Off Topic
    • Categories
    • Tags
    • Users
    • Groups
    • Amazon
    • OT Fundraiser
    • Register
    • Login

    The OFFICIAL programming thread

    Tech
    22
    1.4k
    10.5k
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • PakoonP
      Pakoon
      last edited by

      Chris Kubecka 🇵🇷🇨🇿🇳🇱 🇺🇦 secevangelism bsky on Twitter

      ♙♙♙ Michael Waltz added you to the group.

      1 Reply Last reply Reply Quote 1
      • ?
        A Former User @A Former User
        last edited by

        @hog said in The OFFICIAL programming thread:

        b77a7380-4cb3-4487-a493-0e838deb2ebd-image.png

        Given his user name, I really want to reply:

        Now listen cunt, I don’t know how you think you can see my screen but it definitely isn’t visible.

        Well that was a weird turn around.

        I was frustrated with the low value response (“hur, I don’t even use your operating system but I can see the caret on my screen so you must be able to, dur”. And I didn’t have much hope of the issue being seen by anyone who knew anything since there are 5K open issues on their github. I’ve got a day job now and I have enough frustration there so I wrote a polite, if slightly pissy reply, and closed the issue. About an hour later the original author of Godot reopened my issue himself, diagnosed the problem and suggested some things to try which confirmed the cause and gave me a workaround.

        It’s the alpha release of their new 4.0 version and I don’t have to use it but it’s gratifying that they responded.

        1 Reply Last reply Reply Quote 3
        • ?
          A Former User
          last edited by

          9cd5cff9-c571-44b1-a93c-cbffdaf3960b-image.png

          Javascript is 26 years old now. It has long stopped being the new kid on the block and it never bore even the slightest resemblance to Java. Can they stop fucking doing this please?

          KilemallK 1 Reply Last reply Reply Quote 0
          • KilemallK
            Kilemall Careful, railroad agent @A Former User
            last edited by

            @hog said in The OFFICIAL programming thread:

            9cd5cff9-c571-44b1-a93c-cbffdaf3960b-image.png

            Javascript is 26 years old now. It has long stopped being the new kid on the block and it never bore even the slightest resemblance to Java. Can they stop fucking doing this please?

            This is what you get when you use Bing.

            https://i.imgur.com/hX2CMMZ.jpg

            Never go full Lithu-
            Twain

            No editing is gonna save you now-
            Wingmann

            http://s3.amazonaws.com/rrpa_photos/72217/DSC_2528.JPG

            http://s3.amazonaws.com/rrpa_photos/20416/PTOB 101_resize.jpg

            Gators1G ? 2 Replies Last reply Reply Quote 1
            • Gators1G
              Gators1 @Kilemall
              last edited by

              @kilemall said in The OFFICIAL programming thread:

              @hog said in The OFFICIAL programming thread:

              9cd5cff9-c571-44b1-a93c-cbffdaf3960b-image.png

              Javascript is 26 years old now. It has long stopped being the new kid on the block and it never bore even the slightest resemblance to Java. Can they stop fucking doing this please?

              This is what you get when you use Bing.

              My vaccine scar hurt when I read this post.

              alt text

              1 Reply Last reply Reply Quote 5
              • ?
                A Former User @Kilemall
                last edited by A Former User

                @kilemall said in The OFFICIAL programming thread:

                This is what you get when you use Bing.

                Fair call I guess but it’s happened literally hundreds if not thousands of times for me using Google in past years.

                Edit: just tried it in google and no Java hits so they’ve fixed it. Duck Duck Go gives me a Java hit as the third result.

                1 Reply Last reply Reply Quote 0
                • TazzT
                  Tazz
                  last edited by

                  Elliptic Curve Cryptography Overview

                  GTFO

                  1 Reply Last reply Reply Quote 1
                  • ?
                    A Former User
                    last edited by

                    I ported some python code to javascript once that used ECC. I understood it better after the exercise than before but I’m still not 100% up on it. It’s interesting stuff though and heavily used in Bitcoin etc.

                    1 Reply Last reply Reply Quote 2
                    • Gators1G
                      Gators1
                      last edited by

                      Pretty cool story…

                      How I hacked a hardware crypto wallet and recovered $2 million

                      alt text

                      ? JamJ 2 Replies Last reply Reply Quote 2
                      • ?
                        A Former User @Gators1
                        last edited by

                        @gators1 said in The OFFICIAL programming thread:

                        Pretty cool story…

                        How I hacked a hardware crypto wallet and recovered $2 million

                        I’m only 6 minutes in so don’t spoil it for me but he just said this:

                        My friend forgot the password. The irony is is that he’s a poker player with a photographic memory. He remembers everything, cards, license plate numbers etc but he forgot this password.

                        I’m thinking, yeah right. Your “friend” is a degenerate gambler who has sold the coins chasing losses at a casino and “forgetting” the password is the way he doesn’ have to own up to it.

                        Maybe I’m too harsh and cynical but that’s what it smells like to me. I’ll keep watching and find out.

                        1 Reply Last reply Reply Quote 1
                        • ?
                          A Former User
                          last edited by

                          I feel bad now. Good story though.

                          1 Reply Last reply Reply Quote 0
                          • Gators1G
                            Gators1
                            last edited by

                            Hack the planet!

                            alt text

                            1 Reply Last reply Reply Quote 1
                            • TazzT
                              Tazz
                              last edited by

                              Ok who was it??

                              Rick Moran  /  Feb 3, 2022

                              Lone U.S. Hacker Brings Down Entire North Korean Internet – Twice

                              Lone U.S. Hacker Brings Down Entire North Korean Internet – Twice

                              A lone U.S. hacker who goes by the handle “P4x” is claiming responsibility for shutting

                              GTFO

                              StuS 1 Reply Last reply Reply Quote 0
                              • JamJ
                                Jam @Gators1
                                last edited by

                                @gators1 said in The OFFICIAL programming thread:

                                Pretty cool story…

                                How I hacked a hardware crypto wallet and recovered $2 million

                                I don’t want to watch the video.

                                So . . .

                                Is it relatively easy for a smart person to steal a crypto wallet or not?

                                "laissez les bons temps rouler!"

                                1 Reply Last reply Reply Quote 0
                                • Gators1G
                                  Gators1
                                  last edited by

                                  Maybe

                                  alt text

                                  JamJ 1 Reply Last reply Reply Quote 0
                                  • JamJ
                                    Jam @Gators1
                                    last edited by

                                    @gators1 said in The OFFICIAL programming thread:

                                    Maybe

                                    I had to scan-watch the video you bastage!

                                    So The Kingpin succeeded, but Trezor would have you believe “not next time, buddy.”

                                    Snap1.jpg

                                    "laissez les bons temps rouler!"

                                    1 Reply Last reply Reply Quote 0
                                    • ?
                                      A Former User
                                      last edited by A Former User

                                      The rest is fair enough but why even mention “This attack requires full physical access to the device” like that in any way mitigates it?

                                      Today I’m proud to announce the Hog Wallet:

                                      You write your private key on a piece of paper, fold it over twice and stick it in your pocket. My system is impenetrable in normal operation. Any attack requires full physical access to the device.

                                      Gators1G 1 Reply Last reply Reply Quote 4
                                      • Gators1G
                                        Gators1 @A Former User
                                        last edited by

                                        @hog said in The OFFICIAL programming thread:

                                        The rest is fair enough but why even mention “This attack requires full physical access to the device” like that in any way mitigates it?

                                        Today I’m proud to announce the Hog Wallet:

                                        You write your private key on a piece of paper, fold it over twice and stick it in your pocket. My system is impenetrable in normal operation. Any attack requires full physical access to the device.

                                        I want one! If someone picks my pocket and uses the paper to steal my Lithucoins then I will be left immensely richer!

                                        alt text

                                        1 Reply Last reply Reply Quote 2
                                        • StuS
                                          Stu @Tazz
                                          last edited by

                                          @tazz said in The OFFICIAL programming thread:

                                          Ok who was it??

                                          Rick Moran  /  Feb 3, 2022

                                          Lone U.S. Hacker Brings Down Entire North Korean Internet – Twice

                                          Lone U.S. Hacker Brings Down Entire North Korean Internet – Twice

                                          A lone U.S. hacker who goes by the handle “P4x” is claiming responsibility for shutting

                                          Tens of people were angered!

                                          It is easy to do justice - very hard to do right

                                          KilemallK 1 Reply Last reply Reply Quote 5
                                          • Gators1G
                                            Gators1
                                            last edited by

                                            Isnt this website run on NginX too? Maybe its North Korea knocking LOT offline all the time? How do we stop this commie menace?

                                            alt text

                                            1 Reply Last reply Reply Quote 2
                                            • First post
                                              Last post