• 6 Posts
  • 137 Comments
Joined 3 years ago
cake
Cake day: December 20th, 2021

help-circle
  • This breach is worse than just a website’s database being leaked. These are info-stealer malware logs. Meaning that you had malware on one of your devices that recorded you typing your credentials into websites and then the logs of that malware were publicly leaked.

    Before changing all of your passwords (and setting up a password manager if you don’t already use one) you need to identify which of your devices was compromised and wipe it.

    If you change all your passwords from the compromised device then the malware will just record all of your new passwords.





  • For Xitter, BlueSky is drop-in replacement

    You’re posting this on the Fediverse and still recommending centralized corporate social media? We can do better than make the same mistakes again and again.

    Try Mastodon as a Xitter replacement.

    Friendica as a Facebook replacement.

    And if you’re able and have transport, support your local businesses by buying products locally (especially independently owned stores), instead of ordering from Amazon.











  • The article seems like a rebuttal to a strawman argument to me.

    You’d have to be pretty oblivious (or a non-software engineer) to express the premise of this article as an opinion.

    The only interesting part to me was asking specifically what types of functionality are being delegated to libraries instead of (re-)implemented in the program itself. The author should ask this same question of some Rust and Javascript programs of similar size, so we can see if left-pad in Javascript is just a meme or if programmers armed with convenient package managers are delegating trivial one-liners to external libraries.