Software developer interested into security and sustainability.
- 0 Posts
- 45 Comments
ClemaX@lemm.eeto
Selfhosted@lemmy.world•That's all folks, Plex is starting to charge for sharingEnglish
34·10 months agoFuck them, glad I switched to Jellyfin years ago.
ClemaX@lemm.eeto
Sysadmin@lemmy.world•TLS Certificate Lifetimes Will Officially Reduce to 47 Days (in 2029)
6·11 months agoTrue. Technically the bounds for the validity period are from Jan 1, 1950 to Dec 31, 9999.
ClemaX@lemm.eeto
Technology@lemmy.world•Google To Subscribe To Your Emails To Find Content For Your Search Listings.English
61·11 months agoWould you provide a free mail service?
Eval is bad for security boundaries and the string based approach is a pain to develop and maintain. An alternative that is equally bad for security but better for development would be dynamic imports using importlib.
If you want to support custom scripts while enforcing security boundaries, you could use an embeddable interpreter like lua, or create your own.
ClemaX@lemm.eeto
Showerthoughts@lemmy.world•X88B88 is the word "voodoo" with a reflection.
10·1 year agoE8XIB¹⁹
It all makes sense when you think about the way it will be parsed. I prefer to use newlines instead of semicolons to show the blocks more clearly.
for file in *.txt do cat "$file" doneThe
doanddoneserve as the loop block delimiters. Such as{and}in many other languages. The shell parser couldn’t know where stuff starts/ends.Edit: I agree that the
then/fi,do/donecase/esacare very inconsistent.Also to fail early and raise errors on uninitialized variables, I recommend to add this to the beginning of your bash scripts:
set -euo pipefailOr only this for regular sh scripts:
set -eu-e: Exit on error-u: Error on access to undefined variable-o pipefail: Abort pipeline early if any part of it fails.There is also
-xthat can be very useful for debugging as it shows a trace of every command and result as it is executed.
ClemaX@lemm.eeto
No Stupid Questions@lemmy.world•Are there any programming languages with the same syntax as rust (or similar)?
2·1 year agoRust is special regarding references but Kotlin reads similarly.
ClemaX@lemm.eeto
Programming@programming.dev•Firebase alternative recommendation based on your experience?
2·1 year agoWhat are you missing on Firebase?
This + node_exporter.
ClemaX@lemm.eeto
Technology@lemmy.world•O2 deploys AI granny against scammers • The RegisterEnglish
3·1 year agoAh least they would need to know it first.
I don’t think that browsers do that. There is HSTS but I think that it only checks if the connection is using TLS.
ClemaX@lemm.eeto
Showerthoughts@lemmy.world•Both Whataboutism and the accusation of it are used for Burying.
5·2 years agoIf i understand correctly, whataboutism is used to burry a statement without any solid counter-argument. The accusation of it burries the whataboutism’s argument, which could be valid nonetheless.
ClemaX@lemm.eeto
Technology@lemmy.world•Apple plans to charge fees for sideloadingEnglish
15·2 years agoBut the article of the DMA says that the gatekeeper shall not prevent the business user to serve their product using other conditions than those of the gatekeeper’s platform. I think that would include Apple’s publishing guidelines.
I do not have a lot of experience with commerce but you’re supposed to optimize the customer experience. If the customer needs an account to add something to the cart, he might abandon his purchase during the account creation process.
Only some percentage of all potential users will abandon the purchase due to something like this, but your goal is to reduce this percentage as much as possible.
That’s why analytics are used to understand which environment leads to the most purchases and prevent users from abandoning the process.
Then it may be a token stealer.
If your account is linked to your Google, Apple or Facebook account that might be the culprit (I think you can see this in yout account settings). You need to check that because the consequences could be way worse than just having access to your Spotify account. You can use HaveIBeenPwned to look for leaks matching your e-mail address or password.
Another possibility is that your browser/OS or spotify client was infected by a token stealer which can automatically steal your access tokens as you log-in after changing the password.
ClemaX@lemm.eeto
Technology@lemmy.world•Just about every Windows and Linux device vulnerable to new LogoFAIL firmware attackEnglish
6·2 years agoDue to Secure Boot (if it actually enabled since there are some bogous implementations) this can be prevented. If I understand it correctly, LogoFAIL bypasses this security measure and enables loading unsigned code.



It is an issue in a managed environment such as on corporation or school PCs.