830
top 50 comments
sorted by: hot top controversial new old
[-] m3t00@lemmy.world 2 points 3 hours ago

crack heads, meth heads, what's the diff

[-] m3t00@lemmy.world 2 points 3 hours ago

dev came from marketing. pictures wouldn't show up with all that security enabled.

[-] angstylittlecatboy@reddthat.com 9 points 8 hours ago

At this point I think the women using it got psyopped

[-] JackbyDev@programming.dev 17 points 9 hours ago* (last edited 8 hours ago)

Hack has at least two definitions in a computing context.

  1. A nifty trick or shortcut that is useful. "Check out this hack to increase your productivity."
  2. Accessing something you shouldn't. "They hacked into the database."

A lot of times they sort of get used in conjunction to describe interesting ways to gain access to secure systems, but using it to describe accessing insecure things you shouldn't is still a valid usage of the phrase.

That said I definitely wanna see the company face charges for this, this is insane.

[-] SpaceCowboy@lemmy.ca 9 points 7 hours ago

Yeah, if I leave my house door wide open for a few weeks and I get robbed, it's still burglary.

[-] grendel84@tiny.tilde.website 4 points 7 hours ago

@SpaceCowboy @JackbyDev

In a legal context there's also the concept of a "reasonable expectation of privacy". The computer abuse and fraud act defines hacking as accessing data or systems you are not authorized to access.

A better analogy is putting your journal in a public library and getting mad when somone reads it.

I'm not saying what these ass holes did was right, I'm saying that the company weakened their legal position by not protecting the data.

[-] SpaceCowboy@lemmy.ca 4 points 5 hours ago

Terrible analogy. You have permission to read books in a library.

Forgetting to lock your door isn't granting permission to people enter your house, and it doesn't grant people permission to take your valuables. It may be neglectful to leave your door unlocked, but it doesn't imply granting permission to enter your house.

Same goes with computer security. Leaving your computer insecure may be neglectful, but it does not imply someone has permission to take your data.

[-] grendel84@tiny.tilde.website 0 points 3 hours ago

@SpaceCowboy

Then how do I know what I am not allowed to access?

In this specific case there was no (formal) indication that the data was out of bounds.

I can't put 10 pdf files in a web dir and claim 5 are public and 5 are private, then charge you with a crime for viewing them.

You can't have "unauthorized access" when there's no authorization at all

[-] iii@mander.xyz 2 points 6 hours ago

A better analogy is putting your journal in a public library and getting mad when someone reads it.

Good analogy indeed. I'd go one step further and add: it's like promising others you'll keep their diary safe, then putting it in a public library, to then get mad when someone reads it.

[-] grendel84@tiny.tilde.website 4 points 6 hours ago

@iii

Yeah the internet by design is a public space, and we must be responsible and treat it as such when handling sensative data.

Again, it was very wrong for people to take that data and especially to post like that.

The company also has to do their part and produce at least some kind of barrier to the data.

Even using UUIDs and making sure the data wasn't query-able would have been something.

[-] silasmariner@programming.dev 2 points 4 hours ago

The web is a public space by design. The internet? I don't think you can make that case well. Https and all that. Private infra abounds.

[-] JackbyDev@programming.dev 4 points 7 hours ago

Thank you! I feel like I'm taking crazy pills reading people's reactions to this. And if it was a business instead of your house and it was customer data you weren't protecting you should still be in trouble too. It's like people think only one side can be in the wrong in this or that because the data wasn't secured and in the public that gives them free reign to post it everywhere. I wonder how those people would feel if their addresses were leaked. Afterall, if you're a homeowner your name is attached to the property and is publicly accessible.

[-] spicehoarder@lemmy.zip 9 points 8 hours ago

No, this was a data leak. The word "hack" has legal implications and shifts the blame away from the company and onto the individual who discovered the leak.

[-] JackbyDev@programming.dev 5 points 8 hours ago

It can be both. The company can be at fault for not keeping something secure while the people who steal the data are at fault for stealing data. Data leaks and hacks are not mutually exclusive.

[-] indepndnt@lemmy.world 3 points 8 hours ago

Based on this comment alone, I am 100% sure that you are not a lawyer.

[-] spicehoarder@lemmy.zip 1 points 5 hours ago

I don't claim to be, but you can't deny the difference the wording would make to a jury.

[-] grrgyle@slrpnk.net 5 points 8 hours ago
[-] finitebanjo@lemmy.world 4 points 7 hours ago

An app called Tea™ was marketed as a safespace for women and used government issued IDs as a way to verify users.

4Chan users leaked all of the IDs onto the larger internet.

[-] grrgyle@slrpnk.net 3 points 7 hours ago

Wow what a fuckin shitshow. I have so many follow-up questions

[-] Diplomjodler3@lemmy.world 22 points 12 hours ago

I always get irrationally angry when i see python code using os.path instead of pathlib. What is this, the nineties?

[-] UndercoverUlrikHD@programming.dev 2 points 4 hours ago

What big advantages does pathlib provide? os.path works just fine

[-] Diplomjodler3@lemmy.world 5 points 4 hours ago
  • Everything is in one library which offers consistency for all operations.
  • You can use forward slashes on Windows paths, which makes for much better readability.
  • You can access all the parts of a pathlib object with attributes like .stem, .suffix or .parent.
  • You can easily find the differences between paths with .relative_to()
  • You can easily build up complex paths with the / operator (no string additions).

Just off the top of my head.

[-] nibbler@discuss.tchncs.de 1 points 3 hours ago* (last edited 3 hours ago)

if you don't need those, why burden the program with another dependency?

[-] Diplomjodler3@lemmy.world 1 points 3 hours ago

It's in the standard library, just like os or shutil.

[-] indepndnt@lemmy.world 4 points 8 hours ago

And what's with the string addition? Never heard of f-strings or even .format()?

[-] Gonzako@lemmy.world 10 points 11 hours ago
[-] axEl7fB5@lemmy.cafe 5 points 9 hours ago

Be the change you want to see in the world.

[-] RaivoKulli@sopuli.xyz 1 points 9 hours ago

This is hilarious

load more comments
view more: next ›
this post was submitted on 26 Jul 2025
830 points (99.2% liked)

Programmer Humor

25282 readers
599 users here now

Welcome to Programmer Humor!

This is a place where you can post jokes, memes, humor, etc. related to programming!

For sharing awful code theres also Programming Horror.

Rules

founded 2 years ago
MODERATORS