PenguinCoder
Bit-breaker working in cybersecurity/IT. Only languages I know are English and Programming ones.
Sometimes I write things about technology.
If I told you the SHA256 for this sentence starts with 'c, 5, four, a, and a', would you believe me?
- 120 Posts
- 748 Comments
PenguinCoder@beehaw.orgto
Data Breaches@lemmy.zip•Handala Hackers Releases Massive Data Breach of Former Mossad ChiefEnglish
3·21 days agoNow those are the Epstien files.
PenguinCoder@beehaw.orgto
Technology@beehaw.org•Steve Wozniak says he's "disappointed a lot" by AI and rarely uses itEnglish
15·22 days agoIt’s not human. Stop having this expectation.
Then it needs to stop being interjected and trying to take over the Human aspect of tech, art, creativity, etc.
Till then…
PenguinCoder@beehaw.orgtoTechnology@midwest.social•FCC moves to block new foreign-made routersEnglish
1·22 days agoA step above, pro-sumer grade. Takes some knowledge to get right, has some advanced fiddly bits if needed, but not as complex or powerful as a mikrotik or enterprise gear. Not as sad as a Netgear or Belkin consumer grade crap.
PenguinCoder@beehaw.orgto
Technology@beehaw.org•Age checks creep into Linux as systemd gets a DOB fieldEnglish
71·22 days agoI’m gonna sound like Prof Snape here, but Goddamnit Poettering!
PenguinCoder@beehaw.orgtoTechnology@midwest.social•FCC moves to block new foreign-made routersEnglish
4·23 days agoThere goes Ubiquiti and Mikrotik’s. Ugh. Good homelab and SMB routers. Shit, that’s basically anything that isn’t Cisco, even though those are really only assembled in USA not even manufactured.
PenguinCoder@beehaw.orgtoUnited States | News & Politics@midwest.social•Over half of Americans say health care, a weeklong vacation and a new car are unaffordable: ABC News/Washington Post/Ipsos pollEnglish
3·28 days agoWell no shit. Basic survival is taking a good 80% of the paycheck. Probably CC and other debt takes the remaining. Maybe a few bucks left for a fancy coffee or red bull. Ain’t got no time or money for Healthcare or vacations.
PenguinCoder@beehaw.orgto
Television@piefed.social•What are some lesser-known or obscure TV series that you think should be much bigger, and that people would enjoy if they watched it?English
1·1 month agoTURN is a great show. Very compelling, some truth to it although not the main characters or the spy ring itself. Finishingsn episode always leaves me wanting to immediately watch the next.
Obligatory, fuck Simcoe.
PenguinCoder@beehaw.orgtoUnited States | News & Politics@midwest.social•US to release 172 million barrels of oil from strategic petroleum reserveEnglish
1·1 month agoNot why it’s there or supposed to be used for…
PenguinCoder@beehaw.orgto
Free and Open Source Software@beehaw.org•The new Jolla Phone with Sailfish OS is on track to start shipping in the first half of 2026 - LiliputingEnglish
1·1 month agoSome key components of Sailfish OS have been licensed proprietary by Jolla from the start and ever since (as of Sailfish OS 5.0 in February 2025). Since September 2025 some closed parts of Sailfish OS have been open sourced, with the announcement that more parts are to be followed.
The oldest shark teeth are from the Early Devonian, about 410 million years old. These are without a doubt sharks, although different species than exist currently. The earliest fossil of a plant engaging in this evolutionary strategy is a 12 meter tall palm-like plant from China. It dates back, again, to the Early Devonian, but less than 400 million years ago.
Which means the first toothed sharks predate the first plant which could be called a tree by 10 million years.
Sharks are older than the rings of Saturn!
PenguinCoder@beehaw.orgtoWorld News@lemmy.ml•Johnson: US Must Wage War With Iran Because of Its “Misguided Religion”English
18·1 month agoI cannot believe that was actually said by a United States representative, where it is and has been codified in the nations constitution, that freedom of religion is a right of the people via the first amendment. Freedom of religion means any religion, but also, freedom from religion.
to wit: The civil rights of none shall be abridged on account of religious belief or worship, nor shall any national religion be established, nor shall the full and equal rights of conscience be in any manner, or on any pretext, infringed.
PenguinCoder@beehaw.orgto
Data Breaches@lemmy.zip•LexisNexis confirms data breach as hackers leak stolen filesEnglish
5·1 month agoFor 70% of the companies out there, If your company or website collects it; hackers will get it. Your PR ‘trust us’ words have no meaning or substance.
PenguinCoder@beehaw.orgto
Asklemmy@lemmy.ml•I get along with every coworker but 2 out of 14, manager is somebody who sabotaged me in the past. To even consider working there again is such a stupid idea, isn’t it?English
4·2 months agoPeople don’t generally quit bad jobs, they stick it out for whatever reason. They do quit having a bad boss though.
PenguinCoder@beehaw.orgto
Web Development@programming.dev•Best practice for resetting a user's MFA?English
7·2 months agoThere’s a really nice high level overview of TOP/MFA by OWASP
They say:
There is no definitive “best way” to do this, and what is appropriate will vary hugely based on the security of the application, and also the level of control over the users. Solutions that work for a corporate application where all the staff know each other are unlikely to be feasible for a publicly available application with thousands of users all over the world. Every recovery method has its own advantages and disadvantages, and these need to be evaluated in the context of the application.
Some suggestions of possible methods include:
- Providing the user with a number of single-use recovery codes when they first setup MFA.
- Requiring the user to setup multiple types of MFA (such as a digital certificate, OTP core and phone number for SMS), so that they are unlikely to lose access to all of them at once.
- Mailing a one-use recovery code (or new hardware token) to the user’s registered address.
- Requiring the user contact the support team and having a rigorous process in place to verify their identity.
- Requiring another trusted user to vouch for them.
The most important thing I think is, the MFA reset should have a different method and flow than the password reset option. Figure if an attacker attempts the ‘forgot password’ method, it’s assumed they have access to the users email. Therefore, you don’t want to send a ‘reset MFA’ in the same manner. The password recovery flow should be separate to the MFA recovery flow by using some form of out-of-band verification such as sending a password reset link within a “forgotten password email” containing a randomly generated and unique token that allows the user to reset the password only. The MFA recovery flow should work in a different manner. If you are offering TOTP only, I suggest offering a fallback method in place such as a list of “backup codes” of valid OTPs that the user needs to keep safe, and is obtained when first enrolling in MFA, or otherwise an OTP sent via SMS with a short expiration time. Ask for the TOTP while entering a new password. The reset link would be useless for the attacker.
PenguinCoder@beehaw.orgto
Windows@sopuli.xyz•Microsoft is adding image support to Notepad on Windows 11English
4·2 months agoUnnecessary. It’s a damn text editor. Leave it simple.
PenguinCoder@beehaw.orgto
Space@mander.xyz•The Trump administration is illegally gutting NASA’s largest research library.English
61·2 months agoAdd it to the list of illegal shit his administration has been doing.
PenguinCoder@beehaw.orgto
Technology@beehaw.org•Amazon blames human employees for an AI coding agent’s mistake | Two minor AWS outages have reportedly occurred as a result of actions by Amazon’s AI toolsEnglish
15·2 months agoA computer (AI) can never be held accountable. Therefore, a computer (AI) must never make any human decision.
PenguinCoder@beehaw.orgto
Politics@beehaw.org•Trump threatens 10% global tariffs and rails against supreme court justicesEnglish
4·2 months agoAnd yet the prices for consumers will not reflect such. MOAR PROFITS! YAY.
PenguinCoder@beehaw.orgtoUnited States | News & Politics@midwest.social•Trump threatens 10% global tariffs and rails against supreme court justicesEnglish
8·2 months ago“I wanted to be a good boy,” Trump said, describing his relative restraint
AAHahahahaaaaaaaaaahhaaaaaaaaaaaaa. Oh, what a POS.













Yes, it does. Sure it works, but at what cost to security and actual human understanding?? RollerCoaster Tycoon works and I’m not saying its insecure or vibe coded, but it’s written in friggen assembly!
The problem isn’t the vibecoding inherently, it’s the people that are doing it. Vibecoding just enables them to exist.
They have no concept of what it means to produce general software for actual users using different setups. They generally have little patience and will abandon their projects very quickly. They are completely reliant on the models to fix any problems (or add features), so anything that, for whatever reason, a model can’t fix will remain broken.
Look at this vibe coded app and thread on reddit for just one example https://old.reddit.com/r/selfhosted/comments/1rckopd/huntarr_your_passwords_and_your_entire_arr_stacks/
Was that vibe coded tool used correctly? Done, does not mean good, or safe, or even usable.