1. (n)- a small piece of a Cannabis flower that just covers the bottom of a pipe to prevent pull-through
2. (v)- to place a small piece of a Cannabis flower at the bottom of a bowl
2. (v)- to place a small piece of a Cannabis flower at the bottom of a bowl
1. "To smoke this shake in my bong, first I have to find a bottom nug."
2. *weed pulls through into mouth* "Gross! Didn't anybody bottom nug this?!"
2. *weed pulls through into mouth* "Gross! Didn't anybody bottom nug this?!"
by cannabisheals November 20, 2013
Get the bottom nugmug. A twitter group. Formerly known as "F Word Killers", it was once peak glory. It is now some-what active, compared to mid-2020, when it was at its peak. It is owned by James, who barely even pays attention to it. Formerly a Taylor Swift-themed gc, it is now a mish-mash of K-Pop (NCT 127, Dream / Red Velvet...) and other artists such as Charli XCX, Taylor Swift, Lorde...; The members are nice, but dumb.
Person 1: " OHHH EM GEEEE HAVE YOU HEARDDDD OF THIS NEW GC?"
Person 2 ( a queenie ) : No. My heart lies with Bottom Killers.
Person 2 ( a queenie ) : No. My heart lies with Bottom Killers.
by oil of every pearl's uninsides March 27, 2022
Get the bottom killersmug. Fictional location in Paw Patrol series where its main antagonist - Mayor Humdinger - appears to live.
by just_j August 10, 2021
Get the Foggy Bottommug. An act where you have a partner sit on your face while you try to eat crusted fecal matter from the anus
by Spingeboll April 28, 2014
Get the bottom eatingmug. by MoJo Mojokowski August 13, 2005
Get the seeing bottomsmug. by Renobbers September 17, 2017
Get the Bottom Loadermug. In contrast to "turtles all the way down", an expression of the problem of infinite regress, the "bottom turtle" is the foundation upon which everything else is built.
An example from computer security:
You have some software with a secret that you need to protect, so you encrypt it. Now you have a key, which is really another kind of secret that you need to protect, so you encrypt it, and so it becomes turtles all the way down. To break this loop, we need to establish a bottom turtle. There must be a secure root of trust either in hardware or a trusted external system upon which the security of the system is built.
An example from computer security:
You have some software with a secret that you need to protect, so you encrypt it. Now you have a key, which is really another kind of secret that you need to protect, so you encrypt it, and so it becomes turtles all the way down. To break this loop, we need to establish a bottom turtle. There must be a secure root of trust either in hardware or a trusted external system upon which the security of the system is built.
by turtle_zero September 25, 2020
Get the bottom turtlemug.