Skip Navigation

InitialsDiceBearhttps://github.com/dicebear/dicebearhttps://creativecommons.org/publicdomain/zero/1.0/„Initials” (https://github.com/dicebear/dicebear) by „DiceBear”, licensed under „CC0 1.0” (https://creativecommons.org/publicdomain/zero/1.0/)EH
Posts
0
Comments
34
Joined
2 yr. ago

  • Rocky is so all over the place. You make great points and I don’t disagree. Another metric is how watchable they are and by that standard you could argue it makes it up to and including Rocky IV. I don’t even know what to do with the newer ones.

  • I like your approach. It certainly makes me think of how all the people involved are like way too young.

    I’m going to keep going with “doggy” because it reinforces to me how the decision making is on par with toddler logic

  • Thanks for sharing this. My gut reaction is that that these attacks were unreasonable and careless in who they impacted and should be criminal. But it’s very interesting to read an analysis of the actual law - even if I don’t agree with it

  • Permanently Deleted

    Jump
  • These days with how tied to your identity email is, using an ISP provided email is like self-imposed vendor lock-in though. A friend who uses an ISP provided email just switched ISPs and it caused havoc - bank logins, power company logins, etc