• 0 Posts
  • 114 Comments
Joined 1 year ago
cake
Cake day: June 18th, 2023

help-circle

  • A rockstar developer doesn’t churn out unmaintainable, by definition.

    The number of people who think they are rockstar developers but clearly aren’t is probably close to the number of cover bands who see themselves as undiscovered rockstars.

    I’ve worked with people like this, their best hope is to fail upwards into management.

    The only way to know if you are competent coder is for other coders to tell you. If none are telling you, your imposter syndrome isn’t.

    There are other signs as well but these aren’t taught in formal education. An example being the ability to recognize how your old code could be improved. The way requirements stack over time makes this a certainty in any product.









  • Clent@lemmy.worldtoFunny: Home of the Haha@lemmy.worldInteresting
    link
    fedilink
    arrow-up
    0
    arrow-down
    1
    ·
    1 month ago

    There is a lot of misinformation on what Facebook is and isn’t doing. And a lot of it is pushing 10 years old.

    Facebook has long had features that detect exactly what you’re describing. They aren’t recording it, they are fingerprinting it. The target is any ads and music that is played but it could go beyond that.

    This is fundamentally no different than the way a device is passively listening for the “hey, assistant” phrase which just matches a fingerprint.

    Anyone who is simply looking for immediate data transfer when this occurs is a fool. There is absolutely no reason it cannot hold the list of known finger prints and add them to otherwise normal requests. The same for anyone looking for cpu spikes; these fingerprints are highly performant and it’s not recording, it’s matching so Facebook can deny all day that they don’t record your conversation and it isn’t a lie because it’s the wrong accusation.







  • From the toaster you’d still need to find a way to access a trusted device. This is going to require an exploit. But first the toaster needs meet some specific requirements, like does it have a web server or shell. If it’s a simple device that merely broadcasts its state it likely does it meet these requirements.

    If your WiFi thermostat is broadcasting its default SSID, that means it is not connected to your WiFi. At most you can take control of the device but it won’t get you onto the trusted network any faster than hacking their WiFi directly. Best to go for a device already on the network.