[ / / / / / / / / / / / / / ] [ dir / roze / sapphic ]

/tech/ - Technology

Catalog   Archive

Winner of the 36th Attention-Hungry Games
/alcoholism/ - The Attention-Hungry Games are the Dark Souls of Hunger Game Simulators
Name
Email
Subject
Comment *
File
Password (Randomized for file and post deletion; you may also set your own.)
* = required field[▶ Show post options & limits]
Confused? See the FAQ.
Flag
Oekaki
Show oekaki applet
(replaces files and can be used instead)
Options

Allowed file types:jpg, jpeg, gif, png, webm, mp4, pdf
Max filesize is 16 MB.
Max image dimensions are 15000 x 15000.
You may upload 3 per post.


File: ec963647e166bc2⋯.jpg (109.55 KB, 450x600, 3:4, 20151231112421_6354.jpg)

File: 951e722c80eac17⋯.jpg (65.5 KB, 640x426, 320:213, Copy_Paste_2018.jpg)

 No.899302[Reply]

By Brian Fagioli

For better or worse, the Windows Subsystem for Linux (WSL) initiative seems to be moving full steam ahead. There are some very respectable distributions available in the Microsoft Store, such as Debian, Ubuntu, and Kali to name a few. Not to mention, Microsoft is trying to encourage even more maintainers to submit their distros with a new tool.

Apparently, some Windows 10 users have been clamoring for the ability to copy and paste both from and to WSL consoles -- a reasonable request. Well, as of Insider Build 17643, this is finally possible.

"As of Windows 10 Insider build #17643, you can copy/paste text from/to Linux/WSL Consoles!!! We know that this is a feature MANY of you have been waiting for -- our sincerest thanks for your patience and continued support while we untangled the Console's internals, allowing us to implement this feature. To ensure that we don't break any existing behaviors, you'll need to enable the 'Use Ctrl+Shift+C/V as Copy/Paste' option in the Console 'Options' properties page," says Rich Turner, Microsoft.

ALSO READ: System76 becomes GNOME Foundation Advisory Board member

Turner further explains, "This setting can be set independently for each shell or shortcut: If you pin your shortcuts to your favorite shells (e.g. Cmd/PowerShell/Linux) to your task bar, and modify the properties of Consoles launched via these shortcuts, your settings will only be made to the affected shortcuts. If you later launch the same shell via the Start menu, or the run dialog, your settings will not be found as they'll have been saved to your pinned shortcuts, not your Start menu tiles/shortcuts, or registry settings."

As you can see in the above screenshot, this is very easy to enable, and there is no reason it shouldn't eventually make its way into non-Insider versions of Windows 10. Quite frankly, it is sort of odd that this functionality wasn't included from the get-go, as it seems to be a no-brainer. Oh well -- better late than never, I suppose.

Post too long. Click here to view the full text.

2 posts omitted. Click reply to view.

 No.899376

File: 8439f3f48fceb89⋯.jpg (59.98 KB, 593x796, 593:796, 9a3f39712093bbcea0857825fb….jpg)

>there are people who use this instead of installing gentoo

I've lost all hope in mankind


 No.899543

>>899343

Extend


 No.899556

>>899543

Embiggen


 No.899653

Wow it only took them 20 years.


 No.899759

>>899302

>icrosoft

Fuck off, Fag.




File: 35184e351b61852⋯.png (241.63 KB, 967x858, 967:858, Screenshot from 2018-04-16….png)

 No.899068[Reply]

How do they make money?

14 posts and 1 image reply omitted. Click reply to view.

 No.899244

>>899071

>tfw certain combinations of subatomic particles are illegal

>tfw quark smuggler

>tfw particle accelerator in basement

>tfw no laws about antimatter posession


 No.899297

who cares, it's shit. use searx


 No.899427

>>899068

Analytics. User X from X city searched for X and then accessed site X at X o'clock. Same IP came back later and searched for Y then accessed site Y at Y o'clock. Now they have a bunch of data to sell to companies willing to know what a specific public from a given region is interested in consuming and then adjust their targeted marketing accordingly


 No.899436

>>899427

>You can trust us goy! No need to worry, it's anonymized and based off of region, we would absolutely never sell personally identifiable data directly!


 No.899619

File: e1fc6e2ac1304af⋯.jpg (134.98 KB, 602x1062, 301:531, duckduckgo.jpg)

>they trust us, the dumb fucks




File: e001175adc3c5fc⋯.png (87.56 KB, 1092x512, 273:128, ipfsthread.png)

File: 957095eb5bec93f⋯.png (140.19 KB, 512x512, 1:1, ipfs-logo-icewithbg-512.png)

File: 1666469e81f661b⋯.webm (3.94 MB, 1920x1040, 24:13, ipfs webm 1.webm)

 No.793208[Reply]

Updates

0.4.10 - 2017-06-27

>Ipfs 0.4.10 is a patch release that contains several exciting new features, bugfixes and general improvements. Including new commands, easier corruption recovery, and a generally cleaner codebase.

Features:

>Add support for specifying the hash function in ipfs add

>Implement ipfs key {rm, rename}

>Implement ipfs shutdown command

>Implement ipfs pin update

>Implement ipfs pin verify

>Implemented experimental p2p commands

0.4.9 - 2017-04-30

>Ipfs 0.4.9 is a maintenance release that contains several useful bugfixes and improvements. Notably, ipfs add has gained the ability to select which CID version will be output.

Features:

>Add support for using CidV1 in 'ipfs add'

tl;dr for Beginners

>decentralized P2P network

>like torrenting, but instead of getting a .torrent file or magnet link that shares a pre-set group of files, you get a hash of the files which is searched for in the network and served automatically

>you can add files to the entire network with one line in the CLI or a drag-and-drop into the web interface

>HTTP gateways let you download any hash through your browser without running IPFS

>can stream video files in mpv or VLC (though it's not recommended unless the file has a lot of seeds)

How it Works

When you add a file, the files are cryptographically hashed and a merkle tree is created. These hashes are announced by the IPFS client to the nodes in the network. (The IPFS team often describes the network as a "Merkle forest.") Any user can request one of these hashes and the nodes set up peer connections automatically. If two users share the same file then both of them can seed it to a third person reqPost too long. Click here to view the full text.

295 posts and 55 image replies omitted. Click reply to view.

 No.898931

>>897862

Killing Bites, episodes 1 to 12: /ipfs/QmdPjrEMH8eVJoGVp79RkyesUQ3LuBhukp1AF3MEmU1Au9


 No.899130

>>898931

Yuru Camp, episodes 1 to 12: /ipfs/zDMZof1kpFnRGBsgDcBLgAqeu1CjeeGEm9foz3eW9ri96GtX3r8M

Isekai Shokudou, episodes 1 to 12: /ipfs/zDMZof1m1DuN8opbcVhoGc1P3izhJpv87wo8FJAZiH2FY1xafUt1

After the Rain, episodes 1 to 12: /ipfs/zDMZof1m33UyeU3P8pnr3E7yJkKnteQGX63zHxmcPqxyWtNwqHUC

Does anyone know how I can use blake2b-256 hashing algo by default without having to specify on the command line every time?


 No.899229

>>899130

>Does anyone know how I can use blake2b-256 hashing algo by default without having to specify on the command line every time?

https://en.wikipedia.org/wiki/Alias_(command)

Also see the first half of this >>883736


 No.899341

>>899229

I know I could do it on a shell level. I meant whether I could set any ipfs config files to achieve that effect. e.g. if invoking ipfs from a script.


 No.899390

>>899341

>set any ipfs config files to achieve that effect

I don't think so. Maybe worth posting on the issue tracker.

>invoking ipfs from a script

Use variables for the args.

ipfs $IPFS_ARGS




File: 8e703bafe721090⋯.jpg (18.43 KB, 478x235, 478:235, meme.jpg)

 No.894292[Reply]

>in the past

>little resources available on computers

>programmers still make good programs

>today

>lots of resources available

>all programs are bloated shit and use up all memory/cpu

94 posts and 14 image replies omitted. Click reply to view.

 No.899372

>>899370

Most people are teachers who ended up teaching because the couldn't get a better job. In addition to mediocre competence they often bitter and insecure, and want their students to be drones who memorize and regurgitate shit as they are told to. Such teachers fear bright students who want to acutally understand shit because they fear such students might expose their deficiencies or even surpass them in the more or less distant future. So they react allergically and try to make every student into a drone who doesn't challenge anything.


 No.899373

>>899372

>people are teachers

*most teachers are people


 No.899377

>>899373

And they should all be fired. Wasting everyones time giving lectures. The entire system is just a shitty accreditation racket.


 No.899379

>>899377

Schools are known for hiring foreign teachers who "completed" PHD programs in india or other countries yet when they teach, it appears as if they know nothing about what they are teaching.


 No.899380




 No.895860[Reply]

>On a satellite image, they drew shapes around the crime scenes, marking the coordinates on the map. Then they convinced a Wake County judge they had enough probable cause to order Google to hand over account identifiers on every single cell phone that crossed the digital cordon during certain times.

>In at least four investigations last year – cases of murder, sexual battery and even possible arson at the massive downtown fire in March 2017 – Raleigh police used search warrants to demand Google accounts not of specific suspects, but from any mobile devices that veered too close to the scene of a crime, according to a WRAL News review of court records. These warrants often prevent the technology giant for months from disclosing information about the searches not just to potential suspects, but to any users swept up in the search.

http://www.wral.com/Raleigh-police-search-google-location-history/17377435/

Few weeks back I pointed out this was going on, that when a crime happens Google and LE pull info from all Android phones in the area looking for anything suspicious and someone here said I was wrong. I couldn't find an article about it back then to prove it but here's one.

9 posts omitted. Click reply to view.

 No.899298

>>896510

What do you mean by "feature phone"? I'm only interested in voice+sms, and they still make those kind of phones.


 No.899315

>>899193

>manually sticking your credit card into a machine the purpose of which is to contact your bank and authorize the purpose is the same as carrying an always-on tracking bug

You glow in the dark niggers really don't do a good job of blending in.


 No.899317

>>899298

i think "feature phone" is nigger for exactly that: voice+sms

>>899291

anyone who uses loyalty cards deserves to be tracked


 No.899348

>>899317

>i think "feature phone" is nigger for exactly that: voice+sms

What's the feature then?


 No.899356

File: 2d5e404821753b6⋯.png (71.92 KB, 698x658, 349:329, .png)

>>899317

https://en.wikipedia.org/wiki/Feature_phone

A voice+sms phone is a "dumbphone", by the way.




File: 660b6ac7f863182⋯.pdf (6.72 MB, p43-kapur_BRjFwE6.pdf)

File: 4a6ca5786a99154⋯.jpg (82.22 KB, 1280x720, 16:9, AlterEgo.jpg)

 No.899185[Reply]

>AlterEgo is a closed-loop, non-invasive, wearable system that allows humans to converse in high-bandwidth natural language with machines, artificial intelligence assistants, services, and other people without any voice—without opening their mouth, and without externally observable movements—simply by vocalizing internally. The wearable captures electrical signals, induced by subtle but deliberate movements of internal speech articulators (when a user intentionally vocalizes internally), in likeness to speaking to one's self. We use this to facilitate a bi-directional natural language computing system, where users receive aural output through bone-conduction earphones without obstructing a user's physical senses. This enables a user to transmit and receive streams of information to and from a computing device or any other person without any observable action, in discretion and without invasion of the user's privacy. AlterEgo aims to combine humans and computers—such that computing, the internet, and AI would weave into human personality as a “second self” and augment human cognition and abilities.

https://www.media.mit.edu/projects/alterego/overview/

https://hooktube.com/watch?v=RuUSc53Xpeg

What do you think, /tech/? Will this technology replace the current input devices?

It may be helpful for non-verbal autism, according to some sources

6 posts omitted. Click reply to view.

 No.899239

>>899185

Probably a lot more expensive than a cheap laptop and a coffee at some place with Wifi, yet no real advantage over encrypted email.

Also, AI assistants are botnet cancer of the highest level. This just makes the problem worse as now it doesn't just listen to what you say, it also listens to what you say internally.


 No.899241

>>899239

imagine being able to shitpost only by thinking about it without moving a finger with more than 200 words per minute.

>AI is cancer

ai is a meme word, they are training a neural network which improves its results with time, because everyone speaks differently.


 No.899245

>>899215

>research study by three university pajeets

>where years of calibration has got a sensor dildo you wear on your face to the point that it can read research project pajeet's subvocalizations

>as long as he's crabbing along like a hunchback and tensing his jaw in weird ways like he's having some sort of seizure

I'm not scared.


 No.899247

>>899185

The germans literally had this during ww2 already


 No.899299

>PretentiousBullshit is a X, Y, Z that...

stopped reading ther

> AlterEgo aims to combine humans and computers—such that computing, the internet, and AI would weave into human personality as a “second self” and augment human cognition and abilities.

kill selves. all you did is integrate some old research (it was already known that voice can be captured this way) into a product




File: 23f5e4662588718⋯.png (63.89 KB, 800x600, 4:3, ReactOS_Shell.png)

 No.881637[Reply]

What's the general consensus on ReactOS? Kind of seems like a "worst of both worlds" thing to me (having done little research).

59 posts and 3 image replies omitted. Click reply to view.

 No.898940

File: 7617138f1b28c35⋯.gif (6.36 KB, 514x426, 257:213, uzixscrsht3.gif)

>>898913

>But can it run Linux?

No, but there is another Unix clone for MSX.

http://uzix.sourceforge.net/


 No.899131

>>882134

>DOS is literally the only decent thing Microsoft ever made.

Billy boy did not make dos he bought it.


 No.899207

>>881637

How hard would it be to port most of the userland to linux and run it in a chroot? I'd love to see this used as an alternative to WINE except capable of running Windows drivers.


 No.899208

>>882519

Comfy looking. Nice color scheme as well.


 No.899220

>https://reactos.org/

>6,000,000 downloads

Heh.




File: aa909e887c5df96⋯.jpg (28.51 KB, 238x330, 119:165, phil-katz.jpg)

 No.899050[Reply]

'Sup niggers. Sorry I'm two days late. Helluva hangover. So, you doing anything worth doing today? No? Here's to tomorrow. Cheers! Glug glug glug.

 No.899057


 No.899138

>>899050

RIP creator of WinRAR




 No.897256[Reply]

I wonder what would happen if I tried to power a laptop (no battery) with a 12 V supply when it says it needs 19 V. I've used 20 V with no problem, but that's only a 1 V difference.

Do laptops have some sort of buck/boost converter inside which correct the voltage? Or will I break the computer?

2 posts omitted. Click reply to view.

 No.897275

>>897256

Using too little voltage is almost never dangerous (as long as the polarity is correct), it just might not do anything.


 No.897289

>>897270

>>897275

Ok I tried using a 12V 2A power supply on a chinkshit 20V 1A laptop which I don't care about too much. It worked fine even when the battery was removed (I opened a bitcoin miner to load the CPU, no problem) but it didn't charge the battery when I replaced it (charging light remained off, "power" light was on).


 No.897305

>>897275

Instability (whatever the underlying cause) can almost always lead to data loss or corruption though.


 No.899067

>>897289

I bet that any voltage sufficient to power the 5V rail on the voltage converter would be fine. 5V is basically the highest voltage used in a laptop aside from the battery and its charging circuit.

Imagine how nice it would be to stick a bunch of power banks to the bottom of a laptop (in series to give 10V) and have 24h battery life.


 No.899082

>>897289

>Ok I tried using a 12V 2A power supply on a chinkshit 20V 1A laptop ... but it didn't charge the battery

Laptop lithium batteries are typically either in a 3S or 4S configuration which have a peak charge voltage of 12.6V and 16.8V respectively. The internal charging circuit would only be a buck converter which needs a bit of head room above 16.8V but would be fine stepping down to the 5V, 3.3V, etc. the rest of the thing needs to power on. This is why the 19V power pack is all but standard these days.




File: 11961d79a8fde72⋯.png (14.31 KB, 500x500, 1:1, bitcoin.png)

 No.873253[Reply]

>Learn about Bitcoin when it was about 10$

>Realize I could make massive bank off of it because of it's use in the drug trade online

>Be unable to buy it due to being underage at the time (only real way of buying it at the time was meeting up with some faggot and getting it there) and my family thought it was a retarded idea.

>Now it's worth 10k

>Now all hardware costs more thanks to retarded Bitcoin miners

I mean RAM is fucking over 100$ what the fuck. Fuck Bitcoin. I'll never live this down.

92 posts and 15 image replies omitted. Click reply to view.

 No.897656

new idea for a coin, Ganycoin. we take a high res shot of the light side of Ganymede each week. each pixel that has gained luminence gains value, and vice versa. any investors? YCombinator wouldn't give me a grant because although I have brown skin I said Coinbase should be thrown off a 10 story building.


 No.898064


 No.898654

There is this new satoshi dice address for BTC.

Address is bc1quykuahxrjx6d3h6ga4rkyg0hl5e59tcthqyhw6.

I found this while scanning pastebin

Here are the instructions on how to verify the provably fair roll.

https://codepen.io/anon/pen/vRqPMr?editors=0012


 No.898883

File: 4a48c87fb20cc6c⋯.png (345.74 KB, 640x360, 16:9, Private-Transactions.png)

File: 2b6d985bac37b6d⋯.jpg (104.04 KB, 1269x809, 1269:809, Mystery.jpg)

File: 867fa792ad43e0e⋯.jpg (340.89 KB, 1076x599, 1076:599, manifesto-post.jpg)

PIVX- the crypto for those who rage against the machine.


 No.899040

>>898883

I don't understand how it's possible to be private and have a public ledger at the same time.




File: 8f8f8d53a4a7106⋯.png (33.93 KB, 800x541, 800:541, julia.png)

 No.883246[Reply]

What do you think about Julia? Will it replace R or Matlab in some of their usecases? What do you think is an appropriate use for the language?

I'm particularly interested in hearing if someone made the switch from R and if yes, why.

>Good

faster for large datasets - if needed, has REPL, can call R if you need functions from your packages, seems to also compile on Open and FreeBSD, community seems eager to produce useful packages, plotting tools seem to be capable, syntax doesn't seem to be a mishmash of ideas like R, parallelism if you need it

>Subjective

python-style indentation, package system uses github, function overloading, there's a C transpiler, not made to be general-purpose, dynamic typing, not 1.0 yet

>Bad

takes actually longer for small amounts of data (because of JIT compiler) than similiar slower languages, development seems to break packages as of now

On a sidenote: their community guidelines seem reasonable, but I've become allergic to those.

>In particular, do not sexualize the term "Julia" or any other aspects of the project. While "Julia" is a female name in many parts of the world, the programming language is not a person and does not have a gender.

Don't sexualize the Julia, can't make this up

77 posts and 12 image replies omitted. Click reply to view.

 No.897933

>>897698

Of course, you'll be the hero of the CoC community.

What you can't make is a penis, because that would be harassment and patriarchal dominance whatever.


 No.898463

>>897223

>Proprietary takes the lead

No. Just No


 No.898476

>>898463

It's possible for proprietary software to be better in all other regards.

It's reasonable for someone not to value the freedom status of software (much).


 No.898481

>>897223

>Wolfram Alpha > R (professional) > SciPy (simple) > MATLAB (proprietary) > Octave (slow) > Julia (Pozzed)

This about as much a naive misrepresentation as the chart above your post. Your assessment is based upon feels and therefore worthless.

>>886465

>All the important stuff in R runs in C

True, but there's limits on how fast that can make R. I think there's an article on the Julia wiki that talks about this and is generally applicable (think about what that means for loops). I think it was somewhere in the optimization article and also compares to how things are done in R.

There's interesting stuff to learn there, even if you don't intend to use their language. The wiki seems pretty good.


 No.899023

>>898481

>When R and Python/Cython are all just sugary wrapper for C.

This is why the world is beautiful, and Julia is not.




File: d040aae5b320703⋯.jpg (129.74 KB, 800x500, 8:5, ss_f6d045a9cb9e42f5a6e488b….jpg)

 No.897484[Reply]

The Dosbox debugger is pretty decent. It's given me enough to feed into IDA and get a foothold to begin static disasm with some hassle. But I'm wondering if there's something more powerful in terms of dynamic disasm. I know there's Softice but that doesn't play nice with Dosbox or VMs in my experience. Maybe I'm holding it wrong.

5 posts omitted. Click reply to view.

 No.898321

>>897484

I used to do some reversing on my Apple II but it's been decades. Are there any Free alternatives to IDA?


 No.898384

>>898321

IDA is pretty much uncontested in terms of features, but I really like radare2.


 No.898858

>>898384

Thanks, I installed it and it has a nice familiar feel to it.


 No.898910

File: f3c318b41e28d86⋯.jpg (33.59 KB, 268x400, 67:100, ef843088cb733328a3844b6ef3….jpg)

hmm... probably not what you want, but you could use QEMU with GDB.


 No.898971

>>898384

Is IDA Pro to disassemblers what Hex Workshop is to hex editors?




File: 370c7345357686e⋯.png (105.37 KB, 1045x871, 1045:871, trannyboot.png)

 No.898483[Reply]

I was wondering why Libreboot hasn't been updated for years.

118 posts and 20 image replies omitted. Click reply to view.

 No.899319

File: 66fd768fc017018⋯.png (16.03 KB, 644x688, 161:172, 1523447335961.png)

>>898486

>I dislike something about the developer of free software

>therefore I'll choose proprietary software and you should too!

>cucks!


 No.899411

>>898483

What the actual fuck. One guy is completely fucked in the head to think the world revolves around him. The other is a stupid enabler who should have just posted

>No.

and closed that shit.


 No.899583

File: 9d1f9a5b5b36e5d⋯.jpg (114.56 KB, 500x410, 50:41, RTSAAp1.jpg)

>>899319

> thinks coreboot = proprietary software


 No.899767

>>898483

You are asking a rather stupid question. Libreboot is designated to a very specific set of hardwares. Now, read it carefully "very specific"... See?

There is no need to be a "update-bitch" always begging for more buggy updates down your throat.

Bainlets like you that can't see through simple logic that is laid clear under your nose shouldn't be here.


 No.899917

>>898673

>AUR

You already have a vagina, anon.




File: 1edd70e36a781f2⋯.png (28.21 KB, 601x318, 601:318, Screenshot_2018-04-04_12-0….png)

File: 285654e9e3f86f9⋯.png (32.52 KB, 596x311, 596:311, Screenshot_2018-04-04_12-0….png)

File: 2886096b8116056⋯.png (31.25 KB, 594x316, 297:158, Screenshot_2018-04-04_12-0….png)

 No.893070[Reply]

136 posts and 26 image replies omitted. Click reply to view.

 No.897734

>>897179

Diagnostic features are far more important than the generated machine code being slightly better.

In GCC -Wall doesn't actually enable all possible language warnings (at least in C and C++) because GCC doesn't actually bother to implement them. Clang does but to still be backwards compatible with GCC its -Wall is the same and instead they include the -Weverything flag to actually enable everything. Many developers don't understand the benefits of strictly complying with the language, especially with large code bases, if I find myself ever needing the few % speed increase I could get by switching to GCC I instead use a profiler and hand optimise my code. The only time I ever use GCC is when I am writing kernel code.


 No.897737

>>897139

shaking atm


 No.898902

File: f16027eab172316⋯.png (943.96 KB, 1228x1502, 614:751, 1495812218308.png)

>>893070

IBM and Intel BTFO


 No.899271

>>897734

>Diagnostic features are far more important than the generated machine code being slightly better.

Which is irrelevant to the fact that they are not the subject of this discussion.

What's stopping you from using, say Clang for its diagnostics in debug builds and making the final build with GCC for best performance, anyway? If you're autistic about standards compliance, your code should compile correctly with whatever compiler you choose.


 No.899273

>>897737

>>>/gas/




File: 849be9726ca916c⋯.png (74.37 KB, 827x595, 827:595, PyBitmessage.png)

 No.898228[Reply]

Bitmessage is a distributed messaging system that uses proof of work to mitigate spam. Messages are published to a rolling blockchain which drops old messages after a set amount of time. Chans are shared addresses which participants listen to and send with so that they are anonymous. Join the "lain" chan (no quotes).

https://bitmessage.org/wiki/Main_Page

3 posts and 1 image reply omitted. Click reply to view.

 No.898457

>>898353

>web of (((trust)))

Good goyim, give us your real name so you could shitpost on our platform please and give us names of your peers too!


 No.898458

>>898457

Nobody said you had to use your real name. Pseudonymous WoTs are a thing.


 No.898464

>>898228

>proof of work

There are many better uses for electricity.


 No.898468

>>898458

>Pseudonymous

What about Anonymous? Fuck off, chaim.


 No.898854

File: 7b529078d1d229f⋯.jpeg (6.74 KB, 159x318, 1:2, images.jpeg)

>>898458

What's with faggots saying you have to put your real name on services lately?




Delete Post [ ]
[]
[1] [2] [3] [4] [5] [6] [7] [8] [9] [10] [11] [12] [13] [14] [15]
| Catalog | Nerve Center | Cancer
[ / / / / / / / / / / / / / ] [ dir / roze / sapphic ]