carrylex

joined 11 months ago
[–] carrylex@lemmy.world 8 points 1 week ago (1 children)

No need to do that, you can simply scroll down to the footer and find the current version there ;)

[–] carrylex@lemmy.world 3 points 1 week ago (2 children)

With F-droid you trust F-droid to build the binary from the developers' source code

Not when using a self-hosted F-Droid Repo - which is the case for Ironfox.

[–] carrylex@lemmy.world 19 points 1 month ago

saying there are unspecified "known vulnerabilities" within Signal

His source: Trust me bro

[–] carrylex@lemmy.world 4 points 1 month ago (1 children)
[–] carrylex@lemmy.world 3 points 2 months ago

Yeah but have you ever tried to install it directly?

There is stuff like notarization that's literally designed in a way that only Apple approved software can be run on your machine.

[–] carrylex@lemmy.world 3 points 2 months ago (1 children)
 
 

Also: Did you know that the Higgs-Bugson is a subspecies of the Heisenbug?

[–] carrylex@lemmy.world 8 points 4 months ago

Short answer: Google Play

Long answer: Google Play and/or people with special requests like https://lemmy.ml/post/12332630

 
13
PS/2 things (lemmy.world)
submitted 5 months ago* (last edited 5 months ago) by carrylex@lemmy.world to c/programmer_humor@programming.dev
 

In todays edition of "stuff that I found in my storage" a PS/2 meme

Image transcription:

mov rax, rbx add rax, rcx HELLO IT'S THE KEYBOARD I HAVE AN IMPORTANT MESSAGE E

708
Packet Loss (lemmy.world)
submitted 5 months ago* (last edited 5 months ago) by carrylex@lemmy.world to c/programmer_humor@programming.dev
 

Found this in the depths of my storage. Not sure where its from but might improve the day of some people ^^

 
 

Still waiting for end to end encryption...

 

Source

Wisdom of the day:

  • Give your buildserver enough disk space
  • Don't underestimate compressed stuff
[–] carrylex@lemmy.world 15 points 8 months ago (3 children)

I also want to highlight Florida - which has around 10 different electric grids...

 

Template

Source - The colors of the grids represent CO2 emissions

The title is a reference to the 2021 Texas power crisis

[–] carrylex@lemmy.world 9 points 8 months ago* (last edited 8 months ago) (5 children)

Well from my personal PoV there are a few problems with that

  1. You can't detect all credentials reliably, they could be encoded in base64 for example
  2. I think it's kind of okay to commit credentials and configuration used for the local dev environment (and ONLY the local one). E.g. when you require some infrastructure like a database inside a container for your app. Not every dev wants to manually set a few dozen configuration entries when they quickly want to checkout and run the app
[–] carrylex@lemmy.world 47 points 8 months ago* (last edited 8 months ago) (7 children)

I also personally ask myself how a PyPI Admin & Director of Infrastructure can miss out on so many basic coding and security relevant aspects:

  • Hardcoding credentials and not using dedicated secret files, environment variable or other secret stores
  • For any source that you compile you have to assume that - in one way or another - it ends up in the final artifact - Apparently this was not fully understood (".pyc files containing the compiled bytecode weren't considered")
  • Not using a isolated build process e.g. a CI with an isolated VM or a container - This will inevitable lead to "works on my machine" scenarios
  • Needing the built artifact (containerimage) only locally but pushing it into a publicly available registry
  • Using a access token that has full admin permissions for everything, despite only requiring it to bypass rate limits
  • Apparently using a single access token for everything
    • When you use Git locally and want to push to GitHub you need an access token. The fact that article says "the one and only GitHub access token related to my account" likely indicates that this token was at least also used for this
  • One of the takeaways of the article says "set aggressive expiration dates for API tokens" - This won't help much if you don't understand how to handle them properly in the first place. An attacker can still use them before they expire or simply extract updated tokens from newer artifacts.

On the other hand what went well:

  • When this was reported it was reacted upon within a few minutes
  • Some of my above points of criticism now appear to be taken into account ("Takeaways")
 

One does not commit or compile credentials

Template

Context:

This meme was brought to you by the PyPI Director of Infrastructure who accidentally hardcoded credentials - which could have resulted in compromissing the entire core Python ecosystem.

[–] carrylex@lemmy.world 3 points 8 months ago* (last edited 8 months ago)

Just for further clarification, the API works like this:

  • time is the local (client) time (in this case UTC-7)
  • servertimezone is the time zone where the server is located
  • timezoneoffset is the offset of the local time relative to the servertimezone (offset from the servers PoV)

To get the UTC date you have to do something like this:

time.minusHours(timezoneoffset).atZone(servertimezone).toUTC()
[–] carrylex@lemmy.world 5 points 8 months ago (3 children)

Well if it's a 32bit timestamp you're screwed after 19 January 2038 (at 03:14:07 UTC)

 

Template

Further reading: RFC 3339 / ISO 8601

view more: next ›