<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
		<id>https://www.explainxkcd.com/wiki/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Will</id>
		<title>explain xkcd - User contributions [en]</title>
		<link rel="self" type="application/atom+xml" href="https://www.explainxkcd.com/wiki/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Will"/>
		<link rel="alternate" type="text/html" href="https://www.explainxkcd.com/wiki/index.php/Special:Contributions/Will"/>
		<updated>2026-04-09T18:54:49Z</updated>
		<subtitle>User contributions</subtitle>
		<generator>MediaWiki 1.30.0</generator>

	<entry>
		<id>https://www.explainxkcd.com/wiki/index.php?title=2226:_Recombination_And_Reionization&amp;diff=182737</id>
		<title>2226: Recombination And Reionization</title>
		<link rel="alternate" type="text/html" href="https://www.explainxkcd.com/wiki/index.php?title=2226:_Recombination_And_Reionization&amp;diff=182737"/>
				<updated>2019-11-12T13:26:38Z</updated>
		
		<summary type="html">&lt;p&gt;Will: /* Explanation */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{comic&lt;br /&gt;
| number    = 2226&lt;br /&gt;
| date      = November 8, 2019&lt;br /&gt;
| title     = Recombination And Reionization&lt;br /&gt;
| image     = recombination_and_reionization.png&lt;br /&gt;
| titletext = These signals seem to be pre-star-formation but post-Malone.&lt;br /&gt;
}}&lt;br /&gt;
&lt;br /&gt;
==Explanation==&lt;br /&gt;
{{incomplete|Created by BBC RADIO FIVE LISTENERS. Please mention here why this explanation isn't complete. Do NOT delete this tag too soon.}}&lt;br /&gt;
&lt;br /&gt;
The {{w|hydrogen line}} is a {{w|spectral line}} of neutral (un-ionized) hydrogen atoms. The electrons in an atom have a property called spin, equal to either 1/2 or -1/2, and one &amp;quot;spin state&amp;quot; of the electron in neutral hydrogen has slightly more energy than the other spin state. This means that when the electron in a hydrogen atom spontaneously switches its spin state, it releases a photon at a certain frequency called the hydrogen line. This line falls in the {{w|microwave}} region of the electromagnetic spectrum, with a frequency of ~1.42 gigahertz (GHz). The wavelength corresponding to this frequency is about 21.1 centimeters, giving it the common name of the 21-centimeter line. In this comic, [[Ponytail]] is attempting to detect the signal of this emission line from the ancient universe, although due to {{w|redshift}}, the line's frequency has decreased from 1.4 GHz to only ~100 megahertz (MHz), putting it in the current {{w|FM broadcast band}}. In most parts of the world, FM radio makes use of frequencies from 87.5 to 108 MHz.&lt;br /&gt;
&lt;br /&gt;
The problem that FM radio and the signal for which Ponytail is searching overlap in frequency quickly becomes apparent when tuning to the frequency detects a local radio station rather than the desired signal. The radio station is called Hot 92.7: The Vibe; this indicates that Ponytail is searching for a signal at 92.7 MHz, but there is a [https://vibe927miami.com/ radio station] interfering with it. She demonstrates this to [[Cueball]] by playing the live signal for him, but says that once the radio DJ stops talking, their research will result in a {{w|Nobel Prize}}. This is unlikely, as most radio stations broadcast 24 hours a day without ever stopping (except in cases of power failure, which would also affect Ponytail's radio telescope). An unstated joke is that Ponytail's observational setup receives the FM radio signal at all; any actual {{w|radio telescope}} would have incorporated methods from its inception to exclude local sources of radio signals such as FM radio.&lt;br /&gt;
&lt;br /&gt;
Cueball points out that perhaps the signal is what the supposed primordial hydrogen line actually sounds like during the phase of universe formation called {{w|reionization}}. Ponytail jokes back that the primordial universe must enjoy playing popular singer {{w|Selena Gomez}}. Although it is theoretically possible that a naturally occurring radio transmission might sound like music to humans, it would not contain clearly understandable coherent sentences in a language that did not exist when the transmission was created.{{fact}}&lt;br /&gt;
&lt;br /&gt;
The title text refers to the signal Ponytail is detecting, claiming that it originates from before the formation of the first stars in the universe (which took place approximately 150 to 200 million years after the {{w|Big Bang}}), but is additionally post-Malone. &amp;quot;{{w|Post Malone}}&amp;quot; is the stage name of a popular hip hop musician and singer, so this is a play on words, as the &amp;quot;Post&amp;quot; in his stage name isn't referring to &amp;quot;after&amp;quot; something, but is simply his (real) last name, and perhaps a play on the expression &amp;quot;a star is born&amp;quot; for an artist becoming a famous celebrity.&lt;br /&gt;
&lt;br /&gt;
==Transcript==&lt;br /&gt;
&lt;br /&gt;
:[Panel showing Ponytail sitting working at some type of console, possibly in her laboratory. Cueball is standing on the other side of the console, facing her.]&lt;br /&gt;
:Ponytail: Our lab is trying to pick up the spin line of neutral hydrogen. It's the only radiation from the era before the first stars formed.&lt;br /&gt;
&lt;br /&gt;
:[Panel showing Ponytail and Cueball.  Ponytail has paused working, with one hand raised off the console.]&lt;br /&gt;
:Ponytail: It was 1.4 GHz at first, but by now it's redshifted to the 100-MHz range.&lt;br /&gt;
:Cueball: Isn't that also where FM radio broadcasts?&lt;br /&gt;
&lt;br /&gt;
:[Frameless panel showing Ponytail and Cueball.  Ponytail is pressing a key on the console to enable and disable a live signal from her lab's equipment.]&lt;br /&gt;
:Ponytail: Yeah. That's the problem.  Listen:&lt;br /&gt;
:Sound of keypress on console: *Click*&lt;br /&gt;
:Audio signal from console: ''You're tuned to Hot 92.7: the Vibe! Coming up next...''&lt;br /&gt;
:Sound of keypress on console: *Click*&lt;br /&gt;
&lt;br /&gt;
:[Panel showing Ponytail and Cueball.  Ponytail has resumed working at the console, and Cueball has raised a hand to his chin.]&lt;br /&gt;
:Ponytail: But once this guy stops talking, that Nobel Prize will be '''''ours'''''.&lt;br /&gt;
:Cueball: Maybe that's not a station &amp;amp;ndash; maybe that's just what reionization sounds like.&lt;br /&gt;
:Ponytail: Reionization plays a lot of Selena Gomez.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{{comic discussion}}&lt;br /&gt;
[[Category:Comics featuring Cueball]]&lt;br /&gt;
[[Category:Comics featuring Ponytail]]&lt;br /&gt;
[[category: Astronomy]]&lt;br /&gt;
[[Category:Comics featuring real people]]&lt;/div&gt;</summary>
		<author><name>Will</name></author>	</entry>

	<entry>
		<id>https://www.explainxkcd.com/wiki/index.php?title=1967:_Violin_Plots&amp;diff=154405</id>
		<title>1967: Violin Plots</title>
		<link rel="alternate" type="text/html" href="https://www.explainxkcd.com/wiki/index.php?title=1967:_Violin_Plots&amp;diff=154405"/>
				<updated>2018-03-16T14:32:16Z</updated>
		
		<summary type="html">&lt;p&gt;Will: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{comic&lt;br /&gt;
| number    = 1967&lt;br /&gt;
| date      = March 14, 2018&lt;br /&gt;
| title     = Violin Plots&lt;br /&gt;
| image     = violin_plots.png&lt;br /&gt;
| titletext = Strictly speaking, 'violin' refers to the internal structure of the data. The external portion visible in the plot is called the 'viola.'&lt;br /&gt;
}}&lt;br /&gt;
&lt;br /&gt;
==Explanation==&lt;br /&gt;
This comic graphs the &amp;quot;suggestiveness&amp;quot; of different visualization types, and the winner is {{w|Violin plot|Violin plots}}, hence the title of the comic. A violin plot is a method of plotting data similar to a {{w|box plot}}, but shows the full probability distribution of the data rather than a &amp;quot;box&amp;quot; showing the central two quartiles. This plot can look like the external opening of a human vulva, as do some of those in the violin plot represented in the comic (strictly speaking, this chart is not purely a violin plot; it is a box plot overlaid onto a violin plot).&lt;br /&gt;
&lt;br /&gt;
The chart compares other visualization types' suggestiveness (as female genitalia) to the violin plots and ranks them after how suggestive they are. In the low end we find {{w|pie chart}}, a circular graph divided into &amp;quot;slices&amp;quot; to show proportions, and {{w|Line chart|line graph}} or line chart, a graph of points connected by line segments. &lt;br /&gt;
&lt;br /&gt;
Almost as suggestive as violin plots are the paintings by {{w|Georgia O'Keeffe}}, an American painter known for her {{w|Flower paintings of Georgia O'Keeffe|paintings of flowers}}. Some of these flowers, ''{{w|Black Iris (painting)|Black Iris}}'' for example, are said to symbolize female genitalia, though O'Keeffe herself denied those claims.&lt;br /&gt;
&lt;br /&gt;
The title text invokes the fact that many people incorrectly use the word &amp;quot;{{w|vagina}}&amp;quot;, which refers to an internal structure, for the {{w|vulva}}, which is the external portion of the female genitals. Meanwhile the {{w|viola}} is an instrument often mistaken for a {{w|violin}}. And the word &amp;quot;viola&amp;quot; shares common letters with &amp;quot;vulva.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
[[Randall]] has made several comics with [[:Category:Sex|sexual topics]], and the vagina has been the center of attention before, as early as in [[136: Science Fair]]. There is even an entire [[:Category:Penis|Penis category]]. However, these topics haven't appeared recently — the last comic in the penis category was posted more than two years ago, and the sex category hasn't had a new comic since December 2017 (more than three months before this comic).&lt;br /&gt;
&lt;br /&gt;
It possible that pie charts were included because this comic was released on {{w|Pi Day}}. Randall has shown fascination with Pi in earlier comics like [[1292: Pi vs. Tau]]. On the other hand, it could be a reference to the film {{w|American Pie (film)|American Pie}}, which states that putting a finger in a pie feels like putting it inside a {{w|Vagina|Violin}}... It could of course be both reasons, or none of them...&lt;br /&gt;
&lt;br /&gt;
==Transcript==&lt;br /&gt;
:[Header over a violin plot type chart:]&lt;br /&gt;
:Suggestiveness of different visualization types&lt;br /&gt;
&lt;br /&gt;
:[The chart only has an Y-axis with tics, ranking the points on the plot. There are legends at the top and at the bottom:]&lt;br /&gt;
:Suggestive&lt;br /&gt;
:Not very suggestive&lt;br /&gt;
&lt;br /&gt;
:[There are four points on the graph, each with a mucosa colored and &amp;quot;violin&amp;quot; shaped probability density around each point. The points are white inside a black box plot like structure with black error bars. The two first points to the left are very low near the bottom of the Y-axis while the two next point to the right are almost at the top of the chart, the last also clearly with the probability density higher than the second last. Above the first two and below the second two points there are legends:]&lt;br /&gt;
:Pie charts&lt;br /&gt;
:Line graphs&lt;br /&gt;
:Georgia O'Keeffe paintings  &lt;br /&gt;
:Violin plots&lt;br /&gt;
&lt;br /&gt;
{{comic discussion}}&lt;br /&gt;
&lt;br /&gt;
[[Category:Comics with color]]&lt;br /&gt;
[[Category:Sex]]&lt;br /&gt;
[[Category:Charts]]&lt;br /&gt;
[[Category:Pie charts]] &amp;lt;!-- Mentioned in comic --&amp;gt;&lt;br /&gt;
[[Category:Line graphs]]  &amp;lt;!-- Mentioned in comic --&amp;gt;&lt;/div&gt;</summary>
		<author><name>Will</name></author>	</entry>

	<entry>
		<id>https://www.explainxkcd.com/wiki/index.php?title=1957:_2018_CVE_List&amp;diff=152782</id>
		<title>1957: 2018 CVE List</title>
		<link rel="alternate" type="text/html" href="https://www.explainxkcd.com/wiki/index.php?title=1957:_2018_CVE_List&amp;diff=152782"/>
				<updated>2018-02-19T16:28:40Z</updated>
		
		<summary type="html">&lt;p&gt;Will: /* Explanation */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{comic&lt;br /&gt;
| number    = 1957&lt;br /&gt;
| date      = February 19, 2018&lt;br /&gt;
| title     = 2018 CVE List&lt;br /&gt;
| image     = 2018_cve_list.png&lt;br /&gt;
| titletext = CVE-2018-?????: It turns out Bruce Schneier is just two mischevious kids in a trenchcoat.&lt;br /&gt;
}}&lt;br /&gt;
&lt;br /&gt;
==Explanation==&lt;br /&gt;
{{incomplete|Created by HACKING THIS WIKI VIA THE EDIT BOX - The explanation looks like a list. Explain the comic and put the security vulnerabilities in a table. Do NOT delete this tag too soon.}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{{w|Common Vulnerabilities and Exposures|CVE}} (Common Vulnerabilities and Exposures) is a standardized format for assigning an identity to a cybersecurity vulnerability (similar to the way that astronomical bodies are assigned unique identifiers by committees). Giving vulnerabilities a unique identifier makes them easier to talk about and helps in keeping track of the progress made toward resolving them. The typical format of a CVE identifier is '''CVE-[YEAR]-[NUMBER]'''. For example, the CVE identifier for 2017's widespread {{w|Meltdown (security vulnerability|Meltdown vulnerability}} is [https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5754 CVE-2017-5754]. CVEs also contain a short description of the issue.&lt;br /&gt;
&lt;br /&gt;
In this comic (released in February 2018), Randall presents a number of spurious predicted CVEs for later in 2018. Each CVE identifier is given as &amp;quot;CVE-2018-?????&amp;quot;, reflecting the fact that they have not yet happened so we don't know exactly what their CVE identifier will be.&lt;br /&gt;
&lt;br /&gt;
{|class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
! style=&amp;quot;width: 30%;&amp;quot; | Security Vulnerability&lt;br /&gt;
! style=&amp;quot;width: 70%;&amp;quot; | Notes&lt;br /&gt;
|-&lt;br /&gt;
|Apple products crash when displaying certain Telugu or Bengali letter combinations.&lt;br /&gt;
|This refers to a real vulnerability in iOS and MacOS publicized a few days before the comic released &amp;lt;ref&amp;gt;https://techcrunch.com/2018/02/15/iphone-text-bomb-ios-mac-crash-apple/&amp;lt;/ref&amp;gt;.&lt;br /&gt;
|-&lt;br /&gt;
|An attacker can use a timing attack to extploit [''sic''] a race condition in garbage collection to extract a limited number of bits from the Wikipedia article on Claude Shannon.&lt;br /&gt;
|Timing Attack to exploit a race condition in garbage collection refers to Meltdown and Spectre CPU flaws that can be exploited in cloud server like the ones in Wikipedia. {{w|Claude Shannon}} was an early and highly influential information scientist whose work underlies compression, encryption, security, and the theory behind how information is encoded into binary digits - hence the pertinence of extracting just some of the bits from his Wikipedia entry.&lt;br /&gt;
|-&lt;br /&gt;
|At the cafe on Third Street, the Post-it note with the WiFi password is visible from the sidewalk.&lt;br /&gt;
|Writing passwords in a visible place is a major security flaw. For instance, following the [[wikipedia:2018 Hawaii false missile alert|2018 Hawaii false missile alert]] the agency received criticism for a press photo showing a password written on a sticky note attached to a monitor.&amp;lt;ref&amp;gt;http://uk.businessinsider.com/hawaii-emergency-agency-password-discovered-in-photo-sparks-security-criticism-2018-1?r=US&amp;amp;IR=T&amp;lt;/ref&amp;gt; However, if a cafe posts their wifi password for customers, this suggests that it's ''supposed'' to be public knowledge. In this case, having it visible through the window as well presents only a very minor reduction in security.&lt;br /&gt;
|-&lt;br /&gt;
|A remote attacker can inject arbitrary text into public-facing pages via the comments box.&lt;br /&gt;
|Describes a common feature on news sites or social media sites like Facebook. The possibility for users to &amp;quot;inject&amp;quot; text into the page is by design. This is a humorous reference to the relatively common security vulnerability &amp;quot;[[Wikipedia:Cross-site_scripting|persistent cross-site scripting]]&amp;quot;, where input provided by the user is displayed to other users in a dangerous fashion that allows attackers to inject arbitrary HTML or Javascript code into e.g. a comment section. It might also be a humorous reference to the events before, during and after the 2016 US Presidential elections where Internet Research Agency employees based remotely in St. Petersburg, Russia, but disguised as US citizens, &amp;quot;injected&amp;quot; arbitrary text in the form of political propaganda into comments on multiple web sites, according to an indictment returned by a federal grand jury on February 16, 2018.&lt;br /&gt;
|-&lt;br /&gt;
|MySQL server 5.5.45 secretly runs two parallel databases for people who say &amp;quot;S-Q-L&amp;quot; and &amp;quot;sequel.&amp;quot;&lt;br /&gt;
|Some people pronounce &amp;quot;{{w|SQL}}&amp;quot; like &amp;quot;sequel&amp;quot;, after SQL's predecessor &amp;quot;SEQUEL (Structured English Query Language)&amp;quot;. The standard for SQL suggests that it should be pronounced as separate letters; however, the author of SQL pronounces it &amp;quot;sequel&amp;quot;, so the debate is persisting (with even more justification than arguments about how to pronounce &amp;quot;GIF&amp;quot;). MySQL is an open-source relational database management system, the latest GA version (at the time of writing) is MySQL 5.7.&lt;br /&gt;
|-&lt;br /&gt;
|A flaw in some x86 CPUs could allow a root user to de-escalate to normal account privileges.&lt;br /&gt;
|{{w|Privilege escalation}} refers to any illegitimate means of giving a system user greater privilege than they are supposed to have, and most hackers will seek to achieve this if they can. The most highly-sought privilege is that of the root user, which allows complete access to an entire system.&lt;br /&gt;
&lt;br /&gt;
This CVE, however, presents the reverse situation; that a flaw can allow a root user to ''de-escalate'', the exact opposite of what a hacker would want to achieve.{{Citation needed}} (In any case, the root user can always de-escalate manually if they so choose, as they have complete control).&lt;br /&gt;
|-&lt;br /&gt;
|Apple products catch fire when displaying emoji with diacritics.&lt;br /&gt;
|Diacritics are the accents found on letters in some languages (eg. č, ģ ķ, ļ, ņ, š, ž). These would not be found on emojis. It is also a reference to a common problem of modern gadgets catching fire (usually related to flaws in Lithium-Ion batteries).&lt;br /&gt;
|-&lt;br /&gt;
|An oversight in the rules allows a dog to join a basketball team.&lt;br /&gt;
|This likely refers to the movie {{w|Air Bud}}. It is a movie about a dog playing basketball. This has been a common theme in xkcd comics, see [[115: Meerkat]], [[1439: Rack Unit]], [[1819: Sweet 16]], [[1552: Rulebook]]&lt;br /&gt;
|-&lt;br /&gt;
|Haskell isn't side-effect-free after all; the effects are all just concentrated in this one. computer [''sic''] in Missouri that no one's checked on in a while.&lt;br /&gt;
|{{w|Haskell}} is a functional programming language, functional programming is characterized by using functions that don't have side effects in other parts of the program. The joke here is discovering that indeed it does have side-effects, but for some unknown (and highly absurd) reason they only manifest on a specific computer in a nondescript location, but no one has noticed.&lt;br /&gt;
|-&lt;br /&gt;
|Nobody really knows how hypervisors work.&lt;br /&gt;
|[[wikipedia:Hypervisor|&amp;quot;Hypervisors&amp;quot;]] are a tool for computer virtualization. Virtualization is an extremely complex topic, as it requires a computer to completely emulate a different computer with its own unique hardware and software. Many IT professionals and businesses rely heavily on various forms of virtualization, but the individual employees would be hard-pressed to explain how it works. Meltdown and Specter are related to this.&lt;br /&gt;
|-&lt;br /&gt;
|Critical: Under Linux 3.14.8 on System/390 in a UTC+14 time zone, a local user could potentially use a buffer overflow to change another user's default system clock from 12-hour to 24-hour.&lt;br /&gt;
|This joke is about arcane systems that are running Linux in exceedingly unique situations, such that reproducing the error would be incredibly difficult or inconvenient, and would only affect a very tiny user base (if any at all). Other xkcd comics make references to such obscure computer-time issues relating to time zones and time conversions, and how many programmers find these issues frustrating or even traumatizing. UTC+14 is a time zone used only on some islands in the Pacific Ocean, i.e., [[Wikipedia:Line_Islands|the Line Islands]], and is also the earliest time zone on earth. The joke continues by stating that even if all of these absurd conditions were met, the resulting vulnerability would still be relatively benign: simply changing a user's preferred clock display format.&lt;br /&gt;
|-&lt;br /&gt;
|x86 has way too many instructions.&lt;br /&gt;
|The x86 architecture is considered &amp;quot;CISC&amp;quot; (a &amp;quot;complex instruction set computer&amp;quot;), having many instructions originally provided to make programming by a human simpler; other examples include the 68000 series used in the first Apple Mac. In the 1980s, this design philosophy was countered by the &amp;quot;RISC&amp;quot; (&amp;quot;reduced instruction set computer&amp;quot;) design movement exemplified by SPARC, MIPS, PowerPC (previously used by Apple) and the ARM chips common in mobile phones - based on the observation that computer programs were increasingly generated by compilers (which only used a few instructions) rather than directly by people, and that the chip area dedicated to extra instructions could be better dedicated to, for example, cache. At the time, there was an internet war about the merits of each approach (with the Mac and PC being on different sides, at one time; owners of other competing systems such as the Archimedes and Amiga had similar arguments on usenet in the early 1990s); this &amp;quot;issue&amp;quot; may be posted by someone who still recalls these debates. Technically, the extra instructions do slightly complicate the task of validating correct chip behaviour and complicate the tool chains that manage software, which could be seen as a minor security risk; however, the 64-bit architecture introduced by AMD and since adopted by Intel does rationalise things somewhat, and all recent x86 chips break down instructions into RISC-like micro-operations, so the complication from a hardware perspective is localised. Recent security issues such as the speculative cache load issue in Meltdown and Spectre depend more on details of implementation rather than instruction set, and have been exhibited both by x86 (CISC) and ARM (RISC) processors.&lt;br /&gt;
|-&lt;br /&gt;
|NumPy 1.8.0 can factor primes in ''O''(log ''n'') time and must be quietly deprecated before anyone notices.&lt;br /&gt;
|NumPy is the fundamental package for scientific computing with Python.  If something can find the prime factors of a number this quickly, especially a [[wikipedia:semiprime|semiprime]] with two large factors, there are attacks to break many crypto functions used in internet security. However, prime numbers have only a single factor, and &amp;quot;factoring primes&amp;quot; quickly is a simpler problem, that of [[wikipedia:Primality test|proving that a number is in fact a prime]]. &lt;br /&gt;
|-&lt;br /&gt;
|Apple products grant remote access if you send them words that break the &amp;quot;I before E&amp;quot; rule.&lt;br /&gt;
|Another joke on the first CVE and a common English writing rule of thumb, which fails almost as often as it succeeds. Possibly a jab at Apple's image, portraying their software as unable to handle improper grammar or spelling.&lt;br /&gt;
|-&lt;br /&gt;
|Skylake x86 chips can be pried from their sockets using certain flathead screwdrivers.&lt;br /&gt;
|Skylake x86 chips are a line of microprocessors made by Intel. Yes, you can forcefully remove any processor from its socket with a screwdriver.{{Citation needed}} There are many reports from people not using common sense. &lt;br /&gt;
|-&lt;br /&gt;
|Apparently Linus Torvalds can be bribed pretty easily.&lt;br /&gt;
|{{w|Linus Torvalds}} is the benevolent dictator of the Linux kernel codebase. Normally it is hard to pass a change because he has the last word about what merge to the code base because that code is replicated in all Linux installations, but apparently he is easy to bribe, which would be a severe critical vulnerability to all Linux servers and machines.&lt;br /&gt;
|-&lt;br /&gt;
|An attacker can execute malicious code on their own machine and no one can stop them.&lt;br /&gt;
|The point of an attack is to make someone else's machine perform actions against the owner's will. Anyone can make their own machine execute any code{{Citation needed}}, but this would usually not be described as an attack except in the case of a locked-down appliance, such as a video game console or pay TV decoder.&lt;br /&gt;
|-&lt;br /&gt;
|Apple products execute any code printed over a photo of a dog with a saddle and a baby riding it.&lt;br /&gt;
|This could refer to a CVE vulnerability of JPG files where javascript embedded within the image file is executed by some application, only this time is in a printed photo instead of encoded into the image itself. &lt;br /&gt;
|-&lt;br /&gt;
|Under rare circumstances, a flaw in some versions of Windows could allow Flash to be installed.&lt;br /&gt;
|Flash was discontinued because of its notoriously abysmal security record. All security experts advise against install. The joke here relates to the perceived difficulty with keeping Flash up to date or even installed properly to begin with. A common user experience which is the subject of numerous jokes and memes is the constant nagging notification to install or update Flash in order for web pages to display properly. While anecdotal, many IT professionals will bemoan the trouble that Flash has given them in the workplace due to these notifications and problems related to them.&lt;br /&gt;
|-&lt;br /&gt;
|Turns out the cloud is just other people's computers.&lt;br /&gt;
|This refers to a computer meme where replace &amp;quot;cloud&amp;quot; with &amp;quot;other people's computers&amp;quot; must be used in all marketing presentation to CEOs and not computer literate persons to evaluate the security impact of using &amp;quot;Cloud services&amp;quot;. Part of the humor here is that &amp;quot;the cloud&amp;quot;, in actuality, is simply a term for hosted services, i.e., computers being run by other people (typically businesses that specialize in this type of &amp;quot;Platform As A Service&amp;quot; or &amp;quot;PAAS&amp;quot; service model). Calling &amp;quot;the cloud&amp;quot; as &amp;quot;other people's computers&amp;quot; is, at its core, entirely accurate, though it takes away the business jargon and simplifies the situation in such a way that it might cast doubt on the security, reliability, and general effectiveness of using &amp;quot;cloud&amp;quot; solutions.&lt;br /&gt;
|-&lt;br /&gt;
|A flaw in Mitre's CVE database allows arbitrary code insertion.[[285|[~~CLICK HERE FOR CHEAP VIAGRA~~]]]&lt;br /&gt;
|Mitre's CVE database is the database where all CVE are stored. This is a joke relating to the 4&amp;lt;sup&amp;gt;th&amp;lt;/sup&amp;gt; CVE in this list, pointing out that the CVE site is also vulnerable.&lt;br /&gt;
|-&lt;br /&gt;
|It turns out Bruce Schneier is just two mischevious kids in a trenchcoat.&lt;br /&gt;
|Appears in the title text. {{w|Bruce Schneier}} is security researcher and blogger. He was mentioned in the title texts of [[748: Worst-Case Scenario]] and [[1039: RuBisCO]]. The &amp;quot;two kids in a trenchcoat&amp;quot; is a reference to the Totem Pole Trench trope.&amp;lt;ref&amp;gt;[http://tvtropes.org/pmwiki/pmwiki.php/Main/TotemPoleTrench TV Tropes:Totem Pole Trench trope]&amp;lt;/ref&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== References ==&lt;br /&gt;
&amp;lt;references/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Transcript==&lt;br /&gt;
LEAKED LIST OF MAJOR 2018 SECURITY VULNERABILITIES&lt;br /&gt;
&lt;br /&gt;
CVE-2018-????? Apple products crash when displaying certain Telugu or Bengali letter combinations.&lt;br /&gt;
&lt;br /&gt;
CVE-2018-????? An attacker can use a timing attack to extploit a race condition in garbage collection to extract a limited number of bits from the Wikipedia article on Claude Shannon.&lt;br /&gt;
&lt;br /&gt;
CVE-2018-????? At the cafe on Third Street, the Post-it note with the WiFi password is visible from the sidewalk.&lt;br /&gt;
&lt;br /&gt;
CVE-2018-????? A remote attacker can inject arbitrary text into public-facing pages via the comments box.&lt;br /&gt;
&lt;br /&gt;
CVE-2018-????? MySQL server 5.5.45 secretly runs two parallel databases for people who say &amp;quot;S-Q-L&amp;quot; and &amp;quot;sequel.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
CVE-2018-????? A flaw in some x86 CPUs could allow a root user to de-escalate to normal account privileges.&lt;br /&gt;
&lt;br /&gt;
CVE-2018-????? Apple products catch fire when displaying emoji with diacritics.&lt;br /&gt;
&lt;br /&gt;
CVE-2018-????? An oversight in the rules allows a dog to join a basketball team.&lt;br /&gt;
&lt;br /&gt;
CUE-2018-????? Haskell isn't side-effect-free after all; the effects are all just concentrated in this one. computer in Missouri that no one's checked on in a while.&lt;br /&gt;
&lt;br /&gt;
CVE-2018-????? Nobody really knows how hypervisors work.&lt;br /&gt;
&lt;br /&gt;
CVE-2018-????? Critical: Under Linux 3.14.8 on System/390 in a UTC+14 time zone, a local user could potentially use a buffer overflow to change another user's default system clock from 12-hour to 24-hour.&lt;br /&gt;
&lt;br /&gt;
CVE-2018-????? x86 has way too many instructions.&lt;br /&gt;
&lt;br /&gt;
CVE-2018-????? NumPy 1.8.0 can factor primes in ''O''(log ''n'') time and must be quietly deprecated before anyone notices.&lt;br /&gt;
&lt;br /&gt;
CVE-2018-????? Apple products grant remote access if you send them words that break the &amp;quot;I before E&amp;quot; rule.&lt;br /&gt;
&lt;br /&gt;
CVE-2018-????? Skylake x86 chips can be pried from their sockets using certain flathead screwdrivers.&lt;br /&gt;
&lt;br /&gt;
CVE-2018-????? Apparently Linus Torvalds can be bribed pretty easily.&lt;br /&gt;
&lt;br /&gt;
CVE-2018-????? An attacker can execute malicious code on their own machine and no one can stop them.&lt;br /&gt;
&lt;br /&gt;
CVE-2018-????? Apple products execute any code printed over a photo of a dog with a saddle and a baby riding it.&lt;br /&gt;
&lt;br /&gt;
CVE-2018-????? Under rare circumstances, a flaw in some versions of Windows could allow Flash to be installed.&lt;br /&gt;
&lt;br /&gt;
CVE-2018-????? Turns out the cloud is just other people's computers.&lt;br /&gt;
&lt;br /&gt;
CVE-2018-????? A flaw in Mitre's CVE database allows arbitrary code insertion.&amp;lt;span style=&amp;quot;color:blue&amp;quot;&amp;gt;[~~CLICK HERE FOR CHEAP VIAGRA~~]&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{{comic discussion}}&lt;/div&gt;</summary>
		<author><name>Will</name></author>	</entry>

	<entry>
		<id>https://www.explainxkcd.com/wiki/index.php?title=1957:_2018_CVE_List&amp;diff=152773</id>
		<title>1957: 2018 CVE List</title>
		<link rel="alternate" type="text/html" href="https://www.explainxkcd.com/wiki/index.php?title=1957:_2018_CVE_List&amp;diff=152773"/>
				<updated>2018-02-19T15:22:23Z</updated>
		
		<summary type="html">&lt;p&gt;Will: Exploit to allow users to extract bits from Claude Shannon Wikipedia entry&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{comic&lt;br /&gt;
| number    = 1957&lt;br /&gt;
| date      = February 19, 2018&lt;br /&gt;
| title     = 2018 CVE List&lt;br /&gt;
| image     = 2018_cve_list.png&lt;br /&gt;
| titletext = CVE-2018-?????: It turns out Bruce Schneier is just two mischevious kids in a trenchcoat.&lt;br /&gt;
}}&lt;br /&gt;
&lt;br /&gt;
==Explanation==&lt;br /&gt;
{{incomplete|Created by HACKING THIS WIKI VIA THE EDIT BOX - The explanation looks like a list. Explain the comic and put the security vulnerabilities in a table. Do NOT delete this tag too soon.}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{{w|Common Vulnerabilities and Exposures|CVE}} (Common Vulnerabilities and Exposures) is a standardized format for assigning an identity to a cybersecurity vulnerability (similar to the way that astronomical bodies are assigned unique identifiers by committees). Giving vulnerabilities a unique identifier makes them easier to talk about and helps in keeping track of the progress made toward resolving them. The typical format of a CVE identifier is '''CVE-[YEAR]-[NUMBER]'''. For example, the CVE identifier for 2017's widespread {{w|Meltdown (security vulnerability|Meltdown vulnerability}} is [https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5754 CVE-2017-5754]. CVEs also contain a short description of the issue.&lt;br /&gt;
&lt;br /&gt;
In this comic (released in February 2018), Randall presents a number of spurious predicted CVEs for later in 2018. Each CVE identifier is given as &amp;quot;CVE-2018-?????&amp;quot;, reflecting the fact that they have not yet happened so we don't know exactly what their CVE identifier will be.&lt;br /&gt;
&lt;br /&gt;
{|class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
! style=&amp;quot;width: 30%;&amp;quot; | Security Vulnerability&lt;br /&gt;
! style=&amp;quot;width: 70%;&amp;quot; | Notes&lt;br /&gt;
|-&lt;br /&gt;
|Apple products crash when displaying certain Telugu or Bengali letter combinations.&lt;br /&gt;
|This refers to a real vulnerability in iOS and MacOS publicized a few days before the comic released &amp;lt;ref&amp;gt;https://techcrunch.com/2018/02/15/iphone-text-bomb-ios-mac-crash-apple/&amp;lt;/ref&amp;gt;.&lt;br /&gt;
|-&lt;br /&gt;
|An attacker can use a timing attack to extploit[sic] a race condition in garbage collection to extract a limited number of bits from the Wikipedia article on Claude Shannon.&lt;br /&gt;
|Timing Attack to exploit a race condition in garbage collection refers to Meltdown and Spectre CPU flaws that can be exploited in cloud server like the ones in Wikipedia. {{w|Claude Shannon}} was an early and highly influential information scientist whose work underlies compression, encryption, security, and the theory behind how information is encoded into binary digits - hence the pertinence of extracting just some of the bits from his Wikipedia entry.&lt;br /&gt;
|-&lt;br /&gt;
|At the cafe on third street, the post-it note with the wifi password is visible from the sidewalk.&lt;br /&gt;
|Writing passwords in a visible place is a major security flaw. For instance, following the [[wikipedia:2018 Hawaii false missile alert|2018 Hawaii false missile alert]] the agency received criticism for a press photo showing a password written on a sticky note attached to a monitor.&amp;lt;ref&amp;gt;http://uk.businessinsider.com/hawaii-emergency-agency-password-discovered-in-photo-sparks-security-criticism-2018-1?r=US&amp;amp;IR=T&amp;lt;/ref&amp;gt; However, if a cafe posts their wifi password for customers, this suggests that it's ''supposed'' to be public knowledge. In this case, having it visible through the window as well presents only a very minor reduction in security.&lt;br /&gt;
|-&lt;br /&gt;
|A remote attacker can inject arbitrary text into public-facing pages via the comments box.&lt;br /&gt;
|Describes a common feature on news sites or social media sites like Facebook. The possibility for users to &amp;quot;inject&amp;quot; text into the page is by design. This is a humorous reference to the relatively common security vulnerability &amp;quot;[[Wikipedia:Cross-site_scripting|persistent cross-site scripting]]&amp;quot;, where input provided by the user is displayed to other users in a dangerous fashion that allows attackers to inject arbitrary HTML or Javascript code into e.g. a comment section. It might also be a humorous reference to the events before, during and after the 2016 US Presidential elections where Internet Research Agency employees based remotely in St. Petersburg, Russia, but disguised as US citizens, &amp;quot;injected&amp;quot; arbitrary text in the form of political propaganda into comments on multiple web sites, according to an indictment returned by a federal grand jury on February 16, 2018.&lt;br /&gt;
|-&lt;br /&gt;
|MySQL server 5.5.45 secretly runs two parallel databases for people who say &amp;quot;S-Q-L&amp;quot; and &amp;quot;sequel.&amp;quot;&lt;br /&gt;
|Some people pronounce &amp;quot;SQL&amp;quot; like &amp;quot;sequel&amp;quot;, after SQL's predecessor &amp;quot;SEQUEL (Structured English Query Language)&amp;quot;. The standard for SQL suggests that it should be pronounced as separate letters; however, the author of SQL pronounces it &amp;quot;sequel&amp;quot;, so the debate is persisting (with even more justification than arguments about how to pronounce &amp;quot;GIF&amp;quot;). MySQL is an open-source relational database management system, the latest GA version (at the time of writing) is MySQL 5.7.&lt;br /&gt;
|-&lt;br /&gt;
|A flaw in some x86 CPUs could allow a root user to de-escalate to normal account privileges.&lt;br /&gt;
|{{w|Privilege escalation}} refers to any illegitimate means of giving a system user greater privilege than they are supposed to have, and most hackers will seek to achieve this if they can. The most highly-sought privilege is that of the root user, which allows complete access to an entire system.&lt;br /&gt;
&lt;br /&gt;
This CVE, however, presents the reverse situation; that a flaw can allow a root user to ''de-escalate'', the exact opposite of what a hacker would want to achieve. (In any case, the root user can always de-escalate manually if they so choose, as they have complete control).&lt;br /&gt;
|-&lt;br /&gt;
|Apple products catch fire when displaying emoji with diacritics.&lt;br /&gt;
|Diacritics are the accents found on letters in some languages (eg. č, ģ ķ, ļ, ņ, š, ž). These would not be found on emojis. It is also a reference to a common problem of modern gadgets catching fire (usually related to flaws in Lithium-Ion batteries).&lt;br /&gt;
|-&lt;br /&gt;
|An oversight in the rules allows a dog to join a basketball team.&lt;br /&gt;
|This likely refers to the movie {{w|Air Bud}}. It is a movie about a dog playing basketball. This has been a common theme in xkcd comics, see [[115: Meerkat]], [[1439: Rack Unit]], [[1819: Sweet 16]], [[1552: Rulebook]]&lt;br /&gt;
|-&lt;br /&gt;
|Haskell isn't side-effect-free after all; the effects are all just concentrated in this one. Computer in Missouri that no one's checked on in a while.&lt;br /&gt;
|Haskell is a functional programming language, functional programming is characterized by using functions that don't have side effects in other parts of the program. The joke here is discovering that indeed it does have side-effects, but for some unknown (and highly absurd) reason they only manifest on a specific computer in a nondescript location, but no one has noticed.&lt;br /&gt;
|-&lt;br /&gt;
|Nobody really knows how hypervisors work.&lt;br /&gt;
|[[wikipedia:Hypervisor|&amp;quot;Hypervisors&amp;quot;]] are a tool for computer virtualization. Virtualization is an extremely complex topic, as it requires a computer to completely emulate a different computer with its own unique hardware and software. Many IT professionals and businesses rely heavily on various forms of virtualization, but the individual employees would be hard-pressed to explain how it works. Meltdown and Specter are related to this.&lt;br /&gt;
|-&lt;br /&gt;
|CRITICAL: Under Linux 3.14.8 on System/390 in a UTC+14 time zone, a local user could potentially use a buffer overflow to change another user's default system clock from 12-hour to 24-hour.&lt;br /&gt;
|This joke is about arcane systems that are running Linux in exceedingly unique situations, such that reproducing the error would be incredibly difficult or inconvenient, and would only affect a very tiny user base (if any at all). Other xkcd comics make references to such obscure computer-time issues relating to time zones and time conversions, and how many programmers find these issues frustrating or even traumatizing. UTC+14 is a time zone used only on some islands in the Pacific Ocean, i.e., [[Wikipedia:Line_Islands|the Line Islands]], and is also the earliest time zone on earth. The joke continues by stating that even if all of these absurd conditions were met, the resulting vulnerability would still be relatively benign: simply changing a user's preferred clock display format.&lt;br /&gt;
|-&lt;br /&gt;
|x86 has way too many instructions.&lt;br /&gt;
|The x86 architecture is considered &amp;quot;CISC&amp;quot; (a &amp;quot;complex instruction set computer&amp;quot;), having many instructions originally provided to make programming by a human simpler; other examples include the 68000 series used in the first Apple Mac. In the 1980s, this design philosophy was countered by the &amp;quot;RISC&amp;quot; (&amp;quot;reduced instruction set computer&amp;quot;) design movement exemplified by SPARC, MIPS, PowerPC (previously used by Apple) and the ARM chips common in mobile phones - based on the observation that computer programs were increasingly generated by compilers (which only used a few instructions) rather than directly by people, and that the chip area dedicated to extra instructions could be better dedicated to, for example, cache. At the time, there was an internet war about the merits of each approach (with the Mac and PC being on different sides, at one time; owners of other competing systems such as the Archimedes and Amiga had similar arguments on usenet in the early 1990s); this &amp;quot;issue&amp;quot; may be posted by someone who still recalls these debates. Technically, the extra instructions do slightly complicate the task of validating correct chip behaviour and complicate the tool chains that manage software, which could be seen as a minor security risk; however, the 64-bit architecture introduced by AMD and since adopted by Intel does rationalise things somewhat, and all recent x86 chips break down instructions into RISC-like micro-operations, so the complication from a hardware perspective is localised. Recent security issues such as the speculative cache load issue in Meltdown and Spectre depend more on details of implementation rather than instruction set, and have been exhibited both by x86 (CISC) and ARM (RISC) processors.&lt;br /&gt;
|-&lt;br /&gt;
|NumPy 1.8.0 can factor primes in O(log n) time and must be quietly deprecated before anyone notices.&lt;br /&gt;
|NumPy is the fundamental package for scientific computing with Python.  If something can find the prime factors of a number this quickly, there are attacks to break many crypto functions used in internet security. However, prime numbers have only a single factor, and &amp;quot;factoring primes&amp;quot; quickly is a simpler problem. &lt;br /&gt;
|-&lt;br /&gt;
|Apple products grant remote access if you send them words that break the &amp;quot;I before E&amp;quot; rule.&lt;br /&gt;
|Another joke on the first CVE and a common English writing rule of thumb, which fails almost as often as it succeeds. Possibly a jab at Apple's image, portraying their software as unable to handle improper grammar or spelling.&lt;br /&gt;
|-&lt;br /&gt;
|Skylake x86 chips can be pried from their sockets using certain flathead screwdrivers.&lt;br /&gt;
|Skylake x86 chips are a line of microprocessors. Yes, you can forcefully remove any processor from its socket with a screwdriver. There are many reports from people not using common sense. &lt;br /&gt;
|-&lt;br /&gt;
|Apparently Linus Torvalds can be bribed pretty easily.&lt;br /&gt;
|Linus Torvalds is the benevolent dictator of the Linux kernel codebase. Normally it is hard to pass a change because he has the last word about what merge to the code base because that code is replicated in all Linux installations, but apparently he is easy to bribe, which would be a severe critical vulnerability to all Linux servers and machines.&lt;br /&gt;
|-&lt;br /&gt;
|An attacker can execute malicious code on their own machine and no one can stop them.&lt;br /&gt;
|The point of an attack is to make someone else's machine perform actions against the owner's will. Anyone can make their own machine execute any code, but this would usually not be described as an attack.&lt;br /&gt;
|-&lt;br /&gt;
|Apple products execute any code printed over a photo of a dog with a saddle and a baby riding it.&lt;br /&gt;
|This could refer to a CVE vulnerability of JPG files where javascript embedded within the image file is executed by some application, only this time is in a printed photo instead of encoded into the image itself. &lt;br /&gt;
|-&lt;br /&gt;
|Under rare circumstances, a flaw in some versions of Windows could allow Flash to be installed.&lt;br /&gt;
|Flash was discontinued because of its notoriously abysmal security record. All security experts advise against install. The joke here relates to the perceived difficulty with keeping Flash up to date or even installed properly to begin with. A common user experience which is the subject of numerous jokes and memes is the constant nagging notification to install or update Flash in order for web pages to display properly. While anecdotal, many IT professionals will bemoan the trouble that Flash has given them in the workplace due to these notifications and problems related to them.&lt;br /&gt;
|-&lt;br /&gt;
|Turns out the cloud is just other people's computers.&lt;br /&gt;
|This refers to a computer meme where replace &amp;quot;cloud&amp;quot; with &amp;quot;other people's computers&amp;quot; must be used in all marketing presentation to CEOs and not computer literate persons to evaluate the security impact of using &amp;quot;Cloud services&amp;quot;. Part of the humor here is that &amp;quot;the cloud&amp;quot;, in actuality, it simply a term for hosted services, i.e., computers being run by other people (typically businesses that specialize in this type of &amp;quot;Platform As A Service&amp;quot; or &amp;quot;PAAS&amp;quot; service model). Calling &amp;quot;the cloud&amp;quot; as &amp;quot;other people's computers&amp;quot; is, at its core, entirely accurate, though it takes away the business jargon and simplifies the situation in such a way that it might cast doubt on the security, reliability, and general effectiveness of using &amp;quot;cloud&amp;quot; solutions.&lt;br /&gt;
|-&lt;br /&gt;
|A flaw in Mitre's CVE database allows arbitrary code insertion.[~~CLICK HERE FOR CHEAP VIAGRA~~]&lt;br /&gt;
|Mitre's CVE database is the database where all CVE are stored. This is a joke relating to the 4&amp;lt;sup&amp;gt;th&amp;lt;/sup&amp;gt; CVE in this list, pointing out that the CVE site is also vulnerable.&lt;br /&gt;
|-&lt;br /&gt;
|It turns out Bruce Schneier is just two mischievous[sp?] kids in a trenchcoat. (title text)&lt;br /&gt;
|Bruce Schneier is security researcher and blogger. He was mentioned in the title texts of [[748: Worst-Case Scenario]] and [[1039: RuBisCO]]. The &amp;quot;two kids in a trenchcoat&amp;quot; is a reference to the Totem Pole Trench trope.&amp;lt;ref&amp;gt;[http://tvtropes.org/pmwiki/pmwiki.php/Main/TotemPoleTrench TV Tropes:Totem Pole Trench trope]&amp;lt;/ref&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== References ==&lt;br /&gt;
&amp;lt;references/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Transcript==&lt;br /&gt;
LEAKED LIST OF MAJOR 2018 SECURITY VULNERABILITIES&lt;br /&gt;
&lt;br /&gt;
CVE-2018-????? Apple products crash when displaying certain Telugu or Bengali letter combinations.&lt;br /&gt;
&lt;br /&gt;
CVE-2018-????? An attacker can use a timing attack to extploit[sic] a race condition in garbage collection to extract a limited number of bits from the Wikipedia article on Claude Shannon.&lt;br /&gt;
&lt;br /&gt;
CVE-2018-????? At the cafe on third street, the post-it note with the wifi password is visible from the sidewalk.&lt;br /&gt;
&lt;br /&gt;
CVE-2018-????? A remote attacker can inject arbitrary text into public-facing pages via the comments box.&lt;br /&gt;
&lt;br /&gt;
CVE-2018-????? MySQL server 5.5.45 secretly runs two parallel databases for people who say &amp;quot;S-Q-L&amp;quot; and &amp;quot;sequel.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
CVE-2018-????? A flaw in some x86 CPUs could allow a root user to de-escalate to normal account privileges.&lt;br /&gt;
&lt;br /&gt;
CVE-2018-????? Apple products catch fire when displaying emoji with diacritics.&lt;br /&gt;
&lt;br /&gt;
CVE-2018-????? An oversight in the rules allows a dog to join a basketball team.&lt;br /&gt;
&lt;br /&gt;
CUE-2018-????? Haskell isn't side-effect-free after all; the effects are all just concentrated in this one. Computer in Missouri that no one's checked on in a while.&lt;br /&gt;
&lt;br /&gt;
CVE-2018-????? Nobody really knows how hypervisors work.&lt;br /&gt;
&lt;br /&gt;
CVE-2018-????? CRITICAL: Under Linux 3.14.8 on System/390 in a UTC+14 time zone, a local user could potentially use a buffer overflow to change another user's default system clock from 12-hour to 24-hour.&lt;br /&gt;
&lt;br /&gt;
CVE-2018-????? x86 has way too many instructions.&lt;br /&gt;
&lt;br /&gt;
CVE-2018-????? NumPy 1.8.0 can factor primes in O(log n) time and must be quietly deprecated before anyone notices.&lt;br /&gt;
&lt;br /&gt;
CVE-2018-????? Apple products grant remote access if you send them words that break the &amp;quot;I before E&amp;quot; rule.&lt;br /&gt;
&lt;br /&gt;
CVE-2018-????? Skylake x86 chips can be pried from their sockets using certain flathead screwdrivers.&lt;br /&gt;
&lt;br /&gt;
CVE-2018-????? Apparently Linus Torvalds can be bribed pretty easily.&lt;br /&gt;
&lt;br /&gt;
CVE-2018-????? An attacker can execute malicious code on their own machine and no one can stop them.&lt;br /&gt;
&lt;br /&gt;
CVE-2018-????? Apple products execute any code printed over a photo of a dog with a saddle and a baby riding it.&lt;br /&gt;
&lt;br /&gt;
CVE-2018-????? Under rare circumstances, a flaw in some versions of Windows could allow Flash to be installed.&lt;br /&gt;
&lt;br /&gt;
CVE-2018-????? Turns out the cloud is just other people's computers.&lt;br /&gt;
&lt;br /&gt;
CVE-2018-????? A flaw in Mitre's CVE database allows arbitrary code insertion.&amp;lt;span style=&amp;quot;color:blue&amp;quot;&amp;gt;[~~CLICK HERE FOR CHEAP VIAGRA~~]&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{{comic discussion}}&lt;/div&gt;</summary>
		<author><name>Will</name></author>	</entry>

	<entry>
		<id>https://www.explainxkcd.com/wiki/index.php?title=1880:_Eclipse_Review&amp;diff=144467</id>
		<title>1880: Eclipse Review</title>
		<link rel="alternate" type="text/html" href="https://www.explainxkcd.com/wiki/index.php?title=1880:_Eclipse_Review&amp;diff=144467"/>
				<updated>2017-08-23T20:50:45Z</updated>
		
		<summary type="html">&lt;p&gt;Will: /* Explanation */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{comic&lt;br /&gt;
| number    = 1880&lt;br /&gt;
| date      = August 23, 2017&lt;br /&gt;
| title     = Eclipse Review&lt;br /&gt;
| image     = eclipse_review.png&lt;br /&gt;
| titletext = I watched from a beautiful nature reserve in central Missouri, and it was--without exaggeration--the coolest thing I've ever seen.&lt;br /&gt;
}}&lt;br /&gt;
&lt;br /&gt;
==Explanation==&lt;br /&gt;
{{incomplete|First draft - Additions to this would be useful, alter this tag if you alter the explanation}}&lt;br /&gt;
&lt;br /&gt;
This comic is the fifth consecutive comic with a {{w|solar eclipse}} as the topic. On {{w|Solar eclipse of August 21, 2017|August 21, 2017}}, a total solar eclipse was visible within a band across the {{w|contiguous United States}} from west to east. The other comics are [[1876: Eclipse Searches]], [[1877: Eclipse Science]], [[1878: Earth Orbital Diagram]] and [[1879: Eclipse Birds]].&lt;br /&gt;
&lt;br /&gt;
The comic is another comparison graph, like [[1775: Things You Learn]] or [[1701: Speed and Danger]]. It contrasts how cool something ''sounds'' and how cool it actually ''is''. It has five points on it, Planetary Conjunction, Supermoon, Lunar Eclipse, Partial Solar Eclipse, and Total Solar Eclipse. &lt;br /&gt;
&lt;br /&gt;
While the four other thing than total solar eclipse are relatively close to each other on the &amp;quot;how cool to see&amp;quot; scale, the graph is not even high enough to plot the total solar eclipse point as indicated by the dotted arrow showing that this point should be way higher up. This is as opposed to leaving the point out, as Randall did with the coconut in [[388: Fuck Grapefruit]], where it is only mentioned in the title text. This could be an indication that if the scale had been high enough to fit the total solar eclipse point, then the rest of the points would be on the x-axis without any indication of which would be cooler. &lt;br /&gt;
&lt;br /&gt;
The name is the coolest of the five, but by no means as much cooler as it is to see it in person. Guess Randall tries to make those who missed it this time, try to go in seven years when another total solar eclipse is visible in the USA.&lt;br /&gt;
&lt;br /&gt;
;Planetary Conjunction&lt;br /&gt;
In a {{w|Conjunction (astronomy)|planetary conjunction}} two or more planets are visible in night sky nearby. This happens relatively {{w|List_of_conjunctions_(astronomy)|often}} because all planets roughly lie in the same plane around the sun (the &amp;lt;s&amp;gt;Sagittal&amp;lt;/s&amp;gt; {{w|ecliptic}}).&lt;br /&gt;
&lt;br /&gt;
;Supermoon&lt;br /&gt;
A {{w|Supermoon|supermoon}} is a full moon or a new moon that approximately coincides with the closest distance of the Moon on in its elliptic orbit around the Earth. This results in a larger-than-usual apparent size of the lunar disk, but a typical human doesn't recognize the difference. Nevertheless in the last years the press always announces this as an important astronomical event. The opposite is  called micromoon.&lt;br /&gt;
&lt;br /&gt;
;Lunar Eclipse&lt;br /&gt;
A {{w|Lunar eclipse|lunar eclipse}} can occur at full moon and happens only, like at a solar eclipse, when the Moon is in the region where the orbital planes of the Moon and the Earth intersect. The Earth's shadow falls on the Moon and it appears in dark red because some light still reaches the Moon through the outer layers of the Earth's atmosphere. Lunar eclipses occur more often than solar eclipses and they can be viewed by much more people at the same time in the night sky. Only people on the day-side can't see it.&lt;br /&gt;
&lt;br /&gt;
;Partial Solar Eclipse&lt;br /&gt;
There are three types of {{w|Solar_eclipse#Types|partial solar eclipses}}. An ''annular eclipse'' occurs when the Sun and Moon are exactly in line with the Earth but the Moon is to far away and can not block the entire Sun. The Sun appears as a very bright ring, also called annulus. A ''partial eclipse'' occurs when the Sun and Moon are not exactly in line to the observer on Earth and thus the Sun can't be fully blocked by the Moon. A ''hybrid eclipse'' is a total and annular eclipse at the same time. At some locations on Earth it appears as a total eclipse, while at other locations it appears as annular. These ''mixed'' eclipses are comparatively rare.&lt;br /&gt;
&lt;br /&gt;
;Total Solar Eclipse&lt;br /&gt;
The {{w|Solar_eclipse#Types|total solar eclipse}} is the topic of this and the four preceding comics. It can occur at new moon and happens only when Sun and Moon are exactly in line with the Earth. But unlike to the lunar eclipse only a small part of the Earth is in the totality zone, a disc with a diameter of approx. 100 km. The disc moves very fast over the Earth's surface and at a specific location it lasts only a few minutes in maximum. At locations outside of this ''shadow-disc'', in a region over a few thousand kilometers, the eclipse is partial.&lt;br /&gt;
&lt;br /&gt;
In the title text, [[Randall]] remarks that, without any exaggeration or hyperbole, the total solar eclipse was the coolest thing he has ever seen in his life.&lt;br /&gt;
&lt;br /&gt;
==Transcript==&lt;br /&gt;
:[A scatter plot with five labeled dots is drawn. The x-axis reads &amp;quot;How cool it sounds like it would be&amp;quot; and the y-axis is labeled with &amp;quot;How cool it is to see in person&amp;quot;.]&lt;br /&gt;
:[Bottom left] &amp;lt;span style=&amp;quot;color:grey;&amp;quot;&amp;gt;Planetary conjunction&amp;lt;/span&amp;gt;&lt;br /&gt;
:[Bottom middle] &amp;lt;span style=&amp;quot;color:grey;&amp;quot;&amp;gt;Supermoon&amp;lt;/span&amp;gt;&lt;br /&gt;
:[Low left-center] &amp;lt;span style=&amp;quot;color:grey;&amp;quot;&amp;gt;Lunar eclipse&amp;lt;/span&amp;gt;&lt;br /&gt;
:[Low-center middle] &amp;lt;span style=&amp;quot;color:grey;&amp;quot;&amp;gt;Partial solar eclipse&amp;lt;/span&amp;gt;&lt;br /&gt;
:[Upper right, with a dotted arrow above it pointing up] Total solar eclipse&lt;br /&gt;
&lt;br /&gt;
{{comic discussion}}&lt;br /&gt;
&lt;br /&gt;
[[Category:Scatter plots]]&lt;br /&gt;
[[Category:Total Solar Eclipse 2017]]&lt;/div&gt;</summary>
		<author><name>Will</name></author>	</entry>

	<entry>
		<id>https://www.explainxkcd.com/wiki/index.php?title=1852:_Election_Map&amp;diff=141626</id>
		<title>1852: Election Map</title>
		<link rel="alternate" type="text/html" href="https://www.explainxkcd.com/wiki/index.php?title=1852:_Election_Map&amp;diff=141626"/>
				<updated>2017-06-21T12:56:39Z</updated>
		
		<summary type="html">&lt;p&gt;Will: /* Explanation */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{comic&lt;br /&gt;
| number    = 1852&lt;br /&gt;
| date      = June 19, 2017&lt;br /&gt;
| title     = Election Map&lt;br /&gt;
| image     = election_map.png&lt;br /&gt;
| titletext = Luckily for my interpretation, no precincts were won by the Green Party.&lt;br /&gt;
}}&lt;br /&gt;
&lt;br /&gt;
==Explanation==&lt;br /&gt;
{{incomplete|Should include how (if at all) this comic predicted the 2017 vote one day after it was released.}}&lt;br /&gt;
A wave (e.g. an electromagnetic wave, like light) changes its frequency and wavelength when its source is moving relative to the observer, due to the {{w|Doppler effect}}. In the case of light, increased frequency &amp;amp;mdash; indicating movement towards the observer &amp;amp;mdash; is called {{w|blueshift}}, while reduced frequency &amp;amp;mdash; indicating movement away from the observer &amp;amp;mdash; is called {{w|redshift}}. These names apply even if the effect is outside of the visible spectrum (e.g. infrared light that has reduced frequency is called redshifted, even though its frequency is further away from that of visible red light than normally). Red and blue colors are used accordingly to indicate the effect.&lt;br /&gt;
&lt;br /&gt;
The recent advent of the {{w|integral field spectrograph}} allowed astronomers to produce [http://iopscience.iop.org/0067-0049/199/1/1/downloadHRFigure/figure/apjs412917f14 images] illustrating how different parts of a galaxy move along our sightline, images that look not very different from the map Cueball shows. If one side of the image is higher redshifted while the other side is less or even blueshifted, the usual interpretation is that the galaxy is rotating with an axis of rotation not completely parallel to our sightline, but other interpretations are also possible. Nevertheless no redshifted object appears in red to the human eye, it's still white. But the {{w|Spectral line|spectral lines}} are shifted. This means all colors used in those scientific images are not real.&lt;br /&gt;
&lt;br /&gt;
The map [[Cueball]] shows represents election results. Red regions mark where one of the parties won, while blue regions indicate some other party (as Randall lives in the United States the parties are probably {{w|Democratic party (United States)|Democratic}} (blue) and {{w|Republican party (United States)|Republican}} (red), although it's not explicitly stated in the comic). Cueball analyzes the map as if it showed magnitude of Doppler effect by the light emitted by the region. This, however, is not what the viewers expect to hear during the election night from election analysis. That's why Cueball was fired from the job rather quickly, as the caption states.&lt;br /&gt;
&lt;br /&gt;
The title text states that the {{w|Green Party of the United States|Green Party}} did not win any {{w|Precinct#Elections|precincts}}. If the Green Party won, its regions would likely be colored green, which would not fit to Cueball's Doppler effect analysis. Sometimes, however, green is used to indicate lack of movement. And since the center of rotating object isn't moving, green-colored spaces could actually be interpreted according to Doppler analysis - but only if they appeared near the center of the district.&lt;br /&gt;
&lt;br /&gt;
The map appears to depict {{w|Georgia's 6th congressional district}}, which was set for a {{w|Georgia's 6th congressional district special election, 2017|runoff election}} on June 20, 2017, the day after the comic ran. The comic appears to be broadly&amp;lt;sup&amp;gt;&amp;amp;#91;{{w|vagueness|''vague''}}&amp;amp;#93;&amp;lt;/sup&amp;gt; similar to the final result[https://www.nytimes.com/elections/results/georgia-congressional-runoff-ossoff-handel], although is not entirely different from the result of the single-ballot of April 18, 2017.[http://politics.blog.ajc.com/2017/04/23/from-red-to-purple-what-ossoffs-path-through-the-6th-district-means/img_7178/#main]&lt;br /&gt;
&lt;br /&gt;
==Transcript==&lt;br /&gt;
:[On a TV-screen Cueball is seen pointing at a map on the left which is colored in red and blue. There is a header on the map and in the top right corner of the screen the title of the program is shown. Below this at the bottom of the screen text indicate that the program is broad live. Cueball explains the map, with his text shown above the TV.]&lt;br /&gt;
:Header: Results&lt;br /&gt;
:Title: ''Election'' Night&lt;br /&gt;
:Live&lt;br /&gt;
&lt;br /&gt;
:Cueball: These northern precincts appear red, which probably means they're moving away from us, whereas these bluer regions are approaching us. I believe the district may be rotating in space.&lt;br /&gt;
&lt;br /&gt;
:[Caption below the panel:]  &lt;br /&gt;
:My career as an election analyst was short-lived.&lt;br /&gt;
&lt;br /&gt;
==Trivia==&lt;br /&gt;
*Cueball was fired from his job a number of times before. Many are listed in [[1428: Move Fast and Break Things]].&lt;br /&gt;
&lt;br /&gt;
{{comic discussion}}&lt;br /&gt;
&lt;br /&gt;
[[Category:Comics with color]]&lt;br /&gt;
[[Category:Comics featuring Cueball]]&lt;br /&gt;
[[Category:Maps]]&lt;br /&gt;
[[Category:Politics]]&lt;br /&gt;
[[Category:Astronomy]]&lt;/div&gt;</summary>
		<author><name>Will</name></author>	</entry>

	<entry>
		<id>https://www.explainxkcd.com/wiki/index.php?title=1852:_Election_Map&amp;diff=141620</id>
		<title>1852: Election Map</title>
		<link rel="alternate" type="text/html" href="https://www.explainxkcd.com/wiki/index.php?title=1852:_Election_Map&amp;diff=141620"/>
				<updated>2017-06-21T12:32:52Z</updated>
		
		<summary type="html">&lt;p&gt;Will: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{comic&lt;br /&gt;
| number    = 1852&lt;br /&gt;
| date      = June 19, 2017&lt;br /&gt;
| title     = Election Map&lt;br /&gt;
| image     = election_map.png&lt;br /&gt;
| titletext = Luckily for my interpretation, no precincts were won by the Green Party.&lt;br /&gt;
}}&lt;br /&gt;
&lt;br /&gt;
==Explanation==&lt;br /&gt;
{{incomplete|Should include how (if at all) this comic predicted the 2017 vote one day after it was released.}}&lt;br /&gt;
A wave (e.g. an electromagnetic wave, like light) changes its frequency and wavelength when its source is moving relative to the observer, due to the {{w|Doppler effect}}. In the case of light, increased frequency &amp;amp;mdash; indicating movement towards the observer &amp;amp;mdash; is called {{w|blueshift}}, while reduced frequency &amp;amp;mdash; indicating movement away from the observer &amp;amp;mdash; is called {{w|redshift}}. These names apply even if the effect is outside of the visible spectrum (e.g. infrared light that has reduced frequency is called redshifted, even though its frequency is further away from that of visible red light than normally). Red and blue colors are used accordingly to indicate the effect.&lt;br /&gt;
&lt;br /&gt;
The recent advent of the {{w|integral field spectrograph}} allowed astronomers to produce [http://iopscience.iop.org/0067-0049/199/1/1/downloadHRFigure/figure/apjs412917f14 images] illustrating how different parts of a galaxy move along our sightline, images that look not very different from the map Cueball shows. If one side of the image is higher redshifted while the other side is less or even blueshifted, the usual interpretation is that the galaxy is rotating with an axis of rotation not completely parallel to our sightline, but other interpretations are also possible. Nevertheless no redshifted object appears in red to the human eye, it's still white. But the {{w|Spectral line|spectral lines}} are shifted. This means all colors used in those scientific images are not real.&lt;br /&gt;
&lt;br /&gt;
The map [[Cueball]] shows represents election results. Red regions mark where one of the parties won, while blue regions indicate some other party (as Randall lives in the United States the parties are probably {{w|Democratic party (United States)|Democratic}} (blue) and {{w|Republican party (United States)|Republican}} (red), although it's not explicitly stated in the comic). Cueball analyzes the map as if it showed magnitude of Doppler effect by the light emitted by the region. This, however, is not what the viewers expect to hear during the election night from election analysis. That's why Cueball was fired from the job rather quickly, as the caption states.&lt;br /&gt;
&lt;br /&gt;
The title text states that the {{w|Green Party of the United States|Green Party}} did not win any {{w|Precinct#Elections|precincts}}. If the Green Party won, its regions would likely be colored green, which would not fit to Cueball's Doppler effect analysis. Sometimes, however, green is used to indicate lack of movement. And since the center of rotating object isn't moving, green-colored spaces could actually be interpreted according to Doppler analysis - but only if they appeared near the center of the district.&lt;br /&gt;
&lt;br /&gt;
The map appears to depict {{w|Georgia's 6th congressional district}}, which was set for a {{w|Georgia's 6th congressional district special election, 2017|runoff election}} on June 20, 2017, the day after the comic ran. The comic appears to be broadly similar to the final result[https://www.nytimes.com/elections/results/georgia-congressional-runoff-ossoff-handel], although is not entirely different from the result of the single-ballot of April 18, 2017.[http://politics.blog.ajc.com/2017/04/23/from-red-to-purple-what-ossoffs-path-through-the-6th-district-means/img_7178/#main]&lt;br /&gt;
&lt;br /&gt;
==Transcript==&lt;br /&gt;
:[On a TV-screen Cueball is seen pointing at a map on the left which is colored in red and blue. There is a header on the map and in the top right corner of the screen the title of the program is shown. Below this at the bottom of the screen text indicate that the program is broad live. Cueball explains the map, with his text shown above the TV.]&lt;br /&gt;
:Header: Results&lt;br /&gt;
:Title: ''Election'' Night&lt;br /&gt;
:Live&lt;br /&gt;
&lt;br /&gt;
:Cueball: These northern precincts appear red, which probably means they're moving away from us, whereas these bluer regions are approaching us. I believe the district may be rotating in space.&lt;br /&gt;
&lt;br /&gt;
:[Caption below the panel:]  &lt;br /&gt;
:My career as an election analyst was short-lived.&lt;br /&gt;
&lt;br /&gt;
==Trivia==&lt;br /&gt;
*Cueball was fired from his job a number of times before. Many are listed in [[1428: Move Fast and Break Things]].&lt;br /&gt;
&lt;br /&gt;
{{comic discussion}}&lt;br /&gt;
&lt;br /&gt;
[[Category:Comics with color]]&lt;br /&gt;
[[Category:Comics featuring Cueball]]&lt;br /&gt;
[[Category:Maps]]&lt;br /&gt;
[[Category:Politics]]&lt;br /&gt;
[[Category:Astronomy]]&lt;/div&gt;</summary>
		<author><name>Will</name></author>	</entry>

	<entry>
		<id>https://www.explainxkcd.com/wiki/index.php?title=1824:_Identification_Chart&amp;diff=140284</id>
		<title>1824: Identification Chart</title>
		<link rel="alternate" type="text/html" href="https://www.explainxkcd.com/wiki/index.php?title=1824:_Identification_Chart&amp;diff=140284"/>
				<updated>2017-05-26T10:01:40Z</updated>
		
		<summary type="html">&lt;p&gt;Will: Citation needed&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{comic&lt;br /&gt;
| number    = 1824&lt;br /&gt;
| date      = April 14, 2017&lt;br /&gt;
| title     = Identification Chart&lt;br /&gt;
| image     = identification_chart.png&lt;br /&gt;
| titletext = Be careful-it's breeding season, and some of these can be *extremely* defensive of their nests.&lt;br /&gt;
}}&lt;br /&gt;
&lt;br /&gt;
==Explanation==&lt;br /&gt;
Some aircraft are named after creatures of flight, including {{w|bird of prey|birds of prey}}, other birds, and insects. This comic spoofs an &amp;quot;identification guide&amp;quot; of bird silhouettes, each with the {{w|fuselage}} of an aircraft and the wings of the flying animal from which the aircraft gets its name. All are birds with the exception of the {{w|hornet|hornet}} which is an insect, see the [[#Table|table]] below for individual explanations. &lt;br /&gt;
&lt;br /&gt;
This idea of having feathers wings on a plane is absurd, as bird wings (for birds that can fly) are made to support the lightweight structure of a bird. Supporting the metal parts of a plane along with its human pilot would be impossible.{{Citation needed}}&lt;br /&gt;
&lt;br /&gt;
General military training often includes aircraft identification. {{w|Aircraft_recognition|Silhouette charts}} are given to ground observers for memorization and reference so that friend or foe can be determined in the field. Conversely,  many bird watching books will carry pictures of avian silhouettes from below,  as often key details like tail and wing shape are the easiest way to determine what a species a high soaring bird is, especially birds of prey. (Two comics later [[Cueball]] is out birdwatching with his friend in [[1826: Birdwatching]] and could need such a chart, if he could spot any birds that is.)&lt;br /&gt;
&lt;br /&gt;
The pseudo-confusion between birds and planes here could be a reference to the quote &amp;quot;It's a bird! It's a plane! It's Superman&amp;quot; quote often used in, naturally, {{w|Superman}}-related entertainment. A similar joke was used in [[1792: Bird/Plane/Superman]].&lt;br /&gt;
&lt;br /&gt;
The comic highlights not only the various designs of aircraft tails, but also bird wings. Some wings are highly adapted for soaring (eagle), speed (falcon), as well as rapid acceleration and short flights (blackbird).&lt;br /&gt;
&lt;br /&gt;
The title text is juxtaposing military air bases with breeding nests of the animals, both of which might earn a hostile response to approach at the wrong time, but in wildly different measure. Encroaching on breeding territory of some of the birds being referenced may result in getting dived at or chased, so the comparison invites the reader to imagine what might happen if the analogous creatures in the comic were defending their nest with aircraft ordnance. This could also be a reference to the increasing hostility between US and Russia, as well as the generally more strained relationship US now has with many countries after the election of {{w|Donald Trump}} for president half a year before this comic was released. This is also the second comic to refer to the military in less than two months, the first being [[1803: Location Reviews]] reviewing a Nuclear Launch Facility. [[Randall]] has seemed very worried in his comics since the election, see more regarding this [[I'm_With_Her#Sad_comics|here]].&lt;br /&gt;
&lt;br /&gt;
The idea of a bird with plane engines was first used in [[1729: Migrating Geese]], which also shows birds in silhouette. The third last bird in the right arm of the V-formation has twin engines.&lt;br /&gt;
&lt;br /&gt;
===Table===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
!Animal&lt;br /&gt;
! style=&amp;quot;width: 8em&amp;quot; | Plane&lt;br /&gt;
!Description&lt;br /&gt;
|-&lt;br /&gt;
|{{w|Osprey|Osprey}}&lt;br /&gt;
|{{w|Bell_Boeing_V-22_Osprey|V-22 Osprey}}&lt;br /&gt;
|The osprey (Pandion haliaetus) is a raptor with distinctive white and brown coloring. It's also sometimes referred to as a sea hawk or fish eagle due to its virtually all fish diet.&lt;br /&gt;
The V-22 Osprey is a tilt-rotor aircraft that has been in development since the 1980s, and was introduced to the U.S. Armed Forces in 2007. It's a troop carrier aircraft that combines the vertical take-off ability of a helicopter with the high cruising speed of an airplane. (''{{w|Bell Helicopter}}'' and {{w|Boeing Rotorcraft Systems|''Boeing''}})&amp;lt;!--Is this a style violation to pipe Boeing Rotorcraft as plain &amp;quot;Boeing&amp;quot;?--&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
|{{w|Hornet|Hornet}}&lt;br /&gt;
|{{w|McDonnell_Douglas_F/A-18_Hornet|F/A-18 Hornet}}&lt;br /&gt;
|Hornets are a type of wasp of the genera vespa or provespa. They're known to be highly territorial and aggressive.&lt;br /&gt;
The F-18 Hornet is a fighter developed for the Navy in the 1970s. It's been deployed by air forces around the world in both air-to-air and air-to-ground roles, and is flown by the US Navy demonstration team, the Blue Angels. The airplane is still being produced in an updated and larger version, the {{w|F/A-18E/F Super Hornet}}. (''{{w|McDonnell Douglas}}'')&lt;br /&gt;
|-&lt;br /&gt;
|{{w|Falcon|Falcon}}&lt;br /&gt;
|{{w|General_Dynamics_F-16_Fighting_Falcon|F-16 Falcon}}&lt;br /&gt;
|A falcon is a bird of prey known for its tapered wings that allow for high speed flight and high maneuverability.&lt;br /&gt;
The F-16 Falcon is a light single-engine fighter. It's flown by the USAF demonstration team, the Thunderbirds. (''{{w|General Dynamics}}'')&lt;br /&gt;
|-&lt;br /&gt;
|{{w|Harrier (bird)|Harrier}}&lt;br /&gt;
|{{w|Harrier_Jump_Jet|AV-8B Harrier}}&lt;br /&gt;
|A harrier is a hawk that hunts by flying low over open ground.&lt;br /&gt;
The first operational {{w|STOL}}/{{w|VTOL}} fighter. They are known for their use in the {{w|Falklands War}} (1982), where they operated from converted cargo ships as well as aircraft carriers. (''{{w|Hawker Siddeley}}'')&lt;br /&gt;
|-&lt;br /&gt;
|{{w|Eagle|Eagle}}&lt;br /&gt;
|{{w|McDonnell_Douglas_F-15_Eagle|F-15 Eagle}}&lt;br /&gt;
|Eagle is a common name for many large birds of prey of the family Accipitridae.&lt;br /&gt;
Introduced in 1976, other jets like F-16 have filled its role. The U.S. Air National Guard is the largest operator as of now. (''{{w|McDonnell Douglas}}'')&lt;br /&gt;
|-&lt;br /&gt;
|{{w|Kestrel|Kestrel}}&lt;br /&gt;
|{{w|Kestrel_K-350|Kestrel K-350}}&lt;br /&gt;
|A bird of prey that can hover before swooping in on its prey.&lt;br /&gt;
The Kestrel is a single-engine, proof-of-concept aircraft, similar to the {{w|Pilatus PC-12}}. (''{{w|Kestrel Aircraft}}'')&lt;br /&gt;
|-&lt;br /&gt;
|{{w|Hawk|Hawk}}&lt;br /&gt;
|{{w|BAE_Systems_Hawk|Hawk T1}}&lt;br /&gt;
|A hawk is a large bird of prey with a heavy head and beak. They have very acute vision.&lt;br /&gt;
A trainer aircraft. It is flown by the Royal Air Force display team, the ''{{w|Red Arrows}}''. {{w|T-45 Goshawk}} is the U.S. designation of a variant of this aircraft. The fuselage silhouette is of a BAe Hawk, although other aircraft have also had Hawk-related names, for example the Hawker [https://en.wikipedia.org/wiki/Hawker_Sea_Hawk Sea Hawk] and the Douglas [https://en.wikipedia.org/wiki/Douglas_A-4_Skyhawk A-4 Skyhawk]. (''{{w|BAE Systems}}'')&lt;br /&gt;
|-&lt;br /&gt;
|{{w|Common blackbird|Blackbird}}&lt;br /&gt;
|{{w|Lockheed_SR-71_Blackbird|SR-71 Blackbird}}&lt;br /&gt;
|There are many birds that goes under the {{w|Blackbird#Birds|name blackbird}} but the common blackbird is a species of {{w|true thrush}}.&lt;br /&gt;
A Mach 3+ spy aircraft, known for its speed and engine design (which allowed them to work both as turbines and ramjets). (''{{w|Lockheed Martin}}'')&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
==Transcript==&lt;br /&gt;
:[A silhouette identification guide chart shows eight silhouettes in two rows. The silhouettes are a combination of the fuselage of an aircraft and the wings of birds, or in the second case an insect. Below each silhouette is a label:]&lt;br /&gt;
:Osprey  Hornet  Falcon  Harrier&lt;br /&gt;
:Eagle  Kestrel  Hawk  Blackbird&lt;br /&gt;
&lt;br /&gt;
{{comic discussion}}&lt;br /&gt;
&lt;br /&gt;
[[Category:Charts]]&lt;br /&gt;
[[Category:Animals]]&lt;/div&gt;</summary>
		<author><name>Will</name></author>	</entry>

	<entry>
		<id>https://www.explainxkcd.com/wiki/index.php?title=469:_Improvised&amp;diff=110235</id>
		<title>469: Improvised</title>
		<link rel="alternate" type="text/html" href="https://www.explainxkcd.com/wiki/index.php?title=469:_Improvised&amp;diff=110235"/>
				<updated>2016-01-29T13:12:44Z</updated>
		
		<summary type="html">&lt;p&gt;Will: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{comic&lt;br /&gt;
| number    = 469&lt;br /&gt;
| date      = August 29, 2008&lt;br /&gt;
| title     = Improvised&lt;br /&gt;
| image     = improvised.png&lt;br /&gt;
| titletext = Oh, your brother is Luke. Sorry, should've mentioned that first.&lt;br /&gt;
}}&lt;br /&gt;
&lt;br /&gt;
==Explanation==&lt;br /&gt;
In the second of the original {{w|Star Wars}} film {{w|The Empire Strikes Back|Star Wars Episode V: The Empire Strikes Back}}&amp;quot;, just before {{w|Han Solo}}, portrayed by {{w|Harrison Ford}}, is frozen in carbonite, the following conversation occurs:&lt;br /&gt;
:Leia: I love you.&lt;br /&gt;
:Han: I know.&lt;br /&gt;
&lt;br /&gt;
The original script had Han Solo respond with &amp;quot;I love you, too&amp;quot;, but Harrison Ford felt that the character would not give such a cliched response, even in the face of likely death and ad-libbed the &amp;quot;I know&amp;quot; line that was actually used in the finished film. The ad-libbed line is generally thought to be better than the original would have been.&lt;br /&gt;
&lt;br /&gt;
The comic presents several alternative ad-libs that Ford could have made in that conversation as well as at various points throughout the trilogy. So in this situation it is the actor Ford and not Han Solo that speaks the lines. &lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
! Row&lt;br /&gt;
! Col&lt;br /&gt;
! Ad-Lib&lt;br /&gt;
! Further Detail&lt;br /&gt;
|-&lt;br /&gt;
| 1&lt;br /&gt;
| 1&lt;br /&gt;
| '''Well, duh.'''&lt;br /&gt;
| Here, Han ruins the mood [a dramatic confession] with a flippant statement.&lt;br /&gt;
|-&lt;br /&gt;
| 1&lt;br /&gt;
| 2&lt;br /&gt;
| '''Seriously? ...Christ.'''&lt;br /&gt;
| Another example of an out-of-tone ad-lib. The original line is &amp;quot;never tell me the odds&amp;quot;, a nod to Solo's daredevil persona. In this ad-lib, however, he is hesitant to try anything dangerous.&lt;br /&gt;
|-&lt;br /&gt;
| 1&lt;br /&gt;
| 3&lt;br /&gt;
| '''Oh! Hey, that explains the kissing earlier.'''&lt;br /&gt;
| Another absurd, out-of-character answer to a serious remark, this time with Solo acting romantically oblivious [rather than forward, as he is usually].&lt;br /&gt;
|-&lt;br /&gt;
| 2&lt;br /&gt;
| 1&lt;br /&gt;
| '''I'm nailing your brother.'''&lt;br /&gt;
| So far Leia doesn't know she has a brother. Also, since ''to nail'' means to penetrate, she may be surprised to learn that Han is currently engaged in a same-sex relationship (or at least an ongoing arrangement). This panel is referenced in the title text.&lt;br /&gt;
|-&lt;br /&gt;
| 2&lt;br /&gt;
| 2&lt;br /&gt;
| '''Hokey religions and ancient weapons are no match for scissors, though they do beat paper and rock.'''&lt;br /&gt;
| The original line is &amp;quot;Hokey religions and ancient weapons are no match for a good blaster at your side, kid&amp;quot;, a reference to Luke's force training and lightsaber use. In this ad-lib, Han turns a discussion about weapons into a [unusually formal] discussion about the game {{w|Rock-paper-scissors}}.&lt;br /&gt;
|-&lt;br /&gt;
| 2&lt;br /&gt;
| 3&lt;br /&gt;
| '''Cool. Listen, this thing is really, REALLY cold.'''&lt;br /&gt;
| Han is in a freezing chamber in this scene. This remark indicates that he is not very interested in Leia's feeling at this moment since he is so cold.&lt;br /&gt;
|-&lt;br /&gt;
| 3&lt;br /&gt;
| 1&lt;br /&gt;
| '''Wowzers'''&lt;br /&gt;
| ''Wowzers'' is an expression used by {{w|Inspector Gadget}}; another amusingly out-of-character ad-lib.&lt;br /&gt;
|-&lt;br /&gt;
| 3&lt;br /&gt;
| 2&lt;br /&gt;
| '''Barely. They're pretty drunk.'''&lt;br /&gt;
| The original response here is &amp;quot;Uh, my team's ready. I don't have a command crew for the shuttle.&amp;quot; In this ad-lib, Han responds to a serious situation [preparations for an important mission to bring down the Galactic Empire] with an unserious response and an admission that he's allowing his crew to drink while on duty.&lt;br /&gt;
|-&lt;br /&gt;
| 3&lt;br /&gt;
| 3&lt;br /&gt;
| '''Man, me too but Chewie never seems interested. Maybe I should grow my hair out.'''&lt;br /&gt;
| The original response was &amp;quot;I can arrange that!  You could ''use'' a good kiss!&amp;quot;  In the original film, Leia's remark &amp;quot;I'd just as soon kiss a wookiee&amp;quot; is meant as an insult to Han, implying that he's no more attractive than a great hairy monster. In this ad-lib, though, Han takes her statement literally, and suggests that he is also interested in kissing a wookiee. Chewbacca is Han's wookiee copilot and fellow smuggler. Han's suggestion that he's interested in kissing Chewbacca is unexpected on many levels: firstly, Han's shown interest in Leia, secondly, Chewbacca is an entirely different species, and thirdly, Chewbacca is also male, and Han Solo is presumed by Leia to be straight.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
Note: although it's spelled &amp;quot;wookie&amp;quot; in the comic, the canonical spelling of Chewbacca's species is &amp;quot;{{w|Wookiee}}&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
The title text continues the ad lib in panel four. It refers to the plot twist that {{w|Luke Skywalker}} is princess {{w|Princess Leia|Leia's}} brother, which would not be revealed until the next film in the series. How Harrison Ford knows this twist at this point in the story is unknown.&lt;br /&gt;
&lt;br /&gt;
==Transcript==&lt;br /&gt;
:[Caption above the panels:]&lt;br /&gt;
:Harrison Ford famously improvised his &amp;quot;I know&amp;quot; line in E.S.B. Here are a few of his less-successful ad-libs:&lt;br /&gt;
&lt;br /&gt;
:[Harrison Ford as Han Solo (in all the panels) stands in front of Princess Leia on the Cloud City Carbon Freezing Chamber.]&lt;br /&gt;
:Leia: I love you.&lt;br /&gt;
:Han: Well, duh.&lt;br /&gt;
&lt;br /&gt;
:[Han Solo in the cockpit of the Millennium Falcon.]&lt;br /&gt;
:C-3P0: Sir, the possibility of successfully navigating an asteroid field is approximately 3720 to 1!&lt;br /&gt;
:Han: Seriously? ...Christ.&lt;br /&gt;
&lt;br /&gt;
:[Han Solo stands in front of Princess Leia on the Cloud City Carbon Freezing Chamber.]&lt;br /&gt;
:Leia: I love you.&lt;br /&gt;
:Han: Oh! Hey, that explains the kissing earlier.&lt;br /&gt;
&lt;br /&gt;
:[Han Solo stands in front of Princess Leia on the Cloud City Carbon Freezing Chamber.]&lt;br /&gt;
:Leia: I love you.&lt;br /&gt;
:Han: I'm nailing your brother.&lt;br /&gt;
&lt;br /&gt;
:[Han Solo standing in front of Luke Skywalker, who is holding a blast shield helmet and a lightsaber. The training droid hovers between them.]&lt;br /&gt;
&lt;br /&gt;
:Han: Hokey religions and ancient weapons are no match for scissors, though they do beat paper and rock.&lt;br /&gt;
&lt;br /&gt;
:[Han Solo stands in front of Princess Leia on the Cloud City Carbon Freezing Chamber.]&lt;br /&gt;
:Leia: I love you.&lt;br /&gt;
:Han: Cool. Listen, this thing is really, &amp;lt;u&amp;gt;really&amp;lt;/u&amp;gt; cold.&lt;br /&gt;
&lt;br /&gt;
:[Han Solo stands in front of Princess Leia on the Cloud City Carbon Freezing Chamber.]&lt;br /&gt;
:Leia: I love you.&lt;br /&gt;
:Han: Wowzers.&lt;br /&gt;
&lt;br /&gt;
:[Han Solo sits with two others. General Madine approaches.]&lt;br /&gt;
:Madine: General Solo, is your strike team assembled?&lt;br /&gt;
:Han: Barely. They're pretty drunk.&lt;br /&gt;
&lt;br /&gt;
:[Han Solo and Princess Leia stand in an Ice Tunnel of Hoth.]&lt;br /&gt;
:Leia: I'd just as soon kiss a wookie.&lt;br /&gt;
:Han: Man, me too but Chewie never seems interested. Maybe I should grow my hair out.&lt;br /&gt;
&lt;br /&gt;
{{comic discussion}}&lt;br /&gt;
[[Category:Comics featuring real people]]&lt;br /&gt;
[[Category:Comics featuring Cueball]]&lt;br /&gt;
[[Category:Multiple Cueballs]]&lt;br /&gt;
[[Category:Star Wars]]&lt;br /&gt;
[[Category:Sex]]&lt;br /&gt;
[[Category:Romance]]&lt;/div&gt;</summary>
		<author><name>Will</name></author>	</entry>

	</feed>