An invitation to an event given solely because of the invitee's close proximity to a conversation about said event.
Proximity invitations most often occur due to feelings of guilt and/or pity, but can also happen in an attempt to fix the awkwardness of the situation. They have been given in the hopes that the invitee is not able to attend the event; however, this is never a smart move, as it always has the potential to backfire.
It is very important to stay emotionless in any situation where a proximity invite could be given to an undesirable. If one of the people conversing about the event senses any weakness at all in one or more of the other conversers, he/she should recognize that a proximity invitation could be imminent, and should forcibly remove himself/herself and the other conversers from the situation, offering an excuse to the would-be invitee if necessary. REMEMBER: you may be the bad guy now, but they WILL thank you later.
Some undesirables are brazen enough to actively seek out proximity invitations by purposefully placing themselves close to those conversing about an event. This technique, known throughout the undesirable community as "seek and destroy," has been reported to work on conversers who are of equal or lesser popularity than the undesirable. They will usually be ignored by conversers who are more popular than the undesirable, unless one or more of the conversers has a reputation for being sympathetic or kindhearted.
DO NOT be swayed by the undesirable's strongest weapon: a sarcastic "Thanks for the invite" or anything similar. A good counter to this phrase is an equally sarcastic "You're welcome" or "My pleasure" or anything along those lines.
If the undesirable is so bold as to actually pretend that they have already received an invitation, it is absolutely necessary that they are put in their place. A simple but effective "You're not invited" will suffice, but it is always a good idea to follow this with an insult, so as to show the undesirable that he/she is not wanted. Ex. "You're not invited, assfaggot."
Proximity invitations most often occur due to feelings of guilt and/or pity, but can also happen in an attempt to fix the awkwardness of the situation. They have been given in the hopes that the invitee is not able to attend the event; however, this is never a smart move, as it always has the potential to backfire.
It is very important to stay emotionless in any situation where a proximity invite could be given to an undesirable. If one of the people conversing about the event senses any weakness at all in one or more of the other conversers, he/she should recognize that a proximity invitation could be imminent, and should forcibly remove himself/herself and the other conversers from the situation, offering an excuse to the would-be invitee if necessary. REMEMBER: you may be the bad guy now, but they WILL thank you later.
Some undesirables are brazen enough to actively seek out proximity invitations by purposefully placing themselves close to those conversing about an event. This technique, known throughout the undesirable community as "seek and destroy," has been reported to work on conversers who are of equal or lesser popularity than the undesirable. They will usually be ignored by conversers who are more popular than the undesirable, unless one or more of the conversers has a reputation for being sympathetic or kindhearted.
DO NOT be swayed by the undesirable's strongest weapon: a sarcastic "Thanks for the invite" or anything similar. A good counter to this phrase is an equally sarcastic "You're welcome" or "My pleasure" or anything along those lines.
If the undesirable is so bold as to actually pretend that they have already received an invitation, it is absolutely necessary that they are put in their place. A simple but effective "You're not invited" will suffice, but it is always a good idea to follow this with an insult, so as to show the undesirable that he/she is not wanted. Ex. "You're not invited, assfaggot."
Jack: Hey, did you hear about the party at my house tonight?
Jill: Yeah, I can't wait!
That Cunthole Steve: ...
Jack: So... Steve... wanna come to my party tonight?
That Cunthole Steve: Sure!
Jack and Jill: Fuck.
---
Jack: Hey, did you hear about the party at my house tonight?
Jill: Yeah, I can't wait!
That Cunthole Steve: ...
Jack: ...You're not getting a proximity invitation, assfaggot.
That Cunthole Steve: I wish I had friends.
Jill: Yeah, I can't wait!
That Cunthole Steve: ...
Jack: So... Steve... wanna come to my party tonight?
That Cunthole Steve: Sure!
Jack and Jill: Fuck.
---
Jack: Hey, did you hear about the party at my house tonight?
Jill: Yeah, I can't wait!
That Cunthole Steve: ...
Jack: ...You're not getting a proximity invitation, assfaggot.
That Cunthole Steve: I wish I had friends.
by Reuben Z. Clitz August 20, 2009
Get the Proximity invitation mug.The Cadet Initiation is a series of tasks a new cadet has to perform when he becomes a cadet -- one of mine was to give a blowjob to any other cadet who wanted one - which was all of them!
by USAF Cadet October 8, 2020
Get the Cadet Initiation mug.by J2theIZZIEMM December 28, 2005
Get the initiate mug.coming from downtown england, this word can be a noun, verb or adjective. The original meaning was 'isn't it' or anything along those lines but has now become just a fill-in word to make a sentence confusing and/or have zero meaning.
by annamariaaaa April 8, 2008
Get the innit mug.In cryptography, an initialization vector (IV) is a block of bits that is required to allow a stream cipher or a block cipher to be executed in any of several streaming modes of operation to produce a unique stream independent from other streams produced by the same encryption key, without having to go through a (usually lengthy) re-keying process.
IV's are commonly referred to in wireless network hacking, more specifically WEP hacking, where a hacker fakes association with a wireless access point and generates IV's that are used to crack the WEP key of the network.
IV's are commonly referred to in wireless network hacking, more specifically WEP hacking, where a hacker fakes association with a wireless access point and generates IV's that are used to crack the WEP key of the network.
by sniperowns October 4, 2008
Get the Initialization Vectors mug.When a friend checks in on Facebook or Swarm and Foursquare and you respond no invite as they didn't invite you to their destination
by coaxel May 14, 2015
Get the No invite mug.by Micah December 22, 2003
Get the initiate mug.