• 1 Post
  • 15 Comments
Joined 1 year ago
cake
Cake day: June 15th, 2023

help-circle
  • Another big thing that doesn’t get covered by big O analysis is the potential for parallelization and multi threading, because the difference created by multi threading only amounts to one of those dropped coefficients.

    And yet, especially for the workloads being run on a server with 32-128 cores, being able to run algorithms in parallel will make a huge difference to performance.



  • I don’t actually think eclipse is completely terrible (just saw the opportunity for a meme). My main problem with it is that unlike intelliJ, the UI buttons don’t scale with the font size, making it pretty unusable on my HiDPI laptop.

    For now I’ll just stick with IntelliJ/idea IDEs (I have access to an education license for ultimate) and then if/when Idea ruins it I’ll probably just try to integrate my Java workflow into either VS Code or an nvim setup






  • As a dev who works on both Java and C# code, modern Java (17+) and C# feel almost exactly the same (not sure if Java has extension methods though).

    Bonus points for using Kotlin instead tho. I dislike both Java and C# just because they both allow any object to be null and that’s usually a headache whenever a null exception shows up.

    The only thing I like better about C# is the Fixture library for testing. I haven’t found any mature libraries like it for Java yet.


  • I think we’re on the same page? If an attacker wanted a keylogger they wouldn’t even need to go as far as a screen, there are plenty of other ways (like a 3rd party keyboard app) that would work just as well, if not better, on an iPhone.

    Hell, while we’re at it, using a phishing email to get you to enter a password in a fake site or using social engineering to reset your passwords is way more effective than reverse engineering and modding a camera/screen.

    There’s no reason why Apple should get to keep exclusive rights on repairs just to profit more on parts. 3rd party screens, cameras, face id modules, etc. aren’t going to suddenly make your phone less secure.




  • If you think keyloggers require software running on your physical keyboards you’re in for a rude awakening.

    Keyloggers are almost always at a pure software level and are conceptually simple to make. So simple that in fact, it’s the same thing as running a regular application with background shortcuts. The only thing that is different is that regular apps aren’t saving/recording anything, they’re just listening for you to press cmd+whatever.

    It takes maybe ~10-15 minutes to make a keylogger in Python that could run on any computer, mac, windows, or Linux. Maybe a little longer if you wanted to use a compiled language and properly hide it.

    Sorry to burst your bubble.

    • A software developer

  • No, you can’t, because that isn’t a good analogy. Those two situations are not at all the same, but I’ll humor you.

    The analogy you’re making is like saying only the company who makes doors is allowed to change the lock on your door, and they’re allowed to just stop offering the lock-changing service whenever they want. They also conveniently put a mechanism in so that whenever a third-party locksmith comes, your door falls apart. Your only option is to buy a new door, doorknob, frame, and hinge because your lock is worn out.