What is the goal, exactly, and what is your threat/trust model?
Spooky Mulder
- 0 Posts
- 15 Comments
Spooky Mulder@twun.ioto
Linux@lemmy.ml•I hate how Apples + Googles Prinz services are fucking my Printer, yet CUPS does it right.
97·18 days agoFYI: CUPS was recently outed as extremely insecure and irrevocably broken by design. So if you’re not actively printing, it’s probably best to uninstall it.
Spooky Mulder@twun.ioto
Programming@programming.dev•Which software design principles do you rely on most?
21·24 days ago-
Solve the problem directly in front of you. You are not as good at predicting the future as you think you are. (aka: YAGNI)
-
Organize your code around the problem domain, and name things accordingly. As a basic razor, consider someone seeing your codebase for the first time – they should be able to easily glean what your app does, not just what language (Java) or frameworks (Rails) or design patterns (MVC) you might be using.
-
Each function must Do One Thing. And yes, each test case is a unit, too.
-
It must be clear to someone reading a function call what is expected to happen. Only use positional arguments when this is true and when order matters and is reasonably intuitive. Otherwise, always use named arguments.
-
Your tests must run quickly. Your code must build quickly. Your CI/CD pipelines must be measured in seconds, not minutes or hours.
-
Take nothing for granted. Declare all dependencies, and avoid implicit globals.
-
Use a linter, and enforce compliance. It doesn’t matter what the rules are, but once established, avoid changing them.
-
Never isolate yourself from your team for too long. If you’re working on a multi-day implementation, check in with the people who would be reviewing your code at least every couple of days. The longer you isolate, the more exhaustion and conflict you can expect during review, for both you and your reviewers.
-
Learn to work iteratively, validating minimal implementations that fall short of the full feature as requested, but which build up to it. As opposed to One Big Release. It helps everyone to experience and validate early and often how the feature feels and whether it’s the right direction.
-
Never rush. Always take the time to build properly. Your professionalism and expert opinion is non-negotiable, even if (especially if) there’s a deadline. I’m not saying to say “no” – rather, just give honest estimates and offer functional compromises or alternatives when possible. Never “try” to do more than is reasonable.
A lot of this, I attribute to Martin’s books (“Clean Code” and “The Clean Coder”) and his Laracon talk from several years ago (you can find it on YouTube).
-
Spooky Mulder@twun.ioto
Privacy@lemmy.ml•Does anyone else's Tor Browser won't start connections?
3·30 days agoI have found that it often takes a very long time for Tor to build a circuit (bootstrap) using obfs4, because of what seems to be difficulty finding bridges.
Spooky Mulder@twun.ioto
Selfhosted@lemmy.world•Recommendations for Note taking app with simple needsEnglish
55·1 month agoEvery now and then this question comes up. It’s a timeless software engineering conundrum. Kind of like how med students might start to think they have all kinds of diseases and conditions because they’re learning all these symptoms.
Software engineers, especially new ones, tend to be heavily biased toward applying technical solutions to non-technical problems. Most never actually grow out of this.
I’ll advise what I advise every time someone approaches me or one of my peer groups with this very question:
Get yourself a notebook and a pen.
I’m dead serious, not trolling, and not some kind of technophobe zealot.
When it comes down to it, if you let go of what you think you need in a to-do list app, you’ll find that what you actually need is much simpler.
Notebooks are e2e encrypted. Self hosted. Offline. As ephemeral as you like. Indexable for search. Versatile. Take a picture of a page if you really want to. OCR it if you need to.
Pen and paper.
Spooky Mulder@twun.ioto
Linux@lemmy.ml•Is there a CLI Tor HTTP client, like curl/wget but routed over the Tor network?
16·1 month agoTor comes packaged with
torifywhich you can prefix any CLI command with to have it route through Tor and resolve onion sites properly.
Spooky Mulder@twun.ioto
Selfhosted@lemmy.world•Those who are hosting on bare metal: What is stopping you from using Containers or VM's? What are you self hosting?English
103·1 month agoNo, you’re not looking to understand. You’re looking to persuade.
Can’t close your account or request deletion of your data, either. Same thing happened to me.
Spooky Mulder@twun.ioto
Selfhosted@lemmy.world•issues setting up nginx as an https proxyEnglish
2·1 month agoSeems like something you may need to change in Transmission’s configuration, somewhere. Because it’s Transmission that is redirecting you and what you want is for that redirect to include the uri prefix.
Otherwise, I see two options:
- use a regex location block and match against all expected patterns
- use a dedicated subdomain (i.e: server block) for this (each) service you want to proxy and just proxy all traffic to that domain with a root location block.
The latter is what I would do.
Spooky Mulder@twun.ioto
Privacy@lemmy.ml•Best way to transport a computer out of country?
23·2 months agohttps://www.eff.org/wp/digital-privacy-us-border-2017
General advice from EFF. A bit dated, but much of what I would have advised is here.
Exactly this. I doubt the effectiveness of a measure like this. Without enforcement, explicit and public cooperation from AI scrapers, consequences/accountability, and legal backing, it’s just theater.
The equivalent of a strongly worded letter.
It’s complementary to robots.txt.
- It’s weird that it’s XML, in 2025.
- It’s weird that it doesn’t use the .well-known/ prefix which has trended in the last decade for placement of files like this.
- It’s weird that it canonically uses the generic “license.xml” file name instead of “license.rsl” or “rsl.xml” or something that more clearly indicates its semantics.
But I do like the idea of having some widely adopted conventional way of expressing, in unambiguous terms, which usages are expressly prohibited, and that AI training is among them.
Spooky Mulder@twun.ioto
Fediverse@lemmy.world•Implementing Portable User Identities with DIDsEnglish
01·2 months agoThe way this comment is written doesn’t sound anything like the OP or the GitHub issue. Different tone, different dialect/spelling… lot of linguistic red flags. Not that I’m judging either way, it’s just suspicious how vastly different they are.

I have been using this as my daily driver on my Android phone for the past year or so because there is no LibreWolf for Android. No complaints.