HiddenLayer555

joined 2 months ago
[–] [email protected] 24 points 1 week ago* (last edited 1 week ago) (1 children)

"Bro full self driving is 5 years away bro trust me bro"

[–] [email protected] 44 points 1 week ago* (last edited 1 week ago) (2 children)

And as always, the majority response to this will absolutely be something along the lines of "I support writers but you can fuck right off if you expect me to inconvenience myself in the slightest most superficial way in solidarity with you because actually having to modify my behavior in the simplest way is where I draw the line."

[–] [email protected] 15 points 1 week ago

Trusting your security to Google is literally like trusting a fox to guard your hen house.

[–] [email protected] 7 points 1 week ago* (last edited 1 week ago)

Trade Offer

(From literally every goddamn AAA game studio)

You receive:

  • A pre-pre-alpha build of our game, literally the first fucking build that compiles

We receive:

  • Your money at the price of a full retail game
  • Your alpha testing data, but we never actually finish the game because we already have your money so go fuck yourself
[–] [email protected] 3 points 1 week ago

Especially ironic considering they were horribly unreliable for long term data storage

[–] [email protected] 22 points 2 weeks ago (1 children)

This video from a security researcher says that pretty much every software that uses WebP was affected though, and once the issue was discovered, Google made commits in their own codebase to "fix" it. Which suggests it's an issue with the upstream source code that Google provided to everyone else.

 

Think about it. It was released (read: forcibly shoved down our throats) by Google and came out of nowhere when there were zero problems with the decades old and extremely well researched incumbent image/video formats that the web was already using (i.e. jpg, png, gif, mp4, etc). Google has confirmed ties to the US three-letter agencies through PRISM, as well as AFAIK all but confirmed ties to the Israeli government. BlastPass was reportedly apart of Israel's Pegasus hacking suite for years before the vulnerability went public, and was actively exploited by Israel to track down political dissidents. It's also the worst type of vulnerability there is, a buffer overflow resulting in arbitrary code execution, meaning once you exploit it you can do literally anything to the target device, from an image format, the type of file most people would never suspect to be capable of doing that (and indeed most developers never suspected that either, considering how everyone from Mozilla to Apple seemingly just took Google source code and incorporated it into their own software, no questions asked).

Maybe I'm just overly cynical, but I'm having a really hard time believing that such a critical vulnerability in such a widespread code base would be accidental, especially in the age of automated testing, fuzzing, and when the industry generally has a very good understanding of how to prevent memory vulnerabilities. The vulnerability was there since they very beginning of the standard and we're to believe one of the largest software companies simply failed to spot it for years? I don't think Hanlon's Razor should apply to companies like Google because they have a long and shameless pattern of malice and have long exhausted their benefit of the doubt.

I have a sneaking suspicion that WebP was planned as a Trojan horse from the start to backdoor as much software as possible, and Google sold the exploit to the US and Israel govts. Why else would Google so relentlessly push an image format of all things unless there was some covert benefit to themselves? (An image format that's not even patented/licensed mind you so they're definitely not making money that way.)

What do you think?

[–] [email protected] 76 points 3 weeks ago (13 children)

Easiest way to do this: Turn the modem off after bed time (you will also lose internet)

Most expensive but still easy way to do this: Buy a "smart router" with time-based parental controls (lets you use the internet at night).

Nerd way to do this: Pihole with a script that enables and disables certain blocklists at certain times (free and open source, because fuck "smart" products)

[–] [email protected] 3 points 1 month ago* (last edited 1 month ago)

Honestly it wouldn't even be that hard to release full translated versions of existing programming languages. Like Python in Punjabi or Kotlin in Chinese or something (both of which already support unicode variable/class/function names). Just have a lookup table to redefine each keyword and standard library name to one in that language, it can literally just be an additional translation layer above the compiler/interpreter that converts the code to the original English version.

It's honestly really surprising that non-English speakers have developed entirely new programming languages in their own language (unfortunately none of which are getting very widespread use even among speakers of that language), but the practice of simply translating a widely used and industry standard English programming language doesn't seem to be much of a thing.

If I ever make my own programming language, I'm probably going to bake multi-language support into the compiler. Just supply it with a lookup table of translated terms and the code in that language.

[–] [email protected] 11 points 1 month ago

Because it supports Unicode as variable/class/function names and Unicode includes all the characters humans have ever used, even dead languages (I assume for historians to digitize ancient texts?)

[–] [email protected] 17 points 1 month ago (3 children)

Also isn't English the only European language not to call Pineapples some variation of "ananas"?

view more: next ›