Brianna Wu / John Walker Flynt - "Biggest Victim of Gamergate," Failed Game Developer, Failed Congressional Candidate

View attachment 155888

OH MY GOD AN ASIAN woman! IN STAR TREK! how groundbreaking!

View attachment 155889 View attachment 155890

it's almost like John doesn't actually watch Star Trek, just jack off to Voyager having a female Captain.

Wow, so progressive.

tumblr_nyin1yfiEN1r2p3x5o1_400.gif
 
View attachment 155888

OH MY GOD AN ASIAN woman! IN STAR TREK! how groundbreaking!

View attachment 155889 View attachment 155890

it's almost like John doesn't actually watch Star Trek, just jack off to Voyager having a female Captain.

I can almost imagine Brianna shambling across the empty building she calls home and slaps Frank upside the face with an Apple tablet, snarling "Look Frank! One of your people get to be in my Star Trek show! RrrRRRR gonna Twitter!!" then promptly shambles back to her office to tweet on her phones and jack off to Samus Futa animations.
 
I don't understand how six year olds can play Pokémon without getting lost and a man who's nearing forty can't.

At that point you'd have to be actively trying to be stupid.

Apparently for John its pretty easy. After all, he did get lost in his own house and came to the conclusion he had run away.

Well he either got lost, or the sight of his own office where he works is so foreign to him he didn't believe it was his own house.
 
That's right John, alienate yourselves from your relatives and loved ones by acting like a total asshole - I mean look how far in life it's gotten you!

View attachment 155820

If your relative reeeeeeeeeeeeees over politics during Thanksgiving dinner, it is time to show him the door.
 
My god Wu, I leave your thread for a couple of days and already it has five more pages.

S T O P T W E E T I N G
Won't happen.
Not open source = not secure? I don't-- huh?
This isn't insane. A lot of projects do this. The idea is that if everyone can see your code, they can find all of the vulnerabilities themselves. Its often better than a than a closed source model for very high security applications.
 
Back