What was meant to be a funny dare turned into an utter embarrassment for an American exchange student, who found himself trapped in a giant stone vagina in Germany.
Firefighters had to be called in to deliver the man, head-first, to safety after his feet became trapped in the large marble sculpture at Tubingen University in Germany.
The unnamed man is believed to have been dared to climb inside the sculpture, which sits outside the university’s institute for microbiology and virology.
But his legs soon became wedged in the carving and, despite labouring to free himself, the experts had to be summoned…
A total of 22 firefighters, five fire engines and a number of paramedics were sent to the scene, and quickly freed the man “by hand without use of equipment”, the newspaper reported… “The fire department was not really amused, and he was really embarrassed.”
The sculpture, by Peruvian artist Fernando de la Jara, has sat outside the university for 13 years and was not damaged.
The few students of Freudian psychology remaining in the world get to use their smug looks.
Thanks, Honeyman
Mornin readin here.
“This, of course, brings us to the question of what is trust. My
definition of (a state of) “trust” is this: Confident anticipation
backed by effective recourse. The “confident anticipation” is the
day to day operational reality; I commit a job or some data to your
computing queue and I am confident that it will return in the manner
I anticipate, confident enough that I deploy no armed guards. The
“effective recourse” is that I actually do know enough about where
that job or data is going that should something go wrong I then
would know what next to do to force you to make me whole — to get
an effective recourse. This is the antithesis of saying that
everyone is my friend. Rudyard Kipling’s poem “If” is a jewel, but
the cybersecurity practitioner’s couplet is:
If neither foes nor loving friends can hurt you,
If all men count with you, but none too much;
Summing up what I have said so far, data is where the value is,
winners have the most data in motion whereas losers have too much, applications are the skin on the data — some more erotic than others, the Internet’s existence gives applications their universality and some applications their raison d’etre, the end-to-end principle is about trust placement, trust is not for sissies, and the central discipline of secure design is that of choosing what failure modes you are prepared to tolerate. At the same time, a design and its implementation can diverge. At least since Hugh Thompson published his famous Venn diagram, we’ve known that security flaw is in that part of the implementation that was not in the design. It is from that realization that I give you what I know to be the paramount rule of all security engineering:
No Silent Failure…We have nowhere to go but up with respect to a rule of “no silent failure.” The Verizon Data Breach Investigations Report shows that
data loss is overwhelmingly silent. Part of that silence is digital
physics — if I steal your data, then you still have them, unlike
when I steal your underpants — but the majority of that silence
is that there is no programmatic indicator of the data’s cloning;
it is like a (UNIX) _fork_ operation, fast and cheap.
http://geer.tinho.net/geer.owasp.4iv12.txt
Maybe if they put underpants on it that would prevent another accident. Yarnbombing target!
This one time, at band camp, I told a colonel with a flute stuck up his pussy that I thought ADA sucked sweaty Somalian spermicule sacks.
Rebirthing – Now with a hefty bill from the local services!
Sometimes a tunnel is just a tunnel. Sometimes a tunnel is a trap. Make your own metaphors…
They might be on the inside looking out?? Maybe it’s that old lady that started out by quiefing up a fly…
Well that stinks.
Eve Ensler quotes “It seems to me that we spend an inordinate amount of time and attention on fixing ourselves when we could really be directing that out to serving others,”
“It seems to me there’s this tyranny that’s not accidental or incidental, to make women feel compelled to look like somebody they’re not. I think the effort is being made to get us to turn our time and attention to this instead of important political issues.”
At least it was not accidental. The incident report must be funny.
London calling http://boredpanda.org/system/wp-content/uploads/2012/11/yarn-bombing-5.jpg
I was fixing myself and tearing down my burned out house. Idiots came along to fix the burned out house. The block of cement is smarter than the people. You can’t help them. At least he has his dignity.
London calling http://boredpanda.org/system/wp-content/uploads/2012/11/yarn-bombing-5.jpg
The phone booth is dressed.
I wonder if all this started with those infamous words, “Here, hold my beer for a minute”…
That’s too funny…
Acting like a dick got him stuck in a cunt.
It’s even poetic with him being too much of a pussy to figure out how to get out too. (The emergency responders were able to get him out “by hand”!)
Fire Department probably just gave him a lube job
Reminds me of the Christmas story movie when the kid sticks his tongue on the frozen flag pole. Dumb ass !
After he was free, I wonder if the fireman slapped him on the ass the way the doctor once did.
What a sorry excuse for art.
But it looks just like the craig of an entrance to a sacred rock in aboriginal australia.
What a sorry excuse for an art critic.
you’ll know art when you see it…everything else is just pornography.
^^ i think that guy might be a neocon.
The proper guideline is that “you will know it is art when you see it and until then it is all to be considered constitutionally protected pornography”
fucking thing does look like an old, ragged out coochie, though.
A cunning stunt!