

I once saw an application that would encrypt (not hash, encrypt) passwords but then when a user was logging in, they’d encrypt the password candidate and then compare the cipher texts to see if they were the same. This was using 3des, so no IV.


I once saw an application that would encrypt (not hash, encrypt) passwords but then when a user was logging in, they’d encrypt the password candidate and then compare the cipher texts to see if they were the same. This was using 3des, so no IV.
I just recently joined a company that offers two options for operating systems, Mac or Linux. Windows is explicitly not allowed. Seeing that in my onboarding paperwork was like walking into a warm sunny meadow.


There’s a great interview somewhere with the writers of one of these shows talking about how they knew this was shit and they had unofficial competitions with other shows to constantly one up each other on the stupidity.


It’s for sure becoming a huge topic. And now companies are wanting to add llm agents integrated more tightly into development workflows and build processes.


I’m not really familiar with meshtastic, but this caught my eye on all because I live in SLO county. Looks really cool. I’ll have to dig deeper.


This show was the shit when I was a kid!
When I was in university, I learned that I made more money as a level one support guy at the tiny MSP I worked at than my professor who had multiple awards, papers, patents, and was also some kind of bouldering champion apparently. He was an awesome person and a firm lesson that the amount of money one makes should never be used to measure the worth of a person. Also that teachers need to be paid like, a hell of a lot more.
Actually that reminds me of another guy I know. I spent a few years working at a GameStop and my store managers dream was to be a history teacher but he would have had to take a significant paycut in addition to getting a lot more schooling and certifications. Last time I ran into him though he told me he’d done it and I’ve never seen him happier.


I’ve already seen the taking point showing up on the right that the “… and domestic” part applies to the “antifa terrorists turning our cities into war zones and besieging federal (especially ICE) buildings.”


I’ve got one of these and it’s super easy and convenient. https://wandp.com/products/the-popper-microwave-popcorn-popper
Just drop in some loose kernels and microwave.
I also cook on the stove top with a large pan, it’s not hard at all.


Supply side Jesus, but unironically.
Comment section under every post in the god forsaken place formerly known as Twitter.



“Oh but it’s not going to effect them at all because you see, they’re using absentee ballots which are a totally different and completely secure thing.”
Actual talking point I’ve seen floating around already.
It’s pretty hard to overstate just how many addresses are in the ipv6 address space vs ipv4.
One of my favorite descriptions comes from Beej’s guide to network programming, something I first read probably in the early to mid 2000s. https://beej.us/guide/bgnet/html/#ip-addresses-versions-4-and-6
3.1 IP Addresses, versions 4 and 6 In the good old days back when Ben Kenobi was still called Obi Wan Kenobi, there was a wonderful network routing system called The Internet Protocol Version 4, also called IPv4. It had addresses made up of four bytes (A.K.A. four “octets”), and was commonly written in “dots and numbers” form, like so: 192.0.2.111.
You’ve probably seen it around.
In fact, as of this writing, virtually every site on the Internet uses IPv4.
Everyone, including Obi Wan, was happy. Things were great, until some naysayer by the name of Vint Cerf warned everyone that we were about to run out of IPv4 addresses!
(Besides warning everyone of the Coming IPv4 Apocalypse Of Doom And Gloom, Vint Cerf14 is also well-known for being The Father Of The Internet. So I really am in no position to second-guess his judgment.)
Run out of addresses? How could this be? I mean, there are like billions of IP addresses in a 32-bit IPv4 address. Do we really have billions of computers out there?
Yes.
Also, in the beginning, when there were only a few computers and everyone thought a billion was an impossibly large number, some big organizations were generously allocated millions of IP addresses for their own use. (Such as Xerox, MIT, Ford, HP, IBM, GE, AT&T, and some little company called Apple, to name a few.)
In fact, if it weren’t for several stopgap measures, we would have run out a long time ago.
But now we’re living in an era where we’re talking about every human having an IP address, every computer, every calculator, every phone, every parking meter, and (why not) every puppy dog, as well.
And so, IPv6 was born. Since Vint Cerf is probably immortal (even if his physical form should pass on, heaven forbid, he is probably already existing as some kind of hyper-intelligent ELIZA15 program out in the depths of the Internet2), no one wants to have to hear him say again “I told you so” if we don’t have enough addresses in the next version of the Internet Protocol.
What does this suggest to you?
That we need a lot more addresses. That we need not just twice as many addresses, not a billion times as many, not a thousand trillion times as many, but 79 MILLION BILLION TRILLION times as many possible addresses! That’ll show ’em!
You’re saying, “Beej, is that true? I have every reason to disbelieve large numbers.” Well, the difference between 32 bits and 128 bits might not sound like a lot; it’s only 96 more bits, right? But remember, we’re talking powers here: 32 bits represents some 4 billion numbers (232), while 128 bits represents about 340 trillion trillion trillion numbers (for real, 2128). That’s like a million IPv4 Internets for every single star in the Universe.


You’ve probably seen this already, but for those that haven’t, this is a great video on this particular fact.
My friends Dad had this game back when I was a youngster. For the longest time we thought the trivia was the game.


My favorite one I’ve seen so far was “AI can take a junior programmer and make them a 10x junior programmer.”


https://www.courthousenews.com/wp-content/uploads/2025/07/mangione-hippa-defense-filing.pdf
This just dropped a couple of days ago, there was some news about it.
In brief, Mangione’s lawyers are accusing the prosecution of falsifying a subpoena to Aetna to get protected health records about Mangione, which they received and at least partially reviewed.


Jfc, you weren’t kidding. Found some absolute gems in there.




At my grandmother’s house, it was Babes in Toyland. No it’s not a porn. https://m.imdb.com/title/tt0090683/
There are a couple that come to mind.
Definitely the worst, a C# .net mvc application with multiple controllers that were 10s of thousands of lines long. I ran sonarqube on this at one point and it reported over 70% code duplication.
This code base actively ignored features in the framework that would have made things easier and instead opted to do things in ways that were both worse, and harder to do. For example, all SQL queries were done using antiquated methods that, as an added benefit, also made them all injectable.
Reading the code itself was like looking at old school PHP, but c#. I know that statement probably doesn’t make sense, but neither did the code.
Lastly, there was no auth on any of the endpoints. None. There was a login, but you could supply whatever data you wanted on any call and the system would just accept it.
At the time I was running an internal penetration test team and this app was from a recent acquisition. After two weeks I had to tell my team to stop testing so we could just write up what we had already and schedule another test a couple months down the line.