• 0 Posts
  • 68 Comments
Joined 2 years ago
cake
Cake day: July 3rd, 2023

help-circle



  • I tried to give it a piece of ~200 lines of JS I was positive there was an error in, and it tried to gaslight me into thinking there wasn’t any… I tried everything, pointed it specifically to suspicious bits, asked for breakdowns, assertions, test cases… which it then promptly copy-pasted to me straight from my own code… Took me a few hours to find, but there was, in fact, a rookie mistake in it, just hard to spot at a glance.


  • I don’t see what’s the point of the second one if the syntax highlight, even in the first example, already shows a changed role.

    A more realistic solution for the example code would be to setup a linter in the pipeline, and if one letter variables and/or template literals are detected, depending on how nice you are, reject the commit, or send an email requesting the author to be beaten up with a crowbar to the teamlead, and a copy, parsed by chatGPT for formality and politeness, to the HR.



  • I hate this shit being routinely used in PHP. Symfony uses those functional comments for routing, essentially scanning every controller file as text on every visit, to gather the url patterns above functions. Laravel uses Reflection, which is functionally the same thing, to provide arguments to controller functions. Also, kind of related, the project I’m working now has few functions that use backtrace to return different results based on where they are called from. It is indeed very cursed and I’m ripping out any usages of them whenever I see one.


  • I did exactly that many years ago. Ditched my phone and went with x86 UMPC with builtin 3G modem, the name of which I don’t remember because it was some random Chinese no-name. Unfortunately that experiment coincided with the era of “fuck websites, we’re going app-only because we’re so hip”. I was in a world of pain right off the bat when I got a carrier plan, specifically marketed for usage on PC’s, and it did not work. I called them and they said to me:

    • Do you have Android or iOS?
    • I only have Windows
    • Windows phone?
    • No, Windows 8…
    • Well, you’ll have to use the app to activate the SIM card…

    Turns out, the usage on PC’s meant tethering…

    Lots of online things, if they were even available as websites, were highly cut down versions of apps. And SMS 2FA, goddamn. I remember not being able to buy booze and shoes because, apparently, phone confirmations were required in those establishments. Good thing they’re fading out in favor of TOTP and passkeys. But, at a time, I had to swtich to a carrier that allowed me to use “corporate” features like SMS forwarding and SIP telephony. Also, fuck WhatsApp, that shit can burn in all fires of hell.

    On the other hand, I really miss that time. It was liberating, just not having like, a few dozen malwares in my pocket tracking me down just to track someone’s dog, or a bus, or to spy on someone’s buying preferences or whatever. But things have gotten quite a bet better over the years, so I’m kind of inclined to repeat the experiment with my new-ish OM3S which I carry because I still cannot imagine going out without a proper PC on me (don’t buy it, though, it is severely underpowered, better get something GPD instead).




  • Tailscale… is not that good. The underlying wireguard is robust, but tailscale control plane is completely proprietary, as well as their DERP servers that it too often uses completely needlessly. They can also block you off from downloading it, updating, or logging in, if you happen to be in a wrong country.

    I’m myself looking for an alternative to it, but having trouble finding something I could share with non tech savvy friends while not being as complex on my end as, say, open/strongswan ais. Any suggestions welcome.


  • That’s the face I’ve made just yesterday when my friend told me she’s now eligible for a subsidized IT mortgage. That thing was one of Russia’s last ditch attempts at stopping skilled workers from fucking off to different countries. The problem is, she’s a web designer. I guess that counts as IT nowadays, so good for her. But it’s bitter to hear as sr. backend tech who never hit the criteria…




  • drathvedro@lemm.eetoMildly Infuriating@lemmy.worldI hate people like this
    link
    fedilink
    English
    arrow-up
    1
    arrow-down
    10
    ·
    8 months ago

    I wouldn’t jump on to blame on the customer. In fact, have my own hill I’m fighting right now where I’m not completely in the right. Who knows, maybe the working hours were not visible, or maybe there was no closed sign at all. In any case, this made at least one person mad and is a perfect opportunity for a business to do a retro and check if they might need to do something about it. It’s much more valuable than a thousandth review from someone who had a great time… or didn’t, but didn’t care to review either. And, unless your business is genuinely bad, even a Karen once in a while shouldn’t affect the total score a bit.




  • There’s an OS you might like. It has no UAC, no file permissions, no sudo nor chmod, as it has no multi-user support, no antivirus and no firewall, no protection rings, not even spectre/meltdown mitigations, and most of all - no guard-rails whatsoever: You can patch the kernel directly at runtime and it won’t even give you a warn. And yet, it is perfectly safe to run. It’s called TempleOS and it achieves such a flawless security by having no networking support whatsoever and barely any support for removable media. If you want a piece a software - you just code it in, manually. You don’t have to check the code for backdoors if it’s entirely written by you… only for CIA at your actual back door…