Join devRant
Do all the things like
++ or -- rants, post your own rants, comment on others' rants and build your customized dev avatar
Sign Up
Pipeless API
From the creators of devRant, Pipeless lets you power real-time personalized recommendations and activity feeds using a simple API
Learn More
Search - "theft"
-
Worst dev I've interviewed?
"Archie" ran his own consulting business for almost 20 years. Prior to his interview, Archie sent HR (to send to us) his company's website, where he had samples of code for us to review (which was not bad, this guy did know his stuff).
What I found odd was Archie was the lone wolf at his company, but everything I found about him (the about page, his bio, etc), Archie was referred to as 'Mr. Archie Brown'.
Ex. 'Mr. Archie Brown began his humble career and 'Mr. Archie Brown is active in his church and volunteers his time in many charities ...'
Odd to refer to yourself in the third person on your own site, but OK, I like putting hot sauce on my mac & cheese (no judgement here).
Then the interview..standard stuff, then..
Me: "Given your experience, this is an entry level developer position. Do you feel the work would be challenging enough for you?"
Archie: "Yes, Mr. Archie Brown would have no problem starting at bottom. You see ..."
Almost any time he would reference himself, instead of 'me' or 'I', he would say 'Mr. Archie Brown'. As the interview continued, the ego and self-importance grew and grew.
My interview partner wanted to be done by using the escape clause, "PaperTrail, I'm good, do you have any questions?"
Yes, yes I do. I was having too much fun listening to this guy ramble on about himself. I made the interview go the full hour with the majority of time 'Archie' telling us how great he is.
The icing on the cake was my partner caught his gold cuff-links and tie-pin where his initials and how he kept raising his hands and playing with his tie to show us (which I totally missed, then was like "oh yea, that was weird")
After the interview, talking with HR:
HR-Jake: "How did it go?"
John: "Terrible. One of the worst. We would have been done in 10 minutes if PaperTrail didn't keep asking questions."
Me: "Are you kidding!? I had the best time ever. I wish I could have stayed longer."
HR-Jake: "Really? This guy was so full of himself I wasn't sure to even schedule with you guys. With his experience, I thought it deserved at least a round with you two. You think we should give him a chance?"
Me: "Hell no. Never in a million years, no. I never in my whole life met anyone with such a big ego. I mean, he kept referring to himself in the third person. Who does that?"
HR-Jake: "Whew!...yea, he did that in the phone interview too. It was a red flag for us as well."
Couple of weeks later I ran into HR-Jake in the break room.
HR-Jake: "Remember Mr. Archie Brown?"
Me: "To my dying day, I will never forget Mr. Archie Brown."
HR-Jake: "I called him later that day to tell him the good news and he accused me of being a racist. If we didn't give him the job, he was getting a lawyer and sue us for discrimination."
Me: "What the frack!"
HR-Jake: "Yep, and guess what? Got a letter from his lawyer today. I don't think a case will come in front of a judge, but if you have any notes from the interview, I'll need them."
Me: "What are we going to do?"
HR-Jake: "Play the waiting game between lawyers. We're pretty sure he'll run out of money before we do."
After about 6 months, and a theft conviction (that story made the local paper), Mr. Archie Brooks dropped his case (or his lawyers did).23 -
Shit... I just got my phone stolen. Realized it 40 seconds post factum [left it at the shop counter and someone took it].
20 minutes later called the police [cuz I had to get home and use wife's phone].
5 min later poluce arrived
10 min later they got all they could from shop's security officer.
Police officer asks me to login my samsung acc on his phone. 2 minutes later we are on the way to the exact location my phone is at.
15 minutes later officer hands me my samsung 😁
got my phone back in less than an hour after theft.
maybe... Ummm... Maybe all this tracking thing is not that bad...?13 -
I’m kind of pissy, so let’s get into this.
My apologies though: it’s kind of scattered.
Family support?
For @Root? Fucking never.
Maybe if I wanted to be a business major my mother might have cared. Maybe the other one (whom I call Dick because fuck him, and because it’s accurate) would have cared if I suddenly wanted to become a mechanic. But in both cases, I really doubt it. I’d probably just have been berated for not being perfect, or better at their respective fields than they were at 3x my age.
Anyway.
Support being a dev?
Not even a little.
I had hand-me-down computers that were outmoded when they originally bought them: cutting-edge discount resale tech like Win95, 33/66mhz, 404mb hd. It wouldn’t even play an MP3 without stuttering.
(The only time I had a decent one is when I built one for myself while in high school. They couldn’t believe I spent so much money on what they saw as a silly toy.)
Using a computer for anything other than email or “real world” work was bad in their eyes. Whenever I was on the computer, they accused me of playing games, and constantly yelled at me for wasting my time, for rotting in my room, etc. We moved so often I never had any friends, and they were simply awful to be around, so what was my alternative? I also got into trouble for reading too much (seriously), and with computers I could at least make things.
If they got mad at me for any (real or imagined) reason (which happened almost every other day) they would steal my things, throw them out, or get mad and destroy them. Desk, books, decorations, posters, jewelry, perfume, containers, my chair, etc. Sometimes they would just steal my power cables or network cables. If they left the house, they would sometimes unplug the internet altogether, and claim they didn’t know why it was down. (Stealing/unplugging cables continued until I was 16.) If they found my game CDs, those would disappear, too. They would go through my room, my backpack and its notes/binders/folders/assignments, my closet, my drawers, my journals (of course my journals), and my computer, too. And if they found anything at all they didn’t like, they would confront me about it, and often would bring it up for months telling me how wrong/bad I was. Related: I got all A’s and a B one year in high school, and didn’t hear the end of it for the entire summer vacation.
It got to the point that I invented my own language with its own vocabulary, grammar, and alphabet just so I could have just a little bit of privacy. (I’m still fluent in it.) I would only store everything important from my computer on my only Zip disk so that I could take it to school with me every day and keep it out of their hands. I was terrified of losing all of my work, and carrying a Zip disk around in my backpack (with no backups) was safer than leaving it at home.
I continued to experiment and learn whatever I could about computers and programming, and also started taking CS classes when I reached high school. Amusingly, I didn’t even like computers despite all of this — they were simply an escape.
Around the same time (freshman in high school) I was a decent enough dev to actually write useful software, and made a little bit of money doing that. I also made some for my parents, both for personal use and for their businesses. They never trusted it, and continually trashtalked it. They would only begrudgingly use the business software because the alternatives were many thousands of dollars. And, despite never ever having a problem with any of it, they insisted I accompany them every time, and these were often at 3am. Instead of being thankful, they would be sarcastically amazed when nothing went wrong for the nth time. Two of the larger projects I made for them were: an inventory management system that interfaced with hand scanners (VB), and another inventory management system for government facility audits (Access). Several websites, too. I actually got paid for the Access application thanks to a contract!
To put this into perspective, I was selected to work on a government software project about a year later, while still in high school. That didn’t impress them, either.
They continued to see computers as a useless waste of time, and kept telling me that I would be unemployable, and end up alone.
When they learned I was dating someone long-distance, and that it was a she, they simply took my computer and didn’t let me use it again for six months. Really freaking hard to do senior projects without a computer. They begrudgingly allowed me to use theirs for schoolwork, but it had a fraction of the specs — and some projects required Flash, which the computer could barely run.
Between the constant insults, yelling, abuse (not mentioned here), total lack of privacy, and the theft, destruction, etc. I still managed to teach myself about computers and programming.
In short, I am a dev despite my parents’ best efforts to the contrary.30 -
Dear "managers,"
Stealing credit for something you have not done is real theft.
When I come up with an idea and a detailed outline of how to build and deliver it, you do not get to say "oh I also had this idea." You did not. How could you? It uses tech you don't even know exists.
When I then proceed to build the whole thing on my own without any of your inputs (then again, you have no idea of how it works, what would you bring to the table), you don't get to parade my project in front of the board not even mentioning my name.
You see, it's not the first time you pull that off, you have taken full credit for every thing.
it's not just my wee feelings getting hurt for lack of recognition: it has real world consequences.
You get the promotion, you get the salary raise and you now live in a flat with a balcony and a view, while my wife and I share a studio as my salary has not budged.
You're a cunting thief, I hope your mom dies.
Best,
X8 -
My workstation at incubation center, where i am currently incubated.
Finally got multi-screen desktop. Though monitors are prone to theft by other teams
bNEST, Bhopal
PS - Laptop is for gaming7 -
Goddammit ASUS..
My laptop was not able to boot unless plugged in because of malfunctionning built-in Intel Anti theft technology.
Turns out its deprecated and there is a software available to remove it
So I installed windows to be able to run it but it was not working no matter what.. Turns out it was also deprecated and not supported anymore, so there is no way to remove the faulty anti theft system..
I sent my laptop to ASUS so they could find a way to remove the software and I got the reply "we will have to change the motherboard, it will cost $600"
No way I am paying this much for something that was supposed to be a software problem so I asked them to cancel and send it back
Now I got it back and its not even booting anymore and theres a few screws missing
Goddammit ASUS...10 -
When I was 23 or so, I worked nights in a tier-1 control room. Each workstation had a win98 desktop, and two HPUX workstations running CDE. I read all of the lord of the rings in text files on the HPUX machines, and since it was in an xterm window, my supervisor thought I was just tailing logs.7
-
Yo, to the cuntbag asshat who stole the cord connecting my monitor to my computer at work! Fuck you! I hope you go blind!11
-
The state of the web in 2020:
discussion sites as a medium are dying. chalk that up to censorship.
reddit is an echochamber. twitter is mostly a marketing platform disguised as (anti)social media. instagram is a self promotion/wannabe eceleb site, and youtube is the new hollywood..quickly becoming irrelevant.
facebook is where I (dont) go to (totally not) ignore all the people important to me.
and email is where I go to send letters bordering on hatespeech to my various local and federal "representatives", in between borderline cyberbullying people stupid enough not to automate their spam marketing in 2020. or talking to left/right self-help grifters about the state of society.
in the grim dark future of 2020, the last bastion of intelligent conversation, free speech, and civility, the one shining icon of hope in a dark world..
is the comment section of pornhub videos where a women got stuck under a bed for the 50,000th time. And all I can think is "wow I never knew how easy it was to get trapped under a bed. They should look into fixing this safety hazard."
newsmedia has jumped so many sharks, the fonz now spins in his grave so fast we could hook him up to a generator. meanwhile people hide in their homes for a disease so deadly you have to be tested to know if you even have it.
while ever more car commercials
are released, set to somber but hopeful piano music to the tune of "in this time of social distancing its important to stay close even when we're apart."
Im beginning to think media has become a poison on society, both television and the internet, and like an ersatz cargo cultist worshipping the great-charles- manson-in-the-sky we should all take a page from the unabomber and smash our televisions with hammers before going outside and sawing down the telephone polls.
I jest of course. But there is no denying the inherent appeal of moving from the unsettling uncertainty of complex societies, driven by expertly manipulated fear cycles, to the beatitude-esque simplicty of pastoral protestant style living, sans witch burning and shoe buckles.
And against the reckoning of utopians who are still fresh from the womb as it were, wet behind the ears and smelling of their mother's pussy, I reject the notion that "up" is a synonym for "forward."
Were it the case, every drinking binge, followed by throwing up, would bring us, with each vomitting, one step closer to heaven. Rather the state of affairs is what it is, and what it is, like most of nature, is a cruel master and a harsh teacher. And while we may binge on digital delusions of grandeur and a greater society, rest easy in the nihilistic and sobering thought that we are little more than 200,000 year old cave men wielding magic bricks, and atomic bombs.
..where water flows more readily from metal tubes in our houses than it does from the nile. where food comes to our door at little more than our beck and call.
where we may bath, and sleep, and *shit*, cleanly, comfortably, and safely, wrapped in the (failing) bubble of delusion we all tenaciously grasp collectively, the thing we call "civilization".
an empire of needful things, wanton and fragile.
if we have not gone mad from boredom, I have no doubt we one day will.
it becomes more and more obvious to me every day, had war never existed, it would have been necessary for man to invent it just to have something to do, that didnt include farming, fucking, or building.
And so enters "political idealogy."
How would we ever have enemies if we were allowed to speak our piece instead of being given the means (and reflex dogwhistle training) to silence and destroy one another?
give a man a gun, he'll rob a bank. give a man a bank, he'll rob the world.
give him a media empire or a tech platform, and he'll lie about the theft and convince one half of millions of lemmings to hate all the other lemmings.11 -
people asks why they cannot remove their edge from windows, not even with chainsaw. Here is why..
I know everyone is tempted to have an edgeless view, Me too. Especially, if you have OCD.
Actually, it prevents you from falling out the windows, home theft, assassination, and roof collapse. Thus, it is intended to be indestructible for your own safety.1 -
Someone in Indonesia is using my email adress to order stuff from a site called Lazada. My email account is not compromised as far as I know. But It's really annoying always getting order confirmation emails in bahasa Indonesia.
I've got "kikis" phone number and adress. Any advice what i've could do to make her stop?18 -
One of our existing clients who used to pay for two of our products but now only pays for one just called us. The one he canceled is a loss prevention product that tracks internal theft in stores. He canceled it because he didn't feel it was worth it.
Now, he's calling us from a police station because he's trying to press charges against one of his managers because they were presumably stealing from him.
"Hey I need to know how many times this person stole from me over the last few months and I need to know it now because I'm at the police station."
With just a few clicks that would be an easy figure to retrieve for him had he not canceled our product.
My stance is he can get lost. I don't even think he sees the irony of canceling because "it isn't worth it" and then "asap" needing the data that the "worthless" product provides. Of course, he wants it without reactivating the subscription.
Unbelievable.5 -
I just tried to sign up to Instagram. I made a big mistake.
First up with Facebook related stuff is data. Data, data and more data. Initially when you sign up (with a new account, not login with Facebook) you're asked your real name, email address and phone number. And finally the username you'd like to have on the service. I gave them a phone number that I actually own, that is in my iPhone, my daily driver right now (and yes I have 3 Androids which all run custom ROMs, hold your keyboards). The email address is a usual for me, instagram at my domain. I am a postmaster after all, and my mail server is a catch-all one. For a setup like that, this is perfectly reasonable. And here it's no different, devrant at my domain. On Facebook even, I use fb at my domain. I'm sure you're starting to see a pattern here. And on Facebook the username, real name and email domain are actually the same.
So I signed up, with - as far as I'm aware - perfectly valid data. I submitted the data and was told that someone at Instagram will review the data within 24 hours. That's already pretty dystopian to me. It is now how you block bots. It is not how Facebook does it either, at least since last time I checked. But whatever. You'd imagine that regardless of the result, they'd let you know. Cool, you're in, or sorry, you're rejected and here's why. Nope.
Fast-forward to today when I recalled that I wanted to sign up to Instagram to see my girlfriend's pictures. So I opened Chromium again that I already use only for the rancid Facebook shit.. and it was rejected. Apparently the mere act of signing up is a Terms of Service violation. I have read them. I do not know which section I have violated with the heinous act of signing up. But I do have a hunch.
Many times now have I been told by ignorant organizations that I would be "stealing" their intellectual property, or business assets or whatever, just because I sent them an email from their name on my domain. It is fucking retarded. That is MY domain, not yours. Learn how email works before you go educate a postmaster. Always funny to tell them how that works. But I think that in this case, that is what happened.
So I appealed it, using a random link to something on Instagram's help section from a third-party blog. You know it's good when the third-party random blog is better. But I found the form and filled it in. Same shit all over again for info, prefilling be damned I guess. Minor convenience though, whatever.
I get sent an email in German, because apparently browsing through a VPS in Germany acting as a VPN means you're German. Whatever... After translating it, I found that it asks me to upload a picture of myself, holding a paper in my hands, on which I would have a confirmation code, my username, and my email address.. all hand-written. It must not be too dark, it must be clear, it must be in JPEG.. look, I just wanted to fucking sign up.
I sent them an email back asking them to fix all of this. While I was writing it and this rant, I thought to myself that they can shove that piece of paper up their ass. In fact I would gladly do it for them.
Long story short, do not use Instagram. And one final thing I have gripes with every time. You are not being told all the data you'll have to present from the get-go. You're not being told the process. Initially I thought it'd just be email, phone, username, and real name. Once signed up (instantly, not within 24 hours!) I would start setting up my account and adding a profile picture. The right way to ask for a picture of me! And just do it at my own pace, as I please.
And for God's sake, tackle abuse when it actually happens. You'll find out who's a bot and who isn't by their usage patterns soon enough. Do not do any of this at sign-up. Or hell, use a CAPTCHA or whatever, I don't fucking care. There's so many millions of ways to skin this cat.
Facebook and especially Instagram. Both of them are fucking retarded.6 -
Can https be decrypted easily?
(Or even by spending some time)
Plus what other security methods banks apply to prevent theft of sensible data?
Do they encrypt data using thair own private key thet is changed automatically?29 -
Had a stupid sales dude. Lost his driver's license due to reckless driving (and this was a few in a row including drunk driving) for 6 months. As it was his job required to drive around he got instantly fired.
So he had to leave laptop, iPad and phone with us (IT). His next stop was finance for the lease car but he was pissed, left the building and drove off.
Apparently rules are super shitty for the theft of a lease by the registered employee. So we could not really mark it as stolen. We alerted the police anyway and he was caught next week for driving without a license. So he went to jail and we got the car back5 -
What do you do when a developer who has higher title than you; changing a bit of your code to his/her own favor and then claim "fixed and optimized" your code to shoot you down and then take the whole credit?
Essentially how to deal with this kind of theft or robbery?9 -
Web3 truly is a fucked up space. All of the fuckertry happening over here is out of control. Literally a dystopian shithole of scams frauds crimes theft and ponzi schemes.... As much as i try to defend web3 since im a web3 dev it's getting real fuckin hard. The more i work in this space the more i understand economics and how all of this shitshow flows.
Without diving into details, I'll tell you right now from a very deep economic perspective: i realized that all of these cryptos are just.. shams, quasi buzz words to keep the "investors" giving them money. Essentially like wolf of wallstreet scams mixed with bernard madoff multi billion dollar ponzi schemes. The "investors" earn a lot of money.... But on paper! As unrealized gains. And by the time they are able to withdraw their money, that money becomes worthless because of insufficient liquidity in the pool that has been drained from top to bottom of the pyramid. So the only person truly getting filty rich is the one on top of this pyramid - the founders!
After the FTX disaster that happened 2 days ago the prices of ALL coins dropped drastically and it isnt stopping. So much for your glorified "decentralization" 😹😹😹😹😹
How can something be decentralized if its enough for 1 influential man to tweet some shit and the company/token price value drops or increases within minutes? In this case the whole of crypto got sliced by 1 influential man... Again. It's only a matter of time until someone else goes bankrupt and cycle repeats... Again.12 -
Aus Gov: here's a bright idea, let's enforce social media accounts being verified with enough identification to pull of identify theft with ease for the greater good.
https://news.com.au/technology/...
Facebook: 533 million accounts leaked with names, email, phone, address details.
https://mobile.twitter.com/UnderThe...
Me: 🤦♂️12 -
Howdy this is a daily reminder on why you can't trust anyone with shared information.
I am back home from uni for the holidays and like any computer person who is back in town became responsible for fixing every tech problem that has occurred since my last visit. But what caught my eye when I approached the family computer is not the problem with the computer itself, it's the paper in front of the computer that, in giant lettering, has not only the passwords and account names of my mom and brother's AOL (She's old ok) and FAFSA account respectively but also someone's social security number. Any goddam baffoon who looks through the window or is able to take literally three goddam steps past the front door now has enough information to commit identity theft or just take over one of their accounts. I know it's not that likely but I still had a heart attack when I saw that.
How badly have I failed them?1 -
A dollar or a peso is a certain amount of work stored in a piece of paper. You need to work to get them or have other people work for you. When governments print new money and push it into circulation they reduce what you were compensated with for the work you did. Essentially they are taking your wealth (spending power) away without you even realizing. It is a modestly sophisticated form of theft. When public companies issue new shares onto the market they are doing same thing by reducing the percentage of the company you own. This is why you will see non-inflationary assets such as Bitcoin, land, gold bars and gold ETFs, etc. continue to rise in value and certainly outpace inflation. It’s because people who are smart with money are fearful of holding cash and they are looking for a safe place to store it. If you are not afraid of holding substantial amounts of cash, then I suppose you don’t really understand what it is. There is a reason why they don’t teach teenagers about inflation in any country of the world. As long as the masses are focused on earning and saving fiat, governments have so much more power and control. If you remove all of the fiat from circulation, then we will revert to a barter/trading system which would substantially reduce government power, at that point they would only maintain control using physical force, which is a lot more challenging to carry out. #btc #gold #rant #av41
-
I don't usually look at the "updates" section of my Gmail but yesterday I did. One message cought my eye: "Your application to Microsoft BizSpark has been approved" but I've never applied to Microsoft BizSpark!
Someone has registered in my name, opened a Microsoft Outlook account under my full name and added my startup details for applying to BizSpark! One issue though, he used some Spanish equivalent of mailinator to subscribe so I could easily reset the password and replace the security email. Now I have 5 visual studio subscriptions I don't know what to do with.5 -
Because of some theft this year and even though we already have security cameras, my apartment building decided to check the front door locks so it's more secure.
This key looks very high tech... Only issue though is I never use the key anyway... I just entered the door code...
So what is the point of changing the locks? I'm going to guess whoever is stealing isn't picking the lock... People would notice... They must know the code.
Also it seems most of the apartment locks are digital key card/pins too. Wondering if this just means most owners are young or just are techies/devs...10 -
Meetings. I don't know how management people get anything done, but the time I spend in meetings counts completely opposite, in terms of productivity.
-
University makes us sign our documents electronically. What this means is that we're required to put pictures of our signature onto all sorts of declarations. Since none of the documents we "sign" this way are important it could be okay, but I don't understand why it's beneficial to encourage us to keep a photo of our signature on our computers, paving the way to identity theft.18
-
I - Lets move your database to mlab. They offer 512mb database for free, every month. That is beyond your lifetime usage
Client - No. They Steal Data ( Like Facebook )
And client don't know a shit about mlab and development. Aware of quite a few names, bigrock, godaddy, bluehost. Even AWS is not in the list
- mlab is mongodb database service4 -
Sensible question but I am asking it here!
As you know wifi packets can be sniffed using kali and a wifi adaptor.
I was wondering if the same thing can be done about car remote using raspberry pi ?
(I know theft is illegal everywhere and I'm not looking for trouble)13 -
You all know that these AI dev tools are reading your code right?
It is sending it back to a data center and doing evaluations on the code. This is like handing your code to an unknown entity with no guarantees for privacy or copyright protection.
This concept bothers me and I would have to consult with my employer to even determine if we wanted to take that risk. I think it is just a matter of time before a bad actor takes advantage of this and rips off a company somewhere.8 -
amazon has hit 1T$ market cap. fffuckin bezos.
"There is no great wealth without a great theft."
- Gutle Schnapper Rothschild
"Give me the control of a nations wealth and I care not who makes thy laws."
- Mayer Amschel Rothschild3 -
Udemy got call out for stealing YouTuber's contents again. Last time was Tory, the guy in charge Australia Microsoft security. (Guess they picked the wrong target)
This time is Chris, who makes some awesome free YouTube Python tutorials.
https://dailydot.com/upstream/...5 -
So I get to work this morning and find one of my monitors has been moved and my HDMI cable and Display Port adapter are missing...
I've since found the cable, it had made its way onto another desk. When I asked if anyone had seen anything one of the guys said he found an HDMI that's not his on his desk. Still no sign of my adapter though...
So for now I'm back to one monitor like some kind of peasant1 -
Brave Browser.
There’s a reason why brave is generally advised against on privacy subreddits, and even brave wanted it to be removed from privacytools.io to hide negativity.
Brave rewards: There’s many reasons why this is terrible for privacy, a lot dont care since it can be “disabled“ but in reality it isn’t actually disabled:
Despite explicitly opting out of telemetry, every few secs a request to: “variations.brave.com”, “laptop-updates.brave.com” which despite its name isn’t just for updates and fetches affiliates for brave rewards, with pings such as grammarly, softonic, uphold e.g. Despite again explicitly opting out of brave rewards. There’s also “static1.brave.com”
If you’re on Linux curl the static1 link. curl --head
static1.brave.com,
if you want proof of even further telemetry: it lists cloudfare and google, two unnecessary domains, but most importantly telemetry domains.
But say you were to enable it, which most brave users do since it’s the marketing scheme of the browser, it uses uphold:
“To verify your identity, we collect your name, address, phone, email, and other similar information. We may also require you to provide additional Personal Data for verification purposes, including your date of birth, taxpayer or government identification number, or a copy of your government-issued identification
Uphold uses Veriff to verify your identity by determining whether a selfie you take matches the photo in your government-issued identification. Veriff’s facial recognition technology collects information from your photos that may include biometric data, and when you provide your selfie, you will be asked to agree that Veriff may process biometric data and other data (including special categories of data) from the photos you submit and share it with Uphold. Automated processes may be used to make a verification decision.”
Oh sweet telemetry, now I can get rich, by earning a single pound every 2 months, with brave taking a 30 percent cut of all profits, all whilst selling my own data, what a deal.
In addition this request: “brave-core-ext.s3.brave.com” seems to either be some sort of shilling or suspicious behaviour since it fetches 5 extensions and installs them. For all we know this could be a backdoor.
Previously in their privacy policy they shilled for Facebook, they shared data with Facebook, and afterwards they whitelisted Facebook, Twitter, and large company trackers for money in their adblock: Source. Which is quite ironic, since the whole purpose of its adblock is to block.. tracking.
I’d consider the final grain of salt to be its crappy tor implementation imo. Who makes tor but doesn’t change the dns? source It was literally snake oil, all traffic was leaked to your isp, but you were using “tor”. They only realised after backlash as well, which shows how inexperienced some staff were. If they don’t understand something, why implement it as a feature? It causes more harm than good. In fact they still haven’t fixed the extremely unique fingerprint.
There’s many other reasons why a lot of people dislike brave that arent strictly telemetry related. It injecting its own referral links when users purchased cryptocurrency source. Brave promoting what I’d consider a scam on its sponsored backgrounds: etoro where 62% of users lose all their crypto potentially leading to bankruptcy, hence why brave is paid 200 dollars per sign up, because sweet profit. Not only that but it was accused of theft on its bat platform source, but I can’t fully verify this.
In fact there was a fork of brave (without telemetry) a while back, called braver but it was given countless lawsuits by brave, forced to rename, and eventually they gave up out of plain fear. It’s a shame really since open source was designed to encourage the community to participate, not a marketing feature.
Tl;dr: Brave‘s taken the fake privacy approach similar to a lot of other companies (e.g edge), use “privacy“ for marketing but in reality providing a hypocritical service which “blocks tracking” but instead tracks you.15 -
I think it's a scam that the multinational corporations have pulled off that they've managed to get everyone to call and equate something technical and legally specific, "piracy."
Piracy is the theft and resale of physical goods. Copyright infringement is not piracy. It's a crime(in most countries), for sure, but it isn't piracy. The word "piracy" is emotionally charged, and its use serves the interests of corporate profit, not the interest of the origination of creative works, and certainly not your best interest. It's a deceptive practice. It's a lie.
But "copyright infringement," and "intellectual property," don't grab readers' attention like, "piracy." So, like how DeBeers has indoctrinated the world into thinking that diamonds are valuable, the RIAA, MPAA, and the BSA have indoctrinated the world into buying into the lie that copyright infringement and piracy are the same thing.9 -
My stress ball has been stolen!
I came in to work to an email alerting me to a bug in production. I copied the site to staging to work on the issue but I was unable to replicate bug. My rubber duck wasn't helping so I went to go bounce my ball off the wall when I realized I don't have a stress ball anymore.
I spent 7 hours working on the bug without a stress ball before finally fixing it. And now I'm ready to deal with the theft the old-fashioned way.3 -
Feature request: copy text on double tap or hold on Android. Wanted to save a few quotes, but not as a screenshot... Just an idea :)3
-
Ever had a colleague who nosed into what solution you brought to a problem and then stole your credit, telling the CEO how they found the solution and not you?
Yeah.2 -
To the companies stealing my money, I need you to stop auto renewing my subscriptions or atleast let me be able to schedule for how long I want to use your services. I cannot come one day prior the auto renew date just to cancel the subscription. It shouldn't be like that.4
-
Windows just activated TPM on my Windows 10 computer on first of february 2024.
The main reason I stuck with Windows 10 was the sole reason of not wanting to upload my hardware-fingerprint to MS.
Well, guess they just got it themselves and now, disabling the TPM comes with a lot of downsides, as it is now holding my certificates hostage...rant microsoft tpm tpm2.0 data theft breach trustedplatformmodule matrix security fingerprint spyware15 -
So I'm not much for Linux, but I'll admit. It's a pretty damn solid environment, especially for programmers.
Since my main computer can't afford to have Linux on it, I decided to start working on making the Raspberry Pi handheld notebook. But after I added up the price for all of the components, it's almost three hundred dollars.
Personally, I would love to have a mini computer everywhere I go. A Chromebook is ok. But I guess you need to take into consideration that it is NOT ment for programming. I have found several IDE's and found none of them have a debugger or a way to execute my code.
I did some thinking and I'm starting to wonder if it is worth it.
It's a hand held computer with ubuntu on it. What's the worse that can happen? I don't solder the battery correctly and the whole thing explodes in my hands? Yeah that's pretty likely. Another reason I look at getting it is because there is so much fucking theft at my school it's hard to believe we don't have armed gunmen at every corner since everyone is always sober or high as shit.
Having an 11.6 inch Chromebook also puts me at risk of getting mugged, because who the fuck wouldn't want to try and pawn a laptop for drug money? At least with a handheld I could keep it in my pocket where I know it'll be safe.
What do you guys think?
Should I build this little thing or keep my current Chromebook but try to keep it safe?4 -
#justathought
Since a country is considered to be the strongest definition of a group of unified people, consider the following scenario:
Every country makes it mandatory that any foreign company can only sell their software products as free to use softwares, or one time cost software, or a membership software.
These foreign companies are NOT allowed to generate revenue via Advertisement services or data collection/sharing/analysis AT ALL.
The sole right to share/collect data and use Advertisments as a revenue model remains in the hands of domestic companies born, registered and working in that country only.
This would generate an equal chance for both domestic and international companies to grow(domestic companies getting a chance to grow with a better revenue model, while international companies getting a chance to grow by monetising their tools/algorithms and investing in domestic companies) , resulting in countries getting a chance to grow themselves.
Open source will still win, as open source majorly contains tools and technologies for general public use.
Premium tools and frameworks would become even more valuable, and would he shared among countries like the way they share space researches and resources on nuclear technology today.
Privacy will win, as the data of a particular country stayed within a country. Domestic Companies sharing data with other companies (or even their foreign parent companies) would be held against the respective country's laws only, and government would be more involved in protecting its citizens from data theft.
Is it feasible?11 -
every time someone says sustainable I flinch and have to re-process what I just heard
I can't get used to this
I know it has an actual meaning but it's been used stupidly for so long I can't untrain it from my connotations to Marxism / theft
I do find it really funny that now disinformation went from smearing people for not towing to some authoritarian line to calling out the smearing people though4 -
It’s 2am. This is what I think about: a baby head but it’s a cheaply made plastic toy toilet that is somehow narrow like a pez dispenser, I put some green plastic stuff in its “mouth” and close it and I’m like oh no why I did this he’s gonna swallow it and there’s kanye in the background screaming grand theft auto grand theft auto we’re in a game we’re in a game
I’m scared. I can’t sleep. My heart goes like 180bpm for no reason7 -
Best Cryptocurrency Recovery Company - Go to OMEGA CRYPTO RECOVERY SPECIALIST
OMEGA CRYPTO RECOVERY SPECIALIST is a reputable entity that offers top-quality services for cryptocurrency recovery, providing a lifeline to individuals who have fallen victim to theft or other mishaps in the digital currency realm.
Their expertise extends to accessing funds that are inaccessible due to security issues and employing advanced techniques for retrieving lost passwords, making them a reliable choice for those in need of assistance.
Webpage; omegarecoveryspecialist .c o m7 -
Don't make a spawner in Minecraft out of stone. Use something like cobble instead.
Why? Because Endermen steal stone.
I have a spawner in my ATM9 world that I made a part out of stone. I got to my spawner and was wondering why it stopped (using special dirt that spawns mobs constantly). I saw there was some light in the enclosure (this disables spawns). Noticed 3 stones missing near the bottom below the dark windows. Found that stolen stone in the mob grinder storage. Replaced with polished granite.
Can't have shit in this neighborhood.
I did have a moment of silence for the Endermen who tried to save their brethren from certain doom. Brave warriors who died for the futile cause.4 -
The monthly subscriptions plans are an open theft of customers money because of variable number of days in a month.
It's basically free money for companies with monthly pricing strategy.3 -
I’m picturing some giant over mind
A huge cluster of computers and what is actually happening to explain the theft and stupidity that makes
The world seem like the last scene
In the movie repo
Men is they’re feeding their hungry growing baby all the pilfered videos and pictures they can and the brain was designed to be a piece of garbage like them with no regard for human life
Yep
That seems about right
Something from a sci-fi horror film mixed with the plot of that movie where all the humans were inbred morons in the future4 -
My ex-colleague contacted me recently to help build a solution that would checkmate the case of code theft that they are currently challenged with. I tried to suggest the developers either work remotely (using rdp or similar), or physically with a company provided system. He rejected both recommendations and insisted the potential culprit shouldn't be aware he is being monitored
He proposed the following flow for what he intends I build: an obfuscated program scattered across the code base, possibly assembling at intervals or as a reaction to project build. Then signaling their server with details of the machine it's running on
The project to be rigged with the spyware is written in spring boot and I can't turn this down even if I don't think it's worth it cuz no work has been forthcoming and I'm nearly out of cash
So the question is, is the flow described above a feasible one? Can you suggest a smarter way to detect when the code is transferred to the system of an unaccredited engineer? Can you suggest any tips on how to go about this?6 -
Did anyone see this guy's tweets yet?
Read them, they're especially interesting when put into the context of the current GitHub affairs.
https://twitter.com/jamiebuilds/...1 -
I have been working on idea similar to pastebin for mobile platform currently available on Android. The main concept is the easy share of Note in any language that is encrypted and the notes get deleted as soon as other party reads it. Plus you can encrypt it further by adding your own password and then share that password with others. This is useful when we are sharing our card details and other secret stuff with friends or family. The problem is that if you use mail or messaging stuff it gets stored in other party device and it can be exploited in future in case of theft or mobile loss. Here is my application for Android.
Please comment your reviews.,comments and suggestions here.
If you want to fork the code of both server and client comment that also.
https://play.google.com/store/apps/...7 -
main problem before you touch on the between here and there problem of people eating up all their time and the theft these garbage engage in of vital memory recall objects which even they actually need believe it or not and they don't even repress their memories, is the lack of desire to interact for anything other than sex or personal profit. that has reallllllllllllllly fucked the world up lately.
and if you isolate us, the only decent people from each other, and put us around asocial people who are all liars and trash, when we know, when the information is in our minds why would we want to speak with them ?27 -
Could there be a "greater" GPL which explicitly declares that the constraint extends to use of the code as statistical data, such as in machine learning models?1
-
I have a great social life! I talk often to my friends of German descent and my American friends, too! They come to me, as my vehicle is currently out of commission due to the anti theft being tripped and being unable to drive anywhere. And that's really nice of them, considering I live in the middle of bumfuck Kansas and the closest city being an hour drive away.
Well, only if by TALK you mean silently type in their general direction on an hourly basis while fermenting in my own bodily smell day in and day out. Also, those friends of German descent live in Germany.
Haha. Yes. -
Everyone wants some kind of super expertise but they don’t want to invest to allow people to become experts
I like incentive to learn large framework code that is os
And inventive to invest time to fix
And I think this should be finding that is added to an economy by a CB
Adding to the monetary expansion and contraction equation
The more improvements that work and are accepted
The more bugs that get fixed etc
The more people working on these projects the more money generated that they can spend to prop up their host economy
Of course you’d need some considerable oversight to prevent corruption and laundering or outright theft by dirty fucked up chomo whores pretending that work is there own and destroying people who are enthusiastic or happy like the garbage they are -
So I thought I'd ask this in a different space. What do I have to do to ? Suck someones dick or something to get away from the chomos and their twisted whorelings ? Being around this is worse than being aware of how fucked up people can be.
Do I have to murder people ? I mean explain what I have to do to get away from you bastards.
Because I look shortly ahead and see theft of property once more and I'm trying to move on not see time end around a bunch of animatronic dummies who's unnatural appearance makes me act like a dummy and btw if your idea of 'good' is 'yeah turn a blind eye to us being robots and let us rape our kids in peace' fuck you people.2 -
No going back
No forgetting the best
If they are jealous of others forgetting the worst hurt them till they do
No more theft
There is no justification
One round of photos and videos is 12. Years of pay at least
So. Hand it over
50k a year1 -
As I look at my other self I can't help but say "told you so"
:P
wanna talk about a content theft scenario :P
I put a few posts up online, they booted me off, and now someone else is claiming to have made the advanced tutorial content teaching you to go fuck yourselves :P2 -
CRYPTO RECOVERY SERVICE - MUYERN TRUST HACKER
( Email: muyerntrusted(@)mail-me(.)com )
The term "crypto theft" describes how fraudsters get and misuse cryptocurrency assets without authorization. The fact that the theft may cause monetary loss, interfere with corporate operations, and erode public confidence in virtual currency makes it a serious worry. Recovering stolen cryptocurrency requires specialized knowledge and techniques that professionals in the field possess. They have experience dealing with crypto theft cases, understand the tactics employed by cybercriminals, and can develop tailored recovery strategies to maximize the chances of successful retrieval. Muyern Trust Hacker demonstrates the highest level of professionalism in the realm of cryptocurrency theft when it comes to reclaiming stolen cryptocurrency. Their team of professionals offers a dependable and relatable recovery service by fusing technical proficiency, and personality. Having dependable expert assistance is essential for the safety of your cryptocurrency holdings. Along the way, Muyern Trust Hacker adds a dash of humor and personality to your team of experts who are committed to retrieving your pilfered cryptocurrency. Protect your investments and put your faith in Muyern Trust Hacker's expertise. Allow them to work with you to protect what is truly yours. Seeking expert assistance becomes crucial for people and organizations trying to recover stolen cryptocurrency as long as the threat of crypto theft persists. Muyern Trust Hacker differentiates by providing specialized techniques and the highest level of professionalism as a group of professionals committed to the recovery process. They have a reputation for being successful in recovering cryptocurrency monies that have been stolen thanks to their demonstrated track record and client endorsements. Individuals and companies can safeguard their priceless cryptocurrency assets and confidently negotiate the murky world of cryptocurrency theft by putting their trust in the knowledge of experts such as Muyern Trust Hacker. Do sure to contact Muyern Trust Hacker for a prompt and effective Bitcoin retrieval on Whats App +1-8-6-3-(606)-8-3-4-7
Regards.15