Avatar

@yureiyume

Welp.
Avatar
Avatar
onisuright

My fan comics on the winter fandom battle (๑˘︶˘๑) Alternative 6x05!!!

But…is this the end of their stories? Not!

Avatar

i’m simple….this is my fav character dynamic

alternatively 

Both great, but may I add another variation

but have y’all considered-

Avatar

The Sheith page is the longest page on the entire Shipping Wiki.

Avatar
reblogged

Do You Realize

“Do you realize that you have the most beautiful face?

Do you realize we’re floating in space?

Do you realize that happiness makes you cry?

Do you realize that everyone you know someday will die?”

- “Do You Realize” by Ursine Vulpine

Sooo… It’s been like… What? A year? And I’m still not over this episode. Well damn. I really like to think of all the possible outcomes this episode might have had, whenever I like to feel sad xD

Avatar
reblogged
Anonymous asked:

its obvious you trace your poses anyone who’s been drawing for any lengthy amount of time can spot it in a heartbeat

I use a lot of references from pictures in the net and I’ve mentioned it several times. Sometimes I simply like a particular pose so much and I don’t want to change it, so I just adapt it to the proportions in my style. I’m not the first artist who does that and certainly I won’t be the last.

Avatar
Avatar
kriscynical

I’m sorry to barge in on your post here, Len, but this pisses me off because that anon has no fucking idea what they’re talking about and it’s very, very obvious. They’re just wanting to hate on you behind a pair of sunglasses because they don’t have enough conviction behind what they’re saying to actually put their name on it.

Such bravery, anon! You are an admirable cookie.

The fluidity in Len’s work alone should tell you that she isn’t tracing shit. When an artist depends on tracing for their posing their work always comes out looking stilted and stiff, and Len’s work looks nothing like that. 

And I have been drawing for a “lengthy amount of time”. I started drawing when I was three but seriously started studying it on my own when I was 12. I’m 34 now. That’s 22 years that I’ve been drawing seriously, and four years of that was in art school to earn a degree in illustration. And do you know what one of the primary things was that they taught us how to do in art school?

Use references.

For the first full year of Illustration classes we had to turn in process binders with every assignment, and a section of that binder was our reference sheets of all the things we used for reference within our piece. Objects, poses, clothing, fabric patterns, everything. We had specific assignments solely for the purpose of teaching us how to find and properly use reference. It’s a critical tool.

Referencing a pose is different than tracing it, just as eyeball copying something when you’re 14 is different than tracing it. One takes effort and develops an artist’s skills, the other turns into a crutch. I use reference for things in my own work all the time; I have a phone tripod mounted to the side of a shelving unit in my studio and use it to shoot photos of myself in different poses with whatever props I need all the time (I have a whole collection of random objects for this purpose!), and then I use that photo in my work. That’s a perfectly legitimate practice and damn near every professional artist out there does it. Norman Rockwell did it all the time by setting up models in the exact scene he wanted to illustrate and shooting photos of those models.

You can also reference poses or even trace your own reference pictures (meaning reference that you shot for yourself so you own the image) all you want but if you don’t understand what’s going on underneath the skin, that will show in the art. Len has obviously done a good amount of independent study into anatomy and muscle structure, and it’s obvious in the same way it’s obvious that she doesn’t directly trace reference poses. One of the first things I ever said to her was a compliment on her subtle anatomy knowledge, because the subtle stuff is a lot harder to get right than the major stuff.

And that’s my long winded way of saying “shut up and go hide behind your sunglasses elsewhere”.

Thank you so much for this, Kris. There’s noting much else I can add aside what it’s said in all the posts related to this thread. Even if an artist starts a piece copying or tracing a particular pose from a picture, there’s also process to adapt it to it’s own style/proportions. That’s what is called art process.

Avatar
ashyumhab

@lenbarboza Let me share you something i learnt from my art teacher and he’s an artist for Disney! He shared to me a quote by film director Jim Jarmusch and I honestly follow this to a point. Believe me it has helped me in so many ways and it doesn’t sound wrong:

“Nothing is original. Steal from anywhere that resonates with inspiration or fuels your imagination. Devour old films, new films, music, books, paintings, photographs, poems, dreams, random conversations, architecture, bridges, street signs, trees, clouds, bodies of water, light and shadows. Select only things to steal from that speak directly to your soul. If you do this, your work (and theft) will be authentic. Authenticity is invaluable; originality is non-existent. And don’t bother concealing your thievery - celebrate it if you feel like it. In any case, always remember what Jean-Luc Godard said: “It’s not where you take things from - it’s where you take them to.“

@ashyumhab That’s one of the most awesome statements I’ve read about this topic. And so true.

Thank you so much for sharing it!

Avatar
reblogged
Avatar
beachdeath

#1 rule of freelancing is that you have to be dead fuckin serious about getting paid. do not assume everything is going fine and they will pay you eventually. follow up as many times as you have to until the money is in your bank account. if you catch yourself thinking, “oh, i don’t want to bother them…” kill that thought and b o t h e r them. send uber-polite, grandma-is-watching e-mails along the lines of, “Hi! Hope this note finds you well. Just wanted to check in re: the status of my payment. Do you know when the funds will be available?” every few days until you get your money. 

also if you’re freelancing for a client based in new york city they’re legally required to pay you within thirty days of receiving your invoice so put a note on your invoice that says, “Per the Freelance Isn’t Free Act, payment is due within thirty days of completion.” if they go over that deadline or they just don’t pay you at all, you can file a complaint with the city’s department of consumer affairs and have your lost wages recovered. go w/ christ brah. 

Avatar

Confession:

I often check to make sure my partner is still breathing/still alive when we're in bed. I'm so afraid of losing him or finding him dead next to me that I have to check every time I can't hear him breathing or see him moving.

Avatar
reblogged

TL;DR on the latest round of Wikileaks:

Literally nothing you do is safe from the CIA. There are numerous full-on spyware suites developed by them, mostly for iOS and Windows, but also targeting Android, Linux, OS X, and Solaris. Apps thought to be secure (Telegram with encryption enabled, WhatsApp, Signal) were compromised as well, as were a host of other devices (ie smart TVs).

THIS DOES NOT PERTAIN ONLY TO AMERICANS.

If you live in a Shengen area country, your country likely hosts several CIA backed cyberwar experts. They came in via the US consulate in Frankfurt. If you don’t, you likely do as well, but I can’t find anything without sifting through the files myself.

“I have nothing to hide, why does this matter?”: Because there are now multiple thousand “zero hour”- ie “developers get zero hours to fix”- vulnerabilities floating around that no one had any idea existed. The vulnerabilities themselves weren’t leaked, but it’s the fact that someone knew about these and didn’t say.

I hate to make this kinda clickbait-y thing, but this is honest to God one of the most important leaks in history. Our response to this is pretty much going to be life or death for privacy in the developed world. Be loud about this, be annoying about this, and do not shut up about this. Please reblog this and other posts relating to it.

Not just any someone, this is one of the U.S. federal government’s foremost intelligence agencies, the CIA, which even mainstream media has reported operates on a black (off the record) budget, infamous for handing over “full” reports that are almost entirely redacted.

It’s a wonder that anyone out there could believe they are not the subject of surveillance—everyone has something to hide.

  • The USA can access personal email, chat, and web browsing history. (Source)
  • The USA tracks the numbers of both parties on phone calls, their locations, as well as time and duration of the call. (Source)
  • The USA can monitor text messages. (Source)
  • The USA can monitor the data in smartphone applications. (Source)
  • The USA can crack cellphone encryption codes. (Source)
  • The USA can identify individuals’ friends, companions, and social networks. (Source)
  • The USA monitors financial transactions. (Source)
  • The USA monitors credit card purchases. (Source)
  • The USA intercepts troves of personal webcam video from innocent people. (Source)
  • The USA is working to crack all types of sophisticated computer encryption. (Source)
  • The USA monitors communications between online gamers. (Source)
  • The USA can set up fake Internet cafes to spy on unsuspecting users. (Source)
  • The USA can remotely access computers by setting up a fake wireless connection. (Source)
  • The USA can use radio waves to hack computers that aren’t connected to the internet. (Source)
  • The USA can set up fake social networking profiles on LinkedIn for spying purposes. (Source)
  • The USA undermines secure networks [Tor] by diverting users to non-secure channels. (Source)
  • The USA can intercept phone calls by setting up fake mobile telephony base stations. (Source)
  • The USA can install a fake SIM card in a cell phone to secretly control it. (Source)
  • The USA can physically intercept packages, open them, and alter electronic devices. (Source)
  • The USA makes a USB thumb drive that provides a wireless backdoor into the host computer. (Source)
  • The USA can set up stations on rooftops to monitor local cell phone communications. (Source)
  • The USA spies on text messages in China and can hack Chinese cell phones. (Source)
  • The USA spies on foreign leaders’ cell phones. (Source)
  • The USA intercepts meeting notes from foreign dignitaries. (Source)
  • The USA has hacked into the United Nations’ video conferencing system. (Source)
  • The USA can spy on ambassadors within embassies. (Source)
  • The USA can track hotel reservations to monitor lodging arrangements. (Source)
  • The USA can track communications within media organizations. (Source)
  • The USA can tap transoceanic fiber-optic cables. (Source)
  • The USA can intercept communications between aircraft and airports. (Source)

And this leak shows that the CIA has all of these technologies and proliferates them to other entities who want this information all the time. You need your privacy to protect yourself and your information. If you have nothing to hide, you have plenty to hide:

The line “if you’ve got nothing to hide, you have nothing to worry about” is used all too often in defending surveillance overreach. It’s been debunked countless times in the past, but with the line being trotted out frequently in response to the NSA revelations, it’s time for yet another debunking, and there are two good ones that were recently published. First up, we’ve got Moxie Marlinspike at Wired, who points out that, you’re wrong if you think you’ve got nothing to hide, because our criminal laws are so crazy, that anyone sifting through your data would likely be able to pin quite a few crimes on you if they just wanted to.

Julian Sanchez points out:

Some of the potentially sensitive facts those records expose becomes obvious after giving it some thought: Who has called a substance abuse counselor, a suicide hotline, a divorce lawyer or an abortion provider? What websites do you read daily? What porn turns you on? What religious and political groups are you a member of? Some are less obvious. Because your cellphone’s “routing information” typically includes information about the nearest cell tower, those records are also a kind of virtual map showing where you spend your time — and, when aggregated with others, who you like to spend it with.

We simply cannot possibly know when something is going to incriminate us and the State is not above scapegoating individuals or coercing them into submission. James Duane, a professor at Regent Law School and former defense attorney, notes:

Estimates of the current size of the body of federal criminal law vary. It has been reported that the Congressional Research Service cannot even count the current number of federal crimes. These laws are scattered in over 50 titles of the United States Code, encompassing roughly 27,000 pages. Worse yet, the statutory code sections often incorporate, by reference, the provisions and sanctions of administrative regulations promulgated by various regulatory agencies under congressional authorization. Estimates of how many such regulations exist are even less well settled, but the ABA thinks there are ”nearly 10,000.”
The complexity of modern federal criminal law, codified in several thousand sections of the United States Code and the virtually infinite variety of factual circumstances that might trigger an investigation into a possible violation of the law, make it difficult for anyone to know, in advance, just when a particular set of statements might later appear (to a prosecutor) to be relevant to some such investigation.

Not just the State, but anyone could draw suspicion against you if they had the right information with the right circumstances. We are entitled to our privacy, and these institutions must be held to account.

Reblogging because the links in the bulleted list were broken, as someone brought to my attention.

Avatar
reblogged
Avatar
nashotobi

LONGHARBOR is funded!

Longharbor is a maritime horror graphic novel inspired by the work of H. P. Lovecraft and John Carpenter’s The Thing. Thanks to the incredible support of hundreds of people we reached out minimum goal. But you can still pre-order a copy. Check it out and please help us spread the word by sharing this message. https://igg.me/at/longharbor 

You are using an unsupported browser and things might not work as intended. Please make sure you're using the latest version of Chrome, Firefox, Safari, or Edge.