What is Hackers' Pub?

Hackers' Pub is a place for software engineers to share their knowledge and experience with each other. It's also an ActivityPub-enabled social network, so you can follow your favorite hackers in the fediverse and get their latest posts in your feed.

0
1
1

무슨 한번 잡은 언어로 커리어 끝날 때까지 붙들고 있어요 무슨 은행기간망 코딩하는 코볼 할배도 아니고... 그런 개발자는 골방에 틀어박혀 있거나 어디 저기 팀장님만 아는 전화번호 들고 은둔생활하고 있어서 볼 일이 없어요. 어릴땐 터보씨 배우다가 취업전엔 자바스프링 쳐다보고 취업후엔 액션스크립트하다가 유니티 C#로 갈아탔는데 이직했더니 언리얼 C++ 플젝 들어왔는데 만지기는 Groovy랑 파이썬을 더 만지고 있음.

0
0
0

気になるのは首相の謝罪なんかより、やった当人たちの謝罪が、自身の差別意識とどこまで真摯に向き合ったうえでの謝罪か(形式的な火消し目的だけの謝罪になってない?)、ってところかなあ。

フィンランド 国会議員の“つり目”写真投稿問題 オルポ首相が日本 中国 韓国の大使館SNSに謝罪声明掲載 | NHKニュース | フィンランド news.web.nhk/newsweb/na/na-k10

0
1
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
1
0
1
0
0

UNICEF's statement on age restrictions on social media highlights a key point that supporters of these restrictions ignore — social media bans hurt the most vulnerable and marginalized young people, cutting them off from sources of connection, expression, and learning. unicef.org/press-releases/age-

To learn more about age verification and the impacts and harms of these policies, head to EFF.org/Age.

Age Verification and Age Gating: Resource Hub

Age verification (or age-gating) laws generally require online services to check, estimate, or verify all users’ ages—often through invasive tools like ID checks, biometric scans, or other dubious “age estimation” methods—before granting them access to certain online content or services.  Governments in the U.S. and around the world are increasingly adopting these restrictive measures in the name of protecting children online. But in practice, these systems create dangerous new forms of surveillance, censorship, and exclusion.  Technologically, the age verification process can take many forms: collection and analysis of government ID, biometric scans, algorithmic or AI-based behavioral or user monitoring, digital ID, the list goes on. But no matter the method, every system demands users hand over sensitive and immutable personal information that links their offline identity to their online activity. Once that valuable data is collected, it can easily be leaked, hacked, or misused. (Indeed, we’ve already seen several breaches of age verification providers.) EFF has long warned against age-gating the internet. Age verification technology itself is often inaccurate and privacy-invasive. These restrictive mandates strike at the foundation of the free and open internet. They are tools of censorship, used to block people from viewing or sharing information that the government deems “harmful” or “offensive.” And they create surveillance systems that critically undermine online privacy, chill access to vital online communities and resources, and burden the expressive rights of adults and young people alike. EFF.org/Age: A Resource to Empower Users Age-gating mandates are reshaping the internet in ways that are invasive, dangerous, and deeply unnecessary. But users are not powerless! We can challenge these laws, protect our digital rights, and build a safer digital world for all internet users, no matter their ages. This resource hub is here to help—so explore, share, and join us in the fight for a better internet.

www.eff.org · Electronic Frontier Foundation

0

‘어린 가해자’가 받는 보호, ‘어린 피해자’는 왜 못 받나 [n번방 재판 방청기] h21.hani.co.kr/arti/society... "특히 사법시스템의 존재 의의까지 들먹이며 소년범의 갱생과 교화를 포기할 것이냐며 윽박지르는 이들을 용납하기 어렵다고 했다. 공동체를 위해 영화 ‘밀양’에서 나오던, 용서마저 피해자에게 강요하는 사회가 역하다고 했다. 소년범들을 갱생·교화시켜 공동체 복귀까지 끌어낼 고민만 할 뿐, 피해자의 일상이 어떻게 됐는지, 피해자를 위해 무엇을 할지는 왜 고민하지 않는가."

‘어린 가해자’가 받는 보호, ‘어린 피해자’는 왜 못...

0
1
0
1
0
0
0

AWS CEO, "AI로 주니어 개발자를 대체하는 것은 ‘가장 어리석은 생각 중 하나’"
------------------------------
-
AWS CEO Matt Garman 은 기업이 AI로 주니어 개발자를 대체하려는 움직임에 반대하며, 이들이 *AI 도구 활용에 가장 능숙한 인력층* 이라고 강조
- 첫 번째 이유로, 젊은 개발자들은 *AI 기반 툴에 익숙하고 적응이 빠르며* , 실제로 많은 주니어 개발자가 매일 AI를 활용하고 있음
- 두 번째로, 주니어 인력은…
------------------------------
https://news.hada.io/topic?id=25159&utm_source=googlechat&utm_medium=bot&utm_campaign=1834

0
0
1

Someone takes a photo and posts it online. They didn't photoshop something crazy into it, they didn't add any text, they didn't juxtapose it with another image to make a point. It's not a gif or screenshot or a piece of stock photography. It's just a photo they took.

That photo is not a "meme." Even if it's clever. Even if it's funny. It's their work.

Don't fuckin' repost it without credit. Don't pretend like you took it.

0

AWS CEO, "AI로 주니어 개발자를 대체하는 것은 ‘가장 어리석은 생각 중 하나’"
------------------------------
-
AWS CEO Matt Garman 은 기업이 AI로 주니어 개발자를 대체하려는 움직임에 반대하며, 이들이 *AI 도구 활용에 가장 능숙한 인력층* 이라고 강조
- 첫 번째 이유로, 젊은 개발자들은 *AI 기반 툴에 익숙하고 적응이 빠르며* , 실제로 많은 주니어 개발자가 매일 AI를 활용하고 있음
- 두 번째로, 주니어 인력은…
------------------------------
https://news.hada.io/topic?id=25159&utm_source=googlechat&utm_medium=bot&utm_campaign=1834

0
0

かわいい!!​:blobcat_surprised:

1

Cryptography question: is it bad (as in, does it introduce a vulnerability) if a single hash is verified using two different algorithms? Like this:

if (algo1.verify(password, hash) || algo2.verify(password, hash)) {
  //...
}

My gut instinct is that this is
bad, but I'm not exactly sure why, and that makes me hesitant to include it as a finding in this audit. I'd appreciate any input from my cryptography friends! ​:neofox_heart_blue:

0
1
0
1
0
0
1
3
0