cross-posted from: https://lemmy.dbzer0.com/post/15238521
Yet another “brilliant” scheme from a cryptobro. Naturally this caused a gold-rush for scammers who outsourced random people via the gig economy to open PRs for this yml file (example)
cross-posted from: https://lemmy.dbzer0.com/post/15238521
Yet another “brilliant” scheme from a cryptobro. Naturally this caused a gold-rush for scammers who outsourced random people via the gig economy to open PRs for this yml file (example)
it’ll be fucking wild when my industry invents the ability to learn from its mistakes
deleted by creator
also, of course it’s a bunch of yaml package recipes with wacky! comments barely wrapping the shell scripts actually doing the work, all of which are dumped into a way too fucking big recipes directory and shat into git, cause no this fucker didn’t learn a damn thing from last time
also, this rant in the recipe file:
I’m guessing protocol here refers to the tea bullshit that’s being hoisted on our global open source ecosystem. the part I’m missing is: fucking what? why? there aren’t any hashes at all in the recipe file which is how Nix and most other package managers worth a damn verify sources. Nix doesn’t even differentiate between source code and pre-built binaries for this — Nix just knows the expected hash for the file and if it pulls an archive of binaries, you just tell it to skip the build step as part of the package definition. pkgx doesn’t even have the immutable bits that make using pre-built stuff mildly harder on a Nix system
deleted by creator
Sure, it’s not like there’s a whole protocol standard that you can use for signed provenance of binaries which you could incorporate and help promote to make the OSS ecosystem better and more secure.
Nah, look, I solved package management using only my grit and impressively large IQ.
I hate the energy of That Guy that barges into the room and shouts “I solved X!” without researching for 5 minutes what all the people that were actually hard at work solving X came up with, what hurdles they identified, and which paths were already explored.
And it’s always fucking tech guys.
“my only achievement is that I made the most mediocre version of something that already existed and somehow it got corporate adoption” is a whole-ass type of person in my industry, and they’ve always got the biggest gap between self-perceived genius and actual skill level. they always seem to gravitate towards systems software too, somehow
deleted by creator
The deficiencies in the goog interfaces, across multiple products, are legion. I recall someone talking about it recently compared to Palm Pilot, and how the latter could do detail obscuring when just wanting to share a single piece of information on a screen (think the examples used were calendar and contact)
The other “fun” thing is how they kill off features/things to force people into how they want a thing to be used. And I believe IMAP with normal credential auth is one of those on the list for later this year… 😡
Reminds me of the time I was at Barnes & Noble and this lady comes in with her little boy (4-6 maybe?) and they head for the children’s section. At the entry to the children’s section she tells him to go find a book, and they separate. He walks a step to the first display in the center of the entry area, grabs something, and shouts “Momma I found a BOOK.”
Come now, you know that ability was one of the things broken in moving fast~ :sarcmark: