Block the user and move on.
Block the user and move on.
For those that are interested into USA history/war crimes, there is also the podcast Blowback, covering Iraq, Cuba, Korea, Afghanistan as well as mentionning Guatemala and other covert/illegal actions, I highly recommend!
Warning, dont listen to those if you could be easily radicalized ;)
Which, let’s not kid ourselves, is way worse that Israel.
Since I have not seen it yet in the comments, I use Floorp, a Firefox fork with some nice UI improvements (and apparently some performance improvements, but both are very fast for me).
I’m with you, drives me nuts that it is basically a guessing game on whether the shortcut for bolding the font is either Ctrl-B or Ctrl-G (gras, bold in French) and it varies by software, region, time of the day…
5$ on the US meddling again with other countries’ policies to protect their capitalist interests…
Pretty sure this was sarcastic.
It depends on the mail server/provider. As a datapoint, I use Zoho Mail with 4 of my domains and they all have a catch-all that points to a single inbox.
West in that case, but you’re good ✌️
I see why his take on this is the antipod of yours, but you clearly won’t achieve anything by so easily shifting to aggression and leaving the discussion on a tantrum.
They could not. To this day, a great part of the US population thinks that this attack was completely unprovoked.
Connect on Android has a few very cool features like keyword/community/domain blocklist!
deleted by creator
I too found the omission obvious considering that the filthiest examples are right there.
Gaijin plz
America used to have a grand tradition of what to do with tyrants.
Which is the same playbook as democratically elected leaders of foreign nations. Bombs, drones and CIA-soonsored assassinations
No no no, you got it all wrong. Using drones/planes to kill military (and pretty often civilian) targets on another country’s territory is an act of war only if you are not the US.
Otherwise how could they keep track of all the countries they would be at war with…
Even a “traditional” password would have a “list” that attackers could know (all the possible characters that can be used in a password), now compare this set of ±150 characters with the set of possible words that can be used (probably close to 250k per language if you take out some similarities).
Even with only 4 words, the number of possibilities is astounding.
I visited this museum last year and, no, the hair is just not easily visible on the picture, but is present when you take a close look.