
Diese Kommentarsektion ist nun Eigentum der BRD.

Not sure if you read this blog post: https://blog.jetbrains.com/pycharm/2025/04/unified-pycharm/
Rest assured – our commitment to open-source development remains as strong as ever. The Community Edition codebase will stay public on GitHub, and we’ll continue to maintain and update it. We’ll also provide an easy way to build PyCharm from source via GitHub Actions.
PyCharm is - like all JetBrains IDEs - based on intellij-community and the "Pro" stuff just some fancy pre-installed plugin that requires a license.
Alternatively, you may choose to manually switch to the new PyCharm immediately and keep using everything you have now for free, plus the support for Jupyter notebooks.
So all community functionallities will also be available in the unified edition for free.
Also the Pro license - which you can also get 4 free in like 10 different ways - pricing is extremely fair: A license costs $100-60 for an individual, which is cheaper than most streaming subscriptions...

Can't wait for all the other horror stories getting posted here :D

Code analyzer lore


This post was brought to you by this PMD rule.

Off topic: Why is there a "gift" code and various tracking paramters in the url?
Url does seem to work without them: https://www.theatlantic.com/politics/archive/2025/03/trump-administration-accidentally-texted-me-its-war-plans/682151/

IP based blocking is complicated once you are big enough
It's literally as simple as importing an ipset into iptables and refreshing it from time to time. There is even predefined tools for that.

While AI crawlers are a problem I'm also kind of astonished why so many projects don't use tools like ratelimiters or IP-blocklists. These are pretty simple to setup, cause no/very little additional load and don't cause collateral damage for legitimate users that just happend to use a different browser.

No need to do that, you can simply scroll down to the footer and find the current version there ;)

With F-droid you trust F-droid to build the binary from the developers' source code
Not when using a self-hosted F-Droid Repo - which is the case for Ironfox.

because it takes a like 3 or 4 minutes to boot
What kind of PC is this? Does it have an SSD?

saying there are unspecified "known vulnerabilities" within Signal
His source: Trust me bro

There are some more privacy friendly forks of "Firefox for Android", which have sponsored shortcuts disabled or minimized by default. For example:
Feel free to give them a try :)

The same apps that have access to more of your data (because they're not sandboxed in a browser), use electron (ships a browser) and include trackers that one can't simply block with an extension?

Yeah but have you ever tried to install it directly?
There is stuff like notarization that's literally designed in a way that only Apple approved software can be run on your machine.

Has since been removed.

Fixes for Higgs-Bugson require extrem measures... and budget


Also: Did you know that the Higgs-Bugson is a subspecies of the Heisenbug?

Short answer: Google Play
Long answer: Google Play and/or people with special requests like https://lemmy.ml/post/12332630

Let's just keep everything the same like the SAP GUI...



PS/2 things


In todays edition of "stuff that I found in my storage" a PS/2 meme
Image transcription:
mov rax, rbx add rax, rcx HELLO IT'S THE KEYBOARD I HAVE AN IMPORTANT MESSAGE E

Packet Loss


Found this in the depths of my storage. Not sure where its from but might improve the day of some people ^^

Homing pigeons are also an alternative


Still waiting for end to end encryption...

Sometimes compression is too good...


Wisdom of the day:
- Give your buildserver enough disk space
- Don't underestimate compressed stuff

Has to be those frozen wind turbines and solar panels...


cross-posted from: https://lemmy.world/post/17714161
Source - The colors of the grids represent CO2 emissions
The title is a reference to the 2021 Texas power crisis

I also want to highlight Florida - which has around 10 different electric grids...

Has to be those frozen wind turbines and solar panels...


Source - The colors of the grids represent CO2 emissions
The title is a reference to the 2021 Texas power crisis

Well from my personal PoV there are a few problems with that
- You can't detect all credentials reliably, they could be encoded in base64 for example
- I think it's kind of okay to commit credentials and configuration used for the local dev environment (and ONLY the local one). E.g. when you require some infrastructure like a database inside a container for your app. Not every dev wants to manually set a few dozen configuration entries when they quickly want to checkout and run the app

I also personally ask myself how a PyPI Admin & Director of Infrastructure can miss out on so many basic coding and security relevant aspects:
- Hardcoding credentials and not using dedicated secret files, environment variable or other secret stores
- For any source that you compile you have to assume that - in one way or another - it ends up in the final artifact - Apparently this was not fully understood (".pyc files containing the compiled bytecode weren't considered")
- Not using a isolated build process e.g. a CI with an isolated VM or a container - This will inevitable lead to "works on my machine" scenarios
- Needing the built artifact (containerimage) only locally but pushing it into a publicly available registry
- Using a access token that has full admin permissions for everything, despite only requiring it to bypass rate limits
- Apparently using a single access token for everything
- When you use Git locally and want to push to GitHub you need an access token. The fact that article says "the one and only GitHub access token related to my account" likely indicates that this token was at least also used for this
- One of the takeaways of the article says "set aggressive expiration dates for API tokens" - This won't help much if you don't understand how to handle them properly in the first place. An attacker can still use them before they expire or simply extract updated tokens from newer artifacts.
On the other hand what went well:
- When this was reported it was reacted upon within a few minutes
- Some of my above points of criticism now appear to be taken into account ("Takeaways")

Seriously how many times does this have to happen


One does not commit or compile credentials
Context:
This meme was brought to you by the PyPI Director of Infrastructure who accidentally hardcoded credentials - which could have resulted in compromissing the entire core Python ecosystem.

Just for further clarification, the API works like this:
time
is the local (client) time (in this case UTC-7)servertimezone
is the time zone where the server is locatedtimezoneoffset
is the offset of the local time relative to the servertimezone (offset from the servers PoV)
To get the UTC date you have to do something like this:
undefined
time.minusHours(timezoneoffset).atZone(servertimezone).toUTC()

Implementing RFC 3339 shouldn't really be that hard...



Roses are red, violets are blue, everyone is using IPv6, why aren't you?


Context:
People have been asking for IPv6 Support on GitHub since years (probably a decade by now)
... and someone even got so annoyed that they decided to setup a dedicated website for checking this: https://isgithubipv6.live/

Verification badge prices are too damn high


Context: After evaluating the DockerHub Verified Publisher Program and receiving a mail with "it costs as little as $5k per year" I have come to the conclusion that it's not worth it