• 3 Posts
  • 44 Comments
Joined 8 months ago
cake
Cake day: April 2nd, 2025

help-circle
  • He’s doing it in the mindset of a non-techy person,

    No. He went to significant lengths to circumvent the “non-techy” interface, drop into command line mode, disregard multiple plain English warnings, and manually override the safety systems, in order to force something that was clearly, obviously, undeniably wrong. That is not normal behavior, regardless of a person’s tech skills. That is pathological behavior, the likes of which would lead to serious injury or death if operating a common household appliance.

    And then, after all that, he had the nerve to blame other people for the result.

    I can’t believe so many of you are still not getting this.

    Believe what you want. I have no interest in arguing with you.

    For the sake of other readers, though, I will say that Linus Sebastian is unfit to give advice about computers. He overestimates his skills and knowledge, does sloppy work, and behaves irresponsibly before an audience.



  • Make a split-screen video:

    Left side: Windows user performing a system update.

    Right Side: Linux user performing a system update. And then editing a document. And then answering some messages. And then a bit of shopping. And then playing a game. All while the Windows user is still waiting for the update to finish.

    Then reveal that the Linux system has a fraction of the RAM and a much older CPU than the Windows system.






  • it’s not clear in the article what they’re doing with the waste they recover. Simply moving it around doesn’t eliminate the garbage. And the project does not appear to include a budget for recycling or otherwise repurposing what they recover.

    I found this with three clicks on project’s web site:

    “Once our containers are full of plastic onboard, we bring them back to shore for recycling. For each system batch, we are making durable and sustainable products. Supporters getting the products will help fund the continued ocean cleanup. Catch, rinse, recycle and repeat - until the oceans are clean. The sunglasses are a proof of concept for this.”

    It might not seem like much yet, but it’s better than nothing, and we have to start somewhere.




  • I don’t validate emails, I test them.

    Hooray! You get a gold star.

    OK, maybe I do some light validation first,

    I hope your “validation” does nothing more than show a warning that the user is allowed to ignore.

    I have seen too many systems built by people who think they know what’s valid or not before and after the @ sign*, and they are almost always dead wrong. In the worst cases, such systems accept an unusual-looking address and claim to send the expected verification message, but never actually send it. Of course, these systems won’t work for some people, and since none of their online docs or support staff know why, those people will be locked out of using the system and funneled into bottomless pit of misery if they try. Please don’t build broken garbage like this.

    *Fun fact: Not so terribly long ago, even the @ sign didn’t have to be present. Some email addresses were bang paths. I’m not sure if any of these are still in use, but it wouldn’t shock me to learn that they are.






  • I didn’t think I would have to spell this out, but when I wrote “as much as possible”, I was acknowledging that some libraries are either too complex or too security-sensitive to be reasonably homebrewed by the unqualified. (Perhaps “as much as reasonably possible” would have been better phrasing.) Where the line lies will depend on the person/team, of course, but the vast majority of libraries do not fall into that category. I was generalizing.

    And yes, some third-party libs might get so much public scrutiny as to be considered safer than what someone would create in-house, depending on their skills. But safety in numbers sometimes turns out to be a false assumption, and at the end of the day, choosing this approach still pushes external risks (attack surface) onto users. Good luck. It hardly matters to the general point, though, because most libs do not have this level of scrutiny.

    Let’s also remember that pinning dependencies is not a silver bullet. If I didn’t trust someone to follow “best practices”, I don’t think I would trust their certification of a third-party library hash any more than I would trust their own code.

    With all that said, let me re-state my approach for clarity:

    • I minimize dependencies first. Standard libraries are great for this.
    • When something more cannot reasonably be avoided, I choose very carefully, prioritizing the safety of my users over my own convenience.
    • Sometimes that means changing my original design, or spending my time learning or building things that I hadn’t planned to. I find the results to be worth it.