[-] Dogeek@sh.itjust.works 49 points 9 months ago

They get hated on because :

  • they inspect packets. They terminate the TLS sessions at their servers and reencrypt to forward to the backend. This allows them to analyze the data to spot spam, optimize compression and such

  • they are used everywhere. If they go down, 30% of the internet goes with them.

[-] Dogeek@sh.itjust.works 13 points 1 year ago

The doctor is a monster for creating the monster.

[-] Dogeek@sh.itjust.works 19 points 1 year ago

Isn't that when trolls decided to post child abuse material on lemmy world? Since it's a large instance it federated to a bunch of others whose admin, rightfully so, decided to take down their instance to avoid legal repercussions, as well as take the time to clean everything up

[-] Dogeek@sh.itjust.works 8 points 1 year ago

VS Code absolutely has refactoring built in. Pressing F2 on a token renames it everywhere it's referenced

[-] Dogeek@sh.itjust.works 10 points 1 year ago

My company didn't leave me a choice, I got an XPS 15 which I had to setup with my distro of choice (but all the internal tooling is for Ubuntu, I personally would have preferred to install Fedora or Debian 12 with i3wm).

It's not that bad a laptop but it overheats like crazy and has really shit battery life (barely enough for a meeting), and some of its features I can't explain : why is a 4k touchscreen on a laptop a good thing? It eats 4x the battery for no noticeable visual improvement. I don't use my laptop 5 inches from my face.

[-] Dogeek@sh.itjust.works 7 points 1 year ago

You could use grafana loki to handle logs, it's similar to Prometheus so if you're already using that and/or grafana it's an easy setup and the API is really simple too.

[-] Dogeek@sh.itjust.works 8 points 1 year ago

What's wrong with 12ft?

[-] Dogeek@sh.itjust.works 11 points 1 year ago

I see what you did there.

[-] Dogeek@sh.itjust.works 58 points 1 year ago

ELI5 : Take the string AAAA.

A simple Cypher would be to change the letters to the next one in the alphabet and offset by 1 for each letter, the message would encrypt to ABCD.

If you try to compress that, well you can't do it, otherwise you lose required information.

If you were to compress AAAA first, you could represent it as the string 4A. You can then encrypt that to 5B.

Encrypting is about adding entropy to a message. Compressing is about finding common groups and represent them differently so that the size is lower. Compressing an encrypted message is basically useless because you added so much entropy to the message that there are no more recognizable patterns to apply compression to.

[-] Dogeek@sh.itjust.works 7 points 1 year ago

What if the keyboard is not made of homogenous switches? Some reds, silvers, blues and browns thrown randomly around the keyboard ought to defeat the model, right?

[-] Dogeek@sh.itjust.works 9 points 1 year ago

#define is nothing but a search and replace from the preprocessor.

I've been burned one too many times with #include which replaces the directive with the contents of the included headers file (I think that if you're truly evil you can even include straight .c files and forgo headers entirely)

1
1
1
1
1
1
1
1
1
1
1
1
[-] Dogeek@sh.itjust.works 8 points 1 year ago

The beauty of lemmy is that it is open source. Anyone knowing a bit of rust and/or typescript can contribute. I'm sure multilemmies will be implemented sooner rather than later.

Though, although rust is a beloved language, it's hard to get into. A backend in typescript or python would attract a lot more developers just based on the fact that these are higher level languages. Performance would take too much of a hit though.

view more: next ›

Dogeek

joined 1 year ago
MODERATOR OF