• tomashubelbauer 4 hours ago
    • Jean-Papoulos 2 hours ago

      Line 427 makes this game NSFW !

      • secondcoming 2 hours ago

        Committing ASCII-art of a scantily clad woman is quite the power move.

        • msgodel an hour ago

          I wouldn't mind coming into the office if we were allowed to behave like this again.

          • GEBBL an hour ago

            I feel this was an ‘of it’s time’ thing, but I am so glad we have moved on from this. I wouldn’t enjoy working in a workplace where this was acceptable.

            • msgodel 43 minutes ago

              The consequence is that the workplace is a sterile no mans land and you're better off remote.

              Like I said: if being there were actually meaningful it might make sense to be there.

              • MyPasswordSucks an hour ago

                It's an ASCII art of a nude woman. So what? It just seems like such a busybody thing to get one's feathers ruffled over.

                • gortok 10 minutes ago

                  How about ascii art of a male penis every time you opened your IDE?

                  The point isn’t what you (MyPasswordSucks) would find objectionable, the point is what the median would find objectionable in a professional setting. Luckily we’ve gotten away from the locker room behavior being the median and now the median is approaching good-manners behavior. This is one of the situations where the Overton window shifting makes us better as a species instead of worse.

                  • sweezyjeezy 40 minutes ago

                    It's teenager-ish, and the kind of thing that would make people uncomfortable if they saw it at our own workplaces. We can argue about whether companies 'should' punish people for stuff like this, but I can say for sure that I don't feel like I'm missing out on much here.

                    • bayindirh 19 minutes ago

                      I still design and add banners to my servers' MOTD to add a little fun to my day. No NSFW stuff, however.

                      • msgodel 11 minutes ago

                        Mine is a corporate style # rectangle but instead of legal crap it just says "msgodel's laptop/vps/robot/whatever\n Be Nice!"

                        • bayindirh 7 minutes ago

                          Mine are old BBS style banners, generally glorifying the hostname, and a small tagline for the server itself, related to its function.

                          A hypothetical DNS server might greet you with "All your zones belong to us!".

          • heavensteeth 4 hours ago

            I'm not surprised by the data recovery company story, it feels like I only hear bad things about that industry. I remember something similar happened with LinusTechTips.

            • NaOH 8 hours ago

              Related:

              The long road to recover Frogger 2 source from tape drives - https://news.ycombinator.com/item?id=36061574 - May 2023 (213 comments)

              • sllabres 6 hours ago

                A lot of work, but with success as reward! Makes you wonder how easy or difficult it will be in 30 years to 'recover' data from today.

                • dehrmann 6 hours ago

                  > Makes you wonder how easy or difficult it will be in 30 years to 'recover' data from today.

                  The challenges will be different. Flash loses its charge in 30 years, most disks are encrypted, and on-site physical backups are mostly a thing of the past. The source might survive in a cloud repo, but it'll either be tied up for legal reasons or deleted when the customer stops paying the bill. But storage is cheap and getting cheaper!

                  • ljlolel 6 hours ago

                    Easy. The “deleted” even overwritten data can leave ghosts even multiple layers deep (think of a clay tablet or painting with multiple inscriptions)

                    Encryption for 30 years ago? Trivially breakable with quantum

                    • privatelypublic 15 minutes ago

                      Not this tripe again.

                      The reality is, as soon as humanity figures out how to distinguish between two values (magnetic flux, voltage, pits/lands, etc) we use it to store more data, or move it faster.

                      The end.

                      • mjg59 3 hours ago

                        Shor's algorithm is primarily relevant to asymmetric cryptography, and disk encryption is pretty much universally symmetric. Quantum computers do nothing to break modern disk encryption.

                        • rjst01 5 hours ago

                          > Encryption for 30 years ago? Trivially breakable with quantum

                          I wouldn't be so sure - quantum computers aren't nearly as effective for symmetric algorithms as they are for pre-quantum asymmetric algorithms.

                          • bbarnett 5 hours ago

                            Regardless of the parent's statement, just normal compute in 30 years, plus general vulnerabilities and weaknesses discovered, will ensure that anything encrypted today is easily readable in the future.

                            I can't think of anything from 30 years ago that isn't just a joke today. The same will likely be true by 2050, quantum computing or not. I wonder how many people realise this?

                            Even if one disagrees with my certainty, I think people should still plan for the concept that there's a strong probability it will be so. Encryption is really not about preventing data exposure, but about delaying it.

                            Any other view regarding encryption means disappointment.

                            • Dylan16807 4 hours ago

                              > I can't think of anything from 30 years ago that isn't just a joke today.

                              AES is only 3 years shy of 30.

                              If you used MD5 as a keystream generator I believe that would still be secure and that's 33 years old.

                              3DES is still pretty secure, isn't it? That's 44 years old.

                              As for today's data, there's always risk into the future but we've gotten better as making secure algorithms over time and avoiding quantum attacks seems to mostly be a matter of doubling key length. I'd worry more about plain old leaks.

                              • bbarnett an hour ago

                                I'll concede your point re: current status of some encryption. However there are loads that were comprised.

                                How do you tell which will fall, and which will succeed in 30 years?

                                All this said, I just think proper mental framing helps. Considering the value of encrypted data, in 30 years, if it is broken.

                                In many cases... who cares. In others, it could be unpleasant.

                              • retrac an hour ago

                                > I can't think of anything from 30 years ago that isn't just a joke today

                                The gold standard 30 years ago was PGP. RSA 1024 or 2048 for key exchange. IDEA symmetric cipher.

                                This combination is, as far as I am aware, still practically cryptographically secure. Though maybe not in another 10 or 20 years. (RSA 1024 is not that far from brute forcing with classical machines.)

                                • charcircuit 4 hours ago

                                  >normal compute

                                  You are underestimating the exponential possibilities of keys.

                                  >plus general vulnerabilities and weaknesses discovered, will ensure that anything encrypted today is easily readable in the future.

                                  You can't just assume that there is always going to be new vulnerabilities that cause it to be broken. It ignores that people have improved at designing secure cryptography over time.

                                  • bbarnett an hour ago

                                    From a security perspective, I argue ypu must assume precisely that.

                                    An example being, destroying sensitive backup media upon its retirement, regardless of data encryption.

                              • jetbalsa 4 hours ago

                                Has this been proven for flash storage? Once a flash charge is depleted its gone forever, its not like magnetic storage of old.

                            • Cthulhu_ 4 hours ago

                              Hard, but it depends on backup / duplication strategies; this is why e.g. the internet archive is so important, and I hope there are multiple parties doing the same thing for redundancy.

                            • CSMastermind 7 hours ago

                              Absolutely heroic effort. And that data recovery company should go out of business.

                              • chii 6 hours ago

                                It is named and shamed in the comments of that video somewhere.

                                Data recovery companies ought to have the integrity to just say no to a job, if they cannot do it risk free. Trying and failing with the risk of damaging the original data could be very costly to the customer, even if they don't charge money - the customer's lost data could be priceless.

                              • chris_wot an hour ago

                                Here’s a gist that might be enlightening:

                                https://github.com/Kneesnap/onstream-data-recovery/blob/main...