binary-option-pro.com Competitive Analysis, Marketing Mix ...

A LONG"Rant" About the Talents System

Ay yo, it’s everybody’s least-favourite user, comin’ atcha with another long-ass pseudo-essay that nobody asked for. This time, the topic is on talents.
What is the Talent system?
The talent system is one of the primary features of Paladins that sets it apart from its… competitors. At the beginning of each match, each player is allowed to select 1 talent from 3 to boost their champion. This talent chosen will usually synergize with the player’s chosen loadout, and will alter the champion’s performance in some way.
I feel the Talents system is incredible. It allows each champion to fill a variety of different roles and have various methods of filling the roles they already have. Essentially, the talents system allows one to customize their champion and make them more unique to the user, or allowing the user to adapt to various situations (team compositions).
So why the rant?
Not all talents are created equal-- not even close. Before I go on, I’d like to establish what (in my opinion) makes a talent great, good, alright, or blasphemous. Note that this doesn’t necessarily correspond to the strength of the talent, only the talent’s creativity or individuality of its design.

A GREAT talent should be able to recontextualize a champion’s entire kit.

A great talent doesn’t just change a champion’s playstyle, it can change their entire ROLE. However, this must be done carefully, in such a way that the champion’s base kit and/or available cards remain largely relevant. The cards from the champion’s loadout should remain impactful, but perhaps focus can be placed on other cards that may not have been used otherwise, or using already-utilized cards differently.
Undoubtedly, two of the best examples of this would be Pip’s Catalyst and Seris’ Soul Collector. Catalyst causes enemies slowed by Pip’s weapon shots to take an additional 30% damage from his primary attacks, and Soul Collector gives up to 15 2% boosts to Seris’ maximum health and primary attack damage for each Soul Charge she detonates.
No matter how you feel about these talents, there is a clear difference between a Soul Collector Seris and a stock/Mortal Reach Seris, or a Catalyst Pip and a stock/Mega Potion Pip.
Namely, that they’re dunking on you.
One of the most notable things about these talents is that, again, the champions’ cards remain relevant. I play much more Seris than Pip, so I feel much safer discussing her cards.
ALL BUT ONE of Seris’ cards (Soul Forge) remain relevant when she picks Soul Collector. Even if she chooses to play a more aggressive build, her Restore Soul cards remain relevant. The ability may no longer be the Seris’ primary focus, but its cards allow it to potentially remain relevant by providing ammo without reloading, providing healing to her on a short cooldown, or reducing the lengthy 14s base cooldown of Shadow Travel.
Even the cards not related to Restore Soul gain new roles: Umbral Gait goes from allowing Seris to retreat more quickly from advancing enemies to also allowing her to close the distance between her and her target(s) with a *massive* speed boost of up to 40%. Essence Rip and Wickedness allow her to combat the crippling presence of Cauterize later in the round by improving her only self-sustain when on her own, allowing her to engage more confidently.
This is, to me, the best talent in the game, just for how much it puts a twist on an otherwise simple champion, all while keeping her coherent. Well done, Evil Moji. Well done indeed.

A GOOD Talent recontextualizes a single ability.

A step below changing the entire kit of a champion, some talents change how a single ability is used. Examples of this include Maeve’s Rogue’s Gambit, Furia’s Solar Blessing, Vivian’s Booby Traps, (arguably) Makoa’s Half Shell, Pip’s Combat Medic, and Skye’s Grade A Medicinal Kush Smoke and Dagger. These are distinguished from the category below them by actually *changing how the ability is used.\* Simply improving a talent’s ability to do what it already does does not count for this.
Maeve’s Rogue’s Gambit provides a small 10% damage boost to Pounce, but more notably resets its cooldown whenever she gets an elimination or killing blow. This allows for better dives through more reliable escape, but also improves her mobility greatly, especially if the player is skilled. It allows her to be a bit more loose with the otherwise fairly harsh possibility of having to expend her lengthy 20s cooldown of Nine Lives to escape, and can be the thing that allows great Maeves to play The Floor is Lava for what feels like the whole match.
Vivian’s Booby Traps is simple: Drones go boom. It gives her a form of damage outside of shooting her gun at her opponent, and grants a bit of burst (as though she needed that), but also some fairly-reliable AoE damage. It incentivises using her drones multiple times during a fight rather than relying on a single pre-placed one as the drones will go boom, requiring her to replace them if she wants to continue gaining benefits from any reveal-based cards that may be in her loadout.
Furia’s Solar Blessing is perhaps the strongest example of recontextualizing an ability, simply due to how drastic the change is. It changes her Pyre Strike from being a primarily defensive CC tool to being an extremely powerful healing ability. This comes at the cost of her often casting it when she’s not being attacked, potentially leaving her more vulnerable to flanks until it’s off cooldown. Likewise, if she uses to fight off a flank, she’s now missing the ability to burst-heal her tank back from the brink of death to near-full. A trade-off of self-defence or support. Nice.

An OK talent simply focuses on an ability, without changing its use very much.

This primarily means that X talent is now better at doing whatever it already did. Buck already likely uses Heroic Leap to engage; Bounce House just makes it a better tool to do so. Seris was already going to use Restore Soul to heal; Mortal Reach just improved its restorative capabilities. Inara was probably already going to use Warder’s Field to impede movement; Treacherous Ground just makes that infinitely easier.
These talents are… fine. They’re often the ‘meta’ talents for champions (think Mega Potion, Bounce House, Luminary, etc.), and I believe that’s because they’re the ‘safe” options. They improve on what’s already there, and make the champion better at doing whatever they already do. It just makes sense that a talent to make a tank even tankier is going to be a common pick, right?
These talents are, again, fine. They’re usually not overly offensive, and the worst thing about them will likely be that the numbers are a bit too high or low. Uncreative, but it’s not a crime to have most/every champion have a talent to improve their performance at their base job.

A BAD/SHIT talent focuses on a champion’s primary, without changing its use very much.

Let me specify: a bad talent likely focuses on the champion’s primary attack, adding some bonus effect (usually damage). It doesn’t particularly encourage the champion to do much else than what they’d do without the talent.
You may be able to see where I’m going with this. Drogoz’ Fusillade, Vivian’s Opportunity in Chaos, Willo’s Blastflower, Pyromania in its pre-Vora state, and probably some others all fall under this category. Basically, if you can’t tell the champion is using a particular talent as opposed to not using a talent at all by anyway except your health bar drops faster, it’s probably a shit talent.
But wouldn’t this include Lex’s Death Hastens, Jenos’ Binary Star and Androxus’ Cursed Revolver?
Well… kind of. These talents, particularly the former and latter, are notably special cases. While they do focus on the weapons, they change them in such a way that more focus is placed on aim and allowing greater opportunities to headshot. A difference between these three and their stock variants can easily be felt. What distinguishes Death Hastens and Cursed Revolver further is that they serve as sorts of fanservice, restoring their respective champions to older states for players who preferred these slow-firing and more accuracy-dependent forms. Whether you wish to include these talents in this category is up to you, but I’d personally just put them off to the side.
The running theme here is change and identity. How much change can I feel when I play this talent? What identity does this talent establish for the champion, and possibly even for the player playing them? If the talents and card systems exist to customize a champion to a specific playstyle, the talent shouldn’t just make X ability Y% better at doing Z than it was before. There’s a very fine line between the criteria on this list for a good talent and a shit one, and one that may not be possible to explain with words.
So, what the hell was the point of you writing all this?
Hopefully, to gather feedback and see how correct people feel these criteria are. If positively received, I’d love for more talents to take routes that would lead them to being higher up on this list. If every talent changed the champion’s playstyle to the extent of Soul Collector and Catalyst, I feel this game would be infinitely closer to reaching its maximum potential, gaining customizability and potential creativity among playstyles perhaps rivalling the likes of TF2 (if we aren’t there already).
As long as uncreative (damage) talents such as Fusillade, Opportunity in Chaos, and Blastflower exist, though, I feel like the game is not living up to its full potential. At the very least, I would like to see these bland talents reworked.
submitted by SpiritualBanana1 to Paladins [link] [comments]

Summary of Tau-Chain Monthly Video Update - August 2020

Transcript of the Tau-Chain & Agoras Monthly Video Update – August 2020
Karim:
Major event of this past month: Release of the Whitepaper. Encourages everyone to read the Whitepaper because it’s going to guide our development efforts for the foreseeable future. Development is proceeding well on two major fronts: 1. Agoras Live website: Features are being added to it, only two major features are missing 2. TML: We identified ten major tasks to be completed before the next release. Three of them are optimization features which are very important for the speed and performance features of TML. In terms of time requirements, we feel very good to stay on schedule for the end of this year. We also are bringing in two extra resources to help us get there as soon as possible.
Umar:
Been working on changes in the string relation, especially moving from binary string representation to unistring. The idea is that now rather than having two arguments in the term, you would have a single argument for the string. Thus, the hierarchy changes from two to one and that has an effect on speed and on the storage. So the first few numbers that we calculated showed that we are around 10% faster than with the binary string. There are some other changes that need to be made with regards to the string which he is working on.
Tomas:
Had to revise how we encode characters in order to be compatible with the internet. It also was the last missing piece in order to compute persistence. The reason is that the stored data has to be portable and if TML needs characters and strings internally in the same encoding as it stores its own data, we can map strings directly into files and gain lots of speed with it. The code is now pushed in the repository and can be tested. He’s also working on a TML tutorial and likely before next update, there should be something available online.
Kilian:
Transcribed past month’s video update. You can find it on Reddit. Also, he has done more outreach towards potential partner universities and research groups and this month the response rate was better than earlier, most likely because of the whitepaper release. Positive replies include: University of Mannheim, Trier (Computational Linguistics & Digital Humanities), research group AI KR from within the W3C (https://www.w3.org/community/aik) articulated strong interest in getting a discussion going, particularly because they had some misconceptions about blockchain. They would like to have a Q&A session with a couple of their group members but first it’s important for us to have them read the whitepaper to get a basic understanding and then be able to ask respective questions. Other interested parties include the Computational Linguistics research group of the University of Groningen, Netherlands and also the Center for Language Technology of the University of Gothenburg, Sweden. We also got connected to the Chalmers University of Technology, Sweden. Also has done some press outreach in combination with the whitepaper, trying to get respective media outlets to cover our project, but so far hasn’t gotten feedback back. Been discussing the social media strategy with Ohad and Fola, trying to be more active on our channels and have a weekly posting schedule on Twitter including non-technical and technical contests that engage with all parts of our community. Furthermore, has opened up a discussion on Discord (https://discord.gg/qZtJs78) in the “Tau-Discussion” channel around the topics that Ohad mentioned he would first like to see discussed on Tau (see https://youtu.be/O4SFxq_3ask?t=2225):
  1. Definitions of what good and bad means and what better and worse means.
  2. The governance model over Tau.
  3. The specification of Tau itself and how to make it grow and evolve even more to suit wider audiences. The whole point of Tau is people collaborating in order to define Tau itself and to improve it over time, so it will improve up to infinity. This is the main thing, especially initially, that the Tau developers (or rather users) advance the platform more and more.
If you are interested in participating in the discussion, join our Discord (https://discord.gg/qZtJs78) and post your thoughts – we’d appreciate it! Also has finished designing the bounty claiming process, so people that worked on a bounty now can claim their reward by filling out the bounty claiming form (https://forms.gle/HvksdaavuJbu4PCV8). Been also working on revamping the original post in the Bitcointalk-Thread. It contains a lot of broken links and generally is outdated, so he’s using the whitepaper to give it a complete overhaul. With the whitepaper release, the community also got a lot more active which was great to see and thus, he dedicated more time towards supporting the community.
Mo’az:
Finished multiple milestones with regards to the Agoras Live website: 1. Question part where people post their requests and knowledge providers can help them with missing knowledge. 2. Have been through multiple iterations of how to approach the services in the website. How the service seeker can discover new people through the website. 3. Connected the limited, static categories on the website to add more diversity to it. By adding tags, it will be easier for service seekers to find what they are looking for. 4. Onboarding: Been working on adding an onboarding step for the user, so the user chooses categories of his interest and as a result, he will find the homepage to be more personalized towards him and his interests. 5. New section to the user profile added: The service that the knowledge provider can provide. Can be added as tags or free text. 6. Search: Can filter via free text and filter by country, language, etc. 7. Been working on how to display the knowledge providers on the platform.
Andrei:
Improved look of the Agoras Live front page: Looks more clean. Finetuned search options. Redesigned the header. It now has notification icons. If you query a knowledge provider for an appointment, he will receive a notification about the new appointment to be approved or rejected. You can also add a user to your favorites. Front page now randomly displays users. Also implemented email templates, e.g. a thank you email upon registration or an appointment reminder. What is left to do is the session list and then the basic engine will be ready. Also needs to implement the “questions” section.
Juan:
Has switched towards development of TML related features. Been working mainly on the first order logic support. Has integrated the formula parser with the TML core functionality. With this being connected, we added to TML quantified Boolean function solving capability in the same way as we get the first order logic support. It’s worth mentioning that this feature is being supported by means of the main optimized BDD primitives that we already have in the TML engine. Looking forward to make this scalable in terms of formula sizes. It’s a matter of refining the Boolean solution and doing proper tests to show this milestone to the community in a proper way.
Fola:
Have been discussing the feasibility of a token swap towards ERC20 from the Omni token with exchanges and internally with the team. Also has been discussing the social media strategy with Kilian. As we update with the new visual identity and the branding, it’s a good time to boost our social media channels and look ready for the next iteration of our look and feel. Continuing on the aspects of our visual identity and design, he’s been talking to quite a number of large agencies who have been involved in some of the larger projects in the software space. One being Phantom (https://phantom.land) who designed the DeepMind website (https://deepmind.com), the other one being Outcast (https://theoutcastagency.com) who have been working with Intel and SalesForce. We aren’t sure yet with which company we go but it’s been good to get insight into how they work and which steps they’d take into getting our project out to the wider audience. That whole process has been a lot of research into what kind of agencies we’d want to get involved with. Also, with the release of the whitepaper being such a big milestone in the history of the company, he’s been doing a lot of reading of that paper. We’re also looking to get more manpower involved with the TML website. Also going to hire a frontend developer for the website and the backend will be done according to Ohad’s requirements. Also, as a response of the community’s feedback towards the Omni deck not being user friendly, he did some outreach to the Omni team and introduced them to a partner exchange for Agoras Live. They have an “exchange-in-a-box” service which may help Omni to have a much more usable interface for the Omni Dex, so hopefully they will be working together to improve the usability of the Omni Dex.
Ohad:
Finished writing the community draft of the whitepaper. The final version will contain changes according to the community’s feedback and more elaboration on more topics that weren’t inserted in the current paper, including logics for law and about the full process of Tau. And, as usual, he’s been doing more research of second order logic, specifically, Boolean options and also analyzing the situation where the formulas in conjunctive normal form trying to extract some information from such a cnf. Also, what Juan mentioned about first order logic: People who are already familiar with TML will see that now with this change, the easiness of using TML got much more advanced. In first order formulas, expressing yourself has become much easier than before.
Q&A:
Q: What is the difference between Horn Second Order Logic and Krom Second Order Logic?
A: Horn and Krom are special cases of cnf (conjunctive normal form). Conjunctive normal form means the formula has the form of n conjunction between clauses. This clause and this clause while each clause is a disjunction of atoms: It’s this or this or this or that. And now any formula can be written in conjunctive form. Any formula can be brought to this form. Krom is the case where each clause contains exactly two atoms and Horn is the case where at most one atom in every clause is positive – thre rest are negated, that’s the definition.
Q: Now that the whitepaper has been released, how do you think it will affect the work of the developers?
A: We see the whitepaper as being a roadmap of development for us, so it will essentially be the vision that we are working to implement. Of course, we have to turn it into much more specific tasks, but as you saw from the detailed progress from last month, that’s exactly what we do.
Q: When can we expect the new website?
A: We’ve just updated the website with the whitepaper and the new website should be launching after we get the branding done. There’s a lot of work to be done and a lot of considerations taking place. We have to get the graphics ready and the front end done. The branding is the most important step we have to get done and once that is complete, we will launch the new website.
Q: What needs to be resolved next before we get onto a solid US exchange?
A: With the whitepaper released, that’s probably been the biggest hurdle we had to get over. At this point, we still have to confirm some elements of the plan with the US regulators and we do need to have some sort of product available. Be that the TML release or Agoras Live, there needs to be something out for people to use. So, in conjunction with the whitepaper and approval from the US regulators, we need to have a product available to get onto US exchanges.
Q: Does the team still need to get bigger to reach cruising speed, if so, how much by and in which areas?
A: Of course, any development team would like to have as many resources as possible but working with the resources we that have right now, we are making significant progress towards the two development goals that we have, both the Agoras Live website and the TML engine. But we are bringing in at least two more resources in the near future but there’s no lack of work to be done and also there’s no lack of progress.
Q: Will Prof. Carmi continue to work in the team and if so, in what capacity?
A: Sure, Prof. Carmi will continue coordinating with us. Right now, he’s working on the mathematics of certain features in the derivatives market that Agoras is planned to have, and also ongoing research in relevant logic.
Q: Will you translate the whitepaper into other languages?
A: Yes, we expect translations of the whitepaper to occur. The most important languages that comprise our community, e.g. Chinese. What languages exactly, we cannot tell right now, but mainly the most prominent languages that comprise our community.
Q: Is the roadmap on the website still correct and, when will we move to the next step?
A: We will be revamping the website soon including the roadmap that will be a summary of what’s been published in the whitepaper but the old version of the roadmap on the website is no longer up-to-date.
Q: What are the requirements for Agoras to have its own chain?
A: If the question means why Agoras doesn’t have its own chain right now, well there is no special reason. We need to reach there and we will reach there.
Q: When Agoras switches to its own chain, will you need to create a new payments system from scratch?
A: No, we won’t have to. We will have to integrate with the new payment channel but that’s something we are planning to do anyway. We will be integrating with several exchanges and several payment channels so it won’t be a huge task. Most of the heavy lifting is in the wallet and key management which will be done on the client side but we’re already planning on having more than one payment gateway anyway so having one more is no problem.
Q: When can we see Tau work with a real practical example?
A: For examples of applications of TML, we are currently working on a TML tutorial and a set of demos. Two of our developers are currently working on it and it’s going to be a big part of our next release.
Q: How can we make speaking in formal languages easier, with an example?
A: Coming up with a usable and convenient formal language is a big task which maybe it’s even safe to say no one achieved up until today. But we solve this problem indirectly yet completely by not coming up with any language but letting languages to be created and evolve over time through the internet of languages. We don’t have any solution of how to make formal languages very easy for everyone. It will be a collaborative effort over Tau together to reach there over time. You can see in the whitepaper in the section 4.2 about “The Critical Mass and the Tau Chain Reaction”.
Q: What are the biggest limitations of Tau and, are they solvable?
A: TML cannot do everything that requires more than polynomial space to be done and there are infinitely many things like this. For example, you can look up x time or x space complete problems. We would want to say elementary but there is no elementary complete problem but there are complete problems in each of the levels of elementary. All those, TML cannot do because this is above polynomial space. Another drawback of TML which comes from the usage of BDDs is arithmetic. In particular, multiplication. Multiplication is highly inefficient in TML because of the nature of BDDs and of course BDDs bring so many more good things that even this drawback of slow multiplication is small compared to all the possibilities that this gives us. Another limitation, which we will emphasize in the next version of the whitepaper, is the satisfiability problem. The satisfiability problem of a formula without a model to ask whether a model exists – not a model checking like right now but to ask whether a model exists – this is undecidable already on very restricted classes as follows from Trakhtenbrot’s theory. So in particular, the containment problem, the scalability problem, the validity problem, they all are undecidable in TML as is and for them to be decidable, we need to restrict even more the expressive power and look at narrower fragments of the language. But again, this will be more emphasized in the next version of the whitepaper.
Q: It looks years for projects such as Maidsafe to build something mediocre, why should Agoras be able to do similar or better in less time?
A: Early on in the life of the Tau project, we’ve identified the computational resources marketplace as one of the possible applications of Tau, so it is very much on our roadmap. However, as you mentioned, there are some other projects, e.g. Filecoin, which is specifically focusing on the problem of storage. So even though it’s on our roadmap, we’re not there yet but we are watching closely what our competitors in this field are doing. While they haven’t yet delivered on their promise of an open and distributed storage network, we feel that at some point we will have more value to bring to the project. So distributed storage is on our roadmap but it’s not a priority for us right now but eventually we’ll get there.
Q: What are the requirements in scalability, e.g. permanent storage etc.?
A: We haven’t answered that question yet.
Q: Will Tau be able to run on a mobile phone?
A: Definitely, Yes. We’re planning on being available on all computational platforms, be it a server, laptop, phone or an iPad type of device.
Q: Given a vast trove of knowledge, how can Tau determine relevance? Can it also build defenses against spam attacks and garbage data?
A: Tau doesn’t offer any predetermined solution to this. It is basically all up to the user. The user will have to define what’s criminal and what’s not. Of course, most users will not bother with defining this but they will be able to automatically agree to people who already defined it and by that import their definitions. So bottom line: It’s really up to the users.
Q: What are your top priorities for the next three months?
A: Our goal for this year (2020) is to release a first version of Agoras Live and of TML.
Q: Ohad mentioned the following at the start of the year: Time for us to work on Agoras. We need to create the Agoras team and commence work. We made a major improvement in one of Agoras’ aspects in the form of theatrical breakthrough but we’re not ready yet to share the details publicly. Is there any further news or progress with the development of Agoras?
A: If the question is whether there has been more progress in the development of Agoras, specifically with regards to new discoveries for the derivatives market, then the answer is of course yes. Professor Carmi is now working on those inventions related to the derivatives market. We still keep them secret and of course, with Agoras Live, knowledge sharing for money is coming.
submitted by m4nki to tauchain [link] [comments]

House Party 6/22/2020 - Part Two

Woodbridge: I hate to say it, but it’s unlikely, Allen. It’s a lot easier to pretend everyone else is wrong, and that you had no other option.
The camera pans to a kitchen. We see Tony the Milkman standing there in his leather jacket accompanied by Jim Baker. The table is adorned with ingredients mixing bowls and other baking supplies.
Tony ”Guys, gals and non-binary pals, I welcome you all to the great bake-off! Mr. Baker and I have decided to put our differences behind us but before we officially align we have decided to have one final friendly competition! Since I beat him in our debut match, I picked a stipulation that I believe will help make the score equal.”
Baker: “Tony, you know I’m not a baker, right? It’s just my name?”
Tony: “I get it, Baker, you’re playing a rib on me so I won’t feel bad for losing. It’s ok! We’re partners now!”
Baker “Tony I’m being se-“
Tony: “As is I was saying, The bake-off! Both of us will be baking something, which will then be shared with the rest of the locker room, unless they’re that piece of shit Joey McCarty, or Joey McCarty’s friends.”
Tony stares directly into the camera: “I know how much the people in the locker room love consuming the labor of others without compensation.”
Baker nods in agreement
Tony: “For my entry, I will be making the favored dessert of bisexuals such as myself… Lemon Bars!”
Baker: “And I’m making… uh… cookies I think”
Tomy: “No need to put yourself down, brother! We all know you’re going to smoke me! Anyways let the games begin!
The to go off in opposite directions and begin preparing their deserts. Tony begins making a crust out of flour cornstarch and other ingredients, carefully slicing butter and mixing, while Jim unsuccessfully attempts to make even balls of store bought cookie dough.
Backstage we see Mark Dutch walking around, peeking around corners and down hallways as if he’s searching for someone.
Dutch: Yo Blackwater! We’re done playing hide and seek! Where are you?
Dutch turns around, staring at each door and peeking into some of them, but to no avail.
Dutch: Where the fuck did he go?
After taking a few more steps he stares to the left of him. The camera turns and he comes across Kyle Scott, looking down onto a large map.
Dutch: Kyle. You got a moment?
Kyle looks up, staring back at the tall Dutchman with a focused look on his face?
Kyle: What do you want? Can’t you see I’m busy?
Dutch frowns for a moment, presumably having a brainfreeze from the shake before he peeks at the map. It’s a detailed map of Ohio that Kyle looks at
Dutch: Have you seen Louis? Louis Blackwater?
Confused, Kyle looks back at Dutch before shrugging.
Dutch: Like.. the B in D&B? Have you seen him?
Kyle: Becca?
Dutch: No. She’s dead. Blackwater.
Kyle: Ooooh! Blackwater. No, I haven’t. Why would I know that?
Dutch: I don’t know.
Kyle: Exactly. Now leave me alone, please.
Dutch: Fine. Thanks anyways.
When Kyle puts his head back down into the map, Dutch continues to walk down the hallway until hearing a loud crash. Immediately, Dutch sprints over to where the sound came from, in the background we see Kyle not even having flinched from it. After a few steps Dutch goes around a corner and immediately is heard yelling.
Dutch: LOUIS!
Louis is found on the ground, holding his head and surrounding him are metal pipes. Dutch gets to Louis and checks him out, staring over him as he tries to get Louis’ attention by shaking him!
Dutch: LOUIS! WAKE THE FUCK UP!
Blackwater: I am awake! Stop shaking me!
Dutch: Why the fuck are you on the ground?!
Blackwater: Fuck, man. A fucking mouthbreather attacked me from behind. Hit me right in the fucking liver. REAL LAME, GUYS! I USE IT TO DRINK!
Blackwater holds his hand on his side, presumably where is black, abused liver is supposed to be before he sticks out his hand, trying to get up. Dutch takes it and pulls him up slowly.
Blackwater: Ah.. fuck.. that hurts..
Dutch: You going to be alright?
Blackwater: Yeah.. Fuck me, I had worse. I should check a doc or something. Then go find the cumstain who did this.
Immediately, Dutch’s eyes light up as if he has a bright idea.
Dutch: I got a bright idea! You go visit the doc, I’ll find who did this. I’ll be like Batman doing detective work!
Blackwater: Of course you’d wear leather. You gonna have bat-nipples on your costume too?
Dutch: Fuck off, mate. Let me help you get to the doc.
Wrapping Louis’ arm around his neck, Blackwater begins to walk down the hallway, helping him as they both disappear around the corner.
Blackwater: Really tho, I won’t judge you if you wear leather.
Dutch: ...I’ll think about it.
We then cut back to the ring, where we see Javier not standing solidly in the middle of the ring, but instead rushing down from backstage to it, seemingly not having been ready for once, as he pulls out a card from his pocket, and begins to read.
Javier: At the request of both competitors in this upcoming bout, we will now be staging an impromptu singles match between Dalidus Nova and Buster Braggadocio!
Crowd: WOOOOOOOOOOOOOOO!
Javier: Clears throat And it is a singles match set for one fall, with a 30 minute time limit! Introducing first-
The Kids are Back hits the speakers, as out from the curtain comes Dalidus Nova, swiftly followed by Miles Alpha.
Javier: From Toronto, Ontario, Canada, standing at 6 feet 3 inches and weighing 225 lbs… DALIDUUUUS! NOOOOOOVA!
Crowd: BOOOOOOOOOOO!
Woodbridge: And the crowd here not a fan of Dalidus or Miles.
Paisner: They’re not the only ones…
Dalidus spits out a grotesque, far-too-large mouthful of Hubba Bubba gum at ringside and enters the ring, Miles staying outside but putting himself in Nova’s corner as Freaky Black Greetings hits the speakers.
Javier: And now, from Atlanta, Georgia, standing at 6 feet and three quarters of an inch and weighing 220 lbs… BUUUUUUSTER! BRAGGADOCIOOOOO!
Buster comes out from the curtain, pick in hair and yelling caucasian-themed insults at the crowd with reckless abandon.
Crowd: BOOOOOOOOOOOO!
Woodbridge: Quite clearly, the audience here doesn’t feel too strongly about Buster either!
Paisner: Seems the crowd and I are finally seeing eye-to-eye!
He slides into the ring, flicking his pick towards Alpha at ringside while he does so. Buster and Dalidus eye eachother up from opposite sides of the ring as the bell signals the start of the bout.
DING DING DING!
The bell rings, and Buster is quick to charge Nova, who slips underneath the bottom rope and out of the ring.
Crowd: Booooooooooo!
Paisner: Dalidus wasting no time going to his sleazy playbook.
Woodbridge: But Buster’s not having it, look out!
Buster immediately follows Dalidus to the outside, giving chase as Nova stumbles into a run, not expecting Buster’s aggression. The two make a circle outside the ring, until Dalidus slides right back in through the bottom rope. Buster is seconds behind him, but as he gets to his feet he sees that Nova has slipped back outside the ring, grabbing Buster by the ankle and pulling him down and out to the floor!
Crowd: Booooooooooo!
Paisner: Ooh! Buster landing hard outside!
Dalidus starts to lay boots into Buster on the outside, as Miles yells a mix of encouragement towards his partner, and insults towards the opponent. After several seconds of the officials count, Nova grabs Buster and wrestles him back into the ring.
Woodbridge: Finally, both men back into the ring, the only place the final fall can take place.
Not relenting, Nova drags Buster up to his feet in the corner, striking him in the chest with a chop!
Crowd: Ooooooooh!
He winds up for a second one, but not before Buster strikes him with a forearm strike, creating the separation necessary to connect square in the chest with a dropkick!
Crowd: OOOOOoooohh!
Paisner: Buster with the retaliation!
Nova is sent flying backwards, quickly rising to his feet in the opposite corner as Buster continues his attack, flying in with a corner clothesline! Still not giving Dalidus a second to breath, Buster shoots Nova back towards the other corner with an Irish Whip…
Woodbridge: These two men, back and forth across the ring!
...Charging in for another clothesline, Buster is suddenly met by the rising boot of Dalidus!
Crowd: Woooahh!
Paisner: Back and forth quite literally, Mark! Neither man’s gotten a concrete advantage thus far!
Taking a second to breathe, Dalidus re-approaches Buster, bending down to pick him off the mat only to get caught in a lightning-fast small package!
1…!
2.. - No!
Woodbridge: Nova damn-near got caught!
Dalidus is swift to fight out, both men twisted away from one-another and back up to their feet, backing towards opposite ropes.
Alpha: C’mon, Dali! Get his ass!
With the verbal from Miles, Dalidus rushes Buster, who ducks underneath a clothesline attempt, grabbing the waist from behind and using Nova’s momentum to run him into the ropes with an O’Connor Rollup!
1…!
2…!
No! Dalidus reverses the roll-up!
1…!
But Buster breaks free, and is quickly up to a knee!
Paisner: Two escapes from both - WOAH!
Still kneeling, Buster is caught in perfect position for the Kneeling Superkick!
Paisner: CHEKHOV’S GUN! Buster falls back to the mat, rolling out of the ring and plopping to the floor outside the ring.
Woodbridge: Buster got caught on bad timing, but makes up for it by getting outside the ring, away from any potential pinfall attempts.
Dalidus, with an annoyed look on his face, walks towards the ropes, crossing them and landing outside the ring beside Buster. As Miles stands beside him, Dalidus again tries to get Buster into the ring. This time, however, Buster slips from Nova’s grip, slamming his opponent's head into the edge of the ring!
Crowd: OOOOOH!
Paisner: Buster was playing possum!
With Nova dazed, Buster turns to Alpha, kicking him in the gut before grabbing the back of the Canadian’s head and swinging him into the ring post!
Crowd: YEEEAAAAAAHHHH!
Woodbridge: Miles hit hard, and the crowd loves it!
With Alpha laid out outside the ring, Buster swings Nova’s legs up and onto the canvas, sliding in after him.
Paisner: These two have fought at a lightning-fast pace thus far, and it looks like Buster is aiming for an equally-fast conclusion to this bout!
Buster sits Nova up in the center of the ring, shooting a quick kick into his back to keep him in place. Breaking into a sprint, Buster hits the rope facing his opponent, running back at Dalidus with intentions to hit a running knee strike…
Woodbridge: Bravado Bust - Nonono!
However, Dalidus lays back and the knee flies right overhead, as he reaches upwards and catches Buster between the legs, pulling him back down to the mat with another roll-up!
1…!
2…!
3.. - NO!
But Buster kicks away, breaking the pinfall! Returning to his feet, Buster is unable to avoid a forearm strike from Dalidus, stunning him long enough for Nova to drive a knee into the gut and snap down with a quick DDT!
Paisner: DDT from Dalidus, and these two just will not slow down!
Woodbridge: Ya may not like them, - God knows I don’t - but they’ve got some mighty gas tanks on ‘em!
Dalidus, now behind Buster, brings his opponent to his feet with a waistlock, before throwing Buster’s arm over his neck and throwing him backwards with an Inverted Exploder Suplex! Buster flies far through the ring, but his boots collide with the skull of the official, sending him falling to the mat like a sack of potatoes!
Crowd: BOOOOOOO!
Paisner: Cord Cutter, but the ref’s down!
Woodbridge: Buster ate all of that!
Dalidus begins to go for a pinfall, but spots the official down on the mat. Looking up towards a less-than-admiring crowd, he gives a shout to his partner.
Dalidus: Miles! Gimme a chair!
Paisner: Oh, sonuva…
Miles, still reeling from the collision with the steel post, grabs a steel chair and slides it into the ring as Buster begins reaching for the ropes in an attempt to get back to a standing base. Meanwhile, Dalidus grabs the chair from the mat and sizes up Buster from behind.
Woodbridge: Buster’s gonna get his brain rattled!
As he turns around, Dalidus charges with the chair raised high, swinging it downwards just as Buster sees, quickly rolling underneath the blow leaving the chair to connect with nothing but air!
Crowd: OOOOOOH!
Quickly up to his feet, Buster reaches into his tights to retrieve his signature black marker! Throwing the cap into the crowd, he immediately strikes Dalidus in the left eye with a jab from the marker!
Crowd: OOOOOOOOOOOOOHHHHH!
Nova falls to the mat, clutching at his face! Buster returns to the official, trying to get him back into the match, when he is struck from behind by a sudden forearm blow, courtesy of Miles Alpha!
Crowd: BOOOOOOOOOOOO!!
Woodbridge: The third man! Miles, getting himself involved once more!
Buster falls to his knees as Miles pulls him away from the ref, before swiftly bringing him up in a Fireman’s Carry and driving his boot into Buster’s skull with a Benadryller!
Paisner: Alpha with the Defeater to Buster!
*Woodbridge: He’s out cold, without a doubt!
Looking behind him to spot the official slowly coming to, Miles rolls Buster onto his back and pulls the blinded Dalidus on top of him, before slipping out of the ring and hiding from the officials view as he begins to slowly make the count!
1…!
2…!
3…!
DING DING DING!
Paisner: Absolute bullshit!
Javier: The winner of this bout via pinfall, at a time of 7:02: DALIDUS! NOVA!
The Kids are Back hits the speakers, as Miles comes back into the ring to assist Dalidus out of it, a shit-eating grin plastered on his face.
Woodbridge: In what was looking like quite the match, Dalidus steals one from Buster with the help from Miles Alpha!
Paisner: It’s bullshit, Mark. Complete bullshit.
The two walk through the curtain as the camera cuts away.
Mark Dutch is walking around the backstage area. He comes across Tony the Milkman, seeming to take a breather from the chaos of the kitchen, wiping off a milk mustache.
Dutch: Milkman! Tell me everything you know about the attack of Louis Blackwater!
The Milkman looks confused.
Tony: I don’t have any information for you, unfortunately. I do have a wonderful lemon cake! Would you like a piece?
Dutch takes a good look at the lemon cake Tony is offering, but he shakes his head.
Dutch: No, I cannot be distracted. I have responsibility!
Tony: Your loss!
As Mark Dutch continues to walk around, he peeks into a room and sees Big Money Maverick on the phone talking to someone. Dutch begins to speak to himself.
Dutch: Mav….maybe it was him….
Big Money Maverick: So yeah, if you're interested in doing business, let's talk about financials…
As Mav talks on the phone, and Dutch watches from outside the room, Dutch is suddenly approached by a backstage crew worker holding a bag of cheetos.
Crew Worker: Looking for the guy who attacked Blackwater? I don't think it was Mav.
Dutch: Why do you say that?
Crew Worker: He's been in this room making phone calls for hours, I should know…
The crew member swings the door open, cracking it behind him so the camera and Dutch can still see inside. We see the crew worker hand the bag of Cheetos to Mav, and Mav sets the bag on a table next to him, alongside many other drinks and snacks that Mav presumably forced the worker to get for him.
Dutch: Hmm...maybe not...but…...I don't know….
Dutch walks away from the room, and immediately is face to face with Stephen Romero, who’s holding an athletic jump rope in his hands and sweat covers his tank top.
Romero. Heard you were looking for who snuck up on Blackwater.
Dutch: Yeah. By the way, thanks for going after Balandran for my hotdog.
Romero looks back at Dutch, scratching the side of his head with a confused look.
Romero: Oh yeah. Uhm. No problem, I guess. Look, we two have been in the business for a while.
Dutch: True.
Romero: Yeah, and I noticed a trend which might work.
Dutch’s eyes are wide open as he looks back at Romero.
Romero: Usually, if you go to the ring and call out who did it.. they often show up and take responsibility. That or someone else shows up who wants to fight. It’s a 50/50 chance.
Dutch: Now that you say it, yeah.. you’re right. Thanks, Stephen.
Mark Dutch pats Romero’s shoulder before he looks at his now sweat covered hand. Immediately, Dutch wipes his hand off on Romero before he quickly walks away. Romero looks down at the sweaty handprint before letting out a sigh.
The camera returns to the kitchen, where we see Milkman back in after his break, and his crust has been pulled out and he’s pouring in a filling into it. Baker is on Twitter instead of watching whatever he has put in the oven. Bakers oven start producing smoke, whole Tony’s produces an absolutely gorgeous looking loaf of pastry
Baker: “Shit!”
Baker runs over the oven and opens it, quickly pulling the cookies out without wearing any form of hand protection
We open our next scene, as we see Stephen Romero backstage once again, clad in his wrestling gear and changed into a cleaner, and very small black tank top. So small the tank top is dangerously close to slipping inward a bit and potentially revealing his nipples. With this phone on hand, as he starts an instagram live stream from his phone, quickly getting up to around 14 unique viewers. As he begins to speak.
Romero: Hello world! I’d just thought i’d give a bit of insight into how I go about preparing for whatever I need to do when i’m at a show! The first thing to bring, always, always have this-
Romero opens one of his bags layed in his locker, inside revealing many bottles of water.
Romero: Stay hydrated, constantly! And you can stay hydrated with….uh….actually I don’t have any sponsors for this yet……..use tap water if it’s safe where you live, get some re-usable bottles if you can! I think when it comes to price points it’s not something you’d regret if you splurged on, but not something you need to splurge on either. I might even recommend not splurging, because with some extra money, you can become a patron for 1 cent a month! We are already at fifty-three patrons, and you can get in on the new hotness, and access to exclusive content! Now, to show y’all some more-
Romero grabs a significantly sized lunch box, as it seems to contain generous servings that make up a large rice bowl. First ingredient is obviously a lot of rice, with sliced pork, green onion, cilantro, mushroom, carrot, and avocado all being found in significant portions.
Romero: Being as large as I am and working in such a physically draining industry, the portions that I need to function would incapactiate a normal human being. Whether I am exaggerating or not is up to your own interpretation. And now, some may wonder how I get mentally prepared for a match? It heavily depends, for ippv matches where there’s more on the line, I tend to psych myself up with intense music, let out energy through running in place, my ippv matches are more about being intense. With lower stakes matches or House Party matches, I tend to moreso leave my training at the gym, I just try to show up in as good and happy of a mood as I can. Easier said than done of course, but with things such as forming alliances recently, I always have some others to lift me up. I think specialist and Rizwan are in the break room, lets go visit them actually!
Romero then walks out of the locker room and into the hallways, and as he just enters the hallways, he bumps into someone right in front of his whole stream!
gayboygayboygayboygayboygayboygayboygayboygayboy: omg king u okay??!!??!!
MarioFantatic37: Nooooooooo don’t get hurt from an unexpected collision your so sexy haha
After a moment of surprise, we see the person Romero collided with as he exited the locker room, GiGi, who now sees that Romero bumped into her, and gains a fury in her eyes.
GiGi: Hey! You! The audacatity to have said the things you have and now this?! Do you want to know the consequences! Well i’ll show you them!
GiGi then whips out her phone herself, a look of anger on her face throughout the process of doing this, as she starts up an instagram live stream of her own…….and instantly changes to a fake wide smile as she starts the stream up, hundreds upon hundreds of viewers quickly pouring in. She glances up at Romero with now a smug smile at the sheer numerical differences in their streams, as she begins to talk to her fans.
GiGi: Hello GiGi Gang! Welcome to an impromptu stream, brought on by more severe aggression against me! And guess who’s the person behind it!
GiGi dramatically swings her phone to reveal Romero in the shot, who’s holding up his phone for his stream as well, as GiGi’s chat goes-
Chad68: BOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOO! Feet?: BOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOO! LocalLesbian: BOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOO! Jouster06: HOW DARE YOU HURT HER YOU MONSTER! I’LL BEAT YOU UP MYSELF! xxxsavannahgranger4523: Looking for hot singles in your area? Visit Datebeast.notavirus.com/132342435353324244het43422 for your hook up today! QuirkyGamer!!!: BOOOOOOOOOOOOOOOOOOOOOOOOOOO!
Upon realizing who they’re seeing, as GiGi continues to speak.
GiGi: Once again I have been put in serious danger by Romero, by him as the much larger person trying to bulldoze over me and hurt me in the process!
Romero: I...literally just accidentally bumped into you.
GiGi: You’re lying! I can’t trust a word you say after your threats towards my livelihood, and now my physical well-being! You know what, this calls for retaliation, Kaitlyn, you’re strong, get him!
As GiGi commands this though, we don’t see anything happen, GiGi, confused as to why Kaitlyn is not doing something for her, turns around, and sees that Kaitlyn has mostly fainted due to the sheer scale of her infatuation with GiGi. Connected to GiGi only by holding on to her foot, where many in chat upon seeing this foot holding simply comment “God I wish that was me”.
Romero: Well, considering the state of Kaitlyn, i’m not sure she’s up for much of a fight in this moment. So unless you are, I think we’ll need another method to settle this, through what has been my goal, a stream battle! Where I handle mine with honesty and openness!
GiGi: Is that all? Easy! You’re on! Kait! Come with!
GiGi then begins to walk away, but is very noticeably slowed by the mostly dead weight of the head over heels Kaitlyn clinging onto her. Due to this GiGi is not able to make nearly as smooth an exit from the scene as she was hoping, but tries to make the best of it by highlighting the struggle she’s going through due to this, pointing the camera down in the process, showing her pastel colored shoes, as we see several “POGGERS” and excited proclamations of “FEET!” in her chat at this.
Romero meanwhile heads his own way, as we see support from the members of his chat-
gayboygayboygayboygayboygayboygayboygayboygayboy: Romeo, u r fuckin sick ur gonna do it
BasedAndGaypilled: STEPHEN ROMERO KREYGASM
Thats_So_Shibe: Bro no homo but I would like to have anal intercourse with you
Romero makes his way quickly over to a break room, where we see Rizwan and Specialist chatting over a cup of tea for Rizwan, and several cups of coffee for each member of Specialist, as Romero mutters to himself for a moment-
Romero: Fuck what do people like...spinning, they like spinning right? HEY RONDEL!
Rondel then stands up, he and Romero making intense eye contact.
Romero: DO ONE OF THEM COOL SPINS!
Rondel then jumps on top of the table, Rizwan able to save his tea, but all of Specialist’s coffee gets spilled. Rondel then not only spins, he balances on one leg to do the spin, mixing in several hops into the spin to add even more onto it, before finishing the spin, and stepping off the table. He then offers to replace everyone’s spilled coffee, as he goes to get more, but not before he and Romero both communicate to each other with a thumbs up. As the chat that has now grown to 25 unique views POPS OFF
We then cut back to GiGi, where we see on her stream her attempts to geti Kaitlyn functioning again. We see GiGi more gently poking her, shaking Kaitlyn, throwing a glass of water on her face, all to no avail! Before she finally switches up the strategy, and slaps Kaitlyn across the face, this action finally making her functionable again, as a wide smile forms on her face, as she springs to her feet. This once again drawing many “damn I wish that was me’s” from the chat. As GiGi then speaks to Kait-
GiGi: So, you’ve been allied with Romero before right? Knowing him from that, and knowing him now from his evil actions, what do you think he could be doing right this moment?
Kaitlyn: Uhm, he could be showing off his wardrobe right now? Yours is just, so much more expansive and prettier than his, I think you can easily take away the few viewers he has by showing off your-
GiGi: Not bad...but I think I got an idea better.
We then cut back to Romero again, where he’s showing off more of his wardrobe, where he is currently clad in a maroon red beret, glasses straight from a sexy secretary halloween costume, a white/maroon striped shirt tucked into tight fit jeans, and a leather jacket over it all. Romero hits several poses in this outfit, but as he’s focusing on himself in the mirror and showing off the outfit and his figure in it to the audience in his chat, we see GiGi and Kaitlyn sneak up in the background. Keeping a low profile, but enough to be noticeable in the lower frames of Romero’s stream, and obviously visible on GiGi’s stream as we switch to her view of her slowly crawling her way towards Romero’s set up. Where we see his set up is organized into different pieces, the tops/bottoms/jackets/hats/accessories all put into different sections. We see GiGi and Kaitlyn coordinate to take one thing of each from all of those while Romero is focused entirely on his posing. Then they go to make their escape and with wonderful timing, because as they start, Romero for the first time fully turns around to show off the outfit from behind! GiGi and Kaitlyn barely dodging out the way with all the stolen clothes. As we then hear Romero say-
Romero: Alright, I hope that was enough for all of you! Now, onto the next outfit…
Romero then goes through each his sections, making most of his next outfit….but cannot find the hat for it!
Romero: Yo what the fuck…..you know what, i’ll skip that one, next outfit!
Romero then goes through his next outfit…..but finds that he is now missing the jacket that goes with it!
Romero: HUH?! Again?!! Well uhhh….third time’s the charm I guess!
Romero then looks through his next outfit…..but cannot find the top to it!
Romero: WHAT THE FUCK?! Hold up, somethings going on here….
Romero then goes to grab his phone, and check insta live chat, where they are spamming “GIGI STOLE YOUR CLOTHES” in the chat, as an anger then manifests in Romero’s face.
Romero: She took my clothes?!........I’ve gotta do something about this man..
We then cut to GiGi and Kaitlyn still streaming, where we now see GiGi attempting a try on an article of clothing she stole from Romero, a denim jacket…..emphasis on *try, as we see that the jacket looks less like a normal jacket, looks less like an oversized jacket, but more like a straight up blanket on GiGi, nearly completely covering her all on it’s own.*
GiGi: What do you say Kait? I think these are so big on me they could really work as a unique shoot, maybe make it available for patrons donating $750 and up, or you could take them for yourself if you want, they’d still be quite large on you but not to the point where you could make your bed with it.
Kaitlyn: Oh, um, no, no thank you, I think i’d like to see more you wearing some of his stuff..
GiGi: Ooohhhh, well I know I already have one patron on board, say, how exactly would you enjoy seeing me wear it?
Kaitlyn: Well...uh….maybe with, nothing….uhhh
GiGi: Nothing what?
Kaitlyn: Uh…..umm…......nevermind…
GiGi: Alright, just if you ever do want some of this stuff let me know, you gotta take advantage of your top patron exclusive reward of receiving one individual piece of clothing from me!
As GiGi says this, we then hear the door into where they are get kicked down, as through the rubble, emerges Stephen Romero, Kaitlyn looks defensive and ready to scrap, as GiGi initially panics.
Romero: Hey! All that is my damn clothes!
In her panic, GiGi grabs the oversized denim jacket, and tosses it at Romero’s face as a distraction! Before GiGi bails out the room before anything can escalate! Kaitlyn still looks primed to defend, but GiGi forcefully grabs her anyway, pulling her away from the scene all the same.As Romero the takes his denim jaket he got thrown back in, he smiles that it still fits, and puts in on, striking a pose to his crowd in his chat.
Romero: Well…..I lost several hundreds of dollars and cool pieces of clothing because of that……...but at least this denim jacket is still sick though!
Romero then strikes more poses for the fans, as we gradually fade out on the scene.
We come back to the ring, where we see Javier standing in the middle of the ring, ready to announce.
Javier: The following is a tag team match, set for one fall, with a 30 minute time limit! Introducing first-
The Fall III by Doping Hornets comes through the speakers, as we see Mercenaire and Marshall Wheeler both come out from behind the curtain. Both disregarding the audience, as they stride to the ring with confidence.
Javier: From Houston, Texas, and A Dark, Dark Place respectively, weighing in at a combined 480 pounds, Marshall Wheeler, Mercenaire, Coup d’Etat!
Crowd: BOOOOOOOOOOOOOOOOOOOO!
Woodbridge: Being announced from Houston and A Dark Place as separate things? Ain’t those the same thing?
Paisner: Mark!
Woodbridge: Sorry, had to take the opportunity when I had it. Digressing from that, we’ve got one hell of a tag match coming up! As we got two men who are talented and angry, one hell of a deadly combination if i’ve ever seen it. Feeling overlooked, they have a chance to channel that anger into their biggest tag challenge yet in SPECIALIST. They’ve proven they can take care of those they should absolutely beat, now lets see how they fare against those where it’s more of a 50/50.
Wheeler and Mercenaire continue to stoically march their way down to the ring, paying to mind to the jeers tossed their way, as they both reach the ring apron, and step through the ropes in sync with one another, before the two take a spot at the end of the ring, looking out to the entranceway, awaiting their opponents.
The Anomoly by Scar Symmetry blasts heavy riffs throughout the venue, as we see Presagio Del Fin and Nelson Butterfly out on the entranceway. Clinging onto one another, a look of determination on their face.
Javier: And introducing next, from Parts Unknown, weighing in at a combined 437 pounds, Presagio Del Fin, Nelson Butterfly, S.P.E.C.I.A.L.I.S.T.!
Crowd: YAYYYYYYYYYYYYYY!
Paisner: Now, two very strange men coming down to the ring, the traditional pair of SPECIALIST representing it tonight, and despite their unorthodox in-ring methods, there’s very few others who have as much chemistry and knowledge of each other inside and out as SPECIALIST do. And that unorthodox style? Might be exploitable, but if you don’t know that exploit, you get torn apart by it. And inexperienced wrestlers like Mercenaire and Wheeler may be prime for not knowing, this could be a huge win for SPECIALIST here tonight!
Butterfly and Presagio make their way down to the ring with their arms linked together, interacting with the fans, handing out hand slaps as they walk down the entranceway. They begin to practice their respective underhooks and pins to make sure they’re warmed up, before finishing their way to the ring, as they step into it. We see both Coup d’Etat and SPECIALIST talk amongst one another, as we see Mercenaire and Presagio step onto the aprons. While Wheeler and Nelson stay in the ring, Undersach signaling to see if they’re all ready, and getting nods from everyone, rings the bell!
DING DING DING
As the match starts, Wheeler and Nelson slowly approach each other, they lock up, as Wheeler then goes to slip behind Nelson right after! Grabbing Nelson’s head, pulling it back, and driving a european uppercut into the back of Nelson’s head! Nelson holding at the back of his head, before Wheeler shoots a forearm shot into the back of Nelson’s head! Sending Nelson stumbling forward, as Wheeler then runs the ropes, and comes back to attempt an enzu lariat to the back of Nelson’s head, but Nelson drops down! Fitting in between Wheeler’s legs, as Wheeler stops himself after a moment, and turns around to Nelson who had gotten back to his feet, who grabs Wheeler in a double underhook! Wheeler tries to struggle out, but Nelson lifts his knee up into Wheeler’s face! Doing it multiple times until he has Wheeler sufficiently harmed, where upon which, Nelson tosses Wheeler back across the ring with a butterfly suplex! Wheeler landing hard on his back, gritting his teeth in pain!
Crowd: WOOOOOOOOOOOOOOOO!
Paisner: Wheeler trying to quickly strike Nelson down, but Nelson dropping down, then quickly into offense through his patented double underhook!
Wheeler then begins to push himself up, sitting up, then getting onto his hands and knees to try and make his way to his feet, but Nelson swoops in quickly, nails an elbow to the top of Wheeler’s head, and hooks Wheeler’s arms to bring Wheeler up on his own terms. Nelson takes Wheeler over to his tag corner, shooting a look at Presagio to cue him to tag himself in. Presagio sets himself up near Nelson, as Nelson tosses Wheeler up into the air with the set up for a double underhook powerbomb, but instead of following through with it himself, Presagio instead comes in as the one to catch and add his own force to slam Wheeler down to the mat with the assisted tiger bomb! Presagio sitting down with it!
Crowd: OHHHHHHHHHHHHHHHHHHH!
Paisner: Nelson combining well his double underhook and tag team mastery! And of course Presagio keeps the sit-out for a pin!
1! No! Kickout from Wheeler!
Wheeler kicks out with a bit of force, rolling onto his stomach as he does, as Presagio gets up, sizes up Wheeler as Wheeler begins to push himself to his feet, and runs towards the ropes! Jumping onto and bouncing up off of them as he reaches them, and launching himself back at the now to his feet Wheeler with a springboard hurricanrana! Keeping it for the rana pin!
Crowd: WOOOOOOOOOOO!
1!
2! No! Kickout right at 2 from Wheeler!
The force from Wheeler’s kickout pushes Presagio off of Wheeler, Presagio flung outwards as the two have their backs to one another. Both of them attempt to rise to their feet, but Presagio as the healthier man is a good deal faster, and with that, hooks Wheeler from behind him, gets back-to-back to him, and goes down into a backslide pin on Wheeler!
1!
2! No! Kickout from Wheeler again!
As we get another kickout from Wheeler, both men go to scramble to their feet, and as Wheeler rises, Presagio responds with a knee to the gut to double him over, and keep him in place! Following up by going to the ropes, and jumping off for another springboard! This time going for a springboard crossbody, as he connects with Wheeler! But suddenly, Wheeler rolls through the momentum of the crossbody! Coming out of it with Presagio in his grasp, holding Presagio in front of him! Wheeler then lifts Presagio, and goes to toss Presagio over his head, but Presagio shifts his momentum in mid-air and lands on his feet!
Crowd: WOOOOOOOOOOOOOOOOOOOOOOAAAAAAAAAHHHHHHHHHHH!
Paisner: Presagio nearly reversed, but he finds his own way of escape! Directly countering the counter!
And as Presagio lands on his feet, he grabs Wheeler from behind and goes to roll him back into an o’connor roll!.....but Wheeler once again moves his own momentum through! Going into his own o’connor roll!....but he still does not stop! Continuing to follow through by going to lift Presagio up in a rolling german suplex! Lifting Presagio up halfway, but Presagio desperately struggles! Kicking his feet and swinging his arms, until he lands enough wild strikes to force Wheeler to let him go! Wheeler backs off a bit, as Presagio takes a moment to catch his breath and recover, before beginning to run towards the ropes!.......but not before Wheeler recovers himself, and comes forward to spin around, and connect with a spinning back elbow to the back of Presagio’s head! The impact and suddenness of the strike knocking Presagio flat to the mat!
Crowd: OHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHH!
Paisner: BY GOD! THE SPINNING ELBOW TO THE BACK OF THE CRANIUM! COMPLETELY DEVASTATING PRESAGIO!
Presagio is completely laid out, as Wheeler bends his knees for a moment in order to catch himself, before grabbing the limp body of Presagio, and dragging it over to his tag corner, where upon which he lifts Presagio’s body and tosses it into said corner, and tags in Mercenaire. Wheeler then lifts his leg up high, and presses it up against Presagio’s neck to both keep him in place and choke him out!
Crowd: BOOOOOOOOO!
As he does this, Mercenaire enters the ring, and backs up to about the center of the ring, before rushing towards the corner, and just as Wheeler releases his foot choke and moves out the way, Mercenaire connects with a big boot in the corner to the head of Presagio! Knocking him back down limp to the mat!
Crowd: OHHHHHHHHHHHHHHHHHH!
Presagio is completely out on the mat, as Merc stands over him, leans down to grab him, then tosses him right back in the corner where he begins to lay in body punches to the stomach of Presagio! Doubling Presagio over in the corner, as Merc then lays in pointed elbows to the back of Presagio’s neck! Raining down elbow after elbow on Presagio, forcing him lower and lower down in the corner, until he’s dropped to a seated position. Upon which Merc just puts his boot on Presagio’s face, and rubs it in!
Crowd: BOOOOOOOOOOOOOOOOOO!
Woodbridge: Mercenaire just absolutely relentless right now! No mercy nor respect given!
Undersach begins to count off Mercenaire, and gets all the way to the 4 count before Merc removes his boot and finally relents!
Crowd: BOOOOOOOOOOOOOOOOOOO!
submitted by youto2 to wrestlingisreddit [link] [comments]

Why I won't use Airbnb again

Why I won't use Airbnb again
So a couple weeks ago, we had a pretty ridiculous fiasco with Airbnb, in which they claimed that
"A fan legally constitutes an air conditioner".
Trying to see beyond the inanity of that, I suggested that Airbnb offer more than a binary "A/C" vs. "No A/C" option, because, you know, things are not that simple in the real world. (A/C in which room(s)? Of what kind? Is the electricity limited and you get overcharged if you use it more than X hours / day? etc.) Same for "Washedryer" - is it in the unit or in the building? Does it include an actual dryer, or do you need to string clothes lines through the place or wait overnight for things to dry?
Anyway, turns out that an Airbnb competitor already supports this feature.
Adios Airbnb, hello VRBO.
VRBO listings let owners add specifics to amenities
EDIT: I've been comparing VRBO vs. Airbnb. Out of ~30 listings I've seen so far,
  • all used great English. On Airbnb, you get a mishmash of good English, crappy English and whatever the local language is, with the latter hosts showing they don't care for international travelers.
  • all had good photos. Many Airbnb unit photos are dark and lousy, and completely miss parts of the property (e.g. 2BD place only shows 1 bedroom).
  • most had reviews more detailed than the "great place will come again thank u" stuff on Airbnb
  • about 10% of VRBO listings had 3D/virtual tours of the unit
VRBO features that Airbnb doesn't have:
Airbnb is better at:
  • You can filter by "Laptop-friendly workspace". Very useful for DNs, and HomeAway doesn't have that filter.
  • Showing the total price along with the per-night price.
  • Much larger selection of properties, and somewhat lower prices.
The comparison was done for the same class of rentals - 2BD/2BA places in Mexico's Riviera Maya.
Guess Airbnb has fallen victim to its own popularity. VRBO only has 3 (three) posts in /digitalnomad, despite the company being founded more than a decade before Airbnb. Yay marketing!
So I'm about to book via VRBO. Has anyone booked with them already and had issues with the property/host? How helpful was VRBO?
UPDATE & TL;DR: we booked with VRBO/HomeAway and had no problems. The apartment was as described, management was super helpful, as well as the front staff. However, these are not exactly attributes of the website. HomeAway's advantage is that it has a more refined selection of properties, for the choosy traveler, before everyone and their dog got on Airbnb. The only minus in that regard is that they don't have a filter for "Laptop-friendly workspace".
Both sites suck at keyword search. Despite repeated requests from the community, Airbnb doesn't let you search for keywords, e.g. "top floor". Instead, you have ridiculous filters like "shampoo".
submitted by dandv to digitalnomad [link] [comments]

Binary Options Broker - 3 Ways Binary Options Firms Compete for New Clients

The differences between binary options broker dealers are extremely subtle but important. Selecting the incorrect binary options broker may result in missing out on whether lot of incentives or even having trouble building a profit. Here are three ways brokers in the market compete for the business enterprise of day traders.
Bonus Cash Offers Without a doubt the largest most glitzy offer created by companies in this industry could be the offer of considerable levels of bonus cash on new deposits. Competition amongst brokers is very high, and attracting new clients to the rapidly expanding financial field is a priority. As a result firms offer generous cash incentives to attract and retain new clients. The incentive offers have restriction however, and as always the devil is in the details. For instance one firm might offer 25% bonus on new deposits but requires traders to execute trading volume 15 times the quantity of the deposit plus bonus. It will be pays to see the fine print on some of these bonus plans.
Trading Parameters, Yields, and Policies The 2nd way a binary options broker competes is by its trading policies. The nature of the is such that trading happens very rapidly, and contracts flip over every hour (or even sooner). To be able to maintain an organized business, a binary options broker has to set specific trading policies which define when and how contracts will be exchanged. One example of a significant policy is that of trade lockout - i.e. the full time beyond which forget about orders for a contract will be taken. Lockout ranges anywhere from 25 minute ahead of expiration to as little as 5 minutes. Obviously the trader with access to the newest expiring contract has the largest advantage in the market.
Securities Offered The past significant way competitors in the market vie for business is by means of specialization in particular securities td {border: 1px solid #ccc;}br {mso-data-placement:same-cell;}binary options . The majority of participants in the market offer the conventional stock indexes and forex cross pairs to trade with, nevertheless the firms diverge considerably as it pertains to stocks and foreign indexes offered. Some firms have several foreign indexes to trade, like the Asia Bombay India index or the Hang Seng of Hong Kong while another might prefer the IBEX of Spain. An individual wanting to finding the right binary options broker must consider what securities are traded.
submitted by abelrichard to u/abelrichard [link] [comments]

Is the future with snake(Python) or Coffee(Java) ?

Introduction
I would suggest that the future will be enlightened with the development in Python. Python is a large heavily bodied nonvenomous constructor snake where java is a coffee. Seriously, even though I have been using Java for a long time and just started putting my hands on python, I found python really easy and an interesting programming language. You should apply for Online Python Classes in Lucknow to know more about python.
Python vs. Java
Python is a more productive language than Java. Python is an interpreted language with elegant syntax and makes it a very good option for scripting and rapid application development in many areas.
Python is a dynamically typed programming language where there is no necessity of declaring variables whereas java is a statically typed programming language wherein variables are to be explicitly declared.
Python-The King Maker
Python’s real strengths have long been server side technology, software development by non-programmers and as an embedded scripting engine for trusted plugins and in those areas, it’s still powering ahead.
Python Distribution
In linux distribution like Debian or Fedora, the dynamic language interpreters will be Python and Perl.
Apple has expressed their support for Python by building tools that rely on it. Python being the only dynamic language interpreter shipped as part of Mac OS X. Microsoft ships their Python Tools for Visual Studio bundle.
Google, of course, famously chose Python as the only dynamic language supported on their App Engine platform (and they employed Guido van Rossum and a number of other Python core developers).
gcc and gdb both let you write plugins, and your language choices are C/C++ or Python (plus Lisp in the gcc case). Many other infrastructure level tools are going the same way. Fedora’s infrastructure is almost entirely written in Python, as is OpenStack.
In multimedia development, Python will be a core part of your toolset, and Python is the key open source competitor to proprietary toolsets in the scientific community. The Natural Language Toolkit is a hugely powerful resource for many data mining applications, and Python is entwined deeply into the core of the financial sector as well.
Python Development
Many years ago a lot of formal education programs switched from C and C++ (or Pascal or Ada, etc) to Java for introductory programming courses. Now switching to Python, pushing Java into the role of an enterprise language used only for large and complex applications where the development overhead can be justified to some degree.
Informal education programs are also favoring Python as the first “real world” application language that people are introduced to. OLPC chose Python, as did RaspberryPI which is the most Readability one.
Role of few Python Tools
The popularity of GREENLETS and GEVENT in the Python world, which permit the use of asynchronous IO capabilities with a threading-like programming style. The ongoing efforts around tweaking generator syntax and capabilities in Python core development could legitimately be summarized as “make it possible to write Twisted code in a way that doesn’t hurt people’s brains quite so much and without relying on the magical stack-switching assembly code needed for greenlets”.
Tools like Kivy, which aim to make it easier to write mobile applications in Python.
Python’s strength really lies in its ability to step away from traditional web technologies. Want to talk over a serial port to a piece of lab equipment or radio modem, Want to talk to telco gear through a custom C extension? We have a wide range of tools to support that in python, along with some great Asterisk bindings. Python also has many web framework options, like Pyramid and Flask, that let you more easily be selective in your choice of components than Django does. We even get into the potential long term implications of verbal and tactile interfaces like Siri and Baxter.
Recent Release
The recent 3.3 release included several elements aimed at making things easier for beginners, including improved error messages, an option to modify PATH in the Windows installer and the Python launcher, while the entire Python 3 series is aimed at embracing Unicode as part of the core of the language, allowing it to better reach beyond its original audience of users whose native alphabets could be expressed within the constraints of ASCII or an 8-bit encoding.
Upcoming
Python 3.4 is likely to bring improvements in the ability to switch the encoding of a stream “mid-flight”, as well as restoring some convenience APIs for the non-Unicode related uses of the encoding and decoding methods in Python 2.
CONCLUSION
Python’s future is looking very, very bright from where we see and assume that its future is assured. Python is far from perfect, and the same can be said for the ecosystem around us, you should learn python with MSMP Technologies, a Data Entry Company In Lucknow to know more about python. So yes, there are plenty of areas where Python should probably improve. But we shouldn’t lose sight of the fact that many of the problems with Python (like binary distribution, dependency management and concurrency) are problems with software development generally, so there’s nowhere for people to go that will magically make those issues disappear.
submitted by kajalkumari90020 to u/kajalkumari90020 [link] [comments]

Cyberpunk 2077 Lore Raven MicroCybernetics Kazuliski

The 21st century brought about the collapse of America. It was during this time that many of the 20th century's corporate superpowers fell. Amid the chaos of the Wasting Plague, the Food Crash, the 2nd Central American Conflict and the First and Second Corporate Wars, a scientist by the name of Dr. Corvus Crowe rose to prominence. Having completed his doctorate at nineteen, he spent his early twenties working under Janice Grubb as a software engineer for Kenjiri Technologies when they were developing the first Net interface algorithms. He left the project before it was finished and went on to become one of the founders of BioDyne Systems, the corporation credited with creating the first viable cyberlimb. As one of the few members of the BioDyne Seven, who had a head for business, Dr. Crowe bought out several fragmented post-Collapse corporate holdings. In 2009, while BioDyne Systems went bankrupt, Raven Microcybernetics was declared an official corporate entity. Later that year, BioDyne became another property of the investment group formed by Dr. Crowe, whose new corporation embarked on a meteoric rise within the American industry.
Raven Microcybernetics aka RMC would become the premier American manufacturer of cyberware. They are well known for their cutting edge cybertechnology, and are well-respected for their quality-control and modesty. Being heavily involved in sensitive research and development projects, RMC is a security-conscious company. In terms of public image, RMC is recognized not so much by its corporate policy as by its "shelf presence; they are world-renowned for producing high-quality cyberware, full-body conversions, electronics, netware and ACPA components. Stock market and business trends analysts have generally concurred that RMC is Dr. Corvus Crowe; the corporation's policies mirror his own personality, its products echo the Doctors own areas of expertise, and fluctuations in RMC stock have even been theoretically reflected in Dr. Crowe's health. According to most experts, there is no other company which is so tightly tied to one man.
RMC, being at the top of the American cyberware food chain, is despised by its competitors. Space-based corporations also antagonize RMC, whose vested interest in space is seen as threatening. Because of these conditions, Raven can count International Electric, Militech, Utopian Corporation, Dynalar and Adrek Robotics amongst its enemies. Orbital Air is RMCs most powerful corporate ally as Raven's constant patronage has ensured their support. It has even led to their co-development of the Warrior and Crusader ACPA chassis. Mitsubishi-Kyoridansu, being the premier manufacturer of space habitats, are also on very good terms with RMC; as one of the most powerful zaibatsu in Japan, they have done a great deal to open the Pacific Rim to Raven's products. RMC is particularly friendly with Tsunami Design Bureau who provide for much of Raven’s small arm’s needs.
Perhaps the most famous Raven hardware is the Gemini Humanoid Full Conversion. Normally full body conversions have a multitude of advantages, superhuman strength, speed and durability, heightened reflexes, the ability to alter the body at will and even an increased lifespan. However, being a Full Borg sets you apart. Society brands you as a Metalhead and people treat you like a machine. If you want the advantages of a full conversion without the societal baggage, Gemini is the package for you. The Gemini is a full body conversion that simulates the human body in both form and function. Its chassis is designed in a similar manner to the human skeletal structure, and its myomar muscle system is arranged to physically mimic the human musculature. With this carefully-tailored layout, the Gemini cleverly imitates the anatomy of a normal person without sacrificing the superior capabilities for which full body conversions are so well known. To complete the effect, Gemini’s entire surface is covered with ExoDerm, a synthetic surface which looks and feels almost like human skin.
The Gemini’s capability to pass for a normal human is impressive. Its built-in Pinocchio sub-processor automatically maintains body temperature, expands and contracts the upper torso to create the illusion of breathing, and even blinks the eyes occasionally. What’s more, the entire body is composed of lightweight carbon synthetics and other composite materials, resulting in a mere ten-pound deviation from the average weight for a similar size person. In addition, the Gemini can be equipped with an added disguise feature, wherein tiny micro surfaces can be used to change the cyborgs facial features, and a chemskin-type modification to the Exo Derm allows the skin tone to be altered at will. This is a popular option for infiltration and espionage roles to which the Gemini is well-suited.
Another area that Raven specialises in is Cyberspace, and thus they developed the Wiseman. A Cyberspace Commando Full Borg Conversion. It’s often said that the person who masters the Net, can master the world, and if that’s true, then one of the best qualified individuals for the job is a Wiseman Borg. Combining a full borg with the processing power of a supercomputer, and the focused fusion of pure human genius, the Raven Wiseman embodies that ethereal communion with the global information system which Netrunners seek like nirvana.
Once brought over from the meat world to a new incarnation, the reborn Wiseman will never experience plain vanilla reality again. To enhance the Cyborgs affinity to Netspace, their mind will experience the outside world through a TechGnosis interface. The operating system interprets all five sensory stimuli and translates them into binary data, this machine language is fed to the mind as a Netspace simulation, acclimating the Wiseman to the environment of the Net until it is second nature to them.
Spread throughout the cyborgs chassis is a multitude of canine brains whose pseudo intelligence routines effectively give the Wiseman an extra 11.4 pounds of brain. Hardwired into a superconductive nervous system, these slave minds allow the Wiseman to think faster and act more often than any human and even most computer mainframes. When jacked in, a Wiseman is as effective as a squad of assault Netrunners.
Towards the end of the fourth corporate war, it was rumoured that RMC, developed a Wiseman Mark-II which does not use a transplanted brain, but houses a cloned brain encode via Soulkiller-type programs, with a software duplicate of a human mind. Details on the Wiseman II remain elusive. For more Cyberpunk 2077 Lore & News check out Kazuliski.
submitted by Kazuliski to Kazuliski [link] [comments]

Returning to PC from my 2011 macbook pro. Need a quiet, dark PC for software development, VMs, patientgaming

What will you be doing with this PC? Be as specific as possible, and include specific games or programs you will be using.
The main justification for building a new computer is to replace my dying MacBook Pro 2011 as a day-to-day computer, and to be able to do more at home software development. I'm at my computer most of the day so I'm willing to spend a bit for things that are going to save me time and frustration: thinking specifically about 32gb ram and NVMe here.
This PC is going to sit in my living room day and night, so it needs to be quiet and dark. Zero interest in any LEDs, RGB or glass panel cases. Because there's not a lot of space for it, I think Micro-ATX is the right size for me. I don't anticipate needing too many drive or PCI slots, and if I'm wrong about drives in a few years buying a larger case isn't that big of a deal.
I'll probably be running at least one VM eventually, not sure if I'm doing windows host with linux guest or linux host with windows guest, but I'd like to be able to have the guest itself be a decent development machine. I prefer Linux as a development environment but understand windows is better for gaming and more convenient or other things.
I'd also like to do some gaming of the /patientgamers type. I have no interest in online, competitive games or playing the latest and greatest. Some titles I'm looking to play soon are XCOM 2, Witcher 3, Terraria, Subnautica, Borderlands 3. Those games alone will probably take me 2-3 years to get through.
I'll probably also use this as a host for backups, e.g. photos, TimeMachine, and maybe run a plex server on it.
What is your maximum budget before rebates/shipping/taxes?
$1500, but I doubt I'd need to spend that much to meet my needs.
When do you plan on building/buying the PC? Note: beyond a week or two from today means any build you receive will be out of date when you want to buy.
Within a week or two then
What, exactly, do you need included in the budget? (ToweOS/monitokeyboard/mouse/etc)
Tower, WiFi whether by USB, PCI or on motherboard.
I'm doubtful that on-motherboard WiFi would be my best option: this PC sits at the opposite end of the apartment from WiFi and it's not easy to get it closer.
Which country (and state/province) will you be purchasing the parts in? If you're in US, do you have access to a Microcenter location?
USA, California. The closest Microcenter is 1.5 hours away, and given the pandemic situation I'm not willing to drive there except for a significant savings, e.g. >$300 off on the build.
If reusing any parts (including monitor(s)/keyboard/mouse/etc), what parts will you be reusing? Brands and models are appreciated.
Will you be overclocking? If yes, are you interested in overclocking right away, or down the line? CPU and/or GPU?
Definitely not day 1. Probably not down the road, especially if it's going to cost more in noise.
Are there any specific features or items you want/need in the build? (ex: SSD, large amount of storage or a RAID setup, CUDA or OpenCL support, etc)
What type of network connectivity do you need? (Wired and/or WiFi) If WiFi is needed and you would like to find the fastest match for your wireless router, please list any specifics.
Do you have any specific case preferences (Size like ITX/microATX/mid-towefull-tower, styles, colors, window or not, LED lighting, etc), or a particular color theme preference for the components?
Do you need a copy of Windows included in the budget? If you do need one included, do you have a preference?
Extra info or particulars:
I've talked to a knowledgeable friend and the settled on the following components around the core of the build, but I'm open to other opinions too
I don't mind upgrading components if needed over the next 3-5 years but don't want to have to do a brand new build before 5 years.
Many thanks!
submitted by squat_whisperer to buildapcforme [link] [comments]

Vault 7 - CIA Hacking Tools Revealed

Vault 7 - CIA Hacking Tools Revealed
March 07, 2017
from Wikileaks Website


https://preview.redd.it/9ufj63xnfdb41.jpg?width=500&format=pjpg&auto=webp&s=46bbc937f4f060bad1eaac3e0dce732e3d8346ee

Press Release
Today, Tuesday 7 March 2017, WikiLeaks begins its new series of leaks on the U.S. Central Intelligence Agency.
Code-named "Vault 7" by WikiLeaks, it is the largest ever publication of confidential documents on the agency.
The first full part of the series, "Year Zero", comprises 8,761 documents and files from an isolated, high-security network situated inside the CIA's Center for Cyber Intelligence (below image) in Langley, Virgina.
It follows an introductory disclosure last month of CIA targeting French political parties and candidates in the lead up to the 2012 presidential election.
Recently, the CIA lost control of the majority of its hacking arsenal including,
  1. malware
  2. viruses
  3. trojans
  4. weaponized "zero day" exploits
  5. malware remote control systems

...and associated documentation.
This extraordinary collection, which amounts to more than several hundred million lines of code, gives its possessor the entire hacking capacity of the CIA.
The archive appears to have been circulated among former U.S. government hackers and contractors in an unauthorized manner, one of whom has provided WikiLeaks with portions of the archive.
"Year Zero" introduces the scope and direction of the CIA's global covert hacking program, its malware arsenal and dozens of "zero day" weaponized exploits against a wide range of U.S. and European company products, include,

  1. Apple's iPhone
  2. Google's Android
  3. Microsoft's Windows
  4. Samsung TVs,

...which are turned into covert microphones.
Since 2001 the CIA has gained political and budgetary preeminence over the U.S. National Security Agency (NSA).
The CIA found itself building not just its now infamous drone fleet, but a very different type of covert, globe-spanning force - its own substantial fleet of hackers.
The agency's hacking division freed it from having to disclose its often controversial operations to the NSA (its primary bureaucratic rival) in order to draw on the NSA's hacking capacities.
By the end of 2016, the CIA's hacking division, which formally falls under the agency's Center for Cyber Intelligence (CCI - below image), had over 5000 registered users and had produced more than a thousand,
hacking systems trojans viruses,
...and other "weaponized" malware.


https://preview.redd.it/3jsojkqxfdb41.jpg?width=366&format=pjpg&auto=webp&s=e92eafbb113ab3e972045cc242dde0f0dd511e96

Such is the scale of the CIA's undertaking that by 2016, its hackers had utilized more codes than those used to run Facebook.
The CIA had created, in effect, its "own NSA" with even less accountability and without publicly answering the question as to whether such a massive budgetary spend on duplicating the capacities of a rival agency could be justified.
In a statement to WikiLeaks the source details policy questions that they say urgently need to be debated in public, including whether the CIA's hacking capabilities exceed its mandated powers and the problem of public oversight of the agency.
The source wishes to initiate a public debate about the security, creation, use, proliferation and democratic control of cyberweapons.
Once a single cyber 'weapon' is 'loose' it can spread around the world in seconds, to be used by rival states, cyber mafia and teenage hackers alike.

Julian Assange, WikiLeaks editor stated that,
"There is an extreme proliferation risk in the development of cyber 'weapons'.
Comparisons can be drawn between the uncontrolled proliferation of such 'weapons', which results from the inability to contain them combined with their high market value, and the global arms trade.
But the significance of 'Year Zero' goes well beyond the choice between cyberwar and cyberpeace. The disclosure is also exceptional from a political, legal and forensic perspective."

Wikileaks has carefully reviewed the "Year Zero" disclosure and published substantive CIA documentation while avoiding the distribution of 'armed' cyberweapons until a consensus emerges on the technical and political nature of the CIA's program and how such 'weapons' should analyzed, disarmed and published.

Wikileaks has also decided to Redact (see far below) and Anonymize some identifying information in "Year Zero" for in depth analysis. These redactions include ten of thousands of CIA targets and attack machines throughout,
Latin America Europe the United States

While we are aware of the imperfect results of any approach chosen, we remain committed to our publishing model and note that the quantity of published pages in "Vault 7" part one ("Year Zero") already eclipses the total number of pages published over the first three years of the Edward Snowden NSA leaks.

Analysis

CIA malware targets iPhone, Android, smart TVs
CIA malware and hacking tools are built by EDG (Engineering Development Group), a software development group within CCI (Center for Cyber Intelligence), a department belonging to the CIA's DDI (Directorate for Digital Innovation).
The DDI is one of the five major directorates of the CIA (see above image of the CIA for more details).
The EDG is responsible for the development, testing and operational support of all backdoors, exploits, malicious payloads, trojans, viruses and any other kind of malware used by the CIA in its covert operations world-wide.
The increasing sophistication of surveillance techniques has drawn comparisons with George Orwell's 1984, but "Weeping Angel", developed by the CIA's Embedded Devices Branch (EDB), which infests smart TVs, transforming them into covert microphones, is surely its most emblematic realization.
The attack against Samsung smart TVs was developed in cooperation with the United Kingdom's MI5/BTSS.
After infestation, Weeping Angel places the target TV in a 'Fake-Off' mode, so that the owner falsely believes the TV is off when it is on. In 'Fake-Off' mode the TV operates as a bug, recording conversations in the room and sending them over the Internet to a covert CIA server.
As of October 2014 the CIA was also looking at infecting the vehicle control systems used by modern cars and trucks. The purpose of such control is not specified, but it would permit the CIA to engage in nearly undetectable assassinations.
The CIA's Mobile Devices Branch (MDB) developed numerous attacks to remotely hack and control popular smart phones. Infected phones can be instructed to send the CIA the user's geolocation, audio and text communications as well as covertly activate the phone's camera and microphone.
Despite iPhone's minority share (14.5%) of the global smart phone market in 2016, a specialized unit in the CIA's Mobile Development Branch produces malware to infest, control and exfiltrate data from iPhones and other Apple products running iOS, such as iPads.
CIA's arsenal includes numerous local and remote "zero days" developed by CIA or obtained from GCHQ, NSA, FBI or purchased from cyber arms contractors such as Baitshop.
The disproportionate focus on iOS may be explained by the popularity of the iPhone among social, political, diplomatic and business elites.
A similar unit targets Google's Android which is used to run the majority of the world's smart phones (~85%) including Samsung, HTC and Sony. 1.15 billion Android powered phones were sold last year.
"Year Zero" shows that as of 2016 the CIA had 24 "weaponized" Android "zero days" which it has developed itself and obtained from GCHQ, NSA and cyber arms contractors.
These techniques permit the CIA to bypass the encryption of, WhatsApp
  1. Signal
  2. Telegram
  3. Wiebo
  4. Confide
  5. Cloackman
...by hacking the "smart" phones that they run on and collecting audio and message traffic before encryption is applied.
CIA malware targets Windows, OSx, Linux, routers
The CIA also runs a very substantial effort to infect and control Microsoft Windows users with its malware.
This includes multiple local and remote weaponized "zero days", air gap jumping viruses such as "Hammer Drill" which infects software distributed on CD/DVDs, infectors for removable media such as USBs, systems to hide data in images or in covert disk areas ("Brutal Kangaroo") and to keep its malware infestations going.
Many of these infection efforts are pulled together by the CIA's Automated Implant Branch (AIB), which has developed several attack systems for automated infestation and control of CIA malware, such as "Assassin" and "Medusa".
Attacks against Internet infrastructure and webservers are developed by the CIA's Network Devices Branch (NDB).
The CIA has developed automated multi-platform malware attack and control systems covering Windows, Mac OS X, Solaris, Linux and more, such as EDB's "HIVE" and the related "Cutthroat" and "Swindle" tools, which are described in the examples section far below.
CIA 'hoarded' vulnerabilities ("zero days")
In the wake of Edward Snowden's leaks about the NSA, the U.S. technology industry secured a commitment from the Obama administration that the executive would disclose on an ongoing basis - rather than hoard - serious vulnerabilities, exploits, bugs or "zero days" to Apple, Google, Microsoft, and other US-based manufacturers.
Serious vulnerabilities not disclosed to the manufacturers places huge swathes of the population and critical infrastructure at risk to foreign intelligence or cyber criminals who independently discover or hear rumors of the vulnerability.
If the CIA can discover such vulnerabilities so can others.
The U.S. government's commitment to the Vulnerabilities Equities Process came after significant lobbying by US technology companies, who risk losing their share of the global market over real and perceived hidden vulnerabilities.
The government stated that it would disclose all pervasive vulnerabilities discovered after 2010 on an ongoing basis.
"Year Zero" documents show that the CIA breached the Obama administration's commitments. Many of the vulnerabilities used in the CIA's cyber arsenal are pervasive and some may already have been found by rival intelligence agencies or cyber criminals.
As an example, specific CIA malware revealed in "Year Zero" is able to penetrate, infest and control both the Android phone and iPhone software that runs or has run presidential Twitter accounts.
The CIA attacks this software by using undisclosed security vulnerabilities ("zero days") possessed by the CIA but if the CIA can hack these phones then so can everyone else who has obtained or discovered the vulnerability.
As long as the CIA keeps these vulnerabilities concealed from Apple and Google (who make the phones) they will not be fixed, and the phones will remain hackable.
The same vulnerabilities exist for the population at large, including the U.S. Cabinet, Congress, top CEOs, system administrators, security officers and engineers.
By hiding these security flaws from manufacturers like Apple and Google the CIA ensures that it can hack everyone at the expense of leaving everyone hackable.
'Cyberwar' programs are a serious proliferation risk
Cyber 'weapons' are not possible to keep under effective control.
While nuclear proliferation has been restrained by the enormous costs and visible infrastructure involved in assembling enough fissile material to produce a critical nuclear mass, cyber 'weapons', once developed, are very hard to retain.
Cyber 'weapons' are in fact just computer programs which can be pirated like any other. Since they are entirely comprised of information they can be copied quickly with no marginal cost.
Securing such 'weapons' is particularly difficult since the same people who develop and use them have the skills to exfiltrate copies without leaving traces - sometimes by using the very same 'weapons' against the organizations that contain them.
There are substantial price incentives for government hackers and consultants to obtain copies since there is a global "vulnerability market" that will pay hundreds of thousands to millions of dollars for copies of such 'weapons'.
Similarly, contractors and companies who obtain such 'weapons' sometimes use them for their own purposes, obtaining advantage over their competitors in selling 'hacking' services.
Over the last three years the United States intelligence sector, which consists of government agencies such as the CIA and NSA and their contractors, such as Booz Allan Hamilton, has been subject to unprecedented series of data exfiltrations by its own workers.
A number of intelligence community members not yet publicly named have been arrested or subject to federal criminal investigations in separate incidents.
Most visibly, on February 8, 2017 a U.S. federal grand jury indicted Harold T. Martin III with 20 counts of mishandling classified information.
The Department of Justice alleged that it seized some 50,000 gigabytes of information from Harold T. Martin III that he had obtained from classified programs at NSA and CIA, including the source code for numerous hacking tools.
Once a single cyber 'weapon' is 'loose' it can spread around the world in seconds, to be used by peer states, cyber mafia and teenage hackers alike.
U.S. Consulate in Frankfurt is a covert CIA hacker base
In addition to its operations in Langley, Virginia the CIA also uses the U.S. consulate in Frankfurt as a covert base for its hackers covering Europe, the Middle East and Africa.
CIA hackers operating out of the Frankfurt consulate ("Center for Cyber Intelligence Europe" or CCIE) are given diplomatic ("black") passports and State Department cover.
The instructions for incoming CIA hackers make Germany's counter-intelligence efforts appear inconsequential: "Breeze through German Customs because you have your cover-for-action story down pat, and all they did was stamp your passport" Your Cover Story (for this trip) Q: Why are you here? A: Supporting technical consultations at the Consulate. Two earlier WikiLeaks publications give further detail on CIA approaches to customs and secondary screening procedures.
Once in Frankfurt CIA hackers can travel without further border checks to the 25 European countries that are part of the Shengen open border area - including France, Italy and Switzerland.
A number of the CIA's electronic attack methods are designed for physical proximity.
These attack methods are able to penetrate high security networks that are disconnected from the internet, such as police record database. In these cases, a CIA officer, agent or allied intelligence officer acting under instructions, physically infiltrates the targeted workplace.
The attacker is provided with a USB containing malware developed for the CIA for this purpose, which is inserted into the targeted computer. The attacker then infects and exfiltrates data to removable media.
For example, the CIA attack system Fine Dining, provides 24 decoy applications for CIA spies to use.
To witnesses, the spy appears to be running a program showing videos (e.g VLC), presenting slides (Prezi), playing a computer game (Breakout2, 2048) or even running a fake virus scanner (Kaspersky, McAfee, Sophos).
But while the decoy application is on the screen, the underlying system is automatically infected and ransacked.
How the CIA dramatically increased proliferation risks
In what is surely one of the most astounding intelligence own goals in living memory, the CIA structured its classification regime such that for the most market valuable part of "Vault 7", the CIA's, weaponized malware (implants + zero days) Listening Posts (LP) Command and Control (C2) systems, ...the agency has little legal recourse.
The CIA made these systems unclassified.
Why the CIA chose to make its cyber-arsenal unclassified reveals how concepts developed for military use do not easily crossover to the 'battlefield' of cyber 'war'.
To attack its targets, the CIA usually requires that its implants communicate with their control programs over the internet.
If CIA implants, Command & Control and Listening Post software were classified, then CIA officers could be prosecuted or dismissed for violating rules that prohibit placing classified information onto the Internet.
Consequently the CIA has secretly made most of its cyber spying/war code unclassified. The U.S. government is not able to assert copyright either, due to restrictions in the U.S. Constitution.
This means that cyber 'arms' manufactures and computer hackers can freely "pirate" these 'weapons' if they are obtained. The CIA has primarily had to rely on obfuscation to protect its malware secrets.
Conventional weapons such as missiles may be fired at the enemy (i.e. into an unsecured area). Proximity to or impact with the target detonates the ordnance including its classified parts. Hence military personnel do not violate classification rules by firing ordnance with classified parts.
Ordnance will likely explode. If it does not, that is not the operator's intent.
Over the last decade U.S. hacking operations have been increasingly dressed up in military jargon to tap into Department of Defense funding streams.
For instance, attempted "malware injections" (commercial jargon) or "implant drops" (NSA jargon) are being called "fires" as if a weapon was being fired.
However the analogy is questionable.
Unlike bullets, bombs or missiles, most CIA malware is designed to live for days or even years after it has reached its 'target'. CIA malware does not "explode on impact" but rather permanently infests its target. In order to infect target's device, copies of the malware must be placed on the target's devices, giving physical possession of the malware to the target.
To exfiltrate data back to the CIA or to await further instructions the malware must communicate with CIA Command & Control (C2) systems placed on internet connected servers.
But such servers are typically not approved to hold classified information, so CIA command and control systems are also made unclassified.
A successful 'attack' on a target's computer system is more like a series of complex stock maneuvers in a hostile take-over bid or the careful planting of rumors in order to gain control over an organization's leadership rather than the firing of a weapons system.
If there is a military analogy to be made, the infestation of a target is perhaps akin to the execution of a whole series of military maneuvers against the target's territory including observation, infiltration, occupation and exploitation.
Evading forensics and anti-virus
A series of standards lay out CIA malware infestation patterns which are likely to assist forensic crime scene investigators as well as, Apple
  1. Microsoft
  2. Google
  3. Samsung
  4. Nokia
  5. Blackberry
  6. Siemens
  7. anti-virus companies,
...attribute and defend against attacks.
"Tradecraft DO's and DON'Ts" contains CIA rules on how its malware should be written to avoid fingerprints implicating the "CIA, US government, or its witting partner companies" in "forensic review".
Similar secret standards cover the, use of encryption to hide CIA hacker and malware communication (pdf) describing targets & exfiltrated data (pdf) executing payloads (pdf) persisting (pdf), ...in the target's machines over time.
CIA hackers developed successful attacks against most well known anti-virus programs.
These are documented in, AV defeats Personal Security Products Detecting and defeating PSPs PSP/DebuggeRE Avoidance For example, Comodo was defeated by CIA malware placing itself in the Window's "Recycle Bin". While Comodo 6.x has a "Gaping Hole of DOOM".
CIA hackers discussed what the NSA's "Equation Group" hackers did wrong and how the CIA's malware makers could avoid similar exposure.

Examples

The CIA's Engineering Development Group (EDG) management system contains around 500 different projects (only some of which are documented by "Year Zero") each with their own sub-projects, malware and hacker tools.
The majority of these projects relate to tools that are used for,
penetration infestation ("implanting") control exfiltration
Another branch of development focuses on the development and operation of Listening Posts (LP) and Command and Control (C2) systems used to communicate with and control CIA implants.
Special projects are used to target specific hardware from routers to smart TVs.
Some example projects are described below, but see the table of contents for the full list of projects described by WikiLeaks' "Year Zero".
UMBRAGE
The CIA's hand crafted hacking techniques pose a problem for the agency.
Each technique it has created forms a "fingerprint" that can be used by forensic investigators to attribute multiple different attacks to the same entity.
This is analogous to finding the same distinctive knife wound on multiple separate murder victims. The unique wounding style creates suspicion that a single murderer is responsible.
As soon one murder in the set is solved then the other murders also find likely attribution.
The CIA's Remote Devices Branch's UMBRAGE group collects and maintains a substantial library of attack techniques 'stolen' from malware produced in other states including the Russian Federation.
With UMBRAGE and related projects the CIA cannot only increase its total number of attack types but also misdirect attribution by leaving behind the "fingerprints" of the groups that the attack techniques were stolen from.
UMBRAGE components cover,
keyloggers
  1. password collection
  2. webcam capture
  3. data destruction
  4. persistence
  5. privilege escalation
  6. stealth
  7. anti-virus (PSP) avoidance
  8. survey techniques

Fine Dining
Fine Dining comes with a standardized questionnaire i.e menu that CIA case officers fill out.
The questionnaire is used by the agency's OSB (Operational Support Branch) to transform the requests of case officers into technical requirements for hacking attacks (typically "exfiltrating" information from computer systems) for specific operations.
The questionnaire allows the OSB to identify how to adapt existing tools for the operation, and communicate this to CIA malware configuration staff.
The OSB functions as the interface between CIA operational staff and the relevant technical support staff.
Among the list of possible targets of the collection are,
  • 'Asset'
  • 'Liason Asset'
  • 'System Administrator'
  • 'Foreign Information Operations'
  • 'Foreign Intelligence Agencies'
  • 'Foreign Government Entities'
Notably absent is any reference to extremists or transnational criminals. The 'Case Officer' is also asked to specify the environment of the target like the type of computer, operating system used, Internet connectivity and installed anti-virus utilities (PSPs) as well as a list of file types to be exfiltrated like Office documents, audio, video, images or custom file types.
The 'menu' also asks for information if recurring access to the target is possible and how long unobserved access to the computer can be maintained.
This information is used by the CIA's 'JQJIMPROVISE' software (see below) to configure a set of CIA malware suited to the specific needs of an operation.
Improvise (JQJIMPROVISE)
  1. 'Improvise' is a toolset for configuration, post-processing, payload setup and execution vector
  2. selection for survey/exfiltration tools supporting all major operating systems like,
  3. Windows (Bartender)
  4. MacOS (JukeBox)
  5. Linux (DanceFloor)
  6. Its configuration utilities like Margarita allows the NOC (Network Operation Center) to customize tools
based on requirements from 'Fine Dining' questionnaires.
HIVE
HIVE is a multi-platform CIA malware suite and its associated control software.
The project provides customizable implants for Windows, Solaris, MikroTik (used in internet routers) and Linux platforms and a Listening Post (LP)/Command and Control (C2) infrastructure to communicate with these implants.
The implants are configured to communicate via HTTPS with the webserver of a cover domain; each operation utilizing these implants has a separate cover domain and the infrastructure can handle any number of cover domains.
Each cover domain resolves to an IP address that is located at a commercial VPS (Virtual Private Server) provider.
The public-facing server forwards all incoming traffic via a VPN to a 'Blot' server that handles actual connection requests from clients.
It is setup for optional SSL client authentication: if a client sends a valid client certificate (only implants can do that), the connection is forwarded to the 'Honeycomb' toolserver that communicates with the implant.
If a valid certificate is missing (which is the case if someone tries to open the cover domain website by accident), the traffic is forwarded to a cover server that delivers an unsuspicious looking website.
The Honeycomb toolserver receives exfiltrated information from the implant; an operator can also task the implant to execute jobs on the target computer, so the toolserver acts as a C2 (command and control) server for the implant.
Similar functionality (though limited to Windows) is provided by the RickBobby project.
See the classified user and developer guides for HIVE.

Frequently Asked Questions

Why now?
WikiLeaks published as soon as its verification and analysis were ready. In February the Trump administration has issued an Executive Order calling for a "Cyberwar" review to be prepared within 30 days.
While the review increases the timeliness and relevance of the publication it did not play a role in setting the publication date.
Redactions
Names, email addresses and external IP addresses have been redacted in the released pages (70,875 redactions in total) until further analysis is complete. Over-redaction: Some items may have been redacted that are not employees, contractors, targets or otherwise related to the agency, but are, for example, authors of documentation for otherwise public projects that are used by the agency.
Identity vs. person: the redacted names are replaced by user IDs (numbers) to allow readers to assign multiple pages to a single author. Given the redaction process used a single person may be represented by more than one assigned identifier but no identifier refers to more than one real person.
Archive attachments (zip, tar.gz, ...), are replaced with a PDF listing all the file names in the archive. As the archive content is assessed it may be made available; until then the archive is redacted.
Attachments with other binary content, are replaced by a hex dump of the content to prevent accidental invocation of binaries that may have been infected with weaponized CIA malware. As the content is assessed it may be made available; until then the content is redacted.
Tens of thousands of routable IP addresses references, (including more than 22 thousand within the United States) that correspond to possible targets, CIA covert listening post servers, intermediary and test systems, are redacted for further exclusive investigation.
Binary files of non-public origin, are only available as dumps to prevent accidental invocation of CIA malware infected binaries.
Organizational Chart
The organizational chart (far above image) corresponds to the material published by WikiLeaks so far.
Since the organizational structure of the CIA below the level of Directorates is not public, the placement of the EDG and its branches within the org chart of the agency is reconstructed from information contained in the documents released so far.
It is intended to be used as a rough outline of the internal organization; please be aware that the reconstructed org chart is incomplete and that internal reorganizations occur frequently.
Wiki pages
"Year Zero" contains 7818 web pages with 943 attachments from the internal development groupware. The software used for this purpose is called Confluence, a proprietary software from Atlassian.
Webpages in this system (like in Wikipedia) have a version history that can provide interesting insights on how a document evolved over time; the 7818 documents include these page histories for 1136 latest versions.
The order of named pages within each level is determined by date (oldest first). Page content is not present if it was originally dynamically created by the Confluence software (as indicated on the re-constructed page).
What time period is covered?
The years 2013 to 2016. The sort order of the pages within each level is determined by date (oldest first).
WikiLeaks has obtained the CIA's creation/last modification date for each page but these do not yet appear for technical reasons. Usually the date can be discerned or approximated from the content and the page order.
If it is critical to know the exact time/date contact WikiLeaks.
What is "Vault 7"
"Vault 7" is a substantial collection of material about CIA activities obtained by WikiLeaks.
When was each part of "Vault 7" obtained?
Part one was obtained recently and covers through 2016. Details on the other parts will be available at the time of publication.
Is each part of "Vault 7" from a different source?
Details on the other parts will be available at the time of publication.
What is the total size of "Vault 7"?
The series is the largest intelligence publication in history.
How did WikiLeaks obtain each part of "Vault 7"?
Sources trust WikiLeaks to not reveal information that might help identify them.
Isn't WikiLeaks worried that the CIA will act against its staff to stop the series?
No. That would be certainly counter-productive.
Has WikiLeaks already 'mined' all the best stories?
No. WikiLeaks has intentionally not written up hundreds of impactful stories to encourage others to find them and so create expertise in the area for subsequent parts in the series. They're there.
Look. Those who demonstrate journalistic excellence may be considered for early access to future parts.
Won't other journalists find all the best stories before me?
Unlikely. There are very considerably more stories than there are journalists or academics who are in a position to write them.
submitted by CuteBananaMuffin to conspiracy [link] [comments]

05-04 12:04 - 'Bitnexor (Bitnexor.com) is a cryptocurrency exchange that provides a platform for trading and gambling in various cryptocurrencies .' (self.Bitcoin) by /u/_itsAmazing removed from /r/Bitcoin within 7-17min

'''
This exchange deservedly got into the top of largest cryptocurrency exchanges in 2020. Bitnexor is not well known among the English-speaking audience. But unlike the previous competitor, the resource interface is very simple to use, allowing newcomers to quickly start trading.
[bitnexor.com]1
At first, Bitnexor sold and bought only Bitcoin, but not so long ago it became possible to trade the cryptocurrency Etherium and BitcoinCash and expanded its functionality by adding an binary option and a cryptorulet for gambling.
'''
Bitnexor (Bitnexor.com) is a cryptocurrency exchange that provides a platform for trading and gambling in various cryptocurrencies .
Go1dfish undelete link
unreddit undelete link
Author: _itsAmazing
1: pre**ew.r*dd.it/lx3r2nr*lqw*1.png?*i*th**34*&**orma*=p*g&**p**ut**webp&a*p;s***75*80493206a87e02*4*82bc143ad*a*68*ecc
Unknown links are censored to prevent spreading illicit content.
submitted by removalbot to removalbot [link] [comments]

[Tournament Report] Mythic Invitational - Lucas Berthoud

"Almost anyone who loves tennis and follows the men’s tour on television has, over the last few years, had what might be termed Federer Moments. These are times, as you watch the young Swiss play, when the jaw drops and eyes protrude and sounds are made that bring spouses in from other rooms to see if you’re O.K. The Moments are more intense if you’ve played enough tennis to understand the impossibility of what you just saw him do." David Foster Wallace
"Build strategy. Mind control, concentration, reaction. Micro and macro. Discipline, practice, stamina. These are the "winning factors". No progamer can ever be great at all of them. Never. I can say that from my 10 years of experience commentating countless games. I can say that with absolute confidence. Without hesitation, I can say that, and fool you... if you never watch Savior's games." SungWon Yi
Magic as an esport
I am writing this on saturday morning. So far, the tournament has been a success on several different metrics: viewership, hype, production value. I had an amazing time hanging out with other competitors and attending the legendary event party last Thursday. The best of times, really. Being a part of it felt special.
But I can’t say the Invitational has been at its best in the one metric that I really care about: good gameplay. I am not really feeling the WOW factor from the quotes above, or that I constantly have when I watch things like the top 8 of Mythic Championship, or Mike Sigrist drafting, Shota playing control, Huey playing Temur at Worlds 2017.
In a ideal world, the transition from magic to an esport would heavily focus on measures that reduce variance and allow players to leverage skill.
We would play a lot of rounds and tournaments would have open qualifiers, creating legitimacy to invitees and the results.
The format would be something like Legacy with a curated ban list for cards that allow flexibility and decision making (unban Deathrite Shaman and Sensei’s Divining tube) and draft would be one of all-time classic formats or a custom designed cube. While this take is obviously undoable for several good reasons, its an example of an ideal format if you cared only about leveraging skill and can help illustrate how much we are "sacrificing" in this regard in favor of approachability for new players.
The current Mythic Championship (Pro Tour) structure of bo3 booster draft + standard/modern is a grat compromise of having interesting gameplay while also promoting new sets and popular formats.
One of my favorite events to have ever watched as a spectator was 2017 MOCS. High-level commentary, absolute high-level games (mardu x saheeli combo was a hard to play matchup with a lot of tension!), players that fought hard to get there, and a viewer friendly UI, allowing the cards to be better seen by viewers. It wasn’t perfect for viewers because there was still the barrier of having to know and identify all the small pixelated cards beforehand to enjoy the experience, and because mtgo interface is bland.
If you took that tournament and had it played in Arena, that would very closely encapsulate my perfect vision for Magic as an esport.
But what we have right now is Duo Standard and double elimination.
The problems with Best-of-1
Duo Standard is not a good competitive format. It’s best-of-1 with bells and whistles to it, but still best-of-1 with all the problems around it.
The games feel out of control where your decisions don’t really matter. There is not a lot of strategic depth to it, not a lot of room to outmaneuver your opponent.
The hand fixing algorythm means the games are too scripted. They always have the busted hand. Do you have it too? Did you win the die rool? That’s all that matters. You can’t really outplay anyone. The games I’ve seen on the Inivtational so far where decisions mattered involved complete blunders (g3 skybillz x salvatto; g3 pterodactylsftw x savjz).
The lack of sideboarding cripples the games and removes a significant ammount of strategizing. In the past few years of high-level competitive play, sideboards are the main focus of preparation, both because it’s very hard to get right and because it allows the greatest ammount of flexibility and interesting decisions.
Some of the issues with best-of-1 are related to balance and deck diversity. Those could be fixed by designing the game around it and adding more bells and whistles to Duo Standard (make it a best of 5 decks, for instance).
But the more relevant issues with best-of-1 is just how boring it is. The game patterns are scripted and there isn’t much point to deviating from it.
As Zvi Mowshowits said:
“When I play best of one, the games blur together. This set of moves again, and again. Rote responses, because you lack the information to improve your choices. A binary outcome except for time spent, with a huge desire to ‘get on with it’ once the outcome looks clear. Time starts to be something you’re sending rather than something you’re enjoying. What was fun becomes a grind.
When I switched on Arena from best-of-one back to best-of-three, it was a sea change in my experience. I was having so much more fun.
Thus, even if strategically everything would be fine, and the decks stayed the same, I would strongly oppose losing or minimizing sideboards for experiential reasons.
The decks don’t stay the same.
What we get in best of one are lots of decks that are simple and linear. Decks that do one thing hard, and do them well, repeating patterns over and over. The decks where you used to say ‘I’ll have a sideboard ready for them’ are now most of your opponents. A burning sea of red, or an endless ocean of blue or plain of white. The more we turn games into grinds, the more we see this, even with best of three. When the last few days of Mythic play came in February we saw a dramatic rise in mono-red, and mono-white did much better than it does in normal play. With best-of-one this gets doubly reinforced and thus turbo charged.”
https://thezvi.wordpress.com/2019/03/14/speculations-on-duo-standard/
Below is some of the feedback I had provided to wotc about best-of-1:
The importance of Sideboards
Brad Nelson noticeably made a career on successfully using sideboard to have tremendous advantages over the field. Some other recent examples:
Sideboarding creates additional layers of interesting strategic decisions. Those decisions start at a basic level on how cards interact for game 1. Based on that interaction, for game 2, now players need to consider what they can do to improve that dynamic while also anticipating their opponent’s moves. And this could totally change for game 3, based on revealed information of cards played and also decision making patterns. This makes it feel like playing three games in a bo3 context to have exponentially more relevant decision points than three individual bo1 matches. Every game feel different. A deck can execute multiple different strategies, creating dynamic gameplay.
There is a reason why so many strategy writers are reluctant to give sideboard guides; sideboard depends too much in the context of the opponent in front of you and requires malleability and on-the-fly decision making. It’s something that its so deep and hard that can’t be easily outsourced.
Other examples of sideboarding allows cool and fun games to be played:
The Spectator Experience
I also suspect viewers don’t care much about watching best-of-1, as evidenced by the existence of this thread:
https://www.reddit.com/magicTCG/comments/b6v3pb/wotc_please_dont_use_this_type_of_bo1_format_again/?st=jtvf43xp&sh=39b0096d
Awhile ago, I created this twitter poll:
https://twitter.com/bertuuuu/status/1089913678105923586
“You have all cards available on Arena and plenty of time to kill. Which format do you think would lead to more interesting/enjoyable games? Does the answer change if you want to just watch games on a stream instead of playing? If so, please comment below. Tks!”
The poll ended on 85%-15% in favor of bo3.
The question was designed to isolate the two main factors of why I think people play bo1: card availability and time constraints. (The third factor, not reflected in the poll, would be Arena UI/menus directing players to bo1). Without those factors, there was a clear preference for bo3 as the most interesting format.
This is just a twitter poll and not a substitute for market research, but it does who a very strong trend. There is also qualitative date in the replies, for illustrative purposes:
“If the streamer is a Pro Player, I want to watch Bo3 matches and insightful information about sideboarding. If the streamer is just a content creator, probably is better to just jam fun brews on ladder Bo1.”
“I like BO1 if I'm watching or playing only a limited amount / for fun and fun only”
“I want to watch good players stream bo3 because it have deeper strategic content and play bo1 myself because it is faster thus more suited for casual play.”
“If I'm watching (which I probably am, since I don't play much #MTGA), I prefer BO1. It allows for more variety in matchups and decks and is easier to follow as a side thing while I do something else. If I wanted to see deep gameplay and strategy, I would go to YOUTUBE and watch paper”
“either for watching or playing, I prefer bo3. It’s more interesting to consider sideboarding than it is to focus on linear decks.”
All those replies seem to confirm that bo3 is perceived as the most deep format, and that bo1 is heavily associated with casual play.
Those seem to confirm that preference for bo1 on Arena really is tied to card availability and time constraints to play games. None of it means bo1 is an interesting format to be watched.
Magic is a really good game and best-of-3 with sideboards is a really good format that stood the test of time. Any alternative to it needs to cross a high threshold before being considered viable. Duo Standard didn’t even come close.
A low skill, low diversity, high variance format doesn’t make a good esport experience, simply put.
Playing to win in best-of-1
This is spikes and we play to win. If you do want to win in best-of-1, there are two very good articles dissecting the format:
http://magic.tcgplayer.com/db/article.asp?ID=15188&writer=Brian+Braun-Duin&articledate=3-22-2019
http://www.starcitygames.com/articles/38457_Best-Of-One-Matchup-Analysis.html
This rarely happens, but I found myself agreeing to 99,9% of the things said in those articles. It also tooks about one night of playtesting to reach the same conclusions, then a month of playing thousands of games just be sure, but our minds didn’t change that much from our initial impressions of the format.
Ultimately, our playtest team (5 hareruya latin players + Javier Dominguez, Andrea Mengucci, Lee Shi Tian and AliaDeschain) settled on Esper + WW as the best combination, with Lee and Alia subbing out Esper in favor of Gruul because they didn’t feel confortable playing control decks.
Esper emerged as the clear best deck in the format for us. We discussed a bit if it was worth it to have a deck to snipe Esper (say, Mono U or Temur Reclamation or a anti-mirror version of Esper) but those decks had too many vulnerabilities against the rest of the format.
As a deck to pair with Esper, we wanted a deck with different bad matchups in order to not be too exploitable for game 3 scenarios. This deck could be mono white, mono red or gruul. None of them felt super good, but mono white had a higher win percentage in our spreadsheet and seemed better at beating the “anti-aggro” decks people had on ladder, which were actually just life gain decks that beat burn but didn’t beat the go wide hands of mono white.
For pure ladder play, I'd stick with Esper. We found it to have a good matchup against aggro decks, which are over-represented in that setting, while also having game against everything else.
The tournament didn't end well for most of us, but Luis Salvatto and Andrea Mengucci are still live. I am about to go cheer for them at PAX and I hope you all do the same.
Thanks for reading, Lucas Esper Berthoud
submitted by --bertu to spikes [link] [comments]

How To Trade Binary Options Successfully  Make $10,000 A Week With Binary Options How to Choose a Binary Options Expert Advisor  Binary Options Expert Advisors 2014 Best binary options broker - Ayrex Review What Are One Touch Binary Options  Binary Options Strategies & Systems Revealed 2014 Withdrawal Problems from Binary Option Brokers i.e. GOptions, 24Option, OptionTrade, TopOption 60 Seconds Binary Options Trading Brokers i.e. GOptions, 24Option, OptionTrade, TopOption DBPv7 Binary Option Signals - Competitor Terry Kramer

First Binary Option Service is a solid product that our experts evaluated with a 7.0 score and with a 95% user satisfaction rate. It's price starts at $5. However, you may want to consider other Binary Options Brokers products that got even better scores and satisfaction ratings. Here's how First Binary Option Service fares in comparison to these: Top 15 Binary Options Brokers 1. IQ Option. IQ Option was established in 2012 and had since then received favorable reviews on the internet. It uses in-house software for trading. The maximum returns are 95%. However, traders in the USA, Australia, Canada, Russia, Belgium, Japan, Turkey, Israel, Iran, Sudan, and Syria are not accepted. IQOption Europe Ltd. is well-known for reliable broker ... What marketing strategies does Binary-option-pro use? Get traffic statistics, SEO keyword opportunities, audience insights, and competitive analytics for Binary-option-pro. Our tip is that you compare Beast Options against different other binary option trading alternatives sold by competitors before you decide on a provide. With way more opportunities affected by cost, features, and supplier standing, you will surely gather sufficient data for a well-informed decision before committing to a deal. Also, you reduce the changes of buying the wrong or a limited ... Best Competitors To Binary Management By Total Satisfaction. Product name: Satisfaction: Ornavi. 100% TeamHQ. 100% Scoro. 100% Kanbanchi. N/A Workzone. N/A It may at times be a true challenge to locate a reliable Project Management Software app that will not only fit your requirements but will also be in accord with your budget limits. When you analyze different alternatives to Binary ... The criteria of the Binary Option Broker Review 2019. If you looking for a good broker, you should following the next steps when you check the company. Sometimes traders get scammed by a bad and criminal broker. With this review and comparison, we try to prevent it. Furthermore, Binary Options are very risky. You only should invest money, which you can afford to lose. You can check the ... Our advice is that you compare and contrast 99Binary with various other binary option trading options sold by other vendors before you decide on a service. With significantly more services affected by pricing, provided features, and supplier standing, you really gather sufficient data for a sensible decision before committing to a contract. Moreover, this lets you lower the odds of purchasing ... The “high-low” option is the most typical binary option. The high-low option is also called a fixed-return option and offers access to stocks, commodities, indices, and foreign exchange. This option has an expiry date/time and a strike price. Binary options trading is carried out by traders who predict whether the value of the stock or commodity will ascend above the strike price or plunge ... An exchange traded binary option will “trade” somewhere between 0 and 100. Where 0 is the figure used where an event did not occur, and 100 where it did. If the current price is currently 30, a ‘buyer’ would risk 30 times his trade size, to potentially win 70. A ‘seller’ therefore, would risk 70 to win 30. While not a complicated equation, it is slightly more complex than the ... Binary option trading on margin involves high risk, and is not suitable for all investors. As a leveraged product losses are able to exceed initial deposits and capital is at risk. Before deciding to trade binary options or any other financial instrument you should carefully consider your investment objectives, level of experience, and risk appetite. In accordance with FTC guidelines ...

[index] [8593] [22167] [12518] [2681] [17224] [19281] [27774] [17216] [11888] [20948]

How To Trade Binary Options Successfully Make $10,000 A Week With Binary Options

You can choose to trade Short Term, High/Low and One Touch binary options. The expiry time ranges from 30 seconds to one hour, and payouts start at 70% and reach 85%. The best payout we saw was on ... "Our Auto Binary Signals review shows that it's compatible with every single type of binary option trading platforms; something that many of its competitors fail to allow," reports Stevenson. "A ... In the Hard Proof Competition by Daily Binary Profits, Each competitior was given a trading account with $1,000 to trade during 7 weeks strictly following DBP's signals. Watch the performance of ... "Our Auto Binary Signals review shows that it's compatible with every single type of binary option trading platforms; something that many of its competitors fail to allow," reports Stevenson. "A ... "Our Auto Binary Signals review shows that it's compatible with every single type of binary option trading platforms; something that many of its competitors fail to allow," reports Stevenson. "A ... "Our Auto Binary Signals review shows that it's compatible with every single type of binary option trading platforms; something that many of its competitors fail to allow," reports Stevenson. "A ... "Our Auto Binary Signals review shows that it's compatible with every single type of binary option trading platforms; something that many of its competitors fail to allow," reports Stevenson. "A ...

https://binaryoptiontrade.whatsasan.tk