by loucitybatman June 4, 2023
Its five key characteristics:
- trusting morally ambiguous people
- refraining yourself from changing people who clearly urgently need to be fixed; loving people for the mess they are
- having transparent communications with liars and judges
- admitting your real delusional expectations to resentful people not hired for that job
- weather storms with the wimpiest sailors
Something very hard to find on Tinder.
- trusting morally ambiguous people
- refraining yourself from changing people who clearly urgently need to be fixed; loving people for the mess they are
- having transparent communications with liars and judges
- admitting your real delusional expectations to resentful people not hired for that job
- weather storms with the wimpiest sailors
Something very hard to find on Tinder.
Jane: What are you doing?
John : I'm shopping for an authentic relationship online.
Jane: Gosh... better look for a needle in a haystack!
John : I'm shopping for an authentic relationship online.
Jane: Gosh... better look for a needle in a haystack!
by CharlesM January 4, 2015
by yo-what-is-up-my-dawg November 4, 2003
MJ-Authentication
This is similar to the TCP/IP syn response during the setup phases of the 3-way handshake process. This response is specific to MJ-Authentication from the M party.
ik and iag are of the mjml protocal standard
This is similar to the TCP/IP syn response during the setup phases of the 3-way handshake process. This response is specific to MJ-Authentication from the M party.
ik and iag are of the mjml protocal standard
MJ-Authentication
J sends ik to M
M send iag to J
When both parties receive this symmetric key authentication has been performed and communication can safely continue.
J sends ik to M
M send iag to J
When both parties receive this symmetric key authentication has been performed and communication can safely continue.
by jason2d2 October 5, 2007
"Hi my name is Jennifer Hawkins and I certify these credentials as authentic."
"I wanted to make sure I was secure so I used tooth actor authentication.
"I wanted to make sure I was secure so I used tooth actor authentication.
by The_ALCH April 28, 2021
A guy who’s good at maths and is purely Chinese.
Furthermore, this person should be at least decent at online competitive games.
Only an authentic Chinese man can judge if a Chinese man is authentic or not.
Furthermore, this person should be at least decent at online competitive games.
Only an authentic Chinese man can judge if a Chinese man is authentic or not.
by Jewish_Nibba January 10, 2020
by willmyster April 4, 2011