Skip to content
  • Categories
  • Recent
  • Tags
  • Popular
  • World
  • Users
  • Groups
Skins
  • Light
  • Brite
  • Cerulean
  • Cosmo
  • Flatly
  • Journal
  • Litera
  • Lumen
  • Lux
  • Materia
  • Minty
  • Morph
  • Pulse
  • Sandstone
  • Simplex
  • Sketchy
  • Spacelab
  • United
  • Yeti
  • Zephyr
  • Dark
  • Cyborg
  • Darkly
  • Quartz
  • Slate
  • Solar
  • Superhero
  • Vapor

  • Default (No Skin)
  • No Skin
Collapse
Brand Logo

agnos.is Forums

  1. Home
  2. Programmer Humor
  3. I wonder if this was made by AI or a shit programmer

I wonder if this was made by AI or a shit programmer

Scheduled Pinned Locked Moved Programmer Humor
programmerhumor
170 Posts 93 Posters 1 Views
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • lena@gregtech.euL [email protected]
    This post did not contain any content.
    grrgyle@slrpnk.netG This user is from outside of this forum
    grrgyle@slrpnk.netG This user is from outside of this forum
    [email protected]
    wrote on last edited by
    #123

    What is the Tea hack?

    F 1 Reply Last reply
    8
    • D [email protected]

      Security by obscurity.

      vanilla_puddinfudge@infosec.pubV This user is from outside of this forum
      vanilla_puddinfudge@infosec.pubV This user is from outside of this forum
      [email protected]
      wrote on last edited by
      #124

      this man ssh'd in on a five-digit port

      1 Reply Last reply
      0
      • spicehoarder@lemmy.zipS [email protected]

        No, this was a data leak. The word "hack" has legal implications and shifts the blame away from the company and onto the individual who discovered the leak.

        jackbydev@programming.devJ This user is from outside of this forum
        jackbydev@programming.devJ This user is from outside of this forum
        [email protected]
        wrote on last edited by
        #125

        It can be both. The company can be at fault for not keeping something secure while the people who steal the data are at fault for stealing data. Data leaks and hacks are not mutually exclusive.

        P 1 Reply Last reply
        5
        • F [email protected]

          There's nothing wrong with eating a banana with a knife and fork, either.

          Except living with the shame.

          B This user is from outside of this forum
          B This user is from outside of this forum
          [email protected]
          wrote on last edited by
          #126

          Well these people probably don't wash their hands so knife fork is the most sanitary way.

          1 Reply Last reply
          0
          • lena@gregtech.euL [email protected]
            This post did not contain any content.
            A This user is from outside of this forum
            A This user is from outside of this forum
            [email protected]
            wrote on last edited by
            #127

            At this point I think the women using it got psyopped

            1 Reply Last reply
            10
            • grrgyle@slrpnk.netG [email protected]

              What is the Tea hack?

              F This user is from outside of this forum
              F This user is from outside of this forum
              [email protected]
              wrote on last edited by
              #128

              An app called Tea™ was marketed as a safespace for women and used government issued IDs as a way to verify users.

              4Chan users leaked all of the IDs onto the larger internet.

              grrgyle@slrpnk.netG R 2 Replies Last reply
              9
              • jackbydev@programming.devJ [email protected]

                Hack has at least two definitions in a computing context.

                1. A nifty trick or shortcut that is useful. "Check out this hack to increase your productivity."
                2. Accessing something you shouldn't. "They hacked into the database."

                A lot of times they sort of get used in conjunction to describe interesting ways to gain access to secure systems, but using it to describe accessing insecure things you shouldn't is still a valid usage of the phrase.

                That said I definitely wanna see the company face charges for this, this is insane.

                spacecowboy@lemmy.caS This user is from outside of this forum
                spacecowboy@lemmy.caS This user is from outside of this forum
                [email protected]
                wrote on last edited by
                #129

                Yeah, if I leave my house door wide open for a few weeks and I get robbed, it's still burglary.

                jackbydev@programming.devJ grendel84@tiny.tilde.websiteG rivalarrival@lemmy.todayR 3 Replies Last reply
                13
                • F [email protected]

                  An app called Tea™ was marketed as a safespace for women and used government issued IDs as a way to verify users.

                  4Chan users leaked all of the IDs onto the larger internet.

                  grrgyle@slrpnk.netG This user is from outside of this forum
                  grrgyle@slrpnk.netG This user is from outside of this forum
                  [email protected]
                  wrote on last edited by
                  #130

                  Wow what a fuckin shitshow. I have so many follow-up questions

                  1 Reply Last reply
                  4
                  • spacecowboy@lemmy.caS [email protected]

                    Yeah, if I leave my house door wide open for a few weeks and I get robbed, it's still burglary.

                    jackbydev@programming.devJ This user is from outside of this forum
                    jackbydev@programming.devJ This user is from outside of this forum
                    [email protected]
                    wrote on last edited by
                    #131

                    Thank you! I feel like I'm taking crazy pills reading people's reactions to this. And if it was a business instead of your house and it was customer data you weren't protecting you should still be in trouble too. It's like people think only one side can be in the wrong in this or that because the data wasn't secured and in the public that gives them free reign to post it everywhere. I wonder how those people would feel if their addresses were leaked. Afterall, if you're a homeowner your name is attached to the property and is publicly accessible.

                    1 Reply Last reply
                    4
                    • spacecowboy@lemmy.caS [email protected]

                      Yeah, if I leave my house door wide open for a few weeks and I get robbed, it's still burglary.

                      grendel84@tiny.tilde.websiteG This user is from outside of this forum
                      grendel84@tiny.tilde.websiteG This user is from outside of this forum
                      [email protected]
                      wrote on last edited by
                      #132

                      @SpaceCowboy @JackbyDev

                      In a legal context there's also the concept of a "reasonable expectation of privacy". The computer abuse and fraud act defines hacking as accessing data or systems you are not authorized to access.

                      A better analogy is putting your journal in a public library and getting mad when somone reads it.

                      I'm not saying what these ass holes did was right, I'm saying that the company weakened their legal position by not protecting the data.

                      I spacecowboy@lemmy.caS 2 Replies Last reply
                      10
                      • grendel84@tiny.tilde.websiteG [email protected]

                        @SpaceCowboy @JackbyDev

                        In a legal context there's also the concept of a "reasonable expectation of privacy". The computer abuse and fraud act defines hacking as accessing data or systems you are not authorized to access.

                        A better analogy is putting your journal in a public library and getting mad when somone reads it.

                        I'm not saying what these ass holes did was right, I'm saying that the company weakened their legal position by not protecting the data.

                        I This user is from outside of this forum
                        I This user is from outside of this forum
                        [email protected]
                        wrote on last edited by
                        #133

                        A better analogy is putting your journal in a public library and getting mad when someone reads it.

                        Good analogy indeed. I'd go one step further and add: it's like promising others you'll keep their diary safe, then putting it in a public library, to then get mad when someone reads it.

                        grendel84@tiny.tilde.websiteG 1 Reply Last reply
                        4
                        • F [email protected]

                          Yeah, it has no notion of being truthful. But we do, so I was bringing in a human perspective there. We know what it says may be true or false, and it's natural for us to call the former "telling the truth", but as you say we need to be careful not to impute to the LLM any intention to tell the truth, any awareness of telling the truth, or any intention or awareness at all. All it's doing is math that spits out words according to patterns in the training material.

                          kayohtie@pawb.socialK This user is from outside of this forum
                          kayohtie@pawb.socialK This user is from outside of this forum
                          [email protected]
                          wrote on last edited by
                          #134

                          I figured and I know it's shorthand, it's my own frustration that said shorthand has partly enabled the anthropomorphism that it's enjoyed.

                          Leave the anthropomorphism to pets, plants, and furries, basically. And cars. It's okay to call cars like that. They know what they did.

                          1 Reply Last reply
                          1
                          • I [email protected]

                            A better analogy is putting your journal in a public library and getting mad when someone reads it.

                            Good analogy indeed. I'd go one step further and add: it's like promising others you'll keep their diary safe, then putting it in a public library, to then get mad when someone reads it.

                            grendel84@tiny.tilde.websiteG This user is from outside of this forum
                            grendel84@tiny.tilde.websiteG This user is from outside of this forum
                            [email protected]
                            wrote on last edited by
                            #135

                            @iii

                            Yeah the internet by design is a public space, and we must be responsible and treat it as such when handling sensative data.

                            Again, it was very wrong for people to take that data and especially to post like that.

                            The company also has to do their part and produce at least some kind of barrier to the data.

                            Even using UUIDs and making sure the data wasn't query-able would have been something.

                            S 1 Reply Last reply
                            2
                            • B [email protected]

                              Not really sure what you mean by reusing UUIDs but theres nothing bad about using UUIDs in URLs for content you don't want scrapped by bots. Sites like Google Photos are already are using UUIDs in the URL for the photos, and do not require any authentication to see the image as long as you have the URL. You can try this for yourself and copy the URL of an image and open it in a Private Browsing Window. Every so often someone realizes the actual image URL is public and think they've found a serious issue, but the reason why it isn't is because of the massive key space UUID provides and that it would be infeasible to check every possible URL, even if it's publicly available.

                              V This user is from outside of this forum
                              V This user is from outside of this forum
                              [email protected]
                              wrote on last edited by
                              #136

                              You point out the "vulnerability" yourself, sometimes (when it's Google) it works as designed, but a less robust site could have the full access through a UUID for example and then someone shares an image with it, bam they have access to more than they should. The history is littered with bulletproof things like this ending up being used wrongly.

                              1 Reply Last reply
                              0
                              • I [email protected]

                                Based on this comment alone, I am 100% sure that you are not a lawyer.

                                spicehoarder@lemmy.zipS This user is from outside of this forum
                                spicehoarder@lemmy.zipS This user is from outside of this forum
                                [email protected]
                                wrote on last edited by
                                #137

                                I don't claim to be, but you can't deny the difference the wording would make to a jury.

                                1 Reply Last reply
                                0
                                • skip0110@lemmy.zipS [email protected]

                                  AI just enables the shit programmers to create a greater volume of shit

                                  H This user is from outside of this forum
                                  H This user is from outside of this forum
                                  [email protected]
                                  wrote on last edited by
                                  #138

                                  My favorite one I've seen so far was
                                  "AI can take a junior programmer and make them a 10x junior programmer."

                                  1 Reply Last reply
                                  5
                                  • grendel84@tiny.tilde.websiteG [email protected]

                                    @SpaceCowboy @JackbyDev

                                    In a legal context there's also the concept of a "reasonable expectation of privacy". The computer abuse and fraud act defines hacking as accessing data or systems you are not authorized to access.

                                    A better analogy is putting your journal in a public library and getting mad when somone reads it.

                                    I'm not saying what these ass holes did was right, I'm saying that the company weakened their legal position by not protecting the data.

                                    spacecowboy@lemmy.caS This user is from outside of this forum
                                    spacecowboy@lemmy.caS This user is from outside of this forum
                                    [email protected]
                                    wrote on last edited by
                                    #139

                                    Terrible analogy. You have permission to read books in a library.

                                    Forgetting to lock your door isn't granting permission to people enter your house, and it doesn't grant people permission to take your valuables. It may be neglectful to leave your door unlocked, but it doesn't imply granting permission to enter your house.

                                    Same goes with computer security. Leaving your computer insecure may be neglectful, but it does not imply someone has permission to take your data.

                                    grendel84@tiny.tilde.websiteG 1 Reply Last reply
                                    7
                                    • diplomjodler3@lemmy.worldD [email protected]

                                      I always get irrationally angry when i see python code using os.path instead of pathlib. What is this, the nineties?

                                      undercoverulrikhd@programming.devU This user is from outside of this forum
                                      undercoverulrikhd@programming.devU This user is from outside of this forum
                                      [email protected]
                                      wrote on last edited by
                                      #140

                                      What big advantages does pathlib provide? os.path works just fine

                                      diplomjodler3@lemmy.worldD 1 Reply Last reply
                                      3
                                      • C [email protected]

                                        It's not security through obscurity in this case. The filenames can't be obtained or guessed through brute force. At least not with current technology or processing power...

                                        Security through obscurity is when you hide implementation details.

                                        Saying that my suggestion is security through obscurity is the same as telling that ASLR is security through obscurity...

                                        S This user is from outside of this forum
                                        S This user is from outside of this forum
                                        [email protected]
                                        wrote on last edited by
                                        #141

                                        Until the psuedo random UUID generator can be reverse engineered. Makes me think of this video: https://youtu.be/o5IySpAkThg

                                        Anyway, I think we're on the same wavelength and both agree that the implementation as is isn't production-ready to say the least 😉

                                        1 Reply Last reply
                                        0
                                        • diplomjodler3@lemmy.worldD [email protected]

                                          I always get irrationally angry when i see python code using os.path instead of pathlib. What is this, the nineties?

                                          diplomjodler3@lemmy.worldD This user is from outside of this forum
                                          diplomjodler3@lemmy.worldD This user is from outside of this forum
                                          [email protected]
                                          wrote on last edited by [email protected]
                                          #142
                                          • Everything is in one library which offers consistency for all operations.
                                          • You can use forward slashes on Windows paths, which makes for much better readability.
                                          • You can access all the parts of a pathlib object with attributes like .stem, .suffix or .parent.
                                          • You can easily find the differences between paths with .relative_to()
                                          • You can easily build up complex paths with the / operator (no string additions).

                                          Just off the top of my head.

                                          1 Reply Last reply
                                          0
                                          Reply
                                          • Reply as topic
                                          Log in to reply
                                          • Oldest to Newest
                                          • Newest to Oldest
                                          • Most Votes


                                          • Login

                                          • Login or register to search.
                                          • First post
                                            Last post
                                          0
                                          • Categories
                                          • Recent
                                          • Tags
                                          • Popular
                                          • World
                                          • Users
                                          • Groups