froztbyte

joined 2 years ago
[–] froztbyte@awful.systems 9 points 1 year ago

I’m kinda amazed it’s not multiple Telegram groups

vulnerabilities for thee but not for me! but kinda same, esp given how much both orange man and felon are willing to ride putin's tumescent instructions to feel some faint warm glow at how much destruction they can wreak

[–] froztbyte@awful.systems 13 points 1 year ago (1 children)

reminder: one does not, under any circumstances, have to "give it to them". these weird fuckers already have all the water carriers they need

and no, it doesn't appear to be the case that this person is merely a shitty writer

(nor is that the only thing they're shitty about)

[–] froztbyte@awful.systems 12 points 1 year ago (1 children)

I think it did come up a few weeks back, but it's indeed a hilarious mess. the engagement must flow!

[–] froztbyte@awful.systems 9 points 1 year ago

so, for instance, in the case of markdown specifically: it's actually a shitshow format to implement. the reference implementation driving the "spec" as done by gruber was (iirc) essentially a big stack of regexes with language-specific behaviours assumed in, and lots of by-design implementation presumptions rather than by-specification dictation

want to make an implementation in another language? better hope you know every single corner case and behaviour!

(this is one of the reasons why markdown impls varied for so many years, and why even now "commonmark" is still trying to fix the issue)

[–] froztbyte@awful.systems 5 points 1 year ago (1 children)

and many you can tell they're dogshit from the moment they're introduced

[–] froztbyte@awful.systems 7 points 1 year ago (1 children)

a swing and a miss! maybe your new years resolutions should include knowing something about where you're posting

[–] froztbyte@awful.systems 3 points 1 year ago (1 children)

I'm aware of the construction of a CIDR prefix, I meant what are you using to categorise IPs from requests to look up mask size? whois? using published NIC/RIR data? what's in BGP/routedumps? other?

[–] froztbyte@awful.systems 6 points 1 year ago (3 children)

the threshold is proportional to 1.5^(32-subnet_mask)

what are you basing that prefix length decision off? whois/NIC allocation data?

is the decision loop running locally to any given f2b instance, or do you aggregate for processing then distribute blocklist?

either way, seems like an interesting approach for catching the type of shit that likes to snowshoe from random cloud providers while lying in agent signature

[–] froztbyte@awful.systems 8 points 1 year ago (1 children)

I'm not sure I understand your comment, mind elaborating on the details?

[–] froztbyte@awful.systems 12 points 1 year ago

it’s the holidays, it’s okay: you don’t have to go near the c++ right now

[–] froztbyte@awful.systems 4 points 1 year ago

I haven't really got enough information about that side of it, the details I have to go on are mostly about things particularly around the values CCC has tried to hold/build (and even there I am absolutely not intimately familiar, for reasons of distance and exposure and such)

[–] froztbyte@awful.systems 7 points 1 year ago

yep, have made the same critique. the way people "overcommit" on this is a fascinating interplay of sunk cost fallacy combined with some other shit

view more: ‹ prev next ›