this post was submitted on 24 Aug 2025
678 points (99.3% liked)

Programmer Humor

27477 readers
1908 users here now

Welcome to Programmer Humor!

This is a place where you can post jokes, memes, humor, etc. related to programming!

For sharing awful code theres also Programming Horror.

Rules

founded 2 years ago
MODERATORS
 
all 35 comments
sorted by: hot top controversial new old
[–] _cryptagion@anarchist.nexus 159 points 3 months ago (2 children)

I just checked, the credentials are still good.

[–] eager_eagle@lemmy.world 73 points 3 months ago

phew, that was close!

... wait

[–] ShaggySnacks@lemmy.myserv.one 5 points 3 months ago

You are truly a good person.

[–] Fizz@lemmy.nz 66 points 3 months ago (2 children)

There is a business I walk past every day and when you look in the window you can see wifi login creds and her name and password. Ive considered saying something but then I'd have to explain why they shouldn't do it and argue with them that its important.

Plus they're property managers so i would laugh if they got hacked.

[–] squaresinger@lemmy.world 46 points 3 months ago (1 children)

There was a common issue with a local ISP that their default wifi router passwords were based on the router's MAC address.

I scanned the wifis I could reach from my flat and found one that was vulnerable. Now I didn't know who that wifi belonged to. I would have had to knock on everyone's door, asking everyone if it's their wifi. Couldn't be bothered doing that and looking stupid doing so.

So instead I logged into their wifi and from there into their router config web page (it also had the default credentials admin/admin) and changed the SSID to [old SSID]_hacked.

The day after they had changed the SSID back and changed the password.

[–] gravitas_deficiency@sh.itjust.works 32 points 3 months ago (1 children)

Nice, that’s actually a pretty clean whitehat way to do it.

[–] InternetCitizen2@lemmy.world 5 points 3 months ago

Fr, I would have torrent some movies

[–] Diplomjodler3@lemmy.world 7 points 3 months ago (1 children)

Hack them and assign all the properties to your name.

[–] Trainguyrom@reddthat.com 8 points 3 months ago

Realistically if the company fails due to their terrible cyber security practices there's a high chance their properties will just be sold to an even larger property management firm

[–] obsidianfoxxy7870@lemmy.blahaj.zone 59 points 3 months ago (2 children)

or just don't use the same login information for everyone for a platform that way it doesn't need to be publicly posted.

[–] SeductiveTortoise@piefed.social 48 points 3 months ago (2 children)

They probably wanted to save on licensing costs.

[–] GreenKnight23@lemmy.world 26 points 3 months ago (3 children)

it's always licensing costs.

don't know how this is legal yet pirating software is illegal.

[–] db2@lemmy.world 27 points 3 months ago (1 children)
[–] LunaChocken@programming.dev 7 points 3 months ago

Command and conquer was da best. I mean I've started playing https://beyondallreason.info/ which Is a free open source RTS.

But damn the cutscenes were so cool.

[–] Pyr_Pressure@lemmy.ca 9 points 3 months ago

Maybe if licensing costs weren't ridiculous I wouldn't mind.

$15/m/user is ridiculous. Charge me like $100 a year for the license and then like $1/m/user on top. It literally doesn't matter much how many users there are for many programs, no extra resources for the company. And if it does use resources it's usually not $15/m worth.

[–] pupbiru@aussie.zone 9 points 3 months ago

it’s not technically legal afaik… the license defines a user pretty rigorously

[–] AntiBullyRanger@ani.social -1 points 3 months ago (2 children)

It's the 21c, passwords shouldn't exist.

[–] Trainguyrom@reddthat.com 6 points 3 months ago (1 children)

The real problem is there's not really a better solution that works well for private accounts owned by individuals who only have a single device.

They say that authentication is using either something you know, something you have or something you are, but in the real world it ends up being something you've forgotten, something you've lost and something that you were at one time but are no longer

[–] tyler@programming.dev 3 points 3 months ago (1 children)

We have passkeys now. They’re very effective

[–] Trainguyrom@reddthat.com 5 points 3 months ago (1 children)

Passkeys rely heavily on at least one device remaining authenticated. You have to remember, the average user of a given web service does not have an ISP, they literally only have their phone and maaaaybe a decade old laptop that they haven't turned on or charged since ordering plane tickets pre-pandemic. It is critical that any solution replacing passwords has to work for this average user who literally only has their current phone and trades in their phone every 1-4 years for another one, therefore they do not have a second authenticated device to verify when they get a new phone or their phone breaks and they buy a new one at the carrier store.

I'm happy to be proven wrong, but from my understanding of how passkeys are implemented, they will either lead to account lockout or rely on less secure authentication methods if the only authenticated device becomes inaccessible/inoperable

[–] tyler@programming.dev 2 points 2 months ago (2 children)

If you use a password manager it’s literally no different than passwords. I can use my passkeys on any device through 1Password.

[–] stephen01king@piefed.zip 1 points 2 months ago

Keyword is if. Most people I know don't use one.

[–] Trainguyrom@reddthat.com 1 points 2 months ago (1 children)

Okay so if the sites actually give you the passkey to manage that's not as bad as what I remember reading about when passkeys were first announced

[–] tyler@programming.dev 2 points 2 months ago

Passkeys are an implementation of a public-key cryptography. The service has the public key, you have the private key. The sites don’t give you anything, you give them the public-key which is generated using your private key. https://www.passkeys.com/ explains a lot of it.

[–] palordrolap@fedia.io 3 points 3 months ago (1 children)

What's the alternative? It would have to be something that wouldn't work if the user was unconscious and that offered plausible deniability if they were awake and being coerced.

What, other than a password, offers that?

Relatedly, I don't even know most of my passwords these days. I use a password manager (one that doesn't require internet access) that generated random strings. I only ever see them if I accidentally paste them into the wrong field.

[–] AntiBullyRanger@ani.social 1 points 3 months ago

Certification.

Make once, prove everywhere.

[–] moosetwin@lemmy.dbzer0.com 56 points 3 months ago (1 children)

also the sign language translator standing in front of a non-greenscreened greenscreen is a bit funny

[–] jaybone@lemmy.zip 14 points 3 months ago

Not to mention that door is held together by two hamsters and a paper clip.

[–] jcb20165@kbin.melroy.org 30 points 3 months ago
[–] Shaper@lemmy.world 27 points 3 months ago (1 children)

Who's using National TV for this? I said Signal only!

[–] user224@lemmy.sdf.org 16 points 3 months ago (1 children)

You didn't say which signal.

[–] jaybone@lemmy.zip 5 points 3 months ago

The secret one.