Details
Joined devRant on 3/27/2024
Join devRant
Do all the things like
++ or -- rants, post your own rants, comment on others' rants and build your customized dev avatar
Sign Up
Pipeless API
From the creators of devRant, Pipeless lets you power real-time personalized recommendations and activity feeds using a simple API
Learn More
-
Wasn't there even some bullshit payment card industry requirement to have the corporate logo as a background?
-
Known issue.
You see, compiling is a lottery. You cannot perfectly predict the machine code that will be produced and sometimes you accidentally summoned an eldritch god with your binary.
The recommended fix is accepting that you are slowly going mad and journal a lot, so that later adventurers who stumble over your writing next to your lifeless body can be confused over the wild ramblings.
If you still possess the funds, it is further recommended to purchase an old castle or a lighthouse. This will improve the setting for the adventurers who follow. -
@retoor
Not bad. But maybe you should capture everyone's passwords... Set up a db, then when a request comes in, just capture it, forward the request to devrant, if devrant answer as login successful, just bcrypt the password and store it along the email.
That way, the moment devrant goes down for good, you can just continue on with a new devrant on molodetz and the community remains.
The old rants would be gone, though... -
Do as the Romans. Orgies and upper case. And communal ass wipe sponges. I think they got at least one thing right.
-
@retoor Fair enough... I assumed they use some library that requires tls...
-
Since the certificate is out and we all use molodetz... Is that occitan? Is deepl correct? Anyway, since then, the bots are gone. Nice side effect.
-
It's not an easy life to do the right thing. But someone has to. I am glad, it is you who orders happy meals at 1am. Not everyone could do it, you're an inspiration to us all.
-
Just thought of a new conspiracy theory.
IPv6 is not adopted because IPv4 changes our network to become more tree formed, with mandatory nodes to connect other nodes and little to no way to avoid them...
Strangely consistent with the restructuring proposal from China a few years back...
Don't ask me about the logistics of this conspiracy theory, haven't thought it through...
Counter-point, main internet traffic nodes already doing that job... -
@D-4got10-01
I read your reply like this: The "/jk" ends the just kidding block. Everything afterwards is absolutely serious. And there you say that my previous comment is obvious.
I wholeheartedly agree with that. <3 -
@D-4got10-01 Didn't you know? The whole platform has just two users. Many accounts which are all @retoor and you.
-
@YourMom
Seeing as abiogenesis is still a big question mark that we could not recreate in any laboratory, I'd say it is bogus. But hey, I have never heard of it. -
Viral cryogenesis.
The idea that when you're getting cold somehow magically the cold virus forms in your body. It's is unbelievably wide spread. Everyone and their grandma believes in that conspiracy theory. -
Just had a look at part 2. I don't have time to solve it right now, but my gut tells me that this is a case for a sweep line algorithm.
-
@lorentz I see. Bother... I cannot see the problem therefore.
-
https://adventofcode.com/2025/day/9
Is it this here? I don't see any part 2?
I have never done aoc before, but I don't see any reason to draw an array here at all. That is not it, is it? That's to easy.. At least the naive solution is easy...
Where do I go to find part 2? -
I love reading code people wrote in Rockstar (https://codewithrockstar.com/).
Can you share some of yours? -
Go away spam bot
-
@BordedDev
Oh, addendum... Implementing passwordless for a customer at the moment. It is terrible. On paper, we are not allowed to trust emails. Email recovery and passwordless, which in essence is just one-time passwords in links communicated over an untrusted channel.
If we could guarantee encryption, we could use that instead.
Passwordless is kind of okay with OTP... OTP is amazing. It is so simple, so elegant, so offline. I love it. -
@BordedDev
I think it is kind of a distraction.
It is the old mitigation argument. I managed to get a sql injection vulnerability to work. Wait, but what if the passwords are hashed? Now, I cannot log in. Or can I?
Well, yea, because why wouldn't I have write rights in the database?
All I do is replace the hash with a hash I chose, log in with its password, then, when I have a token, return the original hash. Nobody notices that they cannot log in for 5 seconds.
But hey, I could have mitigated this whole thing by separating read and right access... Or even your proposed pepper...
Okay, yea, every single step makes the architecture more complicated, in order to mitigate an unknown attack vector, which could potentially open another attack vector by its sheer complexity. Sure, pepper would stop that. If I have no access to the hardware... But now you have to backup the pepper and disaster recovery gets harder. Bonus points if the pepper is store in TPM. -
@NotJeckel
yea, that's just some rethoric trick. Nothing in the universe is the same. Red is not rouge. We find differences.
The question is, we have two statements. Laws are not morals and law is morality. Which one describes reality better. And you brought no argument so far except rhetoric nit-picking. You wouldn't be willing to read a 50 page essay that has a definition section to lock everything down and a reference section to prove the rest. Normally you have to do some good faith if you don't do theses. -
@afaIk What about it is senseless. Try to use full sentences.
-
@badger
They don't care about it because they aren't hit by it. And they shouldn't care about hashing, they should care about unique passwords. If they did, we didn't have to hash. (Or only to avoid timing attacks.)
But make those breaches painful and their understanding will develop. -
@badger Of course there is an xkcd :)
-
Not going to lie, I expected more attacks on this one.
-
@lorentz
I love the "I am not even engaging" argument. That is why there is an hitchen's defense. But yea, the second one is an assertion without argument as well. What do I not understand? -
@afaIk Weak
-
@NotJeckel
Alright, I thought your comment about codified way of ordering society was agreeing to that. I take it back. Otherwise, your assertion is weak. The best argument you found is the pertinence is that it is different? Well, that's a fucking weak stance to counter an argument that they are the same. -
@Lensflare
They are no difference between morals are proto law and laws are morals solidified. Hence, they are the same. That's my argument that I am making.
I am still at my same claim. I point out how I derived at it. I did not retreat. I still think that a) laws are morals. A subset of morals that we negotiated as a society but morals. And b) it is immoral to try to sneak your personal morals past the negotiation process of our society morals. -
@afaIk
What the fuck are you talking about? Which experts? Where? Are you pulling that out of your ass? -
@YourMom
But it also implies that the pertinent difference is in what cannot be expressed by the other media. E.g. the moans you mentioned. Not that the pertinence is in what they share, i.e. the communication.
