The source code: https://github.com/HighwayFrogs/frogger2-vss
I enjoyed skimming through this: https://github.com/HighwayFrogs/frogger2-vss/blob/main/teamS...
Line 427 makes this game NSFW !
Committing ASCII-art of a scantily clad woman is quite the power move.
I wouldn't mind coming into the office if we were allowed to behave like this again.
I feel this was an ‘of it’s time’ thing, but I am so glad we have moved on from this. I wouldn’t enjoy working in a workplace where this was acceptable.
The consequence is that the workplace is a sterile no mans land and you're better off remote.
Like I said: if being there were actually meaningful it might make sense to be there.
It's an ASCII art of a nude woman. So what? It just seems like such a busybody thing to get one's feathers ruffled over.
How about ascii art of a male penis every time you opened your IDE?
The point isn’t what you (MyPasswordSucks) would find objectionable, the point is what the median would find objectionable in a professional setting. Luckily we’ve gotten away from the locker room behavior being the median and now the median is approaching good-manners behavior. This is one of the situations where the Overton window shifting makes us better as a species instead of worse.
It's teenager-ish, and the kind of thing that would make people uncomfortable if they saw it at our own workplaces. We can argue about whether companies 'should' punish people for stuff like this, but I can say for sure that I don't feel like I'm missing out on much here.
I still design and add banners to my servers' MOTD to add a little fun to my day. No NSFW stuff, however.
Mine is a corporate style # rectangle but instead of legal crap it just says "msgodel's laptop/vps/robot/whatever\n Be Nice!"
Mine are old BBS style banners, generally glorifying the hostname, and a small tagline for the server itself, related to its function.
A hypothetical DNS server might greet you with "All your zones belong to us!".
I'm not surprised by the data recovery company story, it feels like I only hear bad things about that industry. I remember something similar happened with LinusTechTips.
Related:
The long road to recover Frogger 2 source from tape drives - https://news.ycombinator.com/item?id=36061574 - May 2023 (213 comments)
A lot of work, but with success as reward! Makes you wonder how easy or difficult it will be in 30 years to 'recover' data from today.
> Makes you wonder how easy or difficult it will be in 30 years to 'recover' data from today.
The challenges will be different. Flash loses its charge in 30 years, most disks are encrypted, and on-site physical backups are mostly a thing of the past. The source might survive in a cloud repo, but it'll either be tied up for legal reasons or deleted when the customer stops paying the bill. But storage is cheap and getting cheaper!
Easy. The “deleted” even overwritten data can leave ghosts even multiple layers deep (think of a clay tablet or painting with multiple inscriptions)
Encryption for 30 years ago? Trivially breakable with quantum
Not this tripe again.
The reality is, as soon as humanity figures out how to distinguish between two values (magnetic flux, voltage, pits/lands, etc) we use it to store more data, or move it faster.
The end.
Shor's algorithm is primarily relevant to asymmetric cryptography, and disk encryption is pretty much universally symmetric. Quantum computers do nothing to break modern disk encryption.
> Encryption for 30 years ago? Trivially breakable with quantum
I wouldn't be so sure - quantum computers aren't nearly as effective for symmetric algorithms as they are for pre-quantum asymmetric algorithms.
Regardless of the parent's statement, just normal compute in 30 years, plus general vulnerabilities and weaknesses discovered, will ensure that anything encrypted today is easily readable in the future.
I can't think of anything from 30 years ago that isn't just a joke today. The same will likely be true by 2050, quantum computing or not. I wonder how many people realise this?
Even if one disagrees with my certainty, I think people should still plan for the concept that there's a strong probability it will be so. Encryption is really not about preventing data exposure, but about delaying it.
Any other view regarding encryption means disappointment.
> I can't think of anything from 30 years ago that isn't just a joke today.
AES is only 3 years shy of 30.
If you used MD5 as a keystream generator I believe that would still be secure and that's 33 years old.
3DES is still pretty secure, isn't it? That's 44 years old.
As for today's data, there's always risk into the future but we've gotten better as making secure algorithms over time and avoiding quantum attacks seems to mostly be a matter of doubling key length. I'd worry more about plain old leaks.
I'll concede your point re: current status of some encryption. However there are loads that were comprised.
How do you tell which will fall, and which will succeed in 30 years?
All this said, I just think proper mental framing helps. Considering the value of encrypted data, in 30 years, if it is broken.
In many cases... who cares. In others, it could be unpleasant.
> I can't think of anything from 30 years ago that isn't just a joke today
The gold standard 30 years ago was PGP. RSA 1024 or 2048 for key exchange. IDEA symmetric cipher.
This combination is, as far as I am aware, still practically cryptographically secure. Though maybe not in another 10 or 20 years. (RSA 1024 is not that far from brute forcing with classical machines.)
>normal compute
You are underestimating the exponential possibilities of keys.
>plus general vulnerabilities and weaknesses discovered, will ensure that anything encrypted today is easily readable in the future.
You can't just assume that there is always going to be new vulnerabilities that cause it to be broken. It ignores that people have improved at designing secure cryptography over time.
From a security perspective, I argue ypu must assume precisely that.
An example being, destroying sensitive backup media upon its retirement, regardless of data encryption.
Has this been proven for flash storage? Once a flash charge is depleted its gone forever, its not like magnetic storage of old.
Hard, but it depends on backup / duplication strategies; this is why e.g. the internet archive is so important, and I hope there are multiple parties doing the same thing for redundancy.
Absolutely heroic effort. And that data recovery company should go out of business.
It is named and shamed in the comments of that video somewhere.
Data recovery companies ought to have the integrity to just say no to a job, if they cannot do it risk free. Trying and failing with the risk of damaging the original data could be very costly to the customer, even if they don't charge money - the customer's lost data could be priceless.
Here’s a gist that might be enlightening:
https://github.com/Kneesnap/onstream-data-recovery/blob/main...