cyrano

joined 2 years ago
MODERATOR OF
[–] cyrano 6 points 3 weeks ago

It doesn’t look like satire unfortunately

[–] cyrano 20 points 3 weeks ago* (last edited 3 weeks ago)

Exactly, if you read their twitter thread, they are learning about git, data segregation, etc.

The same article could have been written 20 years ago about someone doing shit stuff via excel macro when a lot of stuff were excel centric.

[–] cyrano 20 points 3 weeks ago (1 children)

User used the same db for prod and dev, user has no backup, LLM with db access is deleting it, user interacts with the LLM like it’s a human and ask it to apologize and follow promises of not doing it…… Oh and user doesn’t use git or any code linting/control.

But yeah it is the llm fault /s What is scary is this is the tip of the iceberg. I foresee a lot of security problems in the future if software development goes that way.

[–] cyrano 6 points 3 weeks ago (3 children)

He had one db for prod and dev, no backup, llm went in override mode and delete it dev db as it is developing but oops that is the prod db. And oops o backup.

Yeah it is the llm and replit’s faults. /s

[–] cyrano 42 points 3 weeks ago* (last edited 3 weeks ago) (4 children)

Title should be “user give database prod access to a llm which deleted the db, user did not have any backup and used the same db for prod and dev”. Less sexy and less llm fault. This is weird it’s like the last 50 years of software development principles are being ignored.

[–] cyrano 11 points 3 weeks ago (2 children)

Yeah the interaction are pure waste of time I agree, make it write an apology letter? WTF! For me it looks like a fast track way to learn environment segregation, & secret segregation. Data is lost, learn from it and there are tool already in place like git like alembic for proper development.

[–] cyrano 5 points 3 weeks ago
[–] cyrano 5 points 3 weeks ago

I see, DIY fire sprinklers.

[–] cyrano 5 points 3 weeks ago
[–] cyrano 1 points 3 weeks ago* (last edited 3 weeks ago)
[–] cyrano 3 points 3 weeks ago (2 children)

And bottle of water on top of the racks… scary

[–] cyrano 3 points 3 weeks ago

Really cool

 

cross-posted from: https://lemmy.zip/post/34733394

Snac (AKA Snac2) is a minimal microblogging ActivityPub instance written in C.

Features (from its Codeberg repo):

  • Lightweight, minimal dependencies
  • Extensive support of ActivityPub operations, e.g. write public notes, follow users, be followed, reply to the notes of others, admire wonderful content (like or boost), write private messages...
  • Multiuser
  • Mastodon API support, so Mastodon-compatible apps can be used
  • Simple but effective web interface
  • Easily-accessed MUTE button to silence morons
  • Tested interoperability with related software
  • No database needed
  • Totally JavaScript-free
  • No cookies either
  • Not much bullshit
40
ShlinkedIn.com (www.shlinkedin.com)
submitted 4 months ago by cyrano to c/[email protected]
 

cross-posted from: https://lemmings.world/post/23133390

(I am not affiliated with this project, just got to know about this. I am not advertising it (although there is no paid product here fot anyone to buy))

taken from the about page -

AN ALL-IN-ONE SATIRE SOLUTION Be a Thought Leader. ShlinkedIn is an open source social network where you can be anyone or anything. Rise the ranks from unpaid intern to Thought Leader and spread your business insights.

User comments -

I love making fun of this God-forsaker social media network, but @ShlinkedIn takes it a gigantic step further. Introducing a fully functioning satirical social netuork @shlinkedin.con/generator Big names on the platform already include Beff Jezos, Tony Stark and Got

Five seconds on LinkedIn and I want to escape back to @ShlinkedIn https://t.co/yaBRIsKYIN

A new kind of social media User generated ads. FauxNews. Next generation AI. Business Jabs. An entire economy consisting of "ShlinkPoints". Name a buzzword, and we built it.

Create an alter ego Sick of being you? On ShlinkedIn, you are a Titan of Industry. A marketeur. Create a persona and corner the market.

Be whomever you want to be.

Create an alter ego and that best represents you and your business interests. Reward your colleagues with endorsements.

Keep your friends close, but your colleagues semi-close. Reward your coworkers with endorsements and ShlinkPoints. And Business Jab those who betray you.

Grab some corporate revenge by "business jabbing". We don't know what that button does, but it's there if you need it.

Make your own ads Hate targeted ads? On ShlinkedIn, all ads are user generated, and you can buy (or "sue") at the touch of a button.

Create Clickbait Tired of reading clickbait? Try creating clickbait. Get ShlinkPoints for every upvote.

Join a group Mingle with other philanthropists, poets, and supernatural beings. Or, start your own group — anything is possible.

301
submitted 4 months ago* (last edited 4 months ago) by cyrano to c/[email protected]
 
159
calibre 8.0 (calibre-ebook.com)
submitted 4 months ago by cyrano to c/[email protected]
 
 
 

cross-posted from: https://sopuli.xyz/post/24135233

Mirror

Translation:

I just spoke with President Macron, with Emmanuel. We communicate very often, about once a day, I’d say. On average, really, our countries have very close relations. He provides a lot of help, and I’m grateful to him for that. After our conversation, I’ll call him back.

https://t.me/RBC_ua_news/135142

 

Cook also said that issues around the Cybertruck and other new car designs come about because the Federal Motor Vehicle Safety Standards “under-specifies” safety standards for vehicle entry (commonly described in car engineering as ingress) and exit (egress). These standards should in theory minimize the risk of injury in both normal and emergency conditions by defining the highest possible level of safety design of the door, the step height, the quality of the door grab handles, visibility, and emergency exits. 

“Combined with the ‘self-certification’ contract that exists between US auto regulators and manufacturers, it is effectively left up to Tesla to design their door actuation systems and any emergency-access systems related to that,” Cook said.

 

cross-posted from: https://lemmy.dbzer0.com/post/40330928

Hey peeps, the well-known spam problem in lemmy DMs is getting slightly worse, and the spammer in question is evolving their tactics to evade the very rudimentary options we have built-in to lemmy itself (or should I just call it,non-existent?). To get ahead of this, we deployed a DM-scanner directly in the DB, based off of this code but adjusted so that it's more difficult to pull off shenanigans.

At the moment we're only deleting messages based on the "fediverse chick" spam. However I want to point out that if for some reason you legitimately DM someone on dbzer0 with similar terms, you DM might get deleted, so do be aware about that. Them's the breaks.

Unfortunately I can't reveal the exact code I'm using atm, as this can lead to the spammer adjusting their tactics to evade it. However I plan to adjust threativore to also be able to manage your DB anti-DM-spam filters in the future, to make it much easier to handle this, even if you don't feel confident touching your DB. Stay tuned.

I do hope we get more robust anti-spam tech in lemmy and I did open two issues about this, but it seems this is not a prio atm.

If you realize that the anti-spam ate a DM. Do let us know. If you see spam getting through, also let us know.

 

cross-posted from: https://lemmy.today/post/25826615

For those not familiar, there are numerous messages containing images being repeatedly spammed to many Threadiverse users talking about a Polish girl named "Nicole". This has been ongoing for some time now.

Lemmy permits external inline image references to be embedded in messages. This means that if a unique image URL or set of image URLs are sent to each user, it's possible to log the IP addresses that fetch these images; by analyzing the log, one can determine the IP address that a user has.

In some earlier discussion, someone had claimed that local lemmy instances cache these on their local pict-rs instance and rewrite messages to reference the local image.

It does appear that there is a closed issue on the lemmy issue tracker referencing such a deanonymization attack:

https://github.com/LemmyNet/lemmy/issues/1036

I had not looked into these earlier, but it looks like such rewriting and caching intending to avoid this attack is not occurring, at least on my home instance. I hadn't looked until the most-recent message, but the image embedded here is indeed remote:

https://lemmy.doesnotexist.club/pictrs/image/323899d9-79dd-4670-8cf9-f6d008c37e79.png

I haven't stored and looked through a list of these, but as I recall, the user sending them is bouncing around different instances. They certainly are not using the same hostname for their lemmy instance as the pict-rs instance; this message was sent from nicole92 on lemmy.latinlok.com, though the image is hosted on lemmy.doesnotexist.club. I don't know whether they are moving around where the pict-rs instance is located from message to message. If not, it might be possible to block the pict-rs instance in your browser. That will only be a temporary fix, since I see no reason that they couldn't also be moving the hostname on the pict-rs instance.

Another mitigation would be to route one's client software or browser through a VPN.

I don't know if there are admins working on addressing the issue; I'd assume so, but I wanted to at least mention that there might be privacy implications to other users.

In any event, regardless of whether the "Nicole" spammer is aiming to deanonymize users, as things stand, it does appear that someone could do so.

My own take is that the best fix here on the lemmy-and-other-Threadiverse-software-side would be to disable inline images in messages. Someone who wants to reference an image can always link to an external image in a messages, and permit a user to click through. But if remote inline image references can be used, there's no great way to prevent a user's IP address from being exposed.

If anyone has other suggestions to mitigate this (maybe a Greasemonkey snippet to require a click to load inline images as a patch for the lemmy Web UI?), I'm all ears.

 

cross-posted from: https://lemmy.dbzer0.com/post/40214971

Docs is the result of a joint effort lead by the French 🇫🇷🥖(DINUM) and German 🇩🇪🥨 governments (ZenDiS). We are always looking for new public partners (we are currently onboarding the Netherlands 🇳🇱🧀). Feel free to reach out if you are interested in using or contributing to docs.

 

Docs is the result of a joint effort lead by the French 🇫🇷🥖(DINUM) and German 🇩🇪🥨 governments (ZenDiS). We are always looking for new public partners (we are currently onboarding the Netherlands 🇳🇱🧀). Feel free to reach out if you are interested in using or contributing to docs.

view more: ‹ prev next ›