What happens when an aboleth enslaves another aboleth who’s enslaved a werewolf?

I was doing a monster battle with some of my friends and there were two aboleths, aboleth #1 and aboleth #2. Aboleth 1 had a werewolf under control using their enslave power, and then aboleth 2 took control of aboleth 1. Can aboleth 2 now control the werewolf under aboleth 1’s control?

Protection from Evil cast on a player who’s already under a Charm Person spell?

I’m currently playing a D&D 3.5 campaign and in our last session our fighter has fallen under a Charm Person spell cast by an evil enemy spellcaster. My character is a Cleric and has access to both Protection from Evil and Magic Circle against Evil. If I cast the former upon the figher, or the other one so that the fighter is included in the affected area, what happens? I’m not sure how to interpret the spell’s description. From the PHB (emphasis mine):

The barrier blocks any attempt to possess the warded creature (by a magic jar attack, for example) or to exercise mental control over the creature (including enchantment (charm) effects and enchantment (compulsion) effects that grant the caster ongoing control over the subject, such as dominate person). The protection does not prevent such effects from targeting the protected creature, but it suppresses the effect for the duration of the protection from evil effect.

Therefore, it seems that once the spell is cast the target becomes immune to the mental influence of the evil entity. However, the spell description also says that (emphasis mine)

If the protection from evil effect ends before the effect granting mental control does, the would-be controller would then be able to mentally command the controlled creature. Likewise, the barrier keeps out a possessing life force but does not expel one if it is in place before the spell is cast.

It is clear that the spell does not nullify Charm Person, but the controller seems (at least) to be unable to give orders to the targeted creature. What about the order given before Protection from Evil is cast? There are three possible interpretations:

  1. Nothing happens, as the target was already Charmed before;
  2. The creature is still Charmed but the evil guy cannot give new orders (as Protection suppresses the effects of Charme);
  3. Charme Person is stopped for the duration of the Protection spell, and my fighter is free to act as he pleases.

Thank you for your input!

If one target of a Twinned Spell has 0 HP, does the Grave cleric’s Circle of Mortality feature maximize healing on a second target who’s not at 0 HP?

One PC is a multiclassed Grave Domain cleric/sorcerer. They cast a healing spell on a PC that has 0 health, and use the Twinned Spell Metamagic option to target another PC with the same spell.

Would the second PC also have its healing from the spell maximized by the Grave cleric’s Circle of Mortality feature (XGtE, p. 20), even if the second PC is not also at 0 HP?

Who’s the artist that drew the art on pages 148 and 220 of the PHB?

Anyone know the name of the artist or artists that drew the art on page 148 and 220 in the Player’s Handbook? I know there’s a list of artists in the credits, but looking through it, I haven’t been able to find that art specifically on any of their online portfolios.

Also, does anyone know if there exist uncropped versions of said art, and where you might find them?

Document security – how to find who’s leaked a confidential document?

I am legally obliged to distribute a document (probably by email, probably saved as MS word, or a PDF) to several hundred recipients.

The recipients are legally obliged to keep it confidential. However, based on past experience I’m pretty sure it’s going to end up publicly leaked pretty quickly. (in the past it’s been freely distributed verbatim)

This has happened before, it’s a serious problem and causes us financial damage and I’d really like to put a stop to this and identify the miscreant.

I’m aware of the John Le Carre technique of making each document very slightly different (missing full stop here, minor typo there etc etc) but with several hundred recipients making several hundred uniquely identifiable copies of the same basic document would be a non-trivial task.

Is there a way to automate this? or is there a better way of finding who’s doing the leaking?

UPDATES – documents published 2 or 3 times a year. In the past the whole pdf has been published verbatim on public or semi-public forums, often within days (sometimes hours) of being distributed. On other occasions the documents have been re-distributed via email from ‘burner’ accounts (normally gmail)

  • The document is released to meet various legal obligations, so the information HAS to be accurate. It also HAS to go to the various recipients. So changing any of the data is not an option, but there’s no law against making a spelling/grammar error

Can you counterspell a spell if you don’t know who’s casting it?

Related to this question about a spellcaster hiding in a group of spellcasters.

The reaction trigger for counterspell is “when you see a creature within 60 feet of you casting a spell”. It has a range, but no target.

Suppose the Death Eaters all start chanting and waving their wands at once, and I can’t tell which of them is really casting the spell. But one of them is a creature casting a spell within 60 feet, and I do see it (because I see them all). Can I counterspell “whoever”, or do I have to aim for one of them specifically?

(If you want mechanical details, assume all but one of the mages readied this action: “When any other Death Eater chants and waves their wand, chant and wave my wand.” Then one of them started casting a V, S, M spell. Also assume the whole thing isn’t a bluff, which would be a different scenario.)

I can pay by my credit card under fake name: who’s responsible to check?

I am customer of a large European bank, but I have found the following happening consistently with multiple past banks.

Basically, I have always been able to pay using my legitimate card(s), credit or debit, under a fake name.

When you are prompted online for your card information, you will normally select

  • Circuit (Visa, Mastercard, etc, sometimes optional as the merchant will deduce from the first digits)
  • PAN
  • Expiration date
  • CVV2/security code
  • Card holder

Well, I found I can consistently use a fake name when other fields are consistent. I can easily get my payment approved. Often I am redirect to secondary verification (OTP) and pass that brilliantly.

I am writing here because this makes me a bit confused. Often merchants say “Please type your name as displayed on the card” so that you think they (someone) will do a strong check on the record and refuse the transaction if you omit/enter a second name inconsistently or use apostrophes/accents inconsistently, exactly like what happens often in airline travel when boarding card doesn’t match passenger name as displayed on passport/ID. To make a counterexample…

But here I am speaking about completely different names. The only time I was called by my bank “Sir, we are detecting a number of attempted charges” I was using my real name with a brand new card (you know… you have to move all your online subscriptions). I was never called, no card ever blocked for “Sir, someone could have stolen your card details”.

Question time: in the technical world of credit card payment, 1) what is the importance of the card holder name if it’s not consistently checked? 2) who should be responsible for checking? bank, merchant or transaction processor?

Note: I know very well that just using a pseudonym does not make me anonymous. Of course the transaction can be tracked back to an individual, but that requires a lot of juridical power (and legitimate interest, speaking about Europe).

How do I grant a SELECT permission to an individual user who’s part of a large group that is explicitly denied?

I have a table SuperSecretData which is currently setup to deny SELECT to everyone in the company by the standard Active Directory account “Domain Users”. But a couple of specific individual users do need to be able to SELECT from it. What’s the proper way to achieve this?

Table Properties - Permissions