Kissaki

joined 2 years ago
MODERATOR OF
[–] Kissaki@programming.dev 2 points 23 hours ago* (last edited 23 hours ago)

Is this about/a problem with iOS or Android or both? The linked post only talks about iOS.

I'm surprised they can include remote requests [by consequence of remote URLs] in notifications.

[–] Kissaki@programming.dev 4 points 2 days ago* (last edited 2 days ago)

hhttps://

I think I have to decrypt this url before I can open it

/edit: I did it! I was able to decrypt it!

https://faq.whatsapp.com/414631957536067/

[–] Kissaki@programming.dev 3 points 2 days ago (1 children)

But of course when implemented into law, it gets softened up and exceptions get added for when it’s […]

Notably, it's not like laws can weaken human rights without cause. The laws are balancing one human right against others. For the state to ensure fairness and safety to its citizens, it has to - at some point inevitably - violate other human rights. (Locking up criminals because they are a danger to other citizens.)

There's really no way to prevent attempts to control or interpret rights differently or weaken or balance them differently. That's politics.

The sad thing is how repeatedly, such policies and changes get pushed repeatedly, despite repeated concerns being raised and the proposals being rejected. But there's nothing "stronger than human rights" that you can do to prevent them.

Any attempts like "you can only propose such a law every 2 years" could be circumvented one way or another. But maybe something like that could be worthwhile. The bigger problem, though, may be how press represents them, and how lobbying orgs can lobby and push agendas without much transparency or elected representation.

[–] Kissaki@programming.dev 1 points 3 days ago

In the bottom notes, they link to their Quantifying the cost of RTO, which is a worthwhile read too, with visualized numbers.

[–] Kissaki@programming.dev 1 points 3 days ago

One candidate we placed in the past told us they wanted $90k. We advised them not to say that number, because it'd get them filtered out. They ended up getting hired for close to 200.

Crazy

 

cross-posted from: https://programming.dev/post/37407248

Scrolling through this webpage is an adventure.

 

Scrolling through this webpage is an adventure.

[–] Kissaki@programming.dev 4 points 3 days ago (2 children)

It is a “cross that bridge if/when I get there” situation.

 

Yesterday programming.dev was down for hours.

I checked https://status.programming.dev/ and it is indeed a working status page, but with no monitors added.
Which is already surprising.

But even more confusing is the consequential claim of "All Systems Operational", even when the instance is down/unreachable.

What's the state and plan for the status page?

[–] Kissaki@programming.dev 1 points 6 days ago

Crazy long post, with a lot of technological details about the dotnet environment too (compilation, virtual machine, jit, etc). 33 headlines.

[–] Kissaki@programming.dev 19 points 1 week ago (4 children)

an Android Linux translation layer called Android Translation Layer (we never said developers were good at naming)

wth is that jab?

I like descriptive names on products.

Should they have called it koalupetta?

[–] Kissaki@programming.dev 4 points 1 week ago (1 children)

I uninstalled badger back when Firefox released cookie isolation. No need to learn about tracking cookies when they're either blocked in the first place, or isolated meaning no cross tracking.

[–] Kissaki@programming.dev 1 points 1 week ago

The beginning of Aperture Science

[–] Kissaki@programming.dev 3 points 1 week ago* (last edited 1 week ago)

This talks about one issue. You seem to be confident that this one case is representative of the whole FOSS space? I am not.

Can you elaborate how it would be much easier in closed source software? Because as far as I can see, it's different. In most cases, you need an actual person instead of an online persona, pass interview and contracting, and then you're still "the new guy" or Junior in the company or project. It's not like closed off from public eyes means anyone can do anything without any eyes.

[–] Kissaki@programming.dev 2 points 1 week ago

At the end, pointing to their Bugzilla issue tracker

I've always found Bugzilla incredibly inaccessible. It's so overloaded, so complicated, so noisy with unrelated and irrelevant things. It always baffled me how projects use it and keep using it, and especially projects like Thunderbird and Mozilla, for such a long time.

I regularly use bug trackers, to report, comment, or work on. When I see Bugzilla, in most cases, I give up/leave right away.

Consequently, I find it ironic that they point to Bugzilla at the end.


That being said, I think this video is a good intro to accessibility, common issues, and study findings.


How do you guys view Bugzilla as an issue tracker, bug tracker, and work task tracker?

 

cross-posted from: https://programming.dev/post/36983916

Freund wasn’t looking for a backdoor when he noticed SSH connections to his Debian testing system taking 500 milliseconds longer than usual. As a database engineer benchmarking PostgreSQL performance, he initially dismissed the anomaly. But the engineer’s curiosity persisted.

The backdoor’s technical sophistication was breathtaking. Hidden across multiple stages, from modified build scripts that only activated under specific conditions to obfuscated binary payloads concealed in test files, the attack hijacked SSH authentication through an intricate chain of library dependencies. When triggered, it would grant the attacker complete remote access to any targeted system, bypassing all authentication and leaving no trace in logs.

The backdoored versions 5.6.0 and 5.6.1 had been released in February and March 2024, infiltrating development versions of Fedora, Debian, openSUSE, and Arch Linux. Ubuntu’s upcoming 24.04 LTS release, which would have deployed to millions of production systems, was mere weeks away.

The technical backdoor was merely the final act of a three-year psychological operation that began not with code, but with studying a vulnerable human being.

 

Freund wasn’t looking for a backdoor when he noticed SSH connections to his Debian testing system taking 500 milliseconds longer than usual. As a database engineer benchmarking PostgreSQL performance, he initially dismissed the anomaly. But the engineer’s curiosity persisted.

The backdoor’s technical sophistication was breathtaking. Hidden across multiple stages, from modified build scripts that only activated under specific conditions to obfuscated binary payloads concealed in test files, the attack hijacked SSH authentication through an intricate chain of library dependencies. When triggered, it would grant the attacker complete remote access to any targeted system, bypassing all authentication and leaving no trace in logs.

The backdoored versions 5.6.0 and 5.6.1 had been released in February and March 2024, infiltrating development versions of Fedora, Debian, openSUSE, and Arch Linux. Ubuntu’s upcoming 24.04 LTS release, which would have deployed to millions of production systems, was mere weeks away.

The technical backdoor was merely the final act of a three-year psychological operation that began not with code, but with studying a vulnerable human being.

 

Over the years, our server has been racking up costs, and the now-unsupported software it was running on finally gave out.

All online services have now been migrated into permanent offline features. We made sure nothing was lost.

  • The Level Editor now saves levels directly to your disk […]
  • All community-created levels […]
  • All-time high scores have been immortalized […]
  • New high scores are saved locally […]

The game Dual Snake on Steam is free and was released in 2018.

 

Explores how the Lean programming language handles 2 + 2 = 4, which other programming languages collapse into a bool, but Lean considers a Proposition, and requires Proof.

How does provably correct programming look? This article seems to give a good introduction and example.

 

Explores how the Lean programming language handles 2 + 2 = 4, which other programming languages collapse into a bool, but Lean considers a Proposition, and requires Proof.

How does provably correct programming look? This article seems to give a good introduction and example.

 

Pike is a dynamic programming language with a syntax similar to Java and C. It is simple to learn, does not require long compilation passes and has powerful built-in data types allowing simple and really fast data manipulation.

int getDex()
{
  int oldDex = Dex;
  Dex = 0;
  return oldDex;
}

private void
show_user(int|string id, void|string full_name)
{
  write("Id: " + id + "\n");
  if (full_name)
    write("Full name: " + full_name + "\n");
}
 

The Go 1.18 release introduced generics and with that a number of new features, including type parameters, type constraints, and new concepts such as type sets. It also introduced the notion of a core type. While the former provide concrete new functionality, a core type is an abstract construct that was introduced for expediency and to simplify dealing with generic operands (operands whose types are type parameters). In the Go compiler, code that in the past relied on the underlying type of an operand, now instead had to call a function computing the operand’s core type. In the language spec, in many places we just needed to replace “underlying type” with “core type”. What’s not to like?

Quite a few things, as it turns out! To understand how we got here, it’s useful to briefly revisit how type parameters and type constraints work.

For the Go 1.25 release (August 2025) we decided to remove the notion of core types from the language spec in favor of explicit (and equivalent!) prose where needed. This has multiple benefits: …

view more: next ›