this post was submitted on 24 Aug 2025
700 points (99.3% liked)

Programmer Humor

26135 readers
1138 users here now

Welcome to Programmer Humor!

This is a place where you can post jokes, memes, humor, etc. related to programming!

For sharing awful code theres also Programming Horror.

Rules

founded 2 years ago
MODERATORS
 
top 34 comments
sorted by: hot top controversial new old
[–] _cryptagion@anarchist.nexus 164 points 1 week ago (2 children)

I just checked, the credentials are still good.

[–] eager_eagle@lemmy.world 75 points 1 week ago

phew, that was close!

... wait

[–] ShaggySnacks@lemmy.myserv.one 6 points 1 week ago

You are truly a good person.

[–] Fizz@lemmy.nz 69 points 1 week ago (2 children)

There is a business I walk past every day and when you look in the window you can see wifi login creds and her name and password. Ive considered saying something but then I'd have to explain why they shouldn't do it and argue with them that its important.

Plus they're property managers so i would laugh if they got hacked.

[–] squaresinger@lemmy.world 49 points 1 week ago (1 children)

There was a common issue with a local ISP that their default wifi router passwords were based on the router's MAC address.

I scanned the wifis I could reach from my flat and found one that was vulnerable. Now I didn't know who that wifi belonged to. I would have had to knock on everyone's door, asking everyone if it's their wifi. Couldn't be bothered doing that and looking stupid doing so.

So instead I logged into their wifi and from there into their router config web page (it also had the default credentials admin/admin) and changed the SSID to [old SSID]_hacked.

The day after they had changed the SSID back and changed the password.

[–] gravitas_deficiency@sh.itjust.works 34 points 1 week ago (1 children)

Nice, that’s actually a pretty clean whitehat way to do it.

[–] InternetCitizen2@lemmy.world 7 points 1 week ago

Fr, I would have torrent some movies

[–] Diplomjodler3@lemmy.world 8 points 1 week ago (1 children)

Hack them and assign all the properties to your name.

[–] Trainguyrom@reddthat.com 8 points 1 week ago

Realistically if the company fails due to their terrible cyber security practices there's a high chance their properties will just be sold to an even larger property management firm

[–] obsidianfoxxy7870@lemmy.blahaj.zone 61 points 1 week ago (2 children)

or just don't use the same login information for everyone for a platform that way it doesn't need to be publicly posted.

[–] SeductiveTortoise@piefed.social 48 points 1 week ago (2 children)

They probably wanted to save on licensing costs.

[–] GreenKnight23@lemmy.world 27 points 1 week ago (3 children)

it's always licensing costs.

don't know how this is legal yet pirating software is illegal.

[–] db2@lemmy.world 28 points 1 week ago (1 children)
[–] LunaChocken@programming.dev 8 points 1 week ago

Command and conquer was da best. I mean I've started playing https://beyondallreason.info/ which Is a free open source RTS.

But damn the cutscenes were so cool.

[–] Pyr_Pressure@lemmy.ca 10 points 1 week ago

Maybe if licensing costs weren't ridiculous I wouldn't mind.

$15/m/user is ridiculous. Charge me like $100 a year for the license and then like $1/m/user on top. It literally doesn't matter much how many users there are for many programs, no extra resources for the company. And if it does use resources it's usually not $15/m worth.

[–] pupbiru@aussie.zone 8 points 1 week ago

it’s not technically legal afaik… the license defines a user pretty rigorously

[–] bacon_pdp@lemmy.world 4 points 1 week ago (1 children)

Then Jami and signal are free

[–] AntiBullyRanger@ani.social 0 points 1 week ago (2 children)

It's the 21c, passwords shouldn't exist.

[–] Trainguyrom@reddthat.com 5 points 1 week ago (1 children)

The real problem is there's not really a better solution that works well for private accounts owned by individuals who only have a single device.

They say that authentication is using either something you know, something you have or something you are, but in the real world it ends up being something you've forgotten, something you've lost and something that you were at one time but are no longer

[–] tyler@programming.dev 3 points 1 week ago (1 children)

We have passkeys now. They’re very effective

[–] Trainguyrom@reddthat.com 3 points 1 week ago (1 children)

Passkeys rely heavily on at least one device remaining authenticated. You have to remember, the average user of a given web service does not have an ISP, they literally only have their phone and maaaaybe a decade old laptop that they haven't turned on or charged since ordering plane tickets pre-pandemic. It is critical that any solution replacing passwords has to work for this average user who literally only has their current phone and trades in their phone every 1-4 years for another one, therefore they do not have a second authenticated device to verify when they get a new phone or their phone breaks and they buy a new one at the carrier store.

I'm happy to be proven wrong, but from my understanding of how passkeys are implemented, they will either lead to account lockout or rely on less secure authentication methods if the only authenticated device becomes inaccessible/inoperable

[–] tyler@programming.dev 2 points 1 week ago (1 children)

If you use a password manager it’s literally no different than passwords. I can use my passkeys on any device through 1Password.

[–] Trainguyrom@reddthat.com 1 points 1 week ago (1 children)

Okay so if the sites actually give you the passkey to manage that's not as bad as what I remember reading about when passkeys were first announced

[–] tyler@programming.dev 2 points 1 week ago

Passkeys are an implementation of a public-key cryptography. The service has the public key, you have the private key. The sites don’t give you anything, you give them the public-key which is generated using your private key. https://www.passkeys.com/ explains a lot of it.

[–] palordrolap@fedia.io 3 points 1 week ago (1 children)

What's the alternative? It would have to be something that wouldn't work if the user was unconscious and that offered plausible deniability if they were awake and being coerced.

What, other than a password, offers that?

Relatedly, I don't even know most of my passwords these days. I use a password manager (one that doesn't require internet access) that generated random strings. I only ever see them if I accidentally paste them into the wrong field.

[–] AntiBullyRanger@ani.social 1 points 1 week ago

Certification.

Make once, prove everywhere.

[–] moosetwin@lemmy.dbzer0.com 59 points 1 week ago (1 children)

also the sign language translator standing in front of a non-greenscreened greenscreen is a bit funny

[–] jaybone@lemmy.zip 15 points 1 week ago

Not to mention that door is held together by two hamsters and a paper clip.

[–] jcb20165@kbin.melroy.org 31 points 1 week ago
[–] Shaper@lemmy.world 28 points 1 week ago (1 children)

Who's using National TV for this? I said Signal only!

[–] user224@lemmy.sdf.org 16 points 1 week ago (1 children)

You didn't say which signal.

[–] jaybone@lemmy.zip 5 points 1 week ago

The secret one.