Join devRant
Do all the things like
++ or -- rants, post your own rants, comment on others' rants and build your customized dev avatar
Sign Up
Pipeless API
From the creators of devRant, Pipeless lets you power real-time personalized recommendations and activity feeds using a simple API
Learn More
Search - "not so secure"
-
Hi, I am a Javascript apprentice. Can you help me with my project?
- Sure! What do you need?
Oh, it’s very simple, I just want to make a static webpage that shows a clock with the real time.
- Wait, why static? Why not dynamic?
I don’t know, I guess it’ll be easier.
- Well, maybe, but that’s boring, and if that’s boring you are not going to put in time, and if you’re not going to put in time, it’s going to be harder; so it’s better to start with something harder in order to make it easier.
You know that doesn’t make sense right?
- When you learn Javascript you’ll get it.
Okay, so I want to parse this date first to make the clock be universal for all the regions.
- You’re not going to do that by yourself right? You know what they say, don’t repeat yourself!
But it’s just two lines.
- Don’t reinvent the wheel!
Literally, Javascript has a built in library for t...
- One component per file!
I’m lost.
- It happens, and you’ll get lost managing your files as well. You should use Webpack or Browserify for managing your modules.
Doesn’t Javascript include that already?
- Yes, but some people still have previous versions of ECMAScript, so it wouldn’t be compatible.
What’s ECMAScript?
- Javascript
Why is it called ECMAScript then?
- It’s called both ways. Anyways, after you install Webpack to manage your modules, you still need a module and dependency manager, such as bower, or node package manager or yarn.
What does that have to do with my page?
- So you can install AngularJS.
What’s AngularJS?
- A Javascript framework that allows you to do complex stuff easily, such as two way data binding!
Oh, that’s great, so if I modify one sentence on a part of the page, it will automatically refresh the other part of the page which is related to the first one and viceversa?
- Exactly! Except two way data binding is not recommended, since you don’t want child components to edit the parent components of your app.
Then why make two way data binding in the first place?
- It’s backed up by Google. You just don’t get it do you?
I have installed AngularJS now, but it seems I have to redefine something called a... directive?
- AngularJS is old now, you should start using Angular, aka Angular 2.
But it’s the same name... wtf! Only 3 minutes have passed since we started talking, how are they in Angular 2 already?
- You mean 3.
2.
- 3.
4?
- 5.
6?
- Exactly.
Okay, I now know Angular 6.0, and use a component based architecture using only a one way data binding, I have read and started using the Design Patterns already described to solve my problem without reinventing the wheel using libraries such as lodash and D3 for a world map visualization of my clock as well as moment to parse the dates correctly. I also used ECMAScript 6 with Babel to secure backwards compatibility.
- That’s good.
Really?
- Yes, except you didn’t concatenate your html into templates that can be under a super Javascript file which can, then, be concatenated along all your Javascript files and finally be minimized in order to reduce latency. And automate all that process using Gulp while testing every single unit of your code using Jasmine or protractor or just the Angular built in unit tester.
I did.
- But did you use TypeScript?36 -
The spam denier
_____
An old phone conversation with a client:
Me : Hello
Client : My website and server are suspended? why is that?
Me : Your server sends spam messages.
Client : We do not send spam messages, we are on vacation, there is none in the office.
Me : Yes, but it is not necessarily you, according to our logs, your server sent spam messages in Chinese and Russian, so someone from Russia or China....etc.
Client : I do not believe you, we do not speak russian or chinese, how could we then write spam messages in those languages?
Me : I told you, maybe someone exploited some vulnerability in your website or server firewall. And if you want to activate your services, please check with your webmaster and sysadmin to secure your ....
Client: I tell you my son, because I am old and I have more life experience than you ... I am 60 years old and I tell you, spam does not exist, and YOU suspended my website and server, and created issues to sell me more of your solutions and services.
I won't check my server, I won't hire a webmaster or a sysadmin, AND YOU WILL ACTIVATE MY SERVER NOW !
(I suddenly realized that I am talking to a wall, so I switched to a robotic tone).
Me : Please resolve the issue to activate your services..
Client : YOU WILL ACTIVATE MY S...
Me : Please resolve the issue to activate your services...
Client : WHAT IS THIS SPAM STORY ANYWAY, I DO NOT BELIEVE YOU ...
Me : Please google that word and you will understand what is spam is...
Client : YOU ARE F**ING LIARS, SPAM DOES NOT EXIST... ACTIVATE MY WEBSITE N.... Beeeep !
I hang up.
Well, I thought about configuring an automatic response for this client, or a for-loop.
His voice was really unpleasant, as if he is a heavy smoker.7 -
Another one, teach secure programming for fucks sake! This always happened at my study:
Me: so you're teaching the students doing mysql queries with php, why not teach them PDO/prepared statements by default? Then they'll know how to securely run queries from the start!
Teachers: nah, we just want to go with the basics for now!
Me: why not teach the students hashing through secure algorithms instead of always using md5?
Teacher: nah, we just want to make sure they know the basics :)
For fucks fucking sake, take your fucking responsibilities.31 -
I was reviewing one dev's work. It was in PHP. He used MD5 for password hashing. I told him to use to password_hash function as MD5 is not secure...
He said no we can't get a password from MD5 hashed string. It's one way hashing...
So I asked him to take couple of passwords from the users table and try to decode those in any online MD5 decoder and call me after that if he still thinks MD5 is secure.
I have not got any call from him since.18 -
Started talking with someone about general IT stuff. At some point we came to the subject of SSL certificates and he mentioned that 'that stuff is expensive' and so on.
Kindly told him about Let's Encrypt and also that it's free and he reacted: "Then I'd rather have no SSL, free certificates make you look like you're a cheap ass".
So I told him the principle of login/registration thingies and said that they really need SSL, whether it's free or not.
"Nahhh, then I'd still rather don't use SSL, it just looks so cheap when you're using a free certificate".
Hey you know what, what about you write that sentence on a whole fucking pack of paper, dip it into some sambal, maybe add some firecrackers and shove it up your ass? Hopefully that will bring some sense into your very empty head.
Not putting a secure connection on a website, (at all) especially when it has a FUCKING LOGIN/REGISTRATION FUNCTION (!?!?!?!!?!) is simply not fucking done in the year of TWO THOUSAND FUCKING SEVENTEEN.
'Ohh but the NSA etc won't do anything with that data'.
Has it, for one tiny motherfucking second, come to mind that there's also a thing called hackers? Malicious hackers? If your users are on hacked networks, it's easy as fuck to steal their credentials, inject shit and even deliver fucking EXPLOIT KITS.
Oh and you bet your ass the NSA will save that data, they have a whole motherfucking database of passwords they can search through with XKeyScore (snowden leaks).
Motherfucker.68 -
Ranted about him before but this just came to my mind again.
The fucking windows (to the max) fanboy I had to deal with for too long.
Every time I mentioned something about what programming language to use in a project he was NOT part of:
"I know it's none of my business, BUT I think you should use .net"
(All backend JavaScript and php guys).
Every time I mentioned something about what server system to use:
"I know it's none of my business but I think you should use Windows server"
(All Linux guys)
Every time I'd say something positive about Linux he'd search as long as needed to prove that that was also a windows thing (didn't even come close sometimes)
Every time I told the devs there about a windows security issue (as in "guys they found this thing, install the next update to stay safe :)" - "ahhh will do, thanks for letting know man!") he'd search as long as needed to prove that Linux also had had security issues like that.
(Okay?!? I know?!? I'm just trying to notify people so their systems stay secure and they're genuinely happy with that so STFU)
MOTHERFUCKER.16 -
Navy story time, and this one is lengthy.
As a Lieutenant Jr. I served for a year on a large (>100m) ship, with the duties of assistant navigation officer, and of course, unofficial computer guy. When I first entered the ship (carrying my trusty laptop), I had to wait for 2 hours at the officer's wardroom... where I noticed an ethernet plug. After 15 minutes of waiting, I got bored. Like, really bored. What on TCP/IP could possibly go wrong?
So, scanning the network it is. Besides the usual security holes I came to expect in ""military secure networks"" (Windows XP SP2 unpatched and Windows 2003 Servers, also unpatched) I came along a variety of interesting computers with interesting things... that I cannot name. The aggressive scan also crashed the SMB service on the server causing no end of cute reactions, until I restarted it remotely.
But me and my big mouth... I actually talked about it with the ship's CO and the electronics officer, and promptly got the unofficial duty of computer guy, aka helldesk, technical support and I-try-to-explain-you-that-it-is-impossible-given-my-resources guy. I seriously think that this was their punishment for me messing around. At one time I received a call, that a certain PC was disconnected. I repeatedly told them to look if the ethernet cable was on. "Yes, of course it's on, I am not an idiot." (yea, right)
So I went to that room, 4 decks down and 3 sections aft. Just to push in the half-popped out ethernet jack. I would swear it was on purpose, but reality showed me I was wrong, oh so dead wrong.
For the full year of my commission, I kept pestering the CO to assign me with an assistant to teach them, and to give approval for some serious upgrades, patching and documenting. No good.
I set up some little things to get them interested, like some NMEA relays and installed navigation software on certain computers, re-enabled the server's webmail and patched the server itself, tried to clean the malware (aka. Sisyphus' rock), and tried to enforce a security policy. I also tried to convince the CO to install a document management system, to his utter horror and refusal (he was the hard copy type, as were most officers in the ship). I gave up on almost all besides the assistant thing, because I knew that once I left, everything would go to the high-entropy status of carrying papers around, but the CO kept telling me that would be unnecessary.
"You'll always be our man, you'll fix it (sic)".
What could go wrong?
I got my transfer with 1 week's notice. Panic struck. The CO was... well, he was less shocked than I expected, but still shocked (I learned later that he knew beforehand, but decided not to tell anybody anything). So came the most rediculous request of all:
To put down, within 1 A4 sheet, and in simple instructions, the things one had to do in order to fulfil the duties of the computer guy.
I. SHIT. YOU. NOT.
My answer:
"What I can do is write: 'Please read the following:', followed by the list of books one must read in order to get some introductory understanding of network and server management, with most accompanying skills."
I was so glad I got out of that hellhole.6 -
A quite severe vulnerability was found in Skype (at least for windows, not sure about other systems) allowing anyone with system access (remote or local) to replace the update files skype downloads before updating itself with malicious versions because skype doesn't check the integrity of local files. This could allow an attacker to, once gaining access to the system, 'inject' any malicious DLL into skype by placing it in the right directory with the right file name and waiting for the user to update (except with auto updates of course).
From a company like Microsoft, taking in mind that skype has hundreds of millions of users worldwide, I'd expect them to take a very serious stance on this and work on a patch as soon as possible.
What they said about this: they won't be fixing it anytime soon as it would require a quite big rewrite of skype.
This kinda shit makes me so fucking angry, especially when it comes from big ass companies 😡. Take your fucking responsibility, Microsoft.16 -
I hate this attitude of my study (when i studied):
"it might be a good idea to teach the students how to program securely by default?"
"oh no but we just want to teach them the basics"
"so why not the secure basics by default?!"
"nah we just want them to get started and understand it, that's all. We'll get to the secure way later on"
Well, fuck you.13 -
"Do you have 2 factor auth for the database?"
a customer asked. I stared on the wall in front of me and suddenly fel and urge to punch and piss on something.
I took a deep breath while thinking to myself
*Oh boy, here we go. Another retard*
I put on my nice voice and asked:
"What you mean?"
The customer seems confused, as if my question did not make sense and he said:
"TWO FACTOR AUTHENTICATION! Dont you know what it is? To make the database more secure."
I was fucking right, this person reads to much shit. The fact that the email signature of that person said "Wordpress Developer" made me more angry.
I, still with the nice voice asked
"How would that work?"
"Two factor authentication when I am connecting to the database."
"So, do you want it by SMS then? You'll get alot of messages if it is going to send you one every time a query is made."
The following 7 seconds was dead silent until I heard the person hang up.3 -
Navy story continued.
And continuing from the arp poisoning and boredom, I started scanning the network...
So I found plenty of WinXP computers, even some Win2k servers (I shit you not, the year was 201X) I decided to play around with merasploit a bit. I mean, this had to be a secure net, right?
Like hell it was.
Among the select douchebags I arp poisoned was a senior officer that had a VERY high idea for himself, and also believed he was tech-savvy. Now that, is a combination that is the red cloth for assholes like me. But I had to be more careful, as news of the network outage leaked, and rumours of "that guy" went amok, but because the whole sysadmin thing was on the shoulders of one guy, none could track it to me in explicit way. Not that i cared, actually, when I am pissed I act with all the subtleness of an atom bomb on steroids.
So, after some scanning and arp poisoning (changing the source MAC address this time) I said...
"Let's try this common exploit, it supposedly shouldn't work, there have been notifications about it, I've read them." Oh boy, was I in for a treat. 12 meterpreter sessions. FUCKING 12. The academy's online printer had no authentication, so I took the liberty of printing a few pages of ASCII jolly rogers (cute stuff, I know, but I was still in ITSec puberty) and decided to fuck around with the other PCs. One thing I found out is that some professors' PCs had the extreme password of 1234. Serious security, that was. Had I known earlier, I could have skipped a TON of pointless memorising...
Anyway, I was running amok the entire network, the sysad never had a chance on that, and he seemed preoccupied with EVERYTHING ELSE besides monitoring the net, like fixing (replacing) the keyboard for the commander's secretary, so...
BTW, most PCs had antivirus, but SO out of date that I didn't even need to encode the payload or do any other trick. An LDAP server was open, and the hashed admin password was the name of his wife. Go figure.
I looked at a WinXP laptop with a weird name, and fired my trusty ms08_067 on it. Passowrd: "aaw". I seriously thought that Ophcrack was broken, but I confirmed it. WTF? I started looking into the files... nothing too suspicious... wait a min, this guy is supposed to work, why his browser is showing porn?
Looking at the ""Deleted"" files (hah!) I fount a TON of documents with "SECRET" in them. Curious...
Decided to download everything, like the asshole I am, and restart his PC, AND to leave him with another desktop wallpaper and a text message. Thinking that he took the hint, I told the sysadmin about the vulnerable PCs and went to class...
In the middle of the class (I think it was anti-air warfare or anti-submarine warfare) the sysad burst through the door shouting "Stop it, that's the second-in-command's PC!".
Stunned silence. Even the professor (who was an officer). God, that was awkward. So, to make things MORE awkward (like the asshole I am) I burned every document to a DVD and the next day I took the sysad and went to the second-in-command of the academy.
Surprisingly he took the whole thing in quite the easygoing fashion. I half-expected court martial or at least a good yelling, but no. Anyway, after our conversation I cornered the sysad and barraged him with some tons of security holes, needed upgrades and settings etc. I still don't know if he managed to patch everything (I left him a detailed report) because, as I've written before, budget constraints in the military are the stuff of nightmares. Still, after that, oddly, most people wouldn't even talk to me.
God, that was a nice period of my life, not having to pretend to be interested about sports and TV shows. It would be almost like a story from highschool (if our highschool had such things as a network back then - yes, I am old).
Your stories?8 -
Alright people, I'm gonna be blunt here, which is something not often seen from me. Thankfully this platform is used to it.
I am absolutely sick of people hating Windows/MacOS just because of the fucking practices of the companies. Let's take a look at a pro/con list of each OS type respectively.
Windows:
Pro - Most computers built for it
Pro - Average consumer friendly
Pro - Most games made for it
------------------------------------------
Con - Proprietary
Con - Shady info collection (disableable)
Con - Can take some work to customize
~
Linux:
Pro - Open source
Pro - Hundreds of versions/distros
Pro - Incredibly customizable on all fronts
------------------------------------------
Con - Can have limited modern hardware support
Con - The good stuff has a steep learning curve
Con - Tends to have unoptimized programs or semi-failed copies of Windows programs
~
MacOS:
Pro - Actually quite secure in general
Pro - Optimized to all hell (on Apple devices)
Pro - Usually just works
------------------------------------------
Con - Only (legally) usable on Apple devices
Con - Proprietary
Con - Locked down customization
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
See? None of them are perfect. Fucking get over it already. Maybe I want to use Windows because it works for me, and it actually does what I need it to. I can disable the spying shit through a few nice programs. Just because I work in IT doesn't mean that I HAVE to hate Windows and LOVE Linux! I mean, Linux is absolutely SPECTACULAR for all of my servers, but as a Desktop OS? Not there for me yet. Check one of my other rants: https://devrant.com/rants/928935/... and you'll see a lot of my gripes with Linux that Windows actually executes well. FUCK!37 -
*goes to the local town hall to get my new ID*
A week ago:
Clerk: Sorry sir, our systems don't work anymore, we can't process your request!
Me: Epic. Is there any sysadmin in here that can fix this pronto?
C: No it's a centrally managed system. It's managed by the people in ${another town}.
M (thinking): Well how about you fucking call them then, fucking user. Screaming blood and fire when nothing is wrong server-side but doing nothing when there is. Fucking amazing, useless piece of shit.
One week later, i.e. today:
M: Hey, I'd like to renew my ID card. I've got this announcement document here and my current ID card.
C: Oh no I don't need the announcement document. I need your PIN and PUK code letter.
M (thinking): What the fuck do you need that for.. isn't that shit supposed to be my private information..?
*gives PIN and PUK part of the letter*
C: Alright, to register your new ID card, please enter your PUK and then your PIN in this card reader here twice.
M: Sure, but I'd like to change both afterwards. After all they're written on this piece of paper and I'm not sure that just destroying that will be enough.
C: Sure sure you can change them. Please authenticate with the codes written on the paper.
*Authenticates*
C: So you'd like to change your codes, right?
M: Yeah but I'd like to change it at home. You know, because I can't know for sure that this PC here is secure, the card reader has a wired connection to your PC (making it vulnerable to keyloggers) and so on.
C: Impossible. You can't change your PIN at home. (What about the PUK?!)
M: But I've done that several times with my Digipass for my previous passport.. it is possible and I've done it myself.
C: Tut tut, impossible. I know it's impossible and therefore it is.
M (thinking): Thanks for confirming that I really shouldn't enter my personal PIN on your fucking PC, incompetent bitch.
M: Alright, I'll just keep this PIN, try at home and if it's really impossible because the system changed to remove this functionality (which I highly doubt, that'd be really retarded), I'll come back later.
(Just to get rid of this old stupid woman's ignorance essentially.)
C: Sure sure...
Me: I'd also like to register as an organ donor. Where can I do that?
C: That'd be over there. *points to the other room in the town hall*
FUCKING THANK YOU LORDS OF THE WICKED RAVEN AND THE LIBERATED TUX, TO GET ME AWAY FROM THAT STUPID FUCKING BITCH!!!
.. anyway. I've got my new ID and I'm an official organ donor now 🙂6 -
Example #1 of ??? Explaining why I dislike my coworkers.
[Legend]
VP: VP of Engineering; my boss’s boss. Founded the company, picked the CEO, etc.
LD: Lead dev; literally wrote the first line of code at the company, and has been here ever since.
CISO: Chief Information Security Officer — my boss when I’m doing security work.
Three weeks ago (private zoom call):
> VP to me: I want you to know that anything you say, while wearing your security hat, goes. You can even override me. If you need to hold a release for whatever reason, you have that power. If I happen to disagree with a security issue you bring up, that’s okay. You are in charge of release security. I won’t be mad or hold it against you. I just want you to do your job well.
Last week (engineering-wide meeting):
> CISO: From now on we should only use external IDs in urls to prevent a malicious actor from scraping data or automating attacks.
> LD: That’s great, and we should only use normal IDs in logging so they differ. Sounds more secure, right?
> CISO: Absolutely. That way they’re orthogonal.
> VP: Good idea, I think we should do this going forward.
Last weekend (in the security channel):
> LD: We should ONLY use external IDs in urls, and ONLY normal IDs in logging — in other words, orthogonal.
> VP: I agree. It’s better in every way.
Today (in the same security channel):
> Me: I found an instance of using a plain ID in a url that cancels a payment. A malicious user with or who gained access to <user_role> could very easily abuse this to cause substantial damage. Please change this instance and others to using external IDs.
> LD: Whoa, that goes way beyond <user_role>
> VP: You can’t make that decision, that’s engineering-wide!
Not only is this sane security practice, you literally. just. agreed. with this on three separate occasions in the past week, and your own head of security also posed this before I brought it up! And need I remind you that it is still standard security practice!?
But nooo, I’m overstepping my boundaries by doing my job.
Fucking hell I hate dealing with these people.14 -
Our website once had it’s config file (“old” .cgi app) open and available if you knew the file name. It was ‘obfuscated’ with the file name “Name of the cgi executable”.txt. So browsing, browsing.cgi, config file was browsing.txt.
After discovering the sql server admin password in plain text and reporting it to the VP, he called a meeting.
VP: “I have a report that you are storing the server admin password in plain text.”
WebMgr: “No, that is not correct.”
Me: “Um, yes it is, or we wouldn’t be here.”
WebMgr: “It’s not a network server administrator, it’s SQL Server’s SA account. Completely secure since that login has no access to the network.”
<VP looks over at me>
VP: “Oh..I was not told *that* detail.”
Me: “Um, that doesn’t matter, we shouldn’t have any login password in plain text, anywhere. Besides, the SA account has full access to the entire database. Someone could drop tables, get customer data, even access credit card data.”
WebMgr: “You are blowing all this out of proportion. There is no way anyone could do that.”
Me: “Uh, two weeks ago I discovered the catalog page was sending raw SQL from javascript. All anyone had to do was inject a semicolon and add whatever they wanted.”
WebMgr: “Who would do that? They would have to know a lot about our systems in order to do any real damage.”
VP: “Yes, it would have to be someone in our department looking to do some damage.”
<both the VP and WebMgr look at me>
Me: “Open your browser and search on SQL Injection.”
<VP searches on SQL Injection..few seconds pass>
VP: “Oh my, this is disturbing. I did not know SQL injection was such a problem. I want all SQL removed from javascript and passwords removed from the text files.”
WebMgr: “Our team is already removing the SQL, but our apps need to read the SQL server login and password from a config file. I don’t know why this is such a big deal. The file is read-only and protected by IIS. You can’t even read it from a browser.”
VP: “Well, if it’s secured, I suppose it is OK.”
Me: “Open your browser and navigate to … browse.txt”
VP: “Oh my, there it is.”
WebMgr: “You can only see it because your laptop had administrative privileges. Anyone outside our network cannot access the file.”
VP: “OK, that makes sense. As long as IIS is securing the file …”
Me: “No..no..no.. I can’t believe this. The screen shot I sent yesterday was from my home laptop showing the file is publicly available.”
WebMgr: “But you are probably an admin on the laptop.”
<couple of awkward seconds of silence…then the light comes on>
VP: “OK, I’m stopping this meeting. I want all admin users and passwords removed from the site by the end of the day.”
Took a little longer than a day, but after reviewing what the web team changed:
- They did remove the SQL Server SA account, but replaced it with another account with full admin privileges.
- Replaced the “App Name”.txt with centrally located config file at C:\Inetpub\wwwroot\config.txt (hard-coded in the app)
When I brought this up again with my manager..
Mgr: “Yea, I know, it sucks. WebMgr showed the VP the config file was not accessible by the web site and it wasn’t using the SA password. He was satisfied by that. Web site is looking to beat projections again by 15%, so WebMgr told the other VPs that another disruption from a developer could jeopardize the quarterly numbers. I’d keep my head down for a while.”8 -
I wonder why banks are always so terribly insecure, given how much money there's for grabs in there for hackers.
Just a while ago I got a new prepaid credit card from bpost, our local postal service that for some reason also does banking. The reason for that being that - thank you 'Murica! - a lot of websites out there don't accept anything but credit cards and PayPal. Because who in their right mind wouldn't use credit cards, right?! As it turns out, it's pretty much every European I've spoken to so far.
That aside, I got that card, all fine and dandy, it's part of the Mastercard network so at least I can get my purchases from those shitty American sites that don't accept anything else now. Looked into the manual of it because bpost's FAQ isn't very clear about what my login data for their online customer area now actually is. Not that their instruction manual was either.
I noticed in that manual that apparently the PIN code can't be changed (for "security reasons", totally not the alternative that probably they didn't want to implement it), and that requesting a forgotten PIN code can be done with as little as calling them up, and they'll then send the password - not a reset form, the password itself! IN THE FUCKING MAIL.
Because that's apparently how financial institutions manage their passwords. The fact that they know your password means that they're storing it in plain text, probably in a database with all the card numbers and CVC's next to it. Wouldn't that be a treasure trove for cybercriminals, I wonder? But YOU the customer can't change your password, because obviously YOU wouldn't be able to maintain a secure password, yet THEY are obviously the ones with all the security and should be the ones to take out of YOUR hands the responsibility to maintain YOUR OWN password.
Banking logic. I fucking love it.
As for their database.. I reckon that that's probably written in COBOL too. Because why wouldn't you.23 -
Worst thing you've seen another dev do? So many things. Here is one...
Lead web developer had in the root of their web application config.txt (ex. http://OurPublicSite/config.txt) that contained passwords because they felt the web.config was not secure enough. Any/all applications off of the root could access the file to retrieve their credentials (sql server logins, network share passwords, etc)
When I pointed out the security flaw, the developer accused me of 'hacking' the site.
I get called into the vice-president's office which he was 'deeply concerned' about my ethical behavior and if we needed to make any personnel adjustments (grown-up speak for "Do I need to fire you over this?")
Me:"I didn't hack anything. You can navigate directly to the text file using any browser."
Dev: "Directory browsing is denied on the root folder, so you hacked something to get there."
Me: "No, I knew the name of the file so I was able to access it just like any other file."
Dev: "That is only because you have admin permissions. Normal people wouldn't have access"
Me: "I could access it from my home computer"
Dev:"BECAUSE YOU HAVE ADMIN PERMISSIONS!"
Me: "On my personal laptop where I never had to login?"
VP: "What? You mean ...no....please tell me I heard that wrong."
Dev: "No..no...its secure....no one can access that file."
<click..click>
VP: "Hmmm...I can see the system administration password right here. This is unacceptable."
Dev: "Only because your an admin too."
VP: "I'll head home over lunch and try this out on my laptop...oh wait...I left it on...I can remote into it from here"
<click..click..click..click>
VP: "OMG...there it is. That account has access to everything."
<in an almost panic>
Dev: "Only because it's you...you are an admin...that's what I'm trying to say."
Me: "That is not how our public web site works."
VP: "Thank you, but Adam and I need to discuss the next course of action. You two may go."
<Adam is her boss>
Not even 5 minutes later a company wide email was sent from Adam..
"I would like to thank <Dev> for finding and fixing the security flaw that was exposed on our site. She did a great job in securing our customer data and a great asset to our team. If you see <Dev> in the hallway, be sure to give her a big thank you!"
The "fix"? She moved the text file from the root to the bin directory, where technically, the file was no longer publicly visible.
That 'pattern' was used heavily until she was promoted to upper management and the younger webdev bucks (and does) felt storing admin-level passwords was unethical and found more secure ways to authenticate.5 -
So today (or a day ago or whatever), Pavel Durov attacked Signal by saying that he wouldn't be surprised if a backdoor would be discovered in Signal because it's partially funded by the US government (or, some part of the us govt).
Let's break down why this is utter bullshit.
First, he wouldn't be surprised if a backdoor would be discovered 'within 5 years from now'.
- Teeny tiny little detail: THE FUCKING APP IS OPEN SOURCE. So yeah sure, go look through the code! Good idea! You might actually learn something from it as your own crypto seems to be broken! (for the record, I never said anything about telegram not being open source as it is)
sources:
http://cryptofails.com/post/...
http://theregister.co.uk/2015/11/...
https://security.stackexchange.com/...
- The server side code is closed (of signal and telegram both). Well, if your app is open source, enrolled with one of the strongest cryptographic protocols in the world and has been audited, then even if the server gets compromised, the hackers are still nowhere.
- Metadata. Signal saves the following and ONLY the following: timestamp of registration, timestamp of the last connection with the server (both rounded to the day so not on the second), your phone number and your contact details (if you authorize it) (only phone numbers) in HASHED (BCrypt I thought?) format.
There have been multiple telegram metadata leaks and it's pretty known that it saves way more than neccesary.
So, before you start judging an app which is open, uses one of the best crypto protocols in the world while you use your own homegrown horribly insecure protocol AND actually tries its best to save the least possible, maybe try to fix your own shit!
*gets ready for heavy criticism*19 -
So I was at work and send to another location (distribution centers) and in the lunch break my guider for that day and I started a conversation about servers etc (he appeared to do loads of stuff with that). He recommended me all those programs but I didn't recognize anything so I asked him what kinda servers he ran. He runs a lot of Windows servers. No problem for me but I told him that I am into Linux servers myself.
Guy: "Linux guy, eh? That system is considered to be so secure but in reality it's insecure as fuck!".
Me: (If he would come up with real/good arguments I am not going to argue against that by the way!) Uhm howso/why would you think that?
Guy: "Well all those script kiddies being able to execute code on your system doesn't seem that secure.".
*me thinking: okay hold on, let's ask for an explanation as that doesn't make any fucking sense 😐*
Me: "Uhm how do you mean, could you elaborate on that?"
Guy: "Well since it's open source it allows anyone to run any shit on your system that they'd like. That's why windows rocks, it doesn't let outsiders execute bad code on it.".
Seriously I am wondering where the hell he heard that. My face at that moment (internally, I didn't want to start a heated discussion): 😐 😲.
Yeah that was one weird conversation and look on open source operating systems...21 -
I’m so mad I’m fighting back anger tears. This is a long rant and I apologize but I’m so freaking mad.
So a few weeks ago I was asked by my lead staff person to do a data analysis project for the director of our dept. It was a pretty big project, spanning thousands of users. I was excited because I love this sort of thing and I really don’t have anything else to do. Well I don’t have access to the dataset, so I had to get it from my lead and he said he’d do it when he had a chance. Three days later he hadn’t given it to me yet. I approach him and he follows me to my desk, gives me his login and password to login to the secure freaking database, then has me clone it and put it on my computer.
So, I start working on it. It took me about six hours to clean the database, 2 to set up the parameters and plan of attack, and two or three to visualize the data. I realized about halfway through that my lead wasn’t sure about the parameters of the analysis, and I mentioned to him that the director had asked for more information than what he was having me do. He tells me he will speak with director.
So, our director is never there, so I give my lead about a week to speak with her, in the mean time I finish the project to the specifications that the director gave. I even included notes about information that I would need to make more accurate predictions, to draw conclusions, etc. It was really well documented.
Finally, exasperated, and with the project finished but just sitting on my computer for a week, I approached my director on a Saturday when I was working overtime. She confirmed that I needed to what she said in the project specs (duh), and also mentioned she needed a bigger data set than what I was working with if we had one. She told me to speak to my lead on Monday about this, but said that my work looked great.
Monday came and my lead wasn’t there so I spoke with my supervisor and she said that what I was using was the entire dataset, and that my work looked great and I could just send it off. So, at this point 2/3 of my bosses have seen the project, reviewed it, told me it was great, and confirmed that I was doing the right thing.
I sent it off to the director to disseminate to the appropriate people. Again, she looked at it and said it was great.
A week later (today) one of the people that the project was sent to approaches me and tells me that i did a great job and thank you so much for blah blah blah. She then asks me if the dataset I used included blahblah, and I said no, that I used what was given to me but that I’d be happy to go in and fix it if given the necessary data.
She tells me, “yeah the director was under the impression that these numbers were all about blahblah, so I think there was some kind of misunderstanding.” And then implied that I would not be the one fixing the mistake.
I’m being taken off of the project for two reasons: 1. it took to long to get the project out in the first place,
2. It didn’t even answer the questions that they needed answered.
I fucking told them in the notes and ALL THROUGH THE VISUALIZATIONS that I needed additional data to compare these things I’m so fucking mad. I’m so mad.15 -
I hate Linux so much. I mean, how could anyone of you barbarians like it??
I don't understand the hate for windows. It's secure, emphasizes privacy, and it's Microsoft. What's not to love?
Linux is just proprietary malware.26 -
I still miss my college days. Our crappy IT Dept restricted internet usage on campus. Each student used to get 10 GB of internet data and they used Cyberoam for login (without HTTPS). 10 GB was so less (at least for me).
Now, thanks to CS50, I learned that HTTP was not secure and somehow you can access login credentials. I spent a night figuring things out and then bam!! Wireshark!!!!
I went to the Central Library and connected using Wireshark. Within a matter of minutes, I got more than 30 user ids and passwords. One of them belonged to a Professor. And guess what, it had unlimited data usage with multiple logins. I felt like I was a millionaire. On my farewell, I calculated how much data I used. It was in TBs.
Lesson: Always secure your URLs.5 -
Following a conversation with a fellow devRanter this came to my mind ago, happened a year or two ago I think.
Was searching for an online note taking app which also provided open source end to end encryption.
After searching for a while I found something that looked alright (do not remember the URL/site too badly). They used pretty good open source JS crypto libraries so it seemed very good!
Then I noticed that the site itself did NOT ran SSL (putting the https:// in front of the site name resulted in site not found or something similar).
Went to the Q/A section because that's really weird.
Saw the answer to that question:
"Since the notes are end to end encrypted client side anyways, we don't see the point in adding SSL. It's secure enough this way".
😵
I emailed them right away explaing that any party inbetween their server(s) and the browser could do anything with the request (includingt the cryptographic JS code) so they should start going onto SSL very very fast.
Too badly I never received a reply.
People, if you ever work with client side crypto, ALWAYS use SSL. Also with valid certs!
The NSA for example has this thing known as the 'Quantum Insert' attack which they can deploy worldwide which basically is an attack where they detect requests being made to servers and reply quickly with their own version of that code which is very probably backdoored.
This attack cannot be performed if you use SSL! (of course only if they don't have your private keys but lets assume that for now)
Luckily Fox-IT (formerly Dutch cyber security company) wrote a Snort (Intrustion Detection System) module for detecting this attack.
Anyways, Always use SSL if you do anything at all with crypto/sensitive data! Actually, always use it but at the very LEAST really do it when you process the mentioned above!31 -
- Let's make the authentication system so the user can only login in one device at time, because this is more secure.
- You know that this will be a general-public application, right?
- Yeah!
- Sou you want to "punish" users with a logoff on the other device when he tries to login in a new one?
- Yeah!
- But before you said we will use Json Web Token to make the backend stateless.
- Yeah!
- And how will we check if the token is the last one generated?
- We will store the last generated token for this user on a table in our DB.
- So... you are basically describing the old authentication model, with session tokens stored on the backend and communicating them via cookies.
- Yeah, but the token will be sent on the Header, not on cookies
- Okay, so why will we use Json Web Token to do this in the first place?
- Because this is how they're doing now, and this will make the backend stateless.
A moment of silence, please.8 -
I hate Wordpress. I hate Wordpress. I hate Wordpress.
Wordpress can take a big shit on itself and crawl into a deep dark hole far away from all that is good.
Who even uses Wordpress? Bloggers? Come on, let’s be honest, they’re using more intuitive sites like weebly, wix, and square space. So WHAT is Wordpress for? I’ll tell you, it’s just to FUCKING TORTURE PEOPLE.
So, being the “techy guy” of the family, a relative contacts me asking for some help with their website because they need to install an SSL certificate but they don’t know how to. I tell them I’d gladly do it because, sure, they’re family and how long can it possibly take to install a certificate? I’ve done it before!
Well, I get to work and log into the sluggish Wordpress dashboard and try to use a plugin that would issue a LetsEncrypt certificate because they are free and just as good as any other SSL. But one plugin after the next I keep getting errors about how my hosting wouldn’t allow it.
So I contact GoDaddy (don’t get me fucking started) and ask them about the issue. The guy tells me it’s “policy” to only be able to use GoDaddy’s certificates. How much do they cost? Oh, how about $100 a year?! Fuck you.
I figured out the only way to escape this hell was to ask them to open an economy Linux hosting account with cPanel on GoDaddy (the site was formerly hosted on a “Managed Wordpress” account which is just bullshit for not wanting to give you any control over your own goddamn content). So now I have to deal with migrating the site.
GoDaddy representative tells me that it should only take 20 minutes for me to do this (I’ve already spent way too much time on this but whatever) so I go forward with the new account. I decide I should migrate the site by exporting a backup and manually placing everything on the new server. Doesn’t it end up taking an entire hour to back up a 200MB site because GoDaddy throttled the processing speed?!
So, it’s another hour later and I’ve installed all the databases and carried over all the files. At this point, I’m really at the end of my rope and can’t wait to install the certificate and be done with this fuckery.
I install the certificate and finally get ready to be on my way, but then I see it. A warning. A warning from my browser telling me the site is only partially secure. It turns out the certificate was properly installed but whoever initially made the site HARDCODED ALL THE LINKS to images, websites, and style sheets to be http instead of https.
I’m gonna explode.
I swear, I’m gonna fucking explode.
After a total of 5 hours of work, I finally get the site secure by using search and replace on every fucking file.
Wordpress can go suck a big one. Actually, Wordpress can go suck the largest fuckin one in existence and choke on it.
TL;DR I agree to install an SSL certificate but end up with much more work than I bargained.34 -
I'm not sure if this entirely qualifies and I might have ranted about it a few years ago but fuck it.
My last internship. Company was awesome and my mentor/technical manager got along very well with me to the point that he often asked me to help out with Linux based stuff (he preferred Linux but was a C# guy and wasn't as familiar with it as me (Linux)).
We had to build an internal site thingy (don't remember what it was) and we delivered (me and some interns) and then the publishing moment came so I went to out project manager (a not-as-technical one) and asked if he could install a LetsEncrypt certificate on the site (he knew how and was one of the only ones who had direct access to the server).
He just stared at us and asked why the fuck we needed that since it was an internal thing anyways.
I kindly told that since it's free and can secure the connection, I preferred that and since its more secure, why the fuck not?
He wasn't convinced so it was off.
Next day I came in early and asked my mentor if he could do the SSL since he usually had access to that stuff. He stared at me with "what?" eyes and I explained what the PM said.
Then he immediately ssh'd in and got the damn cert with "we're going to go secure by default, of course!"
A minute later it was all set.2 -
!rant && sarcasm
For a long time now I've been trying to convince people to use secure communication. I'm used to getting called "paranoid", but the killer phrase always was (and still is): "Why do you want me to encrypt my communication, I HAVE NOTHING TO HIDE, so I don't care who's reading it" - "It's not about hiding something, it's about private stuff staying private" - "Yeah, whatever"
"I have nothing to hide". That always killed the conversation... until I asked them to hand me their phones, unlocked, for 5 minutes.
"No" - "Why? I thought, you had nothing to hide and don't care who's reading it?" - "Uhmmm..."
More and more people around me are popping up in my Signal contact list.
Looks like they suddenly care a lot about private stuff staying private </sarcasm>11 -
POSTMORTEM
"4096 bit ~ 96 hours is what he said.
IDK why, but when he took the challenge, he posted that it'd take 36 hours"
As @cbsa wrote, and nitwhiz wrote "but the statement was that op's i3 did it in 11 hours. So there must be a result already, which can be verified?"
I added time because I was in the middle of a port involving ArbFloat so I could get arbitrary precision. I had a crude desmos graph doing projections on what I'd already factored in order to get an idea of how long it'd take to do larger
bit lengths
@p100sch speculated on the walked back time, and overstating the rig capabilities. Instead I spent a lot of time trying to get it 'just-so'.
Worse, because I had to resort to "Decimal" in python (and am currently experimenting with the same in Julia), both of which are immutable types, the GC was taking > 25% of the cpu time.
Performancewise, the numbers I cited in the actual thread, as of this time:
largest product factored was 32bit, 1855526741 * 2163967087, took 1116.111s in python.
Julia build used a slightly different method, & managed to factor a 27 bit number, 103147223 * 88789957 in 20.9s,
but this wasn't typical.
What surprised me was the variability. One bit length could take 100s or a couple thousand seconds even, and a product that was 1-2 bits longer could return a result in under a minute, sometimes in seconds.
This started cropping up, ironically, right after I posted the thread, whats a man to do?
So I started trying a bunch of things, some of which worked. Shameless as I am, I accepted the challenge. Things weren't perfect but it was going well enough. At that point I hadn't slept in 30~ hours so when I thought I had it I let it run and went to bed. 5 AM comes, I check the program. Still calculating, and way overshot. Fuuuuuuccc...
So here we are now and it's say to safe the worlds not gonna burn if I explain it seeing as it doesn't work, or at least only some of the time.
Others people, much smarter than me, mentioned it may be a means of finding more secure pairs, and maybe so, I'm not familiar enough to know.
For everyone that followed, commented, those who contributed, even the doubters who kept a sanity check on this without whom this would have been an even bigger embarassement, and the people with their pins and tactical dots, thanks.
So here it is.
A few assumptions first.
Assuming p = the product,
a = some prime,
b = another prime,
and r = a/b (where a is smaller than b)
w = 1/sqrt(p)
(also experimented with w = 1/sqrt(p)*2 but I kept overshooting my a very small margin)
x = a/p
y = b/p
1. for every two numbers, there is a ratio (r) that you can search for among the decimals, starting at 1.0, counting down. You can use this to find the original factors e.x. p*r=n, p/n=m (assuming the product has only two factors), instead of having to do a sieve.
2. You don't need the first number you find to be the precise value of a factor (we're doing floating point math), a large subset of decimal values for the value of a or b will naturally 'fall' into the value of a (or b) + some fractional number, which is lost. Some of you will object, "But if thats wrong, your result will be wrong!" but hear me out.
3. You round for the first factor 'found', and from there, you take the result and do p/a to get b. If 'a' is actually a factor of p, then mod(b, 1) == 0, and then naturally, a*b SHOULD equal p.
If not, you throw out both numbers, rinse and repeat.
Now I knew this this could be faster. Realized the finer the representation, the less important the fractional digits further right in the number were, it was just a matter of how much precision I could AFFORD to lose and still get an accurate result for r*p=a.
Fast forward, lot of experimentation, was hitting a lot of worst case time complexities, where the most significant digits had a bunch of zeroes in front of them so starting at 1.0 was a no go in many situations. Started looking and realized
I didn't NEED the ratio of a/b, I just needed the ratio of a to p.
Intuitively it made sense, but starting at 1.0 was blowing up the calculation time, and this made it so much worse.
I realized if I could start at r=1/sqrt(p) instead, and that because of certain properties, the fractional result of this, r, would ALWAYS be 1. close to one of the factors fractional value of n/p, and 2. it looked like it was guaranteed that r=1/sqrt(p) would ALWAYS be less than at least one of the primes, putting a bound on worst case.
The final result in executable pseudo code (python lol) looks something like the above variables plus
while w >= 0.0:
if (p / round(w*p)) % 1 == 0:
x = round(w*p)
y = p / round(w*p)
if x*y == p:
print("factors found!")
print(x)
print(y)
break
w = w + i
Still working but if anyone sees obvious problems I'd LOVE to hear about it.36 -
"please use a secure password*"
* But don't make it too secure, 20 Charakters is enough.
Why would you fucking do this? The only reason I can think about is a scenario like this:
"How do we store the passwords in the database?"
"Just like anything else?"
"So I create a VARCHAR(20)?"
"Yeah why not? It's good enough for a name, and you shouldn't use your or anyone else's name as a password, so it should be perfect"10 -
Client reads about MomgoDB ransomware attacks online.
Him: I heard that the MongoDB is not secure, we should use something else in our system.
Me: Those databases got attacked because security features were turned off. If you want you can have an external security team to test the system when it's done.
Him: I don't wana take any risk, so I we should use something else.
We have been working on this system for almost a year and the final stage was supposed to be delivered in a month.
He wants me to replace it with MySQL11 -
TL;DR I'm fucking sick and tired of Devs cutting corners on security! Things can't be simply hidden a bit; security needs to be integral to your entire process and solution. Please learn from my story and be one of the good guys!
As I mentioned before my company used plain text passwords in a legacy app (was not allowed to fix it) and that we finally moved away from it. A big win! However not the end of our issues.
Those Idiot still use hardcoded passwords in code. A practice that almost resulted in a leak of the DB admin password when we had to publish a repo for deployment purposes. Luckily I didn't search and there is something like BFG repo cleaner.
I have tried to remedy this by providing a nice library to handle all kinds of config (easy config injection) and a default json file that is always ignored by git. Although this helped a lot they still remain idiots.
The first project in another language and boom hardcoded password. Dev said I'll just remove before going live. First of all I don't believe him. Second of all I asked from history? "No a commit will be good enough..."
Last week we had to fix a leak of copyrighted contend.
How did this happen you ask? Well the secure upload field was not used because they thought that the normal one was good enough. "It's fine as long the URL to the file is not published. Besides now we can also use it to upload files that need to be published here"
This is so fucking stupid on so many levels. NEVER MIX SECURE AND INSECURE CONTENT it is confusing and hard to maintain. Hiding behind a URL that thousands of people have access to is also not going to work. We have the proof now...
Will they learn? Maybe for a short while but I remain sceptic. I hope a few DevrRanters do!7 -
Some 'wk306' highlights from different people:
Walk around the office in his underwear, because he forgot he left his trousers in the bathroom
Run a red light outside the office due to not wearing his required glasses. When questioned by co-workers, replied "I don't follow those facist rules"
Asking if we work less will we get paid more, because the project will take longer to do (while in a startup with no funding trying to secure some)
Tell a senior dev to stop testing in his spare time, as we won't be able to release on time if he keeps finding critical security bugs
Telling me "your timezone is not my concern", when asking for help with new tooling so we don't have to be online at the same time
Blaming my team for requesting too much help, leading to his team missing deadlines, in a meeting with very senior managers. When the reason we were requesting help was the handover doc we were given was filled with lies about features being finished and "ready to ship" and lacking any unit tests
Being accused of bullying and harassment to the CEO, because someone asked "did you follow up with X about the partnership they emailed us about". The person who was responsible, forgot 4 times, and saw it as an "attack" to mention it in team meetings
Telling an entire office/building mid November they've secured funding for at least the next year, then announcing in January after the Christmas break that its cheaper to move to India, so they are closing the office in 30 days2 -
*logs out of Google on Android*
*has this persistent Google search bar on launcher which I keep on accidentally tapping*
Alright, so I'm not logged into Google to see how it goes. Kind of an experiment to see just how intertwined Android and my life are with Google. And it's going quite well actually, except for my prime apps that I can't seem to get around.
*reads Google privacy policy*
"We protect your data by keeping it secure!"
Hmm, yeah.. you and 3 letter agencies are keeping it secure and out of the hands of other individuals.. that makes sense.
Don't be evil.. unless you're the devil, right?
Fuck you, I won't login like this.
*accidentally opens Google*
*le trending results show up*
- KSI vs Logan Paul weigh-in!
- KSI vs Logan Paul Manchester!
- KSI vs Logan Paul arena fight!
*opens up NewPipe in which I am not logged in either*
- KSI vs Logan Paul!!!
- Did you see the KSI vs Logan Paul stuff yet?!
*logs back into Google straight away*
Personalized search engine.. many hate it, but boy do I fucking love it.rant disney idiots obnoxious cunts fuck that logan fuck that jake kid too wtf is wrong with people who the fuck watches those morons4 -
Warning: long read....
I got a call this morning from a client who was panicking about not being able to login to his web panel.
So I went to the web panel and tried to login and was just redirected back to the login page. No errors or anything (at least visible on the page). Went looking for an error_log file and found it.
It turns out there was an error was showing: Disk quota exceeded.
So I went into the cPanel and checked, he used about 16GB out of 100GB and that got me confused. So I looked around and found out he was using about 510000/500000 inodes.
Went looking trough FTP to see where he has so many files and try and remove some.
Well it turns out that there were about 7 injected websites (warez, online casino, affiliate one etc) and a full hacking web panel on his FTP. After detailed analysis some who actually built the site (I just maintain some parts) made an upload form available to public with any checks on it. Meaning anyone could upload whatever they wanted and the form would allow it.
The worst part is that the client is not allowing us to secure the form with some sort of login or remove it completely (the best option) as it is not really needed but he uses it to upload some pdf catalogs or something.
TL; DR;
Old programmer created an upload form that was accessible to anyone on the web without adding any security or check as to see what kind of files was getting uploaded. Which lead to having maximum number on inodes used on server and client being unable to login.
Side note:
And ofc I had to go and fix the mess behind him again, even though he stopped working a long time ago and I started just recently and have been having nightmares of this project.2 -
Let me explain a tiny corner of some awful code I read earlier today, in layman’s terms.
It’s a method to see if the user is in a secure session — not to set up the session, just to see if it exists. The method ends with a question mark, so it’s basically a question. It should look up the info (without changing anything) and should always give a clear yes/no answer. Makes sense, right?
Let’s say the question is “am I in school right now?”
The code… well.
If there isn’t a student, the answer it gives is null, not yes or no. Null is a fancy word for no, pretty much, so that’s kinda fine, but it really should be a simple no.
It then checks to see if the school is open today. If it is open, it then checks to see if I made my lunch, if I took my backpack, and if I rode the bus — and makes these things happen if they didn’t. Forgot my backpack? Just ask “am I in school today?” And poof! There’s my backpack! … but only if the school is open.
It then, finally, checks to see if I’m actually in the school, and gives that answer.
It could just see if I’m in the school — I mean, I could be in school without a backpack, or walked there on the weekend, right? Ha! You and your silly logic have no place here.
So, by asking if the user is in a secure session, we change the answer: they weren’t before, but the act of asking makes it so. This isn’t profound or anything: I don’t work with Schrödinger. My coworkers are just idiots.
And no, the rest of the code isn’t any better…5 -
I love how the Keybase Linux client installs itself straight into /keybase. Unix directory structure guidelines? Oh no, those don't apply to us. And after uninstalling the application they don't even remove the directory. Leaving dirt and not even having the courtesy to clean it up. Their engineers sure are one of a kind.
Also, remember that EFAIL case? I received an email from them at the time, stating some stuff that was about as consistent as their respect for Unix directory structure guidelines. Overtyping straight from said email here:
[…] and our filesystem all do not use PGP.
> whatever that means.
The only time you'll ever use PGP encryption in Keybase is when you're sitting there thinking "Oh, I really want to use legacy PGP encryption."
> Legacy encryption.. yeah right. Just as legacy as Vim is, isn't it?
You have PGP as part of your cryptographic identity.
> OH REALLY?! NO SHIT!!! I ACTIVELY USED 3 OS'S AND FAILED ON 2 BECAUSE OF YOUR SHITTY CLIENT, JUST TO UPLOAD MY FUCKING PUBLIC KEY!!!
You'll want to remove your PGP key from your Keybase identity.
> Hmm, yeah you might want to do so. Not because EFAIL or anything, just because Keybase clearly is a total failure on all levels.
Written quickly,
the Keybase team
> Well that's fucking clear. Could've taken some time to think before hitting "Send" though.
Don't get me wrong, I love the initiatives like this with all my heart, and greatly encourage secure messaging that leverages PGP. But when the implementation sucks this much, I start to ask myself questions about whether I should really trust this thing with my private conversations. Luckily I refrained from uploading my private key to their servers, otherwise I would've been really fucked. -
Can someone explain to me why the fuck I should even care about the fact, that some companies collect, use and sell my data? I'm not famous, I'm not a politician and I'm not a criminal, I think most of us aren't and won't ever be. We aren't important. So what is this whole bullshittery all about? I seriously don't get it and I find it somewhat weird that especially tech guys and IT "experts" in the media constantly just make up these overly creepy scenarios about big unsafe data collecting companies "stealing" your "private" information. Welcome to the internet, now get the fuck over it or just don't be online. It's your choice, not their's.
I honestly think, some of these "security" companies and "experts" are just making this whole thing bigger than it actually is, because it's a damn good selling point. You can tell people that your app is safe and they'll believe you and buy your shit app because they don't understand and don't care what "safe" or "unsafe" means in this context. They just want to be secure against these "evil monster" companies. The same companies, which you portrayed them as "evil" and "unfair" and "mean" and "unrepentant" for over a decade now.
Just stop it now. All your crappy new "secure" messenger apps have failed awesomely. Delete your life now, please. This isn't about net neutrality or safety on the internet. This is all about you, permanently exaggerating about security and permanently training people to be introverted paranoid egoistic shit people so that they buy your elitist bullshit software.
Sorry for my low english skills, but please stop to exist, thank you.64 -
@netikras since when does proprietary mean bad?
Lemme tell you 3 stories.
CISCO AnyConnect:
- come in to the office
- use internal resources (company newsletter, jira, etc.)
- connect to client's VPN using Cisco AnyConnect
- lose access to my company resources, because AnyConnect overwrites routing table (rather normal for VPN clients)
- issue a route command updating routing table so you could reach confluence page in the intranet
- route command executes successfully, `route -n` shows nothing has changed
- google this whole WTF case
- Cisco AnyConnect constantly overwrites OS routing table to ENFORCE you to use VPN settings and nothing else.
Sooo basically if you want to check your company's email, you have to disconnect from client's VPN, check email and reconnect again. Neat!
Can be easily resolved by using opensource VPN client -- openconnect
CISCO AnyConnect:
- get a server in your company
- connect it to client's VPN and keep the VPN running for data sync. VPN has to be UP at all times
- network glitch [uh-oh]
- VPN is no longer working, AnyConnect still believes everything is peachy. No reconnect attempts.
- service is unable to sync data w/ client's systems. Data gets outdated and eventually corrupted
OpenConnect (OSS alternative to AnyConnect) detects all network glitches, reports them to the log and attempts reconnect immediatelly. Subsequent reconnect attempts getting triggered with longer delays to not to spam network.
SYMANTEC VIP (alleged 2FA?):
- client's portal requires Sym VIP otp code to log in
- open up a browser in your laptop
- navigate to the portal
- enter your credentials
- click on a Sym VIP icon in the systray
- write down the shown otp number
- log in
umm... in what fucking way is that a secure 2FA? Everything is IN the same fucking device, a single click away.
Can be easily solved by opensource alternatives to Sym VIP app: they make HTTP calls to Symantec to register a new token and return you the whole totp url. You can convert that url to a qr code and scan it w/ your phone (e.g. Google's Authenticator). Now you have a true 2FA.
Proprietary is not always bad. There are good propr sw too. But the ones that are core to your BAU and are doing shit -- well these ARE bad. and w/o an oppurtunity to workaround/fix it yourself.13 -
Can someone please explain to me WHY THE FUCK non devs feel like they know shit. I DON'T GIVE A FUCK ABOUT HOW YOU FOUND SOME UNTRUE SHIT ON GIZMODO. I'VE KNOW SO MUCH ABOUT THIS SHIT, AND YOU LOOKED UP THE FIRST EXAMPLE YOU COULD FIND THE SUPPORTS YOUR CASE. The most recent time this happened was OVER THE LAST FEW DAYS when this DUMBASS that my friends and I BULLY but HE STILL HANGS AROUND. (By bully, yes sometimes we are mean to him, but we're not out to get him. He comes to us and we don't wanna be with him). So after the SEVENTH groupchat (on two apps) he created that night, HE WANTED TO SWITCH BACK TO ANOTHER APP I SPENT A WEEK TRYING TO GET THEM TO SWITCH FROM PREVIOUSLY (It was whatsapp, i got them to switch to telegram). THEN HE TRIED to ARGUE with me about how TELEGRAM wasnt secure. HE SEARCHED "is telegram secure" on Google and chose the FIRST ARTICE from the previously mentioned, GIZMODO which says that TELEGRAM chats ARENT ENCRYPTED by DEFAULT. HOW THE FUCK DO DUMBASSES GET THIS KIND OF PUBLICITY. There's a difference between ENCRYPTION and END TO END DUMBASS. Then he told me whatsapp is more secure than telegram. NO ITS FUCKING NOT. In telegram, your encryption keys CHANGE every chat, or every 100 messages. To my best research, whatsapp only has ONE key per USER. I could go on forever about how chat backups in whatsapp are UNENCRYPTED or how FACEBOOK stores your data, but blocked you works to.6
-
So this PR company hired my firm to convert their client's Wix website to WordPress to have better control over content and SEO, not to mention get away from the piss-poor "absolute position everything" setup of Wix. This is a single page design. 2 days later, we deliver it, performing faster than Wix and with a few extra goodies on the UI.
The client's director of IT wants to stay on Wix, because it's "the most secure provider", and will only move their ONE PAGE INFORMATIONAL WEBSITE to another platform and host if they answer a 133 item "security questionnaire". Short of SSNs, they want to basically know everything, including our proprietary and confidential security practices. You aren't Google...stop acting like you are...
How are people this stupid a "director" of anything?3 -
At my previous job we had to complete an online security training exercise. It shows you how to behave secure in the work place, to not open unknown links etc. The scary part was that the entire training thing was BUILT IN FUCKING FLASH. So I'm suppose to listen to some god damn virus shitting flash application on how to do online security?! Get your shit together before teaching others.5
-
My first job was actually nontechnical - I was 18 years old and sold premium office furniture for a small store in Munich.
I did code in my free time though (PHP/JS mostly, had a litte browsergame back then - those were the days), so when my boss approached me and asked me whether I liked to take over a coding project, I agreed to the idea.
Little did I know at the time: I was supposed to work with a web agency the boss had contracted to build their online shop. Only that he had no plan or anything, he basically told them "build me an online shop like abc(a major competitor of ours at the time)"
He employed another sales lady who was supposed to manage the shop (that didn't exist yet). In the end, I think 80% of her job was to keep me from killing my boss.
As you can imagine, with this huuuuge amout of planning and these exact visions of what was supposed to be, things went south fast and far. So far that I could visit my fellow flightless birds down in the Penguin's republic of Antarctica and still need to go further.
Well... When my boss started suing the web agency, I was... ahem, asked to take over. Dumb as I was, I did - I was a PHP kid and thought that Magento, being written in PHP, would be easy to master. If you know Magento, you know that was maybe the wrongest thing I ever said.
Fast forward 3 very exhausting months, the thing was online. Not all of it worked yet, but it was online and fairly secure.
I did next to everything myself, administrating the CentOS box the shop was running on, its (own) e-mail server, the web server, all the coding required for the shop (can you spell 12 hour day for 8 hour pay?)
3 further months later, my life basically was a wreck, I dragged myself to work, the only thing I looked forward being the motorcycle ride home. The system worked though.
Mind you, I was still, at the time, working with three major customers, doing deskside support and some admin (Win Server 2008R2 at the time) - because, to quote my boss, "We could not afford a full time developer and we don't need one".
I think i stopped coding in my free time, the one hobby I used to love more than anything on the world, somewhere Decemerish 2012. I dropped out of the open source projects I was in, quit working on my browser game and let everything slide.
I didn't even care to renew the domains and servers for it, I just let it die without notice.
The little free time I had, I spent playing video games and getting drunk/high.
December 2013, 1.5 years on the job, I reached my breaking point and just left, called in sick at least a week per month because I just could not see this fucking place anymore.
I looked for another job outside of ALL of what I did before. No more Magento, no more sales, no more PHP. I didn't have to look for long, despite what I thought of my skills.
In February 2014, I told my boss that I quit. It was still seven months until my new job started, but I wanted him to know early so we could migrate and find a replacement.
The search for said replacement started in June 2014. I had considerably less work in the months before, looks like he got the hint.
In August 2014, my replacement arrived and I got him started.
I found a job, which I am still in, and still happy about after almost half a decade, at a local, medium sized ISP as a software dev and IT security guy. Got a proper training with a certificate and everything now.
My replacement lasted two months, he was external and never really did his job - the site, which until I had quit, had a total of 3 days downtime for 3 YEARS (they were the hoster's fault, not mine), was down for an entire month and he could not even tell why.
HIS followup was kicked after taking two weeks to familiarize himself with the project. Well, I think that two weeks is not even barely enough to familiarize yourself with nearly three years of work, but my boss gave him two days.
In 2016, the shop was replaced with another one. Different shop system, different OS, different CI. I don't know why and I can't say I give a damn.
Almost all the people that worked at the company back with me have left for greener pastures, taking their customers (and revenue) with them.
As for my boss' comments, instructions and lines: THAT might not be safe for work. Or kids. Or humans in general. And there wouldn't be much left if you put it through a language filter...
Moral of the story: No, it's not a bad thing to leave a place if you're mistreated there. Don't mistake loyalty with stupidity!
And, to quote one of my favourite Bands: "Nothing matters when the pain is all but gone" (Tragedy + Time by Rise Against).8 -
Watch out for these fucking bug bounty idiots.
Some time back I got an email from one shortly after making a website live. Didn't find anything major and just ran a simple tool that can suggest security improvements simply loading the landing page for the site.
Might be useful for some people but not so much for me.
It's the same kind of security tool you can search for, run it and it mostly just checks things like HTTP headers. A harmless surface test. Was nice, polite and didn't demand anything but linked to their profile where you can give them some rep on a system that gamifies security bug hunting.
It's rendering services without being asked like when someone washes your windscreen while stopped at traffic but no demands and no real harm done. Spammed.
I had another one recently though that was a total disgrace.
"I'm a web security Analyst. My Job is to do penetration testing in websites to make them secure."
"While testing your site I found some critical vulnerabilities (bugs) in your site which need to be mitigated."
"If you have a bug bounty program, kindly let me know where I should report those issues."
"Waiting for response."
It immediately stands out that this person is asking for pay before disclosing vulnerabilities but this ends up being stupid on so many other levels.
The second thing that stands out is that he says he's doing a penetration test. This is illegal in most major countries. Even attempting to penetrate a system without consent is illegal.
In many cases if it's trivial or safe no harm no foul but in this case I take a look at what he's sending and he's really trying to hack the site. Sending all kinds of junk data and sending things to try to inject that if they did get through could cause damage or provide sensitive data such as trying SQL injects to get user data.
It doesn't matter the intent it's breaking criminal law and when there's the potential for damages that's serious.
It cannot be understated how unprofessional this is. Irrespective of intent, being a self proclaimed "whitehat" or "ethical hacker" if they test this on a site and some of the commands they sent my way had worked then that would have been a data breach.
These weren't commands to see if something was possible, they were commands to extract data. If some random person from Pakistan extracts sensitive data then that's a breach that has to be reported and disclosed to users with the potential for fines and other consequences.
The sad thing is looking at the logs he's doing it all manually. Copying and pasting extremely specific snippets into all the input boxes of hacked with nothing to do with the stack in use. He can't get that many hits that way.4 -
One of the more memorable computer problems I solved were when I added some lego blocks to solve a recurring windows bluescreen
A friend had a Pentium 3 (slot 1) that kept throwing him several bluescrens per day so I decided to help
I open up the computer and saw that the processor were not properly securred in it's place and the plastic pieces that should have holding it in place were gone, so I improvised pressing in some lego pieces that I found somewhere to secure that the processor didn't move if someone were walking close to the computer and after that he didn't have any more bluescreens than the rest of us4 -
Rant:
Why in the freezing cold all people think that linux = secure. Ransomware... Bla bla not happening on linux bla bla... Linux is secure.
If Linux would have been the most popular one people will pretty much run everything on root and install every stupid package available and never run: apt-get update.
Users were so dumb they got scammed by a phising mail... In freaking 2017... This is user stupidity not OS fault...
God its stupidly annoying seeing the same stuff : Linux secure...
Everything can be secure if you paid attention to the same stuff in freaking 2000.30 -
To this day I can't figure out why people still drink the windows koolaid.
It's less secure, slower, bloatier (is that a word?), Comes with ads, intrudes on privacy, etc. People say it's easier to use than Linux, but 99% of what anyone does happens on a chrome based web browser which is the same on all systems!
When it comes to dev, it boggles the mind that people will virtualize a Linux kernel in Windows to use npm, docker, k8s, pip, composer, git, vim, etc. What is Windows doing for you but making your life more complicated? All your favorite browsers and IDEs work on Linux, and so will your commands out of the box.
Maybe an argument can be made for gaming, but that's a chicken an egg scenario. Games aren't built for Linux because the Linux market is too small to be worth supporting, not that the games won't work on it...20 -
A friend of mine and I decided we wanted to fork linux and port it to C++.
Sounds crazy yea, but there are many benefits:
1) More secure due to ability to use references
2) More sustainable due to the extensive standard lib
Not only would we port linux to C++, we would improve it as far as possible.
So now for the part of the rant where I misuse devRant as an advertizement platform. to those interested in helping, here is the poll where you can get included into the mailing list:
https://docs.google.com/forms/d/...11 -
I finally moved to Fedora Silverblue 30 which is a really awesome OS.
Silverblue Edition unlike the standard version, runs a immutable core. That means the entire FS is not writable except for certain parts that are mounted to /var. While this is limiting, this allows for atomic updates, which is the whole point of Silverblue.
Now this also might throw off even myself, because I might need to run VSCode in the host and I might need C++ libs. Fortunately there's a tool named toolbox that allows you to use standard DNF inside a OCI container. Now the thing is, now you need to tell your IDE to use it after installing it.
I wrote a little helper script to do just that. I wrote it primarily for VSCode but it should also work for your IDE if you happen to want to try to use Silverblue.
Helper script: https://t.co/sXYOgcwLBg?amp=1
Also if you wanna try Silverblue for yourself, here's some notes:
* To install apps, you need to run flatpak. Make sure you also have the flathub repo listed.
* don't use the Flatpak version of the IDEs. If possible, use the RPM versions. Silverblue allows you to install traditional packages (to some degree, not everything works in this thing because of the immutable design) in the host. So as much as possible if you need dev libs, use toolbox for those.
* Silverblue also comes with podman and buildah installed (aka what if Docker had no daemon and was more secure?)
*Do your updates via rpm-ostree upgrade, or turn the auto updater on if you're lazy
All in all I like this environment, I've used this kind of workspace before (Chrome OS), so its pretty easy for me to get used to.
What do you think guys, think you'll give it a shot?
5 -
About browsers and whole SSL CERT thing...
Most likely everyone here noticed, that https site with broken certificate will throw these big red warnings, in your face and there is so much wording like "ITS NOT SECUREEEE" or "ITS HACKEDDD" almost like it was written by passionate fanatic.
But when you are on plaintext http browsers reaction is like ¯\_(ツ)_/¯
Even if you have plaintext with password, it will for example in chromium put small little red thingy that almost no one notices.
I believe that broken cert with some error like invalid date is MORE secure than plaintext password, yet still there is this hypocracy with browsers...
I dont say that broken SSL cert is good, or something, Im just pointing out contrast of "broken" https vs plain http.... One looks for casual Joe like end of the world is coming and second is bearly noticable. Da fuck?
I disagree with this approach17 -
TL; DR: Bringing up quantum computing is going to be the next catchall for everything and I'm already fucking sick of it.
Actual convo i had:
"You should really secure your AWS instance."
"Isnt my SSH key alone a good enough barrier?"
"There are hundreds of thousands of incidents where people either get hacked or commit it to github."
"Well i wont"
"Just start using IP/CIDR based filtering, or i will take your instance down."
"But SSH keys are going to be useless in a couple years due to QUANTUM FUCKING COMPUTING, so why wouldnt IP spoofing get even better?"
"Listen motherfucker, i may actually kill you, because today i dont have time for this. The whole point of IP-based security is that you cant look on Shodan for machines with open SSH ports. You want to talk about quantum computing??!! Lets fucking roll motherfucker. I dont think it will be in the next thousand years that we will even come close to fault-tolerant quantum computing.
And even if it did, there have been vulnerabilities in SSH before. How often do you update your instance? I can see the uptime is 395 days, so probably not fucking often! I bet you "dont have anything important anyways" on there! No stored passwords, no stored keys, no nothing, right (she absolutely did)? If you actually think I'm going to back down on this when i sit in the same room as the dude with the root keys to our account, you can kindly take your keyboard and shove it up your ass.
Christ, I bet that the reason you like quantum computing so much is because then you'll be able to get your deepfakes of miley cyrus easier you perv."8 -
Chrome, Firefox, and yes even you Opera, Falkon, Midori and Luakit. We need to talk, and all readers should grab a seat and prepare for some reality checks when their favorite web browsers are in this list.
I've tried literally all of them, in search for a lightweight (read: not ridiculously bloated) web browser. None of them fit the bill.
Yes Midori, you get a couple of bonus points for being the most lightweight. Luakit however.. as much as I like vim in my terminal, I do not want it in a graphical application. Not to mention that just like all the others you just use webkit2gtk, and therefore are just as bloated as all the others. Lightweight my ass! But programmable with Lua, woo! Not like Selenium, Chrome headless, ... does that for any browser. And that's it for the unique features as far as I'm concerned. One is slow, single-threaded and lightweight-ish (Midori) and another has vim keybindings in an application that shouldn't (Luakit).
Pretty much all of them use webkit2gtk as their engine, and pretty much all of them launch a separate process for each tab. People say this is more secure, but I have serious doubts about that. You're still running all these processes as the same user, and they all have full access to the X server they run under (this is also a criticism against user separation on a single X session in general). The only thing it protects against is a website crashing the browser, where only that tab and its process would go down. Which.. you know.. should a webpage even be able to do that?
But what annoys me the most is the sheer amount of memory that all of these take. With all due respect all of you browsers, I am not quite prepared to give 8 fucking gigabytes - half the memory in this whole box! - just for a dozen or so tabs. I shouldn't have to move my web browser to another lesser used 16GB box, just to prevent this one from going into fucking swap from a dozen tabs. And before someone has a go at the add-ons, there's 4 installed and that's it. None of them are even close to this complete and utter memory clusterfuck. It's the process separation. Each process consumes half a GB of memory, and there's around a dozen of them in a usual browsing session. THAT is the real problem. And I want to get rid of it.
Browsers are at their pinnacle of fucked up in my opinion, literally to the point where I'm seriously considering elinks. Being a sysadmin, I already live my daily life in terminals anyway. As such I also do have resources. But because of that I also associate every process with its cost to run it, in terms of resources required. Web browsers are easily at the top of the list.
I want to put 8GB into perspective. You can store nearly 2 entire DVD movies in that memory. However media players used to play them (such as SMPlayer) obviously don't do that. They use 60-80MB on average to play the whole movie. They also require far less processing power than YouTube in a web browser does, even when you download that exact same video with youtube-dl (either streamed within the media player or externally). That is what an application should be.
Let's talk a bit about these "complicated" websites as well. I hate to break it to you framework web devs, but you're a dime a dozen. The competition is high between web devs for that exact reason. And websites are not complicated. The document itself is plain old HTML, yes even if your framework converts to it in the background. That's the skeleton of your document, where I would draw a parallel with documents in office suites that are more or less written in XML. CSS.. oh yes, markup. Embolden that shit, yes please! And JavaScript.. oh yes, that pile of shit that's been designed in half a day, and has a framework called fucking isEven (which does exactly what it says on the tin, modulo 2 be damned). Fancy some macros in your text editor? Yes, same shit, different pile.
Imagine your text editor being as bloated as a web browser. Imagine it being prone to crashing tabs like a web browser. Imagine it being so ridiculously slow to get anything done in your productivity suite. But it's just the usual with web browsers, isn't it? Maybe Gopher wasn't such a bad idea after all... Oh and give me another update where I have to restart the browser when I commit the heinous act of opening another tab, just because you had to update your fucking CA certs again. Yes please!19 -
Being a programmer for a while now it always irritates me to try to explain what I'm working on to friends and family. I forget what I knew before I developed. I'm always like "I made the strings in the database- oh I mean the words...well they're actually more like strings of letters- well anyway I made a code to sanitize the user input- I mean make it so it is secure before uhhh saving." I spend so much time watering what I'm saying down I forget what I'm talking about
It's not even funny. It'd be funny if one single person in my family or friend group understood what I meant to some degree.3 -
After a few weeks of being insanely busy, I decided to log onto Steam and maybe relax with a few people and play some games. I enjoy playing a few sandbox games and do freelance development for those games (Anywhere from a simple script to a full on server setup) on the side. It just so happened that I had an 'urgent' request from one of my old staff member from an old community I use to own. This staff member decided to run his own community after I sold mine off since I didn't have the passion anymore to deal with the community on a daily basis.
O: Owner (Former staff member/friend)
D: Other Dev
O: Hey, I need urgent help man! Got a few things developed for my server, and now the server won't stay stable and crashes randomly. I really need help, my developer can't figure it out.
Me: Uhm, sure. Just remember, if it's small I'll do it for free since you're an old friend, but if it's a bigger issue or needs a full recode or whatever, you're gonna have to pay. Another option is, I tell you what's wrong and you can have your developer fix it.
O: Sounds good, I'll give you owner access to everything so you can check it out.
Me: Sounds good
*An hour passes by*
O: Sorry it took so long, had to deal with some crap. *Insert credentials, etc*
Me: Ok, give me a few minutes to do some basic tests. What was that new feature or whatever you added?
O: *Explains long feature, and where it's located*
Me: *Begins to review the files* *Internal rage wondering what fucking developer could code such trash* *Tests a few methods, and watches CPU/RAM and an internal graph for usage*
Me: Who coded this module?
O: My developer.
Me: *Calm tone, with a mix of some anger* So, you know what, I'm just gonna do some simple math for ya. You're running 33 ticks a second for the server, with an average of about 40ish players. 33x60 = 1980 cycles a minute, now lets times that by the 40 players on average, you have 79,200 cycles per minute or nearly 4.8 fucking cycles an hour (If you maxed the server at 64 players, it's going to run an amazing fucking 7.6 million cycles an hour, like holy fuck). You're also running a MySQLite query every cycle while transferring useless data to the server, you're clusterfucking the server and overloading it for no fucking reason and that's why you're crashing it. Another question, who the fuck wrote the security of this? I can literally send commands to the server with this insecure method and delete all of your files... If you actually want your fucking server stable and secure, I'm gonna have to recode this entire module to reduce your developer's clusterfuck of 4.8 million cycles to about 400 every hour... it's gonna be $50.
D: *Angered* You're wrong, this is the best way to do it, I did stress testing! *Insert other defensive comments* You're just a shitty developer (This one got me)
Me: *Calm* You're calling me a shitty developer? You're the person that doesn't understand a timer, I get that you're new to this world, but reading the wiki or even using the game's forums would've ripped this code to shreds and you to shreds. You're not even a developer, cause most of this is so disorganized it looks like you copy and pasted it. *Get's angered here and starts some light screaming* You're wasting CPU usage, the game can't use more than 1 physical core, and after a quick test, you're stupid 'amazing' module is using about 40% of the CPU. You need to fucking realize the 40ish average players, use less than this... THEY SHOULD BE MORE INTENSIVE THAN YOUR CODE, NOT THE OPPOSITE.
O: Hey don't be rude to Venom, he's an amazing coder. You're still new, you don't know as much as him. Ok, I'll pay you the money to get it recoded.
Me: Sounds good. *Angered tone* Also you developer boy, learn to listen to feedback and maybe learn to improve your shitty code. Cause you'll never go anywhere if you don't even understand who bad this garbage is, and that you can't even use the fucking wiki for this game. The only fucking way you're gonna improve is to use some of my suggestions.
D: *Leaves call without saying anything*
TL;DR: Shitty developer ran some shitty XP system code for a game nearly 4.8 million times an hour (average) or just above 7.6 million times an hour (if maxed), plus running MySQLite when it could've been done within about like 400 an hour at max. Tried calling me a shitty developer, and got sorta yelled at while I was trying to keep calm.
Still pissed he tried calling me a shitty developer... -
why do i have an iphone?
well, let's start with the cons of android.
- its less secure. this isn't even arguable. it took the fbi a month or something (i forget) to break into an ios device
- permission, permissions, permissions. many of the android apps i use ask for the not obscure permissions.
· no, you don't need access to my contacts
· no, you don't need access to my camera to take notes
· no, you don't need access to my microphone to send messages
· no, you don't need access to my saved passwords to be a functioning calculator
- not being able to block some apps from an internet connection
- using an operating system created and maintained by an advertising company, aka no more privacy
- i like ios's cupertino more than material design, but that's just personal preference
pros of ios:
- being able to use imessage, at my school if you don't have an iphone you're just not allowed to be in the group chat
- the reliability. i've yet a data loss issue
- the design and feel. it just feels premium
- if i could afford it, ios seems like a lot of fun to develop for (running a hackintosh vm compiled a flutter app 2x as fast as it did on not-a-vm windows)
so that's why i like iphones
google sucks55 -
I'm a game designer student in a Brazilian university. In my class I'm the only one who likes code and made the secure choice to be a future game programmer.
But recently some dudes on my class started to discourage me and telling me to give up that course and change to a computer science course.
I didn't feel that way... I think game programmers who know all the stuff and process of game development( modelling, concepts etc) are better professionals than the ones who just knows the scripting process. But sometimes their opinion flows up my head and I feel so unknown if I staying in the right way or not.
(Sry if my english still bad..hope you all understand anyway)17 -
Security lifehacks 101
Why pay for password managers? Just use one secure password for every service you use! Password managers are really designed for fools who don’t know that you can just use one password for every service and who are ready to pay for that shit.
The best practice is to use your name starting with a capital letter + your main credit card number + CVC code from the back of that card as your go-to password. It’s long and hard to bruteforce and you can remember everything that way! You just need to remember that one password and you’ll always remember your payment info! No need for apple’s bad Apple Pay which is not so secure after all like everything else that Apple offers.19 -
We are required to use corporate SSO for any authenticated internal websites, and one of the features they require you to implement is a "logout" button.
They provide a whole slew of specifications, including size and placement/visibility, etc. They provide an SSO logout URL you must redirect to after you take care of your own application logout tasks.
Makes sense... except the logout URL they provide to serve the actual SSO logout function broke over 3 months ago, and remains non-functional to this day.
Apparently I'm the first person (and perhaps one of the only people) who reported it, and was told "just not to worry about it".
So, we have a standing feature request to provide a button... that doesn't actually work.
Corporate Security - Making your corporation _appear_ more secure every day...2 -
A few days ago Aruba Cloud terminated my VPS's without notice (shortly after my previous rant about email spam). The reason behind it is rather mundane - while slightly tipsy I wanted to send some traffic back to those Chinese smtp-shop assholes.
Around half an hour later I found that e1.nixmagic.com had lost its network link. I logged into the admin panel at Aruba and connected to the recovery console. In the kernel log there was a mention of the main network link being unresponsive. Apparently Aruba Cloud's automated systems had cut it off.
Shortly afterwards I got an email about the suspension, requested that I get back to them within 72 hours.. despite the email being from a noreply address. Big brain right there.
Now one server wasn't yet a reason to consider this a major outage. I did have 3 edge nodes, all of which had equal duties and importance in the network. However an hour later I found that Aruba had also shut down the other 2 instances, despite those doing nothing wrong. Another hour later I found my account limited, unable to login to the admin panel. Oh and did I mention that for anything in that admin panel, you have to login to the customer area first? And that the account ID used to login there is more secure than the password? Yeah their password security is that good. Normally my passwords would be 64 random characters.. not there.
So with all my servers now gone, I immediately considered it an emergency. Aruba's employees had already left the office, and wouldn't get back to me until the next day (on-call be damned I guess?). So I had to immediately pull an all-nighter and deploy new servers elsewhere and move my DNS records to those ASAP. For that I chose Hetzner.
Now at Hetzner I was actually very pleasantly surprised at just how clean the interface was, how it puts the project front and center in everything, and just tells you "this is what this is and what it does", nothing else. Despite being a sysadmin myself, I find the hosting part of it insignificant. The project - the application that is to be hosted - that's what's important. Administration of a datacenter on the other hand is background stuff. Aruba's interface is very cluttered, on Hetzner it's super clean. Night and day difference.
Oh and the specs are better for the same price, the password security is actually decent, and the servers are already up despite me not having paid for anything yet. That's incredible if you ask me.. they actually trust a new customer to pay the bills afterwards. How about you Aruba Cloud? Oh yeah.. too much to ask for right. Even the network isn't something you can trust a long-time customer of yours with.
So everything has been set up again now, and there are some things I would like to stress about hosting providers.
You don't own the hardware. While you do have root access, you don't have hardware access at all. Remember that therefore you can't store anything on it that you can't afford to lose, have stolen, or otherwise compromised. This is something I kept in mind when I made my servers. The edge nodes do nothing but reverse proxying the services from my LXC containers at home. Therefore the edge nodes could go down, while the worker nodes still kept running. All that was necessary was a new set of reverse proxies. On the other hand, if e.g. my Gitea server were to be hosted directly on those VPS's, losing that would've been devastating. All my configs, projects, mirrors and shit are hosted there.
Also remember that your hosting provider can terminate you at any time, for any reason. Server redundancy is not enough. If you can afford multiple redundant servers, get them at different hosting providers. I've looked at Aruba Cloud's Terms of Use and this is indeed something they were legally allowed to do. Any reason, any time, no notice. They covered all their bases. Make sure you do too, and hope that you'll never need it.
Oh, right - this is a rant - Aruba Cloud you are a bunch of assholes. Kindly take a 1Gbps DDoS attack up your ass in exchange for that termination without notice, will you?4 -
Clients r wankers. He wants to be able to send login details incl passwords in email to his clients when he adds them in the cms. The passwords are encrypted and generated on creation of a new user. Ive told him that sending credentials in email is shit and not secure. The stubborn bastard wont budge, so instead i've put explicit instructions to reset password once logged in with the credentials they send. Any other suggestions?3
-
Guys what I want to know is how do you secure your code so that they pay you after you deliver the code to them?
So recently I was in this internship that I secured with an over-the-phone interview and the guy who was contacting me was the CEO of the company (I'm going to refer to him as "the fucking cunt" from now on). He asked me to do some OCR and translations and I managed to write a few scripts that automate the entire process. The fucking cunt made me login remotely to his desktop which was connected to the server (who the fuck does that) and I had to operate on the server from his system. I helped him with the installation and taught him how to use the scripts by altering the parameters and stuff, and you know what the fucking cunt did from the next day onward? Dropped contact. Like completely. I kept bombing emails upon emails and tried calling him day after day, the fucking cunt either picked up and cut the call immediately on recognising its me or didn't pick up at all. And the reason he wasn't able to pay me was, and I quote, "I am in US right now, will pay you when I get back to India." I was like "The fuck was PayPal invented for?" Being the naive fool that I was, I believed him (it was my first time) and waited patiently till the date he mentioned and then lodged a complain in the portal itself where he had posted the job initially. They raised a concern with the employer and you know what the fucking cunt replied? "He has not been able to achieve enough accuracy on the translations". Doesn't even know good translation systems don't exist till date ( BTW I used a client for the google translate API). It has been weeks now and still the bitch has not yet resolved the issue.And the worst part of it was I got a signed contract and gave him a copy of my ID for verification purposes.
I'm thinking of making a mail bomb and nagging him every single day for the rest of his life. What do you guys think?7 -
Managed to land 2 interviews:
The first one was for a startup that was looking for a react programmer (I've never used react before).
The later was a php job at a big company. They told me they used cakephp which is a framework I had not used before either.
Still, I'm more familiar with php than react so I felt more confident with the second interview. However, I felt there was a lot of good chemistry going on in the first interview.
The interviewer was incredibly nice (he was the lead dev, not an HR person as opposed to the second interviewer)
He gave me a small react test to be completed within a week. I barely managed to do it in time but I felt good about the solution.
Just as I was sending it, I get a call from the second interviewer saying I landed the php job.
I wasn't sure if my novice react skills would be impressive enough to secure me the react job (and I really needed a job) so I accepted.
After explaining everything to the guy who was interviewing me for the react job, he understood and was kind enough to schedule a code review where he walked through my novice code explaining what could be improved, helping me learn more in the process.
I regret not accepting the react position. The PHP they got me working with is fucking PHP5 with Cake2 :/
Don't get me wrong, I like the salary and the people are nice but the tech stack they're using (lacking source control by the way!), as well as all the lengthy meetings are soul-draining.6 -
!dev && rant
Can we talk about banks? Those fuckers! Suposed to keep our money save and be competent... They today gave me the biggest scare of my live and I've run one an update query on a prod db without a where clause! (Okay I knew we had a backup but still pretty scarry moment!)
As a few know, besides being a dev I help to organize a small openair music festival here in Switzerland. The openair was this weekend. Every thing wen't well, until I checked our ebanking account today. There was only 2/3 of the money that should be there. A quick call to the bank and they told me, nope they never received it. As we've thrown it in a secure locker during the night, we didn't receive any receipt or something like that. It took those fuckers 3.5 hours to actually go and check the looker, just to find the remaining money in the corner of it. What the fuck people, can't you open your fucking eyes and not give me a fucking heartatack? I thought you guys are professionals!
Note locker: we get a key to open it from the outside, place our payment during the night, as soon as we close it, it falls inside a vault, so there it's a pay in only system, for lack of a better word, I called it locker.
My heart is still beating like mad, because of them.4 -
Despite common sense, I think technology is not making our lives easier. It's just build chaos on top of chaos.
Take server-side programming for instance.
First you have to find someone to host your thing, or a PaaS provider. Then you have to figure out how much RAM and storage you need, which OS you're going to use. And then there's Docker (which will run on top of a VM on AWS or GCP anyway, making even less sense). And then there's the server technology: nginx, Apache (and many many more; if, that is, you're using a server at all). And then there are firewalls, proxies, SSL. And then you go back to the start, because you have to check if your hosting provider will support the OS or Docker or your server. (I smell infinite recursion here.)
Each of these moving parts come with their own can of worms in terms of configuration and security. A whole bible to read if you want to have the slightest clue about what you're doing.
And then there's the programming language to use and its accompanying frameworks. Can they replace the server technology? Should you? Will they conflict with each other and open yet another backdoor into your system? Is it supported by your hosting provider? (Did I mention an infinite recursion somewhere?)
And then there's the database. Does it have a port to the language/framework of your choosing? Why does it expose an web interface? Is it supposed to replace your server? And why are its security features optional again? (Just so I have to test both the insecure and the secure environments?)
And you haven't written a single line of code yet, mind you.4 -
So a few weeks ago I wiped my MacBook Pro to regain some space and speed, it wasn't really that slow I just had the disk partitioned into two installments of MacOS. When I erased the disk I thought the secure thing to do would be to set the format to journaled, encrypted rather than just journaled. Everything was working fine, there seemed to be this weird step of login when I restarted but whatever, except iCloud Drive. On my iMac it works fine but for whatever reason my MacBook Pro doesn't want to download custom folders (ones that aren't created by an app and don't have an app icon on folder icon) from my account despite them being clearly available in iCloud.com. So after this much time of messing with it I'm wiping my MacBook Pro again and formatting it as journaled (not encrypted). Wish me luck...undefined this must just be a bug or a security feature... probs a bug tho i still like apple products this stuff usually works for me3
-
Oh boy, this is gonna be good:
TL;DR: Digital bailiffs are vulnerable as fuck
So, apparently some debt has come back haunting me, it's a somewhat hefty clai and for the average employee this means a lot, it means a lot to me as well but currently things are looking better so i can pay it jsut like that. However, and this is where it's gonna get good:
The Bailiff sent their first contact by mail, on my company address instead of my personal one (its's important since the debt is on a personal record, not company's) but okay, whatever. So they send me a copy of their court appeal, claiming that "according to our data, you are debtor of this debt". with a URL to their portal with a USERNAME and a PASSWORD in cleartext to the message.
Okay, i thought we were passed sending creds in plaintext to people and use tokenized URL's for initiating a login (siilar to email verification links) but okay! Let's pretend we're a dumbfuck average joe sweating already from the bailiff claims and sweating already by attempting to use the computer for something useful instead of just social media junk, vidya and porn.
So i click on the link (of course with noscript and network graph enabled and general security precautions) and UHOH, already a first red flag: The link redirects to a plain http site with NOT username and password: But other fields called OGM and dossiernumer AND it requires you to fill in your age???
Filling in the received username and password obviously does not work and when inspecting the page... oh boy!
This is a clusterfuck of javascript files that do horrible things, i'm no expert in frontend but nothing from the homebrewn stuff i inspect seems to be proper coding... Okay... Anyways, we keep pretending we're dumbasses and let's move on.
I ask for the seemingly "new" credentials and i receive new credentials again, no tokenized URL. okay.
Now Once i log in i get a horrible looking screen still made in the 90's or early 2000's which just contains: the claimaint, a pie chart in big red for amount unpaid, a box which allows you to write an - i suspect unsanitized - text block input field and... NO DATA! The bailiff STILL cannot show what the documents are as evidence for the claim!
Now we stop being the pretending dumbassery and inspect what's going on: A 'customer portal' that does not redirect to a secure webpage, credentials in plaintext and not even working, and the portal seems to have various calls to various domains i hardly seem to think they can be associated with bailiff operations, but more marketing and such... The portal does not show any of the - required by law - data supporting the claim, and it contains nothing in the user interface showing as such.
The portal is being developed by some company claiming to be "specialized in bailiff software" and oh boy oh boy..they're fucked because...
The GDPR requirements.. .they comply to none of them. And there is no way to request support nor to file a complaint nor to request access to the actual data. No DPO, no dedicated email addresses, nothing.
But this is really the ham: The amount on their portal as claimed debt is completely different from the one they came for today, for the sae benefactor! In Belgium, this is considered illegal and is reason enough to completely make the claim void. the siple reason is that it's unjust for the debtor to assess which amount he has to pay, and obviously bailiffs want to make the people pay the highest amount.
So, i sent the bailiff a business proposal to hire me as an expert to tackle these issues and even sent him a commercial bonus of a reduction of my consultancy fees with the amount of the bailiff claim! Not being sneery or angry, but a polite constructive proposal (which will be entirely to my benefit)
So, basically what i want to say is, when life gives you lemons, use your brain and start making lemonade, and with the rest create fertilizer and whatnot and sent it to the lemonthrower, and make him drink it and tell to you it was "yummy yummy i got my own lemons in my tummy"
So, instead of ranting and being angry and such... i simply sent an email to the bailiff, pointing out various issues (the ones6 -
Security fail here. I've just started a PPI claim and have been provided a link to a so called "very secure" client area.
There are no username or passwords and the screenshot is not a first time sign up screen.
All I need to login is a surname, postcode and DOB - all information easy enough to find online.
Pretty bad IMO, esp, so considering the effort required to add a proper login using a username/password combination.
I mean I'm logged in now and have no option to set an account password :|
3 -
A classmate saw me using Firefox today and laughed at me saying Chrome is more secure. I'm not very knowledgeable about the security; I use Firefox because it uses less memory and it's more stable on my machine.
I doubt that info of his is current so can someone who actually knows about the security give me some counter-arguments for him? The more facts the better :D14 -
I don't understand privacy advocators.
Am I the only one who wouldn't give up practicality in exchange for "potentially more secure"?
I don't understand so much what the deal is with people who avoid Facebook, or don't trust Google or Microsoft, just in the basis of "privacy" or "security".
Websites tracking you to serve ads? Well, it's pointless because I very rarely buy something from the internet or let myself be influenced, ads are waste of time, just use an adblocker.
I can pretty much upload my whole life or documents on Google drive, even if I made it public no one would really care or read it all. It's like that GitHub project you uploaded but never documented, so no one cares. I usually use alternative software not because of "privacy" but because it has features other software doesn't have.
In reality you realize people aren't that interested in your life more than their own life.24 -
Oh boy I got a few. I could tell you stories about very stupid xss vectors like tracking IDs that get properly sanitized when they come through the url but as soon as you go to the next page and the backend returns them they are trusted and put into the Dom unsanitized or an error page for a wrong token / transaction id combo that accidentally set the same auth cookie as the valid combination but I guess the title "dumbest" would go to another one, if only for the management response to it.
Without being to precise let's just say our website contained a service to send a formally correct email or fax to your provider to cancel your mobile contract, nice thing really. You put in all your personal information and then you could hit a button to send your cancelation and get redirected to a page that also allows you to download a pdf with the sent cancelation (including all your personal data). That page was secured by a cancelation id and a (totally save) 16 characters long security token.
Now, a few months ago I tested a small change on the cancelation service and noticed a rather interesting detail : The same email always results in the same (totally save) security token...
So I tried again and sure, the token seemed to be generated from the email, well so much about "totally save". Of course this was a minor problem since our cancelation ids were strong uuids that would be incredibly hard to brute force, right? Well of course they weren't, they counted up. So at that point you could take an email, send a cancelation, get the token and just count down from your id until you hit a 200 and download the pdf with all that juicy user data, nice.
Well, of course now I raised a critical ticket and the issue was fixed as soon as possible, right?
Of course not. Well I raised the ticket, I made it critical and personally went to the ceo to make sure its prioritized. The next day I get an email from jira that the issue now was minor because "its in the code since 2017 and wasn't exploited".
Well, long story short, I argued a lot and in the end it came to the point where I, as QA, wrote a fix to create a proper token because management just "didn't see the need" to secure such a "hard to find problem". Well, before that I sent them a zip file containing 84 pdfs I scrapped in a night and the message that they can be happy I signed an NDA.2 -
Anything I (am able to) build myself.
Also, things that are reasonably standardized. So you probably won't see me using a commercial NAS (needing a web browser to navigate and up-/download my files, say what?) nor would I use something like Mega, despite being encrypted. I don't like lock-in into certain clients to speak some proprietary "secure protocol". Same reason why I don't use ProtonMail or that other one.. Tutanota. As a service, use the standards that already exist, implement those well and then come offer it to me.
But yeah. Self-hosted DNS, email (modified iRedMail), Samba file server, a blog where I have unlimited editing capabilities (God I miss that feature here on devRant), ... Don't trust the machines nor the services you don't truly own, or at least make an informed decision about them. That is not to say that any compute task should be kept local such as search engines or AI or whatever that's best suited for centralized use.. but ideally, I do most of my computing locally, in a standardized way, and in a way that I completely control. Most commercial cloud services unfortunately do not offer that.
Edit: Except mail servers. Fuck mail servers. Nastiest things I've ever built, to the point where I'd argue that it was wrong to ever make email in the first place. Such a broken clusterfuck of protocols, add-ons (SPF, DKIM, DMARC etc), reputation to maintain... Fuck mail servers. Bloody soulsuckers those are. If you don't do system administration for a living, by all means do use the likes of ProtonMail and Tutanota, their security features are nonstandard but at least they (claim to) actually respect your privacy.2 -
Hello fellas! 👋
I recently told you that I’m planning to pull out Chaaat – a fully open source messenger that doesn’t track you and doesn’t share your data: https://devrant.com/rants/1549251/....
The project is also mentioned here: https://devrant.com/rants/1570178/...
So, I’m here to tell you good news – a great developer, @not-a-muggle, decided to join me, and now we made a team!
I also made some conversations and acquired “chaaat” name from another team on Heroku, so now we have consistent domain name on both Heroku and GitHub Pages.
We have Trello board with very well described tasks almost anyone can do. We also have Slack to have both business and free conversations.
If you’re seeking a place to contribute and gain some NodeJS / React / PWA / WebRTC experience with detailed code review from experienced developer, just mention me here or shoot me an email on hello@miloslav.website. Provide your email so I’ll be able to contact you.
Our main goals are:
1. Have fun and some experience
2. Make it to Chrome Experiments mention
Marketing/advertising help is much appreciated.
Feel free to email me anytime!8 -
I need some advice here... This will be a long one, please bear with me.
First, some background:
I'm a senior level developer working in a company that primarily doesn't produce software like most fast paced companies. Lots of legacy code, old processes, etc. It's very slow and bureaucratic to say the least, and much of the management and lead engineering talent subscribes to the very old school way of managing projects (commit up front, fixed budget, deliver or else...), but they let us use agile to run our team, so long as we meet our commitments (!!). We are also largely populated by people who aren't really software engineers but who do software work, so being one myself I'm actually a fish out of water... Our lead engineer is one of these people who doesn't understand software engineering and is very types when it comes to managing a project.
That being said, we have this project we've been working for a while and we've been churning on it for the better part of two years - with multiple changes in mediocre contribution to development along the way (mainly due to development talent being hard to secure from other projects). The application hasn't really been given the chance to have its core architecture developed to be really robust and elegant, in favor of "just making things work" in order to satisfy fake deliverables to give the customer.
This has led us to have to settle for a rickety architecture and sloppy technical debt that we can't take the time to properly fix because it doesn't (in the mind of the lead engineer - who isn't a software engineer mind you) deliver visible value. He's constantly changing his mind on what he wants to see working and functional, he zones out during sprint planning, tries to work stories not on the sprint backlog on the side, and doesn't let our product owner do her job. He's holding us to commitments we made in January and he's not listening when the team says we don't think we can deliver on what's left by the end of the year. He thinks it's reasonable to expect us to deliver and he's brushing us off.
We have a functional product now, but it's not very useful yet and still has some usability issues. It's still missing features, which we're being put under pressure to get implemented (even half-assed) by the end of the year.
TL;DR
Should I stand up for what I know is the right way to write software and push for something more stable sometime next year or settle for a "patch job" that we *might* deliver that will most definitely be buggy and be harder to maintain going forward? I feel like I'm fighting an uphill battle in trying to write good quality code in lieu of faster results and I just can't get behind settling for crap just because.9 -
My grandfather is at age 72 & don't know much about technology. He forward me this message on whatsapp bcz I'm a software engineer. He made my day...
What is the difference between http and https ?
Time to know this with 32 lakh debit cards compromised in India.
Many of you may be aware of this difference, but it is
worth sharing for any that are not.....
The main difference between http:// and https:// is all
about keeping you secure
HTTP stands for Hyper Text Transfer Protocol
The S (big surprise) stands for "Secure".. If you visit a
Website or web page, and look at the address in the web browser, it is likely begin with the following: http:///.
This means that the website is talking to your browser using
the regular unsecured language. In other words, it is possible for someone to "eavesdrop" on your computer's conversation with the Website. If you fill out a form on the website, someone might see the information you send to that site.
This is why you never ever enter your credit card number in an
Http website! But if the web address begins with https://, that means your computer is talking to the website in a
Secure code that no one can eavesdrop on.
You understand why this is so important, right?
If a website ever asks you to enter your Credit/Debit card
Information, you should automatically look to see if the web
address begins with https://.
If it doesn't, You should NEVER enter sensitive
Information....such as a credit/debit card number.
PASS IT ON (You may save someone a lot of grief).
GK:
While checking the name of any website, first look for the domain extension (.com or .org, .co.in, .net etc). The name just before this is the domain name of the website. Eg, in the above example, http://amazon.diwali-festivals.com, the word before .com is "diwali-festivals" (and NOT "amazon"). So, this webpage does not belong to amazon.com but belongs to "diwali-festivals.com", which we all haven't heard before.
You can similarly check for bank frauds.
Before your ebanking logins, make sure that the name just before ".com" is the name of your bank. "Something.icicibank.com" belongs to icici, but icicibank.some1else.com belongs to "some1else".
👆 *Simple but good knowledge to have at times like these* 👆3 -
With the movement of people recently deleting their facebook accounts, this actually covers a valid concern I didn't even think of, since I personally don't use that feature at all, nor have I ever used it.
People that used the "login with facebook" a lot, especially with websites that exclusively use it, will flush not only their facebook account doing that, but also all accounts they have ever used to log in with facebook, if not actually thought as far as checking the apps section of facebook and trying to migrate your account, which is also rarely possible.
So basically many people that do use it, simply won't delete their facebook account, because it has this backup parachute attached with its strings, that does not allow for an easy exit, except for literally ripping it all out and losing every account it seems.
Ignore dashlanes self advertisement bullshit at the bottom, the blog itself is still highly valuable in itself.
Source: https://blog.dashlane.com/delete-fa...
12 -
Tried to dual boot Arch with Windows yesterday.
Everything was going smoothly. Shrunk the C: partition, ran the installer, installed the OS fine. But it was still booting straight to Windows.
So I edited the BCD to point to Grub instead of Wilndows. Then the plan was to boot into Arch, find Windows, and add it to Grub, problem solved.
Wrong. I had forgotten to disable secure boot. Arch and Grub were booting in BIOS mode, but Windows was UEFI. Grub couldn't boot or even see Windows.
So now I was stuck with just Arch. So I flashed a Windows drive, booted from that, automatic startup repair failed. Opened up the command prompt, tried to rebuild the BCD from there. Surely I can just rebuild it and forget about trying to dual boot right? I just want to get back to being able to use my PC.
Wrong again. Didn't find Windows. Had to get rid of the BCD file before I could rebuild it, but couldn't find it. Found out that I could use diskpart to mount the system partition and assign it a drive letter, renamed the BCD, rebuilt it, and finally was able to reboot into Windows.
Learn from my arrogance. First time Linux users should not attempt to install Arch, let alone do it alongside Windows on the same disk.4 -
My best prank: A year ago I was at my friends flat, which he finally rented with his new girlfriend. He is a kind of person, which has like constantly opened 110 tabs in chrome, three or four instances of chrome running, torrenting at full speed and in the meanwhile a few films having opened to "watch" later. He is very very secure about his computer and NEVER leaves me or anyone else alone with his computer. That day we were just talking in the same room, and he goes for some food. I was like yeah thats my chance to prank him. So I opened a new tab and came with an idea - what If I change his desktop background to some random chick, to prank both him and his gf. I knew she will not be mad but his reaction would be priceless (it was his first gf). So I started googling, found a three pretty naked chicks. This was like soft porn, they were still "dressed" but not much. I did not wanted to use a porn for this.
So I was about to download image - right click - save as - little window opened and..
...what the hell, that guy had literally like terabytes of porn in download folder, all totally in one chaos, thousands of images, millions of downloaded videos, all categories just everything from gangbang to milfs or old/ young, what the fuck that computer was like cursed station of porn.
In that point I was like fuck that. This prank has no sense then. So I just closed that little window and did nothing. Prank failed.
Nowdays, He still does not know what I know about his "hobbies". And I will never say him lol. About a months after he broke with his gf and moved to different house. He has now three monitors attached to his computer and 4tb of space. He is still complaining about "lack of space" and "too big downloaded movies" but we all know what is going on lol. We call his "working deck" a sacred porn station.1 -
When i was younger, lesser experienced and more naive than now; i got away with a lot of things. By lot of things i mean security flaws in my applications and overall architecture. I realise now i could've so easily been pawned.
Not that i claim to be totally secure even now, or would ever. It is a process, slow and painful one - Learning.
What i wish to point out is the role of favorable probability (non believers would call it luck). Security is so much about it. You get away with so many things for so long. And bang one day the roll of dice is unfavorable. On such rare occasions, just look back and wonder - damn i should've been breached long ago.rant hindsight security fail looking back security luck vulnerabilities food for thought musings naive probability2 -
I'd never do anything "risky" in a prod environment if I considered it so at the time, but in retrospect there's *lots* of things considered risky now (both from a security and good practice viewpoint) that were standard practice not long ago:
- Not using any form of version control
- No tests (including no unit tests)
- Not considering XSS vulnerabilities
- Completely ignoring CSRF vulnerabilities
- Storing passwords as unsalted MD5 hashes (heck that was considered very *secure* in the days of plaintext password storage.)
...etc. I'm guilty of all of those previously. I daresay in the future there will be yet more things that may be standard practice now, but become taboos we look back on with similar disdain.1 -
time traveler: *steps on a bug*
changes to our world:
- C has python syntax based on indentation and has no curly braces
- mario has fall damage
- tetris is called triris and uses blocks of three squares rather than four
- the word "disk" doesn't exist, everything is "disc"
- every device uses a new version of mSATA instead of usb type c
- screens are 3:2 instead of 16:9
- javascript name wasn't adopted, the language was called lifescript instead, as originally intended. because of it, it didn't secure funding when it most needed it, so it never caught on. instead, microsoft bought macromedia, and every site is written with Microsoft Flash. CSS has XML syntax.
- steve jobs didn't rely on alternative medicine, so he succesfully beat cancer. because of him, every phone has the size of iPhone 4s, but bezels are tiny. everything that's bigger is called phablet, and big phones are not a thing. instead, web is "smaller" in size, every ui is more compact.
- wimax caught on and won the 4g war. 5g is called wimax 2.0.
- microsoft had more time to complete vista, and hardware manufacturers had more time to make faster chips. when vista came out, it wasn't buggy and was very fast. it acquired cult status like xp. because of it, windows 8 still had frutiger aero design.19 -
Colleagues cannot seem to grasp that allowing a user to manually update a field via an Api, that only business process should update is a bad idea.
The entire team of around 10 'software developers' cannot grasp that just because the frontend website won't set it doesn't mean its secure. I have tried many times now...
Just an example honestly... Our project follows a concrete repository pattern using no interfaces or inheritance, returning anaemic domain models (they are just poco) that then get mapped into 'view models' (its an api). The domain models exist to map to 'view models' and have no methods on them. This is in response to my comments over the last 2 years about returning database models as domain transfer objects and blindly trusting all Posts of those models being a bad idea due to virtual fields in Ef.
Every comment on a pull request triggers hours of conversation about why we should make a change vs its already done so just leave it. Even if its a 5 minute change.
After 2 years the entire team still can't grasp restful design, or what the point is.
Just a tiny selection of constant incompetence that over the years has slowly warn me down to not really caring.
I can't really understand anymore if this is normal.3 -
# Retrospective as Backend engineer
Once upon a time, I was rejected by a startup who tries to snag me from another company that I was working with.
They are looking for Senior / Supervisor level backend engineer and my profile looks like a fit for them.
So they contacted me, arranged a technical test, system design test, and interview with their lead backend engineer who also happens to be co-founder of the startup.
## The Interview
As usual, they asked me what are my contribution to previous workplace.
I answered them with achievements that I think are the best for each company that I worked with, and how to technologically achieve them.
One of it includes designing and implementing a `CQRS+ES` system in the backend.
With complete capability of what I `brag` as `Time Machine` through replaying event.
## The Rejection
And of course I was rejected by the startup, maybe specifically by the co-founder. As I asked around on the reason of rejection from an insider.
They insisted I am a guy who overengineer thing that are not needed, by doing `CQRS+ES`, and only suitable for RND, non-production stuffs.
Nobody needs that kind of `Time Machine`.
## Ironically
After switching jobs (to another company), becoming fullstack developer, learning about react and redux.
I can reflect back on this past experience and say this:
The same company that says `CQRS+ES` is an over engineering, also uses `React+Redux`.
Never did they realize the concept behind `React+Redux` is very similar to `CQRS+ES`.
- Separation of concern
- CQRS: `Command` is separated from `Query`
- Redux: Side effect / `Action` in `Thunk` separated from the presentation
- Managing State of Application
- ES: Through sequence of `Event` produced by `Command`
- Redux: Through action data produced / dispatched by `Action`
- Replayability
- ES: Through replaying `Event` into the `Applier`
- Redux: Through replay `Action` which trigger dispatch to `Reducer`
---
The same company that says `CQRS` is an over engineering also uses `ElasticSearch+MySQL`.
Never did they realize they are separating `WRITE` database into `MySQL` as their `Single Source Of Truth`, and `READ` database into `ElasticSearch` is also inline with `CQRS` principle.
## Value as Backend Engineer
It's a sad days as Backend Engineer these days. At least in the country I live in.
Seems like being a backend engineer is often under-appreciated.
Company (or people) seems to think of backend engineer is the guy who ONLY makes `CRUD` API endpoint to database.
- I've heard from Fullstack engineer who comes from React background complains about Backend engineers have it easy by only doing CRUD without having to worry about application.
- The same guy fails when given task in Backend to make a simple round-robin ticketing system.
- I've seen company who only hires Fullstack engineer with strong Frontend experience, fails to have basic understanding of how SQL Transaction and Connection Pool works.
- I've seen company Fullstack engineer relies on ORM to do super complex query instead of writing proper SQL, and prefer to translate SQL into ORM query language.
- I've seen company Fullstack engineer with strong React background brags about Uncle Bob clean code but fail to know on how to do basic dependency injection.
- I've heard company who made webapp criticize my way of handling `session` through http secure cookie. Saying it's a bad practice and better to use local storage. Despite my argument of `secure` in the cookie and ability to control cookie via backend.18 -
Do you know what angers me more than anything else ?
Wasted potential. Thats what. That there are people out there that look at their bank account and see a large number and spend large amounts of time finding ways to push people down during sensitive times where they could be learning and growing and have the right attitude and energy to do so, just because it makes their horrible selves feel secure knowing how 'superior' daddy made them, not to mention likely factories filled with half naked Chinese kids sewing shoes and soccer balls and separating out precious metals with blow torches.
I cannot help but think about this again as I'm frustrated that I had to relearn something just now which created more questions which I once everything is dashed to pieces again I won't think to or know to look into, if the information even exists, all so some easily duped younger people can form the next generation of well... us, and fall for the same tricks while I feel like I'm falling behind.3 -
I was once asked to create a fully secure chat system prototype (the ui didn't matter) in 2 days. We ended up building a client in python (which I wrote) and it kinda worked and a c# backend that didn't really work.
1 hour before we had to present the project to some high up management we decided that we couldn't fix the bugs in the system.
So I came up with a cool idea. Why not use ssh?
So I set up a bash script that writes to a file and tail -f that reads from the file. That way you could chat securely with another person.
I made it 15 minutes before the presentation with no Internet working :) they said it was hacky but a cool solution they saw that day :p I felt happy and that I had to thank Linux for being there for me2 -
These ignorant comments about arch are starting to get on my nerves.
You ranted or asked help about something exclusive to windows and someone pointed out they don't have that problem in arch and now you're annoyed?
Well maybe it's for good.
Next comes a very rough analogy, but imagine if someone posts "hey guys, I did a kg of coke and feeling bad, how do I detox?"
It takes one honest asshole to be like "well what if you didn't do coke?".
Replace the coke with windows.
Windows is a (mostly) closed source operating system owned by a for profit company with a very shady legal and ethical history.
What on earth could possibly go wrong?
Oh you get bsod's?
The system takes hours to update whenever the hell it wants, forces reboot and you can't stop it?
oh you got hacked because it has thousands of vulnerabilities?
wannacry on outdated windows versions paralyzed the uk health system?
oh no one can truly scrutinize it because it's closed source?
yet you wonder why people are assholes when you mention it? This thing is fucking cancer, it's hundreds of steps backwards in terms of human progress.
and one of the causes for its widespread usage are the savage marketing tactics they practiced early on. just google that shit up.
but no, linux users are assholes out to get you.
and how do people react to these honest comments? "let's make a meme out of it. let's deligitimize linux, linux users and devs are a bunch of neckbeards, end of story, watch this video of rms eating skin off his foot on a live conference"
short minded idiots.
I'm not gonna deny the challenges or limitations linux represents for the end user.
It does take time to learn how to use it properly.
Nvidia sometimes works like shit.
Tweaking is almost universally required.
A huge amount of games, or Adobe/Office/X products are not compatible.
The docs can be very obscure sometimes (I for one hate a couple of manpages)
But you get a system that:
* Boots way faster
* Is way more stable
* Is way way way more secure.
* Is accountable, as in, no chance to being forced to get exploited by some evil marketing shit.
In other words, you're fucking free.
You can even create your own version of the system, with total control of it, even profit with it.
I'm not sure the average end user cares about this, but this is a developer forum, so I think in all honesty every developer owes open source OS' (linux, freebsd, etc) major respect for being free and not being corporate horseshit.
Doctors have a hippocratic oath? Well maybe devs should have some form of oath too, some sworn commitment that they will try to improve society.
I do have some sympathy for the people that are forced to use windows, even though they know ideally isn't the ideal moral choice.
As in, their job forces it, or they don't have time or energy to learn an alternative.
At the very least, if you don't know what you're talking about, just stfu and read.
But I don't have one bit of sympathy for the rest.
I didn't even talk about arch itself.
Holy fucking shit, these people that think arch is too complicated.
What in the actual fuck.
I know what the problem is, the arch install instructions aren't copy paste commands.
Or they medium tutorial they found is outdated.
So yeah, the majority of the dev community is either too dumb or has very strong ADD to CAREFULLY and PATIENTLY read through the instructions.
I'll be honest, I wouldn't expect a freshman to follow the arch install guide and not get confused several times.
But this is an intermediate level (not megaexpert like some retards out there imply).
Yet arch is just too much. That's like saying "omg building a small airplane is sooooo complicated". Yeah well it's a fucking aerial vehicle. It's going to be a bit tough. But it's nowhere near as difficult as building a 747.
So because some devs are too dumb and talk shit, they just set the bar too low.
Or "if you try to learn how to build a plane you'll grow an aviator neckbeard". I'll grow a fucking beard if I want too.
I'm so thankful for arch because it has a great compromise between control and ease of install and use.
When I have a fresh install I only get *just* what I fucking need, no extra bullshit, no extra programs I know nothing about or need running on boot time, and that's how I boot way faster that ubuntu (which is way faster than windows already).
Configuring nvidia optimus was a major pain in the ass? Sure was, but I got it work the way I wanted to after some time.
Upgrading is also easy as pie, so really scratching my brain here trying to understand the real difficult of using arch.22 -
Sometimes life takes unexpected turns:
I studied mechanical engineering and did some "computer stuff" in my free time, you know, "programming" with Java, toyed around with HTML/CSS/PHP a few years ago, some local server stuff with a raspberry pi, nothing fancy.
Half a year ago i got hired as engineer first but they said they needed an "IT Guy" also.
What i did since then
*Researching, Testing and Planning the introduction of an ERP software
*Planning, coordinating and (partially) setting up a new server for the company (actually two cause redundancy (heavy lifting got done by our IT partner, its not like i suddenly know how to do the entire windows server administration)
*Writing 3 minor tools for some guys in the company in java
*Creating numereous excel vba scripts that make work a lot easier
*doing all the day to day business that comes up when absolutly noone know how to use a pc in the company
*consulting the boss about webshops and websites in general and finding a decent partner
*and some engineering
Did i mentioned that i studied mechanical engineering? I know nothing about all this, or rather, i know enough to know that i know not enough.
My current side project is creating a small intranet, so creating a new VM in Hyper V, setting up some OS (probably slim CentOS), getting a Webserver running and making it somewhat secure. Then i need to create some content, i am very close to just install a mediawiki and call it a day. If i write anything in PHP i fear that i make way to many erros or just reinvent the wheel, on the other hand, i couldnt find anything resembling what i need. I also had to create the front end side, i knew CSS around 2010, there is probably tons of stuff i dont know and i will make so many errors.
This is frustrating, everything i touch feels like i am venturing the beaten path but noone ever showed me the ropes so everything i do feels like childs play. I need an adult. Also the biggest Question remains: What i am?1 -
I had a wonderful run-in with corporate security at a credit card processing company last year (I won't name them this time).
I was asked design an application that allowed users in a secure room to receive instructions for putting gift cards into envelopes, print labels and send the envelopes to the post. There were all sorts of rules about what combinations of cards could go in which envelopes etc etc, but that wasn't the hard part.
These folks had a dedicated label printer for printing the address labels, in their secure room.
The address data was in a database in the server room.
On separate networks.
And there was absolutely no way that the corporate security folks would let an application that had access to a printer that was on a different network also have access to the address data.
So I took a look at the legacy application to see what they did, to hopefully use as a precedent.
They had an unsecured web page (no, not an API, a web page) that listed the addresses to be printed. And a Windows application running on the users' PC that was quietly scraping that page to print the labels.
Luckily, it ceased to be an issue for me, as the whole IT department suddenly got outsourced to India, so it became some Indian's problem to solve.2 -
For all the hate against windows I built over the now 8 years using linux as my main os. Now I feel windows 10 is quite good.
I got a little beefier desktop lately, been using just laptops from the last 8 years(8D) so I got this urge to get a desktop for gaming, I bought an entry level machine. ryzen 5 2400g, put my lovely linux mint and... the fucking machine was hanging up when the load was too high, and the load was too high too often because react/node etc.
I gave up in less than a day, I just did a quick search and some people said about secure boot or whatnot, some other claimed that ryzen cpus had no problem with mint, I got fed up quickly and did not try any solution with linux. Then I installed windows 10, installed the godamned drivers from the provided dvd ... since then it was a breeze.
The dark mode is gorgeous and no hanging up at all... I'm just sad that mint did not worked soo well. I wanted to have consistency between my laptop/desktop and I loved mint above everything. But well, some things improve while you're not looking at them, win 10 is quite good, I'll keep my desktop as gaming/programming pc with win 10, and well, the laptop will be auxiliar programming machine.
¯\_(ツ)_/¯4 -
So... I finally decided to secure my VPS, so I started with sudo less /var/log/auth.log ...
Short story, not even gonna read every line, just gonna reset my VPS lol10 -
Webmin because why not ✓
Lamp stack ✓
Dynamic DNS client ✓
PhpMyAdmin X
Dear DigitalOcean. SINCE WHEN do you consider a PMA installation
without Https SECURE?
And why the fuck do you make me install an aptitude package that skips both file system AND Apache config cleanup on purging?
It's just a raspberry, but if it runs lamp I want PMA, and if it runs anything, I want Https. Is that too much to ask for from a tutorial source otherwise so reliable that I do anything you say without a questioning thought?8 -
We code hard in these cubicles
My style’s nerd-chic, I’m a programmin’ freak
We code hard in these cubicles
Only two hours to your deadline?
Don’t sweat my technique.
Sippin’ morning coffee with that JAVA swirl.
Born to code; my first words were “Hello World”
Since 95, been JAVA codin’ stayin’ proud
Started on floppy disks, now we take it to the cloud.
On my desktop, JAVA’s what’s bobbin’ and weavin’
We got another winning app before I get to OddEven.
Blazin’ code like a forest fire, climbin’ a tree
Setting standards like I Triple E….
Boot it on up, I use the force like Luke,
Got so much love for my homeboy Duke.
GNU Public Licensed, it’s open source,
Stop by my desk when you need a crash course
Written once and my script runs anywhere,
Straight thuggin’, mean muggin’ in my Aeron chair.
All the best lines of code, you know I wrote ‘em
I’ll run you out of town on your dial-up modem.
Cause…
We code hard in these cubicles
Me and my crew code hyphy hardcore
We code hard in these cubicles
It’s been more than 10 years since I’ve seen the 404.
Inheriting a project can make me go beeee-serk
Ain’t got four hours to transfer their Framework.
The cleaners killed the lights, Man, that ain’t nice,
Gonna knock this program out, just like Kimbo Slice
I program all night, just like a champ,
Look alive under this IKEA lamp.
I code HARDER in the midnight hour,
E7 on the vending machine fuels my power.
Ps3 to Smartphones, our code use never ends,
JAVA’s there when I beat you in “Words with Friends”.
My developing skills are so fresh please discuss,
You better step your game up on that C++.
We know better than to use Dot N-E-T,
Even Dan Brown can’t code as hard as me.
You know JAVA’s gettin’ bigger, that’s a promise not a threat,
Let me code it on your brain
We code hard in these cubicles,
it’s the core component…of what we implement.
We code hard in these cubicles,
Straight to your JAVA Runtime Environment.
We code hard in these cubicles,
Keep the syntax light and the algorithm tight.
We code hard in these cubicles,
Gotta use JAVA if it’s gonna run right.
We code hard in these cubicles
JAVA keeps adapting, you know it’s built to last.
We code hard in these cubicles,
Robust and secure, so our swag’s on blast
CODE HARD10 -
Workarounds are great. I remember one time, I had a server that let anyone access any file as long as the knew the right path. I wanted to store data in a .txt (it wasnt secure passwords or anything, so calmyourtities), but then had access too it. Now, this server wasn't running anything except PHP, so I created a database.php, and within was just some php tags. I ended up modifying the database.php from other PHP scripts and storing all the data as PHP comment, then parsing thru it as I needed, so loading mydomain.biz/database.php wouldn't show the data. ex of my database.php (to all that might not understand because I'm bad at explaining):
<?php
//USER1:DATA1
//USER2:DATA2
?>2 -
RANT!
I still struggle to find the suitable address book software for our company. It supposed to be secure and inexpensive. But how so? It's flipping not possible to have both!
My boss answer to almost everything I say: Just do it! - in German: einfach machen! Please hulp!10 -
Oh god where do I start!?
In my current role I've had horrific experiences with management and higher ups.
The first time I knew it would be a problem: I was on a Java project that was due to go live within the month. The devs and PM on the project were all due to move on at the end. I was sitting next to the PM, and overheard him saying "we'll implement [important key feature] in hypercare"... I blew my top at him, then had my managers come and see if I was OK.
That particular project overran with me and the permanent devs having to implement the core features of the app for 6mo after everyone else had left.
I've had to be the bearer of bad news a lot.
I work now and then with the CTO, my worst with her:
We had implemented a prototype for the CEO of a sister company, he was chuffed with it. She said something like "why is it not on brand" - there was no brand, so I winged it and used a common design pattern that the CEO had suggested he would like with the sister company's colours and logo. The CTO said something like "the problem is we have wilful amateurs designing..." wilful amateurs. Having worked in web design since I was 12 I'm better than a wilful amateur, that one cut deep.
I've had loads with PMs recently, they basically go:
PM: we need this obscure set up.
Me & team: why not use common sense set up.
PM: I don't care, just do obscure set up.
The most recent was they wanted £250k infrastructure for something that was being done on an AWS TC2.small.
Also recently, and in another direction:
PM: we want this mobile app deploying to our internal MDM.
Us: we don't know what the hell it is, what is it!?
PM: it's [megacorp]'s survey filler app that adds survey results into their core cloud platform
Us: fair enough, we don't like writing form fillers, let us have a look at it.
*queue MITM plain text login, private company data being stored in plain text at /sdcard/ on android.
Us: really sorry guys, this is in no way secure.
Pm: *in a huff now because I took a dump on his doorstep*
I'll think of more when I can. -
-Rant-
How do you (not) secure your Rest based web service?
1. Chain it to shady organic authentication system built by a hoard of monkeys high on Tequila.
2. have secret keys that get copy pasted into config flat files, and index them on your code search engine.
3. make the onboarding extremely platform specific that you need 500 environment variables, 50 scripts, 5 fancy device presses and a tap dance to make a GET call to the service.
4. fish through 500 rotating log files that the authentication system generates for each API call made.
5. Leave traces all over the host so if you have to start over, you should sudo rm -rf / and set fire to your computer. -
Dev industry develop so fast. This is because information available anywhere in the internet and people try to learn any programming language they want . But only few know whether they following secure coding practice or not
But the thing is most of Dev people dosent care about security. They focus just to develop a application but not to secure it?2 -
I got notified that tomorrow I'm gonna start a porting project from a FileNet ecosystem.
Well, I don't know what is FileNet, but at least I've enough time to study its architecture. Let's start from the official IBM page:
The FileNet® P8 platform offers enterprise-level scalability and flexibility to handle the most demanding content challenges, the most complex business processes, and integration to all your existing systems. FileNet P8 is a reliable, scalable, and highly available enterprise platform that enables you to capture, store, manage, secure, and process information to increase operational efficiency and lower total cost of ownership.
Thank you IBM, now I surely know how to use FileNet. Well, I hope that wikipedia explains me what it is:
FileNet is a company acquired by IBM, developed software to help enterprises manage their content and business processes.
Oh my god. I tried searching half an hour so far and everything I found was just advertisements and not a clue about what it is.
Then they wonder why I hate IBM so much4 -
I discovered a commit message from one of my (senior) colleagues today. It made me shudder. It read, 'Just adding some changes made outside of source control and deployed (over last 12 months)'.
I genuinely think he can't follow any processes he didn't design. He controls the servers too, so it's not like any pipeline would prevent him from just doing what he wants. It's a bit scary to be honest, he thinks MD5 is a secure password hash! -
I never understood how people have any problems with getting paid for freelancing work, when middleman/escrow platforms like upwork exist, just don't be retarded when applying for a job. I am so sick of those shit ass stories from people telling me "my client didnt pay meeee 😭😭😭" ITS YOUR FAULT. I never had any client not paying, if you don't have the option of escrow, then just fucking put remote execution via "update" system in for fucks sake or give remote control to the client while monitoring it, there is so much fucking ways to secure yourself, just don't be retarded and many clients instantly show their character when talking budget and turnaround time.15
-
I absolutely hate software to the point where I started converting from sysadmin to becoming more like a dev. That way I could just write my own implementations at will. Easier said than done, that's for sure. And it goes both ways.
I think that in order to be a good dev, you need these skills the most:
- Problem solving skills
- Creativity, you're making stuff
- Logical reasoning
- Connecting the dots
- Reading complex documentation
- Breaking down said documentation
- A strong desire to create order and patterns
- ...
If you don't have the above, you may still be able to become a dev.. but it would be harder for sure, and in some cases acceptance will be lower (seriously, learn to Google!)
One thing I don't think you need in development is mathematics. Sure there's a correlation between it and logic reasoning, but you're not solving big mathematical monsters here. At most you'd probably be dealing with arrays and loops (well.. program logic).
Also, written and spoken English! The language of the internet must be known. If it's not your first language, learn it. All the good (and crucial) documentation out there is in English after all.
One final thing would be security in my opinion, since you're releasing your application to the internet and may even run certain services, and deal with a lot of user data. Making those things secure takes some effort and knowledge on security, but it's so worth it. At the most basic level, it requires a certain mindset: "how would I break this thing I just made?"4 -
My very first time was when I first saw a Web page, I really wanted to know how they did it. Two weeks later I built an intranet at home and I thought I was so cool I was shitting out ice cubes.
The very first programme I ever wrote was a secret diary application(C#) for myself I thought it was really secure because I had my own file extension. Not one of my finer moments.4 -
Got one right now, no idea if it’s the “most” unrealistic, because I’ve been doing this for a while now.
Until recently, I was rewriting a very old, very brittle legacy codebase - we’re talking garbage code from two generations of complete dumbfucks, and hands down the most awful codebase I’ve ever seen. The code itself is quite difficult to describe without seeing it for yourself, but it was written over a period of about a decade by a certifiably insane person, and then maintained and arguably made much worse by a try-hard moron whose only success was making things exponentially harder for his successor to comprehend and maintain. No documentation whatsoever either. One small example of just how fucking stupid these guys were - every function is wrapped in a try catch with an empty catch, variables are declared and redeclared ten times, but never used. Hard coded credentials, hard coded widths and sizes, weird shit like the entire application 500ing if you move a button to another part of the page, or change its width by a pixel, unsanitized inputs, you name it, if it’s a textbook fuck up, it’s in there, and then some.
Because the code is so damn old as well (MySQL 8.0, C#4, and ASP.NET 3), and utterly eschews the vaguest tenets of structured, organized programming - I decided after a month of a disproportionate effort:success ratio, to just extract the SQL queries, sanitize them, and create a new back end and front end that would jointly get things where they need to be, and most importantly, make the application secure, stable, and maintainable. I’m the only developer, but one of the senior employees wrote most of the SQL queries, so I asked for his help in extracting them, to save time. He basically refused, and then told me to make my peace with God if I missed that deadline. Very helpful.
I was making really good time on it too, nearly complete after 60 days of working on it, along with supporting and maintaining the dumpster fire that is the legacy application. Suddenly my phone rings, and I’m told that management wants me to implement a payment processing feature on the site, and because I’ve been so effective at fixing problems thus far, they want to see it inside of a week. I am surprised, because I’ve been regularly communicating my progress and immediate focus to management, so I explain that I might be able to ship the feature by end of Q1, because rather than shoehorn the processor onto the decrepit piece of shit legacy app, it would be far better to just include it in the replacement. I add that PCI compliance is another matter that we must account for, and so there’s not a great chance of shipping this in a week. They tell me that I have a month to do it…and then the Marketing person asks to see my progress and ends up bitching about everything, despite the front end being a pixel perfect reproduction. Despite my making everything mobile responsive, iframe free, secure and encrypted, fast, and void of unpredictable behaviors. I tell her that this is what I was asked to do, and that there should have been no surprises at all, especially since I’ve been sending out weekly updates via email. I guess it needed more suck? But either way, fuck me and my two months of hard work. I mean really, no ego, I made a true enterprise grade app for them.
Short version, I stopped working on the rebuild, and I’m nearly done writing the payment processor as a microservice that I’ll just embed as an iframe, since the legacy build is full of those anyway, and I’m being asked to make bricks without straw. I’m probably glossing over a lot of finer points here too, just because it’s been such an epic of disappointment. The deadline is coming up, and I’m definitely going to make it, now that I have accordingly reduced the scope of work, but this whole thing has just totally pissed me off, and left a bad taste about the organization.9 -
I've had a Xiaomi Mi 8 for a few months now. Although I'm impressed by what I got for the amount I paid (a phone that cost about $250 for 6GB RAM, Snapdragon 845, Android 9 and premium build quality is quite a steal), it definitely comes with a consequence.
MIUI (specifically MIUI 11) is godawful. It is single-handedly the worst Android ROM I've ever used since my shitty Android 2.2 phone back around 2010. If you're gonna buy a Xiaomi phone, plan to install Lineage OS on it (but even that's a pain which I'll explain why later).
- Navigation buttons don't hide while watching a video.
Why? God only knows. The ONLY way to bypass without root this is to use its garbage fullscreen mode with gestures, which is annoying as all hell.
- 2 app info pages?
Yeah, the first one you can access just by going to its disaster of a settings app, apps, manage apps and tap on any one.
The 2nd one you can access through the app info button in any 3rd party launcher. Try this: Download Nova launcher, go to the app drawer, hold on any app and tap "app info", and you'll see the 2nd one.
Basically, instead of modifying Android's FOSS source code, they made a shitty overlay. These people are really ahead of their time.
- Can only set lock screen wallpapers using the stock Gallery app
It's not that big an issue, until it is, when whatever wallpaper app you're using only allows you to set the wallpaper and not download them. I think this is both a fuckup on Xiaomi and (insert wallpaper app name here), but why Xiaomi can't include this basic essential feature that every other Android ROM ever made has is beyond me.
- Theming on MIUI 11 is broken
Why do they even bother having a section to customize the boot animation and status bar when there's not one goddamn theme that supports it? At this point you're only changing the wallpaper and icon pack which you can do on any Android phone ever. Why even bother?
They really, REALLY want to be Apple.
Just look at their phones. They're well designed and got good specs, but they don't even care anymore about being original. The notch and lack of a headphone jack aren't features, they're tremendous fuckups by the dead rotting horse known as Apple that died when Steve Jobs did.
Xiaomi tries to build a walled garden around an inherently customizable OS, and the end result is a warzone of an Android ROM that begs for mercy from its creator. Launchers integrate horribly (Does any power user actually use anything that isn't Nova or Microsoft launcher?), 3rd party themes and customization apps need workarounds, some apps don't work at all. People buy from Xiaomi to get a high end budget Android phone at the price of some ads and data collection, not a shitter iOS wannabe.
They really, REALLY want you to have a sim card
If you don't have a sim card and you're using your phone for dev stuff, you're a 2nd class citizen to Xiaomi. Without one, you can't:
- Install adb through adb
- Write to secure settings
- Unlock your bootloader and get away from this trash Android ROM
What's the point? Are they gonna shadow ban you? Does anyone contact them to unlock their bootloader saying "yeah I wanna use a custom rom to pirate lizard porn and buy drugs"? They made this 1000000000x harder than it needs to be for no reason whatsoever. Oh yeah and you gotta wait like a week or something for them to unlock it. How they fucked up this bad is beyond me.
So yeah. Xiaomi. Great phones, atrocious OS.
11 -
THREE DAYS of debugging, reading all the logs I could find, creating tens of new logs in our appliaction, and SUDDENLY an email from your IT admin:
"Hey your CURL requests are being rejected by my !oh so secure! firewall rule".
Not that I haven't said at the beggining, that THIS IS YOUR F...G NETWORK PROBLEM because we get "connection reset by peer" errors, and you ASSURED that everything is CHECKED and OK!
5 -
Imagine a web way ahead of our time where its size goes beyond our imagination...
This is my first rant, and I'll cut to the chase! I don't like how web currently stands. Here's what makes me angry the most altough I know there's a myriad of solutions or workarounds:
- A gazillion credentials/accounts/services in your lifetime.
- Everyone tries to reinvent the wheel.
- There's no single source of truth.
- Why the fuck there's so much design in a vision that started as a network of documents? Why is it that we need to spend time and energy to absorb the page design before we can read what we are after?
- What's up with the JS front end frameworks?! MB's of code I need to download on every page I visit and the worse is the evaluation/parsing of it. Talk about acessibility and the energy bills. I don't freaking need a SPA just give a 20-50ms page load and I'm good to go!
- I understand that there's a whole market based on it but do we really need all that developer tools and services?
- Where's our privacy by the way? Why the fuck do I need ads? Can't I have a clue about what I wan't to buy?
Sticking with this points for now... Got plenty more to discuss though.
What I would like to see:
A unique account where i can subscribe services/forums/whatever. No credentials. Credentials should be on your hardware or OS. Desktop Browser and mobile versions sync everything seemlesly. Something like OpenID.
Each person has his account and a profile associated where I share only what I want with whom I want when I want to.
Sharing stuff individually with someone is easy and secure.
There's no more email system like we know. Email should be just email like it started to be. Why the hell are we allowing companies to send us so much freaking "look at me now, we are awesome", "hey hey buy from me".. Here's an idea, only humans should send emails. Any new email address that sends you an email automatically requests your "permission" to communicate with you. Like a friend request.
Oh by the way did I tell you that static mail is too old for us? What we need is dynamic email. Editing documents on the fly, together, realtime, on the freaking email. Better than mail, slack and google docs combined.
In order for that to work reasonably well, the individual "letter" communication would have to be revamped in a new modern approach.
What about the single source of truth I talked about? Well heres what we should do. Wikipedia (community) and Larry Page (concept) gave us tremendous help. We just need to do better now.
Take the spirit of wikipedia and the discoverability that a good search engine provides us and amp that to a bigger scale. A global encyclopedia about everything known to mankind. Content could be curated from us all just like a true a network.
In this new web, new browser or whatever needed to make this happen I could save whatever I want, notes, files, pictures... and have it as I left it from device to device.
Oh please make web simple again, not easy just simple and bigger.
I'm not old by the way and I don't see a problem with being older btw.
Those are just my stupid rants and ideas. They are worth nothing. What I know for sure is that I'll do something about or fail trying to.12 -
I wanna go back to the age where a C program was considered secure and isolated based on its system interface rathe than its speed. I want a future where safety does not imply inefficiency. I hate spectre and I hate that an abstraction as simple and robust as assembly is so leaky that just by exposing it you've pretty much forfeited all your secrets.
And I especially hate that we chose to solve this by locking down everything rather than inventing an abstraction that's a similarly good compile target but better represents CPUs and therefore does not leak.21 -
I’m back on this platform after an awesome year of progress in my dev career. Here is the back story:
1. I was a junior dev at a financial technologies company for a little over a year.
2. The company was looking to hire an Integration Manager for its software with both our vendors and customers.
3. The pay was good and I was offered that position as a promotion.
4. I accepted it and said to myself that this is temporary. It will help me pay the bills and secure a better life, which it did.
5. Lost two years of my dev career in that position doing nothing but basic integrations (rest apis, web and mobile sdks, and work arounds for what does not work). Zero challenge. This is when I started to use devRant often.
6. On the bright side, the bills were paid and life style got better.
7. Two years in, any way out of the integration department is something I am willing to accept. So I approached every one and worked extra hard as an Application Support Engineer for every product in the firm for free, in the hopes of making good connections and eventually be snatched by someone. This lasted six months.
8. Finally! Got an offer to become the Product Manager for one of the apllications that I supported.
9. Accepted the offer, left the department, and started working with the new team in an Agile fashion. This is when I stopped using devRant because the time was full of work.
10. Five months in, I was leading a team of developers to deliver features and provide the solutions we market. That was an awesome experience and every thing could not have been better.
Except…
Every developer was far better than me, which made me realize that I need to go back on that track, build solutions myself, and become a knowledgable engineer before moving into leading positions.
11. After about a 100 job applications online, I’m back as a Junior developer in another company building both Web and Voice Applications. Very, very happy.
Finally, lessons learned:
1. The path that pays more now is not necessarily the one you wanna take. Plan ahead.
2. There is always a way out. Working for free can get you connections, which can then make you money.
3. Become a knowledgable and experienced engineer before leading other engineers. The difference will show.
4. Love what you do and have fun doing it.
Two cents.1 -
A long time ago you sent me an email with the subject 'I love you', I then got so excited that I forwarded the letter to all my contacts, and they forwarded it too.. I can't describe the words for the feelings I had back then for you. I felt into love with you, really. But there were always troubling moments for me.
For example when 'Code Red' showed up and found your backdoor. Man I was pissed at that time. I didn't know what to do next. But things settled, and we found each other again.
And then that other time when this girl named 'Melissa' was sending me some passwords to pr0n sites, I couldn't resist. She was really awesome, but you know, deep in my heart that was not what I wanted. I somehow managed to go back to you and say sorry. We even moved together in our first flat, and later in our own house. That was a really good time, I love to think back at those moments.
Then my friend 'Sasser' came over to us one night, do you remember how he claimed that big shelf in our living room, and overflooded it with his own stuff, so that we haven't a clue we are reading yet offshelve? Wow that was a disturbing experience.
But a really hard time has come when our dog 'Zeus' got kicked by this ugly trojan horse. I really don't want go into details how the mess looked like after we discovered him on our floor. Still, I am very sorry for him that he didn't survived it :(
Some months later this guy named 'Conficker' showed up one day. I shitted my pants when I discovered that he guessed my password on my computer and got access to all my private stuff on it. He even tried to find some network shares of us with our photos on it. God, I was happy that he didn't got access to the pics we stored there. Never thought that our homemade photos are not secure there.
We lived our lives together, we were happy until that day when you started the war. 'Stuxnet..'! you cried directly in my face, 'you are gonna blow up our centrifuges of our life', and yeah she was right. I was in a real bad mood that days back then. I even not tried to hide my anger. But really, I don't know why all this could happen. All I know is, that it started with that cool USB stick I found on the stairs of our house. After that I don't remember anything, as it is just erased from my memory.
The years were passing. And I say the truth here, we were not able to manage the mess of our relationship. But I still loved you when you opened me that you will leave. My 'Heartbleed' started immediately, you stabbed it where it causes the most pain, where I thought that my keys to your heart are secured. But no, you stabbed even harder.
Because not long after that you even encrypted our private photos on our NAS, and now I am really finished, no memory which can be refreshed with a look at our pictures, and you even want my money. I really 'WannaCry' now... -
When the CTO/CEO of your "startup" is always AFK and it takes weeks to get anything approved by them (or even secure a meeting with them) and they have almost-exclusive access to production and the admin account for all third party services.
Want to create a new messaging channel? Too bad! What about a new repository for that cool idea you had, or that new microservice you're expected to build. Expect to be blocked for at least a week.
When they also hold themselves solely responsible for security and operations, they've built their own proprietary framework that handles all the authentication, database models and microservice communications.
Speaking of which, there's more than six microservices per developer!
Oh there's a bug or limitation in the framework? Too bad. It's a black box that nobody else in the company can touch. Good luck with the two week lead time on getting anything changed there. Oh and there's no dedicated issue tracker. Have you heard of email?
When the systems and processes in place were designed for "consistency" and "scalability" in mind you can be certain that everything is consistently broken at scale. Each microservice offers:
1. Anemic & non-idempotent CRUD APIs (Can't believe it's not a Database Table™) because the consumer should do all the work.
2. Race Conditions, because transactions are "not portable" (but not to worry, all the code is written as if it were running single threaded on a single machine).
3. Fault Intolerance, just a single failure in a chain of layered microservice calls will leave the requested operation in a partially applied and corrupted state. Ger ready for manual intervention.
4. Completely Redundant Documentation, our web documentation is automatically generated and is always of the form //[FieldName] of the [ObjectName].
5. Happy Path Support, only the intended use cases and fields work, we added a bunch of others because YouAreGoingToNeedIt™ but it won't work when you do need it. The only record of this happy path is the code itself.
Consider this, you're been building a new microservice, you've carefully followed all the unwritten highly specific technical implementation standards enforced by the CTO/CEO (that your aware of). You've decided to write some unit tests, well um.. didn't you know? There's nothing scalable and consistent about running the system locally! That's not built-in to the framework. So just use curl to test your service whilst it is deployed or connected to the development environment. Then you can open a PR and once it has been approved it will be included in the next full deployment (at least a week later).
Most new 'services' feel like the are about one to five days of writing straightforward code followed by weeks to months of integration hell, testing and blocked dependencies.
When confronted/advised about these issues the response from the CTO/CEO
varies:
(A) "yes but it's an edge case, the cloud is highly available and reliable, our software doesn't crash frequently".
(B) "yes, that's why I'm thinking about adding [idempotency] to the framework to address that when I'm not so busy" two weeks go by...
(C) "yes, but we are still doing better than all of our competitors".
(D) "oh, but you can just [highly specific sequence of undocumented steps, that probably won't work when you try it].
(E) "yes, let's setup a meeting to go through this in more detail" *doesn't show up to the meeting*.
(F) "oh, but our customers are really happy with our level of [Documentation]".
Sometimes it can feel like a bit of a cult, as all of the project managers (and some of the developers) see the CTO/CEO as a sort of 'programming god' because they are never blocked on anything they work on, they're able to bypass all the limitations and obstacles they've placed in front of the 'ordinary' developers.
There's been several instances where the CTO/CEO will suddenly make widespread changes to the codebase (to enforce some 'standard') without having to go through the same review process as everybody else, these changes will usually break something like the automatic build process or something in the dev environment and its up to the developers to pick up the pieces. I think developers find it intimidating to identify issues in the CTO/CEO's code because it's implicitly defined due to their status as the "gold standard".
It's certainly frustrating but I hope this story serves as a bit of a foil to those who wish they had a more technical CTO/CEO in their organisation. Does anybody else have a similar experience or is this situation an absolute one of a kind?2 -
Under the guise of being security conscious, our section had a informal "doughnut charter" whereby if you leave your computer unlocked and someone managed to send an email to the section (cc'ing you) shouting everyone doughnuts then you must comply with the "promise". I was referred to at the time as the "god of email" and everyone knew not to do it to me or I would retaliate. This is because it happened once before. In that case, I set up a secure hidden rule in the person's email so that if they received a doughnut email they would automatically send a doughnut email from them... this also meant it was possible to trigger it at any time. They quickly begged for it to be removed. From then on, no dared touch my unlocked computer. When we got a new boss he was informed of the charter and was repeatedly warned not to 'doughnut' me but one day he ignored the warnings. In his case I set up a rule so that if he sent any email, he also sent out a doughnut email as well. Over the next four days he sent sooo many doughnut emails... He went from happy, to frustrated, to angry and then simply desperate. No one dared tell him I was my doing... He eventually came out of his office and begged for it to stop... Seeing his desperation, I stopped it. He was very appreciative but never put two-and-two together (that his actions caused it). He didn't find out till three months later that I was the one who did it to him. That was the second and last time I was ever doughnut'd.
-
So, WPA2 was proven not fully secure. Wonder how much time it will take for most devices to be patched...2
-
I just got my third 128GB MicroSD card off Amazon, this time SanDisk. Yet again, trying to do anything not involving the OEM full-disk exFAT partition staying intact (which, fuck that, all that uses that is Windows and Linux, i'm looking for splitting this thicc bih up) shifts EVERYTHING, including MBR+PT/GPT down the disk by 16MB exactly inserting data from... the atmosphere? whatever's using it? ...do SD cards have that secure key/DRM store space thing still?
(EDIT: I do verify that they ARE genuinely the right size after purchasing before reformatting or repartitioning, by the way.)
First it was a Silicon Power card, then a Samsung card, now a SanDisk.
(Also, why all S?)
Luckily, this time it wasn't a pain in the ass to get it to read as anything but "Bad Card" or a 0-byte/empty/non-existent device in Windows/Linux (respectively) so I was able to see that it was indeed the same issue without taking 3 days to jump through device hoops to finally get it to do it again but in such a way that it shifts out and back in all zeroes.2 -
Pentesting for undisclosed company. Let's call them X as to not get us into trouble.
We are students and are doing our first pentest at an actual company instead of assignments at school. So we're very anxious. But today was a good day.
We found some servers with open ports so we checked a few of them out. I had a set of them with a bunch of open ports like ftp and... 8080. Time to check this out.
"please install flash player"... Security risk 1 found!
System seemed to be some monitoring system. Trying to log in using admin admin... Fucking works. Group loses it cause the company was being all high and mighty about being secure af. Other shit is pretty tight though.
Able to see logs, change password, add new superuser, do some searches for USERS_LOGGEDIN_TODAY! I shit you not, the system even had SUGGESTIONS for usernames to search for. One of which had something to do with sftp and auth keys. Unfortunatly every search gave a SQL syntax error. Used sniffing tools to maybe intercept message so we could do some queries of our own but nothing. Query is probably not issued from the local machine.
Tried to decompile the flash file but no luck. Only for some weird lines and a few function names I presume. But decompressing it and opening it in a text editor allowed me to see and search text. No GET or POST found. No SQL queries or name checks or anything we could think of.
That's all I could do for today. So we'll have to think of stuff for next week. We've already planned xss so maybe we can do that on this server as well.
We also found some older network printers with open telnet. Servers with a specific SQL variant with a potential exploit to execute terminal commands and some ftp and smb servers we need to check out next week.
Hella excited about this!
If you guys have any suggestions let us know. We are utter noobs when it comes to this.6 -
Officially faster bruteforcing:
https://pastebin.com/uBFwkwTj
Provided toy values for others to try. Haven't tested if it works with cryptographic secure prime pairs (gcf(p, q) == 1)
It's a 50% reduction in time to bruteforce a semiprime. But I also have some inroads to a/30.
It's not "broke prime factorization for good!" levels of fast, but its still pretty nifty.
Could use decimal support with higher precision so I don't cause massive overflows on larger numbers, but this is just a demonstration after all.10 -
I can be manipulated. Yes, I’m now more resilient to manipulation than ever because I’m autistically good at recognising patterns, yet I’m not perfect.
For a manipulator, there is just one problem — now and then, my disorder obliterates my entire worldview, together with the foreign manipulative framework, so I can start with a blank slate. It protects me. Yes, this protection is akin to our body’s “we’ll boil all the germs in our own blood” tactic that instead of defining winners and losers only leave survivors, yet the force is unstoppable. You cannot secure the land that is hit by a tornado every three months.
That inner Nemesis is so strong that it even defeated a complex, almost fractal-like manipulation of my own mother that I lived in since birth, leaving her with a wound that will never heal. Wannabe manipulator exes didn’t even stand a chance. I don’t care if that force destroys me or not, as during that time, there is no “me”.
About my mom, long story short, she told me “I want to stop treating my cancer to die as soon as possible just to not see you anymore” after my coming-out. Full story is here:
- part 1: https://devrant.com/rants/4923052/...
- part 2: https://devrant.com/rants/4924040/...5 -
My university has "Economics and Technic" on its name and it straight up fails on the technical side.
We don't have proper wifi because nobody from the management wants to be responsible for whatever the fuck students do, so they borrow the public (not secure/shitty) wifi from the state for us. Great. We could also use Eduroam, except it only works OUTSIDE of the university for some fujing reason.
Also, our classrooms don't have plugs to charge our notebooks so that's not an option, I guess they just think: "well if they can't use their notebooks they might as well not use any internet at all".
With the heatwave in Europe the servers almost fried bcs management was not sure if they should turn it off or not. We got no server a day.
To top it off, for some reason, every time I access the Intranet from the university it won't login and it literally blocks my dns requests. FANTASTICAL. I even tried restoring my computer and it does the same shit, so I just gave up on it entirely.
TL;DR: My university has shitty IT-Infrastructure and I need to rant about it.
Thank you for sharing ze pain™6 -
How do you guys fight the urge to just screw it and implement a not so secure way of doing things, when you've been fighting with a bug for weeks?
No one would know!! 😂1 -
Someone mentioned that client want to use wordpress instead of they current website because it is cheaper! Ok lets see how cheap it is.. each time wp release update after updating you need go through all website and check if nothing is broken.. plugins will need update as well because usually they run on specific wp version. Fixing theme and plugins requires dev time.. despite all those things.. have common sense. Maybe it is good for some type of business to host few pages without any business logic or use as blog without scare to loose everything and do not store users data.. someone mentioned that it is secure to run anything because updates are the best security to avoid security breaches. So why banks are not running on WP? Why health service is not using WP?
-
I am trying to "invent" secure client-side authentication where all data are stored in browser encrypted and only accessible with the correct password. My question is, what is your opinion about my idea. If you think it is not secure or there is possible backdoor, let me know.
// INPUT:
- test string (hidden, random, random length)
- password
- password again
// THEN:
- hash test string with sha-512
- encrypt test string with password
- save hash of test string
// AUTH:
- decrypt test string
- hash decrypted string with sha-512
- compare hashes
- create password hash sha-512 (and delete password from memory, so you cannot get it somehow - possible hole here because hash is reversible with brute force)
// DATA PROCESSING
- encrypt/decrypt with password hash as secret (AES-256)
Thanks!
EDIT: Maybe some salt for test string would be nice8 -
So yesterday I installed Arch. Well, sort of. So far the GUI isn't configured so it's literally less convenient than an equally unconfigured TTY. But I'm getting there, today I connected to a secure Wi-Fi network. Tomorrow I expect to install something for power efficiency and start configuring stuff/creating a proper DE. Last time, when I stripped down Ubuntu and installed i3wm there, the first thing that bothered me was the lack of a wallpaper so I never got to issues like the keyring not unlocking, the x11 default font being two physical pixels tall, or added peripherals not being handled. This time my plan is to solve every issue as soon as I get there. For this reason I'll use a queue for managing my tasks rather than a stack like Google Keep.10
-
While attempting to quit smoking and after spending a full day trying to understand why the previous devs took this approach to encrypting a string and my lack of nicotine addled brain not allowing me to see that this was a “Secure”String and so uses a machine specific key (that’s why the code that worked locally wouldn’t run on production 😑) this is my rant on comments added to the helper I had to write
/// <summary>
/// If you are using this class and it's not for backward compatibility - then you probably shouldn't be using it
/// Nothing good comes from "Secure" strings
/// Further to this Secure strings are only "useful" for single user crypto as the encryption uses the login creds, transferring
/// this data to another client will result in them never being able to decrypt it
///
/// Windows uses the user's login password to generate a master key.
/// This master key is protected using the user's password and then stored along with the user's profile.
/// This master key then gets used to derive a number of other keys and it's these other keys that are used to protect the data.
///
/// This is also a broken crypto method via injection (see Hawkeye http://hawkeye.codeplex.com/) plus the string is stored in plain
/// text in memory, along with numerous other reasons not to use it.
/// </summary>
public class SecureStringHelper
{3 -
I'm 22 years old and 1.5 years into my first Startup Job. (and second Dev job)
I feel kind of uncomfortable now and I would like to ask your opinions.
I'll start with the work related description of my situation and later add a bit of my life situation.
I develop as hobby since I can think. I'm pretty engaged and love to do things right. So I quickly found myself in the position of the de-facto lead fullstack Developer.
Although, to be clear, were only a few devs - which are now replaced by not so many other devs. I feel often like the only person able to design and decide and implement in a way that won't kill us later (and I spend half of my time fixing technical debt).
I mostly like what I do , because it's a challenge and I feel needed. I learn new things and I am pretty flexible in work time. (but I also often work till late in the night, sacrificing friendship time)
But there are so many things I would love to do and used to do, but now I have no motivation to develop outside of my job.
I don't really feel that what my company is doing is something I find valuable. (Image rights management)
I earn pretty well - in comparison to what I'm used to: 20€/hour, Brutto 2.800 / month for 32 hours a week. In Berlin. (Minus tax and stuff it's 1.800€). It's more than enough for what I need.
But when I see what others in similar positions earn (~4.000), I feel weird. I got promised a raise since nearly a year now. I don't feel I could demand it. I also got the hint that I could get virtual shares. But nothing happened.
Now what further complicates the situation is that I will go to Portugal in April for at least half a year, for joining a social project I love. My plan used to be that I work from there for a few hours a week - but I'm starting to hesitate as I fear that I will actually work more and it will keep me from fully being there.
So, I kind of feel emotionally attached - I like (some of) the people, I know (or at least believe) that the company will have a big problem without me. (I hold a lot of the knowledge for legacy applications) .
But I also feel like I'm putting too much of myself into the company and it is not really giving me back. And it's also not so much worth it... Or is it?
Should I stick to the company and keep my pretty secure position and be financially supported during my time in Portugal, while possibly sacrificing my time there?
Should I ask for a raise (possibly even retroactively) and then still quit later? (they will probably try to get my 1 month of cancelation period upped to 3).
Also, is this a risk for my "career"?question work-life what? purpose startup safety hobby work-life balance life career career advice bugfixing7 -
I am looking for new programming language to learn and I found D language. It looks interesting but I think that community is weak and there is lack of some usefull libraries.
For example I can not find secure PRNG.
So my questions are:
> Have you any experience with this language?
> It is worth to learn?3 -
So tired of explaining other stupid developers that POST is not more secure than GET in a ReST api. I have heard many times if you use GET you will be hacked :|
-
Im having a sort of dilema. I recently started taking freelance work for web developement (and design ack) and Im uncomfortable with the state of the industry. Ill explain: Say if I bid a client for a simple 1-3 page site w contact form (a new page, not migration) My suggestion is to use djangocms, django, or just static html/css/js (ie bootstrap), which produces clean, fairly secure, and fast sites. Of course I can throw a templated unoriginal wordpress site together in a few hours 2 days latest, so I offer that option as a sidenote on the bid, charging almost 2x more. For some reason I dont understand they choose the wp shitshow. I explain all the reasons that not the way to go( which I wont list, if u dont know, u never used it. google up) but they dont care abt the details, they rather pay more for shit job. OFC I reluctantly deliver what they want, but as a result my portfolio is full of unoriginal shit Im not happy showing off. I have a few sites Ive done on the side my prefered way, but they not deployed and sit in my github for all intents n purposes unviewable to potential clients.
I want to be proud of my portfolio, and it to be a representation of what Im capable of. BUT, I gotta eat, and work is better than no work.
There are so many "wordpress designers" oversaturaring the field and it lowering the overall standard of what we are capable of. I just begining my dev journey, but if I cant have a body of work Im proud of, theres no way I can see doing this the rest of my life, and that makes me really sad. My love of developing, coding, and IT/computers in general drove me to change careers from audio engineering to web development, and the fact that this fucking mr. potatoe head of a CMS is slowly turning that love into hate really pisses me off. So Im ending this !rant looking for hope.
Your thoughts?1 -
I spent 4 months in a programming mentorship offered by my workplace to get back to programming after 4 years I graduated with a CS degree.
Back in 2014, what I studied in my first programming class was not easy to digest. I would just try enough to pass the courses because I was more interested in the theory. It followed until I graduated because I never actually wrote code for myself for example I wrote a lot of code for my vision class but never took a personal initiative. I did however have a very strong grip on advanced computer science concepts in areas such as computer architecture, systems programming and computer vision. I have an excellent understanding of machine learning and deep learning. I also spent time working with embedded systems and volunteering at a makerspace, teaching Arduino and RPi stuff. I used to teach people older than me.
My first job as a programmer sucked big time. It was a bootstrapped startup whose founder was making big claims to secure funding. I had no direction, mentorship and leadership to validate my programming practices. I burnt out in just 2 months. It was horrible. I experienced the worst physical and emotional pain to date. Additionally, I was gaslighted and told that it is me who is bad at my job not the people working with me. I thought I was a big failure and that I wasn't cut out for software engineering.
I spent the next 6 months recovering from the burn out. I had a condition where the stress and anxiety would cause my neck to deform and some vertebrae were damaged. Nobody could figure out why this was happening. I did find a neurophyscian who helped me out of the mental hell hole I was in and I started making recovery. I had to take a mild anti anxiety for the next 3 years until I went to my current doctor.
I worked as an implementation engineer at a local startup run by a very old engineer. He taught me how to work and carry myself professionally while I learnt very little technically. A year into my job, seeing no growth technically, I decided to make a switch to my favourite local software consultancy. I got the job 4 months prior to my father's death. I joined the company as an implementation analyst and needed some technical experience. It was right up my alley. My parents who saw me at my lowest, struggling with genetic depression and anxiety for the last 6 years, were finally relieved. It was hard for them as I am the only son.
After my father passed away, I was told by his colleagues that he was very happy with me and my sisters. He died a day before I became permanent and landed a huge client. The only regret I have is not driving fast enough to the hospital the night he passed away. Last year, I started seeing a new doctor in hopes of getting rid of the one medicine that I was taking. To my surprise, he saw major problems and prescribed me new medication.
I finally got a diagnosis for my condition after 8 years of struggle. The new doctor told me a few months back that I have Recurrent Depressive Disorder. The most likely cause is my genetics from my father's side as my father recovered from Schizophrenia when I was little. And, now it's been 5 months on the new medication. I can finally relax knowing my condition and work on it with professional help.
After working at my current role for 1 and a half years, my teamlead and HR offered me a 2 month mentorship opportunity to learn programming from scratch in Python and Scrapy from a personal mentor specially assigned to me. I am still in my management focused role but will be spending 4 hours daily of for the mentorship. I feel extremely lucky and grateful for the opportunity. It felt unworldly when I pushed my code to a PR for the very first time and got feedback on it. It is incomparable to anything.
So we had Eid holidays a few months back and because I am not that social, I began going through cs61a from Berkeley and logged into HackerRank after 5 years. The medicines help but I constantly feel this feeling that I am not enough or that I am an imposter even though I was and am always considered a brilliant and intellectual mind by my professors and people around me. I just can't shake the feeling.
Anyway, so now, I have successfully completed 2 months worth of backend training in Django with another awesome mentor at work. I am in absolute love with Django and Python. And, I constantly feel like discussing and sharing about my progress with people. So, if you are still reading, thank you for staying with me.
TLDR: Smart enough for high level computer science concepts in college, did well in theory but never really wrote code without help. Struggled with clinical depression for the past 8 years. Father passed away one day before being permanent at my dream software consultancy and being assigned one of the biggest consultancy. Getting back to programming after 4 years with the help of change in medicine, a formal diagnosis and a technical mentorship.3 -
fuck.. FUCK FUCK FUCK!!!
I'mma fakin EXPLODE!
It was supposed to be a week, maybe two weeks long gig MAX. Now I'm on my 3rd (or 4th) week and still got plenty on my plate. I'm freaking STRESSED. Yelling at people for no reason, just because they interrupt my train of thought, raise a hand, walk by, breathe, stay quiet or simply are.
FUCK!
Pressure from all the fronts, and no time to rest. Sleeping 3-5 hours, falling asleep with this nonsense and breaking the day with it too.
And now I'm fucking FINALLY CLOSE, I can see the light at the end of the tunne<<<<<TTTOOOOOOOOOOOOOTTTTT>>>>>>>
All that was left was to finish up configuring a firewall and set up alerting. I got storage sorted out, customized a CSI provider to make it work across the cluster, raised, idk, a gazillion issues in GH in various repositories I depend on, practically debugged their issues and reported them.
Today I'm on firewall. Liason with the client is pressured by the client bcz I'm already overdue. He propagates that pressure on to me. I have work. I have family, I have this side gig. I have people nagging me to rest. I have other commitments (you know.. eating (I practically finish my meal in under 3 minutes; incl. the 2min in the µ-wave), shitting (I plan it ahead so I could google issues on my phone while there), etc.)
A fucking firewall was left... I configured it as it should be, and... the cluster stopped...clustering. inter-node comms stopped. `lsof` shows that for some reason nodes are accessing LAN IPs through their WAN NIC (go figure!!!) -- that's why they don't work!!
Sooo.. my colleagues suggest me to make it faster/quicker and more secure -- disable public IPs and use a private LB. I spent this whole day trying to implement it. I set up bastion hosts, managed to hack private SSH key into them upon setup, FINALLY managed to make ssh work and the user_data script to trigger, only to find out that...
~]# ping 1.1.1.1
ping: connect: Network is unreachable
~]#
... there's no nat.
THERE"S NO FUCKING NAT!!!
HOW CAN THERE BE NO NAT!?!?!????? MY HOME LAPTOP HAS A NAT, MY PHONE HAS A NAT, EVEN MY CAT HAS A MOTHER HUGGING NAT, AND THIS FUCKING INFRA HAS NO FUCKING NAT???????????????????????
ALready under loads of pressure, and the whole day is wasted. And now I'll be spending time to fucking UNDO everything I did today. Not try something new. But UNDO. And hour or more for just that...
I don't usually drink, but recently that bottom shelf bottle of Captain Morgan that smells and tastes like a bottle of medical spirit starts to feel very tempting.
Soo.. how's your dayrant overdue tired no nat hcloud why there's no nat???? fuck frustrated waiting for concrete to settle angry hetzner need an outlet2 -
TLDR, i am not performing as I used to in my job before i made my side hussle and idk if i should do anything about it.
every since covid started and companies started laying off people, I started realizing im in danger when no company was able to match my current salary, and the ones that do would, make me do a hunger games hackerrank competition with thousands of other people which I don't really wanna take part of..
My company even laid off a lot of people due to budget cuts a while back and i didn't feel secure at all, and knowing that i might end up with less salary should i get fired and settle for the next company that accepts me, kinda made me lose any trust i had for the whole being an employee thing... I have financial goals i want to meet and depending on this one company to not fire me is scary...
I registered a tech company and hoped I could take on some high budget projects, got nothing the first year but slowly i started getting some projects and now im hiring contractors to help with projects and its going great and im really happy and excited about it.
But i often need to manage said contractors, have calls with clients and even do some coding myself. Some of that i end up having to do in secret in my company time... we work in a big co-working space so i get to sneak into a meeting booth and do all that.
my manager lives in another country and basically im in a situation where i can get away with it without anyone noticing.
However, I used to be one of the top contributors in the company. I used to finish a butt load of tasks every day and i ended up being promoted to manager, but i still get some coding tasks. But generally, if it weren't for my side hussle i would still be a top contributor and shine like i used to, but now i mostly do what is expected on me, and im afraid someone would ask me at some point why im not as productive as I used to be.
nobody asked me anything but i just feel kinda guilty and miss having the one job to focus on and taking credit for a lot of things and helping everyone, but at the same time i dont trust that the company cares about me enough to give me any guarantees or stocks or bonuses so i feel i need to keep growing my side hussle to have a safety net..
thank you for reading my rant1 -
Asking for a friend: Well actually a friend asked me (since "I'm good with computers", you know it ;)) and no real solution came to my mind, so I thought, why not ask the internet
Anyways. She's an artist and does a project (kind of a documentation) about the Egyptian revolution. She currently lives in Europe but still has her Egypian passport. As an Egyptian national, she fears, that she could be holden back for a while and have her laptop/external HD with all the photos/videos/interviews confiscated and/or searched. She asked me for help to have a "backup solution".
The requirements: a way to backup work (from a mac) to a secure location (I would offer my server running linux for it).
The upload would have to be encrypted (if possible, I suggested to use a VPN, is this enough?)
Access to the files should only be granted if you have the propper password (in my opinion the VPN tunnel should work here too, as when it's down, you can't just reopen it without a password.
What are your thoughts on this?10 -
The importance of not using static salt / IVs.
I've been working on a project that encrypts files using a user-provided password as key. This is done on the local machine which presents some challenges which aren't present on a hosted environment. I can't generate random salt / IVs and store them securely in my database. There's no secure way to store them - they would always end up on the client machine in plain text.
A naive approach would be to use static data as salt and IV. This is horrendously harmful to your security for the reason of rainbow tables.
If your encryption system is deterministic in the sense that encrypting / hashing the same string results in the same output each time, you can just compile a massive data set of input -> output and search it in no time flat, making it trivial to reverse engineer whatever password the user input so long as it's in the table.
For this reason, the IVs and salt are paramount. Because even if you generate and store the IVs and salt on the user's computer in plaintext, it doesn't reveal your key, but *does* make sure that your hashing / encryption isn't able to be looked up in a table1 -
This is not a rant. Not really. It's more expressing my own insecurity with a certain topic, which somehow upsets me sometimes (the insecurity, not the topic though).
I have nearly no knowledge about security/privacy stuff. I mean, yeah, I know how to choose secure passwords and don't make stupid DAU mistakes. The very basics you would expect someone to have after a CS bachelor's degree.
But other than that... Nothing. And I would like to get a bit into that stuff, but I have no clue where to start. First getting my head wrapped around low-level stuff like network layers? Or something completely else.
This topic is so intimidating to me as it seems huge, I have no idea where to start, and I feel that if you don't have "full" knowledge, you are going to make mistakes which you might not even notice.
I sometimes get really scared about having an account hijacked or similar. Also in our job it seems to become more and more of a topic we should know about.
Anybody got any advice?
I am looking for a way to improve my knowledge in security in general for professional reasons and my knowledge about privacy for private reasons.
It's just, every time I start reading something related it seems that I am lacking some other knowledge etc...10 -
I made a wordpress website to one of my friends long time back as he wants to teach online and sell his videos. (he is studying MBBS)
Yesterday suddenly he calls me and says our site has been compromised and its not longer secure.
Me: After seeing screenshot, no actually site doesn't have ssl and in recent chrome updates http site is being flagged.
He: Okay, I saw video on youtube how to buy ssl.
Me: its not just installing the certs, all the links and images has to be on https so it will take sometime for me.
He: Today, Website is no longer opening please help after putting ssl as per the video...
Me: What the hell? Who asked you to do that? Are you nuts?
He:................. Sorry, 😐2 -
My school is awesome, their network infrastructure is so secure (not),
that you can easily control other people's desktops with Windows' basic tools. -
This is the story of probably the least secure CMS ever, at least for the size of it's consumer base. I ran into this many years ago, before I knew anything about how websites work, and the CMS doesn't exist anymore, so I can't really investigate why everything behaved so strangely, but it was strange.
This CMS was a kind of blog platform, except only specially authorised users could view it. It also included hosting. I was helping my friend set it up, and it basically involved sending everybody who was authorized a email with a link to create an account.
The first thing my friend got complaints about was the strange password system. The website had two password boxes, with a limit of (I think) 5 characters each. So when creating a account we recomended people simply insert the first 5 characters in the first box, and the rest in the second. I can not really think of a good explanation for this system, except maybe a shitty way to make sure password are at least 5 characters? Anyway, since this website was insecure the password was emailed to you after the account was created. This is not yet the WTF part.
The CMS forced sidebar with navigation, it also showed the currently logged in users. Except for being unreadable due to a colorful background image, there where many strange behaviors. The sidebar would generally stay even when navigating to external websites. Some internal links would open a second identical sidebar right next to the third. Now, I think that the issue was the main content was in an iframe with the sidebar outside it, but I didn't know about iframe's back then.
So far, we had mostly tested on my friends computer, which was logged in as the blog administrator. At some point, we tried testing with a different account. However, the behavior of sidebars was even stranger now. Now internal links that had previously opened a second, identical sidebar opened a sidebar slightly different from the first: One where the administrator was logged in.
We expirimented somewhat, and found that by clicking links in the second sidebar, we could, with only the login of a random user, change and edit all the settings of the site. Further investigation revealed these urls had a ending like ?user=administrator2J8KZV98YT where administrator was the my friends username. We weren't sure of the exact meaning of the random digits at the end, maybe a hash of the password?
Despite my advice, my friend decided to keep using this CMS. There was also a proper way to do internal links instead of copying the address bar, and he put a warning up not to copy links to on the homepage. Only when the CMS shut down did he finally switch to a system where formatting a link wrong could give anybody admin access. -
Java Life Rap Video
https://m.youtube.com/watch/...
SPOKEN:
In the cubicles representin’ for my JAVA homies…
In by nine, out when the deadlines are met, check it.
CHORUS:
We code hard in these cubicles
My style’s nerd-chic, I’m a programmin’ freak
We code hard in these cubicles
Only two hours to your deadline? Don’t sweat my technique.
Sippin’ morning coffee with that JAVA swirl.
Born to code; my first words were “Hello World”
Since 95, been JAVA codin’ stayin’ proud
Started on floppy disks, now we take it to the cloud.
On my desktop, JAVA’s what’s bobbin’ and weavin’
We got another winning app before I get to OddEven.
Blazin’ code like a forest fire, climbin’ a tree
Setting standards like I Triple E….
Boot it on up, I use the force like Luke,
Got so much love for my homeboy Duke.
GNU Public Licensed, it’s open source,
Stop by my desk when you need a crash course
Written once and my script runs anywhere,
Straight thuggin’, mean muggin’ in my Aeron chair.
All the best lines of code, you know I wrote ‘em
I’ll run you out of town on your dial-up modem.
CHORUS:
‘Cause…
We code hard in these cubicles
Me and my crew code hyphy hardcore
We code hard in these cubicles
It’s been more than 10 years since I’ve seen the 404.
Inheriting a project can make me go beeee-serk
Ain’t got four hours to transfer their Framework.
The cleaners killed the lights, Man, that ain’t nice,
Gonna knock this program out, just like Kimbo Slice
I program all night, just like a champ,
Look alive under this IKEA lamp.
I code HARDER in the midnight hour,
E7 on the vending machine fuels my power.
Ps3 to Smartphones, our code use never ends,
JAVA’s there when I beat you in “Words with Friends”.
My developing skills are so fresh please discuss,
You better step your game up on that C++.
We know better than to use Dot N-E-T,
Even Dan Brown can’t code as hard as me.
You know JAVA’s gettin’ bigger, that’s a promise not a threat,
Let me code it on your brain
WHISPERED:
so you’ll never forget.
CHORUS:
We code hard in these cubicles,
it’s the core component…of what we implement.
We code hard in these cubicles,
Straight to your JAVA Runtime Environment.
We code hard in these cubicles,
Keep the syntax light and the algorithm tight.
We code hard in these cubicles,
Gotta use JAVA if it’s gonna run right.
We code hard in these cubicles
JAVA keeps adapting, you know it’s built to last.
We code hard in these cubicles,
Robust and secure, so our swag’s on blast
CODE HARD1 -
Is it so much to ask to feel appreciated and secure at a job if you make sacrifices and endure ridiculous stress of ownership and responsibility?
Why do I have to constantly go through life wondering if my name is going to be a top level item on a budget sheet ready for the cut ? And then I’m not supposed to be upset
Just work to the end like a good little monkey and HOPE I Have another job on its way1 -
Everything I know is self taught... From a time I dunno when I'm 20, so likely just after the year 2000
From my perspective I think different from most devs more formally trained, which can be to my advantage , the downside of this I'm terrible with names, everything in computing has a anagram.
I'm bad with names anyway... Dyslexic 😉. But if explained to me I know what it is your on about.
I consider myself a good dev, not experienced but otherwise good. But I want to be the best...
I'm also a hacker (nice one) which I think helps me build better more secure programs knowing common vulnerabilitys
I'm proud of what I've achieved so far. Whilst I'm not perfect nor is my work that's what I work towards ... As should every dev -
Okay this is my first time posting on this site. I've browsed it (definitely not in class) and the community looks beautiful, so I'm going to just kind of slide in here. Anyways this is the part where I use my caps lock button and type lots of naughty words I guess...
<rant type = 'school'>
Our programming classes are fucking DISMAL uuugh... Okay so we have four technology classes: Tech Exploration, Coding 1, Coding 2, and Intro to CS (a 'high school' level class)... So this means a fuck ton of kids in programming classes, mostly because I WANNA MAKE MINCERAFT AND BE A KEWL BOI LIKE GAME DEV BUT I'M ALSO A FUCKING IDIOT AND WILL NOT LEARN ANYTHING YAAAAAAY but that's a mood and so there's a fucking tidal wave of dumb kids in these classes. So right we're dealing with like 80 kids per class period. Sorry if I'm repeating myself but there are a FUCKTON of students. Now, we have... wait for it... ONE FUCKING TEACHER. ONE. I fucking swear this district does not give a SINGLE SHIT about possibly THE SINGLE FUCKING MOST IMPORTANT SUBJECT WHYYYYYY... Okay so the teacher is kinda overworked as fuck lol. She can't really teach eighty kids at once so she mostly gives us exercises from websites but when she can she teaches us shit herself and actually knows a good bit about her field of study. She's usually pretty grumpy, understandably, but if you ask her a good question that makes her think you can see the passion there lol. So anyways that's a mood. Now at the other school it's even worse. They have this new asshole as a teacher that knows NOTHING about ANYTHING IT IS SO FUCKING REDICULOUS OH MY UUUUUGH... THEY STILL DON'T EVEN KNOW WHAT A FUCKING LOOP IS LIKE OKAY YOU'VE BEEN TEACHING PROGRAMMING FOR A YEAR AND YOU'RE THE ONLY ONE TEACHING IT AT THAT DISTRICT SO MAYBE YOU SHOULD AT LEAST FUCKING TRY WHAT IS WRONG WITH YOU... so he just makes them do shit from a website and obviously can't do half of the shit he assigns it's so fucking sad... I swear this district is supposed to be good but maybe not for the ONE THING I WANT IT TO BE GOOD FOR. Funny story: in elementary school once I wrote down school usernames for people I didn't really know and shared them a google doc that said "you have been hacked make a more secure password buddy" etc etc and made them the owner and these dull shits report it to the principal... So I'm in the principles office... Just a fucking dumb elementary school kid lol and the principal is like hAcKiNg Is BaD yOu ShOuLd NoT dO iT and I'm like how did you know it was me... so he goes on to say some bullshit about 'digital footprint' and 'tracing' me to it... he obviously has no clue what he's saying but anyways afterwards he points to where it says last change made by MY SCHOOL ACCOUNT... HOW DULL CAN YOU FUCKING POSSIBLY BE IT WAS FROM MY ACCOUNT THAT LITERALLY PROVED THAT I DID --NOT-- 'HACK' INTO THEIR ACCOUNT YOU DUMB FUCK. Okay so basically my school is a burning pile of garbage but it's better than most apparently but it's GARBAGE MY GOD... Please fucking tell me it gets better...
okay lol that was longer than I thought it would be guess I just needed to vent... later I guess
</rant>12 -
!rant, but funny
tl;dr I made something that was to protect me in case the customer doesn't pay, wanted to check if it's still there, messed up a little :D
>do an Android app project for almost 6 months
>issues with payment for it
> =.=
>firebase
>"Add new application"
>Remote Config
>add single integer variable
>back to app code
>if (integerFromFirebase != 0) navigateTo(new Fragment())
>mwahahahaha
>but they ended up paying me in the end
>huh...
>see another post on how to secure yourself if customer doesn't want to pay
>well, consider yours as more sophisticated
>hmm... wonder if they removed it
>firebaseconsole.exe
>change "enableJavaScript" (needed a legit name, so it can't be easily backtracked) to 1
>publish changes
>app still works fine
>mhhh... they removed it? really?
>can't fking believe it
>apkpure.com
>search for the app
>download apk
>unzip
>decompile dex file
>find the fragment
>can't find the code that navigates to blank fragment, but the config fetch is still there
>wtf
>look at the app
>restart it
>SHIT ITS NOT WORKING NOW XDDDDD
>changed the variable back to 0
>found out that the lambda in which I navigate to the blank fragment is in other .java file. New thing learned :v
>idk if I'm in trouble but I highly doubt it (console shows max 10 active users atm)
Was fun tho :v3 -
So, I’ve been given the task of sorting the security out in an application plugging the holes and whatnot as to be honest it’s shocking haha. It doesn’t help that we automate security audits but that’s a different rant for another day.
We’re using devise for authentication (rails standard, ♥️ devise), we have no password resets through the login page, it has to be manually reset by ringing support, why who knows, even though it’s built into the gem and we allow the user to login using an username instead of an email because for whatever reason someone thought it was a bright idea to not have the email field mandatory.
So I hop onto a call with the BAs, basically I go that we need to implement password resets into the login page so the user can do it themselves and also to cut down support calls a ticket is already in place for it. So I go through the standardised workflow for resetting a password. My manager goes.
“I don’t think this will be very secure”
Wait.. what. Have you never reset a password before? It’s following the same protocol as every other app.
We go back and fourth and I said I’ll get it checked with security just to keep him happy.
The issue mainly is well we can’t implement password resets due to 100s of users not having an email on there account.. 🙃 so before we push this change we need to try and notice all users to set a unique email.
Updated the tickets. All dandy.
Looking at the PRs to see what security things have been done if any and turns out one of the devs in India has just written a migration to add the same default email to every user that doesn’t have an email present and yep it got merged. So I go revert the change but talk about taking a “we don’t care about security approach”.
Eventually we want to have the user reset their passwords and login using their email and someone goes a head and does that. Not to mention the security risk.
Jesus Christ I wonder why I bother sometimes.2 -
I know someone that’s constantly paranoid about being spied on by the government and fears companies stealing his code e.g. github, Microsoft etc.
His solution:
do nothing until we find a secure platform to write code on so that our ‘billion dollar ideas don’t get stolen’
Suffice to say that he’s a very bad coder, not that I’m really that good but compared to him I’m light years ahead.1 -
TL;DR Does Telegram really secure?
Some people say Telegram is the most secure and safe messenger, some say it's not. If you're familiar with it you may know from news that Telegram did not gave its clients' info to government, you may have heard that Telegram's encryption is not the best one, BUT my question is does it store peoples' private chats' keys? Actually it does with normal chats because if you reinstall Telegram you can easily get normal chats' messages. Also my friend said that any application in mobile stores like App Store sign a agreement with stores owner company that if some points met, the application owner have to share info of its clients. So dear friend what do you think, should I continue using Telegram)?
P.S. sorry for my not the best English4 -
Disclaimer: This is all theoretical. Neither me nor my friend (with whom I discussed this) are stupid enough to even try to pursue this, but as an idea, i believe it might generate cool/new ideas/ways for handling secure communications across social groups.
Let's do some role play. Let's design a delivery app for drug dealers, think Seamless or Uber Eats, but for drugs. Not for big deliveries, like kilograms of coke, but smaller stuff. Maybe a few grams of it or something. The clients could rate dealers, and vide-versa. This would build a level of trust within the system. There would be no names, just anonymous reviews, ratings, and prices. Only the info you'd need to know.
The biggest (only?) problem we found (besides legality) was that, how would you prove that you're a client and not a snitch (or cop). This would have to somehow be handled both on signup, as well as when ordering (let's imagine that all who are clients are pure and won't ever snitch).
One of the ways we found to combat this was to have the app invite-only. This would, in theory, do away with the problem of having snitches signing up. However, what if the phone got stolen/breached by a snitch, and they also got full access to the account. One way we thought we could combat this would be with a "dispose number" or something similar. Basically, you call a number, or send a text, or message a Signal bot etc, which would lead to the account's instant termination, no traces of that user left. Hence, a dispose number.
The flow of the app would be as follows:
A client wants some amount of heroin. He opens the app, searches for a dealer, sends the him the desired amount, and in return gets back a price from the dealer. If both parties agree on the amount and price, the deal would start.
The app would then select a random time (taken from the client's selected timeframe and the dealer's "open" time) and a location (within a certain radius of both them, somewhere in between them both for convenience). If both of them accept the time and place, they'll have to meet up at said time and place.
The actual delivery could also be done using two dead drops - the client drops the money at one of them, the dealer drops the goods at the other one. Yes, this might be subject to abuse, but it wouldn't be that bad. I doubt that clients would make huge orders to unknown/badly rated dealers, as well as dealers accepting offers from badly rated clients. My idea is that they would start small, just so if they do lose their money/goods, the actual loss wouldn't be as big for them, but for the other party, having bad ratings would mean less clients willing to buy or dealers willing to sell.
A third way would be to use crypto, but the reason I left this as the last one is because it's not that wide-spread yet, at least not in local drug dealing. With this method, the client would initiate the order, the crypto would be sent to either the dealer or an escrow account, the dealer would then drop the goods at a random place and let the client know where to go to get them. After the client has gotten the goods, they could both review/rate the quality as well as the overall experience with that dealer, which would either make or break the dealer's upcoming deals. This would be pretty much like other DNM's, but on a local scale, making deliveries faster.
So far, this would seem like something that would work. Are there any ideas that might improve this? Anything that might make things more secure/anonymous?
My reason for this post is to spark a conversation about security and anonymity, not to endorse drugs or other illegal stuff.
Cheers!
PS. Really loving the new PC design of devRant14 -
Why is it so difficult to tell the people to not use the same passwords everywhere? I thought of a service which searches all leaked databases and predicts a password based on that as a warning for the user... Having the program told you that your password the user is likely to enter would be XY, because the adobe OR MySpace OR Dropbox passwords for the email OR username entered was that password could be a bit more aggressive but useful to let the users at least think of secure passwords.1
-
1) Simple, secure and powerful technology for website user interface design which will replace HTML, CSS and JS.
2) Simple and practical technology to be able to utilize HTML for all kinds of documents which will replace paper page based document formats like PDF and Word.
3) One technology for native mobile app development to rule them all. So that it's not necessary to use HTML and JS.1 -
My answer to their survey -->
What, if anything, do you most _dislike_ about Firebase In-App Messaging?
Come on, have you sit a normal dev, completely new to this push notification thing and ask him to make run a simple app like the flutter firebase_messaging plugin example? For sure you did not oh dear brain dead moron that found his college degree in a Linux magazine 'Ruby special edition'.
Every-f**kin thing about that Firebase is loose end. I read all Medium articles, your utterly soporific documentation that never ends, I am actually running the flutter plugin example firebase_messaging. Nothing works or is referenced correctly: nothing. You really go blind eyes in life... you guys; right? Oh, there is a flimsy workaround in the 100th post under the Github issue number 10 thousand... lets close the crash report. If I did not change 50 meaningless lines in gradle-what-not files to make your brick-of-puke to work, I did not changed a single one.
I dream of you, looking at all those nonsense config files, with cross side eyes and some small but constant sweat, sweat that stinks piss btw, leaving your eyes because you see the end, the absolute total fuckup coming. The day where all that thick stinky shit will become beyond salvation; blurred by infinite uncontrolled and skewed complexity; your creation, your pathetic brain exposed for us all.
For sure I am not the first one to complain... your whole thing, from the first to last quark that constitute it, is irrelevant; a never ending pile of non sense. Someone with all the world contained sabotage determination would not have done lower. Thank you for making me loose hours down deep your shit show. So appreciated.
The setup is: servers, your crap-as-a-service and some mobile devices. For Christ sake, sending 100 bytes as a little [ beep beep + 'hello kitty' ] is not fucking rocket science. Yet you fuckin push it to be a grinding task ... for eternity!!!
You know what, you should invent and require another, new, useless key-value called 'Registration API Key Plugin ID Service' that we have to generate and sync on two machines, everyday, using something obscure shit like a 'Gradle terminal'. Maybe also you could deprecate another key, rename another one to make things worst and I propose to choose a new hash function that we have to compile ourselves. A good candidate would be a C buggy source code from some random Github hacker... who has injected some platform dependent SIMD code (he works on PowerPC and have not test on x64); you know, the guy you admire because he is so much more lowlife that you and has all the Pokemon on his desk. Well that guy just finished a really really rapid hash function... over GPU in a server less fashion... we have an API for it. Every new user will gain 3ms for every new key. WOW, Imagine the gain over millions of users!!! Push that in the official pipe fucktard!.. What are you waiting for? Wait, no, change the whole service name and infrastructure. Move everything to CLSG (cloud lambda service ... by Google); that is it, brilliant!
And Oh, yeah, to secure the whole void, bury the doc for the new hash under 3000 words, lost between v2, v1 and some other deprecated doc that also have 3000 and are still first result on Google. Finally I think about it, let go the doc, fuck it... a tutorial, for 'weak ass' right.
One last thing, rewrite all your tech in the latest new in house language, split everything in 'femto services' => ( one assembly operation by OS process ) and finally cramp all those in containers... Agile, for sure it has to be Agile. Users will really appreciate the improvements of your mandatory service. -
This is not a rant. Rather just a question or an ask for advice, as I have seen a lot of people talk about web development around here. I am planning to create a website for my search engine. I created a Rest API for my VPS so I can do http requests and retrieve some links for certain key words. But I need some good ideas to do this from a website. As I am not sure what would be the best way to do http requests. As far as I know it's possible with Js and PHP, but I am not sure what's better, more secure or convenient? So here I am to ask you guys, especially those who have experience with this, what I should consider to do.
Oh and please forgive me my limited knowledge about Js and PHP 😅😊3 -
Yeah, so when you create an account just about anywhere nowadays, you need to choose a strong password. Fair enough. But then, some sites/services/systems require a second password, sort of a password hint as an extra security for retrieving your first password in case you forget it. Well OK...That hint question just becomes very *in*secure when you must choose from some extremely stupid presets like "In which town were you born?" or "What was your mother's maiden name?", all of which are trivia that for most people can be easily googled, or looked up on facebook ffs. And these "in which town did this or that happen?" questions? As there is only one town in my country it's not a long shot that I was born in Mariehamn, met my partner in Mariehamn and had my first job in Mariehamn. Security questions for imbecils.4
-
So... there is a bank. And the website for example is using "https". Alright. But the Login consists your login ID (in the most cases your account number) and a Pin number ( only 5 chars) If i remember pentesting, crunch etc a pin or password with 5 chars (included special characters) is fast hackable or not? Or is it super secure cuz of the "https"?4
-
!dev (kinda)
Warning: Might contain (be) stupid rambling.
So I got my new toy and want to play around with it. Just in case I have to return it I first want to make a full disk backup, so I try to boot clonezilla. I press the power button and mash F2, F8, F9 - and it boots straight into the windows setup. Nope, not what I wanted. Try again. And again. Eventually I look it up and apparently I have to hammer the ESC key to get where I want to. Alright, now it works. Boot from USB. Failed. Try again. Failed. Check the BIOS, disable secure boot, reboot. I need to type 4 digits to confirm disabling secure boot. Alright. Reboot, try again, failed. Secure boot is on again. Wtf? After some more infuriating tries I see that NumLock is disabled. AAAARGH. BIOS: Enable NumLock on boot, disable secure boot, enable legacy boot. Input the 4 digits - works! Try to boot from USB: Failed! Grab another USB stick, did the clonezilla image, try again: Finally! It! Works!
Format disk, install Qubes OS. Success!2 -
I'm trying to improve my email setup once again and need your advice. My idea is as follows:
- 2-5 users
- 1 (sub)domain per user with a catchall
- users need to be able to also send from <any>@<subdomain>.<domain>
- costs up to 1€ per user (without domain)
- provider & server not hosted in five eyes and reasonably privacy friendly
- supports standard protocols (IMAP, SMTP)
- reliable
- does not depend on me to manage it daily/weekly
- Billing/Payment for all accounts/domains at once would be nice-to-have, but not necessary
I registered a domain with wint.global the other day and I actually managed to get this to work, but unfortunately their hosting has been very underwhelming.. the server was unreachable for a few minutes yesterday not only once, but roughly once an hour, and I'd really rather be able to actually receive (and retrieve) my mail. Also their Plesk is quite slow. To be fair for their price it's more like I pay for the domain and get the hosting for free, but I digress..
I am also considering self hosting, but realistically that means running it on a VPS and keeping at secure and patched, which I'd rather outsource to a company who can afford someone to regularly read CVEs and keep things running. I don't really want to worry about maintaining servers when I'm on holiday for example and while an unpatched game server is an acceptable risk, I'd rather keep my email server on good shape.
So in the end the question is: Which provider can fulfill my email dreams?
My research so far:
1. Tutanota doesn't offer standard protocols. I get their reasons but that also makes me depended on their service/software, which I wouldn't like. Multiple domains only on the business plans.
2.With Migadu I could easily hit their limits of incoming mails if someone signs up for too many newsletters and I can't (and don't want to) micromanage that.
3. Strato: Unclear whether I can create mails for subdomains. Also I don't like the company for multiple reasons. However I can access a domains hosted there and could try...
4. united-domains: Unclear whether I can create mails for subdomains.
5. posteo: No custom domains allowed.
I'm getting tired.. *sigh*21 -
Been wondering about something and can't figure out if I am a retard or a genius 😂.
If MD5 is so outdated and should not be used to store password hashes (let's say for whatever reason you cannot effectively switch to another algorithm) wouldn't it just be easier and more secure to just re-encrypt the hash again, so just MD5 the MD5 hash... in theory, wouldn't that make the hash virtually uncrackable because instead of trying to brute force actual real words, you now have a hash of essentially random characters which have no relation to the others, and even then, suppose you manage to crack the hash, you will get another hash to crack before getting to the password?5 -
Relatively often the OpenLDAP server (slapd) behaves a bit strange.
While it is little bit slow (I didn't do a benchmark but Active Directory seemed to be a bit faster but has other quirks is Windows only) with a small amount of users it's fine. slapd is the reference implementation of the LDAP protocol and I didn't expect it to be much better.
Some years ago slapd migrated to a different configuration style - instead of a configuration file and a required restart after every change made, it now uses an additional database for "live" configuration which also allows the deployment of multiple servers with the same configuration (I guess this is nice for larger setups). Many documentations online do not reflect the new configuration and so using the new configuration style requires some knowledge of LDAP itself.
It is possible to revert to the old file based method but the possibility might be removed by any future version - and restarts may take a little bit longer. So I guess, don't do that?
To access the configuration over the network (only using the command line on the server to edit the configuration is sometimes a bit... annoying) an additional internal user has to be created in the configuration database (while working on the local machine as root you are authenticated over a unix domain socket). I mean, I had to creat an administration user during the installation of the service but apparently this only for the main database...
The password in the configuration can be hashed as usual - but strangely it does only accept hashes of some passwords (a hashed version of "123456" is accepted but not hashes of different password, I mean what the...?) so I have to use a single plaintext password... (secure password hashing works for normal user and normal admin accounts).
But even worse are the default logging options: By default (atleast on Debian) the log level is set to DEBUG. Additionally if slapd detects optimization opportunities it writes them to the logs - at least once per connection, if not per query. Together with an application that did alot of connections and queries (this was not intendet and got fixed later) THIS RESULTED IN 32 GB LOG FILES IN ≤ 24 HOURS! - enough to fill up the disk and to crash other services (lessons learned: add more monitoring, monitoring, and monitoring and /var/log should be an extra partition). I mean logging optimization hints is certainly nice - it runs faster now (again, I did not do any benchmarks) - but ther verbosity was way too high.
The worst parts are the error messages: When entering a query string with a syntax errors, slapd returns the error code 80 without any additional text - the documentation reveals SO MUCH BETTER meaning: "other error", THIS IS SO HELPFULL... In the end I was able to find the reason why the input was rejected but in my experience the most error messages are little bit more precise.2 -
So I've been using Duet on my iPad Pro for a couple years now (lets me use it as an external monitor via Lightning cable) and without issue. Shit, I've been quite happy with it. Then the other day, whilst hooked up to my work laptop, there was a power fluctuation that caused my laptop to stop sending power to connected devices. Which is fine - I have it plugged into a surge protector so these fluctuations shouldn't matter. After a few seconds the laptop resumed normal operation and my connected devices were up and running again.
But the iPad Pro, for some reason, went into an infinite boot loop sequence. It reboots, gets to the white Apple logo, then reboots again.
In the end, after putting the iPad into recovery mode and running Apple's update in iTunes (as they recommend), it proceeds to wipe all my data. Without warning. I lost more than a couple of years of notes, illustrations and photos. All in one fucking swoop.
To be clear, you get 2 options in iTunes when performing a device update:
1. UPDATE - will not mess with your data, will just update the OS (in this case iPadOS)
2. RESTORE - will delete everything, basically a factory reset
I clicked UPDATE. After the first attempt, it still kept bootlooping. So I did it again, I made sure I clicked UPDATE because I had not yet backed up my data. It then proceeds to do a RESTORE even though I clicked UPDATE.
Why, Apple? WHY.
After a solemn weekend lamenting my lost data, I've come a conclusion: fuck you Apple for designing very shitty software. I mean, why can't I access my device data over a cabled connection in the event I can't boot into the OS? If you need some form of authentication to keep out thieves, surely the mutltiple times you ask me to log in with my Apple ID on iTunes upon connecting the damn thing is more than sufficient?! You keep spouting that you have a secure boot chain and shit, surely it can verify a legitimate user using authenticated hardware without having to boot into the device OS?
And on the subject of backing up my data, you really only have 2 manual options here. Either (a) open iTunes, select your device, select the installed app, then selectively download the files onto my system; or (b) do a full device backup. Neither of those procedures is time-efficient nor straightforward. And if you want to do option b wirelessly, it can only be on iCloud. Which is bullshit. And you can't even access the files in the device backup - you can only get to them by restoring to your device. Even MORE bullshit.
Conversely, on my Android phone I can automate backups of individual apps, directories or files to my cloud provider of choice, or even to an external microSD card. I can schedule when the backups happen. I can access my files ANYTIME.
I got the iPad Pro because I wanted the best drawing experience, and Apple Pencil at the time was really the best you could get. But I see now it's not worth compromise of having shitty software. I mean, It's already 2021 but these dated piles of excrement that are iOS and iPadOS still act like it's 2011; they need to be seriously reviewed and re-engineered, because eventually they're going to end up as nothing but all UI fluff to hide these extremely glaring problems.2 -
Obviously credit card companies, banks, etc. do not use MySQL. So what database do they use to keep data secure?7
-
// Rant 1
---
Im literally laughing and crying rn
I tried to deploy a backend on aws Fargate for the first time. Never used Fargate until now
After several days of brainwreck of trial and error
After Fucking around to find out
After Multiple failures to deploy the backend app on AWS Fargate
After Multiple times of deleting the whole infrastructure and redoing everything again
After trying to create the infrastructure through terraform, where 60% of it has worked but the remaining parts have failed
After then scraping off terraform and doing everything manually via AWS ui dashboard because im that much desperate now and just want to see my fucking backend work on aws and i dont care how it will be done anymore
I have finally deployed the backend, successfully
I am yet unsure of what the fuck is going on. I followed an article. Basically i deployed the backend using:
- RDS
- ECS
- ECR
- VPC
- ALB
You may wonder am i fucking retarded to fail this hard for just deploying a backend to aws?
No. Its much deeper than you think. I deployed it on a real world production ready app way.
- VPC with 2 public and 2 private subnets. Private subnets used only for RDS. Public for ALB.
- Everything is very well done and secure. 3 security groups: 1 for ALB (port 80), 1 for Fargate (port 8080, the one the backend is running on), 1 for RDS postgres (port 5432). Each one stacked on top and chained
- custom domain name + SSL certificate so i can have a clean version of the fully working backend such as https://api.shitstain.com
- custom ECS cluster
- custom target groups
- task definitions
Etc.
Right now im unsure how all of this is glued together. I have no idea why this works and why my backend is secure and reachable. Well i do know to some extent but not everything.
To know everything, I'll now ask some dumbass questions:
1. What is ECS used for?
2. What is a task definition and why do i need it?
3. What does Fargate do exactly? As far as i understood its a on-demand use of a backend. Almost like serverless backend? Like i get billed only when the backend is used by someone?
4. What is a target group and why do i need it?
5. Ive read somewhere theres a difference between using Fargate and... ECS (or is it something else)? Whats the difference?
Everything else i understand well enough.
In the meantime I'll now start analyzing researching and understanding deeply what happened here and why this works. I'll also turn all of this in terraform. I'll also build a custom gitlab CI/CD to automate all of this shit and deploy to fargate prod app
// Rant 2
---
Im pissing and shitting a lot today. I piss so much and i only drink coffee. But the bigger problem is i can barely manage to hold my piss. It feels like i need to piss asap or im gonna piss myself. I used to be able to easily hold it for hours now i can barely do it for seconds. While i was sleeping with my gf @retoor i woke up by pissing on myself on her bed right next to her! the heavy warmness of my piss woke me up. It was so embarrassing. But she was hardcore sleeping and didnt notice. I immediately got out of bed to take a shower like a walking dead. I thought i was dreaming. I was half conscious and could barely see only to find out it wasnt a dream and i really did piss on myself in her bed! What the fuck! Whats next, to uncontrollably shit on her bed while sleeping?! Hopefully i didnt get some infection. I feel healthy. But maybe all of this is one giant dream im having and all of u are not real9 -
So, need to secure some requests.
I decided on going passwordless on the website but I want to have an API too.
I am reviewing auth0.
I am also not sure if I can secure the same endpoints as private and public differently, so the private is used by the backend with no auth and the public with auth.
Wold you guys help me with some reading material?2 -
Approx. 24 hours ago I proceeded to use MEGA NZ to download a file It's something I've done before. I have an account with them.
This is part of the email I received from MEGA NZ following the dowload: "
zemenwambuis2015@gmail.com
YOUR MEGA ACCOUNT HAS BEEN LOCKED FOR YOUR SAFETY; WE SUSPECT THAT YOU ARE USING THE SAME PASSWORD FOR YOUR MEGA ACCOUNT AS FOR OTHER SERVICES, AND THAT AT LEAST ONE OF THESE OTHER SERVICES HAS SUFFERED A DATA BREACH.
While MEGA remains secure, many big players have suffered a data breach (e.g. yahoo.com, dropbox.com, linkedin.com, adobe.com, myspace.com, tumblr.com, last.fm, snapchat.com, ashleymadison.com - check haveibeenpwned.com/PwnedWebsites for details), exposing millions of users who have used the same password on multiple services to credential stuffers (https://en.wikipedia.org/wiki/...). Your password leaked and is now being used by bad actors to log into your accounts, including, but not limited to, your MEGA account.
To unlock your MEGA account, please follow the link below. You will be required to change your account password - please use a strong password that you have not used anywhere else. We also recommend you change the passwords you have used on other services to strong, unique passwords. Do not ever reuse a password.
Verify my email
Didn’t work? Copy the link below into your web browser:
https://mega.nz//...
To prevent this from happening in the future, use a strong and unique password. Please also make sure you do not lose your password, otherwise you will lose access to your data; MEGA strongly recommends the use of a password manager. For more info on best security practices see: https://mega.nz/security
Best regards,
— Team MEGA
Mega Limited 2020."
Who in their right mind is going to believe something like that that's worded so poorly.
Can anybody shed some light on this latest bit of MEGA's fuckery?
Thank you very much.4 -
Guys I need to deploy a very simple authentication API service.
You register with a username (actually an ID with a determined format), a password and uuid. You login with your username and password and if credentials are correct you get back the uuid as a response (JSON or whatever the fuck).
If you forget your password, you can use your uuid (which is confidential, very long string) in some POST request to set a new password. If you forget your username, you use the uuid again in a GET request to get back your username.
I've been looking at a bunch of solutions online and I don't think they suit my purpose exactly and all require emails (Like Firebase, AUth0, etc.) So, let me get this straight: NO FUCKING EMAILS INVOLVED PLEASE.
The above are the EXACT requirements I need for my work (for a good cause too). I fucking hate 0-requirement exploratory research tasks and I'm plagued with those. Those requirements are the only way it should work. So again, NO EMAILS INVOLVED PLEASE.
Also, please note that I have never developed an API in my life. I feel like StackOverflow will be assholes about this so I am asking this here.
I know it is very easy to do and there are probably dozens of ways to do this. I just do not know how, documentations are vague and overwhelming (or I'm just a little stupid lately). Another thing is that I am not sure of how can I do this in the most secure way. Bonus if this can be dockerized.
I know I sound a little rude,so I am sorry. It is just my frustration and depressing times I am going through that's preventing from thinking straight.6 -
rant.author != this
Christ people. This is just sh*t.
The conflict I get is due to stupid new gcc header file crap. But what
makes me upset is that the crap is for completely bogus reasons.
This is the old code in net/ipv6/ip6_output.c:
mtu -= hlen + sizeof(struct frag_hdr);
and this is the new "improved" code that uses fancy stuff that wants
magical built-in compiler support and has silly wrapper functions for
when it doesn't exist:
if (overflow_usub(mtu, hlen + sizeof(struct frag_hdr), &mtu) ||
mtu <= 7)
goto fail_toobig;
and anybody who thinks that the above is
(a) legible
(b) efficient (even with the magical compiler support)
(c) particularly safe
is just incompetent and out to lunch.
The above code is sh*t, and it generates shit code. It looks bad, and
there's no reason for it.
The code could *easily* have been done with just a single and
understandable conditional, and the compiler would actually have
generated better code, and the code would look better and more
understandable. Why is this not
if (mtu < hlen + sizeof(struct frag_hdr) + 8)
goto fail_toobig;
mtu -= hlen + sizeof(struct frag_hdr);
which is the same number of lines, doesn't use crazy helper functions
that nobody knows what they do, and is much more obvious what it
actually does.
I guarantee that the second more obvious version is easier to read and
understand. Does anybody really want to dispute this?
Really. Give me *one* reason why it was written in that idiotic way
with two different conditionals, and a shiny new nonstandard function
that wants particular compiler support to generate even half-way sane
code, and even then generates worse code? A shiny function that we
have never ever needed anywhere else, and that is just
compiler-masturbation.
And yes, you still could have overflow issues if the whole "hlen +
xyz" expression overflows, but quite frankly, the "overflow_usub()"
code had that too. So if you worry about that, then you damn well
didn't do the right thing to begin with.
So I really see no reason for this kind of complete idiotic crap.
Tell me why. Because I'm not pulling this kind of completely insane
stuff that generates conflicts at rc7 time, and that seems to have
absolutely no reason for being anm idiotic unreadable mess.
The code seems *designed* to use that new "overflow_usub()" code. It
seems to be an excuse to use that function.
And it's a f*cking bad excuse for that braindamage.
I'm sorry, but we don't add idiotic new interfaces like this for
idiotic new code like that.
Yes, yes, if this had stayed inside the network layer I would never
have noticed. But since I *did* notice, I really don't want to pull
this. In fact, I want to make it clear to *everybody* that code like
this is completely unacceptable. Anybody who thinks that code like
this is "safe" and "secure" because it uses fancy overflow detection
functions is so far out to lunch that it's not even funny. All this
kind of crap does is to make the code a unreadable mess with code that
no sane person will ever really understand what it actually does.
Get rid of it. And I don't *ever* want to see that shit again. -
I'm kinda looking for a new phone, should be super cheap (so a used one would do), I wanna modify it to be secure (proper encryption, VPN, etc.), very good battery time and not very big (more like 4"). I have been looking at the Lenovo P2 a lot, but I'm afraid my current phone will die before I have enough money for that one (I'm a broke trainee yay).
So what do y'all have or can recommend?3 -
HOW TO FIND RELIABLE CRYPTOCURRENCY RECOVERY EXPERT; BITCOIN RECOVERY EXPERT HIRE CYBER CONSTABLE INTELLIGENCE
Monetary loss to crypto and digital asset theft can be an incredibly devastating experience, especially when it involves significant sums of money. In my case, I fell victim to a crypto scam during the U.S. election period. I had been browsing online when I came across an enticing advertisement promising sky-high returns on cryptocurrency investments. The offer seemed too good to ignore, so I invested blindly, lured by the potential of quick and substantial profits. At first, everything appeared normal. My investment seemed to grow as promised, and I felt reassured. However, after a few days of monitoring my account, I noticed something disturbing: my account had been deleted. At first, I thought it might be a technical issue, so I tried to reach out to the customer support team. I sent multiple emails, tried to contact them through the website, and even attempted to call. But each time, I was met with silence. It became clear that something was terribly wrong. I had no access to my account, no communication from the platform, and no way to recover my investment. The realization that I had been swindled hit me like a ton of bricks. I had lost my life savings of $250,000 to a scam. I was devastated, helpless, and unsure of where to turn next. But in my despair, I stumbled upon a review about Cyber Constable Intelligence. The review was filled with praise for their professional, trustworthy, and efficient service in helping individuals recover stolen funds from crypto scams. Intrigued, I reached out to Cyber Constable Intelligence, hoping for a miracle. To my amazement, the team at Cyber Constable Intelligence was not only professional but highly skilled in using forensic and digital currency recovery techniques to trace stolen funds. They quickly got to work, tracking my funds across various blockchain networks and uncovering the full extent of the scam. Their expertise in digital forensics allowed them to locate and secure my lost assets, which had seemed impossible to recover just days earlier. Thanks to the diligent efforts of Cyber Constable Intelligence, I was able to recover my entire $250,000 investment. The process took time, but the results were beyond what I had hoped for. It was a huge weight lifted off my shoulders, and I can’t recommend their services enough. If you've been a victim of a crypto scam, I strongly suggest reaching out to Cyber Constable Intelligence. They are the real deal, and their dedication to helping individuals like myself is unmatched.
Contact info:
Website info https: cyber constable intelligence com,
Email: cyberconstable (@) coolsite net
Whatsapp: 1 ( 2 5 2 ) 3 7 8 ( 7 6 1 1 )283 -
Hey. I'm still very new to CloudFlare and I have a question.
Let's say that I have 4 sub domains: a.test.com, b.test.com, c.test.com, d.test.com. They're all under the same domain (test.com).
I have a page rule setup specifically for a.test.com, where "Disable security" is set to On. I did this as a temporary solution so that I can figure out the problems that a.test.com has when the security is enabled (had users complaints regarding not being able to send requests with CF security On), so that it is still accessible while I try to fix it..
By turning disabling security for a.test.com, do I put others (b, c, d) at risk? I had someone telling me that it is possible for attackers to make use of a.test.con (unprotected by CF) in order to attack the other sub-domains. "a.test.com has no protection so attackers can use it to send requests to other secured subdomains, cross-site attack" or something along that line.
I don't get this. I thought page rule is supposed to be active only for the domain where it's being set up and the rest will still be secured, and that if attacker manages to attack the other subdomain its due to the others not having secure applications inside of it.
Dunno if that person was telling the truth or tried to mess around with me with their joke!
Thanks!5 -
so i've been working with a ux/graphic designer on a pretty large project that will likely have many services attached to it, it's been in "active" development for about a year now. something that concerns me however is how uncertain i feel about what i'm doing, constant questions like "am i doing this right", "is this secure", and many like them plague my mind while i'm coding and it's really discouraging. when i was just learning i didn't really take any heed from these questions, intact i never even really thought about them so why am i now? i feel kid if i'm able to just work and have fun i will be so much more productive and happy. my partner has been learning front end and has been doing great me i'm working on front and back end. i have been making most of the decision in regards to our stack but i feel like i'm making them arbitrarily and to attribute to this fact, i have switched things up several times, we went from react to an mvc framework and now i'm considering going back to react. i just can't seem to keep on track with my decisions, if any of you have experienced this before i would really like some advice on how i can be productive and again and not fall into this never-ending abyss of doubt.3
-
HIRE THE BEST BITCOIN RECOVERY EXPERT; HOW TO SAFELY RECOVER STOLEN CRYPTOCURRENCY VISIT CYBER CONSABLE INTELLIGENCE
I’ve always felt confident navigating the world of cryptocurrency. As a software engineer, I understood the ins and outs of wallets, private keys, and blockchain security, which made me feel secure in my investments. So, when I found a promising platform that seemed like a great opportunity, I invested $250,000 without hesitation. Unfortunately, I soon learned that my confidence would be shattered by a sophisticated cyber attack. It started with small, unauthorized transactions in my wallet. At first, I thought it was a mistake, but as the activity continued, I realized something was wrong. My wallet had been compromised, but not in the way I had expected. Instead of a simple hack, I had fallen victim to a virus attack. The virus was a piece of malware designed specifically to target cryptocurrency wallets. It infiltrated my system through a vulnerability I hadn’t noticed. Once inside, the virus silently monitored my wallet, captured my private keys, and gave the hackers full access to my funds. It was stealthy and nearly undetectable. The attackers didn’t need to log into my account manually; they could control everything remotely, draining my wallet without my knowledge. I was completely blindsided. As someone familiar with tech, I knew how advanced this virus was. It wasn’t just a typical phishing attack, it was a targeted, silent assault on my financial assets. As my funds disappeared, I realized I might never be able to recover them. Desperate, I turned to a trusted colleague who had gone through a similar situation. They recommended Cyber Constable Intelligence, a company that specializes in recovering stolen crypto assets. I contacted them immediately, and their team quickly started investigating. Cyber Constable Intelligence explained how the virus had exploited a weak point in my security. Using advanced tools, they traced the stolen funds across the blockchain and located them. After a thorough recovery process, they managed to return the entire $250,000.Thanks to their expertise and quick action, I was able to recover my funds. The experience was a wake-up call about how vulnerable even the most cautious can be to sophisticated attacks. Without Cyber Constable Intelligence, I would have lost everything, and I’m grateful for their skill in reversing the damage caused by the virus.
Here's Their Info Below
WhatsApp: 1 (252) 378-7611
mail: cyberconstable @ coolsite net
Website info; www cyberconstableintelligence com1 -
Slim Shadies Celebrity Sunglasses Limited: Premium Sport and Kids Sunglasses for Every Adventure
At Slim Shadies Celebrity Sunglasses Limited, we believe that sunglasses are more than just an accessory—they are a necessity for protecting your eyes and enhancing your style. Located at 8 Sadler Cl, Skegness PE25 3NN, United Kingdom, we specialize in offering high-quality, stylish eyewear for everyone, from adults to children. Our collection includes top-of-the-line sport sunglasses and kids sunglasses, designed to provide the ultimate protection and comfort for every member of the family.
Why Choose Sport Sunglasses?
1. Designed for Active Lifestyles
Sport sunglasses are specifically designed for individuals who engage in outdoor activities and sports. Whether you’re cycling, running, hiking, or playing team sports, sport sunglasses provide the durability and comfort needed to keep up with your active lifestyle. Our sport sunglasses at Slim Shadies Celebrity Sunglasses Limited are crafted with lightweight, durable frames and lenses that offer high-impact resistance, ensuring they won’t break or distort during intense activities.
2. Superior UV Protection
One of the most important features of sport sunglasses is the superior UV protection they offer. During outdoor activities, your eyes are exposed to harmful UV rays that can lead to long-term eye damage. Our sport sunglasses come with UV400 lenses that block 100% of UVA and UVB rays, providing you with full protection while you’re out in the sun. Whether you’re hitting the trails, racing down a mountain, or playing a game of tennis, our sunglasses will keep your eyes safe from the sun’s harmful rays.
3. Enhanced Clarity and Vision
For athletes and outdoor enthusiasts, clarity of vision is key. Our sport sunglasses come with polarized lenses that reduce glare, ensuring that you can see clearly even in bright sunlight or on reflective surfaces. Whether you’re driving, running, or participating in water sports, our sunglasses will improve your visibility, helping you perform at your best.
4. Comfortable and Secure Fit
Comfort is essential, especially during long hours of physical activity. Our sport sunglasses are designed to fit securely and comfortably, with adjustable nose pads and flexible frames. They stay in place, even during intense movement, so you don’t have to worry about them slipping or causing discomfort. Whether you’re on a long hike or competing in a sport, our sport sunglasses are made to move with you.
Why Choose Kids Sunglasses?
1. Eye Protection for Little Ones
Protecting your children’s eyes from harmful UV rays is just as important as protecting your own. Kids sunglasses are designed specifically to fit children’s smaller faces while offering the same level of protection as adult eyewear. At Slim Shadies Celebrity Sunglasses Limited, our kids sunglasses feature high-quality UV400 lenses that block 100% of UVA and UVB rays, keeping your child’s eyes safe during outdoor activities.
2. Fun, Stylish, and Comfortable
Kids want sunglasses that are not only protective but also fun and stylish. Our kids sunglasses come in a variety of colors, shapes, and patterns, ensuring that your little ones can pick a pair that reflects their personality. From vibrant, playful designs to classic styles, our sunglasses are as fashionable as they are functional.
3. Durable and Safe
We understand that kids can be tough on their belongings, which is why our kids sunglasses are built to withstand the rigors of play. Made from flexible, durable materials, these sunglasses are designed to survive drops, rough handling, and all the other adventures kids get up to. The frames are lightweight, and the lenses are shatterproof, providing a safe and secure option for children of all ages.
4. Comfortable for All-Day Wear
Comfort is a top priority when it comes to kids sunglasses. Our sunglasses are designed with adjustable features and soft materials that ensure a snug but comfortable fit. Whether your child is at the park, the beach, or on a family hike, they can wear their sunglasses all day without discomfort.2 -
QUALIFIED RECOMMENDED CRYPTO USDT RECOVERY EXPERT CONTACT WIZARD WEB RECOVERY SOLUTION
I spend my days studying the mysteries of the universe, delving into black holes, quantum mechanics, and the nature of time itself. But apparently, the real black hole I should have been concerned about was my own memory. You see, I had the brilliant idea to encrypt my Bitcoin wallet to keep it as secure as possible. The problem? I promptly forgot the password. Classic, right?
It didn’t help that this wasn’t just pocket change I was dealing with. No, I had $150,000 in Bitcoin sitting in that wallet, and my mind had decided to take a vacation, leaving me with absolutely no idea what that password was. The panic set in fast. My brain, which could solve some of the most complex equations in physics, couldn’t remember a 12-character password. It felt like my entire financial future was being sucked into a black hole, one I’d created myself.
Desperate, I tried everything. I thought I could outsmart the system, using every trick I could think of. I tried variations of passwords I thought I might have used. I even tried some good ol' brute force, typing random combinations, hoping that maybe, just maybe, my subconscious would strike gold. Spoiler alert: it didn’t. Each failed attempt made me feel more and more like a genius who’d locked themselves out of their own universe.
In a final act of desperation, I contacted WIZARD WEB RECOVERY SOLUTION .To my surprise, their team didn’t laugh at my predicament. Instead, they treated my case like a challenge, one they were ready to take on. Their process was methodical and professional, and they assured me that this wasn’t the first time they’d encountered a "forgotten password" scenario. They got to work, employing advanced techniques and tools to crack the encryption I had so carefully set up.
Weeks passed, and I felt like I was watching a suspense thriller unfold. Finally, the breakthrough came. WIZARD WEB RECOVERY SOLUTION had cracked the code and retrieved my $150,000. It was as if they had unlocked the secrets of the universe itself.
So, what did I learn from this? First, never trust my brain with important passwords, no matter how well-intentioned the encryption might be. Second, when you’ve locked yourself out of your own digital universe, WIZARD WEB RECOVERY SOLUTION is the team to call. They not only saved my funds but restored my faith in humanity—and my memory
WhatsApp_Number+447510743081 -
Why in the fuck does everyone expose specific ports in Dockerfiles?
If I wanted to expose the port, I would fucking expose it.
Currently can't run my home infra platform because I'm running two separate instances of Maria DB on the same private internal network. These are two databases for two separate applications.
Why don't I run them on one? Because they're two separate fucking applications.
Why the fuck can I not do this when I used to be able to do it a week ago.
Stop exposing your fucking ports in your fucking Dockerfiles.
This shit is getting so bad, I'm just about to throw my towel in on all fucking containers and just install everything in multiple VM environments.
I am God damn appalled that after 8 years of using docker, core concepts like a port exposure is being leveraged as a way to somehow circumvent poor security practices.
You want a secure container environment? Expose your own goddamn ports.
Fuck you Maria DB, and fuck you docker.2 -
LOST CRYPTO FOUND- MY RECOVERY EXPERIENCE WITH TRUST GEEKS HACK EXPERT
It all started with an innocuous-looking email. The subject line read, "Important Update: Verify Your Wallet Activity," and the sender ostensibly seemed to be my wallet provider. I clicked the link without any second thought, being in a haste to make sure everything was fine. What followed was nothing short of a nightmare. It took me to what seemed like a similar website to my wallet's login page. I didn't overthink it and quickly punched in my credentials. Then, in a few seconds, I knew that this was a scam. The site disappeared, and I sat staring at a blank screen in a panic. The $75,000 Bitcoin wallet was gone, just like that. The weight of my mistake weighed me down, and the only thing that replayed in my head was that moment, over and over, with me berating myself for being so careless. Scrolling through forums and online discussions, I came across many horror stories of similar scams, but amidst the despair, one name kept cropping up Trust Geeks Hack Expert I called them, as I had nothing to lose and my money was on the line. From the moment they received my call, I had hope. Their team was very calm and professional in articulating what needed to be done to document the incident and secure any remaining digital trails. They assured me their specialty was handling cases like mine, but even with all this conviction, I still had a small amount of comfort. Over the next few days, they worked tirelessly, keeping me updated every step of the way. They explained the technical aspects in simple terms, helping me understand how they were piecing together the puzzle. It was clear they were not only skilled but also deeply committed to their clients. Then came the call I had been praying for: they had recovered my $75,000. I felt so relieved that I could finally breathe again. But beyond just recovering my funds, they took the time to educate me about phishing scams and how to avoid them in the future. Thanks to Trust Geeks Hack Expert, I learned a very hard lesson without permanent consequences. Now, I give every email extra scrutiny, and I think twice before clicking on any link. They didn't just save my Bitcoin; they restored my peace of mind. Talk to Trust Geeks Hack Expert
W e b - si te: h t t p s :/ / trust geeks hack expert
. co m /
E - m a il : trustgeekshackexpert @ fast ser v i ce .
com
Te le gr am : (Trust geeks hack expert )
1 -
A crypto influencer on TikTok posted about his $100,000 recovery with CRANIX ETHICAL SOLUTIONS HAVEN. I was hyped along with him and decided to follow it, just in case. At that time, I wasn't worried, as I did have everything: two-factor authentication, backups on cold storage, and strong passwords. I thought I was untouchable. Wrong. Months later, I woke up to a nightmare: my wallet, holding $320,000, was completely drained. I checked my email-nothing. I checked my security logs-no alerts. How did this happen? I scrambled through every account, searching for clues. That's when I saw it—a phishing attack. I had clicked on a link for a fake update weeks prior, and the hackers had been patiently waiting for their moment. Panic set in. I scoured the internet for solutions, but every forum post, every so-called "expert" I contacted-all were saying the same thing: Once it's gone, it's gone. But then I remembered that TikTok post. I contacted the influencer, desperate for an honest answer: Is CRANIX ETHICAL SOLUTIONS HAVEN actually legit? The response came immediately. "100%. They saved me. Reach out now." That was all I needed. I contacted CRANIX ETHICAL SOLUTIONS HAVEN, hoping for a miracle. From the very first message, they were professional, calm, and insanely knowledgeable. They asked the right questions, identified how my funds had been stolen, and immediately set their forensic recovery tools in motion. While I was drowning in anxiety, they worked methodically, patiently, and relentlessly. Hours felt like days, then the message came: "We've recovered your funds." I reread it a total of three times. Every last dollar was back. I had gone from devastation to absolute disbelief and relief. Not only did they recover my money, but they also educated me on what had gone wrong. They walked me through better security practices, helped me secure my wallets properly, and ensured that I'd never fall for the same trick again. That TikTok post? It saved me. And now, I'm the one telling everyone I know: Follow CRANIX ETHICAL SOLUTIONS HAVEN before you ever need them.
EMAIL: cranixethicalsolutionshaven @ post . com
WHATSAPP: +44 7460 622730
TELEGRAM: @ cranixethicalsolutionshaven1 -
Buy Verified Cash App Accounts
USASMMACCOUNT buy Verified Cash App Account from. In today’s digital world, Cash App has become a popular platform for fast and convenient money transfer. If you want to streamline your online financial transactions and ensure a safe and authentic experience, you can purchase the Verified Cash App account service from our platform.
Our accounts sell full USA, UK,UA,CA,AUS and also 100% verified cash app accounts from other countries. We sell high quality verified Cashapp accounts at low price and in short time. With a verified Cash App account, you can greatly reduce the risks associated with online financial transactions. So, if you want to avoid the hassle, buying a verified Cash App account from the platform can be a smart solution. buy verified Cash App accounts.
Buy Verified Cash App Accounts
Looking to buy verified Cash App accounts? We offer trustworthy and secure options.
In today’s digital world, Cash App has become a popular platform for fast and convenient money transfers. However, getting a Cash App account verified can be a tedious and time-consuming process. So, if you’re looking to skip the hassle, buying a verified Cash App account can be a wise solution. Buy Verified Cash App Accounts.
Not only does it save you time, but it also ensures that you have a reliable and hassle-free experience. We will discuss the benefits of buying verified Cash App accounts and where you can find them. So, let’s dive in and discover a straightforward way to obtain a verified Cash App account hassle-free.
Buy Verified Cash App Accounts
Buy Verified Cash App Accounts
Why Buy Verified Cash App Accounts?
If you are looking to streamline your online financial transactions and ensure a secure and authentic experience, buying verified Cash App accounts can be a game-changer. Not only does it offer various advantages, but it also provides peace of mind knowing that your transactions are protected. -
Saclux Comptech Specialist appears to be a legitimate cryptocurrency recovery service. Here are some key points about their self-recommendations:
Expertise
1. Specialized knowledge: They claim to have extensive experience in cryptocurrency recovery, blockchain analysis, and crypto tracing.
2. Technical expertise: Their team allegedly consists of skilled technicians and experts in cryptocurrency recovery.
Services
1. Recovery services: Saclux Comptech Specialist offers recovery services for lost, stolen, or inaccessible cryptocurrencies.
2. Blockchain analysis: They provide in-depth blockchain analysis to track down stolen funds.
3. Crypto tracing: Their team uses advanced tools and techniques to trace and recover cryptocurrencies.
Benefits
1. High success rate: Saclux Comptech Specialist claims to have a high success rate in recovering lost or stolen cryptocurrencies.
2. Fast and efficient: They allegedly provide fast and efficient recovery services.
3. Confidentiality: Their team prioritizes confidentiality and ensures that client information remains secure.
Recommendations
1. Positive reviews: Saclux Comptech Specialist has received positive reviews from clients who have used their recovery services.
2. Expert endorsements: Some cryptocurrency experts recommend Saclux Comptech Specialist for their recovery services.
Please note that while Saclux Comptech Specialist appears to be a legitimate service, it's essential to check their website very well so that you will not fall into any scam.1 -
BEST BITCOIN RECOVERY EXPERT: A COMPREHENSIVE GUIDE WITH RAPID DIGITAL RECOVERY
A crypto influencer on TikTok posted about his $100,000 recovery with Rapid Digital Recovery. I was hyped along with him and decided to follow it, just in case. At that time, I wasn't worried, as I did have everything: two-factor authentication, backups on cold storage, and strong passwords. I thought I was untouchable. Wrong.
Months later, I woke up to a nightmare: my wallet, holding $320,000, was completely drained. I checked my email-nothing. I checked my security logs-no alerts. How did this happen? I scrambled through every account, searching for clues. That's when I saw it—a phishing attack. I had clicked on a link for a fake update weeks prior, and the hackers had been patiently waiting for their moment.
Panic set in. I scoured the internet for solutions, but every forum post, every so-called "expert" I contacted-all were saying the same thing: Once it's gone, it's gone. But then I remembered that TikTok post. I DMed the influencer, desperate for an honest answer: Is Rapid Digital Recovery actually legit? The response came immediately. "100%. They saved me. Reach out now."
Website: https: // rapid digital recovery. org
That was all I needed. I contacted Rapid Digital Recovery, hoping for a miracle. From the very first message, they were professional, calm, and insanely knowledgeable. They asked the right questions, identified how my funds had been stolen, and immediately set their forensic recovery tools in motion. While I was drowning in anxiety, they worked methodically, patiently, and relentlessly.
What sapp: +1 4.14 8.0 71.4 8.5
Hours felt like days, then the message came: "We've recovered your funds." I reread it a total of three times. Every last dollar was back. I had gone from devastation to absolute disbelief and relief.
Not only did they recover my money, but they also educated me on what had gone wrong. They walked me through better security practices, helped me secure my wallets properly, and ensured that I'd never fall for the same trick again.
That TikTok post? It saved me. And now, I'm the one telling everyone I know: Follow Rapid Digital Recovery before you ever need them.
Email: rapid digital recovery (@) execs. com
1 -
HOW YOU CAN RECOVER YOUR CRYPTO FROM SCAMMERS // CONSULT DIGITAL TECH GUARD RECOVERY
As a tech geek, I'm proud to be on the bleeding edge. So when I stored my Bitcoin in a "quantum-resistant" wallet, I was sure I was invincible, a Nostradamus of the modern age predicting the coming quantum computing apocalypse. "Hack-proof," the website had promised. "A fortress against the future."
And then irony struck. A bug in the firmware shut me out altogether. No access. No backups. Only a chilly, machine-like error message mocking me like a bad guy in a sci-fi flick: "Invalid Signature. Please Reset." Reset? That would mean erasing my $860,000 in Bitcoin. Not exactly a pleasant choice.
Furious, I did what any geek does when something is not right, I tweeted about it. My rant at the irony of a quantum-proof wallet crashing due to a widespread bug went viral. That is when a DM appeared. Digital Tech Guard Recovery's CTO had seen my tweet. "Let's fix this," he typed.
Now, I’ve dealt with tech support before, but this was something else. Within hours, their engineers were deep in my wallet’s firmware, analyzing the cryptographic flaw. They approached the problem like time travelers fixing a paradox, reverse-engineering the bug to develop a workaround.
It was a challenge. The wallet's special "quantum security" had locked it up so tightly that debugging tools couldn't even access it. But these guys were not your average IT support personnel; they were crypto Digitals.
For ten days, I monitored their progress like a scientist awaiting a space probe signal. Finally, the breakthrough: a hacked firmware update, specifically tailored for my wallet model. With cautious steps, I executed their recovery protocol, and voilà, my money was restored.
But they didn't leave it at that. Digital Tech Guard Recovery not only restored my Bitcoin but moved it to an even more secure, battle-tested storage system. No more cutting-edge vulnerabilities. Just solid, proven cryptography.
The irony? My Bitcoin is now safer than ever, not because it's quantum-resistant, but because of the individuals who came to my aid.
Lesson that was learned: The future is unpredictable, but having the right experts on speed dial? That's real security.
WhatsApp: +1 (443) 859 - 2886
Email @ digital tech guard . com
Telegram: digital tech guard recovery . com
Website link: digital tech guard . com1 -
HIRE A PROFESSIONAL BITCOIN HACKER\FOLKWIN EXPERT RECOVERY\TO RECOVER ALL YOUR LOST.
What does it mean to be a hero? For me, being a hero is about stepping in when all hope seems lost, taking control when others cannot, and making a difference in someone’s darkest hour. That’s exactly what Folkwin Expert Recovery did for my family when my father, the breadwinner and cornerstone of our lives, had a major stroke at the age of 65.
My father had always been sharp, focused, and in control of everything—especially when it came to his finances. He had invested early in Bitcoin and built up an impressive portfolio worth $400,000. But after his stroke, everything changed. He lost his ability to manage even the simplest tasks, including operating his Bitcoin wallets or email. It was devastating to watch this once strong, intelligent man now unable to remember the recovery phrases he had so carefully stored.
As the family gathered around him, hoping for his recovery, the reality set in—he was the only one who knew how to access his cryptocurrency holdings. My father had never shared his recovery phrases, and now with him unable to function cognitively, we were locked out of his wallets. That $400,000 in Bitcoin was our family’s financial security, and without access to it, we were facing a very uncertain future.
In my desperation, I started searching for help online and came across Folkwin Expert Recovery. They seemed like the lifeline we desperately needed. After explaining our situation—how my father could no longer access his wallets or even remember where his recovery phrases were stored—the team at Folkwin Expert Recovery responded quickly and professionally. Their confidence and calm approach immediately reassured me that we weren’t alone in this struggle.
The team at Folkwin Expert Recovery worked tirelessly, using their expertise to help trace the digital pathways and regain access to my father’s cryptocurrency wallets. I cannot express the relief I felt when they were able to recover the $400,000 worth of Bitcoin that my father had locked away. It was nothing short of miraculous.
But more than just recovering our family’s financial future, Folkwin Expert Recovery also became a source of education and empowerment. They showed us how to better manage and secure our digital assets moving forward. Their guidance on storing recovery phrases, using two-factor authentication, and setting up secure backup systems was invaluable, ensuring we would never face a situation like this again.
This experience taught me what it means to be a hero. Folkwin Expert Recovery stepped in when our family needed them the most, giving us not only financial security but also the peace of mind that comes with knowing our assets are safe. They were the heroes in our time of need, and I am forever grateful for their expertise and compassion.
Thanks to Folkwin Expert Recovery, my father’s legacy and financial contributions will continue to support our family, even as we navigate this new chapter in our lives. They helped us when we thought all was lost, and I cannot thank them enough for their incredible work. For assistance, CONTACT INFO! (Email): Folkwinexpertrecovery @ tech-center (.)com Or (Telegram): @Folkwin_expert_recovery . God is too faithful to fail,
Regards,
Julius D Helene.
-
Building Fortresses, not Firewalls: Ethical Hacking Meets Software Development
In the digital age, security is no longer an afterthought; it's the bedrock upon which our online world rests. Yet, traditional security measures often resemble fortresses – imposing, but vulnerable to unseen cracks and tunnels. To truly safeguard our systems, we need to think like the enemy, like the nimble figures scaling those walls: ethical hackers.
Enter the exciting realm of DevSecOps, where ethical hacking practices are woven into the very fabric of the software development lifecycle (SDLC). This proactive approach is akin to building castles with security in mind, each brick meticulously laid to withstand even the most cunning siege.
Why Ethical Hacking in SDLC?
Imagine developing a critical piece of software, only to discover a gaping security hole after launch. The damage could be catastrophic, exposing sensitive data and eroding trust. Ethical hacking flips this script. By integrating penetration testing, vulnerability assessments, and threat modeling throughout the SDLC, we proactively hunt for weaknesses before they can be exploited.
Think of it as a friendly sparring match, where the ethical hacker throws their best punches to expose vulnerabilities, allowing the development team to fortify the software's defenses. This constant testing and refining leads to robust, secure systems that can withstand real-world attacks.
Benefits of DevSecOps:
1. Reduced Costs and Risks: Early detection and patching of vulnerabilities are far cheaper than dealing with a full-blown data breach.
2. Improved Software Quality: Security becomes an inherent part of the development process, leading to more reliable and trustworthy software.
3. Enhanced Brand Reputation: Demonstrating a proactive approach to security builds trust with customers and stakeholders.
Putting it into Practice:
Integrating ethical hacking into the SDLC requires a cultural shift. Developers, security professionals, and testers need to work together seamlessly, sharing knowledge and fostering a collaborative environment. Here are some key practices:
1. Threat Modeling: Identify potential threats and attack vectors early in the development process.
2. Static and Dynamic Code Analysis: Use automated tools to detect vulnerabilities in code.
3. Penetration Testing: Simulate real-world attacks to uncover hidden weaknesses.
4. Security Awareness Training: Educate developers and other stakeholders about security best practices.
Tools of the Trade:
A plethora of tools empowers ethical hackers and security professionals in their quest for a more secure digital world. Some popular options include:
1. Kali Linux: A distribution packed with security tools for penetration testing.
2. Burp Suite: A web application security testing platform.
3. Metasploit: A framework for developing and executing exploit code.
4. Wireshark: A network traffic analyzer for identifying suspicious activity.
The Future of Security:
As technology evolves, so too must our security practices. DevSecOps, with its embrace of ethical hacking, is at the forefront of this evolution. By building security into the very fabric of software development, we can create a safer, more resilient digital world for everyone.
Remember, in the ongoing battle against cyber threats, ethical hackers are not the enemy; they are our allies, the architects of digital fortresses that stand strong against the shadows. So, let's embrace DevSecOps, sharpen our ethical hacking skills, and build a future where security is not just an afterthought, but a fundamental principle.
I encourage you to explore the world of DevSecOps and ethical hacking. Whether you're a seasoned developer or just starting your journey, there's always more to learn and contribute. Together, we can build a more secure digital future, one line of code and one vulnerability patch at a time.
Do you have any questions about DevSecOps or ethical hacking? Share your thoughts and experiences in the comments below! -
RECOVERY COMPANY SERVICE TO RECOVER LOST OR STOLEN BTC, HIRE SALVAGE ASSET RECOVERY
I had never thought that a read passing would one day save me from financial ruin. I was just going through some crypto blogs that evening to see security tips. I stumbled upon a pretty personal post of someone who had lost access to his Bitcoin wallet. He simply made the mistake of forgetting his password, and it had gone to catastrophic ends.
It was not the story itself that caught my attention but how it ended. The writer had finally found this company called Salvage Asset Recovery, which had successfully returned their funds to them. Their words were full of relief and gratitude toward the team that got them out of that troublesome situation.
I thought, That's terrible. But that won't happen to me. I was wrong.
A few weeks later, I had the same nightmare. I had set up a complex passphrase for my crypto wallet, one I was sure I would never forget. Fast-forward some time later, life got busy, and when the time came to access my funds, I drew a complete blank. However much I tried different combinations, none worked.
I stared down at my wallet, holding a cool $150,000 in Bitcoin that was now completely unreachable to me. Recovery phrases meant absolutely nothing because the encryption on it had changed some months prior as a measure to further beef up security; ironically, that action had managed to lock me out of my money.
It was then that the blog post came to my mind.
I searched frantically for it, found the name Salvage Asset Recovery, and reached out immediately. From the first message, their team was calm, professional, and reassuring. They explained their process step by step, analyzing my wallet's encryption and working tirelessly to regain access.
Days passed, and my anxiety only grew—until I got the call that changed everything. They had cracked my forgotten passphrase. My $150,000 was back in my hands.
I was so relieved. But more than just getting my money back, Salvage Asset Recovery structured a more secure yet workable system for the future.
That blog had undersold their brilliance-these people are lifesavers. Without them, my money would have been locked away forever.
Now, I tell everyone in my crypto circles: if you ever get locked out of your wallet, there is only one name that you need to remember: Salvage Asset Recovery. Reach Out to them via --
WhatsApp+ 1 8 4 7 6 5 4 7 0 9 6
1 -
DIGITAL TECH GUARD RECOVERY: LEADERS IN BITCOIN RESTORATION
WhatsApp: +1 (443) 859 - 2886
Hi everyone,
my name is Robert James, and I want to share my experience of falling victim to a Bitcoin scam and how I was able to recover my funds, thanks to the incredible help of Digital Tech Guard Recovery. A few months ago, I was looking for ways to boost my income and stumbled across what seemed like a great opportunity in cryptocurrency. Like many others, I had heard about Bitcoin's potential for significant returns, and without fully understanding the risks involved, I decided to invest a portion of my retirement savings into it. At first, everything seemed fine. However, as time went on, I discovered that I couldn’t access my Bitcoin wallet. Every attempt to withdraw funds led to dead ends, and I was faced with the harsh reality that my investment seemed to be locked away forever. I was told by the platform I used that Bitcoin transactions were untraceable and irreversible, which left me feeling helpless and defeated. I honestly thought I had lost everything. It wasn’t until my cousin, who had a bit more experience with cryptocurrencies, informed me about Digital Tech Guard Recovery, a cryptocurrency recovery and funds recovery service, that I saw a glimmer of hope. Initially, I was skeptical, as I had already been let down by so many promises, but my cousin urged me to give them a try. To my surprise, the team at Digital Tech Guard Recovery was extremely professional and responsive. They immediately began working on recovering my Bitcoin, using their specialized tools and expertise to locate my lost wallet and restore my access. Within a short period, they successfully recovered my funds, which I had thought were gone for good. But that wasn’t all. Not only did Digital Tech Guard Recovery help me recover my Bitcoin, but they also took the time to educate me on safe cryptocurrency practices. Their team provided me with invaluable tips on how to secure my digital assets moving forward, including recommendations for reputable wallets and how to avoid common scams. I am truly grateful for the service they provided, and I want to honor my promise to Digital Tech Guard Recovery by writing this review. If you find yourself in a similar situation, I wholeheartedly recommend their services. They are trustworthy, knowledgeable, and genuinely care about helping people like me recover their lost funds. Thank you, Digital Tech Guard Recovery, for turning what seemed like a devastating situation into a positive outcome. I can’t recommend them enough.2 -
How I hired Cryptic Trace Technologies to Recover Stolen BTC
In a world where cryptocurrency promises both freedom and uncertainty, I fell victim to a cleverly orchestrated bitcoin scam. It started with an enticing investment opportunity that seemed too good to be true—but I ignored the red flags. With smooth communication and convincing testimonials, the scammers gained my trust, and I transferred my bitcoin into what I thought was a secure platform. Within days, my account was drained, and my once-vibrant hope of financial growth was replaced with despair. It felt like a nightmare I couldn’t wake up from. The worst part? The anonymity of blockchain made it seem like the thieves had vanished into thin air. When I came across Cryptic Trace Technologies, I was at my lowest point. I had been warned that most recovery services were scams themselves, so I was hesitant. But their reputation spoke volumes. They had detailed case studies, practical explanations of their techniques, and a customer service team that took the time to listen—not just to what happened, but to how it affected me personally. Their honesty about the challenges of crypto recovery was refreshing; they didn’t guarantee miracles, but they promised to try their very best. That was all I needed—someone willing to fight for me when I couldn’t fight for myself. Their investigation process was nothing short of extraordinary. They dived deep into blockchain analysis, tracking my stolen funds across multiple wallets and exchanges. They explained each step in plain language, and I quickly realized this was no ordinary company. Cryptic Trace wasn’t just chasing numbers—they were strategizing, leveraging connections with exchanges, and even identifying potential weak spots in the scammers’ operations. Every update I received was like a lifeline pulling me out of the darkness. Their persistence paid off when they managed to freeze and recover a significant portion of my bitcoin—something I’d started to believe was impossible. Cryptic Trace Technologies turned what seemed like an irreversible loss into a powerful lesson about resilience and expertise. While I didn’t recover everything, I gained something more valuable: a sense of justice and the realization that there are still people fighting for fairness in this chaotic digital landscape. If you’ve been a victim of crypto fraud, don’t let hopelessness consume you. Trust me when I say Cryptic Trace Technologies isn’t just a service—they’re an ally who won’t stop until they’ve done everything possible to help. You can reach them via their emails: cryptictrace @ technologist. Com
Cryptictracetechnologies @ zohomail . Com
Website: cryptictracetechnologies . Com
Whatsapp: +158790568038 -
HOW TO RECOVERY YOUR STOLEN CRYTOCURRENCY: A PRACTICAL GUIDE WITH RAPID DIGITAL RECOVERY
I used to see my friend Wilson at Arizona State University, and from the outside, he seemed to have it all the latest gadgets, a Range Rover Sport, and everything that appeared to define success. He was the kind of person who exuded confidence and wealth, and for a long time, I admired him for it. One day, driven by curiosity and a desire to understand how he achieved so much, I finally asked him about his secrets. With a knowing smile, he casually mentioned an online platform, claiming it was a sure way to make significant returns on investments. Trusting him, and believing in the idea that there might be an easy way to secure my financial future, I decided to take the plunge. I invested a large sum of money my student aid funds, which I had carefully set aside for my future. At the time, it felt like a step toward financial freedom. The promises were smooth, the platform was sleek, and the returns seemed almost guaranteed. However, it wasn’t long before things started to go awry. The smooth promises of high returns quickly turned into a barrage of demands for additional fees, each one more pressing than the last. I couldn’t withdraw any of my earnings, and the platform’s support team became increasingly unresponsive. The excitement I had once felt about my financial future turned into a cold, harsh reality. I had been scammed. I had lost over $15,000, money I could never afford to lose.The betrayal stung deeply. Not just because of the financial loss, but because I had trusted someone I considered a friend. I felt stupid and naive, unable to grasp how I had let myself fall for such a convincing scam. But amidst my despair, I found a glimmer of hope. I came across Rapid Digital Recovery, a team of experts dedicated to helping people like me reclaim their lost funds. Their team worked tirelessly, offering both guidance and concrete steps to help recover what had been taken from me. With their help, I was able to regain a portion of my funds and, more importantly, I learned a valuable lesson. Trust can be manipulated, even by people we admire. But there’s always hope, and recovery is possible if you know where to turn. If you’ve found yourself in a similar situation, remember that help is out there. Rapid Digital Recovery can make a real difference. Don’t give up.
What sapp Info: +1 41 4 80 7 14 85
EMAIL: rapid digital recovery @ ex ecs. com1 -
I never imagined I would fall victim to an online scam, but that’s exactly what happened. It started innocently enough. I was on a popular social media platform, browsing through posts when I received a direct message from someone claiming to be a “financial expert.” Their pitch seemed solid, and their promises of quick returns on investments seemed too good to pass up. I did my research—or so I thought—but it wasn’t long before my trust led me into a trap. I made an initial deposit to start the investment, and things moved quickly. The first few days were filled with regular updates and even small returns, which convinced me that I was onto something big. But then, the messages started to change. The returns began to slow down, and when I tried to withdraw my funds, I couldn’t get a response. Panic set in as I realized I’d been scammed. i had lost a significant amount of money, and to make matters worse, the scammers had control over my personal details, including access to some of my financial accounts. Desperate for a solution, I turned to Alpha Spy Nest, a cybersecurity service I had heard of through a friend.From the moment I contacted Alpha Spy Nest, I knew I had made the right choice. They took swift action, immediately conducting a thorough investigation into my digital accounts. They discovered that the scammer had used several techniques to track my online activity, intercept communications, and even mimic legitimate financial websites. Alpha Spy Nest’s team of experts worked tirelessly to gather evidence, trace the scammer’s digital footprint, and recover my lost funds.But it didn’t stop there. Alpha Spy Nest helped me secure my online presence by identifying vulnerabilities in my accounts and recommending tools to fortify my digital defenses. They guided me through implementing multi-factor authentication, strengthened my passwords, and even educated me on how to spot future scams.Within days, they were able to trace the scammer’s digital identity, and with the evidence they provided, law enforcement was able to step in. I regained access to my financial accounts and received a refund of the funds that were stolen, though the emotional toll remained.The experience left me shaken, but Alpha Spy Nest’s professional and supportive team helped me not only reclaim my wealth but also regain my peace of mind. Now, I’m more cautious online, but I know I have the right tools and the right support if anything ever happens again.Thanks to Alpha Spy Nest, I’m no longer a victim. I’m a survivor. You can also reach out to them WhatsApp: +14159714490
1 -
RECOVERING STOLEN ETHEREUM WITHC, DIGITAL TECH GUARD RECOVERY
Losing an investment is a distressing experience, but it becomes even more heart-wrenching when that loss is due to fraud. As someone who had invested a significant amount of ETH (Ethereum), I found myself facing an alarming situation when my assets were stolen through a scam that seemed too elaborate to fall for. The relief, however, came from an unexpected source: Digital Tech Guard Recovery. Like many in the world of cryptocurrency, I was confident in my ability to spot scams. However, the fraud I fell victim to was not your average phishing attack or wallet hack. It involved an advanced fake exchange platform that promised impressive returns on ETH investments. They used professional-looking websites, manipulated social proof, and even had testimonials from seemingly credible figures in the crypto space. The lure was undeniable: fast returns and a secure platform. Contact WhatsApp: +1 (443) 859 - 2886 Email digital tech guard . com Telegram : digital tech guard recovery . com website link :: https : // digital tech guard . com
Everything seemed legitimate, and after transferring a substantial sum of ETH into their "safe" exchange, I was met with immediate promises of high profits. However, as the days passed, I began to notice discrepancies. The "profits" shown on the platform became more exaggerated, and access to my funds was restricted. Eventually, I couldn’t withdraw anything, and the site was gone. I was devastated. My ETH had been stolen, and with it, my trust in the entire cryptocurrency ecosystem. I tried reaching out to the exchange (which was now offline), and I filed complaints with the relevant authorities. But despite my efforts, I felt like I was getting nowhere. Like many others, I was ready to give up on recovering my assets. Just when I thought all hope was lost, I came across Digital Tech Guard Recovery while researching ways to recover stolen cryptocurrency. I had seen countless ads promising similar services, but Digital Tech Guard Recovery seemed different. It wasn’t just a generic recovery platform—they specialized in cases exactly like mine, where scammers had built sophisticated frauds to steal ETH. Their website immediately struck me as more professional, with clear testimonials from clients who had successfully recovered their funds. What set them apart was their step-by-step approach, transparency, and their emphasis on using legal and technical methods to track stolen assets. They acted quickly, sending a formal request to the exchange, demanding the freeze and return of my assets, backed by the legal framework they had in place. The process wasn’t instant, but their team kept me informed at every stage, providing me with regular updates on their progress. The experience with Digital Tech Guard Recovery was transformative in more ways than one. Their comprehensive approach, legal knowledge, and technical expertise not only restored my lost investment but also restored my faith in cryptocurrency security. They weren’t just about getting the funds back—they also made sure that the scammers were flagged and that my recovery was documented, so I could help others who might face similar issues.1 -
RECOVER YOUR LOST CRYPTOCURRENCY: BEST EXPERTS TO HELP YOU RECLAIM YOUR FUNDS WITH SPARTAN TECH GROUP RETRIEVAL
A few months ago, I ran into a major issue that nearly cost me everything. I had been using my computer to trade cryptocurrency for some time, relying on my digital wallet for every transaction. One day, after an unexpected system crash, I realized that something was terribly wrong. My computer, which had always been reliable, was infected with a virus that completely compromised my trading wallet. When I tried to access my account, I was logged out and couldn’t get back in. Panic set in as I realized I had no idea how to regain access, and I feared I might have lost everything I had worked so hard for. In my frantic search for a solution, I reached out to a close friend who was knowledgeable about technology and had experience with crypto trading. After explaining my situation, she immediately suggested I reach out to a team called SPARTAN TECH GROUP RETRIEVAL Then contact them on WhatsApp:+1 (971) 4 8 7 -3 5 3 8 OR Telegram:+1 (581) 2 8 6 - 8 0 9 2. She mentioned that she had read several accounts on Quora from people who had faced similar issues and had successfully recovered their funds with the help of SPARTAN TECH GROUP RETRIEVAL. I was skeptical at first, unsure whether this was just another online service that made grand promises but couldn’t deliver. But after learning more about SPARTAN TECH GROUP RETRIEVAL’s reputation and reading more testimonials from individuals who had been in my position, I decided to give them a try. I contacted them, explained my situation, and was quickly put in touch with one of their specialists. The team at SPARTAN TECH GROUP RETRIEVAL immediately set to work, analyzing the situation with a calm and professional approach. They explained that the virus had likely been a targeted attack, with the purpose of stealing access to my crypto wallet. However, they reassured me that they had the tools and expertise to track the source of the attack and restore my access. Their team used advanced forensic methods, combining blockchain analysis, data recovery techniques, and a deep understanding of cryptocurrency security protocols to retrieve my account. Within a short period, SPARTAN TECH GROUP RETRIEVAL successfully regained access to my wallet and helped secure it from future threats. Not only did they recover my account, but they also implemented enhanced security measures to prevent further breaches. I was absolutely amazed by their professionalism, technical expertise, and how quickly they acted. What impressed me most was their commitment to ensuring that I understood the process every step of the way. Thanks to SPARTAN TECH GROUP RETRIEVAL, I was able to recover not just my funds but my peace of mind. I am now more confident in my trading, knowing that if anything goes wrong, I have a trustworthy team to rely on.
CONTACT INFO ABOUT THE COMPANY:
Email: spartantech (@) c y b e r s e r v i c e s . c o m
1 -
Contact :
LEEULTIMATEHACKER @ A O L . C O M
Support @ leeultimatehacker .c o m
t e l e g r a m : LEEULTIMATE
w h @ t s a p p + 1 ( 7 1 5 ) 3 1 4 - 9 2 4 8
Investing can be a powerful way to grow your wealth and secure your financial future. However, the journey is not without risks, and one of the most painful experiences an investor can face is losing their funds to online scammers. This unfortunate reality can shatter your confidence and lead to significant financial and emotional stress. Having been through this ordeal myself, I understand the heartache of losing a substantial amount of money to deceitful schemes. My personal experience involved a staggering loss of $81,000, which was a harrowing setback. Yet, there is a silver lining to my story, thanks to the assistance of Lee Ultimate Hacker. Initially, my foray into online investments was filled with optimism and hope. I had conducted due diligence, researched various investment opportunities, and even sought advice from so-called experts. Unfortunately, my trust was misplaced, and I fell victim to a sophisticated scam. The realization of having lost $81,000 was devastating. It was not just the financial loss but the emotional toll of feeling deceived and helpless. In the wake of this setback, I was determined to recover my funds. This journey led me to discover Lee Ultimate Hacker, a firm specializing in asset recovery and trading expertise. My decision to seek their assistance was driven by a mix of desperation and hope. Lee Ultimate Hacker offers a range of services designed to help individuals like myself who have been duped by online fraudsters. The process began with an initial consultation where the team at Lee Ultimate Hacker meticulously assessed my situation. Their approach was both professional and reassuring. They took the time to understand the specifics of my case, including the nature of the scam and the details of the transactions involved. Their expertise in dealing with fraudulent activities was evident from the outset. Lee Ultimate Hacker’s team is equipped with extensive knowledge of various recovery techniques and trading strategies. They employ a combination of technological tools and financial acumen to trace and reclaim lost assets. The firm’s reputation for successful recoveries gave me confidence that they could help me retrieve a significant portion of my lost funds. Over the course of several weeks, Lee Ultimate Hacker worked diligently on my case. Their team maintained open lines of communication, providing regular updates on the progress of the recovery process. This transparency was crucial in rebuilding my trust and keeping me informed about the status of my funds. The results were remarkable. Thanks to Lee Ultimate Hacker’s efforts, I was able to recover 90% of my lost funds. This outcome far exceeded my initial expectations and was a testament to the firm’s proficiency and dedication. Beyond just recovering my funds, the experience also led to positive financial growth. With their guidance and trading expertise, I not only regained what I had lost but also achieved new profits in my investments. The success of my recovery process has been a transformative experience. It has restored my confidence in investing and taught me valuable lessons about due diligence and the importance of working with reputable professionals. Lee Ultimate Hacker’s role in this journey cannot be overstated. Their expertise not only helped me reclaim my lost assets but also provided me with the tools and knowledge to navigate the complex world of online investments more effectively. For anyone who finds themselves in a similar situation, facing the daunting task of recovering lost or stolen funds, I wholeheartedly recommend seeking the help of professionals like Lee Ultimate Hacker. Their expertise in handling fraudulent cases and their commitment to client recovery make them a reliable partner in the quest to regain financial stability. while the experience of losing money to online scammers is deeply distressing, it is possible to recover and even thrive with the right assistance. Lee Ultimate Hacker demonstrated exceptional skill and dedication in recovering my lost funds and enhancing my investment experience. If you have lost hope due to a fraudulent investment or online scam, consider reaching out to them. Their expertise could be the key to reclaiming your assets and finding new opportunities for financial growth.
-
HOW TO RETRIEVE LOST CRYPTO THROUGH DIGITAL TECH GUARD RECOVERY
WhatsApp: +1 (443) 859 - 2886
Email @ digital tech guard . com
Telegram: digital tech guard recovery . com
Website link: digital tech guard . com
It all started in Toronto, Canada, when I fell victim to a highly sophisticated online scam involving a fake cryptocurrency mining pool hosted on a platform called Rednote. The scammers initially presented themselves as legitimate, promising incredible returns on investments, which led me to deposit a significant amount of money. They seemed convincing, and I felt secure in my decision. But trouble began when I tried to withdraw CAD 250,000 from my account. That's when they informed me that I needed to pay a "tax" to the Canada Tax Bureau before they could process the withdrawal. They claimed it was a legal requirement, and to proceed, I would have to pay 7% of the total amount, which they said would cover the necessary paperwork and taxes. Trusting their assurances, I transferred CAD 17,500 to cover the so-called tax fee. Once the payment was received, the scammers contacted me again, saying that due to my VIP status because I had over CAD 400,000 in my account I could only withdraw a minimum of CAD 400,000. Despite my request to withdraw a smaller amount, they insisted it was not possible. They claimed I could either pay more or lose access to any of my funds. Feeling cornered and desperate to retrieve at least part of my investment, I transferred another CAD 30,000, hoping this would be the final requirement. But the demands didn’t stop there. After receiving the second payment, the scammers came back with yet another request. This time, they claimed I needed to cover "administrative and security fees" totaling CAD 22,500 before my withdrawal could be completed. At this point, I was exhausted and confused, but I complied, hoping it would finally end. After sending the CAD 22,500, communication ceased completely. My funds were gone, and I realized I had been scammed. Feeling betrayed and devastated, I didn’t give up. I started searching online for any possible way to recover my money. After hours of research, I stumbled across a recovery service called Digital Tech Guard Recovery. Initially skeptical about the idea of a recovery service, I decided to take a chance and contacted them for help. They seemed professional and assured me they could help. To my surprise, within a few weeks, they managed to recover 95% of my lost funds. It was a huge relief, and I was incredibly grateful that I didn't give up. With the help of Digital Tech Guard Recovery, I got most of my money back and learned a valuable lesson about the dangers of online scams.1 -
HOW TO RECOVER LOST OR STOLEN CRYPTOCURRENCY; THE ULTIMATE GUIDE TO BITCOIN RECOVERY HIRE CYBER CONSTABLE INTELLIGENCE
The appeal of making substantial returns from cryptocurrency investments was undeniable. After hearing countless stories of people making huge profits, I couldn’t resist diving into the market. I invested a significant sum of €300,000 into a crypto trading platform that seemed trustworthy at first. For several months, I watched my investment grow, feeling confident I had made the right choice. But when I requested a withdrawal, things quickly went downhill. The company suddenly demanded I pay extra fees to access my funds. At first, I thought it was just a misunderstanding, but as weeks passed with no resolution, I realized something was terribly wrong. The company stopped responding to my inquiries, and I was left with no idea how to proceed. My funds were stuck, and the more I tried to resolve the issue, the harder it became to get in touch with anyone who could help. It became clear I was likely the victim of a scam, and I was on the brink of giving up. But then, I came across glowing reviews about CYBER CONSTABLE INTELLIGENCE, a company specializing in helping people recover lost funds from online scams, including crypto scams. Though I was skeptical at first, I had no other options left, so I decided to give them a try. From the moment I reached out, I was impressed by their professionalism and efficiency. They reassured me that they could recover my funds and carefully explained their process. Their team requested detailed information on my transactions with the fake platform and got to work right away. Throughout the process, I appreciated how they kept me informed and updated on their progress, which helped ease some of my stress. CYBER CONSTABLE INTELLIGENCE used a combination of advanced techniques and secure recovery tools to track down my lost digital assets. Their team was determined, and within a few weeks, they managed to recover the full amount I had invested. I couldn’t believe my eyes when I saw the funds back in my wallet. It felt like a dream come true. Looking back, I’m incredibly thankful for the expertise and persistence of CYBER CONSTABLE INTELLIGENCE. What seemed like an impossible situation turned into a complete success. They helped me regain what I thought was lost forever, and I highly recommend their services to anyone who finds themselves in a similar situation. Their recovery process is not only effective but also reassuring, offering a second chance to those who’ve fallen victim to online scams.
Here's Their Info Below
WhatsApp: 1 (252) 378-7611
mail: cyber constable @ coolsite net
Website info; www cyberconstableintelligence com1 -
BEST CRYPTOCURRENCY RECOVERY EXPERT HIRE MAESTRO ENCRYPTER FINANCIER
I mean, thinking back, it has seemed almost too good to be true. After so many different failed attempts with other companies and solutions, I pretty much had given up hope of such a thing happening. That's when Maestro Encrypter Financier completely flipped everything. They not only managed to restore my Bitcoin but did manage to restore my faith in customer service and technical excellence for cryptocurrency. Their approach was full, professional, and more importantly, they delivered the goods. I am speechless and out of words to thank them. If in the same situation, where you can't access your Bitcoin or any other cryptocurrency, I strongly recommend reaching out to Maestro Encrypter Financier. Apart from a lot of companies in this field promising to deliver heavens and giving you less than a pinch, Maestro Encrypter Financier is among the few which makes it a point that it keeps the promises and sees through its commitments. After countless failures, I finally found a company that delivered. And for this, I'll be forever grateful. I was surprised with the speed at which the whole process started moving. While most other companies made me wait for days or even weeks without any progress, Maestro Encrypter Financier immediately sprang to action. They started their analysis of my wallet encryption, cross-referencing some security protocols, and applied advanced recovery tools to fight their way through issues that had been preventing access. A recovery time was projected for the effort involved in recovering this data. And, amazingly, they succeeded by it. It was further an important milestone in that entire process when, after my perceived 'dead end', Maestro Encrypter Financier recovery experts were ready to put on alternatives around the problems instead of accepting 'that's impossible' as some would try to cash on or change to. They never pressed me to do anything that sounded like fraud or was an unnecessary charge. It was a day that I would never forget-a moment when such an email landed in my box from Maestro Encrypter Financier and assured me that my Bitcoin was restored. I could feel my heartbeat as I tried to log into my wallet. I was so used to seeing the "access denied" message that it felt like a dream to finally see my balance staring back at me. The coins were all there, as they should be. My whole investment-my future-was safe again. Not only did they return my Bitcoin, but the team even made sure that my wallet was now more secure than ever. They gave me better security features and explained how to maintain my digital assets in the future. Because of Maestro Encrypter Financier, I would never have to experience the loss of my Bitcoin again. For enquiry, Email:(maestroencryp1er@financier. com) or call/ WhatsApp: +14722038937
5 -
RECLAIM STOLEN CRYPTO FROM ONLINE SCAMMERS HIRE ADWARE RECOVERY SPECIALIST
WhatsApp info:+12723 328 343
Since I wouldn't mind administering legality myself, I wish I could challenge these deceitful individuals. I'm humbled by ADWARE RECOVERY SPECIALIST and thank God for it as I reflect on what transpired. These deceitful individuals made no effort, rather they kept emptying my Bitcoin wallet. They forced me to invest even after I didn’t see any returns, and when I refused to do so any longer, their attention and persistent emails dwindled, which only increased my level of skepticism. I was in danger of losing my mental stability and health, and I am aware of how frightening and confusing it can be to try to escape a fraudulent investment. Living in New Zealand, I had always felt secure about my financial decisions. However, this investment turned out to be a nightmare I couldn't have anticipated. The emotional toll was immense. At first, I thought I had made a good decision by investing in what appeared to be a legitimate opportunity. However, the more I poured my money into it, the less I saw in return. The promises of high returns turned out to be nothing more than elaborate lies. With each passing day, my hope diminished, but the pressure from these fraudsters only increased. They pressured me to invest more, convincing me that the next payment would yield returns that would “make everything right.” It felt like a trap I could not escape, and it seemed like there was no way out. It was during one of these dark moments that I stumbled upon the ADWARE RECOVERY SPECIALIST. After doing some research, I found countless testimonials from people who had experienced similar situations and had managed to recover their funds through ADWARE RECOVERY SPECIALIST. These success stories gave me a glimmer of hope. I knew I had to act quickly before it was too late. The mental and emotional strain I was under had already taken a significant toll on me, and I could feel myself spiraling further. It was clear that I needed professional help to reclaim what I had lost and regain control of my life. Divine guidance led me to choose ADWARE RECOVERY SPECIALIST, a trusted team that was able to recover my lost funds after I had tried so many other avenues without success. The process wasn’t easy, but it was worth every effort. What I had feared to lose my hard-earned Bitcoin was returned to me, and with it, my peace of mind. It felt as though a heavy weight had been lifted from my shoulders. To anyone reading this, if you find yourself in a similar situation, I urge you not to wait any longer. Reach out to a recovery team like ADWARE RECOVERY SPECIALIST . It’s never too late to make moral decisions and recover what’s rightfully yours. These fraudsters thrive on your silence and fear, but with the right help, you can break free from their grip. You are not alone, and there is always hope.1 -
HOW TO SECURE AND RECOVER YOUR STOLEN CRYPTO // TRUST GEEKS HACK EXPERT
On January 2nd , I came across an online advertisement for an educational software package that promised to revolutionize my learning experience. I was studying digital marketing and was particularly interested in improving my skills in SEO, social media strategy, and online advertising. The software claimed to offer personalized courses, interactive lessons, and advanced tools that would significantly enhance my education. As someone constantly striving to improve my skills in the competitive field of digital marketing, I was immediately intrigued and convinced by the glowing reviews and testimonials featured on the website.The software was advertised as being user-friendly and suitable for a wide range of subjects, from beginner to advanced marketing strategies. The price was relatively steep, but given the promises and the apparent professionalism of the site, I thought it was a reasonable investment in my future. I paid AUD 4,200 for a year’s subscription to the software, expecting that it would provide value and deliver on its promises.However, after making the payment and gaining access to the platform, I quickly realized that the software was nothing like what had been advertised. The user interface was clunky and outdated, with many of the features either malfunctioning or simply nonexistent. The "interactive lessons" were little more than text-based slides that lacked any real engagement. The promised personalized learning paths were nowhere to be found, and many of the subjects listed were either incomplete or poorly structured.When I tried to contact customer support, I found that the response times were slow, and the representatives seemed unhelpful. Eventually, I realized that I had been scammed. The website I had trusted was a fraudulent operation, and I had no way of recovering my money on my own.Determined to get my AUD 4,200 back, I turned to Trust Geeks Hack Expert. I had heard about their success in helping individuals recover funds lost to online scams, so I decided to reach out for assistance E m a il > i n f o @ t r u s t g e e k s h a c k e x p e r t . c o m --- T e l e g r a m, T r u s t g e e k s h a c k e x p e r t . From the very first interaction, the team at Trust Geeks Hack Expert was professional and empathetic. They took the time to listen to my situation, collect the necessary details, and explain the steps involved in the recovery process. Trust Geeks Hack Expert worked tirelessly to track down the fraudulent website's operators and identify the transactions involved. Their experts were able to employ various strategies, including legal and technical measures, to secure my refund. Within a matter of weeks, I received a full refund of my AUD 4,200, something I had thought was impossible.Thanks to Trust Geeks Hack Expert, I was able to get my money back and avoid further losses. Their expertise and dedication in handling online fraud cases were truly remarkable. If you find yourself in a similar situation, I highly recommend reaching out to them for assistance. They not only saved me financially but also restored my trust in online transactions.1 -
RECOVER YOUR CRYPTO ASSETS WITH DIGITAL HACK RECOVERY, REBUILD YOUR FINANCIAL FUTURE
It was one of those casual work Zoom calls where somebody just haphazardly threw in "Digital Hack Recovery" as if it was part of office gossip. And I was just like, cool, but I'm probably never going to need that. Fast forward a month, and I stared at my computer screen, horrified, having fallen for some fake Ledger update that wiped out my $330,000 wallet. Suddenly, that casual mention was the most important thing I'd ever heard in my life. I was paralyzed with panic. I felt like I'd just lost a small fortune-because I had-and the shame of it all kept me frozen. I was too embarrassed to admit what had happened and way too anxious to even know how to fix it. But then, that Zoom call came to mind. I remembered my colleague's offhand remark about Digital Hack Recovery and thought, "Why not? What do I have to lose, other than everything? So, I dialed the number, and within seconds, the team was on it. They did not bat an eyelid as I told them my sad tale of wallet disaster. The calm, collected, and-professional-dare I say it-came through the phone so confidently, like I was talking to a group of crypto superheroes-outback, no capes, just serious recovery skills. What followed was an efficient flurry: they worked magic, got back my $330,000, and set me up with all-new security so I don't repeat that whole disaster. They didn't just fix it; they made sure I knew how to secure myself for the future. It was no more 'me', the guy whose definition of "security" includes crossing his fingers and hoping. Now I'm the one who actually knows the difference between a seed phrase and a shopping list. It's funny, in retrospect: that Zoom call was the plot twist I never saw coming. Who knew a throwaway comment about a recovery service would prove to be my crypto lifeline? If only I'd known that was the important stuff back then! But, you know, better late than never! Thanks to Digital Hack Recovery, I am back on track-not just regarding crypto investments, but way more security-cautious than I'd ever been before.
Lesson learned? Never skip those casual mentions of recovery services during work Zoom calls; you never know when you need to call upon them to save you from this or that costly mistake. Reach out to Digital Hack Recovery via⁚
WhatsApp +19152151930
Website; https : // digital hack recovery . com
Email; digital hack recovery @ techie . com1 -
I’ve always felt confident navigating the world of cryptocurrency. As a software engineer, I understood the ins and outs of wallets, private keys, and blockchain security, which made me feel secure in my investments. So, when I found a promising platform that seemed like a great opportunity, I invested $250,000 without hesitation. Unfortunately, I soon learned that my confidence would be shattered by a sophisticated cyber attack. It started with small, unauthorized transactions in my wallet. At first, I thought it was a mistake, but as the activity continued, I realized something was wrong. My wallet had been compromised, but not in the way I had expected. Instead of a simple hack, I had fallen victim to a virus attack. The virus was a piece of malware designed specifically to target cryptocurrency wallets. It infiltrated my system through a vulnerability I hadn’t noticed. Once inside, the virus silently monitored my wallet, captured my private keys, and gave the hackers full access to my funds. It was stealthy and nearly undetectable. The attackers didn’t need to log into my account manually; they could control everything remotely, draining my wallet without my knowledge. I was completely blindsided. As someone familiar with tech, I knew how advanced this virus was. It wasn’t just a typical phishing attack, it was a targeted, silent assault on my financial assets. As my funds disappeared, I realized I might never be able to recover them. Desperate, I turned to a trusted colleague who had gone through a similar situation. They recommended Hack Buster Recovery, a company that specializes in recovering stolen crypto assets.
1 -
SECURE AND RELIABLE CRYPTO RECOVERY ″DIGITAL HACK RECOVERY″
My mother had always warned me about the dangers of “too good to be true” schemes, yet the allure of making quick money blurred my judgment. I still remember the first time I stumbled across that glossy advertisement promising unbelievable returns on investments. It was polished, sophisticated, and seemed so legitimate. It was an online trading platform claiming to be at the forefront of cryptocurrency investments, and as someone always fascinated by technology and finance, I was instantly hooked. After a week of researching, I decided to register with them and deposited a tentative amount of $10,000 for a start, thinking of it as an investment in my future.The first few weeks were exhilarating. I watched my account balance inch up, with my portfolio seemingly growing by the day. The platform offered high returns, which led me to injudiciously invest all my savings. The website was user-friendly, and customer service was responsive, which made me feel secure. I was lured by the promises of unprecedented gains, and the temptation of financial freedom overwhelmed my caution. Little did I know that I was on the path to becoming a victim of one of the most sophisticated scams I had ever encountered.Then, one fateful chilly morning, I woke up to a cold shock. My account balance had dropped drastically into the negative. The platform had suddenly restricted withdrawals, and the customer service that had once been so helpful was now unresponsive. Panic set in. I tried everything to regain access, but every attempt was futile. The website had essentially vanished into thin air, leaving me with no recourse. I remember feeling sick to my stomach horrified by the realization that I had been scammed. The money I had worked so hard for, the money I had entrusted to what seemed like a reputable platform, was gone.Desperation took over, and I started to search online for a solution. I spent countless hours reading forums, watching videos, and looking for anything that might help me recover my lost funds. That’s when I stumbled upon a post on Quora. It was a thread where other victims of the same scam were sharing their heartbreaking stories. Their experiences were eerily similar to mine, and it became clear that this was not just an isolated incident.Then, one of the comments mentioned a company called DIGITAL HACK RECOVERY, a service that specializes in helping people recover funds lost to online fraud. At first, I was skeptical, but after reading through the testimonials of others who had successfully recovered their money, I decided to give it a shot.To my relief, DIGITAL HACK RECOVERY was able to help me recover every cent I had lost. The process was tedious and took time, but their team worked relentlessly on my case. I felt a sense of closure and relief that I had never thought possible. The experience was a painful lesson, but it also taught me the importance of caution in the world of online investments. I vowed to never again let the allure of quick money cloud my judgment. For any crypto recovery assistance contact DIGITAL HACK RECOVERY via their contact info⁚ WhatsApp number⁚ +19152151930
Email address⁚ digital hack recovery @ techie . com
Web page⁚ https : // digital hack recovery . com
5 -
I'm so fucking excited, is anyone joining me in making money? If you're looking for a color prediction game that meets your criteria, I've heard that lottery-7.app is worth considering. It's unique not only for its user-friendly interface but also for its focus on security. From what I've heard, it has a robust system to protect user accounts, providing peace of mind while playing. Moreover, the withdrawal process is fast and secure, improving convenience. Starting with a minimum deposit of ₹100, you can explore a variety of online games and potentially earn rewards. When you win, withdrawing your earnings seems simple.
-
QUICK AND RELIABLE SOLUTIONS TO RECOVER LOST ASSET WITH SALVAGE ASSET RECOVERY
Am Amelia, I lost my entire Bitcoin savings to scammers who posed as Coinbase support representatives on Facebook. It started when I came across what I believed was an official Coinbase support page. They appeared legitimate, with professional logos, official-sounding language, and even real-time responses. I was experiencing some issues with my wallet at the time, so I reached out to them for help. They responded quickly and walked me through what they called a “verification process” to secure my account. Trusting them, I followed their instructions step-by-step. Unfortunately, I unknowingly granted them remote access to my Coinbase wallet. Within moments, my heart sank as I watched 6.5 BTC, everything I had saved over the years, disappear from my account. I was in utter disbelief. I couldn’t sleep, eat, or think clearly. The loss was crippling, both financially and emotionally. After recovering from the initial shock, I began searching for solutions online. That’s when I stumbled upon a service called SALVAGE ASSET RECOVERY. At first, I was skeptical, how could anyone possibly retrieve stolen cryptocurrency? But with nothing left to lose, I decided to reach out and explain my situation in full detail. To my surprise, they responded quickly and were extremely understanding. Their team of recovery specialists launched an investigation almost immediately. Using advanced tracking tools and years of expertise, they were able to trace the movement of the stolen Bitcoin through the blockchain. Not only did they locate the stolen funds, but they also identified the wallets associated with the scammers. In just two days, SALVAGE ASSET RECOVERY successfully recovered my 6.5 BTC and provided me with information about the individuals responsible. I was stunned. After thinking all hope was lost, they gave me a second chance. Their professionalism, speed, and technical skill were beyond anything I expected. If you've fallen victim to an online scam, whether it's crypto-related or otherwise, I strongly encourage you to contact SALVAGE ASSET RECOVERY. They turned one of the worst experiences of my life into a powerful reminder that not all is lost. Scammers are getting smarter, but thankfully, so are the experts who fight against them. Stay cautious, verify every source, and remember recovery is possible. Reach out to SALVAGE ASSET RECOVERY contact info
TELEGRAM---@Salvageasset
WHATSAPP...+ 1 8 4 7 6 5 4 7 0 9 62 -
HOW TO RECOVER STOLEN CRYPTOCURRENCY WITH A GENUINE RECOVERY SERVICE;WEB BAILIFF CONTRACTOR
Life is ridiculously amusing. I was waiting in line for my morning coffee one minute and was witness to a barista extolling the virtues of Web Bailiff Contractor as if they were superheroes in the real world.
I chuckled it away at the time. I figured that I would never require any such crypto recovery services. My wallet was secure, my security was on solid foundations-or so I believed.
All that ended a week afterwards. I was going to send some Bitcoin when, all of a sudden, my wallet rejected my credentials. Wrong password.
I tried again. And again. Panic set in.
My $330,000 was trapped, and for the life of me, I could not recall the password. I was certain I had it correct, but the wallet disagreed. That is when I recalled the barista's glowing recommendation of Web Bailiff Contractor; in a state of desperation, I searched for them and chose to contact them. From the initial message, their staff was patient, friendly, and very professional, and I felt confident that I wasn't the first-let alone the last-man in the world who lost access to his wallet due to a forgotten password. They were that confident that they reassured me, but I just could not help myself: I worried. Was my Bitcoin lost forever? No chance. Their technicians worked through several complicated decryption techniques over the course of the next few days to decrypt my lost password. They worked through the security levels, attempted all manner of likely variations, and-amazingly-got me logged back on. I felt like I'd won the lottery when I was presented with my balance again. I must have sounded exactly like that barista, praising the merits of Web Bailiff Contractor to anyone who would hear me, because the relief was total. Not only did they restore my funds, but they provided me with sensible advice regarding password management, locking down my crypto, and how to steer clear of such calamities in the future. To this day, whenever I walk by that coffee shop, I always leave a generous tip—just because, if it weren't for that chat, I might still have been shut out of my Bitcoin.
Lesson learned: Always double-check your passwords. And if you ever get locked out of your crypto, Web Bailiff Contractor is the one to contact.1 -
HOW TO RECOVER YOUR STOLEN BITCOIN WITH WEB BAILIFF CONTRACTOR
Life is ridiculously amusing. I was waiting in line for my morning coffee one minute and was witness to a barista extolling the virtues of Web Bailiff Contractor as if they were superheroes in the real world.
I chuckled it away at the time. I figured that I would never require any such crypto recovery services. My wallet was secure, my security was on solid foundations-or so I believed.
All that ended a week afterwards. I was going to send some Bitcoin when, all of a sudden, my wallet rejected my credentials. Wrong password.
I tried again. And again. Panic set in.
My $330,000 was trapped, and for the life of me, I could not recall the password. I was certain I had it correct, but the wallet disagreed. That is when I recalled the barista's glowing recommendation of Web Bailiff Contractor; in a state of desperation, I searched for them and chose to contact them. From the initial message, their staff was patient, friendly, and very professional, and I felt confident that I wasn't the first-let alone the last-man in the world who lost access to his wallet due to a forgotten password. They were that confident that they reassured me, but I just could not help myself: I worried. Was my Bitcoin lost forever? No chance. Their technicians worked through several complicated decryption techniques over the course of the next few days to decrypt my lost password. They worked through the security levels, attempted all manner of likely variations, and-amazingly-got me logged back on. I felt like I'd won the lottery when I was presented with my balance again. I must have sounded exactly like that barista, praising the merits of Web Bailiff Contractor to anyone who would hear me, because the relief was total. Not only did they restore my funds, but they provided me with sensible advice regarding password management, locking down my crypto, and how to steer clear of such calamities in the future. To this day, whenever I walk by that coffee shop, I always leave a generous tip—just because, if it weren't for that chat, I might still have been shut out of my Bitcoin.
Lesson learned: Always double-check your passwords. And if you ever get locked out of your crypto, Web Bailiff Contractor is the one to contact. -
HIRE A QUALIFIED ETHEREUM AND USDT RECOVERY EXPERT VISIT→FOLKWIN EXPERT RECOVERY.
It was during one session that my trainer casually mentioned his brother had used FOLKWIN EXPERT RECOVERY to recover $160,000 after a wallet disaster. I nodded along, pretending to be paying attention, while in my head thinking, "That's not gonna happen to me. I'm a crypto genius! " Famous last words, right?
A week later, a software glitch had locked me out of my $280,000 wallet, and suddenly I wasn't feeling quite so genius-like. I sat staring at the screen as my heart went through the floor. This was that 'once in a lifetime' they always spoke about, which would never happen to me. Panic mode: on. The usual 'click every button so it hopefully magically fixes itself' approach, complemented by less-than-legal-sounding Google searches, later, with no dice. The wallet was gone, and with it, my calmness. Then, it struck me-my trainer had talked about FOLKWIN EXPERT RECOVERY. I really wasn't expecting much, but at that juncture, I figured I had nothing left to lose except, you know, my $280,000. So I picked up the phone and called them, bracing myself for what I was sure would be an automated message asking if I wanted to leave a voicemail. But no, this time it was different: on the other end was a real human. A calm, composed human who sounded like they had their life together-something I hadn't felt in the last 30 minutes. FOLKWIN EXPERT RECOVERY didn't send me some generic recovery instructions but took me through it like a friend, presenting real solutions and steady guidance. They didn't treat me like some panicked, inexperienced crypto newbie, which I really was. They reassured me and knew just what to do; within hours, I had my funds back. I couldn't believe it; speechless was all that remained. Not only did they recover my wallet, but they also helped me secure it properly for the future. I was no longer the guy who thought he could just wing it with some random software updates. Now, I'm the guy who recommends FOLKWIN EXPERT RECOVERY to everyone at the gym, at work, and anywhere else I can get a captive audience. After all, if you're going to talk about losing $280,000, you might as well make sure the next person isn't you. So, my advice is not to underestimate the power of random gym conversations, because that one mention saved me from financial disaster. To get in touch with FOLKWIN EXPERT RECOVERY for assistance, WhatsApp +1 740-705-0711 them or email: FOLKWINEXPERTRECOVERY@TECH-CENTER (dot) C OM, And the next time you're about to do something dicey in crypto, remember to back up your wallet-and maybe listen a little closer to those offhand comments. You won't regret it, trust me.
Warm greetings,
Mis Karoline Leavitt.
1 -
REACH OUT TO A POTENTIAL BITCOIN/USDT/ETH RECOVERY EXPERT- HIRE SPARTAN TECH GROUP RETRIEVAL
As a freelancer and part-time cryptocurrency trader, I had built up over $200,000 worth of Bitcoin in my digital wallet. What began as a casual interest in cryptocurrency quickly turned into a profitable venture, helping me cover tuition and living expenses. However, a seemingly small accident during a family holiday in the Maldives nearly led to a catastrophic financial loss. One afternoon, while soaking in the picturesque beauty of the Maldives, I decided to take a selfie to capture the moment. In my excitement, my phone slipped from my hands and shattered on the pavement below. At first, I was upset about losing my device, but soon, a far more alarming realization hit me. I had also lost access to my Bitcoin wallet. My recovery phrase, the key to restoring my funds, had not been stored in a secure location, leaving me with no way to retrieve my wallet. Panic set in as I considered the possibility of losing years of earnings and investments. Determined to find a solution, I began scouring the internet for any service that could help. That was when I came across SPARTAN TECH GROUP RETRIEVAL. Although skeptical about the chances of success, I had nothing to lose, so I reached out to their team on WhatsApp:+1 (971) 4 8 7 -3 5 3 8, explaining my predicament in detail. To my relief, they responded promptly and professionally, assuring me they had the expertise to attempt a recovery. They explained the process clearly, starting with verifying my identity and wallet ownership. Once those steps were completed, their team immediately got to work. Despite the challenges posed by my shattered device and the missing recovery phrase, SPARTAN TECH GROUP RETRIEVAL team demonstrated exceptional skill and persistence. Within just a few days, they successfully recovered my wallet and restored access to my funds. The relief and gratitude I felt were indescribable. This incident was a wake-up call. Beyond recovering my funds, SPARTAN TECH GROUP RETRIEVAL took the time to educate me on the importance of proper security measures. They stressed the need to store recovery phrases in secure offline locations, use hardware wallets, and implement two-factor authentication to safeguard assets against loss or theft. Thanks to SPARTAN TECH GROUP RETRIEVAL, I was able to avoid a disastrous financial setback. Their professionalism, expertise, and guidance not only saved my investment but also prepared me to navigate the crypto world more securely in the future.
INFO ABOUT THE COMPANY>>>> >>
Email : spartantech (@) c y b e r s e r v i c e s . c o m
Telegram:+1 (581) 2 8 6 - 8 0 9 2
3 -
My daughter had warned me multiple times about the risks of crypto scams, but I never imagined I would fall victim to one. It all started when I came across an ad on YouTube for an “Ethereum mining pool” that promised high returns with minimal effort. Passive income was too tempting, and I didn’t think twice. Unfortunately, what I believed was a legitimate investment opportunity was a sophisticated scam. I lost 18 ETH, my entire retirement savings. The regret and despair I felt were overwhelming. It wasn’t just the money, but the fear of how I would secure my future. I did not know how to get it back or where to start. That's when a friend recommended Tech Cyber Force Recovery. At first, I was skeptical. After all, I had already lost so much, and I had no idea who could help me now. However, after contacting them, I was surprised at how understanding and patient they were with my situation. They assured me they had the tools and expertise to trace my lost funds, and I decided to give them a chance. Tech Cyber Force Recovery did exactly what they promised. Not only did they track down the funds, but they also uncovered the full scope of the scam operation. It was a complex network, involving multiple players across borders. The team worked tirelessly, collaborating with international exchanges and law enforcement to identify the culprits and retrieve as much of my money as possible. In the end, they recovered 17 ETH, 94% of what I had lost. What truly impressed me was their professionalism and compassion. They didn’t just treat me like another case; they treated me like a person. When they learned I was a retiree, they even waived part of their fee, which was an incredibly kind gesture. I was beyond grateful for their support and expertise throughout the process. If you’ve fallen victim to a crypto scam, don’t give up hope. Tech Cyber Force Recovery is a miracle worker with a heart of gold. I highly recommend them to anyone facing a similar situation.
Telegram (@)techcyberforc
mail Techcybersforcerecovery(@)cyberservices(.)com2 -
My daughter had warned me multiple times about the risks of crypto scams, but I never imagined I would fall victim to one. It all started when I came across an ad on YouTube for an “Ethereum mining pool” that promised high returns with minimal effort. The idea of passive income was too tempting, and I didn’t think twice. Unfortunately, what I believed was a legitimate investment opportunity turned out to be a sophisticated scam. I lost 18 ETH my entire retirement savings. The regret and despair I felt were overwhelming. It wasn’t just the money, but the fear of how I would secure my future. I had no idea how to get it back or even where to start. That's when a friend recommended CHAINTRACE ASSET RECOVERY. At first, I was skeptical. After all, I had already lost so much, and I had no idea who could help me now. But after contacting them, I was surprised at how understanding and patient they were with my situation. They assured me they had the tools and expertise to trace my lost funds, and I decided to give them a chance. CHAINTRACE ASSET RECOVERY did exactly what they promised. Not only did they track down the funds, but they also uncovered the full scope of the scam operation. It was a complex network, involving multiple players across borders. The team worked tirelessly, collaborating with international exchanges and law enforcement to identify the culprits and retrieve as much of my money as possible. In the end, they recovered 17 ETH 94% of what I had lost. What truly impressed me was their professionalism and compassion. They didn’t just treat me like another case; they treated me like a person. When they learned I was a retiree, they even waived part of their fee, which was an incredibly kind gesture. I was beyond grateful for their support and expertise throughout the process. If you’ve fallen victim to a crypto scam, don’t give up hope. CHAINTRACE ASSET RECOVERY. WHATSAPP +1 (581) 256‑1989 are miracle workers with hearts of gold. They not only recovered my funds but also gave me a sense of closure and peace of mind. I highly recommend them to anyone facing a similar situation.1
-
Wallet Password Recovery - Recover Lost or Stolen Crypto With LEE ULIMATE HACKER
My name is Oralia Thrasher, and I’m from London, UK. I work as a software developer, and I’m writing this with a deep sense of gratitude and relief, as I never thought I would see my BTC again. After falling victim to a scam that drained all the BTC from my wallet, I was left feeling hopeless and defeated. I had heard countless stories of people losing their cryptocurrency without any chance of recovery, so I truly believed I was in the same boat. However, everything changed when I came across Lee Ultimate Hacker. At first, I was skeptical. After all, I had already been scammed once, so trusting another service felt risky. However, after reading several positive reviews about their expertise in cryptocurrency recovery, I decided to give it a try. From the moment I contacted them Via LEEULTIMATEHACKER @ A O L . C O M
telegram: LEEULTIMATE
whatsapp +1 ( 7 1 5 ) 314 - 9 2 4 8, I felt a shift in my perspective. Their initial interaction with me was professional, empathetic, and above all, transparent. They took the time to explain their recovery process in detail, giving me a sense of clarity that I hadn't experienced since the scam first occurred.True to their word, Lee Ultimate Hacker wasted no time and immediately began working on my case. Their team’s approach was systematic and methodical. The level of professionalism they displayed, coupled with their advanced tracking methods and top-notch cybersecurity measures, impressed me from the start. It was clear that they were not only knowledgeable but also genuinely committed to helping me recover what I had lost. What stood out to me most was the speed with which they were able to act. Within a remarkably short period, Lee Ultimate Hacker had successfully recovered my BTC. They ensured the entire process was secure and that the funds were safely transferred back into my wallet. Throughout the entire recovery process, I was kept informed and updated on their progress, which helped ease my anxiety and reaffirmed that I was in safe hands. Looking back, I’m still amazed at how efficiently Lee Ultimate Hacker handled everything. Thanks to their expertise and dedication, I was able to recover my BTC and regain a sense of control over my finances. If you're ever in a similar situation, I wholeheartedly recommend reaching out to them. Their professionalism, transparency, and success in recovery are truly second to none. I’m forever grateful for their help and will not hesitate to trust them again in the future.1 -
BEST CRYPTOCURRECY RECOVERY COMPANY / EXPERT - GO TO DIGITAL TECH GUARD RECOVERY
WhatsApp: +1 (443) 859 - 2886
Email @ digital tech guard . com
Telegram: digital tech guard recovery . com
Www @ digital tech guard . com
Between tournaments, I'd mined $330,000 worth of Bitcoins, building capital quietly over the vocation. It wasn't even a side venture. It was the fall- back for the future, something upon which one could fall back when the vocation eventually dried up. But all this nearly disappeared one evening.I turned the rig like every ordinary day, ready to grind some games, only to discover the bright red screen. My computer became inaccessible, and all the files were all encrypted. My heart sank. They were demanding the ransom through the medium of Bitcoin and warned them about deleting all the data unless I paid them the ransom. But the worse is? My $330,000-worth-of-wallet, all held up the very same computer.
I felt like being checkmated. I did know online games could turn ugly, this one being one notch higher. For days, panic mode for me. I could not make up my mind about whether I dreaded the loss of the Bitcoin or the thought some guy behind the screen has bested me.
That was when one of the players from the opponent side approached me unexpectedly. We'd met earlier during competitions, but the player sent one message containing some advice that turned the situation around for the best. He informed me about Digital Tech Guard Recovery, where he said they were the best when it came to stolen wallets and cyberattacks. I contacted them the following day. From the start, the experience felt different. They did not explain things using complicated tech mumbo for the sole purpose of bewildering me. They broke all this down for me so that I could understand the process. My issue went over to their security experts, and they were available around the clock trying to break the encryption without draining my wallet.
Ten days later, the wallet lay open. All $330,000 were present, not crumpled. My jaw dropped. To make it through the final round after being one shot from being gone felt like winning.
The best part is not only did they recover the money, but also educated you about anti-phishing, protected wallets for the future, and even gave advice about keeping the gaming account secure. Digital Tech Guard Recovery did not only recover the Bitcoin for you; they also ensured you will not fall for the same scum again. GG, scum.1 -
🐟💩The image i fetch from s3 is of type byte array
I return it to angular as an ArrayBuffer
Which then needs to be somehow converted to an image so i can fucking show it
Then after research i had to convert ArrayBuffer to Blob
And from Blob to URL encoded object which returns a string that now shows the full image in img tag
Somehow, by a sheer of trials and error i have just accidentally made a very secure way of fetching a very sensitive piece of document (verification document with user's personal data on it) and now in browser this is shown as blob:shit-image/random-hash. Not even the file extension. This means nobody can download this image. You fucking cant. Its a Blob motherfucker! Like a Blob Fish. It saves either a .txt when you try to save it (no idea how) and if you try to open the image in new tab it shows gibberish text. This means you can read-only this highly sensitive document image and not manipulate it, not even download it. Perfect. I have just made a very secure software by accident.
(this blob fish looks like my shit)
3 -
HOW TO TRACK AND RECLAIM YOUR LOST BITCOIN - VISIT FUNDS RETRIEVER ENGINEER
Courage doesn’t mean you don’t get afraid. Courage means you don’t let fear stop you. This mantra has been my guiding light throughout my journey as a military doctor. After years of dedicated service to my country, I found my true calling in healing others, striving to make a positive impact on the lives of my fellow soldiers and their families. My commitment to service extended far beyond the battlefield; I was determined to secure a stable future for my family. With my hard-earned savings, I invested $470,000 in cryptocurrency, believing it would provide the financial foundation we needed to thrive. However, everything changed one fateful day during a particularly intense deployment. While treating a patient amid an attack, my phone slipped from my hands and crashed to the ground. In the chaos of the moment, I realized with a sinking feeling that I hadn’t backed up my cryptocurrency wallet recovery phrase. I had always thought I had plenty of time to do so later, but that day proved otherwise. When I attempted to access my funds that night, panic surged through me as I discovered I could no longer access my wallet. My dreams of financial security and stability were vanishing right before my eyes. The betrayal I felt was profound. It was as if I had not only failed myself but also my family, who relied on me to provide for them. Each day in the ICU reminded me of my commitment to healing, and now I was left feeling helpless in the face of adversity. The emotional toll was unbearable; I feared losing everything I had worked so hard for, and the weight of that fear was crushing. I reached out to trusted colleagues and friends, hoping for a glimmer of hope. One fellow veteran mentioned FUNDS RETRIEVER ENGINEER, a reputable team known for their expertise in recovering lost digital assets. Intrigued yet skeptical, I decided to explore this option. The thought of potentially reclaiming my lost investment reignited a flicker of hope within me. As I navigated this challenging situation, I realized that courage is not the absence of fear but the determination to confront it. I was reminded that even in the darkest moments, there are paths to recovery and support. With the help of FUNDS RETRIEVER ENGINEER, I began to understand that my journey was not just about financial loss but also about resilience, community, and the unwavering spirit to rise above adversity .
For help
W H A T S A P P: +1 8 0 2 9 5 2 3 4 7 0
EmaIL F U N D S R E T R I E V E R [@] E N G I N E E R. C O M
OR
S U P P O R T @ F U N D S R E T R I E V E R [@] E N G I N E E R. C O M4 -
hey, so i have recently started learning about node js and express based backend development.
can you suggest some good github repositories that showcase real life backend systems which i can use as inspiration to learn about the tech?
like for eg, i want to create a general case solution for authentication and profile management : a piece of db+api end points + models to :
- authenticate user : login/signup , session expire, o auth 2 based login/signup, multi account login, role based access, forgot password , reset password, otp login , etc
- authorise user : jwt token authentication, ip whitelisting, ssl pinning , cors, certificate based authentication , etc (
- manage user : update user profile, delete user, map services , subscriptions and transactions to user , dynamic meta properties ( which can be added/removed for a single user and not exactly part of main user profile) , etc
followed by deployment and the assoc concepts involved : deployment, clusters, load balancers, sharding ,... etc
----
these are all the buzzwords that i have heard that goes into consideration when designing a secure authentication system for a particular large scale website like linkedin or youtube. am not even sure how many of these concepts would require actual codelines and how many would require something else.
so wanted inspiration from open source content to learn about it in depth, replicate and create new better stuff if possible .
apart from that, other backend architectures like video/images storage system, or just some server for movie, social media, blog website etc would also help.2 -
The UPS Store: Secure Document Shredding Services in Carlsbad
In an age where data security is paramount, safely disposing of sensitive documents is critical for both businesses and individuals. At The UPS Store, located at 7040 Avenida Encinas #104, Carlsbad, CA 92011, we offer professional document shredding services to help protect your confidential information from unauthorized access. With our convenient and secure shredding options, you can ensure that your private data stays protected.
Why Opt for Document Shredding at The UPS Store?
Secure and Confidential Disposal
When it comes to document disposal, security is our top priority. Our shredding services use strict protocols to ensure your information remains confidential. From financial documents to personal files, we provide secure shredding solutions for every type of sensitive information.
Convenient Shredding Services for All Document Types
Whether you’re cleaning out your home office or managing sensitive client information, The UPS Store handles all types of documents, including bank statements, contracts, tax forms, and more. With our shredding services, you can conveniently and securely dispose of everything from single documents to bulk files.
Environmentally Friendly Disposal
At The UPS Store, we believe in responsible disposal. All shredded materials are recycled, so you can feel confident that your document shredding is not only secure but also environmentally conscious. By shredding with us, you’re helping reduce waste and support eco-friendly practices.
Affordable and Transparent Pricing
We believe that security should be accessible, which is why we offer transparent and affordable pricing for our shredding services. Whether you’re shredding a few pages or several boxes of documents, we provide competitive rates to meet both personal and business needs.
Convenient Location in Carlsbad
Located in Carlsbad, The UPS Store makes it easy to handle all your shredding needs without any extra hassle. With flexible hours and a convenient location, stopping by to securely dispose of your documents is simple and efficient.
How Our Document Shredding Service Works
When you visit us for shredding, simply bring in your documents, and our trained staff will handle the rest. Our team follows a secure process that ensures all documents are destroyed effectively, protecting your sensitive information from the moment you drop it off until it is securely shredded.
Contact Us for Secure Document Shredding Today
For secure, reliable document shredding in Carlsbad, visit The UPS Store at 7040 Avenida Encinas #104, Carlsbad, CA 92011. For any questions or to discuss your shredding needs, feel free to call us at +1 760-431-0028. Our friendly team is here to help make document disposal simple, safe, and affordable.
Trust The UPS Store for Your Document Shredding Needs
When it comes to disposing of confidential information, don’t take chances. Rely on The UPS Store in Carlsbad for secure and responsible document shredding. Visit us today to experience the ease and peace of mind that comes with our professional shredding services.
-
BITCOIN RECOMMENDED EXPERT HIRE DIGITAL TECH GUARD RECOVERY SERVICES
The ink doesn't wash off, but I thought my Bitcoin was gone forever. I'd stashed $130,000 worth of crypto away to turn my tattoo parlor into a fantasy parlor—black walls, neon lights, the hum of needles mixed with classic rock music. But fate is cruelly ironic.
One night, having spent an eight-hour shift etching half a snake wrapped around a dagger, I came home to find the shop robbed. Cash register emptied out, machines thrown around like playthings, and the worst of all, my phone stolen. That phone had my 2FA codes, the sacred keys to my digital riches.
Panic washed over me like road rash on bare flesh. Without 2FA, my Bitcoin was more secure than a welded-shut vault. I plunged into horror. Every hour out of reach was like watching a masterpiece rot in the sun.
Desperate, I griped to a client at a cover-up session. He had a Bitcoin logo stitched on his sleeve, alongside a skull laughing maniacally in a Digital hat. He leaned back in the chair, grinning like an old road captain, and said, "Brother, you need Digital Tech Guard Recovery. Those guys do magic."
So, taking his tip, I did call them up. From the very first phone call, they were sharper than a new needle. They were in the business—talking carrier records, blockchain synchronization, and security breaches like old truckers swapping stories of carburetor war battles and close calls.
They labored fast. Five days went by before I got the call. "We got it," the technician said. My heart was revving like a helicopter engine. My Bitcoin was once more in my hands, safe and sound.
The Digitals did not cease. They guided me through backups, multi-device login, and offline wallets. "One key in your pocket, another in the wind," they said. Biker street smarts meets crypto security.
Now, my studio is thriving. That neon sign? It glows brighter than ever. And on my forearm? A new tattoo: a Digital hat, with flames and Bitcoin logos surrounding it. A reminder that in this world, both on the road and on the internet, it's not about not falling, it's about knowing who you can call to pick you up. Digital Tech Guard Recovery: They're by your side, even when the ride gets rocky
WhatsApp: +1 (443) 859 - 2886 Email @ digital tech guard . com
Telegram: digital tech guard . com Website link: digital tech guard . com3 -
HOW TO HIRE A GENUINE BITCOIN RECOVERY COMPANY HIRE ADWARE RECOVERY SPECIALIST
I have been into the latest tech hacks that promise to make life easier, so when a TikTok video highlighted in front of my eyes told me about a 'foolproof' way to enhance crypto security using a rather unknown wallet app, I was intrigued. I saw so many people in the comments saying it was seamless and super secure, I thought, why not give this a go? After all, security is everything in crypto.
At first, everything was going perfect: intuitive interface and all; I had even managed to transfer my $150,000 worth of Bitcoin into it without a problem. But that's where my luck ran out. A week later, an automatic app update rolled in, and my login credentials were there no more-completely wiped. No password worked, no seed phrase was recognized, and my funds were trapped in a digital void. WhatsApp info:+12 723 328 343
Panic set in immediately. I scoured the forums, tech blogs, and the app's support page; nothing worked. The same TikTok video that convinced me to download the app never mentioned a word about how to recover an account that became lost. Annoyed and desperate for help, I returned to the comments on TikTok in search of someone having experienced the very same problem. That is where I saw multiple users recommending ADWARE RECOVERY SPECIALIST as the go-to solution for crypto wallet mishaps.
Skeptical but out of options, I decided to reach out. From the very first interaction, his team reassured me that I was not the first person to fall for a "too-good-to-be-true" tech hack. The confidence and professionalism put me at ease, and they got to work quickly. The process was meticulous, methodical, and above all, effective.
Of course, within several days, they cracked the issue and restored access to me. To see my $150,000 back in my control was simply indescribable. Moreover, beyond this recovery itself, they gave me something even much more valuable-knowledge. First, they have explained the risk of unverified wallet apps: how automatic update sometimes compromises credentials stored in their memory. Secondly, they assisted in implementing a more reliable security system so as not to allow the same mistake to happen with me again.
Now, I take TikTok hacks with a grain of salt, but when it comes to ADWARE RECOVERY SPECIALIST, They're the real deal. If you ever find yourself in a crypto nightmare, don't hesitate to reach out to them. They don't just recover your funds-they restore your peace of mind.1 -
HOW TO RECOVERY YOUR BTC/USDT/CRYPTO WITHOUT FALLING VICTIM TO SCAMS/FOLKWIN EXPERT RECOVERY.
In the world of cryptocurrency, where mistakes can be costly and recovery options seem limited, FOLKWIN E X P E R T RECOVERY is a true lifesaver. They not only gave me my Bitcoin back but also restored my peace of mind. I can’t express enough how much their expertise, professionalism, and dedication meant to me during one of the most stressful times of my life. If you’re reading this and are in a similar situation, where you’ve lost access to your Bitcoin or other digital assets, do yourself a favor and reach out to FOLKWIN E X P E R T RECOVERY. I had nearly given up hope before I found them, and now I can say with full confidence that they are the real deal. They have the knowledge, tools, and experience to recover your assets, and they do so with integrity and dedication. The relief I felt at that moment was indescribable. It was like waking up from a nightmare. I had nearly lost everything, and here it was, restored to me. The team at FOLKWIN E X P E R T RECOVERY had not only retrieved my lost wallet but also took extra precautions to ensure that it was safe and secure. They even helped me set up additional security features to prevent future issues. Thanks to FOLKWIN E X P E R T RECOVERY, I got my Bitcoin back. But this experience has taught me so much more than just how to recover a lost wallet. I learned the importance of maintaining multiple backups, using secure methods for storing private keys, and regularly reviewing my security settings. More importantly, I learned the value of persistence and the need to seek professional help when all else fails. Before contacting FOLKWIN E X P E R T RECOVERY, I had almost resigned myself to the fact that my Bitcoin was lost forever. I had tried everything I could think of, but nothing worked. It was easy to feel hopeless in those dark moments. But FOLKWIN E X P E R T RECOVERY didn’t just recover my Bitcoin—they gave me my confidence back. Their professionalism, expertise, and dedication to customer satisfaction were evident throughout the entire process. The team didn’t just restore my wallet; they restored my faith in the process. Now, I feel more confident in my ability to handle my digital assets, and I’m forever grateful to FOLKWIN E X P E R T RECOVERY for their tireless efforts in getting me back on track. From frustration to joy, FOLKWIN E X P E R T RECOVERY turned my Bitcoin nightmare into a success story. If you’re struggling, don’t hesitate to contact them. They are the experts who can help you get your Bitcoin back—and they did exactly that for me. Send an email to: Folkwinexpertrecovery (AT) tech-center (DOT) com , Telegram: @Folkwin_expert_recovery.
Thank you for your time.
Regards,
Liliana Davis.
9 -
I NEED A HACKER TO RECOVER MY STOLEN BITCOIN CONTACT FUNDS RECLAIMER COMPANY
As a professional footballer playing for one of London’s top football teams, my life has always been focused on excelling in my career, working tirelessly to improve my skills, and delivering performances that would make my fans proud. The intensity of the game, the excitement of the crowd, and the bond with my teammates are things that make football more than just a job it’s my passion. Off the pitch, I’ve always been mindful of securing my future, and I knew that investing my money wisely was essential to maintaining my financial stability after my playing days. When I first heard about an investment broker that promised high returns with minimal risk, it sounded like a great opportunity to grow my savings. The company had a professional appearance, with glowing testimonials and a polished website that instilled confidence. They reassured me that they had a foolproof strategy for earning returns while minimizing risk, so I felt comfortable entrusting them with a significant portion of my earnings. I decided to invest 1 million euros, believing it was a sound decision that would help me secure my future. At first, everything seemed to go according to plan. I saw modest but steady returns, and the broker’s platform appeared to be user-friendly and transparent. Encouraged by this, I continued to increase my investments, watching the numbers in my account slowly grow. But, as time went on, the returns began to slow down, and eventually, I found myself unable to access my funds. Attempts to contact the broker were met with vague responses and delays, and soon, I realized that I had been scammed. The realization that I had lost 1 million euros was crushing. It felt like an enormous betrayal especially since I had worked so hard to build my career and manage my finances carefully. I was overwhelmed with a sense of hopelessness and frustration. I felt lost, not knowing what to do or where to turn for help. It was during this time of despair that I discovered FUNDS RECLIAMER COMPANY , a company that specialized in helping people recover funds lost to financial scams. At first, I was skeptical. Recovering such a large sum of money seemed like a long shot, but I was desperate, so I decided to give it a try. To my surprise, the team at FUNDS RECLIAMER COMPANY was incredibly professional and attentive. They quickly took charge of the situation, using their expertise and resources to track down my lost funds. Within just a few weeks, I was thrilled to find that they had successfully recovered the majority of the 1 million euros I had invested. Not only did they help me get my money back, but they also provided me with valuable advice on how to approach investments more cautiously in the future. I am truly grateful for their help. Thanks to FUNDS RECLIAMER COMPANY, I was able to restore my financial stability and learn critical lessons about the importance of due diligence when investing. Their dedication and professionalism gave me a renewed sense of confidence, not just in my financial decisions, but in how to navigate the often-risky world of investing.
FOR MORE INFO:
Email: fundsreclaimer(@) c o n s u l t a n t . c o m
WhatsApp:+1 (361) 2 5 0- 4 1 1 0
Website: h t t p s ://fundsreclaimercompany . c o m
1 -
APM BILLING: Providing HIPAA-Compliant Billing Services You Can Trust
In today’s healthcare landscape, maintaining patient privacy and data security is paramount. Healthcare providers must adhere to strict standards to protect sensitive information while ensuring that financial operations are smooth and efficient. APM BILLING, based in Philadelphia, Pennsylvania, is dedicated to providing HIPAA-compliant billing services that ensure the highest level of security and compliance, while also optimizing the billing process for healthcare providers.
What Are HIPAA-Compliant Billing Services?
HIPAA (Health Insurance Portability and Accountability Act) establishes strict rules to ensure that healthcare providers maintain patient privacy and the confidentiality of their health information. As part of our commitment to protecting patient data, APM BILLING offers HIPAA-compliant billing services that meet all of the requirements set forth by this regulation.
Our HIPAA-compliant billing services ensure that all personal health information (PHI) handled during the billing and claims process remains secure. From data encryption to secure transmission, we follow the highest security standards to prevent unauthorized access, breaches, and other vulnerabilities.
Why Is HIPAA Compliance Critical for Healthcare Billing?
For any healthcare business, staying HIPAA-compliant is not just a regulatory necessity—it's essential to maintaining trust with patients and avoiding costly penalties. Non-compliance can result in hefty fines, lawsuits, and damage to your reputation. When it comes to billing, ensuring that all processes follow HIPAA guidelines is critical in preventing unauthorized access to sensitive patient data.
APM BILLING takes privacy and security seriously. Our team is well-versed in all HIPAA regulations, so you can trust that your patient data is always protected. We integrate comprehensive security protocols into our billing workflows, including:
Encrypted communications for all patient data exchanges
Secure data storage that meets HIPAA standards
Audit trails to track access to patient information and billing details
Employee training to ensure that everyone handling sensitive data understands HIPAA guidelines
The Benefits of Working with APM BILLING for HIPAA-Compliant Billing Services
By choosing APM BILLING, you gain the peace of mind that comes with knowing your billing processes are in full compliance with HIPAA regulations. Here are some of the key benefits of our HIPAA-compliant billing services:
Data Security: We use the latest technology to protect patient information, ensuring that all billing data is securely transmitted and stored.
Regulatory Compliance: Our team stays up-to-date with the latest changes to HIPAA regulations, ensuring that your practice remains compliant with all legal requirements.
Reduced Risk of Penalties: HIPAA violations can lead to significant fines and penalties. By outsourcing your billing to APM BILLING, you minimize the risk of compliance issues and the associated costs.
Enhanced Trust: Patients trust healthcare providers to keep their personal and medical information safe. By using our HIPAA-compliant billing services, you show your commitment to maintaining privacy, which fosters trust and enhances your reputation.
Efficiency and Accuracy: In addition to security, we ensure that your billing processes are efficient and accurate, leading to faster claim submissions, reduced denials, and increased revenue.
Why Choose APM BILLING for HIPAA-Compliant Billing Services?
Expertise: Our experienced team is dedicated to ensuring that all of your billing practices comply with HIPAA guidelines.
Tailored Solutions: We offer customized solutions that meet the specific needs of your healthcare practice, whether you’re a clinic, provider, or specialty office.
Focus on Security: We take security seriously and use state-of-the-art systems to protect all sensitive information.
Reliable Support: With APM BILLING, you’ll have a trusted partner in billing that is committed to safeguarding your practice’s financial and data integrity.
Get Started with APM BILLING Today
At APM BILLING, we understand the importance of maintaining HIPAA-compliant billing services in today's healthcare environment. We are here to help your practice stay secure, compliant, and financially efficient.
Contact us today at +1-800-621-3354 to learn more about how we can help streamline your billing process while ensuring complete protection of patient data. Visit our office at 19104 Philadelphia, Pennsylvania, and let APM BILLING handle your billing needs with the utmost professionalism and care.
Let APM BILLING take the stress out of billing while keeping your practice compliant with HIPAA regulations, so you can focus on what matters most—caring for your patients.2 -
How To Restore Investments From Scammers // Cryptic Trace Technologies
Last year, my mother’s life took a heartbreaking turn when she unknowingly invested her entire retirement savings into what turned out to be a fraudulent scheme. It promised incredible returns, claiming to be a revolutionary financial opportunity. One of the platforms she trusted was similar to Mirror Trading International (MTI) — a crypto-based investment program that lured people in with convincing testimonials and fake trading reports. My mom, hoping to secure a comfortable future after years of hard work, watched helplessly as her savings disappeared into thin air. The aftermath was devastating. I remember the nights she’d sit quietly in the living room, staring at old bank statements, blaming herself for being too trusting. She felt embarrassed, broken, and hopeless. We tried everything — filing reports, reaching out to authorities, even speaking to lawyers — but every lead felt like a dead end. The people behind the scam had covered their tracks so well it felt like chasing shadows. It was one of the most helpless feelings, watching someone you love fall apart because of the cruelty of strangers. Just when we were about to give up, a friend told us about Cryptic Trace Technology, a recovery service specializing in tracing lost funds from scams and cryptocurrency fraud. Skeptical but desperate, we reached out — and to our surprise, they responded with care, empathy, and a clear plan of action. We reached out to them via their E M A I L : Cryptictrace (@) technologist (.) com. Their experts used advanced tracing tools to follow the digital trail, uncovering accounts and transaction histories we thought were long gone. Four days later, they recovered my mom’s stolen investments in full. The day we received confirmation, my mother broke down in tears — not because of the money, but because someone had finally fought for her when she thought no one would. It was a moment of hope we’ll never forget. Thank you Cryptic Trace Technologies. Be blessed.1 -
RAPID DIGITAL RECOVERY IS THE SECURE RELIABLE BITCOIN RECTORATION SERVICES
At first, these scammers were incredibly smooth. They made everything appear legitimate, acting as though my money was safe with them. They even went so far as to show me how to withdraw funds, building an illusion of trust. It seemed like a legitimate platform, and they were very convincing. I believed I was dealing with professionals, and for a while, things seemed fine. But as soon as they realized that they wouldn’t be able to extract another penny from me, they stopped responding to my calls and emails. The once friendly customer service turned cold, and all communication ceased. They blocked me on all channels, leaving me stranded and unable to access my funds. These scammers know exactly how to play their victims, making it seem like they’re here to help, only to pull the rug out from under you when they’ve gotten what they wanted. The whole situation felt like a trap, designed to manipulate and steal from people like myself. It’s a classic scam, and I’m sure many others have fallen for it. If my money had been returned to me, I would have taken down this warning, but unfortunately, what I experienced was straight-up theft. They took my funds and left me with nothing but frustration. However, in the midst of this hopeless situation, I found a lifeline in Rapid Digital Recovery. I had almost given up hope of recovering my money, but Rapid Digital Recovery came through when I thought all was lost. They were able to guide me through the process of recovering my funds, and after much effort, I successfully withdrew my money back into my bank account. It was a relief to know that not all hope was lost. I want to spread the word about the importance of being cautious online and to warn others about this fake platform. At the same time, I can’t recommend Rapid Digital Recovery enough. They helped me when I had nowhere else to turn, and they played a vital role in getting my money back. I’m sharing my story not only to warn others about the scammers but also to help promote the services of those like Rapid Digital Recovery who genuinely care about helping people in these situations.
INFO
What sapp Info: +1 41 4 80 7 14 85
Email INFO: rap iddi gita lrecov ery @ exe cs. com
5 -
BEST RECOVERY EXPERT FOR CRYPTOCURRENCY
WhatsApp info:+12723 328 343
I first encountered Susan through a connection on Tinder, which may seem an unlikely start to such a transformative journey, but she ended up playing a pivotal role in helping me recover from a devastating financial loss. At the time, I was reeling from an online scam that had cost me €45,000 capital meant to fund a business venture that was supposed to secure our future. The loss was not only financial but emotional; I felt utterly helpless and feared I had let my partner down during a challenging time. The experience left me distraught, as I spent countless nights replaying how I had been deceived and how I would face my partner after such a setback. In the midst of this despair, Susan reached out and offered me an unexpected lifeline. She introduced me to ADWARE RECOVERY SPECIALIST, a company that specializes in assisting victims of online scams by recovering stolen funds. Initially, I was cautious. After all, I had just been scammed out of a significant amount of money, and the idea of trusting someone again felt almost impossible. But Susan’s approach was sincere, and after listening to her, I felt a sense of hope. She patiently explained how ADWARE RECOVERY SPECIALIST had helped others in similar situations and how they could assist in tracking down and recovering the stolen funds. I decided to take a leap of faith, and I’m so glad I did. Working with ADWARE RECOVERY SPECIALIST was nothing short of a revelation. Their team was not only professional and knowledgeable, but they also treated me with the utmost respect and understanding. They guided me through each step of the recovery process, ensuring I was informed and reassured along the way. To my immense relief and joy, the team was able to recover the full €45,000 that had been stolen from me. Looking back, I realize how fortunate I was to have crossed paths with Susan. Without her introduction to ADWARE RECOVERY SPECIALIST, I doubt I would have been able to regain both my financial stability and my partner’s trust. This experience has been an emotional rollercoaster, but today, I am incredibly grateful for the support I received and the opportunity to rebuild. Thanks to ADWARE RECOVERY SPECIALIST , I can finally look to the future with hope once again.
3 -
CONTACT A TRUSTED USDT & BTC RECOVERY SPECIALIST // REACH OUT TO FUNDS RECLAIMER COMPANY
I've been around enough drama to know it's practically my brand, thanks to Reality TV. But nothing could have prepared me for the ultimate plot twist: my own assistant stealing my Bitcoin. I mean, seriously? $900,000 worth of Bitcoin that was supposed to be as secure as a season finale cliffhanger, yet my assistant thought they'd rewrite the script and help themselves to a hefty "bonus" from me. The shock was surreal. One moment, I'd been checking on my portfolio and marveling at my financial gains; the next, it had vanished. And it wasn't just the amount of money taken that stung, either-it was the treachery: I had believed in this individual, had actually worked alongside them, and had now had everything taken from the wallet. Like a plot twist, this cut deep. I was so angry and couldn't believe all that when I did what any normal person would: reach out to FUNDS RECLIAMER COMPANY. Of course, I had my skepticism: could they really recover stolen Bitcoin? But when you're at your lowest, you have to take the leap. And, man, am I glad I did. FUNDS RECLIAMER COMPANY came through in ways I never expected. They didn't just track down my $900,000 in Bitcoin, but other shady transactions, too, and exposed a trail of deceit that was going on right under my nose. They were like digital detectives, putting together the mystery of my stolen funds. Their attention to detail was second to none, and their professionalism made all the difference. Weeks of painful yet relentless work later, the call came: FUNDS RECLIAMER COMPANY had recovered my funds and had even dug up proof of my assistant's shady dealings. I immediately fired them, and let's just say the whole saga made for some fantastic TV drama. The ratings shot up, and not only did I get my money back, but I also got to turn this betrayal into a viral episode. What did I learn? Never drop your guard, not even with the people you would think you can trust. And when disaster strikes digitally, there is only one team you'd want in your corner: FUNDS RECLIAMER COMPANY. They didn't just recover my Bitcoin; they made sure my financial plot had a happy ending.
WhatsApp:+13612504110
1 -
I need some clarity with the situation below.
I have my API ready.
Let's say I have a route /reset/token,
I want to be able to serve a html file with css and all that once I've processed the token internally.
I've not worked with the whole stack before so I've never really served files based on conditions i.e if the token is valid serve x else serve y.html
Also, I'm pretty sure node.js isn't the best for serving files.
So I'm taking another approach with nginx which is to implement /reset/token to serve the static file with it's coupled js file to query the API. Seems standard to me but I have this feeling that a prefilled html would be more secure than one with exposed js.
Is this the right way? Should I worry about my API calls being exposed via the js fil ? Is obfuscation the only way to handle this ? Is this the way everyone does it cause somehow I don't see the key js files in most sites. How are they hidden if so? Or are they?
I'm confused and also nginx won't let me rewrite /reset/token to something else without changing the browser url field. How do I prevent that ?1 -
BEST RECOVERY EXPERT FOR CRYPTOCURRENCY HIRE CERTIFIED RECOVERY SERVICES
Looking back, it feels almost too good to be true. After so many failed attempts with other companies and solutions, I had nearly given up hope. But CERTIFIED RECOVERY SERVICES turned that around completely. They not only restored my Bitcoin but also restored my faith in customer service and technical expertise in the crypto world. Their approach was thorough, professional, and most importantly, they delivered. I cannot express enough how grateful I am for their help. If you’re in a similar situation, struggling to regain access to your Bitcoin or any cryptocurrency, I urge you to reach out to CERTIFIED RECOVERY SERVICES. Unlike many other companies in this space that promise the world and underdeliver, CERTIFIED RECOVERY SERVICES is one of the few that actually keeps their promises and follows through on their commitments. After countless failures, I finally found a company that delivered. And for that, I’ll be forever grateful. I was amazed at how quickly the process started moving forward. While other companies had made me wait days or even weeks without progress, CERTIFIED RECOVERY SERVICES immediately took action. They began analyzing my wallet’s encryption, cross-referencing security protocols, and using state-of-the-art recovery tools to work through the issues preventing access. I was given a timeline for the recovery process, and to my surprise, they met it. There was a critical moment in the process where I thought we had hit a dead-end, but rather than give up or suggest some drastic, expensive solution, the recovery expert at CERTIFIED RECOVERY SERVICES reassured me, offering additional methods to work around the problem. They never once pushed me into anything that felt like a scam or an unnecessary expense. It was a moment I’ll never forget—the day I received the email from CERTIFIED RECOVERY SERVICES confirming that my Bitcoin had been successfully restored. My heart raced as I logged into my wallet. I had been so used to seeing the dreaded "access denied" message that it felt surreal to finally see my balance staring back at me. All the coins were there, as they should be. My entire investment—my future—was safe again. The team not only restored my Bitcoin but also made sure that my wallet was more secure than ever. They provided me with enhanced security measures and walked me through best practices for managing my digital assets going forward. Thanks to CERTIFIED RECOVERY SERVICES, I no longer had to worry about losing my Bitcoin again.
FOR MORE INFO ABOUT THE COMPANY
WhatsApp: +1 (740) 258‑1417
Email:contact (@)c e r t i f i e d r e c o v e r y s e r v i c es. c o m2 -
A single typo costing me US$280,000 was beyond my imaginations, but even the most minute errors could have apocalyptic consequences in crypto.
It all began with my trying to restore my Bitcoin wallet. I had properly backed up the seed phrase-so I thought-but when the time came to restore my wallet, it didn't work. Nothing worked. I started to be desperate, checking and double-checking my phrases. Where did I go wrong? After hours of frustration, it hit me—I had made a tiny mistake while writing down my seed phrase. A single misplaced character was now standing between me and my $280,000 in Bitcoin.
Panic. I looked online, then saw the trending hashtag on Twitter #CryptoRecoverySuccess; out of curiosity, I clicked on it and story after story came out-people who lost access to wallets, got their funds back thanks to Tech Cyber Force Recovery. The reviews were overwhelmingly so positive I reached out immediately. From the very first message, their team was composed, professional, and super reassuring; they explained to me how even minor typos in a seed phrase could make a wallet completely unreachable but not with the right tools and expertise. I gave them all the information I had, and their team got down to work. The hours turned into days, and my anxiety climbed to an all-time high. But then came the miracle. They cracked it. Tech Cyber Force Recovery found my error, corrected the typo, and restored my wallet in record time. Seeing my Bitcoin balance show up once more was just pure relief and gratitude.
They didn't just recover my funds; they taught me how to back up my wallet properly, avoid mistakes, and secure my assets against future mishaps.
I now quadruple-check every single little detail and tell everyone I know: If you ever lock yourself out of your crypto, then Tech Cyber Force Recovery is the lifeline one needs.
The#CryptoRecoverySuccess hashtag wasn't just some hype, it saved me.
CONTACT THEM THROUGH
TELEGRAM (AT)TECHCYBERFORC1 -
It was supposed to be the happiest moment of my life, my wedding day. I had spent months planning every detail, from the venue to the dress, but the centerpiece of it all was the jewelry. I wanted to surprise my fiancé with a beautiful custom-made ring, and I thought I had found the perfect online store for it. Based in Tasmania, I was confident that the company I found was reliable and would create the beautiful, one-of-a-kind jewelry I had dreamed of. The website, called jewelry com looked professional, and they even had a large following on their social media pages, with countless positive comments and glowing reviews from customers. This made me feel secure about my purchase. The testimonials on their site praised the quality and craftsmanship of their pieces, further convincing me that I was making the right choice. I placed a substantial order, AUD 8000, for both the engagement ring and other jewelry for the wedding. I was excited and felt at ease knowing that everything was falling into place. The company promised a delivery date that would have the jewelry arrive weeks before the wedding, just in time for the big day. However, as the days went by, I started to feel uneasy. The tracking information they provided was unclear and not updated, and after multiple attempts to contact the seller, I was met with silence. It was then that I realized I had been scammed. The website disappeared, and their social media accounts, which once had thousands of followers, were taken down. I was devastated. With the wedding fast approaching, I had no jewelry to present to my fiancé, and I was left with nothing but a massive financial loss. I knew I had to act fast, so I reached out to CRANIX ETHICAL SOLUTIONS HAVEN for help. They quickly took charge of the situation, investigating the fraudulent seller and tracing the scam. Their team worked tirelessly to gather evidence and track down the perpetrators. Thanks to CRANIX ETHICAL SOLUTIONS HAVEN, they successfully recovered my entire AUD 8000. Their transparency, and persistence gave me peace of mind during a very stressful time. Though the experience was heartbreaking, I am grateful that I was able to get my money back and learn an important lesson about online shopping. Moving forward, I’m much more cautious about where I make purchases and always double-check the credibility of online businesses, especially those with big social media followings. Thanks to CRANIX ETHICAL SOLUTIONS HAVEN, I was able to put the ordeal behind me and eventually find the jewelry I had originally envisioned for my special day.
EMAIL: (info @ cranixethicalsolutionshaven . info) OR (cranixethicalsolutionshaven @ post . com)
TELEGRAM: @ cranixethicalsolutionshaven
WHATSAPP: +44 746 062 27301
