Details
-
SkillsAndroid, iOS, MEAN, Devops, C#, js, Unity
Joined devRant on 12/8/2019
Join devRant
Do all the things like
++ or -- rants, post your own rants, comment on others' rants and build your customized dev avatar
Sign Up
Pipeless API
From the creators of devRant, Pipeless lets you power real-time personalized recommendations and activity feeds using a simple API
Learn More
-
Oh no...
A <FlatList> as a DIRECT child of a <ScrollView>... I mean, I'll give you the benefit of the doubt if you forgot or it was buried in a nested component... but... it's just sitting right in front of you on the same exact component... it's like, did you even test this once and see the warnings?
God these 'affordable' devs truly aren't actually worth it.
They really aren't.
You spend just as much time fixing their clownish mess as you get for "saving money" with their cheap rates.
Another day, another clown dollar in clowntown...
SHEESH3 -
Recipe: "baked developer"
you will need:
- 1 day = 1 story point
- 10SP per sprint
- every team member must deliver all the SPs.
Now for every sprint slap on 20+ hours of mandatory meetings, mix with 2-5 days of ad-hoc tasks, which must be addressed, because they are blocking the release/other teams/prod, and make sure all the devs try not to spill no matter what, and you get a perfectly burned out team.
Brittle/crispy on the outside, mashed/soft on the inside
enjoy!26 -
Didn’t get on the Masters course I wanted to get on.
Ah well - guess I’ll just go buy a new car with the money7 -
Part 1: https://devrant.com/rants/4298172/...
So we get this guy in a meeting and he is now saying "we can't have application accounts because that violates our standard of knowing who accessed what data - the application account anonamizes the user behind the app account data transaction and authorization"
And so i remind him that since it's an application account, no one is going to see the data in transit (for reference this account is for CI/CD), so the identity that accessed that data really is only the app account and no one else.
This man has the audacity to come back with "oh well then thats fine, i cant think of a bunch of other app account ideas where the data is then shown to non-approved individuals"
We have controls in place to make sure this doesnt happen, and his grand example that he illustrates is "Well what if someone created an app account to pull github repo data and then display that in a web interface to unauthorized users"
...
M******* why wouldnt you JUST USE GITHUB??? WHO WOULD BUILD A SEPARATE APPLICATION FOR THAT???
I swear I have sunk more time into this than it would have costed me to mop up from a whole data breach. I know there are situations where you could potentially expose data to the wrong users, but that's the same issue with User Accounts (see my first rant with the GDrive example). In addition, the proposed alternative is "just dont use CI/CD"!!!
I'm getting pretty pissed off at this whole "My compliance is worth more than real security" bullshit. -
Friend's site, mail verification, nextcloud etc. all went down...
Checked all his servers, all his configs and what not... Just to realize the moron forgot to pay his bills (so his domain expired)...5 -
🚀 Hi guys, I created a minimal-looking Hackernews client.
It's still not complete yet. But I'm sharing anyway. Feedbacks are welcome ❤
It's live at https://hn-redesign.vercel.app
Here is the source:
https://github.com/RocktimSaikia/...14 -
In my freelancing job, I got this as a source code ? Really? Are you guys serious? Is this a joke?49
-
I turned my custom phone wallpaper into shirts, covers and other things. How do you like it? Would you wear it or would you improve it?
https://redbubble.com/de/people/...7 -
I don't want new features or updates anymore. Almost every OS gets bloated with new features I don't want, while also breaking backwards compatibility and a working setup.
Phone? Apps not compatible anymore since update or just disappearing from the phone.
Computer? Often unstable updates, and since this has happened many times before I try to delay updates as long as possible but then caves in from the annoying update notifications.
Would love to get security updates, but come on, stop it with the bloat apps. Let me just uninstall the features I don't want and let me opt in instead. Make it possible to build extensions and plugins to customize behaviour. Why does software have to spoil like this?2 -
I JUST GOT AN OFFER. God has blessed me. I also found out I have cancer a couple weeks ago. What a confusing time this is lol.13
-
!Story
The day I became the 400 pound Chinese hacker 4chan.
I built this front-end solution for a client (but behind a back end login), and we get on the line with some fancy European team who will handle penetration testing for the client as we are nearing dev completion.
They seem... pretty confident in themselves, and pretty disrespectful to the LAMP environment, and make the client worry even though it's behind a login the project is still vulnerable. No idea why the client hired an uppity .NET house to test a LAMP app. I don't even bother asking these questions anymore...
And worse, they insist we allow them to scrape for vulnerabilities BEHIND the server side login. As though a user was already compromised.
So, I know I want to fuck with them. and I sit around and smoke some weed and just let this issue marinate around in my crazy ass brain for a bit. Trying to think of a way I can obfuscate all this localStorage and what it's doing... And then, inspiration strikes.
I know this library for compressing JSON. I only use it when localStorage space gets tight, and this project was only storing a few k to localStorage... so compression was unnecessary, but what the hell. Problem: it would be obvious from exposed source that it was being called.
After a little more thought, I decide to override the addslashes and stripslashes functions and to do the compression/decompression from within those overrides.
I then minify the whole thing and stash it in the minified jquery file.
So, what LOOKS from exposed client side code to be a simple addslashes ends up compressing the JSON before putting it in localStorage. And what LOOKS like a stripslashes decompresses.
Now, the compression does some bit math that frankly is over my head, but the practical result is if you output the data compressed, it looks like mandarin and random characters. As a result, everything that can be seen in dev tools looks like the image.
So we GIVE the penetration team login credentials... they log in and start trying to crack it.
I sit and wait. Grinning as fuck.
Not even an hour goes by and they call an emergency meeting. I can barely contain laughter.
We get my PM and me and then several guys from their team on the line. They share screen and show the dev tools.
"We think you may have been compromised by a Chinese hacker!"
I mute and then die my ass off. Holy shit this is maybe the best thing I've ever done.
My PM, who has seen me use the JSON compression technique before and knows exactly whats up starts telling them about it so they don't freak out. And finally I unmute and manage a, "Guys... I'm standing right here." between gasped laughter.
If only it was more common to use video in these calls because I WISH I could have seen their faces.
Anyway, they calmed their attitude down, we told them how to decompress the localStorage, and then they still didn't find jack shit because i'm a fucking badass and even after we gave them keys to the login and gave them keys to my secret localStorage it only led to AWS Cognito protected async calls.
Anyway, that's the story of how I became a "Chinese hacker" and made a room full of penetration testers look like morons with a (reasonably) simple JS trick.9