I have a core SMT solver problem consisting of 100,000 bit-vector array clauses, and one 10000-dimensional bit-vector array. Then, my program takes as input k << 100,000 new clauses, and adds them to the core SMT problem. My goal is, for any input of k clauses, to solve the entire problem.
Is there any static optimization or learning I could do on the core problem in order to find a better way to solve each of its siblings? For instance, is there some property of the graph of bit-vector variables being constrained in each clause that I could use as a heuristic for solving the specific instances?
Choose a willing creature that you can see within range. Until the spell ends, […] it gains an additional action on each of its turns. That action can be used only to take the Attack (one weapon attack only), Dash, Disengage, Hide, or Use an Object action.
This obviously does not allow to use any other actions that you can usually use, like casting a spell, as the more specific rule beats the general rule of what actions can be used. But what if some other specific effect grants additional option to use an action for? For example say an Assassin Vine has entangled me, that grants me the additional action option of breaking free from the vines:
A creature restrained by the plants can use its action to make a DC 13 Strength (Athletics) check, freeing itself on a successful check.
Can I use my haste action to try to break free?
As far as I can tell, I have two specific rules contradicting each other. If there is no official ruling on this, does anyone know what be ruled in AL?
I am making a character who is a conspiracy theorist. If the setting were the modern world he would see the touch of the Illuminati on everything that happens, and talk about the secret cabal that rule the world.
Is there anything in lore (5th edition, Forgotten Realms preferably, but any edition and any setting is acceptable) that has a similar theme?
I know there are secret organisations such as the Harpers, but the lore I am aware of doesn’t involve directly trying to control the world through subtle means.
Bonus question if there is no such lore: Is there any lore or organisation that would be directly responsible for ensuring no such organisation could exist?
I mean harmful by the fact that they might have ads, popups or other ways in which they might transfer malware to my phone or exploit vulnerabilities. And by visiting I mean interacting, clicking on items found on them, playing videos on them, like adult sites for an example of such a website.
Is there a sandbox or a VM on such Android phone that might help? Or am I secured if I have a basic antivirus, NoScript and an adblocker? Is there any you would recommend?
The Black Butler anime series centers around a bodyguard / butler with, shall we say, a demonic flair. I would love to play a similar class in our upcoming Avernus campaign (say a subclass of fighter or monk, or maybe even a hybrid). I’ve found a couple of homebrew options, such as this Way of the Demon Fist monk subclass.
However, I was wondering if there is a subclass in the official source materials that matches what I’m looking. Homebrew is okay (though not preferred) – so if there are well-used homebrew options that you know of, that would be useful as well.
- Unarmed strike capabilities (a la monks)
- Perhaps some sort of eldritch or hellfire-type magic ability
Why do people use burner phones rather than Signal or similar? I would imagine that if you are high value target the police or intelligence service would simply eavesdrop every phone call passing the base station nearest the location where you dwell. Doing that then it is easy to filter out all phone calls made between phone numbers that have been used more than hundred times or for more than three months (or something like that) in both ends. The amount of remaining phone calls should minuscule, and there you have your criminal, spy or whatever speaking in cleartext on a non-encrypted line.
if you instead of using a dumb phone used something more modern you can on the one hand be exposed through a trojan or a rootkit but is that really a doable attack vector, even for very valuable targets?
If you use something like OpenBSD or one of the hardened Android phones that are on the market and only install Signal on it and then only use it for Signal. Never browse the web, never use it for regular phone calls and texts etc and keep it updated (Maybe regular factory resets too?), can the authorities, even if they have a lot of resources, really manage to sneak in some malware on it? Malware that can’t be caught by another layer of security (E.g., your firewall could be setup to only allows device A to connect to internet to Signal destinations and ports using the Signal protocol – making it difficult to deliver whatever the malware manage to find to the people controlling it.).
What are the best practises for safe phone calls if you are a private citizen that some authorities are very interested in listening to?
Is it possible to craft a crystal similar to the Truedeath one, but for Plants?
Truedeath Crystal (Greater) and Demolition Crystal (Greater) are Weapond Augment Crystals (Magic Item Compendium, p.65-66) that let you deliver critical hits and sneak attacks respectively to Undeads and Constructs.
To craft a Truedeath Crystal the Consacrate (Player’s Handbook v.3.5, p. 212) spell is required and Disintegrate (Player’s Handbook v.3.5, p. 222) has to be used to create a Demolition Crystal.
1. Which spell could be selected as prerequisite to craft a sort of Vinestrike* Crystal?
*similar to the Vine Strike (Spell Compendium, p. 230) spell
The other thing is: Lesser crystals have “unique” abilities, while Least and Greater seem to be standardized.
Least: A weapon with this crystal attached deals an extra 1d6 points of damage to constructs.
Lesser: As the least crystal, and the weapon is treated as adamantine for the purpose of overcoming the damage reduction of constructs.
Greater: As the lesser crystal, and the weapon can deliver sneak attacks and critical hits against constructs as if they were living creatures.
Least: A weapon with this crystal attached deals an extra 1d6 points of damage to undead.
Lesser: As the least crystal, and the weapon also functions as a ghost touch weapon (DMG 224).
Greater: As the lesser crystal, and the weapon can deliver sneak attacks and critical hits against undead as if they were living creatures.
2. What kind of ability a lesser crystal could grant?
The following question already exists and explains that you can cast spells gained from the Magic Initiate feat if and only if the class you choose is the same as one of your own:
- Can you cast a spell learned from the Magic Initiate feat using spell slots?
So let’s assume a Wizard take the Magic Initiate feat and learns the healing word spell with the Bard option of the feat. It is established already that they cannot cast this spell using their own spell slots, for some more supporting evidence classes received errata and the Wizard class now states the following under “Spellcasting” (the bolded word “Wizard” was added):
[…] The Wizard table shows how many spell slots you have to cast your wizard spells of 1st level and higher. […]
With that established, I’m a bit confused what happens when this Wizard decides to multiclass into Bard; the multiclassing spellcasting rules state:
[…] You determine your available spell slots by adding together all your levels in the bard, cleric, druid, sorcerer, and wizard classes, and half your levels (rounded down) in the paladin and ranger classes. Use this total to determine your spell slots by consulting the Multiclass Spellcaster table. […]
There is not longer a way to distinguish between Wizard spell slots and Bard spell slots. To me this implies the following:
Before multiclassing the Wizard could not use any of their spell slots to cast healing word, but by gaining one level of Bard they can now use all of them. Is this truly the case or have I missed a rule somewhere?
I want to have “some thing” to handle client-certs on behalf a server that is unable to do it, for secure user authentication in addition to regular TLS encryption.
In this question How can I double check security against a TLS on a public IP? the answers set clear that regular TLS does not typically do client authentication, although it seems it would be possible if the server requests it.
Let’s suppose I have a server that is able to communicate via “plain text” or “on a TLS channel” (I can re-start the server with or without TLS), but if TLS is enabled, the server does not support checking client-certificates for auth.
The original question was for a docker registry, but I generalize the question to any server supporting TLS but not client-side certs.
What I’m thinking
I am thinking of offloading the “TLS part” to a security-specific software (much similar to what SSH port-forwarding tunnels are) and decouple the server and the TLS handling.
Probably there would be 2 processes involved:
- The server listens in a firewalled localhost port or a linux socket in “plain text”, but as it is firewalled it can never be reached from the outside.
- Some kind of “security middleware” (Probably OpenSSL, but I’m not sure) -I think it’d be called a TLS terminator, but I’m neither really sure, too- to do this:
- Handle the public-IP listening
- Handle the server-side certs to secure the channel via TLS
- Handle the client-side certs to check authenticity (probably against a set of public keys I’ll have previously uploaded in the server)
- If and only if the client belongs to a white-list of users, then forward the decrypted channel to the regualar plain-text server.
Would be this TLS offloading a normal setup?
If so, is OpenSSL a good handler for this offloading?
If yes, what documentation could be a good starting point for this kind of setup, where I can read on and learn?
I was in chat here on the site and saw mention of an online tabletop gaming website called roll20.net. I have checked it out and it looks pretty promising for online play as it works in the browser, has a rolling tool in it, shows a visual of the battle map, character/monster tokens, etc.
It reminded me of a game play video I saw a while back where people were using a very similar program, so similar in fact I thought they were playing on roll20.net when I was poking around the site. However when I decided to watch some youtube videos of roll20 games it turned out that it was not the program that I remember from that gameplay video I saw months ago.
The only differences is can remember between the two programs is that the one I am failing to re-find on youtube had animated characters that were controlled in real time via the keyboard (wasd or arrow keys, I dont remember exactly what one of the guys said to the new player that asked how to control his character).
Basically, I would like to know some sites or programs that are similar to roll20.net in their functionality to make sure that if I choose to start running a game on a site like that I can choose the best one for my needs (and also to find that program I can’t find the video of on youtube, tho that isn’t the main focus of my request).