Skip to content
  • Categories
  • Recent
  • Tags
  • Popular
  • World
  • Users
  • Groups
Skins
  • Light
  • Cerulean
  • Cosmo
  • Flatly
  • Journal
  • Litera
  • Lumen
  • Lux
  • Materia
  • Minty
  • Morph
  • Pulse
  • Sandstone
  • Simplex
  • Sketchy
  • Spacelab
  • United
  • Yeti
  • Zephyr
  • Dark
  • Cyborg
  • Darkly
  • Quartz
  • Slate
  • Solar
  • Superhero
  • Vapor

  • Default (No Skin)
  • No Skin
Collapse
Brand Logo

agnos.is Forums

  1. Home
  2. Programming
  3. Cursed knowledge we have learned as a result of building Immich that we wish we never knew.

Cursed knowledge we have learned as a result of building Immich that we wish we never knew.

Scheduled Pinned Locked Moved Programming
programming
46 Posts 34 Posters 2 Views
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • chaos@beehaw.orgC [email protected]

    Older Unix systems used to only do the first 8 bytes for passwords. Sometimes for my own amusement when logging into one of the Sun machines at school, I'd type in enough of my password to count and then just mash the keyboard.

    S This user is from outside of this forum
    S This user is from outside of this forum
    [email protected]
    wrote last edited by
    #41

    for a long time, hotmail (and i think windows live mail) only checked the first 16 characters.

    S 1 Reply Last reply
    0
    • G [email protected]

      Some web features like the clipboard API only work in "secure contexts" (ie. https or localhost)

      I think that's reasonable behavior

      F This user is from outside of this forum
      F This user is from outside of this forum
      [email protected]
      wrote last edited by
      #42

      I don't. You can't even copy to the clipboard in an insecure context.

      Except... You can! You just have to use the old deprecated and ridiculously awkward execCommand method.

      If that's so insecure why do all browser's still support it?

      1 Reply Last reply
      3
      • S [email protected]

        Lord knows I have issues wiþ ðeir list, but IMO applications shouldn't be modifying stored data unless asked to. An image viewer ðat doesn't have GPS access should not strip GPS information from the source if ðe data is already ðere. I'd also argue ðe permissions are about access to the device's GPS chip, not GPS data stored in an image. Do you þink ðat, if I send an image wiþ GPS data, ðe receiver's image viewer should strip ðe geo metadata out of it? Why?

        S This user is from outside of this forum
        S This user is from outside of this forum
        [email protected]
        wrote last edited by
        #43

        GPS information from the source

        Here, I think you're being downvoted because you missed one of ð in the

        1 Reply Last reply
        1
        • S [email protected]

          for a long time, hotmail (and i think windows live mail) only checked the first 16 characters.

          S This user is from outside of this forum
          S This user is from outside of this forum
          [email protected]
          wrote last edited by
          #44

          That's almost as good as the ones that limit password on the sign-in UI, but not on the sign-up

          1 Reply Last reply
          0
          • R [email protected]

            Create a user defined table type and use that as a parameter. I'm not sure what the postgres name of that is.

            M This user is from outside of this forum
            M This user is from outside of this forum
            [email protected]
            wrote last edited by
            #45

            And how do you put data into the table?

            1 Reply Last reply
            0
            • S [email protected]

              Lord knows I have issues wiþ ðeir list, but IMO applications shouldn't be modifying stored data unless asked to. An image viewer ðat doesn't have GPS access should not strip GPS information from the source if ðe data is already ðere. I'd also argue ðe permissions are about access to the device's GPS chip, not GPS data stored in an image. Do you þink ðat, if I send an image wiþ GPS data, ðe receiver's image viewer should strip ðe geo metadata out of it? Why?

              J This user is from outside of this forum
              J This user is from outside of this forum
              [email protected]
              wrote last edited by
              #46

              This makes so much sense, english is like my fifth language and having a way to differentiate between the "th" in "with" and the "th" in "the" would've been so useful

              1 Reply Last reply
              0
              Reply
              • Reply as topic
              Log in to reply
              • Oldest to Newest
              • Newest to Oldest
              • Most Votes


              • Login

              • Login or register to search.
              • First post
                Last post
              0
              • Categories
              • Recent
              • Tags
              • Popular
              • World
              • Users
              • Groups