Details
-
AboutJust trying to do a lot with a little...
-
SkillsThe usual stuff...
-
LocationEarth
Joined devRant on 12/14/2017
Join devRant
Do all the things like
++ or -- rants, post your own rants, comment on others' rants and build your customized dev avatar
Sign Up
Pipeless API
From the creators of devRant, Pipeless lets you power real-time personalized recommendations and activity feeds using a simple API
Learn More
-
I thought it was just a normal Samsung product at first...
-
...and don’t forget a wvCleanLatex! (Okay, im done...)
-
@Alice I know, no curl, talk, finger, or CUDA time! How systemd of him...
-
That poor penguin...
-
@Bitwise it sounds like we are on uncannily similar journeys, a different detail here, a different poison there... but very similar haha. Glad life is working out for you know bud! I’m still at a crossroads now, seeing if I can make anything work on my own or not... thanks for sharing your story!
-
I think almost everyone in the tech industry feels this. At first it seems to get worse as you get older too... as it feels like everyone ‘just gets it’, at an increasingly younger age. Before long fetuses will be rolling their own frameworks! But as you get older you also learn to care less and less, and just the fact that you’re older and doing this brings its own presumptions that you know your shit (to most people anyways). It becomes harder and harder for imposters to maintain the long game. And while whizkids come along and think they’re the shit, their lack of meta knowledge in the field, that comes only from experience, means they usually spin their wheels complaining that they’re marginalized because no one recognizes that they’re smarter than everyone else, or everyone is dumb because they don’t use this or that tech. Those people might seem like threats when you’re young, but without humility they only burn out in negative emotions. You will be fine buddy!
-
@Nanos SMART, I believe, is the answer you’re looking for. smartctl (part of smartmon-tools, iirc) can be configured to email you, or run a script, the moment a self check discovers a problem, and even at first sign of something indicative of an impending failure (like read or seek errors). Of course it only helps if you configure it to actually run the self checks regularly. And be careful that you don’t end up with setting that wake a disk just to run checks. and make sure your disk isn’t spinning down more often than needed, if it’s needed at all, depending on the out usage patterns. The Arch Linux wiki page for smartctl has some great info that should be helpful on any OS you can run smartctl (maybe even OS X, but I’m not sure).
-
@linuxxx I use OC only because I’ve been lazy (although I’ve been told it’s a painless upgrade). I’d go NextCloud if at all possible. Also the app lets you send any files you like, and provides a mechanism for keeping photos synced (which is probably what you want). I thought you said you had Nextcloud already, but maybe I misunderstand. There’s a lot of ideas flying around here haha. Anyways, I wouldn’t consider it like critically secure since it’s only using SSL and a server that needs to be at least a tiny bit accessible. But that said, unless you have a lot of people actively attacking you I think it’s more than adequate. I mean you can encrypt the files so that even a server breach probably wouldn’t be the end of the world... again, unless you are doing some crazy shit and people are dead set on getting your photos haha. In which case you should probably be encrypting them to an archive on a thumb drive, inside a balloon and inserted deep inside.... ;P
-
@linuxxx so does the Nextcloud app over ssl not meet the requirements?
-
@marcom beat me to it haha
-
Another option, Nextcloud is a pretty slick way to roll your own Dropbox-like system. The mobile apps have a specific option to keep photos synced too. I’m still on owncloud personally, but nextcloud was an OC project split that is more in line with software freedom and the open source ideals. Technically OC is Open Source, but if you’re starting from scratch go with Nextcloud! I’m gonna convert to NC as soon as I have time.
-
Android? Rooted? Is scp or rsync over ssh an option? On iOS Pythonista seems neat for using python scripting in some basic ways on a non jailbroken phone. I’m guessing you’re an Android guy though.
-
@Charon92 okcupid was an amazing site back when I was dating too... it’s one of those sites that is so good you almost hate to stop being active in it when you find a significant other lol
-
@MisterArie haha I love that idea! Gotta stay pragmatic!
-
@Linux maybe privacy as in the dating site isn’t just another ruse to collect and sell its user’s information to advertisers. I dunno, just guessing here really.
-
Why is PHP such a faux pas? It’s actually evolved quite nicely over the years.... but meh. Doesn’t really matter much I guess.
Also, how would the project handle the issue of like a 1:25 female to male ratio? That seems like an elephant in the room for a dev dating site, doesn’t it?
I’m not single, but I get the allure or wanting to date someone like minded; someone you might even be able to do projects together with as well as date and be best friends... but just wondering if there are any ideas on the gender disparity? -
@Jop- it’s about trust... do you trust the encryption app that turns off encryption by default at the behest of the US government, and which almost every person who is considered an expert in the field warns about? Or do you make an effort to try and find something a little more worthy of trust? Either decision is fine if you make an educated choice, but it seems ignorant to knock the apps that do, what almost every professional in the field considers to be, the right things. Yet you favor the app that those same people in the field warn against... why? You come here with no more valid reasoning than you demand of everyone else. Encryption is a very complicated thing, just having it is not enough. A company making app must adhere to a certain degree of openness, they must do things to show that they have no ulterior motives and instill trust, and more... but Telegram fails on most all these fronts.
-
@brunofontes you'll often notice this happens to 'new hires'. The real issue is that it's incredibly unlikely that anyone will have the same workflow and habbits as the team where they start working. And the people who are experienced devs tend to have animosity for all new hires! They show them just the right things to be dangerous, make them feel like dumbasses if they don't know every technology and tool the dept uses... Then they deviously wait for the setup to play out where the new hire inevitably gets overwhelmed, feels too ashamed to ask the unforgiving assholes for help, and then screws something up. It's all as planned! Only thing left is to make a huge fuss about what a moron this new person is because they didn't know specific methods and workflows that this team has slowly developed and evolved to do over years. I've seen it over and over again. Just be a nice person and take the new people under your wing, it doesn't devalue you, it actually helps everyone look better!
-
@DLMousey I'm with you, it must be one of those mind games teachers sometimes do where they know 90% of the class will flounder but one or two people will get it. I would make two website's using threeJS haha
-
@linuxxx you are right! I use the term encrypt too broadly, because where metadata can be deduced (via packet timing analysis schemes, for one example) encryption isn’t the only issue, but for these cases there are usually well known methods to obfuscate and/or make metadata very hard to come by. I haven’t analyzed the app in question, so I just assumed you meant the dumb sort of metadata leakage where they weren’t really even trying (I could be wrong). My comments are just in general though, and not specific to this or any application. But to be clear, metadata should always be handled properly (if not of the encrypt-able sort) and made to be something one must work unreasonably hard for to get even the smallest of crumbs - if the application is to call itself secure. These are tough goals for any one application to meet, which is further reason open source is so critical here... afaik, only open tools can function together efficiently enough to give this ultimate end result.
-
@linuxxx I’d say the metadata issue is more than just ‘not good/great’; it is a potential DISASTER for anyone expecting privacy!
If you look at much of the leaked data from Snowden and others, metadata is often all they care about. Just knowing you are talking to someone, regardless of the actual conversation or data, is often enough. The metadata is enough to get people killed in some places, and in other scenarios it can be disastrous as accusers can craft a narrative. Imagine being in front of a jury in a court room, if they can prove that you talked to some person it could arguably be better to have zero encryption rather than to be leaking metadata that leaves an open ended narrative to the imaginations of third parties. It’s all solid advice/comments you gave @linuxxx, I just wanted to elaborate on the often overlooked metadata issue. I give props to you for mentioning it!
Any system that doesn’t encrypt metadata is a broken system if the goal is end to end privacy. -
Good rule of thumb... if the encryption/privacy mechanism is proprietary and closed source you should not trust it! No exceptions.
The best practice is to just support open source software whenever possible, but really this ‘rule of thumb’ doesn’t mean that no proprietary software should exist for profit; it just meant a that if it is proprietary, but wants to be trustworthy, then at the least, it’s encryption and transport routines must be open source code that’s implemented in a verifiable way that leaves no doubts or blurry areas in its function (there are usually ways integrate open source within a proprietary model).
Open source practices and ideologies must be the future if we want to have a truly free and open society where privacy exists in any meaningful way. -
I recently got a decent basic end to end network tester with a crimper and a bunch of connectors for like 10 bucks shipped on banggood.com. You could see if they still have that deal. It's not the highest end stuff but it's well worth 10USD just to be able to test lan connections thru walls or just test cables, and then repair instead of buying replacements! You might have that stuff already, but if not it's a good deal! :)
-
@agaskins and sorry to pick on Linux... I use it almost exclusively, I'm not in any way bashing it! I just feel that it sometimes blows people's egos and confidence up to unrealistic levels... Which causes these problems with people not knowing what common names in SSL are, or setting up DNS servers when all they needed was the dig command, or leaving email servers as open relays... That said, I'm glad it becoming more mainstream, and I suppose it's better to deal with these problems people create than to not have people pushing themselves... Or is it? Does it just devalue us? Making it seem as though everyone is an expert makes us less valuable in the market... But maybe the market isn't the most important thing. I like the idea of an OpenSource community as a concept and basis for most of society... It just seems people need more wisdom in knowing the extents of their skills and when to ask the community for help rather than giving someone an SSL cert that is borked.
-
@deMark exactly... There seems to be an endless supply of people who think that because they can use Linux somewhat fluently they know how to be a system admin. SSL, DNS and email systems are just a few of the things that very often trip up these people who consider themselves 'system admins' just because they can cat or tail -f some log files and pipe ps aux thru grep... I don't like to knock anyone for trying, but there's a huge disconnect between reality and abilities. I saw a guy on reddit recently asking how he could find a job using Arch Linux because he 'recently installed it and loves using it'.... Running a desktop Linux system is great, and I love Arch, but it's just insane that someone can make the jump from 'i enjoy this desktop Linux system' to 'since I can use said Linux desktop system I must be ready for a system administrator career'... How does one believe they are valuable to society just because they can use an OS? Kind of a side rant there, sorry haha
-
@Flygger it's not a client app... Just basic fundamentals of setting up SSL.
-
@electrineer but if person() doesn't have some code to rate limit input then it cannot accurately determine 'full' levels. Also person() must have a subroutine to differentiate between hungar and dehydration, since mild dehydration can feel like hungar. I suppose you could use last_input.time(food) and last_input.time(hydro) to deduce that...
-
@sheepz toxic? How so? I've asked a couple questions, answered a couple, and read hundreds... If not thousands. There are occasional assholes, but even the assholes are usually saying something constructive on there (just saying it like an asshole). The only justified excuse I ever see for bashing SO is the failure of people to mark questions answered. That is a breakdown of the system in an ideological way, but not in a practical way, as even then there are usually clear answers posted (the op was just too lazy to pick one). Then there's the occasional op that replies with 'oh that didn't work but I figured it out, thanks anyways'. Those people deserve something mildly painful! but really I see SO as a mostly positive source of knowledge... It doesn't always have text book perfect answers, but it's helped me many times over the years with obscure issues. I only feel guilty that I haven't contributed nearly as much as I've been assisted by it. Why is everyone so harsh on SO!?
-
@electrineer one problem is that feeling hungry and thirsty are similar and most people don't even realize that they're often just dehydrated when we feel hungry... That and when we do eat we eat until were full usually, but as food breaks down it expands in our gut, so if you eat fast you will always overeat if you eat til full. I think if you refactor with these points in mind you'll have a pattern I would put on my wetware ;)
-
I use a program that generates random, but easy to pronounce, passwords. Then I substitute some special characters, numbers etc. It's very easy to remember and extremely difficult to bruteforce. Dictionary attacks are pretty useless against it. Although I still consider this my general purpose password method. For important and critical things I have a more rigorous system.