• 1 Post
  • 132 Comments
Joined 1 year ago
cake
Cake day: June 11th, 2023

help-circle


  • I’d kick a couple of bucks towards a membership. I’m pretty sure I’ve dropped cash on my favourite instances at some point.

    I’d be surprised if that kind of model could pay competitive developer salaries. Existing media platforms got started with mad VC money until they had a user base large enough to justify huge ad spends.




  • I have a sedentary job as a software developer so it’s good to be more active.

    would you continue this hobby even though it’s wrecking my hands

    As a software developer who also has fucked up hands, no. This is your meal ticket. Don’t mess with it. Being depressed with a job is way better than being depressed without a job and a disability.

    I’ve actively avoided activities that use my hands because I don’t want to mess them up more. It sucks, but that’s where we’re at.

    I don’t know what activity to recommend. I do leg-centric stuff: swimming, inline skating, snowboarding, and soccer. I don’t know if those would be good for you.

    Edit: sorry. That came across as hostile. My hand situation is managed, but it still gets to me. I’m trying to say that you should take care of yourself and your hands. The short-term gain of an activity that messes you up isn’t worth it.

    Exercise feels great, and I hope you find something that works for your mind and your body.





  • I’m guessing you’re talking about debit cards. From the Canadian Government: yes.

    In detail:

    Payment terminals can also be built to feed into a retailer’s “customer relationship management” database so that a retailer can track your purchases and tie those to other information about you, such as your email address, if you have given it to them. Financial institutions and payment card network operators could also profile you based on your purchase information.

    This purchase information could potentially be shared and linked with information held by loyalty card companies, data brokers, or marketers.

    If it’s possible, then it’s a revenue stream, so I assume it’d be done.








  • Front end is hard. Slapping together some form elements, xhr requests, and DOM updates is easy. Building a usable, consistent UI, that makes proper user of the backend isn’t. On top of that, every jackass thinks they get it because they’re a user, so you get unsolicited suggestions from everywhere.

    Source: front end devs sobbing in the cubicle next to me.



  • LIKE ARE YOU TELLING ME THAT TOP CYBERSECURITY WORKERS OR ELITE HACKERS ARE JUST HOPING THEIR HARDWARE IS NOT SPYING ON THEM AND THERE IS NO WAY FOR AN ELITE HACKER OR CYBERSECURTY WORKER TO ENSURE THEY ARE NOT BEING SPIED BY THEIR HARDWARE

    Yes.

    Professional ELITE HACKERS who work for governments need to leave their electronic devices outside secure facilities for precisely this reason.

    Similarly, government networks that are air gapped have their hardware physically destroyed when it’s decommissioned because it’s impossible to be sure that it’s secure.


  • You don’t. It’s possible that the firmware or bootloader is doing evil things. They have access to hardware in a way your OS may not detect.

    The seminal paper in this area is On Trusting Trust. That link isn’t to the original, but it has a nice overview.

    The best way to prevent this kind of spying is through air gaps: ie, no network. Realistically, most of us don’t want to do that.

    At some point, you need to ask yourself what your threat model is. If you’re going to have severe consequences from doing something in range of the device, maybe you wanna do it elsewhere.