Quote Originally Posted by Gwenkatsu View Post
As much as I like this idea, as soon as you introduce "soft" targets (which cannot be confirmed by a system event), you run into trouble:



Check out Jerry Smith and the Meeseeks to see where this sort of request might end
Mind giving me some examples of "soft targets"?