: https://fafanfan.tk/000/nsw/data/UntitledNotebook1.html ] 

“Please take a look and let me know if these are ready to print.”
[ HUH?? Why let you know?? And, why print, instead of view?? ] 
“Kindly open with your professional email.”
[ HUH?? “Kindly”, “Professional email”?? Who talks like this?? ]
“Login with your email and password to view file.”

  • So, then I clicked on the email link and TRIED to log into my company GMAIL account.
  • It appeared to log into my account successfully, but then said I had to verify my account and to provide [either the] recovery phone or recovery email address
  • I provided a valid phone #, which failed with an error.
  • Then I tried my valid recovery email address, which also failed with an error.
  • I tried both Vivaldi and Chrome, and all failed each time. (I assumed that it opened a window without cookies, so the login to Google was from a new, unknown page.)

At this point, I started Googling the URI’s and other things —

  • Hmmm strange domains [TLD].TK ?? Searched the URI = NO hits.
  • Searched [TLD].TK — not good — It said 95% of the .TK traffic is malware / spam.
  • Searched the other URI shown above = NO hits. NOT cool.
  • I changed all my email PW’s. I checked for odd logins, but saw nothing odd. (If I provided my credentials to the bad guys, they are a bit slow today. So maybe I dodged a bullet.)
  • I Checked/scanned the downloaded file with Windows Defender — no detection
  • I submitted the file to Virus Total — no detection by anyone.
  • I also submitted the two URI’s shown above, and came up with only one hit from an unknown security company, who likely flagged the *.TK as possibly a “bad URI”.

At this point, I’m not at all sure what to do… I do NOT want to call them and start a conversation that might later deny “plausible deniability that I received this notice”. OTOH, I can’t ignore it too long, either.

RANT: I hate all these “protections”, that invite malware to be easily inserted. Then, you are relying on ordinary users to figure out if the attachments are safe?? Few users are smart enough, and I know that I’m not. (Although I’m not a total security idiot, as I’m more cautious and knowledgeable most than anyone I know.)
If Adobe wants to provide tools like this, fine. Then please make it much easier and obviously safe for both senders and [very novice] readers. For instance, use Adobe.com URI’s and never TLD’s that are also used for malware. If providing security tools, please don’t rely on these agencies’ IT staff to try to train equip their users to properly use these tools with the public, most of whom have never opened a “secure attachment”, let alone know how to open them (OR NOT), safely.

What challenges might I expect from switching to online DMing from exclusively tabletop?

Because of COVID-19 our exclusively in-person sessions are going entirely online. We have downloaded roll 20, and we have voice chat, but beyond that we are fish out of water in the new medium.

What challenges might I expect from switching to online DMing from exclusively tabletop?

Which of these devices might slow down processor?

I have test question.

Which devices inside processor are used to speed up work indirectly i.e. program isn’t executing a code for that device?

Possible answers: DRAM | Cache | Pipeline | GPU | RAM | ARM | Stack | FPU

I think we can immediately say, that DRAM, GPU, & RAM is wrong picks, because they are not inside cpu – they are different parts of computer. Also stack is inside RAM, not CPU. So left answers are cache, pipeline, arm & fpu? Also not sure about floating point number.

Why since I configured my smartphone APN protocol to IPv4/IPv6 I (might) only have IPv6 addresses?

About a week ago I configured my smartphone Access Point Name (APN) of the type APN protocol from including the value IPv4 to including the value IPv4/IPv6, all IP addresses I recognized for my smartphone were IPv6 addresses.
I didn’t change the value for the APN type APN roaming protocol → its value is still IPv4 only.

I understand I can now have both IPv4 addresses and IPv6 addresses but the purpose of the following question is to understand the tendency I personally recognize for IPv6 (only?) addresses for my smartphone.

Why since I configured my smartphone APN protocol to IPv4/IPv6 I (might) only have IPv6 addresses? Is it a coincidence or the cause of some global standard cellular operators are now following?

Why multiple rotations might be needed after deletion in an AVL tree if after insertion there can be at most one needed?

I understand that after deletion you have to retrace to update ancestors and after insertion you do the similar however at most one rotation will be performed.

The question is why is there the difference in number of potential rotations for these two operations.

To me it seems like these operations should be the reverse of each other but this difference in their properties suggests they’re not. Why?

How might we help customers get back on track from a connection timeout message

I’m designing ‘sad path’ scenarios for checkout and I’m trying to design for helping customers when a connection timeout occurs when the checkout hangs trying to connect to our 3rd party credit card payment form.

When this happens the credit payment form could not get loaded in our checkout environment.

A simple solution is to reload the page.

The UX/UI solution I’m putting forward is an alert message that appears on the page and asks the customer to reload the page.

This is my attempt at making the error message more ‘user-friendly’:


A connection error occurred

An error occurred when we were trying to connect to the system.

Please reload the page to try connecting again.

[ Reload page ] <— button


How do people feel about the above message? Any other solutions you can think of?

Thanks.

Is an artificer’s homunculus servant’s passive Perception affected by its Might of the Master trait?

An Artificer’s homunculus servant has the following ability:

Might of the Master. The following numbers increase by 1 when your proficiency bonus increases by 1: the homunculus’s skill and saving throw bonuses (above) and the bonuses to hit and damage of its attack (below).

One of the the listed skill bonuses is +4 to perception. In addition, the homunculus also starts with a passive perception score of 14, consistent with that perception bonus. Does this passive perception score increase along with the homunculus’ perception bonus when the Artificer’s proficiency bonus increases? For example, what is the passive perception score for a homunculus controlled by a level 5 artificer (whose proficiency bonus is +3)?

How does Might of the Master for the Homunculus Servant REALLY work?

So I have a question about Might of the Master. Might of the master says this:

The following numbers increase by 1 when your proficiency bonus increases by 1: the homunculus’s skill and saving throw bonuses (above) and the bonuses to hit and damage of its attack (below).

However, that is pretty vague now that it isn’t a core class trait. When it was a UA Artificer class skill, it was given to you as an Alchemist at level 3. So I had assumed that meant that it would get +1 to all the traits from that point on whenever you increased your proficiency modifier. Thing is, it isn’t given to you anymore. It’s an infusion you can choose at level 6. So… does your homunculus:

1) get your proficiency bonus as a whole added to its stats (so +3 to everything at level 6, increased to +4 at 9, +5 at 13 and +6 at 17),

2) does it get +1 to its stats every time your prof increases from the point when you make it (so if you made it at level 17, it never gets any better than its base stats because your proficiency modifiers never increase from then on), or

3) does it get +1 to its stats from every point your proficiency increases from when you COULD make it (level 6 on)?

What do you all think? Because it got a whole lot more vague when it didn’t become a core class feature.