8
theabbie
57d

I think the fact that even Apple can't unlock your phone if you forget your passcode proves that they use very naive encryption method.

Suppose my data is "Hey This is Some Data" and Passcode is 1234, I could just Jumble this data using that passcode and It will be difficult to decrypt without Passcode. And If data is huge, it will be fairly impossible to do so. But that doesn't make it a good encryption method.

Such encryption, though safe is not practical, Imagine if there was no "Forget Password" Option on any account, I usually forgot my password very often when I was a child.

Apple has been doing such things for years, Using Bad things as a selling point. Apple users are dumb anyways because they don't want to control their phone.

Reset Password is a weak point which might be exploited but in such cases, usability is more important than security. Any service which doesn't allow resetting Password is a shitty service and I would never use such a service, They are too naive.

Comments
  • 63
    Are you an idiot?

    Using back-doored encryption is not better. It’s the exact opposite of better. I don’t care if it’s for convenience, it. is. not. secure.

    Any flaw in security can and will be exploited. If not by malicious actors, by companies looking to exploit your data, and by the government.

    Security should be your first concern; only after that should you work on making a product usable and friendly. Anything else is incredibly naïve.
  • 11
    If the data is huge it makes it easier to decrypt. Much more chances of finding patterns.
  • 23
    @theabbie All of the data google has, even the encrypted “secure” data, they share freely with the US government. Five eyes, prism, and all that. Same goes for Facebook, Amazon, Microsoft, Intel, etc.

    I do not have any data on google. At least I do my damndest to not feed them any more. Same for the rest.
  • 6
    @Root Yeah, Fuck Google, All the websites on internet dumb as they allow you to reset password. Stop hating Google because of half knowledge, This doesn't make you cool.
  • 31
    @theabbie You really need to stop. Almost everything you have said is wrong. Even if you don’t know it, you’re embarrassing yourself.
  • 5
    @iiii Consider this jumbling function I Made

    function jumble(text,n) {
    var result="";
    go(text,n);
    function go(text,n) {
    if (text.length!=1) {
    var p = text.split("")[((n-1)%(text.length))];
    result+=p;
    go(text.slice(((n-1)%(text.length))+1,text.length)+text.slice(0,((n-1)%(text.length))),n);
    }
    else {result+=text;}
    }
    return result;
    }

    The output of

    jumble("This is some data And It is Not even very long, Try this", n)

    is " tt r ss snnhsANersa y o eTiIvidey vTdoe mlntt iao,gih "

    Please find n

    and this data is very small compared to real world data, and n is just an integer. You have very wrong sense of encryption.
  • 6
    @Root Why do you criticize things with half knowledge about that? We are not living in a perfect world, people do forget password. If your key gets lost, you don't abandon your house. It's a useless encryption, admit that.
  • 9
    @theabbie have you even read my message? ๐Ÿคฆ‍โ™‚๏ธ
  • 5
    @iiii Yeah, I read it, in my function, decryption becomes tougher if data size increses. Your statement was wrong.
  • 13
    @theabbie no it does not. It's not even good or strong encryption.
  • 24
    @theabbie What is the point of encryption? To secure the data. Having another key that the user does not control is the antithesis of secure because the user no longer controls access to their data.

    When are encryption algorithms deprecated? When people find flaws that allow them to make better guesses at keys, or because there are a high number of collisions, and therefore multiple keys the user does not intend.

    Having multiple keys the user controls is fine. It lowers the strength of the encryption, but it keeps everything squarely in the user’s hands — and only the user’s hands.

    As soon as someone else has access, or an easier time gaining access, it is no longer secure.
  • 25
    @Linuxxx, care to have an aneurism? Come read this!
  • 5
    @iiii Then prove it. here n is just a one digit integer, Suppose passcode is ABCD, I could do this

    var x = data;
    x = jumble(x,A);
    x = jumble(x,B);;
    x = jumble(x,C);
    x = jumble(x,D);

    How will you find original data without Passcode, I have an unjumble function too, It can be decrypted but not without passcode.

    To use Brute force you have 10000 combinations, That's not feasible.
  • 23
    @theabbie you need to read up on encryption methos. Like, a lot.
    I do agree that over-authentication makes just about anything useless, but security has impact on usability too. Which is why proper level of security is hard to reach.

    But as for Apple, all your data is backed up, so what difference does it make if you lose your lock? You just factory reset and start again.
  • 5
    @Root The goal of encryption is that no one other than user and the service should be able to access it. And,. multiple keys won't help, The goal here is to get data even if everything is lost. There are better ways to protect data from hackers, For example, Using another encryption over user data. What If you have a brain surgery and lose your password. Your data is gone forever, Just because of a naive encryption.
  • 5
    @NoMad That means the Backed up data is unencrypted somewhere, or, if even encrypted, is not with the user's passcode, as per @Root it should be completely controlled by user. Isn't that a backdoor. Why can't it be exploited. Please understand that Either it can be completely secure or usable. not both. Se need something in between them.
  • 14
    @theabbie the passcode to your device and your cloud account are different... You know that, right?
  • 14
    @theabbie considering you've said it's only a single digit number, i have only 10 combinations to try. And I can safely rule out 0 because your function would not change the input text if the key is zero. so it's 9 variants.
  • 21
    @theabbie Password manager. ๐Ÿ™„

    Security through obscurity is not security at all. ๐Ÿ™„

    Secure security is not naïve security. Intentionally weakened security is. ๐Ÿ™„

    For multiple keys: A single-use password reset code, written down on physical paper, a la TutaNota. This is a backdoored encryption algo used for good rather than evil.
  • 30
    Your one controversial headache ๐Ÿคฆ‍โ™‚๏ธ

    Serious question, how new are you to the tech field?
  • 18
    So you are saying that if people are used to lose their house/car keys, it is better to make lockers that other people can open without it?

    Or yet saying the key guy next to your house have a copy of everyone keys, so he could open your door if you lose them?

    Just because you can't remember where did you left them, everyone needs to be have their security compromised?
  • 27
    I don't want to live on this planet anymore.
  • 5
    @NoMad The point is forgetting password, If everyone Remembered password, there wouldn't be any problem, even if it is in device, it can be forgotten
  • 2
    @iiii oooh, a new one!
  • 5
    @iiii I can do it with 4 digits too, one after the other, Then there are 9^4 combinations
  • 5
    @theabbie not if you use it often enough ๐Ÿ˜›

    Also, password managers are there for a reason.
  • 8
    Another points:

    Did you know big CEOs etc prefer to have iPhones just because of the extra security Android can't provide?

    Or yet, do you think one of the biggest companies in the world is naive just because you don't agree with them?
  • 5
    @Root Password managers mean transferring the burden to them. Even they use such encryption. We can assume that we won't lose Password for that manager but That would be too much trust on them. I am talking about a situation where you lose everything, the only thing that remains is your identity. That's worst case scenario but that's possible.
  • 19
    Stop trolling dude.
  • 5
    @C0D4 Not much experienced but atleast more knowledged about my arguments. Apple has been fooling prople. It's not useful.
  • 8
    @theabbie what is this naive security you are talking about? I got a little lost here...
  • 22
    @theabbie a password reset is not the same as sending you your password.

    It's a change of password, meaning the service still has no reason to know what it is and store the damn thing in a 1 way hash.

    Encryption is 2 way, hashing is 1 way.
    There's a difference.

    Except for telcos in Australia that literally SMS you your password in plain text just by adding your username๐Ÿคฆ‍โ™‚๏ธ๐Ÿคฆ‍โ™‚๏ธ๐Ÿค”๐Ÿคฆ‍โ™‚๏ธ๐Ÿคฆ‍โ™‚๏ธ
    Fuckers
  • 5
    @brunofontes If you lose your house key but you can prove that you own the house, you should be able to get new keys. In this case, your identity is irrelevant, Your Passcode is everything, That's not practical. It's not compromising security, It's just plain carelessness.
  • 9
    @theabbie you know, if you as a person were enough, then you wouldn't need an ID card since a photo of you, or you in person, would be enough ๐Ÿ˜›
  • 15
    @theabbie so wait, you are using the same kind of argumentation here than in another infamous thread? A theoretical yet unlikely worst case scenario is your argument for something completely irrelevant? Reminds me of some language being not bad because there is a theoretical superdev who never errs...
  • 14
    @100110111 edge lord won't stop
  • 15
    @iiii well, at least I have a virtually unlimited supply of popcorn...
  • 5
    @theabbie in order to prove your identity and get access to your stuff, someone needs ti have it. Probably hundreds of people would have access to your house keys.

    Is that what you call security?
  • 6
    @theabbie see, you're extending irrelevant examples. You could keep multiple copies of the physical key elsewhere, but if your lock is easy to pick, that doesn't make the number of keys any relevant.
  • 8
    Like, if you buy a safe for very important stuff you want to the safe factory/workers could open if you loose your code?

    So they will have your address and a way to open it without your code?

    I am not sure if you understand security, now.
  • 8
    @theabbie any smart enough at least a little bit tech savvy person would use a password manager so as to only have to remember one or two passwords and maybe a few pin codes..
  • 24
    I'm going to ring in some people,
    This is going to be fun ๐Ÿ˜…

    @linuxxx
    @linux
    @AlecX04
    @F1973
    @Jespersh
    @CrankyOldDev
    @Awlex
    @Bubbles
    @bhouston
    @caramelCase
    @AlgoRythm
    @Kimmax
    @Jilano
  • 6
    @C0D4 You can't reset password if data was encrypted with some other key, you need old password, but, you don't have it. That means it's gone forever.
  • 14
    nNOOOOOOOOOOOOO
  • 5
    @NoMad If you can prove that you own the email ID associated with the account that's enough to prove you own that account and should be able to reset it.
  • 11
    @theabbie hahahaha So you want Apple to sell 2 iPhones, one for important people and another one for dummies?

    "Buy your next iPhone for Dummies! You can set any password, any time, and we can just ignore it and unlock your phone if you say your ID number"
  • 13
    @theabbie proof of access is not proof of ownership. ๐Ÿ‘€
  • 5
    @100110111 It's not worst case, you never forgot your password? Or, your parents, or anyone you know. It happens a lot. People forget. They should not have all the burden.
  • 5
    @brunofontes Proving Identity means owning papers to house. Or, your photo that is with the house registry, or your neighbours statement that you own it. If it is proven, you should be allowe6to access it.
  • 4
    @theabbie the name of this is lack of security. There is plenty of services that implements it. They can even store and send your password in plain text for you.

    This is also the reason there are so many email and WhatsApp accounts hacked.
  • 9
    @theabbie let me try a different argument:

    1. Forgetting your password doesn't mean your data is useless. It means you don't have access to the data.
    2. The encryption key and the password are different things.
    3. Some people rather have their dick pics unreachable if they forget their passcodes rather than accessible by everyone.
  • 5
    @NoMad Lock should not be easy to pick but not impossible to pick too, atleast by the owner. We want something in between usability and security.
  • 5
    @brunofontes Not the factory workers, but I, if able to prove that I am the boss, should be able to open it without Passcode
  • 9
    @theabbie dude, this is hilarious. So someone will have your house keys with a photo and, if you show up with the invoice, they can see you face, the paper and give you a new pair of keys?

    And all those workers that had access to your keys? And if the place that owns the keys were compromised?
  • 4
    @theabbie but that's literally what security means. It means giving access to the right people. Not to just store your data in oblivion. Lol.
  • 5
    @100110111 I already told password managers are fine, but it's not an excuse to Apple's Carelessness
  • 10
    @theabbie You are mixing topics. A lot.

    First: You cannot do a "password reset" on encryption (in contrast to an online service). What you could to, is to save the key somewhere else. And this kind of defeats the purpose... The only way would be to display the key once and let they user write it down.

    Second: It's not like all of your data is lost, there is still a (not E2E encrypted) iCloud backup (at least if enabled)...
    And *surprise*, this has been used by the FBI (of course sometimes even legitimately).

    Third: Apple *could* unlock your phone, by writing an update to the security chip. They explicitly reject this, to prevent opening the Pandora's box.

    Fourth: Actually no disk encryption scheme allows decryption by the vendor. Neither LUKS, BitLocker (you could give Microsoft the key, but why would you?) or the pre-T2 encryption on iMacs (I'm contrast to the ones with an iPhone security chip).
  • 1
    @theabbie and how do you think they will have a copy of the keys to provide you if no one has access to it?
  • 5
    @brunofontes You can prove that you own the IPhone, there are numerous ways to do so. And If you can prove it, atleast prople at Apple should be able to unlock it for you.
  • 7
    @theabbie @NoMad so the lock needs to be magical. No one, but the owner, can open it without the keys. Hahahahahah
  • 5
    @C0D4 That means OTP is a joke. I can verify that I can access my SMS but I don't own that number.
  • 3
    @theabbie so if they cab open for you, they can open for eveyone else if it were interesting to them.
  • 7
    @theabbie so basically you just want security to be less secure?
  • 5
    @brunofontes It's mostly user's Carelessness that causes such breach. But that's irrelevant. Many great services use better encryption and weren't hacked.
  • 8
    @C0D4 Thanks for the laugh! This thread made my day ๐Ÿ˜‚
  • 15
    @C0D4 Hahahahahahaha holy fucking shit. This guy is either next Einstein or just another drunk retard.

    @theabbie and in other thread you tell me people value your blog and articles?
  • 2
    @theabbie Have you ever considered people would want this, by a chance?

    Also many people will just setup and fingerprint or facial recognition on their phones, not even needing to enter anything.
  • 5
    @NoMad Forgetting passcode and never Remembering it means data is lost. Everyone doesn't think like your 3rd point.
  • 10
    Also, the answer to your jumble crap is 8. You added an extra space in the expected output. ๐Ÿ˜•
  • 6
    @scout iss liya humara desh badnaam hai. Aise chutiyo ki vajah se.
  • 5
    @brunofontes Why do you need photo. Just show your face and the house registry would have your photo. That's enough to verify ownership.
  • 10
    @theabbie Get into Standup comedy. You will be a star. Trust me.
  • 5
    @NoMad Yeah security means that, But Good security means that it should be accessible by right people even if they don't have passcode, they just have their identity.
  • 0
    @theabbie yes, they have encryption, a good one, that's why toy can't break it without the password.
  • 3
    @theabbie HAHAHAHAHAHAHAHAHAH
    Thanks for the laughing, but I really need to sleep.
  • 6
    @sbiewald First: There are good ways to implement reset feature.

    Second: Backup defeats the purpose if it's not encrypted the same way and it's not
  • 9
    @C0D4 @Root @Jilano Check this.

    https://theabbie.github.io

    ๐Ÿ˜‚๐Ÿ˜‚๐Ÿ˜‚๐Ÿ˜‚๐Ÿ˜‚๐Ÿ˜‚๐Ÿ˜‚๐Ÿ˜‚๐Ÿ˜‚๐Ÿ˜‚๐Ÿ˜‚
  • 6
    @F1973 after today's fun and games... do I dare?
  • 5
    @brunofontes They don't have copy because they don't Encrypt like that. They don't give your password they create a new one.
  • 5
    @brunofontes Owner with some guy from that lock company
  • 5
    @theabbie identity is not one dimensional. Which is why we have multiple factor authentication.

    But, as for the iPhone, again, you have multiple ways of accessing the same data. No, Apple should not be able to open your phone. Otherwise they could do it for just any reason. Yes, you do get backups. Which is why you can access the data even if you lose access to your phone.
  • 5
    @brunofontes Yeah they can open, they wouldn't, you need trust, World is not a trustless environment
  • 6
    @100110111 Less secure (in disguise) and more usable
  • 17
    @F1973 Is it just me or does that social media list never end? ๐Ÿคญ

    No wonder he needs to reset his password so often.
  • 5
    @F1973 One of us is half knowledged, either me or you guys. It will be proved eventually who is
  • 23
    Guys, stop ganging up and making fun. ๐Ÿ˜›
    He clearly doesn't still get the main point of security, so let's not turn a technical issue into a bullying rally. ๐Ÿ˜’
  • 5
    @sbiewald FaceID is ideal for encrypting and verifying identity at the same time. It's good for security on device
  • 6
    I’m just gonna assume this is a cheap trolling attempt to calm my nerves.
  • 4
    @NoMad I'm trying to play nice... but the evidence is compelling.
  • 4
    @theabbie Backup and device encryptions do have different purposes and threat models, so its fine to not have the same security properties.

    This is the usual "usability vs. security" axis, where Apple chose security for their devices (heck, it's one of their core marketing aspects) and usability for their backups.
  • 5
    @Root Yeah, 8 is correct, you had to use brute force, Now If I first encrypt it with 8 then the output with 5 then with 2 and then with 3 and so on, It becomes more difficult with every digit. And the Space was there.
  • 4
    @Python it's not. It's a student's question of "why can't I reset my password". He's mixing a lot of topics, but that's the gist of the main question.
  • 2
    @C0D4 Dang it! You beat me to the punchline ๐Ÿคฃ I was just about to say the same thing
  • 6
    @F1973 It will be proved eventually
  • 5
    @brunofontes By your analogy, If you lose keys you should get a new house. So we should ban creating keys then. That would be very secure.
  • 5
    @F1973 I get ad revenue if you visit that. Go on.
  • 7
    @theabbie I'll give you one thing, you know how to raise a discussion!
  • 5
    @NoMad You need to trust a service for using it. If they really want to steal your data they have numerous methods.
  • 6
    @C0D4 I keep track of all my accounts, I care about my security and Everyone should
  • 23
    How this feels right now
  • 9
    @F1973 Obviously this guy doesn’t care about security nor privacy if he posts his email address, every social media account, and bloody phone number online.

    Also: lol @ those projects. He’s embarrassing himself far more on there than in this thread — and willingly. ๐Ÿ˜ฌ

    “Guess my gender”
    Anything pink or purple is female.
    Everything else is male.
    K...

    “Guess the letter”
    I draw M. then S. then T. It guesses “P, J, D” every single time. In fact, the only letters I can get it to guess correctly (and even then only sometimes) are P, J, and D. ๐Ÿ˜‚
  • 5
    @NoMad Main point of security is your identity is the ultimate authority. Password is a more convenient waynto prove your Identity but it should not be the only way.
  • 5
    @Python No, it's not
  • 6
    @theabbie We all here have ad blockers. So have that.

    @C0D4 we must give that to the kid. He surely knows how to engage a community.
  • 5
    @sbiewald Backup is a backdoor then, what makes it safe? If every data is hackable then why not Backup?
  • 5
    @NoMad I don't use such services at first. If you are not capable of good Encryption I am not using it.
  • 8
    @Root I played the 'Guess the gender' game and it showed me

    MMFFFFFMMMFFFFMMFFF

    This kind of some random string.

    Dude smoking some good shit.
  • 16
    The Dunig-Kruger is strong with this one. ๐Ÿ˜‚
  • 5
    @Root That project is not ready yet, You used a Beta version
  • 5
    @F1973 That is a question about your Gender
  • 7
    Oh. According to his blog he's 18. That explains everything. That's the second worst age to argue with right after 2. ๐Ÿ˜‚๐Ÿ˜‚
  • 5
    @NoMad Google is not remotely like that. If it ever gets hacked, I may change my opinion.
  • 2
    @theabbie I never claimed it is safe.
  • 5
    @AmbientTea 18 but experienced is better than 25+ but half knowledged
  • 10
    @AmbientTea No. I disagree.

    We have had many 16 yo here who were really really smart.

    And even outside I have known younger folks who know what they are speaking, if not being smart.
  • 7
    @theabbie I copy pasted your shit. It was wrong. And yes, I tried values of `n` ranging from 1 to 8 million. Only when adding in Levenshtein distance did I realize you made a mistake when you retyped, rather than copy/pasted, your expected output.

    GG on failing again.
    And on wasting my time. ๐Ÿ™„
  • 5
    @sbiewald If a backdoor has to exist ultimately then why fool people by giving a sense of security while being equally vulnerable
  • 9
    @theabbie Why are you showing off unfinished, buggy code? Seriously! You are the literal worst.
  • 7
    @Root I am sure his website too will have some backdoor crap and if we dig enough we can even score an entry to his Github and modify his page. lol
  • 5
    @Root Maybe, anyways, you required brute force, If it was a long Passcode there would be many possibilities. Isn't it safe but useless?
  • 5
    @Root It's ML, it is not called Buggy, You have to train it first, I haven't yet
  • 6
    @F1973 I'm not saying all teenagers are full of shit. ๐Ÿ™„
  • 3
    @theabbie เคฎเฅ€ เคธเคฎเคœเคพเคตเฅ‚เคจ เคธเคพเค‚เค—เฅ‚ เคถเค•เคค เคจเคพเคนเฅ€
  • 14
    @theabbie listen, I'm not gonna argue further, because I have to get out of bed and start my day. As well, you seem to think everyone is wrong and you're right. So maybe, you are right. If you're the genius you think you are, go ahead and make the safest encryption method and enlighten us all. But chances are, you're on the wrong track and just being hard headed.
    But do read up on encryption and security. Specially on the maths behind it.

    Also, yeah some of these guys above are being dicks. But that's what happens when you make a claim in front of pros that you can't back up.
  • 5
    @F1973 That would be a loophole in GitHub not my website
  • 8
    @theabbie Hahahahahahah ML. Fuck me in ass..

    @Root we are in wrong thread. This should be tagged as joke/meme
  • 5
    @NoMad My only claim is, Apple should not be called good just because of such encryption, They might be unhackable but at the cost of usability. They haven't done anything great and shouldn't be credited for that. Other services which are not (YET) hacked inspite of vulnerability are the real heroes. Admit that.
  • 14
    @F1973 I bet I can guess his key space. ๐Ÿคซ

    /^[A-Z][a-z0-9]{7,13}$/

    Dictionary word(s), probably followed by a number. Maybe with some 1337 }{4X3R substitutions. It’s probably simple.

    After all, he’s terrified of forgetting his password, but he so badly wants to show off his skillz.

    At least now he might change it. ๐Ÿ™„
    Would never admit it, though.

    Bloody hell I feel mean tonight.
  • 15
    OMFG that's a level of apple hating that shouldn't be possible. ๐Ÿ˜‚ Even the cancer that killed Steve Jobs would go 'dude stop'. ๐Ÿคฃ
  • 5
    @Root I don't use Apple Crap, And it's not as simple as that Regex
  • 4
    @theabbie Apple's device encryption is good.
    You're wrong.
    They're shit for many other reasons, but not for device security.
  • 5
    @AmbientTea Hate is not with Apple but their bragging, It's just another crap encryption which sounds secure but is useless
  • 5
    @theabbie The keyword is threat model.
    An encrypted device protects against *anyone* having (physical) access to it (per definition this means Apple no access as well). Not more, not less.

    Backup's purpose is to recover from device loss. Of course the secondary requirement is security to prevent (in this case remote) access. More "classic" solutions like 2FA can now be used (this is not possible for device encryption; 2FA also disables the simple password reset by the way).

    If people choose to not want the iCloud backup (e.g. because they do not want Apple or law enforcement with court orders to have access to their data), they can even disable it.
  • 5
    @AmbientTea
    >Even the cancer that killed Steve Jobs would go 'dude stop'. ๐Ÿคฃ

    hahahahaahhahaha this made my day.
  • 5
    @NoMad Security is not a big deal if there was no concept of forgetting password. Millions of accounts will be lost every month if there is no feature to reset it. It's just that services take some responsibility and don't put all the burden on users. Apple is bad at taking responsibility.
  • 5
    @sbiewald That means backdoor must exist for usability, Ideal security is a hypothesis.
  • 6
    @theabbie Just FYI you didn't outsmart anyone let alone @F1973.

    It's just your pseudo-intellect telling you you did.

    Go play somewhere else.
  • 9
    @C0D4 I'm either too old or too tired for that, haha (maybe both)

    @F1973 His website isn't too awful as in, I've seen a lot worse. But I don't think I even knew that many social/donations thingies existed.
  • 5
    @-red Well, praising and defending Apple while knowing that it's crap doesn't make anyone cool
  • 5
    @Jilano There are a lot of things on that website, Keep wandering
  • 4
    @Jilano Sleep well old man.
  • 15
    @F1973 ๐Ÿค”I won't dox him, but I will say there is a page with enough information to knock on his front door and greet his parents by name.

    There's also an admin page with a lack of authentication.

    @theabbie you may want to remove that csv file from a public accessible file, God knows why you would have that on the Internet - tell Zorin i say hi.

    And with that, I'm out!
  • 9
    @theabbie I think you miss the point, shall I call zorin's phone?
  • 4
    @C0D4 Hahahahahahahahah even I could find that admin page.

    Damn!!!!!! this was the easiest shit I have done as a tester/non-dev and I feel like a h4ck3rm4n now..
  • 5
    @F1973 That is not an actual admin page, Don't get excited, Thanks for stalking me so badly
  • 3
    @C0D4 That Elisha page I found. This dude is creep.
  • 8
    @theabbie I wasn't stalking, hell I didn't even scroll past the first 30 lines of source code to get to where I am.

    do you have... never mind I've be got your email, I'll send you a link to what I'm taking about before it becomes public.
  • 5
    @C0D4 Why would you do that? There are many phone numbers on internet, you don't call everything
  • 3
  • 5
    @C0D4 If you found it, it was public already and most probably intentional
  • 0
    @F1973 Yeah, I do shitposting too
  • 1
    @theabbie Rashika ko mera hi bol
  • 0
    @F1973 Who's being a Creep now?
  • 7
    @theabbie Shocking, you know? /s

    While not having "perfect" security, I find having 99.999% perfect one quite acceptable. And giving up a small part of usability is perfectly fine (and many people do accept it).

    Look, you can attack Apple for many things (I'm sure many of them here will agree to that part), but their physical device security including the tradeoffs is one of the best regarding both security and usability.
  • 1
    Great guys, keep going
  • 0
    @sbiewald It might be very secure but it's not a big deal, That's unnecessary hype while they have accomplished nothing. It's unhackable, but not very usable, It's my opinion
  • 0
    Don't want to Brag, just showing
  • 16
    And here, dear watchers, we have a brilliant example of total ignorance and Dunning-Kruger effect dialed to 11/10.

    Thanks for coming to my TED talk.
  • 0
    @iiii It's still better than knowing everything but understanding nothing
  • 13
    @theabbie yeah, right. Claim further that you understand everything while knowing nothing (as it seems). You're just an arrogant "know it all" child who learned some pretty easy but fancy stuff and now bragging and bitching in front of professionals who are just mature and lazy enough to not crush you entirely.

    At this point it's not even funny. It's miserable.
  • 0
    @iiii I might not be professional but you guys even if professional are not acting like one. You guys are just sticking to your argument without realising it could be wrong. You are senior, you must be knowing better that usability is necessary, Users are stupid, how do you expect them to take all responsibility of their data. And if Apple is doing that, you must realise that it's easy for them. They are freeing their hands from hard work. It's too much Hype, They are good at manipulating and not accomplishing anything.
  • 12
  • 0
    @iiii That's not frustration, that's lack of arguments
  • 11
    That is frustration. I'm yet to meet a human more arrogant and ignorant than you.
  • 0
    This discussion again transformed into EGO competition
  • 12
    @theabbie because users are grown ass adults, even if they sometimes act irresponsibly.
    Your argument has been used way too often in history in suppressing women, people of color and mind you, even your own culture.
    We're way past 20th century for you to make such arguments without even thinking of consequences. "How do you expect them to take responsibility"??? The same way you trust their driving license and voting capabilites, the same way you trust strangers who work at the restaurant to not poison you with dish washer and stupidity and the same way... You know what? Why am I even arguing it's not like you listen to anyone but yourself.
    In a parallel universe, you'd be right tho.
  • 5
    @F1973 Arigato Baldy Roboto

    @C0D4 Why make it hard for companies to get your info when you can just give everything to them
  • 0
    @NoMad If that's what you call security, Then Apple has actually accomplished nothing, I agree that such encryption is fine but in that case Apple is praised for things even a 15 year old could implement. This discussion started to prove that Apple is hyped. And I guess that's proven. Fck Usability It's unhackable, Everyone can do such encryption and Internet will be filled with Encrypted Garbage which cannot be claimed by anyone.

    I negotiate and I agree to say that it's ideal Encryption but still Apple should not be given any credit for that, It's hyped and it's true.
  • 0
    @Jilano Using such Encryption means expecting that one day you might lose all your data and no one will be able to help you.
  • 2
    @theabbie "Apple did good, but shouldn't be given credit for the one good thing it did, right after usability for end user, which is their whole 2 selling points"
    Lemme sum it up ๐Ÿ˜›
  • 0
    @NoMad I guess everyone was already convinced with that, This discussion yielded nothing
  • 6
    I'm not sure whether to laugh or cry...
  • 0
    @saucyatom You came too late, Show has been ended
  • 8
    @dfox hey Dave! can you look at this user?

    He is not contributing anything good to our platform and is trolling other users by spreading not so good vibes.

    I'd like to report.
  • 0
    @F1973 This is literally the only platform to Rant, I am at the most correct place to do this
  • 13
    Oh boi, you're gonna feel so embarrassed by this thread by the time you finish your uni cryptography course. ๐Ÿ˜
  • 4
    I've got roll screenshots btw. ๐Ÿ˜Œ
  • 0
    @AmbientTea The Discussion is not even about cryptography, It's about how simple it is and Why Apple is hyped
  • 4
    I know I was mentioned, but... This is too long to read. From what little I did read then some good points and sensible scepticism on here already.
    I have nothing to add
  • 8
    What the hell.

    The whole point of encryption is to make data inaccessible if you don't have the password.

    Yes, people do forget passwords. If that's more of a problem in your threat model than unauthorized 3rd parties accessing your data, then encryption is not the right answer for the problem you're trying to solve.

    > The goal of encryption is that no one other than user and the service should be able to access it.

    No. The goal of encryption is that no one other than user should be able to access it. If the service can access it, so can anyone who hacks it or has legitimate access and abuses it (rogue employees). If anyone but you can access that data, it's not yours anymore.
  • 0
    Somebody -- All my comments, I have a little Idea of who it is, However, don't do it, Be a good sport, I have no hate for anyone
  • 0
    @gronostaj Okay, That might be correct, Also, Such an Encryption is simple to implement, So, Apple has done nothing great, It's hyped, that's all I wanted to prove
  • 4
  • 12
    No encryption is simple to implement, that's why nobody sane cooks their own cryptography in house unless they specialize in it. Anything you can implement out of your overconfident ass can be easily cracked.
  • 7
    @theabbie I don't like the situation you got stuck in either. Admittedly, everyone could've said "he's stupid" and moved on without arguing with you. But they care about security enough to know your kind of thinking has many negative consequences.
    But then again, you made a claim about a field you know nothing about.

    Encryption is the love child of theoretical cryptography and system security, btw ๐Ÿ˜›
  • 0
    @AmbientTea To show how simple it is, consider this function I made

    function jumble(text,n) {
    var result="";
    go(text,n);
    function go(text,n) {
    if (text.length!=1) {
    var p = text.split("")[((n-1)%(text.length))];
    result+=p;
    go(text.slice(((n-1)%(text.length))+1,text.length)+text.slice(0,((n-1)%(text.length))),n);
    }
    else {result+=text;}
    }
    return result;
    }

    Now I do this,

    var x = data;
    x = jumble(x,A);
    x = jumble(x,B);;
    x = jumble(x,C);
    x = jumble(x,D);

    Here, ABCD is a 4 digit passcode, eg. if it's 1234 then, A is 1, B is 2, C is 3, D is 4

    I took some data and some passcode, and the result after this process is

    "otTud ahhIanaa ir eeYoseref c aua scpdHieDIo,otyf e slvr Avk Ssr nod iImsa ehh,nyat iteEr ,aP"

    Can you find the original data, If you do brute force, I must say, phone doesn't allow you to enter all combinations. It was that simple and you think Encryption is a Big deal.
  • 0
    @NoMad No one here is a pro in Encryption, They are arguing because it is against there EGO, They are just assuming that they know everything (so am I) But they are still in illusion that Apple is a Saviour
  • 5
    @theabbie @linuxxx is actually and specifically a cyber security expert. I still doubt you'd listen to him anyways.
  • 2
    @theabbie Root also has practical experience with these stuff.
  • 0
    @NoMad Many people called him, he didn't come still, I would surely listen to him if he just doesn't say security > usability, He is an expert.

    @linuxxx Please Save us
  • 14
    @F1973 thanks. I like to try to avoid banning people for expressing unpopular or misguided opinions, and I’m not really sure that explicitly violates our rules so in fairness I’m not really sure what to do.

    @theabbie please try to contribute to the community in a positive way if you’re actually interested in being a part of it (and aren’t trolling ๐Ÿ˜€)
  • 0
    @NoMad @Root said There shouldn't be any Backdoor, Later, It was found that Backdoor is necessary for usability, ie. Either Security or Usability, Not both. And she started her first comment with "Are you an Idiot?" That's not very polite for anyone with knowledge.
  • 1
    @dfox Sir, You can read this convo, I always start politely, Then some people go off-topic and question my skills. They just don't want to be disagreed with. What's your Opinion on all this Hype with Apple?
  • 6
    @theabbie You don’t need a backdoored encryption algo to allow the user to change their password. The password and decryption key do not have to be the same, as @NoMad demonstrated.

    Seriously, please educate yourself on security and encryption before asserting misguided and dangerously incorrect information. If anyone followed your advice, it would put their users’ data at risk, yet you assert it so confidently, and refuse to listen to any arguments to the contrary. This is what makes me so angry.
  • 1
    @theabbie very cool function. Now, for the sake of completeness, can you provide a function to decrypt the data using the passcode?
  • 6
    @dfox Fair point and I agree. We should encourage healthy debates and unpopular opinion.

    Thanks for the response bro.
  • 0
    @Root Multiple passwords don't make it any better, If a decryption key exists and is stored at server, that's still vulnerable. It's not about being educated, it's about common sense.
  • 3
    @F1973 no problem, thanks for giving me the heads up, and I’ll definitely keep an eye on this rant!
  • 5
    @Root ufff...

    @C0D4 shall we tell Root what we found? I am sure she would be equally dumbfounded. ๐Ÿคฃ๐Ÿคฃ๐Ÿคฃ
  • 5
    @theabbie

    > No one here is a pro in Encryption, They are arguing because it is against there EGO, They are just assuming that they know everything (so am I) But they are still in illusion that Apple is a Saviour

    Please avoid those assumptions, especially deyning someone's (especially not everyone's) competency.

    And just because someone does not support your argumentation (or moves the discussion away from the subject), does not mean a certain motive.
  • 0
    @AmbientTea
    Here it is

    function unjumble(text,n) {
    var result=[];
    var nums=[];
    var finalresult=[];
    for (i=0;i<text.length;i++) {nums[i]=i}
    go(nums,n);
    function go(nums,n) {
    if (nums.length!=1) {
    var p = nums[((n-1)%(nums.length))];
    result.push(p);
    go(nums.slice(((n-1)%(nums.length))+1,nums.length).concat(nums.slice(0,((n-1)%(nums.length)))),n);
    }
    else {result.push(nums[0])}
    }
    for (x in result) {finalresult[result[x]]=text[x]}
    return finalresult.join("");
    }

    Now decrypt it in the order D, C, B, A But still, if you don't have Passcode it's still Brute Force
  • 0
    @sbiewald The only reason anyone gave till now is that security is more important, If it's valid to compare Encryption to locking a house then By that analogy, losing key would be a nightmare, But it's not actually a big deal. If you carefully design an algorithm then maybe you could trade off with security and make it more usable. Ultimate Security is an illusion anyways. @linuxxx might have some opinion, let's wait for him.
  • 4
    @theabbie Yes. If I fail, I'm the only one responsible. That's how it should be.
  • 0
    @Jilano Then Why Should Apple Brag about being Secure? All it does is give you an unbreakable lock and a key and now it's your responsibility.
  • 18
    I’m favoriting this, un-fucking-believeable. My Maryland cybersec certificate goes down the drain

    @theabbie ะฑั€ะฐั‚ะธัˆะบะฐ ะตะฑะฐั‚ัŒ ั‚ั‹ ะดะพะปะฑะพะตะฑ ะทะตะผะปั ั‚ะตะฑะต ะฟัƒั…ะพะผ

    Holy fucking shit this is not suicide this is self disintegration
  • 16
    >forgets password, therefore apple bad
    >more people with access to your supposedly private stuff => more user friendly
    >encryption is ackshully supersimple and ez and here look 20 loc makes fucking uncrackable data

    lmfao ok this thread is hilarious
    making an acc here was definitely a good choice
  • 0
  • 4
    @theabbie “brother you’re such a doofus Rest In Peace”
  • 9
    @theabbie

    > [...] But still, if you don't have Passcode it's still Brute Force

    No. Your algorithm is a simple permutation, nothing more, nothing less.

    Thus, the ciphertext 'leaks' data from the plaintext: Every character in the output was in the input. With enough context, the message might be reconstructed without even touching your function.
  • 5
    @theabbie

    > Then Why Should Apple Brag about being Secure? All it does is give you an unbreakable lock and a key and now it's your responsibility.

    That's actually the point...
  • 0
    @Z-GOD It's not about forgetting password, It's about unnecessary Hype. I have started to respect other servives more now because they are not losers, They take responsibility of their user's data. Encryption might not be easy but Apple is no special. You have an illusion of security, Apple Manipulated you and now you are giving people fake assurance that their data js safe, Yeah, it is safe but it won't take much to transform it into an encrypted garbage.
  • 3
    @theabbie good luck with that confessions, and good luck with monica, naveen, sahil and pratik
  • 0
    @sbiewald How can you be so wrong? Prove it by solving it but not with Brute force
  • 8
    @theabbie Ideally, services would operate similar to TutaNota, where the service has almost zero knowledge of the users or their data. They can read just enough to route emails to their intended recipients, and little else. All decryption and encryption happens entirely on the client, meaning nothing is ever transmitted in clear text. For passwords, you have one, and a reset key. If you lose both, your data is irretrievable. So don’t.

    This obviously poses problems for having multiple users able to access the data. In such a case, you would need a central store of decryption keys; there is no way around it. However, you can still apply the same principle by adding one layer: you can easily encrypt the decryption key with the user’s password hash, or other encryption key depending on your implementation, and store it securely on the server. Only the user could decrypt their copy, transmitted to the client only in encrypted form, which in turn allows them to decrypt the shared data on the client.

    That way the server has zero knowledge of the data, nothing is transmitted in the clear, multiple users can access said data, and they can change their passwords using the reset token. All without ever allowing third party access.

    True, if all users lose both their passwords and reset tokens, the data is irretrievable. But this also makes it impervious to DB leaks and social engineering, like what happened with Twitter verified accounts. The data and its access are secure, and safe so long as the users don’t share said passwords with anyone else.

    The takeaway is that, while you can’t have perfect security and impose no limitations on the user, security is much more important. And strong security doesn’t necessarily mean the data is easy to lose.
  • 0
    @uyouthe What has it got to do with this, Stalking me, Proving that I don't have experience doesn't make me wrong
  • 6
    @theabbie also I’m texting Elisha rn about how creepy you are
  • 4
    @theabbie praising and defending JS while everyone knows its not good doesn't make anyone cool either
  • 7
    @theabbie out of your ignorance you exposed the addresses of 68 people, their names and addresses. FUCKING DELETE YOUR WEBSITE NOW BEFORE YOU GOT JAILED FOR THIS
  • 9
    @theabbie I HAVE YOUR CSV AND YOU AND YOUR GF VIDEOS AND EVERYONE ELSE DOES FUCKING DELETE THE WEBSITE THATS ILLEGAL
  • 0
    @Root That decryption key thing is good, That proves that user has to take responsibility of atleast key. What many websites today do is that they allow social login, This transferring their burden on social media accounts, Or, OTP login or Magic Link login are way of transferring burden. This is simlar to password managers, Since users can't remember keys, put it in vault and forget it, Write that vault password somewhere, make a tattoo, do whatever but don't lose it. This is about transferring burden. At last, If someone really cares about their data, remember keys

    So, If password managers are doing the same thing, Why the Hype with Apple?
  • 0
  • 0
    @theabbie stop liking my comments nigga you can go to jail for this shit, fucking unpublish your website before it’s too late
  • 4
    @theabbie

    > How can you be so wrong? Prove it by solving it but not with Brute force

    That's not how developing ciphers works. Really!

    I do have work to do, so unfortunately I do not have time _proofing_ you wrong. Leaking data from the plain text (besides length, obviously), is a no-go for any cipher.

    When I "Your algorithm is a simple permutation, nothing more, nothing less." you answered that "I could not be more wrong". Do you mind at least elaborating that part?
  • 0
    @uyouthe I removed that page, fine?
  • 0
    @100110111 It's everyone's personal hate towards JS, That is not a measure of how good JS is
  • 4
    @uyouthe oh you should see the one on JS too... kept me from going for a cig for a full 12h or more
  • 0
    @uyouthe That video is not of my girlfriend, It is part of a webpage and is done on command
  • 6
    @theabbie Your "jumble" function is not encryption - encryption is reversible. I can think of some cryptographic use cases for it, but still, it's not encryption.

    Anyway, even with my limited crypto knowledge, I bet it's broken. People spend years creating crypto algos and still make mistakes - it's incredibly easy to miss something fundamental. For example MySQL's OLD_PASSWORD func. looks fine for someone without cryptoanalysis knowledge, but actually an efficient algorithm for reversing it can be derived: https://security.stackexchange.com/...

    And even if the algorithm is perfect, the implementation can be flawed. For example this password check code looks fine at the first glance:

    function checkPassword(providedPwd, correctPwd) {

    return providedPwd === correctPwd;

    }

    But it's actually vulnerable to timing attacks: you can find out how many initial chars are correct by observing how fast the function returns (there's an invisible loop for string comparison).
  • 0
    @sbiewald It means that it's not that simple, If you think it's that, you should elaborate. It is basic jumbling but on doing it with 4 numbers, it's not simple jumbling anymore. You yourself haven't understood that function.
  • 5
    @theabbie no dude, that thread was everyone saying what is wrong about JS and why it's not really that good a language, specifically not about hating it. You just really, really, really wanted everyone to hate JS.
  • 5
    @theabbie Just because I repeat a permutation function multiple times or only about parts of the input, does not make the output less of one.

    All letters of the input are still in the output, just in a different order. This is - per definition - a permutation.
  • 0
    @100110111 Everyone was wrong because weakly typed language though not providing any advantage doesn't harm anything. That Potential Bug argument is absolute Rubbish because those people never properly used JS in fear of Bugs. You don't hate JS because of it's flaws, you hate because something better exists and it's a peer pressure.
  • 10
    @theabbie Apple appears to care about privacy; google does not. Google’s entire business model is data mining to target ads. The more data they have about you, the more money they can make.

    Everything they do is designed to gather data. Everything. Recaptcha, font and js CDNs, analytics, Gmail — especially Gmail — etc. Every http request to google’s servers tracks you and your activity across about 75% of websites, as I remember the statistic. They store everything, and correlate it as they learn more. And of course they are always getting better at correlating the data, so they continually learn more from everything they’ve stored.

    The worst part, though, is that they share it.

    Everything that goes online is permanent, and says a hell of a lot more about you than you will ever realize. Timing on posts, timing on traffic, search terms, use of specific wording, writing style, tone, new words, new interests, and above all else: trends of the above. These can show, with surprising and terrifying accuracy, where you live, who you know, what you like, what you are likely to buy/do/vote for (and when, down to the hour), your mood, if you are depressed, have a mental illness, are likely to have children within five years, love/hate your job, if you are cheating, what medications you are on, etc. etc. etc. All of this by analyzing patterns in the data, not even by understanding what it is you wrote because natural language processing isn’t even there yet.

    This is why data privacy is so important. We have a moral obligation to do everything we can to protect and educate users, not exploit them like Google, Facebook, Amazon, Alibaba, Tencent, TikTok, etc.
  • 1
    @sbiewald For a data with n characters there are n! permutations, and it grows insanely with n, So, If by some method it is jumbled properly, It would have n! possibilities. And My method jumbles it properly. It's not a simple permutation. You haven't understood the function yet. And yes, it's reversible. It can be called Encryption and all characters being in it doesn't make it any less of an Encryption, It won't make any sense.
  • 0
    @Root It would be better if you give proper sources of information especially the sharing part. And It's perfectly fine to use data to improve it's performance, And regarding that it shares it, Which doesn't seem true (unless you give source) You have a misconception about how it happens. Targeted ads send you to correct advertisers, Google doesn't tell them that this person likes chocolate or is married or anything. I have no hate for Apple, I don't use it anyways, But saying that it is most secure is a hype. It might have the best Encryption but it is nothing special.
  • 7
    @theabbie I have to ask, how thick is your head? How is it even possible that it has yet to cross your mind that a community full of professionals in a subject may actually A) know what they are talking about, B) understand the subject through and through and C) be correct?
  • 5
    @theabbie Any rearranging is simple permutation. It doesn’t matter how well you shuffle the letters, it’s still just permutation, which leaks data about the input. This is always bad.

    I still know how many “e”s are in the input string, for example. If I can make a guess as to the nature of the data, I can learn quite a bit about it. The number of spaces very likely correlates to the number of words. Based on letter counts I can make a good guess as to which words it likely contains, and this gets more accurate as the data size increases. And more so if I know anything at all about the user who produced the data.

    Also, depending on the data, I might not even need to crack the permutation cypher to get what I need from it.
  • 0
    @100110111 How difficult it is to admit that Apple is Hyped? What's so special with it's Encryption? It can't be hacked because of mathematical limitations not because of Anything special Apple did. It is just like one of those password managers or decentralized websites where you can't reset password. Admit it, I don't want you to say Encryption is Crap, It's just that Apple is no special.
  • 0
    @Root Regarding Nature of Data, I could have done those permutations on Base64 encoded data, Then any nature won't have leaked. I am not saying my function is super impressive, it's a demonstration of what I mean
  • 2
    @theabbie That is not my point. For natural language, there are not n! permutations of letters.

    Some examples:

    Your ciphertext contains a capital "T". Usually this starts a sentence. A "," usually separates one. Spaces separate words. Now start reconstructing. Sure this becomes increasingly difficult for very long text, but still leaks many things.

    Together with a bit of context (like education of the sender, message subject, potential text type, ...) the likely vocabulary of the message can be reconstructed.

    If it is a message to soldiers regarding tacticts, the vocabulary likely contains words usually found in the military. This makes attacking even easier.

    More often than thought, this "metadata" is available, at least when targeting a specific person.

    A proper encryption leaks exactly nothing (besides length, obviously) about the plain text. A properly encrypted message is virtually indistinguishable from random data (independant of input).
  • 6
    Someone very intelligent and famous once said EGO=1/knowledge. No point to argue as knowledge comes to those who seek for it and learn from others.

    Trying to prove a point that no one else buys into, should at least give you a small hint that you might be “slightly” wrong on this topic.
  • 2
    @theabbie wait, since when was this thread about Apple being hyped? As someone who's now worked on a Mac for a few years and wouldn't consider going back, and personally not being an expert on security (since security seems to have something to do with Apple hype in your opinion), I can not say a bad thing about Apple in this context.
  • 4
    @unclesam Seeing a merc without a number plate is more easier to identify Steve than one with a standard number plate.

    He might be privacy focused but was definitely more attention seeking.
  • 0
    @sbiewald Okay, what about Base64 encoding before, Now, It won't leak any nature and Brute Force is necessary, Don't just say it's permutation so It's possible. It's Not.
  • 13
    Can someone please tell me what we're talking about at this point of the thread? Apple? Security vs. usability? Security best practices? Theory of encryption? None if it? All of it?

    ... I can't hear it over popcorn munching
  • 10
    @100110111 Especially since we are all saying basically the same things. ๐Ÿ™„

    I tried shock, I tried showing that there things he doesn’t know yet, I tried calm reasoning, I tried familiar wording. Nothing seems to work. He keeps insisting we don’t know anything, keeps mixing up concepts, and keeps not making any bloody sense.

    I’m done.
    It’s also 3:30am here and I’m exhausted. ๐Ÿคฆ๐Ÿป‍โ™€๏ธ
  • 0
    @100110111 It was always about Apple being hyped. See the main problem statement at the top. People love apple because it makes things easier, I agree, But Spoonfeeding users is a bad thing. Apple is like that comfort Zone Bubble that you don't want to leave but it will eat you inside.
  • 0
    @Root I had agreed to your point earlier, There is no problem in such Encryption, What makes you think that Apple is not Hyped? What special it has done that other services like password managers Haven't done?
  • 4
    @theabbie It still leaks... Also the algorithm is damn inefficient now.

    Because *surprise, surprise* natural language does not contain binary data, thus all "correct" arrangements of base64 data must decode to letters.
  • 0
    @sbiewald And to find correct combination you need brute force, And with so many characters it's not a good idea. Well, you just played yourself.
  • 4
    @F1973 haan na ...confidence dekho...
  • 4
    @theabbie No, not at all.

    Just because there is no simple "algorithmic" solution to your cipher, this does not mean it is not broken (in cryptographic terms, look it up what it means in this context, please).
  • 1
    @sbiewald Okay, forget my example, there are many basic encryption algorithms which are unbreakable, Such encryption is never a big deal
  • 4
    @scout Confidence chhodo.

    We found some real shit. If you use Telegram or something, I can prove what kind dumb were are dealing with.

    Massive fucking bomb we found.
  • 6
    The fact that they can't decrypt it is actually a very good sign. It means that the encryption method used is not viable to crack (not that they will bother with that), nor that they have a master key of their own (despite 3 letter agencies like the NSA absolutely loving the idea), AND that they don't store a copy of your data either. These are all very good things and privacy is rightfully so something that Apple is renowned for.

    Don't get me wrong, they're shit for a lot of reasons but privacy and security aren't among them.

    Companies like my lovely ISP that will send my password via postal mail upon request however... Yeah. They know the password, took years to encrypt their database (basically useless, they should've hashed it) and actively use it to impersonate customers for tech support.

    I recommend that you learn about symmetric and asymmetric cryptography, hash functions and the importance of each, and their intended applications.
  • 7
    @Condor don’t bother. https://devrant.com/rants/2949952/...

    He’s hopeless at that point
  • 0
    @Condor The point wasn't why such Encryption is bad, It was that Apple is Hyped, And yes it is. It is doing just Encryption, Is not some futuristic Technology, They are given to much credit for doing such basic stuff. That's wrong and that's the point of this discussion.
  • 5
    @Condor HEY, I FORGOT YOU EXISTED! HOW ARE YOU THESE DAYS? IT'S SO GOOD TO SEE YOU AGAIN!
  • 0
    @uyouthe But I wasn't wrong about that, Middle man can change data, HTTPS is a good system, So? I never told it's bad.
  • 0
    @NoMad If you guys are dating I must say, good choice
  • 7
    @theabbie I would but unfortunately I already promised someone else. ๐Ÿ˜› Not every two people with the same opinion are dating, so you might as well just grow the fuck up.
  • 0
    @NoMad I must not have told you guys my age, If I acted like a 50 year old, You people would have agreed with my opinions
  • 7
    @NoMad haha, thanks! Just joined again I guess. Same as usual here, but really started working on the annoyances of technology. Sometimes just said fuck it and wrote my own stuff. Ended up being easier than dealing with the existing "solutions".. career shift from sysadmin mayhaps? XD

    How have you been?
  • 0
    @Condor Don't waste the chat space here, I heard there is a limit, Save this for valuable discussion
  • 2
    @Condor not too bad. I also deleted a while back but frustration with tech brought me back again. How's the pandemic treating you? WFH is fun?
  • 12
    @theabbie then why are you talking?
  • 7
    You guys are being trolled. seriously.
  • 4
    @NoMad huge productivity boost actually, the COVID-19 pandemic! Especially in the first months, VPN access from anywhere and the servers themselves being at the comfort of my home (just reverse proxied from VPS's) really helped a lot. But the stores were plundered! Especially the toilet paper.. the goddamn toilet paper!!!! AAAAAAAAAA
  • 6
    @C0D4 @Jilano that's how you derail a useless convo.
    Amateurs. ๐Ÿค 
  • 3
    @F1973 I use telegram...what is it? This thread was already soooo damn long when I got here I didn’t read more than a few...
  • 3
    @scout we're reaching 300 comments. I wonder, what's the record for the most comments on a rant.
    Does anybody know?
  • 3
    @NoMad I don't know but the OP's JS rant is still winning so far
  • 2
    @scout there's the codrTalk network there on t.me/codrTalk (invite link in that channel iirc), if you'd like we could talk there? I'm @ghnou on Telegram.

    But also tempted to find out what the limit on comments is, if any :D
  • 4
    @100110111 I see. The one where he did research on a language via looking at memes... Perfection! ๐Ÿ‘Œ๐Ÿป
  • 6
    @Condor toilet paper was gone in days here, good thing i keep a large supply.. never know when the end of the world is going to come knocking at the doors.

    @NoMad, what ever do you mean, i'm just hear sharing around the popcorn. i had to mute this thread... its almost as good / bad as a ++ bomb.
  • 2
    @NoMad just over 1200, then things start breaking.
  • 10
    It's the most fun I've had reading devRant in a while.
  • 3
    @scout This isn't even the tip of the ice berg.

    @C0D4 has seen some dark secrets.

    Hahahahahahah I am still laughing at it.

    Also IIRC back in days we had a thread where we breached maximum comments.
  • 2
    @100110111 Don't jinx this. We don't need that one to restart haha
  • 5
    @MySlugLikesSalt oh don't worry, OP will surely come up with a new one soon enough
  • 2
    @F1973 @Condor I'm late as well, I'm very curious. I use Telegram as well if anyone is interested in sharing... :P
  • 2
    Reminds me of the time I was waiting at the bank and someone turns up with a piece of paper, saying they have been given authority to have the spare set of keys..

    Only because the bank didn't have a spare set, was they not able to help them !
  • 5
    ------

    "Buy your next iPhone for Dummies! You can set any password, any time, and we can just ignore it and unlock your phone if you say your ID number"

    ------

    Isn't that how Windows works..
  • 1
  • 6
    We should do a game of drinking bingo and take a shot whenever @Nanos says "Reminds me of.." or "This reminded me of..." or "I'm reminded of...".

    @Nanos don't mean any offense, just making light of your catchphrase.
  • 4
    @Root apple milks customers using other means though.
  • 5
    @iiii it's called capitalism. I don't know if you've noticed it around. It's this new thing everyone is doing.
  • 5
    @100110111 new??? It's soooooo "industrial revolution" and 1900s. ๐Ÿ˜œ
  • 7
    Reminds me when I wanted a safety deposit box at the bank, they didn't do any..

    But for $20 they could give you a shoebox, $25 if you wanted it tied shut with string..

    I asked what security they had to make sure someone else didn't come along and pretend to be me..

    Why, my signature of my course !

    That's it !

    So, I asked them, if I gave them a metal security box locked with a combination (In case someone stole the key..), and written instructions never ever to give me the box to take away, but only to open it there, could they do that..

    Yes, they could :-)
  • 3
    @NoMad

    FX [ Smiles. ]

    Finally I've a catch phase after all these years !

    FX [ Waits for the first TV show that his meme enters.. ]
  • 9
    @NoMad I don't know the actual number but back when AlexDeLarge was still LetMeCode, his face reveal rant got well over 400 I'm pretty sure... And made @dfox add a scroll to bottom button... Lol
  • 1
    @NoMad so this one you mention, okay I get it..
  • 1
    @sarafe not me, @C0D4 mentioned.
  • 1
    @100110111 yeah. I hate it ๐Ÿคฃ
  • 7
    @AlgoRythm I miss him so bad ๐Ÿ˜ข๐Ÿ˜ข I even tried stalking him but his website seems to be gone.
    You know, like when you grow fond of someone but also can't be arsed really befriending them... But his placeholder account @AlexDeLarge is still here.
  • 2
    Shouldn't the comment limit be something like 65,535 ?

    FX [ Checks another system.. ]

    11,000+ there, but only before it fills up to a 4Mb limit. (Since the app was built in 16bit days..)
  • 3
    @NoMad I'm going to run out of vodka if we are playing @Nanos shots.
    Great guy though!
  • 0
    @NoMad oh, okay sorry it's look similiar..
  • 1
    You can order toilet roll on Ebay at the moment, though the post person did look at me a bit puzzled when 18 months supply arrived.
  • 7
    @theabbie Getting rid of those files with a simple delete isn't enough. Anyone can still see them. Check this out.

    https://docs.github.com/en/github/...
  • 17
    @MySlugLikesSalt if you go into his .io repository... He's just doxxing people... Lol

    @theabbie honestly man I know you are still figuring things out but you need to just take some advice and remove your site.

    You messed up and it can have some pretty fucked up consequences. Your whole git log needs to be combed through so you can remove the databases of private info.

    Honestly, it may be worth just deleting your .git folder at this point and starting anew.

    Your views on technology are interesting. I think a good exercise is to implement a proper encryption Algo. Not one they teach on the first week of school, a real Algo used in the real world. They are complex, they are hard, and you will probably fail to complete it. But you will succeed in learning, which is the bigger picture.

    Your information is always your responsibility. If it becomes someone else's responsibility... It also becomes their data. You must protect what is yours, always. It may seem counter intuitive, but @root @nomad @c0d4 ... Everyone here is right; losing your data IS good UX when compared to having your data accessible by those who don't own it (Even if it's the vendor, like Apple)

    Maybe you do not believe this, but as soon as there is an opportunity for evil with profit, bad people will take it. An exercise to learn this: install an SSH server on a virtual Linux machine, and open that to the internet with port 22 open (default). Watch as thousands of requests come in per hour trying to hack you...

    And just as general advice, if you find something generally regarded as extremely complex (encryption) to be "simple", you probably don't fully understand it (the alternative being you understand bit better than everyone else in the world. Use your own common sense to figure out which is true)
  • 1
    So basically what you're saying is that you're dumb?
  • 2
    @AlgoRythm Yeah I know, at this point I'm legit just trying to help not sarcastic in any way.
  • 4
    @AlgoRythm the last sentence. You think... OP... and common sense... in the same sentence?
  • 4
    Pinging @dfox just in case it's worth removing/censoring any comments linking to OP's site, in order to limit discoverability (leading to the JSON file with lots of personal details...)
  • 4
    @100110111 One would hope that even if their grasp of common sense is fractional, if you keep trying, eventually you will find that small fraction which is present...

    @MySlugLikesSalt I doubt that the links here are what exposes him. The GitHub crawlers have already detected email patterns and downloaded his whole repository. The links being on devRant are just icing on the cake.

    @dfox if you do take action, please don't remove the whole rant. There's lots of learning that OP needs to do, and this rant has some good info for him.
  • 2
    @MySlugLikesSalt OP did share them originally themselves, so I'd say the responsibility is on them, but who am I to say
  • 3
    @100110111 Right I'm not worried about OP, more worried about the people having their physical addresses exposed.
  • 2
    @100110111 I can see why OP wants their vendors to take responsibility for their data...

    ...because they have no business doing it themselves!
  • 2
    @AlgoRythm one could always hope, but it may take a few years of trying looking at how things stand...
  • 2
    @100110111 Unlike OP's jiggle encryption, that would take a true brute-force haha
  • 3
    @MySlugLikesSalt @AlgoRythm you're right. For the good of others, vendors taking ownership of and responsibility for OP's data (and others like them) would be a welcome service...
  • 7
    321 comments.
    I'll add that your post is dumb as hell.
    Bye.
  • 0
    @MySlugLikesSalt Please Help Me With That, Is there a method on Mobile without CLI?
  • 4
    @theabbie Not that I know of. Get to a computer with git and run the commands there. Be sure to delete the "details.json" file as well as the HTML file with all Elisha's info. Get rid of her photo from the "files" folder as well.
  • 8
    @AlgoRythm isn't OP a vendor himself at this point? Isn't he failing to protect customer data?
  • 0
    @AlgoRythm At this point complexity of algorithm doesn't even matter, If Apple created some million dollar secret algorithm then it's fine, But, They must have used some algorithm which already exists, maybe with some modification. Then services like "Lastpass" which has similar mechanism is doing Equally great as Apple. The point is Apple is Hyped, Such Encryption is popular and is Used everywhere, Apple doesn't have a secret Recipe, It is No special.
  • 6
    @NoMad he is his own counter-argument
  • 0
    @Creep That is an argument people use when they have 0 knowledge about what's going on but just want to join the majority
  • 9
    Just bookmarking where I finished reading. โฏ๏ธ
  • 5
    @theabbie You need to not be arguing about security right now. You need to be fixing your own data breach.
  • -1
    @MySlugLikesSalt If you guys care so much about data, Apple should've been your last option
  • 6
    @theabbie I never said a word about Apple. I'm talking about Elisha and Tushar and Jaydip and Abhisheik and the sixty others whose info you leaked.
  • 4
    @theabbie Boo hoo. Remember your password and hide a backup of it somewhere. Don't be dumb.
  • 11
    @theabbie My issue is that you keep deflecting the fact that your whole rant (I just re-read it) is about how Apple's encryption is dumb and naive because users may forget their passwords by saying your point is actually that apple is over hyped.

    That's not your point. You have been bullied into abandoning your original point and you chose to find another (much more opinion-based, might I add) point because you didn't want to admit your views on user data and encryption are wrong.

    Just swallow your pride. Everyone has misinformed views on things.
  • 8
    You calling it secure to have encryption backdoors proves your extreme incompetence with any form of cybersecurity.
  • 0
    @MySlugLikesSalt This one was for a previous comment, Yeah, I will try to fix this Breach, One thing about privacy that I know is that Internet is full of emails and Phone Numbers, Crawlers love these but no one is really interested in details from weird sources. It is usable only when they come from a purpose. For example, If each of them was a student, It might be useful to those Telecallers or other services. But these details in itself are unusable unless someone wants to Spam. So, Yeah, Stop overreacting.
  • 3
    @theabbie Exactly what @AlgoRythm said. For example, I used to looooove UWP. I found it easy to develop with, and I thought it was the future on Windows. Since then, it's fallen flat on its face in a lot of ways. It's still the right tool for the job occasionally, but I was very wrong about it in general. We're all wrong sometimes. It doesn't hurt to admit it and then FIX OUR MISTAKES (cough cough)
  • 3
    @theabbie It doesn't matter what people want them for. You doxxed them. If I was a psychopath, I could literally mail a bomb to Elisha (I'm focusing on her because you leaked a LOT of her info). Or one of her family members. By name. It doesn't matter if you think the info could or could not be useful. You leaked it, and that is a big deal.
  • 5
    @theabbie Now I wonder!
    Encrypted Android phones are impossible to unlock without passcode either. Does that make them naive too?
  • 8
    @theabbie

    "I think the fact that even Apple can't unlock your phone if you forget your passcode proves that they use very naive encryption method."

    "Such encryption, though safe is not practical, Imagine if there was no "Forget Password" Option on any account, I usually forgot my password very often when I was a child."

    "Reset Password is a weak point which might be exploited but in such cases, usability is more important than security."

    These are from your original post, they are your original point, and they are why you are getting so much backlash.

    Your point was NOT "Apple is good but they don't deserve the hype". Your point was "Apple is stupid because they wont let you reset your password". Here is an actual quote from your post to prove it:

    "Any service which doesn't allow resetting Password is a shitty service and I would never use such a service"

    Just give up arguing
  • 5
    @theabbie stop calling people names and look at yourself first. Everyone is entitled to their opinion, and so people who like or dislike Apple for example. You’re like a cat. Never falls on its back. In your case admit you were wrong and move on fixing your data breach. I think at this point you’ll do everyone a favour.

    Not trying to be sarcastic or anything, but you’re only making a fool of yourself.
  • 7
    @theabbie I'm *this* close to actually letting the people whose data you've leaked know that you've leaked their data. And if I get that far I'll make pretty damn sure they'll be pretty damn pissed at you for doing so. And if *I* don't do it, someone will. Or worse. So fix it instead of arguing here. You can continue this immature stupidity once you've dealt with the real issue, okurrr?
  • 0
    @MySlugLikesSalt It's only the information I know, apart from email and phone rest of information can be determined if someone is actually targeting her. Yeah, It's wrong, I admit it. But That's not what this discussion is all about.
  • 2
    @100110111 I've already let a couple of the people know. I grabbed the email addresses and strongly considered just sending out an email blast.
  • 0
    @PrivateGER No they are not impossible, Not all to be more precise. Could you specify an example instead of generalizimg All Android Phones. There's too much Diversity in Android unlike Apple.
  • 1
    @theabbie at this point that's exactly what the discussion is about
  • 1
    @MySlugLikesSalt figured you would have :)
  • 13
    We have successfully found the answer to "how many smart adults does it take to convince an egoistic teenager?"
  • 2
    @theabbie Jesus fucking christ
    Read this and shut up
    https://source.android.com/security...
    "yOu caNt gEnerAlIzE aNdrOiD"
  • 0
    @AlgoRythm Yeah, Such services are shitty because they are doing nothing special. They can keep their database public and still it would be useless. They are not good at the only thing they are known for. That's not security, that's fooling people.
  • 3
    @100110111 Yeah I'm torn. This is the sort of thing that *shouldn't* be a big deal, but there's always that possibility of the wrong person getting the info and it becoming a VERY big deal. If OP won't listen to me here, maybe he'd listen to 64 students at his school yelling at him.
  • 4
    @NoMad no we haven't because we haven't convinced OP yet
  • 0
    @PappyHans Then Give one reason why Apple not Hyped? What is so special about it? It's just Encryption, however complex it may be. They can't use that as a selling point when majority of their userbase has no technical background.
  • 2
    @theabbie how is Apple's encryption of less value than any other vendor's? Also, saying encryption isn't hard means you don't know donkey's sh*te about it (as you for sure are no expert on the matter)
  • 1
    @theabbie Yes they can. What are you smoking? Have you seen a *single* ad of Apple? Have you ever interacted with a single person *using* an iPhone?
  • 0
    @100110111 Then Please Give me the Required GIT command to do so, I am not that professional
  • 4
    @theabbie also, nobody cares whether Apple is hyped or not. It's completely irrelevant and not your original point. Stop arguing and fix your problem.
  • 0
    @MySlugLikesSalt Why are you punishing them if Anger is for Me? Don't do that
  • 3
    @100110111 the answer is "infinite number". ๐Ÿ˜› Perfectly acceptable answer, theoretically.

    I'm just worried this all may take a toll on him. Don't want his mental health going down the drain because of his ego.
  • 2
    @theabbie funny coming from someone who has the gall to call themselves a full-stack dev...
  • 0
    @NoMad It takes 1 adult, but that 1 adult should be wise enough to admit that they can be wrong.
  • 1
    @NoMad I may just be past caring. Also, they'll recover.
  • 2
    @theabbie I'm not punishing them. I'm not angry at you, either. But I sure am frustrated. Just stop arguing with us here, get to a computer, and remove those files.
  • 0
    @MySlugLikesSalt Well, Don't target them, They didn't argue with you, I did, Punish me
  • 2
    @theabbie I'm not targeting anybody. I'm trying to help you here, dude, as well as them.
  • 0
    @100110111 Have you even worked with Encryption? It might be the toughest thing in the world, but if many services are doing that, Apple is just one of them.
  • 0
  • 5
    @theabbie you do realize what @MySlugLikesSalt is doing is punishing you, because the people whose contacts you leaked are likely getting a somewhat polite email letting them now you f'd up, but YOU are going to get a hell from them, most likely.. punishing and by extension helping
  • 1
    @100110111 GIT has nothing to do with your dev Skills, It's just a skill, And If you can't help, you're no good either
  • 0
    @MySlugLikesSalt None of you know the required GIT command?
  • 7
    Just a side note: I got pretty worried when I saw the "videos" folder in the "love" folder...
  • 9
    @theabbie you're legally an adult now. No one is responsible for you. Your stupidity is your own, and so are the consequences.

    The problem is not others. It's your rigidid mentality. I for one am not going to admit wrong, because by all available logic known to men, you're not right.
    Neither can you gaslight anyone to admit you're right, nor can you twist any arms. Become a monarch, maybe then someone would fear you enough to back you up.
  • 1
    @theabbie I just sent you a link that lists the steps in detail, along with the gut commands
  • 3
    @theabbie I'm just ashamed on your behalf because you are apparently not capable.
  • 16
    I have sent out an email and already received a response from one of the classmates. They did not give permission for their info to be posted, and are not happy. They will be trying to convince OP in person to fix the issue.
  • 6
    @theabbie you know what would be punishing them? Forwarding their info to a voice phishing company. Or worse, selling their info on the black market. Or even worse, sharing edited versions of those videos.

    This is why you need encryption and locks.
  • 7
    @MySlugLikesSalt The nuclear option. Nicely done.
  • 7
    @MySlugLikesSalt a painful lesson to learn, but an important one. OP claims this information is okay because it's what they already knew off the top of their head, but OP fails to realize that doesn't make sharing it okay.
  • 0
    @AlgoRythm That's not me, and yeah, It was last of a webpage built upon request by the concerned people. It's fine. They asked for it
  • 11
    @theabbie Really? Because Aaditee Pate said, among other things, "We weren't told or asked before our address was put up on the internet. We are saddened to see that one of our classmates has put our identity in threat. We will try to convince him."
  • 2
    @theabbie there are like 12 people who where trying to explain it to you for a couple of hours already, I don't have to give you any other argument.
  • 12
    ... and I’m out of popcorn. Off to the store to restock for this yummy controversy ๐Ÿ”ฅ๐Ÿ”ฅ
  • 13
    @theabbie You go to hell first for leaking private info.
  • 2
    @theabbie your classmates might disagree. I've seen 18yo dickwipes grow up into half decent human beings before, so maybe they can hammer some of that into you too. You are making a massive fool of yourself, you know?
  • 14
    @theabbie it might not have even been anyone here. Your shit is on one of the largest open source websites of all time. Your data is already stolen.

    You have a local copy of the website right? DELETE your repository from GitHub RIGHT NOW. Take it down if you can't figure out the commands. You won't lose your code if you still have it on your computer, obviously.

    You are literally already seeing the consequences of doxxing your classmates.

    Make. Smart. Moves.
  • 3
    @sortoftested since you missed this thread, tagging you here.
  • 10
    @C0D4 look at this... HAHAHAHAHAHAHAHAHAHHA

    @theabbie what happened to your security now? We just focused on UX as you preached it. tch tch... little baby angry..

    Do you have any idea that you can even go to jail for what you are doing?

    Whoever did it, great fucking job. ๐Ÿคฃ๐Ÿคฃ๐Ÿคฃ๐Ÿคฃ๐Ÿ˜‚๐Ÿ˜‚
  • 6
    Whoa
  • 9
    @theabbie Apple is hyped and overpriced. But not because of security. We've been telling you this all-fucking-along. I bet most people in this thread are Linux users anyway.

    It's hyped because it has a pretty design, it is expensive, and it's easy to use for tech-illiterate users.

    BUT NOT BECAUSE OF SECURITY OR ENCRYPTION OR INABILITY TO RESET PASSWORDS.
  • 5
    @NoMad I dunno man, I almost needed to change my pants after I heard that you can't reset the password on an iPhone 11X

    Oh god, I'm hyped just thinking about it.... Oh yes.
  • 10
    And thus, the first sign of intelligence from OP buried under 400+ comments....

    I bet his friends(?) all started blowing up his phone, lol
  • 9
    @theabbie Well done removing the page.
  • 7
    @AlgoRythm ex-friends I presume
  • 10
    Small step for mankind, huuuuuuuuge step for @theabbie !!!
    Congrats on growing some sense!
  • 4
    @theabbie well done ๐Ÿ‘๐Ÿป๐Ÿ‘๐Ÿป now what were you saying about security?
  • 5
    Nicely done. I'll delete my local copy.
  • 11
    Yes, apparently his friends convinced him to remove the data. He collected it from a college spreadsheet.
  • 8
    @MySlugLikesSalt Oh my fucking God he literally just exposed private information from a source that wasn't even his own lol. What possibly made him think that's okay?
  • 9
    I received responses from 4 or 5 different classmates. They were quite interested in this little bit of info... :P.
  • 7
    Only took...407 comments.
  • 13
    @PrivateGER Same, and I suggest anybody else here who has a local copy do the same. He fixed the problem, and we shouldn't continue it IMHO.
  • 7
    @MySlugLikesSalt you're one active fella! Good for you tho. Lazy people like me didn't even fucking bother...
  • 6
    @PrivateGER @AmbientTea I know you guys have forked the Repository which still has the data, I did my Job, Now please act professional and delete your forks. That's enough lesson for me.
  • 6
    OP, usually very active in this thread, has now gone MIA. (Edit: he came back while I wrote this, lol. Still was gone for an abnormal amount of time)

    I think his entire list of around 50(?) people may be calling him and voicing their concern personally.

    As it would seem the data leak had origins from some sort of college spreadsheet, we should only hope OP doesn't get expelled for his stupid decision. Doxxing classmates is definitely a punishable offense with serious ramifications.

    Sorry you had to learn the hard way OP.
  • 0
    @MySlugLikesSalt I did my Job, Now please act professional and STOP, and maybe delete that info.
  • 2
    @theabbie tf you talking about?
  • 1
    @AlgoRythm I have learnt the lesson, I guess, The HARD way
  • 1
    @theabbie What are you talking about? As I said, I've already deleted my copy of the information. I also requested that everyone else do the same.
  • 2
    @PrivateGER there were four forks of his repo when I last checked. None of them were mine, I'm not even logged in on my phone.
  • 1
    @PrivateGER Not you specifically, Whoever has that copy, bother to DELETE that, You don't have to be evil
  • 2
    @theabbie why did you tag me if you did not mean me lol
  • 2
    @MySlugLikesSalt I don't think anyone will do that, Anyways, Please don't play any further games, I may face consequences, You guys are not evil, I learnt my lesson, I don't want to suffer more
  • 5
    @uyouthe and C0D4 might be the other two. And others who raised concern.
    C0D4 is currently sleeping. Give him a few hours. (it's very early morning there)
  • 0
    @PrivateGER Sorry, I mean all of you
  • 2
    @theabbie I'm not doing anything further. I deleted the data that I had, and any classmates who are responding to me (which is about 7 of them by now) I am letting them know that you have deleted the data.
  • 0
  • 0
    @theabbie you seem angry. Why is that?
  • 2
    @MySlugLikesSalt Thank you so much, That was the maximum damage an internet stranger can cause, Maybe more, I am not challenging you
  • 0
    @100110111 I really don't like such a punishment, You guys ruined the Trust they had on me. No one does that to an internet stranger, especially over a stupid Rant
  • 8
    @theabbie maximum damage? Oooh no, far from it.
  • 8
    @NoMad @theabbie our worst fears are confirmed, OP's repo was forked by a bot

    Doing a quick search for the repo name on GitHub reveals that https://GitHub.com/fossabot cloned his repo and it is now probably permanent...
  • 8
    @theabbie you ruined the trust they had on you, not us
  • 3
    @theabbie believe me, there can be done much much worse things with that data
  • 8
    @theabbie We didn't ruin their trust in you. You did that by posting their personal information where I, a random person, could get it. I had no intention of telling them until you refused to delete it.
  • 1
    whoever has Github Username CarlosBeltranV please forgive me and delete the fork, I am already fcked
  • 3
    @AlgoRythm looks like maximum damage might hit OP after all spite of our best efforts...
  • 2
    @AlgoRythm he can just DMCA that
  • 0
    @100110111 I was trying to correct my mistake, You guys didn't even give me a chance
  • 4
    @theabbie it does unfortunately sound like you may have learnt no lesson here, as I feared...
  • 5
    @theabbie we gave you hours. Many hours.
  • 0
    @MySlugLikesSalt I never refused to delete it, I was figuring it out but you did that Bombing before I could
  • 6
    @theabbie I don't have the patience to scroll through all the comments again but I am pretty damn sure people tried to convince you to take it down and you just kept arguing about Apple
  • 0
    @PrivateGER DMCA ain't free
  • 7
    @theabbie i think you’re missing the point again on this. You have no enemies here. Everyone was simply trying to help you, by pointing out what you had published. You were too busy arguing that this information is not useful and people already agreed to publish their personal details online. There is a lot worse that could’ve happened trust me.
  • 2
  • 3
    @AlgoRythm I wonder, when did the forking happen? Today or before?
  • 3
    @NoMad Jan 10 apparently
  • 9
    @PrivateGER OP explicitly had an MIT license in the code, so he's fucked. No copyright claims possible there.
  • 4
    @PrivateGER Oopsie. Y'all did what you could and even then it was too late...
  • 5
    @AlgoRythm Ah. Well then.
  • 8
    why would you MIT your personal website-
  • 9
    @NoMad @theabbie

    I deleted it but I had everything. All your creepy CSVs, all your college photos, all your videos where you (it's clearly you, there is other data there that indicates that it's you in the videos) and your gf are having fun, all your data about people you exposed. I had everything.

    You know what's funny though? You bashed Apple, and I use MacBook. Now I don't have your data but Apple still has because everything I delete goes into "recently deleted", that's iCloud and by extension Apple servers.

    Good luck.
  • 1
    @PrivateGER you surprised?
  • 6
    @theabbie you told me that it wasn’t a big deal and I should stop overreacting. You told me that info didn’t matter. You told me you had their permission to post it. You continued to just argue about Apple. That all indicated to me that you had no intention of deleting it.
  • 5
    @PrivateGER @NoMad the CSV files are there

    OP released his classmates data under an MIT license and a bot picked it up before any of us could even help out.

    It's a nightmare.
  • 2
    yeah, fork has everything lol
  • 4
    @AlgoRythm omg that’s where “my code is free so license doesn’t matter” can take you
  • 4
    Oh I’m late. So what exactly happened?
  • 3
    @AlgoRythm it does say a friendly bot. Maybe he could contact the maker/responsible body and ask them to delete?
  • 1
    Would someone pls summarise
  • 1
    @theabbie I deleted my fork already.
  • 0
    @NoMad it shows 6 hours ago
  • 1
    @theabbie dude, I'm not on a computer. I can't see jackshit. You have to be specific.
  • 7
    @scout a guy fucked up and exposed everything he had to the internet and it spread around, things like he and his gf vids and creepy CSVs with some random people personal data. He did it while arguing about how bad Apple security is and how he can invent a better one
  • 5
    @NoMad if it were me, I would already be panic typing my apologetic essay to any contact information I could find, pleading for help and forgiveness.
  • 3
    @theabbie kyu? Fatt gayi gaand?

    Awwwww I was outsmarted by a 18 year old.

    Chutiye delete kar ye account aur nikal yaha se.
  • 4
    @scout and for some reason he released it under MIT and then a bot picked it up so now his classmates are all doxxed until the owner of the bot is polite enough to help (if they do)
  • 3
    @AlgoRythm I don't expect that much sense from him. He's probably already in the state of panic anyways.
  • 1
    @theabbie ะฑั€ะฐั‚ะธัˆะบะฐ ะทะตะผะปั ะฟัƒั…ะพะผ ะฝัƒ ั‚ั‹ ะปะพัˆะฐั€ะฐ
  • 0
    @uyouthe You can delete that Right? Please don't take this any further, I was fixing that but these guys did it before I could do anything.
  • 8
    @theabbie I can’t, it’s on the Apple servers now. I don’t know what apple does with that data now. I don’t have it anymore.

    You better believe now that Apple security and privacy policy are good. How ironic
  • 2
    @theabbie A bot has forked your public repo under the MIT license. You're out of luck, better hope nobody else ever stumbles across it. Maybe send a mail to the bot owner.
  • 4
    @theabbie he's being a dick. @uyouthe's dick pics and your info are all in one trash. And Apple can't expose personal data even if it's in trash. (ironic, I know)
  • 1
    @theabbie your content is still accessible.
  • 5
    @theabbie you could do it when I was texting you here eight hours ago or so about how you’re gonna go to jail. You had enough time
  • 5
    @uyouthe it's ironic, but also the least of his concern right now haha

    Current status: still snatched up by a bot.
  • 2
    @NoMad my dick pics already on twitter and only fans but abbie’s vids aren’t
  • 7
    @scout dude talked shit about apple and security revealing total ignorance. Someone found a lot of personal data of his classmates stuffed into his homepage files, including addresses emails phone numbers and some girls height end weight (!). He refused to remove them claiming he got permission and proceeded to talk shit for hours. @MySlugLikesSalt sent a bulk email informing these people and they responded. The kid removed the data from the repo but he had it on MIT LICENCE so some boy forked it already.
  • 5
    @theabbie well maybe you should not have that kind of information up in github in the first place? I know you're young, arrogant, ignorant, hard headed and a noob, but that's just common sense. I am sincerely sorry you'll have to go through learning the hard way, but if that's what it takes then it is what it is. The most valuable lessons are often learned via hardship, and yours haven't likely even started yet...
  • 22
    I've already emailed the fossabot owner to request they take down the repo. If OP won't try to protect his classmates data then I frickin' will.
  • 2
    @uyouthe I'm mildly amused and can't believe anyone on onlyfans would pay to see yours. But oh well ¯\_(ใƒ„)_/¯
  • 3
    And also, I don't know how GitHub.io works very well, but your site is still available.

    Maybe it takes some time to come down or something.

    But https://theabbie.github.io/ is still out there
  • 5
    @NoMad don't underestimate people's perversions ;)
  • 5
    @NoMad you’re just like abbie, talking about what you know nothing about. Femboy is extremely popular thing there
  • 6
    @MySlugLikesSalt awww ๐Ÿ’ž that's very nice of you. Even if OP doesn't appreciate your active defending, I have to say, you've restored my faith in humanity.
  • 4
    @MySlugLikesSalt thank you soldier for being the hero these kids need..๐Ÿ’‚
  • 3
    Oh whoa
  • 1
    @100110111 @uyouthe ๐Ÿ˜ณ okay, I take it back.
  • 5
    OP, I actually love you. Your blog is amazing
  • 1
    Thank you whoever sent the second email, If you had not sent the forked link I could have told github to remove it before anyone would find out, Now, they are more concerned
  • 7
    @theabbie They should be concerned.
  • 1
    @MySlugLikesSalt I did say I am trying to remove it
  • 6
    @MySlugLikesSalt we need more like you.

    Thanks for being a good human being and supporting privacy.

    This guy deserved a kick and we even found his Firebase API key apart from private information.
  • 6
    @theabbie Github can't legally remove it, you set the MIT license. Anyone that has forked legally owns your code.
  • 4
    @theabbie secrecy is not the answer to a data leak.

    Imagine you were in their shoes. You would want to know that the issue is still present, correct?
  • 7
    @NoMad, I have now officially become a @MySlugLikesSalt fanboyo, however it requires much more than that to restore my faith in humanity
  • 4
    @AlgoRythm WHAT THE FUCK IS THAT?!! did he really go all racist in his blog?
  • 0
    @uyouthe You don't have control over Backup, what kind of Backup is that?
  • 8
    OP cam
  • 1
    @theabbie I can restore data. I can delete data so I don’t see it anymore.

    I can’t guarantee though that the data is really gone from Apple servers
  • 7
    @NoMad yes, I'm fucking laughing my ass off. The article is incomprehensible too.

    A link for the curious mind...

    https://theabbie.github.io/blog/...
  • 4
    "Suicide bombing" LMAO
  • 8
    OP in a nutshell
  • 2
    @MySlugLikesSalt Thank you so much kind man
  • 7
    @AlgoRythm fuck that blog is hilarious. A very good addition to OP's CV when he wants to get a job in any modern company, especially the inclusive startups
  • 3
    @NoMad that blog was full of facepalm worthy racist content and shit posting etc
  • 4
    @theabbie maybe try asking him if he can get a backdoor entry to Apple's server because fuck security right?

    Usability important hai. Security is not needed na.. ab tera data nikaal backdoor se.
  • 0
    @F1973 Firebase API key is not private, It is supposed to be put on webpage
  • 11
    There was also cv where he wrote he wrote he was ceo of his own webpage for 5 years.
  • 4
    @AlgoRythm keep digging. We saw some shit in there ๐Ÿ˜‚๐Ÿ˜‚๐Ÿ˜‚๐Ÿ˜‚

    @theabbie ads clicking gone?
  • 5
    @uyouthe yeah, reading the blog helf me back from helping OP for a while...
  • 18
    Currently me going through this thread
  • 9
    @theabbie maybe you can show Apple your face and they'll let you in on your data since it's identifiably yours?
  • 8
    @100110111 @AlgoRythm
    "how to become a 9gagger"... I can't believe my eyes... I'm officially done here.
  • 1
    I can still see 2 forks

    https://github.com/CarlosBeltranV/...

    https://github.com/SnA2502/...

    If possible remove it whoever owns it
  • 9
  • 3
    @theabbie missed one, and this one fucks you over
    https://github.com/fossabot/...
  • 4
    @theabbie both say in description "forked from fossabot"... So forked from forked...
  • 4
    Here's a ss of the insights page
  • 0
    @PrivateGER That can't be controlled by us that's why I only gave those 2
  • 20
    Why did OP's shitty data leak get more forks than any of my projects ever have? ๐Ÿ˜‚๐Ÿ˜‚
  • 4
    Fossabot seems to belong to a company, it should be possible to convince them to drop the repo.
  • 6
    @theabbie they seem all to be forked from the botfork, so good luck with that. You, kiddo, are f'd.
  • 3
    @AmbientTea yeah but you would need to also contact those other people that forked it from the bot

    @100110111 is just totally correct. At this point, the data is leaked. Those people who forked it have the data on their local machine.

    It's over OP. No more way to fix it. Just hope for the best.
  • 9
    @AlgoRythm right? i got one star and no fork. all I should've done is leak phone numbers of the people who still talk to me.
  • 6
    @AmbientTea Yeah I'm hopeful they will as well. I emailed GitHub support about the other two forks. I'm sure they won't/can't do anything, but I'm hoping that they have some sort of clause in the ToS that would allow them to remove the repos.
  • 4
    @AlgoRythm So long as they keep all their cloned repos locally, yes. I sure don't. OP can only cross his fingers that they don't, either.
  • 4
    @AlgoRythm a) peaked interest today. b) most likely had ongoing commits, which made it look like legitimate open source work.
  • 7
    @MySlugLikesSalt I'm pretty sure storing personal data in a repo that you haven't acquired permission to is illegal even without ToS, so I'd expect github support to take action if any human sees your message. Not 100% sure tho.
  • 10
    Did someone talk crap about crapple?
  • 6
    I feel really bad for the people whose data got leaked...
  • 7
    @Linux Attempted to. Then we found a CSV file and a fuckton of personal info of others on their website repo. So...
  • 4
    @AmbientTea I hope so. I also pinged them on Twitter so a human hopefully sees it.
  • 14
    @Linux lol.... You are so late to the party... Welcome to the most disappointing but entertaining thread in the history of devRant
  • 9
    @theabbie you know what?

    You fucking deserved it you half witted absolute carrot.

    Being arrogant and ignorant for no reason when people are being helpful to you will only lead to this.

    This could have been worse. People here are nice who saved your ass by causing minimal damage and are saving you more damage.

    If this was in some other country, you would be in jail by now.

    I am sooo pissed at you and at the same time hysterically happy that you were taught a good lesson. Retards like you are the reason why this country is an absolute gutter. You fucking rat.

    Remember, be humble in life. Arrogance will not lead you anywhere. If you still have a bit of self respect left, make an apology post to everyone and thank them for saving your ass early on.

    Fucking moron.
  • 7
    @F1973 and I hope he has a big apology planned to his classmates.

    I'm sure many of them barely even know him.
  • 5
    @AlgoRythm I did not think this could become more entertaining than OP's yesterday's JS thread, but my oh my was I wrong.
  • 5
    @AlgoRythm man did you check the Elisha page? That was some next level creepy where he mapped his class mates ex bfs and hair colour and what not.

    I doubt he might be even knowing anyone of them and just had scrapped data since most were girls in that csv.

    And his main page said "he was single โค๏ธ"
  • 2
    @100110111 what's about this JS thread everyone is mentioning?

    Was it even more entertaining?
  • 5
    @F1973 just check op's recent rants. you'll NOT be dissapointed
  • 7
    @F1973 I have sanity to maintain... I will dig no further...
  • 3
  • 14
    @100110111 and we broke the comment count too... By a lot.

    OP is singlehandedly reviving devRant
  • 3
    @AmbientTea one of his rants he was begging for ad clicks. I tried to reason but realised I am hitting a stone wall.

    @AlgoRythm lol ๐Ÿ˜‚
  • 3
    @AlgoRythm ahhh the good old days are back.
  • 5
    If these 68 people are real, they have no fucking clue.
    Why would you do something like this man ?
    It's people like you I'm afraid of.
    The worst part is you don't even know what you did wrong.
    And you made it even easier.. providing csv and json ๐Ÿ˜‚
  • 2
    @100110111 oh yess.. I didn't know this thread also went that long and entertaining.
  • 10
    @-red They're very real. I've been corresponding with a bunch of them for a couple hours now.
  • 6
    @-red people like OP are the reason I sometimes think not everyone should have access to the internet...
  • 4
    @MySlugLikesSalt did you manage to get nudes?

    If no, then I am heavily disappointed in you.
  • 2
    @F1973 I'm so sorry to let you down
  • 7
    Oh no.149 more people in contacts. ๐Ÿ˜ฑ
    Okay I'm gonna stop now. Can't see this.
    Enough. ๐Ÿ˜ฑ
  • 2
    @F1973 it got better toward the end.
  • 2
    @100110111 just like this one.
  • 3
    @NoMad "Pfff! Like I care...! I mean it's not like I'm jealous or anything! God! You're such a pain!"

    *Runs away crying*

    PS: I'm hungry, what's for dinner?
  • 4
    @-red WHAT? there's more? :o
  • 11
    @Jilano I SEE THAT YOU JUST GOT HERE! READ THE WHOLE FUCKING THING. DON'T MISS A FUCKING COMMENT OF THESE 550+ COMMENTS!!!
  • 5
    OH MY GOD I JUST REALIZED THERE"S MORE PEOPLE IN THE CSV๐Ÿ˜‚
  • 4
    @-red oh shite...@MySlugLikesSalt there are indeed 149 other people whose contact info is compromised (some may be same)... Oh wow. @theabbie, seriously?
  • 3
    @AmbientTea Oh yeah. There was another file, but it was mostly just names.
  • 15
    @Jilano @NoMad It's so fucking funny that @root starts off these 500+ comments with "are you an idiot"

    ...and LITTLE DID SHE KNOW
  • 5
    @MySlugLikesSalt and phone numbers. But you are right, nowhere near as bad as with addresses and everything
  • 8
    @NoMad RIGHT?! I WAS JUST YELLING TO REACH THE BOTTOM, BUT I'M AFRAID THERE ISN'T ONE

    ALSO, WHY ARE WE YELLING?
  • 1
    @100110111 Wait, maybe it's a different file than I saw? The one I saw only had names and a couple addresses. No contact info.
  • 2
    @AmbientTea there's always more. There's always has been more.

    You didn't know where to look. OP had it served for you already.
  • 3
  • 2
    @100110111 Yeah that's what I saw. Maybe I didn't scroll far enough. I saw just names and a couple addresses.
  • 5
    have yall seen elisha-gras.html
  • 8
    @AlgoRythm oh, no one could see where this could end... Even I learned valuable lessons in humility and data security.
  • 4
    @PrivateGER Yep, that one was creepy. I mentioned her specifically in my email, and told her there's even more info on her out there such as family and more.
  • 3
    @MySlugLikesSalt you need to scroll to the right for the numbers...๐Ÿคฆ‍โ™‚๏ธ oh god save us
  • 7
    @AlgoRythm so out of curiosity I went and checked his website.

    And shared with @C0D4 who then got access to some admin panel.

    The I found the sitemap and announced here.

    Meanwhile C0D4 found some basic CSV and said we can reach home.

    I digged further and found the details.csv and we both discussed how it can get OP fucked.

    We thought we should inform OP but then chucked it because OP was being an asshole.

    And then via the comment thread folks might have found it since links were here and rest is history.
  • 11
    @AlgoRythm It's almost an ad at this point: "Every revolution starts with an act of defiance"

    In this case, @Root saying "are you an idiot" :D
  • 3
    @PrivateGER @algorythm seee I told you. Check Elisa
  • 8
    FWIW I did send this thread to multiple victims who requested it and I know some of them at least are reading it :).
  • 5
    @F1973 @MySlugLikesSalt @nomad WHERE IS THIS LIST OF 4K USERNAMES FROM OP?
  • 6
    @Jilano because of excitement. But seriously, read the whole thing. It's a whole Mahabharata about security.
  • 2
    @AlgoRythm more important question is where is OP? ๐Ÿ˜‚
  • 0
    @MySlugLikesSalt Why would you do that? please don't do anything more
  • 4
    @F1973 smacking himself repeatedly, I would expect
  • 7
    @AlgoRythm I was expecting plain text passwords accompanying the user names because OP has trouble remembering their passwords....
  • 4
    @theabbie They asked for it.
  • 1
    @theabbie give me one reason why he shouldn't? Security is stupid anyway, right?

    We are now doing what you taught us.
  • 8
    @theabbie ... and they had every right to ask and every right to read, and every right to come at you with pitchforks.
  • 7
    Guys this rant literally crashed my phone. Last thing I remember is seeing my comment duplicate itself 3x
  • 2
    @MySlugLikesSalt should have created pornhub accounts and subscribed them for mailers. ๐Ÿ˜‚
  • 8
  • 3
    @AlgoRythm but it crashed OP's heart as his crush Elisha came to know the webpage and rejected OP
  • 6
    @rgab1508 Are you one of the affected? My condolences... I would almost pay money for you to post about your side of things
  • 8
    @rgab1508 Oh hey I know who you are :). Good to know you're keeping an eye out here so you know what's going on...
  • 3
    @NoMad I'll try but not right now. The day has been way too long already!
  • 0
    @rgab1508 kaise chutiyo se dosti ki hai bhai tune?
  • 3
    @F1973 He's reading it. He's one of the people I emailed.
  • 5
    This data was collected by the college in google sheets which was open
    So anyone can see the data of others
    if they had the link of the sheet.
  • 2
    @MySlugLikesSalt hopefully he realises and spreads the word in the local network of what exactly happened.
  • 1
    @F1973 mujhe tho pata nhi tha.
    itne sare files hai mai kaha se deku sab
  • 7
    @theabbie we are nice people. We could have done SO MUCH MORE DAMAGE to you (and you would have deserved it, as @F1973 pointed out), and to THE VICTIMS (which would DEFINITELY NOT have deserved it)... if this leak ends up causing THEM some real damage, they would be well in their rights to drag you into court and get you jailed (and would be even know - if my personal info had been leaked like this, I'd make sure you'd at least be paying a substantial fine if not going to jail - and if it had been a loved one of mine whose info was leaked like this, your parents would be lucky to see you again, alive)
  • 11
    @rgab1508 so the fault is Indian education system

    @sortoftested @heyheni see I told you. The college's are shit so this kind of legendary output is expected. Wonder what kind of crap you deal with Infosys everyday.๐Ÿ˜‚๐Ÿ˜‚๐Ÿ˜‚
  • 2
    @rgab1508 bhai humne andar aisa sab dekha.. dimaag ghum raha tha.. fork ho gaya hai data.

    People are trying to help you friend to get it down. If it was in wrong hand, y'all would have faced some serious damage.

    Starting ke comments padh aur dekh kaisi baatein kar raha tha ye..
  • 5
    @rgab1508 Like *anybody* in the world if they had the link, or just students if they had the link?
  • 5
  • 1
    @100110111 this. You summarized well.
  • 2
    @rgab1508 Wooowwww big yikes! At least it's not discoverable that way, but still not good...
  • 2
    @rgab1508 wow, just wow.
  • 9
    @rgab1508 So your school just releases this information.

    Now I know why OP is so misinformed about his ideals.

    He has been sparking much controversy here, though. His posts have attracted more comments than any others in recent history.

    Mostly because of his bone-headed and stubborn nature
  • 3
    @F1973 I have been reading the comments
  • 7
    @AlgoRythm no Jase once broke the comments record.

    We had this stupid trend of tagging each other and saying Hi or something.

    Me, Jase and Josh. Then out of frustration Josh wrote a script to annoy the shit outta Jase and they crashed Jase's thread.

    Reached some 999 or something. I am slowly recollecting.
  • 5
    @F1973 yeah but that's a TAS.

    These are all organic comments.
  • 6
    https://theabbie.github.io/sitemap.... is still accessible. There is no need for forks. I have no words.
  • 1
    @uyouthe Private data is not accessible now, So, it's fine
  • 4
    @theabbie it's never been fine lmao
  • 3
    @uyouthe I did everything from my end, The damage can't be restored, I did a great mistake, That's a lesson that will remain for life
  • 7
    @theabbie but damn!!! I couldn't sleep tonight realising I was outsmarted by an 18 year old. Damn!!!

    Cmon.. be a good sport.

    You are losing all that ad money by making it private.

    You are not a bad businessman, are you?
  • 13
    I’m gonna hire @theabbie as a chief cybersec advisor for my startup
  • 0
    @F1973 No, I am not losing a single penny, Site is still live, MIT License sucks
  • 6
    @theabbie should have read the damn license
  • 6
    @theabbie MIT License doesn't suck per se, just that no one even remotely informed would in their right minds willingly have their private website under MIT.
  • 5
    @PrivateGER since brits left he got no loicense to read that loicense
  • 1
    @PrivateGER if he had read he wouldn't be in this position in the first place.
  • 7
    @uyouthe "oi mate, you got a loicense for that loicense reading?"
  • 9
    @theabbie in the future it might be a good idea to study such things before doing possibly idiotic things. Study, kiddo, study humbly.

    Also, one key takeaway from the last few days worth of threads would be to start listening to the pros. Especially when there are a dozen plus of us agreeing with each other. We are not here to be mean, or to belittle you, or whatever you may believe, but mainly to help each other in this community of hours... That said, you still convinced we are wrong about security or JS?
  • 4
    @F1973 I'm not convinced. That would imply the ability (or willingness) to comprehend what they were reading...
  • 3
    @100110111 he got nothing
  • 3
    @F1973 I fear you may be right
  • 3
    @root finally read all comments and caught up with us. How was the ride madame?
  • 8
    There are guys like @Root or @linuxxx who know a shit ton about cybersec. But instead of asking them and possibly getting three weeks of studying worth of information in one comment you decided to be a dick
  • 17
    devrant agreed one something, universally
    this never happens
  • 2
    @PrivateGER my point exactly ๐Ÿ˜‚
  • 7
    @PrivateGER Come on, don't say that. Wasn't there this thing when.. when... I mean... Yeah. You're right.

    I guess this was an exception because someone "forgot his place"
  • 12
    I took a look through all of the sensitive data you posted (without permission) before you deleted the repo — not that it matters with all of the clones and forks out there.

    Were I a more evil person, @theabbie.

    I might check in on you again at some point, just to see if you actually have learned anything. For now, I’ll keep your contact info naïvely secured behind a nice, useless, unbreakable lock, okay?
  • 9
    @theabbie Don't take any of what happened today as anybody here hating you as a person. We don't hate you. We hate what you did with that info. The best you can do is to think things through more thoroughly going forward.
  • 12
    @Root Great, I hope my classmates would forgive me, Though damage is permanent, So is the lesson, I should stop treating GitHub as cloud storage. In the end, I would like to admit that I was the only idiot here.
  • 4
    @MySlugLikesSalt I wish you had given me atleast a FINAL warning before that EMAIL BOMBING, Anyways, I deserved it
  • 5
    @theabbie It probably would have been better if I'd done that, I'll admit.
  • 5
    Congratulations guys, All the Forks have been disabled, Now it is only with people who had created local clones, You are good people, you won't mess with it, I know, Now, the damage has been Restored, Thank you for letting me know That I am an idiot, Had great time here. See you tomorrow with another Stupid Rant.
  • 7
    @theabbie Sweeeeeet GitHub disabled them. See you tomorrow
  • 19
    Well, that was a fun 1 hours read...

    Hi, OP! I'm Linuxxx, one of the oldest devRant members. I currently work as a cybersecurity engineer and have been a cybersecurity person (not official) for about 10 years now.

    For everyone who said that apple has good encryption; I don't agree since I can't check. The source code is proprietary so we can't check shit.
    I do NOT mean that (assuming they're right about their encryption for a moment) they're implementing it wrong, the best encryption is encryption you cannot bypass with password resets and such. Sucks for the user if they lose their password? Of course, but otherwise the encryption would be completely fucking useless.

    I can't say for sure OP doxxed people because waaaaay too many comments but if this is true, shame on you. Taking the choice of data sharing away from someone is quite the level of privacy violating, not even close to okay.

    Feel free to ask questions!

    Oh, and, @Root was right about pretty much everything. (not sure if she said a positive thing about apples encryption but if she did, she knows why I disagee)
  • 12
    Tomorrow we learn that @theabbie has all of the world's nuclear codes sitting in plain text on his desktop.
  • 8
    @linuxxx Yeah, pretty sure phone numbers, addresses, dates of birth, email addresses, and some photos/family info qualifies as doxxing :P
  • 5
    @MySlugLikesSalt Oh the damn ๐Ÿ˜…