jkrtn

@jkrtn@lemmy.ml

This profile is from a federated server and may be incomplete. Browse more on the original instance.

jkrtn,

I read some of the discussion over CVE-2023-7028. It sounds like they were reading a list of emails for password reset and if one matched the account they sent the reset email to all of them.

In my mind it is an extremely low bar that programmers not mix unauthorized input with account data. It simply should not have been possible to send an account secret to anything other than emails present in the database, full stop.

IDK, I appreciate the transparency and I would have been safe from that attack because I always use 2FA. But this is not a viable product for hosting code if their coding practices allow something like that through.

jkrtn,

You’re correct. And I don’t think we are armchair coding. We know proper security is so hard that even experienced developers can write code vulnerable to something like a timing attack. But sending secure data to unvalidated input isn’t a minor slip up that could happen to anyone. They are either unaware of or not bothering with good practices.

jkrtn,

Yes. Some guides suggest, say, “just use ‘key’ for now, we’ll replace it later.” I didn’t mention their step adding a stronger key, I guess I didn’t see that as an important part of the question.

jkrtn,

I think yeah, I will not be following that advice for sure. Just wondering at this point if someone should take extra precautions around SSD encryption. Like should one overwrite the whole drive if a key is leaked so that the odds of recovering any info from the chips is lessened? Or is revoking the leaked key sufficient?

jkrtn,

He’s received plenty of warnings but no repercussions. So he will continue stealing from charities and misusing campaign funds until there is an actual consequence.

jkrtn,

How can I learn more about alternatives to pull requests and other tools or processes for code review?

jkrtn,

One problem is that what they’re calling him is completely inaccurate. “Journalist” implies impartiality, of at least content with a non-zero amount of truth.

jkrtn,

He doesn’t fear for his life? There could have been deadly cement in that milkshake!

jkrtn,

Guys be careful! You don’t want to be bored instead of burnt out, frustrated, taken advantage of, and bored.

jkrtn,

I agree. For power tools, especially where decent accuracy is key like it is with a jointer, definitely more of a “do your research, price is not equal to quality,” not “you can do fine with any cheap one.”

jkrtn,

Apply for a patent and sell the rights to manufacturers who can make something safe to use. That is a really slick demo video.

Donald Trump testifies for less than 3 minutes in defamation trial and is rebuked by judge (apnews.com)

He testified for under three minutes. But former President Donald Trump still broke a judge’s rules on what he could tell a jury about writer E. Jean Carroll’s sexual assault and defamation allegations, and he left the courtroom Thursday bristling to the spectators: “This is not America.”...

jkrtn,

The only trap here is the one Donald cannot keep shut.

jkrtn,

Do you think the used server market is worth the cost? It looks like I could have a giant chunk of DDR3 for not so much.

jkrtn,

Thank you, really appreciate your advice. I was just struggling to install Proxmox on a new machine, and you made me take a step back. The kernel is messed up, do I really want this? Why am I jumping through hoops for this when Debian has zero issues installing? I’ll be trying the container software you mentioned instead.

jkrtn,

I’m glad the people with this device are getting traction on using it with their HA, but holy hell this is a complete non-starter for me and I cannot understand why they got it in the first place. There’s no climate automation I would ever want that is worth a spying device connected to the internet and a spying app installed on my phone.

jkrtn,

I’m cynical so I assume they are turning a profit selling user data. So the lost money is not from AWS expenses but from not having installed apps to steal more data.

jkrtn,

I’m just getting started on Proxmox and had no idea plugins like that were available. Anything in particular that works well for you? I’d like to try it out.

jkrtn,

Sorry, but do you have a setup where you don’t need to worry about the atomicity of that operation? It sounds simple and effective, so I’d like to do it, but I’m concerned I may get something halfway through a write.

I suppose the odds are you’d have at worst a bad log file whereas config files and binaries are used read-only the majority of the time.

jkrtn,

Could you give a quick example of using NixOS configuration to launch a machine or deploying something remotely? I’m just starting to move beyond a single machine at home. I’d really like to get transition to infra as code.

jkrtn,

This is such a wealth of information, thank you! I’m really excited to try this out.

  • All
  • Subscribed
  • Moderated
  • Favorites
  • JUstTest
  • InstantRegret
  • mdbf
  • ethstaker
  • magazineikmin
  • cubers
  • rosin
  • thenastyranch
  • Youngstown
  • osvaldo12
  • slotface
  • khanakhh
  • kavyap
  • DreamBathrooms
  • provamag3
  • Durango
  • everett
  • tacticalgear
  • modclub
  • anitta
  • cisconetworking
  • tester
  • ngwrru68w68
  • GTA5RPClips
  • normalnudes
  • megavids
  • Leos
  • lostlight
  • All magazines